Wednesday 29 February 2012

How to use CD & DVD image files without burning discs

With the exception of the use of flash-based removable drives, the days of portable storage in the enterprise are numbered. Sure, there are still plenty of CD- and DVD-based products in use out there. Most CIOs jettisoned the floppy drive from corporate computers years ago, but most systems still include CD or DVD drives. That said, it's easier to get along without even a CD/DVD drive these days. A lot of software used in the enterprise space is available in electronic format and is downloadable in the form of ISO images. An ISO image is a disk-based representation of a CD or DVD. In fact, ISO files can be burned to a blank CD or DVD which can then be used just like the original disc. You don't have to burn an ISO file to a disc to make use of the contents of the ISO file, though. There are a number of utilities out there that allow you to create virtual CD/DVD drives on your computer. You can then "insert" an ISO file into one of these virtual drives and make use of the drive just as if you had inserted an actual physical disc. In fact, this virtual drive even shows up in My Computer as a CD/DVD drive and works just like a physical drive. If you eject the disc from this virtual device, the disc actually ejects; that is, the software dismounts the ISO image behind the scenes, which is the same thing as ejecting the disc.
Here is a list of a few different pieces of ISO-mounting/virtual CD-DVD drive software I've used along with some note about each.  Note that this is far from an exhaustive list of options out there.  If you've successfully (or unsuccessfully!) used a different tool, tell us about it in the comment section.
  • DAEMON Tools.  DAEMON tools is one of the best known titles out there for mounting ISO image and supports CD, DVD and even BluRay images.  DAEMON tools provides both free and paid versions of the product with different capabilities in each.  However, free and paid versions all include the ability to mount the ISO images normally used in organizations.  One caveat: The DAEMON Tools Lite installer includes an optional toolbar and also offers to change your home page.  These traits are sometimes associated with spyware, so be careful during the installation.  I've used DAEMON Tools extensively and find it to be a very capable product. DAEMON tools supports both 32-bit and 64-bit versions of Windows.  DAEMON tools is managed via an icon that sits in the system tray.
  • VirtualCloneDrive.  Although many people consider SlySoft, the maker of VirtualCloneDrive, to be operating in a legal gray area with some of their other products, VirtualCloneDrive is the company's free product enabling the mounting of standard ISO images into as many as eight virtual CD/DVD drives.  I have limited experience with VirtualCloneDrive, but my experience has been very positive so far.  I'm currently runningthe software on a Windows Server 2008 64-bit computer I use for a desktop and it runs great.  VirtualCloneDrive integrates with shortcut menus on your system.  Mounting an ISO image is as simple as right-clicking your virtual CD drive and choosing Virtual Clone Drive > Mount.
  • MagicISO.  Also supporting most32- and 64-bit versions of Windows, MagicISO has been around for quite some time and supports a wide range of disc formats, including ISO images, Roxio Easy CD creator files, and Nero files.  As is the case with many of these tools, MagicISO allows you to install multiple virtual drives so you can mount multiple ISO images simultaneously.
  • Microsoft Virtual CD-ROM Control Panel for Windows XP.  As it's name implies, this product works only on Windows XP.  With other excellent tools available, I don't generally recommend this product as it's relatively clunky, especially when evaluated side-by-side with the tools mentioned above.  That said, if you're uncomfortable with the free tools above and are running Windows XP, the software does perform as expected.  It has been quite some time since I've used it, but it did work very well.
 Personally, I prefer to use ISOs over physical discs. I can store them on my network in a single location, don't have to search my desk every time I need to install something, and updates can be had in a much more timely fashion.

How to save/download video from youtube ?

Steps to save/download the video from you tube :-
 For Internet Explorer (PC) users
1) First of all, to make your job easier, you are advised to Get a toolbar for faster access to youtube.com.
2) Click your favourite video clip, you can see the URL in your browser becomes something like this :
3) highlight the URL (like above) and right click the mouse and select "copy"
4) Paste the URL at our download page
5) When the download link shows, You should right-click -> "Save Target As" OR copy and paste the link into your download manager. Note: You must change the file extension to .flv
6) The .flv file is not a common multimedia file, you need a software called FLV player to play it. Click here to get Free FLV Player
7) Install the FLV player into your computer.
8) Select the video clip that you downloaded and play
9) If you want to convert the FLV video and play it in IPod, PSP, mobile phone(3GP format), then you need to download FLV Converter

BEST SITE........

