' name='google-site-verification'/> 01/01/2011 - 02/01/2011 | SOURCE CODE

[ Site Info ]

BloggerMates

Related Posts Plugin for WordPress, Blogger...

FOLLOWERS

[ Archives ]

[ Followers ]

[ Partner Link ]

portbloger.co.cc

[ Recent Comments ]

[ Advertiser ]

DMCA Protection Status

About

Ghazanfar Ali Naqvi

Pageviews

Google Talk

NetworkedBlogs

Google Translater

English French German Spain Italian Dutch Russian Portuguese Japanese Korean Arabic Chinese Simplified

this widget by www.portbloger.co.cc

Desktop Codee © Custom Search

Loading

Ibrahim Shahid Sets O Level World Record

Ibrahim Shahid 23 As 640x480 thumb Ibrahim Shahid Sets O Level World RecordIbrahim Shahid, a student of Beaconhouse School System, Boys Branch, Margallah Campus has stunned the world by scoring 23 A’s in Cambridge O Level exams to set a new world record in the history, reported Express Tribune today.
Story was produced on Express 24×7 and Geo News as well.
Paper and TV said that Ibrahim Shahid sat for 24 subjects and scored 23 A’s .
Ibrahim Shahid attributed his success to his parents and teachers, said Express Tribune.
Ibrahim Shahid recalled an incident where his teacher in Australia had written him off, stating that he would “never excel”.
BeaconHouse School System Margalla campus Islamabad’s official facebook fan page announced Ibrahim Shahid’s success as following:
Ibrahim Shahid Ibrahim Shahid Sets O Level World Record
                                     
                          http://www.youtube.com/watch?v=sdujQUOwYJQ&feature=player_embedded

 Earlier, Ali Moeen Nawazish, also a Pakistani student, had set a world record by securing 23 As in A level Cambridge exams.

M.O.C 6367A Introduction to Object Oriented Programming using Microsoft Visual Studio 2008 - MediaFire

Introduction to Object Oriented Programming using Microsoft Visual Studio 2008 | 3.28 GB
Published: December 23, 2009 (in development) | Language(s): English | Audience(s): Developers
Level: 100 | Technology: Microsoft Visual Studio 2008 | Type: Course | Delivery Method: Instructor-led (classroom)
Video Training | Duration: 3 Days

This three-day instructor led course will enable attendees to start designing and developing object-oriented applications using Visual Studio 2008. Attendees will learn object-oriented concepts including classes, methods, properties, inheritance, and interfaces. Also they will learn how to identify opportunities to use these concepts in design, and how to implement these object-oriented concepts using Visual Studio 2008.
The target audience for this course is lower-intermediate level programmers who have a minimum of three months programming experience in a professional environment and want to learn how to use Visual Basic or C# to develop well conceived and implemented object-oriented programming applications.


After completing this course, students will be able to:
* Describe the fundamentals of getting started with object-oriented development and review Visual Studio 2008 features.
* Describe classes and their importance in the basic structure of an object-oriented application.
* Add properties and methods to implement the internal functionality of a class.
* Implement inheritance, abstraction and polymorphism to reduce code duplication.
* Create structures that emphasize code reusability.
* Implement interfaces to establish “common” relationships between classes, reduce code dependencies, and facilitate code.
* Create an object-oriented structure design from a business problem.
* Create object-oriented structures based on their knowledge of classes, properties, methods, inheritance, and interfaces.
* Create and use delegates, events and exceptions to establish interclass communications.
* Design class interactions based on a set of business requirements.
* Design class interactions using methods, events, delegates and exceptions.
* Evaluate techniques to improve their own design.
* Evaluate a design pattern and determine its applicability to a business scenario.
* Create and maintain updatable units of software by deploying components and class libraries.
* Maintain an application without deploying the entire application.



Archives contain the repairing data. You don't have to worry about CRC errors.
Winrar - How to Repair.
DOWNLOAD ALL HERE

1000 Bestever Great Hacking tutorials 2009

Bestever Great Hacking tutorials 2009 | 6.80 MB
Includes the following:
Create Bootable XP SP integrated CD,Create One-click Shutdown & Reboot Shortcuts
Creating a Board aka Forum on your own PC
Creating Universal Ghost Usb Boot Disk And Cd
Data Capacity of CDs [Tutorial]
Debug, Learn how ***** windows
Delete An undeletable File
Delete Files From The Recent File List In Windows
Digital Camera Guide
Digital Faq -learn Everything About Digital, Capture, Edit, Burning and more
Digital Photo Id Cards, Greate Info
Direct Link To Any Page You Want To In
Directx Explained
Disable Compression On Xp, NTFS partition, Disk Cleanup
Disable The Send Error Report, to Microsoft
Disable Windows Logo Key
Discover New Music You'll Probably Love
Download Free Music legally,, legally
Download from a paypal site without paying a penny!
Download From Ftpz, Using Ftp Search Sitez
Download Mp3's Without Using Filesharing
Download Music And Video With ,edia Player9, quick and easy!
...and much more!!!
Includes the following:
Create Bootable XP SP integrated CD,Create One-click Shutdown & Reboot Shortcuts
Creating a Board aka Forum on your own PC
Creating Universal Ghost Usb Boot Disk And Cd
Data Capacity of CDs [Tutorial]
Debug, Learn how ***** windows
Delete An undeletable File
Delete Files From The Recent File List In Windows
Digital Camera Guide
Digital Faq -learn Everything About Digital, Capture, Edit, Burning and more
Digital Photo Id Cards, Greate Info
Direct Link To Any Page You Want To In
Directx Explained
Disable Compression On Xp, NTFS partition, Disk Cleanup
Disable The Send Error Report, to Microsoft
Disable Windows Logo Key
Discover New Music You'll Probably Love
Download Free Music legally,, legally
Download from a paypal site without paying a penny!
Download From Ftpz, Using Ftp Search Sitez
Download Mp3's Without Using Filesharing
Download Music And Video With ,edia Player9, quick and easy!

Download Timeframes
Dual Boot After The Fact
Dvd Copying-ripping Definitions
DVD Regions Information
Dvd-9 to Dvd+r Dl, Double Layer To Double Layer, 1-1 copies
Easily Disconnect-reconnect From Broadband
Easily Find Serial Numbers On Google, easy to do and works like a charm
Ebay Hack*****tip
General Keyboard Shortcuts
Get In Windows 2000 As Administrator
Get the Most Out of Your DVD Recorder
Get The Music You Want To Hear
Get unlimited bandwidth from your host for free
Getting A 1gb China Account
Getting Counter-strike Source To Work
getting movies, mp3,games using google
Getting older programs to run on Windows XP
Getting started with Linux for nOObs!
Go to Windows updates anonymously
Google ***** Search
Google secrets
Google Tips & Tricks, (utilizing search engine)
Graffiti On Walls 4 Adobe Photoshop Cs 8.0
Guide For Getting Free Stuff
Guide to IIS Exploitation
Guide to Slipstreaming Service Pack 2
Hard drive Gone Bad
Hardware Firewall
How To Add An Option To Print, the Contents of a Folder!
How To Add Your Own Windows Tips
How to Back Up the Registry
How To Backup Ps2 Games
HOW TO BLOCK PEOPLE ON WINMX WHO SHARE NOTHING
How To Block Websties Without Software, block websites
How To Boot Xp Faster (updated)
How to build a black box
how to burn quicker in windows xp
How to Bypass BIOS Passwords
How To Bypass Web Filters, tutorial
HOW TO CAPTURE STREAMING MEDIA
How To Change A Cmos Battery
How to change the serial number used in Windows XP, Valid for XP Corporate
How To Change Thumbnail Size And Quality
How to clear Bios info 2
How to clear Bios info
How To Convert File System, fat - fat32 to ntfs
How To Copy A Dvd Which Will Play On A X Box
How to copy songs from your iPod to your PC
How To Customise Your start Button
How To Delete Those Persistent Nasty Files
How To Directly Go To Inbox, Write Msg, w , no need for
How to find MP3's real quickly
How To Find Serial Numbers On Google
How to fix corrupted files in XP
How to fix Windows Installer problem
How To Get A Free I-pod Or Flat Screen Tv, check it out
HOW TO GET ANY WINDOWS PASSWORD
How to Get someones ISP password, Get free internet
How To Get Top Ranking, Search Engines
How To Hack Windows Xp Admin Passwords
How to hack-change your Windows XP Boot Screen
how To Hide Yourself From Network Users, and give access to only specific users!
How To Make An Animted Logo
How To Make Free Phone Calls
How to make key generators
How To Make Perfect Copies Of Maxis The Sims Discs, CloneCD Style!
How To Make XP Go Faster
How To make your own Radio Station 2
How To Make Your Own Radio Station
How to Remove DRM Protection for Video Files
How To Remove Ms Java Vm And Install Sun Java
How To Remove Signin Details Of Msn Passport
How To Remove The Default Admin$ Shares
How to remove the Links folder in IE Favorites
How to Remove WinXP Splash and See Operations
How To Rename Extensions With Ease, with a Renamer.bat file!
How to Rename File Extensions
How To Rename Multiple Files In Winxp
How To Restrict Login Hours Allowed
How to safeguard your files when computer crashes
How to save Windows xp updates
how to search google forlinks
How To See Hidden Files, Using Dos
How To Set search For All Files In Winxp
How to set up a http server running from you computer
How To Set Up A Proxy In get, As Requested
How to set up a server with Apache , PHP , MySQL , Perl , phpMyAdmin
How To Set Up Direct Connect
HOW TO SET UP FTP SERVER
How To Set Up Proxies In Your Browser
How To Set Zone Alarm Settings!, Fix for ZA ports
How To Setup Your Own Dns (Domain Name Server)
How To Speed Up A Slow Computer
How To Speed Up Http Requests On Internet Explorer, as above
How To Stop Spam
How to swear in all languages
How To Unload Cached Dll Files To Free Memory
How to Use and How to Chain Multiple Proxies!
How To Use File Compression In Windows Xp
How To Use Google To Download Mp3's, and applications.....
How To Use Newsgroups
How To Use You Gmail With Msn Messenger
How-to Get Videos And Dvds Onto Your Sony PlayStation Portable (PSP) for free
HOWTO Change Windows XP Home to Windows XP Pro
Important Faqs For Sp2
Improve Doom 3's Performances!!, simple but efficient trick for every1
Improve your dialup modem preformance
Increase XP Folder Settings
Insert Your Serial For Office 2k, auto install office
Install A New Hard-disk
Install Xp From Dos
Installing Apache on Windows
Installing Gentoo Linux, Amazing step by step tutorial
Installing IIS On Windows Xp Pro
Installing Slackware Linux
Instructions For Removal Of Advertising In Msn Messenger
Ip Address Structure, Expilinatin OF IP Address {A short way}
Irc How To Downlaod From, How to downlaod from IRC
Irc Servers On nix, For people who want to start own IRC net
Keep Files Private
Keep Folders Hidden
Keyboard Shortcuts Result in Excel 2000 - Movement
Keyboard Shortcuts, Microsoft Word
Keyboard Shortcuts, must read
Kill Microsoft Instant Messenger
Lamination Tips, Its a Fast TUT......
Leet Way To Get Your Ip In Windows Xp
Linking Your Xbox To Your Computer
Linux Howto's
List Of Sites Not To Go To
Little help for anonymous mailer
Lots Of Windows Xp Tips, Take A Look!
Lyrics With Google
Make A Autorun File For Ur Cd
Make A Batch File To Clean UR PC!!, All In One!!
Make A Roughly 16 Hour Video Dvd
Make Acrobat Reader 6 load faster.txt 0.42 kB
Make Dvd Iso From Suse 9.2 5 Cds Iso, Linux mode and Windows mode ISO creation
Make Mp3 Files Smaller Without Losing Quality
Make Your Own Ringtones For Phone, also logos, wallpaper, etc
Make Your Pc Faster, Guaranteed
MakeXPgoFaster
making a .cue file, in notepad
Making A .txt Executable Server
Making Bootable Floppy Disk to Boot into Windows
Making Cd Version Of Doom3 Into Dvd Version
Making Web Page Fonts Consistent and Uniform
Manage Saved Ie Passwords
Mastering The Windows XP Registry
Maximize Dial-up Modem Settings
Microsoft's Really Hidden Files, Reveled Hidden files
mIRC Not Just Another Chat Client, Download Anything You Want Almost
mIRCcommands
Misc Linux Tips & Tricks
Missing Administrator Account
Secret Codes
Modify .exe Files And ***** A Program
More Hacking/A beginners guide to Hacking UNIX
More Hacking/A *****ing Tutorial/C101-90.000
More Hacking/A *****ing Tutorial/C101-90.001
More Hacking/A *****ing Tutorial/C101-90.002
More Hacking/A *****ing Tutorial/C101-90.003
More Hacking/A *****ing Tutorial/C101-90.004