HEY FRIENDZ HERE I GOT A BEST SITE TO DOWNLOAD ALL U THAT U WANT
THE SITE NAME IS WWW.FRIENDZ4M.COM
ENJOY WITH THIS SITE.............:)

Wednesday 22 February 2012

APPLE INC CAN GET USD10 FOR EVERY ANDROID DEVICE SOLD AROUND THE WORLD.

Apple Inc can get USD10 for every Android device sold around the world.
Every Android device that is sold can make Apple Inc. earn atleast $10 for each device. Yes, considering the official numbers that 0.7 Million (7 Lac) android devices are activated each day, Apple can earn 7 Million USD each day by doing nothing.
You should be aware of the famous legal war that is being fought by Google (Android) vs Apple (iPhone-iPad) makers. Both have been busy punching each other with bunch of lawsuits for patent violations. Apple did played wild and banned many Android devices from HTC and Samsung from being used in Europe as well as Australia. Since Apple is Patent owner of hundreds of key technologies, thus it is very much possible that almost every device based on Android is violating Apple’s patents in some way.
Apple did repeatedly accused Samsung for designing it’s Galaxy Tab an almost exact copy of its iPad lineup and Samsung Galaxy Tab 10.1 even got banned in Australia for few days upon court orders, but was lifted very soon.
Experts say that, if Apple focuses on issuing patent Licenses to others, than it can earn upto $10/sale of Android device. But instead it seams Apple’s target is to slow down Android from gaining popularity and is trying to slow it down in whatever way possible. Lets see for how long this years old fight, yet much heated war has to go on.

Saturday 18 February 2012

how to create a website

Create a Website

Welcome!
If you need to create a website, but don't know where to start, you've come to the right place!
Here, I explain how to create a website. I also explain how to get your own domain name (eg, www.yourname.com), and how to host your website (make it available to the world).
Creating a website is much easier than you might think. By following these steps, you will be able to create your own website in no time at all!

Need a Website NOW?

Need a website right now? No time to learn the technical stuff? Sounds like you need Website Tonight...
Start Now!
The above link takes you to Website Tonight, a professional online website builder by our partner site, ZappyHost. Website Tonight includes free hosting, and you can get a domain name for $1.99. Domains for this price are almost unheard of, but this is part of the special package, so make sure you register your domain and Website Tonight at the same time.

No Experience Needed!

Did you know that anyone can create a website? Not only that, but did you know that you could make your own website within the next 30 minutes?
Website Tonight makes all this possible.
Here's an example website that I created in about 5 minutes using Website Tonight. I could have added a lot more to it, but I wanted to show you what can be done within 5 minutes. As you can see, it looks like a finished website.
More about Website Tonight.

Website Tonight

Check out this video to see how easy it is to use Website Tonight.
Website Tonight is a website builder that makes it easy to create a website. It is especially useful if you just want to make a website quickly without having to learn the technical stuff like HTML, CSS, etc.
One of the great things about Website Tonight is that it is an online website builder. This means that you don't need to download anything. Everything is done online.
So if you need to create a website ASAP without learning all the technical stuff, check out Website Tonight.
Check out the demo on the right to see how easy it is to create a website with Website Tonight.

A Warning about Free Websites

You might occasionally encounter someone offering you a free website. Basically these enable you to sign up, and start building your website for free.
But... a word of caution!
There are things they might not tell you when they're trying to sell you a free website. While a few companies will be completely upfront about these extra costs, others will fail to mention them ...until you've signed up:
  • Your "free" website does not have it's own domain name (i.e. www.yourname.com). If you want your own domain name, you'll have to pay for it. And you will probably pay more than you should.
  • Your "free" website may have ads displayed all over it. This enables the company (not you), to earn money from your website. To remove the ads, you will usually have to pay money for a premium package.
  • Most of the really good features are actually part of a "premium" package - which you have to pay for.
Of course, it's entirely up to you which way you go. But there is one thing I will always recommend: Get your own domain name - now!
Registering your own domain name is the best piece of advice I can give. Without this, your website does not have it's own "web address". This might not sound like much now, but later, once you've built up a fantastic website with loads of content, you will see what I mean. Without your own domain name, your "web address" is not actually yours, it's the company who provides your "free" website. If they decide to change something, you could lose all your hard work. Imagine losing months, or even years, of hard work, just because you chose not to register a domain name!
So, if you're shopping around, check for those three things before you sign up with anyone.