More Hacking/A *****ing Tutorial/ED!SON.NFO
More Hacking/A Guide to Internet Security- Becoming an Ueber*****er
More Hacking/A Guide to the Easiest Hacking there is
More Hacking/A List Of Some OF The Most Useful UNIX Hacking Commands
More Hacking/A Small Guide to Hacking
More Hacking/A UNIX Hacking Tutorial
More Hacking/Almost Everything You Ever Wanted To Know About Security
More Hacking/An Indepth Guide in Hacking UNIX and the concept of Basic
More Hacking/An Introduction to Denial of Service
More Hacking/An Introduction to the Computer Underground
More Hacking/Basic Networking
More Hacking/BBS Crashing Techniques
More Hacking/BRUTE- A brute approach to hacking Unix passwords
More Hacking/Closing the Net
More Hacking/Compression and *****s for Dummies
More Hacking/Computer Bulliten Boards and the Law
More Hacking/Computer Chrime - Current Practices, Problems and Proposed So
More Hacking/Computer eMail and Privacy
More Hacking/Computer Hackers News Articles
More Hacking/Computer Rights vs First and Forth Amentment Right
More Hacking/Computer Security
More Hacking/Computer Security_2
More Hacking/Computer Viruii
More Hacking/Computerized Governmental Database Systems Containing Persona
More Hacking/COPS and Robbers-Unix System Security
More Hacking/Copyright Guides for Photographers
More Hacking/Crash Course in X Windows Security
More Hacking/Crime and Puzzlement
More Hacking/Cultural Formations in Text-Based Virtual Realties
More Hacking/Cyberspace and the Legal Matrix- Laws or Confusion
More Hacking/Dark Angel's Phunky Virus Writing Guide
More Hacking/Defamation Liability of Computerized Bulliten Board Operators
More Hacking/Dept of Treasury Letter
More Hacking/Electronic Bulliten Boards and 'Public Goods' Explainations
More Hacking/Electropolos - Communication and Comunity on IRC
More Hacking/Ethload User's Guide
More Hacking/Formulating A Company Policy on Access to and Use and Disclos
More Hacking/Free Speech in Cyberspace
More Hacking/Gender Issues in Communications
More Hacking/Government Computer Security Techniques
More Hacking/HACKDICT
More Hacking/Hacker Test
More Hacking/Hackers A-Z
More Hacking/Hackers Who Break into Computer Systems
More Hacking/Hacking Bank Of America's Home Banking System
More Hacking/Hacking Compuserve Infomation Service
More Hacking/Hacking Faq
More Hacking/Hacking GTE Telemail
More Hacking/Hacking IRC - The Definitive Guide
More Hacking/Hacking PC-Pursuit Codes
More Hacking/Hacking Techniques
More Hacking/Hacking TRW
More Hacking/Hacking TYMNET
More Hacking/Hacking Unix System V's
More Hacking/Hacking Wal-Mart Computers
More Hacking/Hacking Webpages
More Hacking/How the Traditional Media Clasifications Fail to Protect
More Hacking/How to crash AOL
More Hacking/How to dial out of a UNIX System
More Hacking/How to find Security Holes
More Hacking/How to get a Shell in 24 hours
More Hacking/How to Hack UNIX System V
More Hacking/How to login to a C.B.I. System
More Hacking/How to send ICQ Bombs
More Hacking/Information of Hacking AngelFire Websites
More Hacking/Introduction to Denail of Service
More Hacking/IP addressing, and gaining IP's
More Hacking/IP Addressing
More Hacking/ISSN Numbers- An Introduction
More Hacking/Junk Mail- How Did They All Get My Address
More Hacking/LENROS~1
More Hacking/LENROS~2
More Hacking/MEMETICS
More Hacking/MINDVOX
More Hacking/MORRIS~1
More Hacking/NEIDOR~1
More Hacking/NFS Tracing
More Hacking/Nightline- FBI,Privacy,and Proposed Wire-Tapping Legislation
More Hacking/NY_2'S Guide to Obtaining An IP Address
More Hacking/Organizational Analysis in Computer Science
More Hacking/PGP Startup Guide
More Hacking/Presumed Guilty
More Hacking/Raising Hell with Unix
More Hacking/Remarks of the President and Vice President to Silicon Valley
More Hacking/RIGGSB~1
More Hacking/RIGGS_~1
More Hacking/RIGHTS~1
More Hacking/RIVERA
More Hacking/Security holes
More Hacking/Seisure Warrent Documents for Ripco BBS
More Hacking/Site Security Handbook
More Hacking/SJ-DEC~1
More Hacking/SJ-RESP
More Hacking/SMTP-Simple Mail Transfer Protocol
More Hacking/Summary of FBI Computer Systems
More Hacking/SUNDEVIL
More Hacking/SUPREM~1
More Hacking/TCP packet fragment attacks against firewalls and filters
More Hacking/Telenet-The Secret Exposed
More Hacking/The Basics of Hacking- Introduction
More Hacking/The Baudy World of the Byte Bandit-A Postmodernist Interpretation
More Hacking/The Constitution in Cyberspace
More Hacking/The *****ing Manual
More Hacking/The Electronic Communication Privacy Act of 1986 - A Laymans
More Hacking/The Greatest Hacker of all time
More Hacking/The Hacker's League
More Hacking/The Inner Circle Book's Hacking Techniques
More Hacking/The Lamahs-Guide to Pirating Software on the Internet
More Hacking/The M.M.C. Guide to Hacking, Phreaking, Carding
More Hacking/The National Information Infrastructure-Agenda for Action
More Hacking/The Newbies Handbook- ' How to beging in the World of Hacking
More Hacking/The Newbies-User's Guide to Hacking
More Hacking/The Pre-History of Cyberspace
More Hacking/The Price of Copyright Violation
More Hacking/The REAL way to hack RemoteAccess
More Hacking/The Secret Service, UUCP,and The Legion of Doom
More Hacking/the UNIX operating system (Berkley 4.2)
More Hacking/Theft of Computer Software-A National Security Threat
More Hacking/Thoughts on the National Research and Education Network
More Hacking/Tips on Starting Your Own BBS.1
More Hacking/undocumented DOS commands
More Hacking/UNIX Computer Security Checklist
More Hacking/UNIX Use and Security - By the Prophet
More Hacking/UNIX Use and Security From The Ground Up
More Hacking/UNIX- A Hacking Tutorial.SIR
More Hacking/Viruii FAQ
More Hacking/Virus-Trojan FAQ
More Hacking/What Files are Legal for Distribution on a BBS
More Hacking/What To Look For In A Code Hacking Program
More Hacking/What To Look For In A Code Hacking Program
More Hacking/What You Should Know About Computer Viruses
More Xp Tips and tricks make your computer more faster
Moving and Removing the Start Button
Msn Messenger & Gmail
My Bookmarks, long list of tutorials
Myth about WPA ( How it is done ), Windows Product Activation Technique
Your Own Home Server - Introduction
...and much more!!!
1000 Bestever Great Hacking tutorials 2009
DOWNLOAD
http://www.mediafire.com/download.php?w19zm0iz0ug

OR
http://hotfile.com/dl/24304572/39fcf1b/1000_Hacking_Tutorials_2008_RH.rar.html
OR
http://depositfiles.com/files/76totu745

Game Booster 1.31

Booster is designed to help optimize your PC for smoother, more responsive game play in the latest PC games with the touch of a button.

Game Booster helps achieve the performance edge previously only available to highly technical enthusiasts. It works by temporarily shutting down background processes, cleaning RAM, and intensifying processor performance. That means you can keep all the features of Microsoft® Windows Vista® and XP® ready for when you need them, but turn them off when you are ready to get down to serious business – gaming.
Game Booster screenshot 1



Game Booster makes it simpler to enjoy the latest games and take your experience to a new level. All systems go!

Features:

* 1 Click - Game Booster is extremely easy to use.
* Speed up Game Play - Gives more CPU and RAM to your games.
* Increase Gaming Stability - Prevents and avoids possible cocnflicts and incompatibility.
* Safe, Security, and Free - Game Booster does not overclock your hardware, does not change your Windows Registry and system settings. Game Booster is 100% freeware, without any virus, adware, and spyware.
 
 



Send Anonymous Email to anyone for free

Learn how to send an email messages anonymously and secretly so that recipient will never know who sent that message and from where.

There are many reasons to send an email anonymously, for example send an email to a friend when you have no access to your regular email account, or make fun of your enemy, etc. There are various websites from where you can send anonymous email. So am posting here some of the best sites which helps you to send anonymous email.




TrafficRevenue
1. http://www.sendanonymousemail.net/ – Is a free service which allow you to send unlimitted anonymous email. It’s one of the most popular anonymous email service on the net.
2. http://deadfake.com/Send.aspx - is a site that lets you send free fake emails to anyone you like. There’s no signup, no registration, no fuss. You can even send fake emails with rich text; fonts, colours, etc.
3. http://send-email.org/ – Useful site to quickly send an anonymous message.
4. http://anonymouse.org/anonemail.html – With AnonEmail it is possible to send e-mails without revealing your e-mail address or any information about your identity.
5. http://www.monkeys.com/formmailer/ – This website allows you to specify a sender’s address as well, allowing you to seemingly send it from a normal mail account.
These are some of the best websites which allows you to send free anonymous email messages. So if you have no access to your email account, or if you want to confess your love to somebody, or want to play an email joke with your friend… this websites surely will come in handy.