The Website Creation Process

Now if you choose not to use a website builder, you are probably curious to know what is involved in making a website. Here I explain the three main steps of creating a website.
Creating a website basically involves the following 3 steps:
STEP 1 >> STEP 2 >> STEP 3 >>
Register a Domain Name Get a Web Host Build your Website
A domain name is the thing that looks like mysite.com. You register these on an annual basis. Domain names can cost anywhere between $10 and $50 per year. I'll show you how to get one for $1.99 (below). A web host is a company that enables your website to be viewed by the rest of the world, 24/7.A good hosting plan can be anywhere between $10 per month and many thousands per month. Below, I'll show you excellent hosting plans starting from around $5 or $6 per month. You can either build it yourself or use a website builder. Below, I'll show you an online website builder that includes templates and hosting. And the great thing is, it's cheaper than most hosting plans!
A more detailed explanation of these 3 steps follows.

Step 1: Register a Domain Name

Domain name Before you even think about building your website, you should register a domain name. A domain name is the thing that looks like this: "yourdomain.com".
Your domain name represents the URL (or permanent web address) of your website. Therefore, when anyone types in "yourdomain.com" or "www.yourdomain.com", they will see your website.
You register your domain name through a domain name registrar or hosting provider. You simply check that your preferred domain name is available, then register it (online).
Domain names are registered on an annual basis, and you can usually register it many years in advance (or set 'auto-renew').
Prices can range from between $10 to $15 up to as much as $35 or even $45 (this is for the same product!). ZappyHost has some of the best prices on the web - and if you purchase hosting at the same time, the domain name is even cheaper ($1.99 at time of writing).
If you don't have a domain name yet, get your domain name now (before someone else beats you to it!)

Step 2: Get a Web Host

Web Hosting A web host (or hosting provider), is a company that makes your website available for the world to see. They have the equipment and technical skills to make sure your website is available to the world, 24 hours a day, 7 days a week.
Choose your hosting provider carefully - a good host will have excellent support. A bad host can have almost no support at all! If you're new to creating websites, good support can reduce the stress that comes from doing something for the first time.
Also, some web hosts have an online website builder. A good website builder can enable anyone to make a website - even complete novices.
If you like the idea of using an online website builder, check out the website builder below. This enables you to build a website virtually within minutes, and hosting is included (as well as plenty of other extras).
If you don't need a website builder (i.e. you prefer to build your website by yourself), you can find some great hosting plans here. Once you've built your website, simply upload it via FTP.
If you'd like to learn more about web hosts, check out my web hosting tutorial.

Step 3: Build your Website

Image of a website This part can be as easy or as hard as you like it to be!
The easy way? The easiest way to build a website is to use your web host's website builder (assuming they have one). As mentioned, ZappyHost provides Website Tonight which makes it extremely easy for you to make your website.
The hard way? OK, if you think a website builder sounds too much like cheating, you probably want to learn how to build a website the way the pros do it - by coding/programming. If this sounds like you, then see this introduction to making your own website. Also check out the Quackit homepage for links to thousands of pages of tutorials and other web building resources.
Also, if you need to build an ecommerce website, check out the Quick Shopping Cart ecommerce website builder.

How to Hide Data in Image, Audio & Video Files: Steganography

Ever wondered to know how to hide secret messages in images, audio and video files? Well, in this post I will take you through a concept called steganography using which, it is possible to hide your secret information in image files, songs or any other file of your choice. At the end of this post, you can also download free stegnographic tools and start hiding your data.

What is Steganography?

Steganography is a means of obscuring data where secret messages are hidden inside computer files such as images, sound files, videos and even executable files so that, no one except the sender and the receiver will suspect the existence of stealth information in it. Steganography may also involve the usage of cryptography where the message is first encrypted before it is concealed in another file. Generally, the messages appear to be something else such as an image, sound or video so that the transfer of secret data remains unsuspected.
The main advantage of steganography over other methods such as cryptography is that, it will not arose suspicion even if the files fall in the hands of a third party. Unlike cryptographic messages, stegnographic messages will no way attract the attention of a third party by themselves. Thus stegnanography has an upper hand over cryptography as it involves both encryption and obscurity.