Kung Fu Hustle 2004 BRRip [HINDI DUBBED] 500 MB FREE MEDIAFIRE Download Links

Kung Fu Hustle 2004 BRRip [HINDI DUBBED] 500 MB FREE MEDIAFIRE Download LinksRelease Info: BRRip [500 MB]
User Rating: 7.8/10
Genre: Action | Comedy | Crime
Release Date: 22 April 2005
Starring: Stephen Chow, Wah Yuen and Qiu Yuen ETC.
Video: 24 FPS | Aspect Ratio: 2.35:1 | 1280×528
Audio: 2 Channel | 44.1 Khz | AAC
Language: Dubbed in Hindi | Subtitles: No
Runtime: 1 H 35 Minutes
Plot: In Shanghai, China in the 1940s, a wannabe gangster aspires to join the notorious “Axe Gang” while residents of a housing complex exhibit extraordinary powers in defending their turf.

IMDB Link: http://www.imdb.com/title/tt0373074/
Plot in Detail: Set in Canton, China in the 1940s, the story revolves in a town ruled by the Axe Gang, Sing who desperately wants to become a member. He stumbles into a slum ruled by eccentric landlords who turns out to be the greatest kung-fu masters in disguise. Sing’s actions eventually cause the Axe Gang and the slumlords to engage in an explosive kung-fu battle. Only one side will win and only one hero will emerge as the greatest kung-fu master of all.
Kung Fu Hustle 2004 BRRip [HINDI DUBBED] 500 MB movie screen shots free mediafire download links
Kung Fu Hustle 2004 BRRip [HINDI DUBBED] 500 MB movie screen shots free mediafire download links
Kung Fu Hustle 2004 BRRip [HINDI DUBBED] 500 MB movie screen shots free mediafire download links

|The Download Link is present below.Please open it in a new window to start downloading.|

downloadsnhacks mediafire download button









Password: dnh | Join using HJSPLIT http://www.mediafire.com/?92ass5fl5tl9b

Yet Another Table of Contents YATOC.


Here is Yet Another Table of Contents - The YATOC Gadget. It is based on the Google AJAX API. You can use it to Make a Sitemap Page for your blog. See picture below :




You can see the demo at top of posts column in My Gadget Showcase blog. It shows all the post titles in the blog linked to respective posts. It is based on official Google AJAX code. Here are the steps to install it..................



INSTALLATION



To install this gadget follow these steps :

1. Login at Blogger.com.

2. Click Layouts link under blog title on Dashboard.

3. Click 'Add Gadget' link on Layout---->Page Elements subtab.

4. In popup window scroll down and click Html/Javascript gadget.

5. Copy all the code below :


<!--
  Copyright (c) 2008 Google Inc.

  You are free to copy and use this sample.
  License can be found here: http://code.google.com/apis/ajaxsearch/faq/#license
-->
<script src="http://www.google.com/jsapi" type="text/javascript"></script>
    <script type="text/javascript">
      google.load("gdata", "1.x", { packages : ["blogger"] });
    </script>
    <script type="text/javascript">
      function _run() {
        var content = document.getElementById('content');
        var bloggerService =
            new google.gdata.blogger.BloggerService('com.appspot.interactivesampler');
        var feedUri = 'http://MYBLOG.blogspot.com/atom.xml?redirect=false&start-index=1&max-results=999';
        var handleBlogPostFeed = function(postsFeedRoot) {
          var posts = postsFeedRoot.feed.getEntries();
          var html = '';
          html += '<dl>'
               + '<dt><strong>Blog:</strong> '
               + '<a href="'
               + postsFeedRoot.feed.getLink('alternate').getHref()
               + '">'
               + postsFeedRoot.feed.getTitle().getText()
               + '</a></dt>';
          html += '<dd><ul>';
          for (var i = 0, post; post = posts[i]; i++) {
            var postTitle = post.getTitle().getText();
            var postURL = post.getHtmlLink().getHref();
            html += '<li><a href="' + postURL + '" target="_blank">'
                      + postTitle
                      + '</a></li>';
          }
          html += '</ul></dd>';
          content.innerHTML = html;
        };
        var handleError = function(error) {
          content.innerHTML = '<pre>' + error + '</pre>';
        };
       
        bloggerService.getBlogPostFeed(feedUri, handleBlogPostFeed, handleError);
      }
      google.setOnLoadCallback(_run);
    </script>
<div id="content" style="width:100%;">Loading...</div>
Get This Gadget at <a href="http://www.blogdoctor.me/2009/01/yet-another-table-of-contents-yatoc.html">Yet Another Table of Contents-YATOC.</a>