What are the Applications of Steganography?

Steganography is mainly used to obscure confidential information/data during storage or transmission. For example, one can hide a secret message in an audio file and send this to another party via email instead of sending the message in the textual format. The receiver on the other end will decrypt the hidden message using the private decryption key. In a worst case scenario, even if a third party does manage to gain access to the email, all he can find is the audio file and not the hidden data inside it. Other usage of steganography include digital watermarking of images for reasons such as copyright protection.
Eventhough steganography has many useful applications, some may use this technique for illegitimate purposes such as hiding a pornographic content in other large files. Roumors about terrorists using steganography for hiding and communicating their secret information and instructions are also reported. An article claiming that, al-Queda had used steganography to encode messages in images and transported them via e-mails, was reported by New York Times, in October 2001.

How do Steganography Tools Work?

Stegnography tools implement intelligent algorithms to carefully embed the encrypted text messages or data inside other larger files such as an image, audio, video or an executable file. Some tools will embed the encrypted data at the end of another file so that there will be enough room for storing larger data.
There are many steganography tools available online but only a few are able to work flawlessly. I did not find any tool that worked perfectly on both small and large data. However I have  managed to develop my own tool that can work perfectly on all types of files and all size of data. The tool is called “Stego Magic“. You can download it from the following link.
Download Stego Magic
The zip file contains two versions of Stego Magic: One for encrypting the text messages and the other for encrypting binary files. StegoMagic_TXT can be used to hide text messages in other files such as an image or a sound file. StegoMagic_BIN can be used to hide one binary file in another such as an executable file inside an image or an image inside a video file.
With Stego Magic, there is no limitation on the size and type of the file that you are intending to hide. For example, you can hide a video of size 1 GB in an image of size 1 MB or hide an executable file inside a WORD document. The tool is pretty straightforward to use and requires no special understanding of the concept.
At the end of the encryption process, a secret decryption key will be generated and the same is required during the decryption process.

How to Use Stego Magic?

Suppose you want to hide a text message inside a JPG file:
1. Place the JPG and the text file (.txt) in the same folder as that of StegoMagic_TXT.exe
2. Run StegoMagic_TXT.exe and follow the screen instructions to embed the text message inside the JPG image.
3. Note down the secret decryption key.
Now you can send this image to your friend via email. To decrypt the hidden message, your friend should load this JPG file onto the Stego Magic tool and use the secret decryption key.

Tuesday 14 February 2012

HOW TO HACK BLOCKED SITES OF WIFI

Most corporations, schools, and/or internet cafés are blocking popular websites such as, social networks, gaming and/or torrent sites. The biggest reason is because if you’re at work, you’ll probably spend more time checking out your Myspace or Facebook account rather then actually working. Although you may hear a lot of other reasons, like privacy matters and so on, it all basically boils down to them not wanting you to waste their time.
With that said, the internet loophole for remedying such a situation like this one, is by utilizing an anonymous web-based proxy program. An anonymous web proxy (CGI proxy, HTTP proxy) is designed to bypass proxy restrictions through a web interface, such as your browser. Web proxies hide users identity from the sites they visit, keep cookies at their site, and delete them after each session and selectively remove JavaScript, Java, etc. The server then communicates with the webpage, then communicates with visitor browser. This allows for you to surf the websites you want from virtually anywhere, without the hassle of being blocked.

Below you’ll find a list of proxy sites for your convenience, all you have to do is click on one of them, and once you’re there, just type in to the search box the website you want to visit. Nothing else to it, basically it’s simply browsing a website through another website. Now, there’s allows a chance that you might get caught by your boss, so use the list wisely my young padawan, and at your own risk.