6. Paste in contents window on HTML gadget popup window.

7. Change 'MYBLOG' in the code to actual subdomain of your blogspot.

8. Save Gadget.

9. View Blog. Wait for page to load completely for gadget to load.

10. Enjoy your sitemap
!

The Inside Story of How Facebook Responded to Tunisian Hacks


Tunisian_crowd.png
It was on Christmas Day that Facebook's Chief Security Officer Joe Sullivan first noticed strange things going on in Tunisia. Reports started to trickle in that political-protest pages were being hacked. "We were getting anecdotal reports saying, 'It looks like someone logged into my account and deleted it,'" Sullivan said.
For Tunisians, it was another run-in with Ammar, the nickname they've given to the authorities that censor the country's Internet. They'd come to expect it.
In the days after the holiday, Sullivan's security team started to take a closer look at the data, but it wasn't entirely clear what was happening. In the US, they could look to see if different IP addresses, which identify particular nodes on the network, were accessing the same account. But in Tunisia, the addresses are commonly reassigned. The evidence that accounts were being hacked remained anecdotal. Facebook's security team couldn't prove something was wrong in the data.  It wasn't until after the new year that the shocking truth emerged:
Ammar was in the process of stealing an entire country's worth of passwords.
* * *
Here's what's at stake. December of 2010 saw the most substantial civil unrest in Tunisia in the reign of Zine El Abidine Ben Ali, which began with a bloodless coup in November 1987. Beginning with street protests in the country's poor interior region of Sidi Bouzid, the calls for change were soon echoed by more powerful civil society organizations, notably the country's only labor union, the UGTT. But despite the turmoil, it wasn't clear what exactly might happen.
"It is too early to know if these protests signal the beginning of the end for Ben Ali," wrote Christopher Alexander in Foreign Policy on January 3. "However, Tunisia's current political scene looks a bit like it did in 1975 and 1976, the beginning of the long slide for Ben Ali's predecessor, Habib Bourguiba."
That is to say, even expert analysts of the country couldn't tell if Ben Ali would remain in power for a few more weeks or a decade. It did not feel inevitable that Ben Ali would be deposed. People had protested in the streets before. Revolution had been in the air. It wasn't clear that this time would be different.
There has been a lot of debate about whether Twitter helped unleash the massive changes that led Ben Ali to leave office on January 14, but Facebook appears to have played a more important role in spreading dissent.
"I think Facebook played a bigger role in this case," said Jillian York of the Berkman Center for the Internet and Society, who has been tracking the Tunisian situation closely. "There are a lot more Facebook users than Twitter users. Facebook allows for strong ties in a way that Twitter doesn't. You're not just conversing."
One early sign that Tunisians felt Facebook could be useful: Back in July, bloggers Photoshopped a picture of Mark Zuckerberg to show him holding up a sign that read, "Sayeb Sala7, ya 3ammar," the slogan for a freedom of expression campaign late in 2010. Later, Zuckerberg popped up on a sign outside the Saudi Arabian embassy carried by Tunisian protesters demanding the arrest of Ben Ali.
Zuckerberg_sign.jpg
York said that Tunisian bloggers and activists had told her that the ability to upload video to Facebook drove its usage because many other video-sharing sites had been blocked by the government.
The videos -- shot shakily with cameraphones -- created a link between what was happening on the streets in the poor areas of the country and the broader Tunisian population. Many are graphic. In one video -- since taken down, apparently -- a young man is lying on a gurney with his skull cracked open. Brain oozes out. Cries are heard all around. The video focuses in on the man's face and as the camera pulls back, we see that there are two other people with cameraphones recording the injury. Video after video of the revolutionary events captures other people videoing the same event. Those videos, and the actions they recorded, became the raw material for a much greater online apparatus that could amplify each injury, death, and protest.
But it wasn't just videos that people were sharing. All kinds of information passed between Tunisians. For activists as well as everyday people, Facebook became an indispensable resource for tracking the minute-by-minute development of the situation. By January 8, Facebook says that it had several hundred thousand more users than it had ever had before in Tunisia, a country with a few more people than Michigan. Scaled up to the size to the U.S., the burst of activity was like adding 10 million users in a week. And the average time spent on the site more than doubled what it had been before.
Rim Abida, a Tunisian-born, Harvard-educated development consultant now living in Rio de Janeiro, said that over the course of the events, her "relationship to Facebook changed entirely."
"It basically went from being a waste of time or procrastination tool, to my go-to source on up-to-date information," Abida wrote in a Facebook message to me. "My mom is back in Tunisia on her own, and my Tunisian network on Facebook was posting the most up-to-date info on what was happening on the ground. It was stuff the major media channels weren't reporting, such as numbers to call to reach the military and what was happening when in what specific neighborhood."
In between the scenes of local unrest and people like Abida, there was a whole stratum of bloggers, writers, and social media sharers who watched and shared important videos.
While clashes with security forces took place in the streets, Rim, who asked we not use her last name, was in her bed in her apartment in Tunis. Like the blogger cliché, Rim sat in her pajamas sharing videos. In her hands, small protests that reached 50 people could suddenly reach another 50, who would share it with another 50. The idea that it might be time for the regime to change spread from city to city faster than street protests and even middle class places got involved.
Rim doesn't think the Tunisian revolution was a "Facebook revolution," but it was sufficiently important that when rumors started to fly on the 13th about what kind of retaliation the government was prepared to take, it took this form:
"There were rumors that Facebook or electricity was going to be shut down," Rim IM'd me from Tunis. "Or both."
* * *
Facebook and the Tunisian Revolt.jpg
After more than ten days of intensive investigation and study, Facebook's security team realized something very, very bad was going on. The country's Internet service providers were running a malicious piece of code that was recording users' login information when they went to sites like Facebook.
By January 5, it was clear that an entire country's worth of passwords were in the process of being stolen right in the midst of the greatest political upheaval in two decades. Sullivan and his team decided they needed a country-level solution -- and fast.
Though Sullivan said Facebook has encountered a wide variety of security problems and been involved in various political situations, they'd never seen anything like what was happening in Tunisia.
"We've had to deal with ISPs in the past who have tried to filter or block our site," Sullivan said. "In this case, we were confronted by ISPs that were doing something unprecedented in that they were being very active in their attempts to intercept user information."
If you need a parable for the potential and pitfalls of a social-media enabled revolution, this is it: the very tool that people are using for their activism becomes the very means by which their identities could be compromised. When the details are filled in on the abstractions of Clay Shirky and Evgeny Morozov's work on the promise (former) and danger (latter) of Internet activism, the ground truth seems to be that both had their visions play out simultaneously.
At Facebook, Sullivan's team decided to take an apolitical approach to the problem. This was simply a hack that required a technical response. "At its core, from our standpoint, it's a security issue around passwords and making sure that we protect the integrity of passwords and accounts," he said. "It was very much a black and white security issue and less of a political issue."
The software was basically a country-level keystroke logger, with the passwords presumably being fed from the ISPs to the Ben Ali regime. As a user, you just logged into some part of the cloud, Facebook or your email, say, and it snatched up that information. If you stayed persistently logged in, you were safe. It was those who logged out and came back that were open to the attack.
Sullivan's team rapidly coded a two-step response to the problem. First, all Tunisian requests for Facebook were routed to an https server. The Https protocol encrypts the information you send across it, so it's not susceptible to the keylogging strategy employed by the Tunisian ISPs.
The second technical solution they implemented was a "roadblock" for anyone who had logged out and then back in during the time when the malicious code was running. Like Facebook's version of a "mother's maiden name" question to get access to your old password, it asks you to identify your friends in photos to complete an account login.
They rolled out the new solutions to 100% of Tunisia by Monday morning, five days after they'd realized what was happening. It wasn't a totally perfect solution. Most specifically, ISPs can force a downgrade of https to http, but Sullivan said that Facebook had not seen that happen.
Though Sullivan is the unflappable type, the Tunisian situation seemed to force him into a bit of reflection. "When you step back and think about how Internet traffic is routed around the world, an astonishing amount is susceptible to government access," he noted.
And if governments around the world can, at least hypothetically, compromise users, it makes you wonder, as the Berkman Center's Jillian York has, why Facebook hasn't implemented special tools or processes for activists. The biggest issue is that political dissidents often do not want to use their real names in places where activism can get you killed. Facebook has adamantly opposed activists attempts to use pseudonyms.
"We get requests all the time in a few different contexts where people would like to impersonate someone else. Police wanting to go undercover or human rights activists, say," Sullivan said. "And we, just based on our core mission and core product, don't want to allow that. That's just not what Facebook is. Facebook is a place where people connect with real people in their lives using their real identities."
Does Facebook have to go the extra mile to support activists? Sullivan said that preliminary work has been done to create a special complaint reporting process for NGOs and other activists, a move that would address one long-time complaint.
More generally, though, Facebook certainly don't seem to be under any obligations to provide special treatment. But if Facebook really is becoming the public sphere -- and wants to remain central to people's real sociopolitically embedded lives -- maybe they're going to have to think beyond the situational technical fix. Facebook needs to own its position as a part of The Way the World Works and provide protections for political speech and actors.
Because the protests and overthrow of Ben Ali were just the beginning of this story. Hopes are high, but as we've seen so many times in the global south, the exit of one corrupt dictator usually means the entrance of another. To avoid that fate, politically active Tunisians will be using all of the tools at their disposal, including and maybe especially, Facebook. In fact, Rim said, it's already being used to debate how to create a new government and a better Tunisia.
Illustrations by Alex Hoyt.

Red Water 2003 DVDRip Dubbed In Hindi 700 MB FREE MEDIAFIRE Download Links


Red Water 2003 DVDRip Dubbed In Hindi 700 MB FREE MEDIAFIRE Download LinksRelease Info: DVDRip [700 MB]
User Rating: 3.8/10
Genre: Action | Horror | Thriller
Release Date: 2003
Starring: Lou Diamond Phillips, Kristy Swanson and Coolio ETC.
Video: 24 FPS | Aspect Ratio: 4:3 | 704×400
Audio: 2 Channel | 44.1 Khz | AAC
Language: English | Subtitles: Yes, English MUXED
Runtime: 1 H 34 Minutes
Plot: In the quiet waters of the Mississippi, body parts are being discovered. No one knows what is behind it all, until a huge man eating bull shark turns up. This bull shark is different, as it can breath in fresh water, making a deadly encounter between anyone who comes before it….
IMDB Link: http://www.imdb.com/title/tt0365677/
Plot in Detail: In the quiet waters of the Mississippi, body parts are being discovered. No one knows what is behind it all, until a huge man eating bull shark turns up. This bull shark is different, as it can breath in fresh water, making a deadly encounter between anyone who comes before it. John Sanders must now try and reachthe surface, with his ex-wife and whilst being held hostage.
Red Water 2003 DVDRip Dubbed In Hindi 700 MB movie screen shots free mediafire download links

|The Download Link is present below.Please open it in a new window to start downloading.|

downloadsnhacks mediafire download button

Password: dnh | Join using HJSPLIT


Mediafire

The Chronicles of Narnia 3 2010 TSRip Hindi Dubbed (Dual Audio) 550 MB FREE MEDIAFIRE Download Links