Most Popular Top 30 Proxy Websites
1. proxify.com (13,587)
2. p-r-o-x-y.com (13,100)
3. unblockall.net (11,784)
4. stopthatblock.com (11,200)
5. surf-ip.com (10,966)
6. waythru.com (10,610)
7. beatfiltering.com (10,518)
8. bytego.info (9,347)
9. razorproxy.com (7,426)
10. sureproxy.com (7,162)
11. proxify.co.uk (5,148)
12. proxy.tc (5,061)
13. vtunnel.com (4,726)
14. virtual-browser.com (4,276)
15. btunnel.com (4,271)
16. polysolve.com (4,173)
17. ultracloak.info (4,163)
18. selfhide.info (3,871)
19. adminproof.com (3,002)
20. proxhe.info (1,926)
21. hidemyface.net (1,498)
22. surf-anonymous.org (1,464)
23. letsbunk.com (1,398)
24. advanceproxy.com (1,383)
25. thenewproxy.com (1,364)
26. gyub.com (1,345)
27. privacynest.com (1,293)
28. proxyme.us (1,287)
29. surrogafy.com (1,274)
30. myspaceproxy007.com (1,210)
If you’re not quite satisfied with a measly top 30 list, then click here for a list of over 3,000 proxy sites to choose from, and for more information about online privacy and anonymity, enjoy. ^_^

Three Ways To Unblock Websites

Three Ways To Unblock Websites

How to Crack a Wi-Fi Network’s WEP Password with BackTrack

You already know that if you want to lock down your Wi-Fi network, you should opt for WPA encryption because WEP is easy to crack. But did you know how easy? Take a look.
If the network you want to test is running the more popular WPA encryption, see our guide to cracking a Wi-Fi network's WPA password with Reaver instead.
Today we're going to run down, step-by-step, how to crack a Wi-Fi network with WEP security turned on. But first, a word: Knowledge is power, but power doesn't mean you should be a jerk, or do anything illegal. Knowing how to pick a lock doesn't make you a thief. Consider this post educational, or a proof-of-concept intellectual exercise.
Dozens of tutorials on how to crack WEP are already all over the internet using this method. Seriously—Google it. This ain't what you'd call "news." But what is surprising is that someone like me, with minimal networking experience, can get this done with free software and a cheap Wi-Fi adapter. Here's how it goes.

What You'll Need

How to Crack a Wi-Fi Network's WEP Password with BackTrackUnless you're a computer security and networking ninja, chances are you don't have all the tools on hand to get this job done. Here's what you'll need:
  • A compatible wireless adapter—This is the biggest requirement. You'll need a wireless adapter that's capable of packet injection, and chances are the one in your computer is not. After consulting with my friendly neighborhood security expert, I purchased an Alfa AWUS050NH USB adapter, pictured here, and it set me back about $50 on Amazon. Update: Don't do what I did. Get the Alfa AWUS036H, not the US050NH, instead. The guy in this video below is using a $12 model he bought on Ebay (and is even selling his router of choice). There are plenty of resources on getting aircrack-compatible adapters out there.
  • A BackTrack 3 Live CD. We already took you on a full screenshot tour of how to install and use BackTrack 3, the Linux Live CD that lets you do all sorts of security testing and tasks. Download yourself a copy of the CD and burn it, or load it up in VMware to get started. (I tried the BackTrack 4 pre-release, and it didn't work as well as BT3. Do yourself a favor and stick with BackTrack 3 for now.)
  • A nearby WEP-enabled Wi-Fi network. The signal should be strong and ideally people are using it, connecting and disconnecting their devices from it. The more use it gets while you collect the data you need to run your crack, the better your chances of success.
  • Patience with the command line. This is an ten-step process that requires typing in long, arcane commands and waiting around for your Wi-Fi card to collect data in order to crack the password. Like the doctor said to the short person, be a little patient.

Crack That WEP

To crack WEP, you'll need to launch Konsole, BackTrack's built-in command line. It's right there on the taskbar in the lower left corner, second button to the right. Now, the commands.
First run the following to get a list of your network interfaces:
airmon-ng
The only one I've got there is labeled ra0. Yours may be different; take note of the label and write it down. From here on in, substitute it in everywhere a command includes (interface).
Now, run the following four commands. See the output that I got for them in the screenshot below.

airmon-ng stop (interface)
ifconfig (interface) down
macchanger --mac 00:11:22:33:44:55 (interface)
airmon-ng start (interface)

How to Crack a Wi-Fi Network's WEP Password with BackTrack If you don't get the same results from these commands as pictured here, most likely your network adapter won't work with this particular crack. If you do, you've successfully "faked" a new MAC address on your network interface, 00:11:22:33:44:55.
Now it's time to pick your network. Run:
airodump-ng (interface)
To see a list of wireless networks around you. When you see the one you want, hit Ctrl+C to stop the list. Highlight the row pertaining to the network of interest, and take note of two things: its BSSID and its channel (in the column labeled CH), as pictured below. Obviously the network you want to crack should have WEP encryption (in the ENC) column, not WPA or anything else.
How to Crack a Wi-Fi Network's WEP Password with BackTrack Like I said, hit Ctrl+C to stop this listing. (I had to do this once or twice to find the network I was looking for.) Once you've got it, highlight the BSSID and copy it to your clipboard for reuse in the upcoming commands.
Now we're going to watch what's going on with that network you chose and capture that information to a file. Run:
airodump-ng -c (channel) -w (file name) --bssid (bssid) (interface)
Where (channel) is your network's channel, and (bssid) is the BSSID you just copied to clipboard. You can use the Shift+Insert key combination to paste it into the command. Enter anything descriptive for (file name). I chose "yoyo," which is the network's name I'm cracking.
How to Crack a Wi-Fi Network's WEP Password with BackTrack

You'll get output like what's in the window in the background pictured below. Leave that one be. Open a new Konsole window in the foreground, and enter this command:
aireplay-ng -1 0 -a (bssid) -h 00:11:22:33:44:55 -e (essid) (interface)
Here the ESSID is the access point's SSID name, which in my case is yoyo. What you want to get after this command is the reassuring "Association successful" message with that smiley face.
How to Crack a Wi-Fi Network's WEP Password with BackTrack
You're almost there. Now it's time for:
aireplay-ng -3 -b (bssid) -h 00:11:22:33:44:55 (interface)
Here we're creating router traffic to capture more throughput faster to speed up our crack. After a few minutes, that front window will start going crazy with read/write packets. (Also, I was unable to surf the web with the yoyo network on a separate computer while this was going on.) Here's the part where you might have to grab yourself a cup of coffee or take a walk. Basically you want to wait until enough data has been collected to run your crack. Watch the number in the "#Data" column—you want it to go above 10,000. (Pictured below it's only at 854.)
Depending on the power of your network (mine is inexplicably low at -32 in that screenshot, even though the yoyo AP was in the same room as my adapter), this process could take some time. Wait until that #Data goes over 10k, though—because the crack won't work if it doesn't. In fact, you may need more than 10k, though that seems to be a working threshold for many.
How to Crack a Wi-Fi Network's WEP Password with BackTrack

Once you've collected enough data, it's the moment of truth. Launch a third Konsole window and run the following to crack that data you've collected:
aircrack-ng -b (bssid) (file name-01.cap)
Here the filename should be whatever you entered above for (file name). You can browse to your Home directory to see it; it's the one with .cap as the extension.
If you didn't get enough data, aircrack will fail and tell you to try again with more. If it succeeds, it will look like this:
The WEP key appears next to "KEY FOUND." Drop the colons and enter it to log onto the network.

Problems Along the Way

With this article I set out to prove that cracking WEP is a relatively "easy" process for someone determined and willing to get the hardware and software going. I still think that's true, but unlike the guy in the video below, I had several difficulties along the way. In fact, you'll notice that the last screenshot up there doesn't look like the others—it's because it's not mine. Even though the AP which I was cracking was my own and in the same room as my Alfa, the power reading on the signal was always around -30, and so the data collection was very slow, and BackTrack would consistently crash before it was complete. After about half a dozen attempts (and trying BackTrack on both my Mac and PC, as a live CD and a virtual machine), I still haven't captured enough data for aircrack to decrypt the key.
So while this process is easy in theory, your mileage may vary depending on your hardware, proximity to the AP point, and the way the planets are aligned. Oh yeah, and if you're on deadline—Murphy's Law almost guarantees it won't work if you're on deadline.