The Chronicles of Narnia 3 2010 TSRip Hindi Dubbed (Dual Audio) 550 MB FREE MEDIAFIRE Download LinksRelease Info: TSRip [550 MB]
User Rating: 6.7/10
Genre: Adventure | Family | Fantasy
Release Date: 3 December 2010
Starring: Ben Barnes, Skandar Keynes and Georgie Henley ETC.
Video: 24 FPS | Aspect Ratio: 16:9 | 720×400
Audio: 2 Channel | 44.1 Khz | AAC
Language: English & Hindi | Runtime: 1 H 45 Minutes
Plot: Lucy and Edmund Pevensie return to Narnia with their cousin Eustace where they meet up with Prince Caspian for a trip across the sea aboard the royal ship The Dawn Treader. Along the way they encounter dragons, dwarves, merfolk, and a band of lost warriors before reaching the edge of the world.
IMDB Link: http://www.imdb.com/title/tt0980970/
Plot in Detail: Lucy and Edmund Pevensie return to Narnia with their cousin Eustace where they meet up with Prince Caspian for a trip across the sea aboard the royal ship The Dawn Treader. Along the way they encounterdragons, dwarves, merfolk, and a band of lost warriors before reaching the edge of the world.
The Chronicles of Narnia 3 2010 TSRip Hindi Dubbed (Dual Audio) 550 MB movie screen shots free mediafire download links
The Chronicles of Narnia 3 2010 TSRip Hindi Dubbed (Dual Audio) 550 MB movie screen shots free mediafire download links
The Chronicles of Narnia 3 2010 TSRip Hindi Dubbed (Dual Audio) 550 MB movie screen shots free mediafire download links

|The Download Link is present below.Please open it in a new window to start downloading.|

downloadsnhacks mediafire download button

Password: dnh | Join using HJSPLIT

Disable The Send Error Report To Microsoft


To disable the stupid feature in WinXP which tries to send a report to microsoft every time a program crashes you will have to do this:
-Open Control Panel
-Click on Preformance and Maintenance.
-Click on System.
-Then click on the Advanced tab
-Click on the error reporting button on the bottom of the windows.
-Select Disable error reporting.
-Click OK
-Click OK

COOL ORKUT TRICKS


It came and it conquered! Orkut has become a worldwide rage, and is nothing short of the same in India too. Guys I have compiled a list of all the cool orkut tricks which will spice up your orkutting and make you stand out in the crowd.
-These javascripts are to be pasted in the browser only. No need to download any software or use any firefox extension. All Javascripts should be pasted in single line.
Flooding Scrapbook

Steps to flood others scrapbook:
==> Go to the profile of your friend.
==> Copy Paste this in your address bar

javascript:var i=1;function orkuttricks(){i=i+1;document.forms
[0].elements[2].value= “I have flooded our SCRAPBOOK by this number
of times”+”[green]”+i+”[/green]”;
document.getElementsByTagName(’input’).item(3).click();};
void(setInterval(orkuttricks,500));

Another Script

javascript:i=9874654;sar=’Flooding by Tricks4fun ..!![silver]’; a=document.forms[0];a.action+=’&Action.submit=’; setInterval(”i++; a.scrapText.value=sar+i; a.submit()”,500);void(0)

==> Press Enter
Steps to flood your own scrapbook

==> Open your own scrapboook
==> Copy paste this code

javascript:var i=” “;function tricks4fun(){i=i+” “;
document.forms[0].elements[2].value=” “+i;
document.getElementsByTagName(’input’).item(3).click();};void
(setInterval(tricks4fun,500));

Increasing Number of fans

==> Add yourself in any fraud account you have.
==> Log into the fraud account.
==> Go to http://www.orkut.com/Friends.aspx
==> Put cursor on the “fan” icon. You will see at the status bar of your
browser (at the bottom of your browser) something like
” FRUS0016756489/US209709881 “. Write down that thing in a copy.
==> Now write this code in the address bar:

javascript:i=0;for(i=0;i< =100;i++){sendRequest
(”/SetKarma.aspx?cat=”+0+”&
val=”+”3?+”&gid=”+”FRUS0009505081/US0014188150?);};void(0);


==> Change “FRUS0009505081/US0014188150? with the one you have
written in the copy.
==> Press Enter.

Testimonial Flooding

>==> Open the testimonial writting page of your any friend.
==> Paste this in the address bar:

javascript:function tricks4fun(){document.getElementsByTagName
(’input’).item(2).click();};void(setInterval(tricks4fun,404));

Colorful Scraps

==> Write your message/scrap/ in community or scrapbook
==> Copy paste the code below in your browser and then press enter.
==> You will see change in the message you wrote,
Press Submit and enjoy.

javascript:cor=new Array(’aqua’,’blue’,’fuchsia’,’gold’,’gray’,
‘green’,’lime’,’maroon’,’navy’,’olive’,’orange’,’pink’,’purple’,’red’,’
silver’,’teal’,’violet’,’yellow’ ); varz=0;
txt=document.getElementsByTagName(’textarea’)[0]; txt.value=txt.value.replace(/(.)/gi,”§$1?);
txt.value =txt.value.replace(/\§ /gi,” “); for(y=0;y
{txt.value=txt.value.replace(/\§/,’[’+cor[z]+’]’);z++;if
(z==cor.length){z=0}}void(0)


Animated Orkut Windows

==> Just copy paste in your browser and see what happens:

javascript:R=-1;DI=document.links;DIL=DI.length;function A(a,b,c)
{return Math.sin(R/350*6.28*b+a)*c+c}function B(a){DIS=DI.item(a).style;DIS.position=’absolute’;
DIS.left=A(5,100,500);DIS.top=A(5.6,60,150)}setInterval
(’R++;B(R%DIL)’,15);void(0)

Reverse the Post

Just use this keyword..
“& # 8 2 3 8? with no spaces and blanks in between.
Author

Ghazanfar Ali Naqvi

Hi`i'm Ghazanfar Ali Naqvi ,from Pakistan,i love to blogging, Desing Blogger template, Web Developing and Designing.i like to learn and share technical hacking/security tips with you,i love my friends.Spread the Love Black_Twitter_Bird

Follow Me on facebook!