How To Hack Yahoo Accounts


How To Hack Yahoo Accounts
We get numerous calls from people who want to recover AOL®, Yahoo® or Hotmail® or other online and email passwords. We do not do this type of work. Many of these people claim that they have lost their passwords because they have been hacked and now need to get their password back. As we have reviewed information on the web, we found very little real information about the actual techniques that could be used to hack these services. So we decided to pull together a detailed explanation.
What follows is a detailed explanation of the methodologies involved. We do not condone any illegal activity and we clearly mention in this article techniques that are illegal. Sometimes these methods are known as “Phishing.”
You can also search for additional information at the IT Security Search Engine, Security Search Authority.

STEPS:-

Let’s dispose of one technique that is absolutely a hoax (meaning a fraud: something intended to deceive; deliberate trickery intended to gain an advantage.) If you see a newsgroup post or web page with something like the following, it is a hoax and will not work.
: : : (([[THIS REALLY WORKS ]])) : : :
(1) send an E-mail to passwordrecovery@yourdomainhere.com
(2) In the subject box type the screenname of the person whose password you wish to steal
(3) In the message box type the following: /cgi-bin/start?v703&login.USER=passmachine&class=supervisor&f={your aol password}&f=27586&javascript=ACTIVE&rsa
(4) Send the e-mail with priority set to “high” (red ! in some mailprograms)
(5) wait 2-3 minutes and check your mail
(6) Read the message.-Where YOUR password was typed before, NOW, the password of the screenname in the code string is there!!!
Why does this work? It´s a special decryption-server that AOL-employees can use to decrypt passwords.The aolbackdoor account is a bot that reads your authentification from the message body and identifiying you as a valid AOL Staff-member, you will get the password mailed back to you. The trick is that this Bot´s script seems to be a little bit buggy and it automatically recogises you as an supervisor (AOL-Staff member), even if you use a normal AOL account. This means, that EVERYONE having a valid AOL account can hack as many other accounts as he wants.

How do I hide my IP address?

The most common method to hide your IP address is to use a proxy server in one form or another. A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server and then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client's request or the server's response for various purposes.
There are several implementations of proxy servers that you can use to hide your IP address (in an attempt to remain anonymous on the internet):

Website Based Proxy Servers

A Website based proxy server is a website that provides a form for you to enter the URL of a website that you wish to anonymously visit. When you submit the form the website proxy server makes a request for the page that you want to visit. The machine usually does not identify itself as a proxy server and does not pass along your IP address in the request for the page. The features of these sites vary (ad blocking, javascript blocking, etc) as does their price. Some are free and some charge. Examples of website proxy services are:

Browser Configured Proxy Servers

There are also stand alone proxy servers that allow for you to configure your browser to route your browser traffic through that machine, which then makes a request for a page on your behalf, and then sends you the results. These are usually used at no cost to the user. Since they are accessible to the public these are often quite slow. Please see instructions for using a proxy server.
There are a variety of types of these proxy servers:
  • Transparent Proxy
    This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.) This type of proxy server does not hide your IP address.
  • Anonymous Proxy
    This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users. This type of proxy server will hide your IP address.
  • Distorting Proxy
    This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers. This type of proxy server will hide your IP address.
  • High Anonymity Proxy
    This type of proxy server does not identify itself as a proxy server and does not make available the original IP address. This type of proxy server will hide your IP address.

Installed Software Proxy Servers

There are a variety of companies and software packages available at either a onetime cost or at an annual subscription. These are usually faster and more reliable than the above proxy servers. Some of these services would include:

VPN Services

A virtual private network (VPN) protects your data and identity over public networks, like the Internet and wireless hotspots. Various protocols are used to create an encrypted tunnel that transports data securely. While a firewall may protect the data on your computer, a VPN will protect your data on the Internet. The goal of a VPN is to implement the same level of security provided by private networks at substantially lower costs. VPN services provide different gateway cities where the IP address assigned to your computer is located. This allows users to access websites only available to users from a certain country. This application is particularly important for travelers who need to access websites from their home country and for people living in regions rife with censorship, like China and Iran.

How to save/download video from youtube ?

Why you should download/save videos from youtube :
You found an interesting video from youtube and you want to save/download it to your computer and later share it with your friend or keep it as a collection. However, by default Youtube doesn't allow users to save/download the videos. It only allow user to send a hyperlink to the friends and invite them to go to youtube website to view the videos.
It will become a problem because these video may gone forever due to copyright infringement issues, why not save/download the video before it's too late ?