Friday, 27 January 2012

Trick To Bypass PayPal Payments

    Hello Friends, As the name suggests,Today i am going to tell you all a trick by use of which you will be able to download paid software's , Eboks, Games for free.The Tricks is very simple and works on more than 800 websites..!!! So I suggest you to use this trick when you seriously need because i don't take any responsibility for any harm caused due to this trick because this trick is for educational purpose only and so that if you are a webmaster or owner of a site which is using a java script Paypal button than you can immediately take steps to prevent users from downloading premium content from your site for free.

The Trick:-

    1). Open Google and search for the below line without removing the "quotes"

    "this order button requires a javascript enabled browser"
    NOTE:IF U WANT TO DOWNLOAD CONTENT OF YOUR INTERST OR CHOICE YOU CAN ADD THAT THING AFTER THE STRING.
    For Example if you want to download ebooks than search for "this order button requires a javascript enabled browser"ebooks
    2). Now Choose any site from the search results and wait till the site loads fully.
    3).Now copy the below line and paste it in your browser's address bar. as shown in the image below,
    javascript:top.location=document.getElementsByName('return')[0].value; javascript:void(0);
    Now You will be redirected to the thankyou or Transaction complete page and now you will be able to download the free stuff provided by that website..!!
    Hope you liked my article do share your views in the comments below.

Wednesday, 25 January 2012

how to access facebook through google plus or Add the Facebook Stream to your Google+ Profile


Do you want to access Google plus and facebook under the same tab on same page.? ??
then surely this post will help you to add your facebook account to google plus and get all the Facebook stream to Google plus. all you have to do is install a plugin which will only gonna take less then 2minutes


How to access Facebook through Google plus:-


  • Visit  here and Download .GOOGLE+FACEBOOK browser extension and install it(only gonna take less then 2min)
  • Now login to your Google plus account   
  • You will see a Facebook button on top (see in image ) click on  button [button no. 1. in image]
  • and then click on  " f Connect with Facebook " (see in image [button no. 2.])


  • Now click on Allow

  • That's all now you can access facebook through google plus . to access facebook just click on Facebook button (see in image)


Monday, 23 January 2012

Use Kaspersky internet security 2012 Lifetime without license key:-







HOW IT WORKS JUST  FOLLOW THESE 7 STEPS:-
  • First of all disconnect your internet connection and Remove modem or Disconnect that Ethernet Cable. it is very necessary that to get lifetime Key of Kasper sky internet security 2012 .(copy this post and save it to notepad)
  • Delete the existing key (If You Have)
  •  Now Open Kaspersky 2012 product Then Click on (Either KIS or KAV) settings
  • Un-check the “Enable protection” Check box
  • Go Then “Options’ In the settings window itself , And uncheck Below Line

    • a) “Enable Self-Defense”
    • ”Disable External service control”

  •  Goto Start>Run>Type “regedit”>
Now enter then find

HKEY_LOCAL_MACHINE>SOFTWARE>KasperskyLab>environment.

From Right list >> double click on “ProductStatus”

Then , in the “Value Data” Field . replace “Released” with “Beta” and click OK

  • Now again Open Kaspersky 2012 product And Go settings Now Check Below these check boxes :-
    • i)”Enable protection” (In “Protection” sub menu)
    • ii)”Enable Self-Defense” (In “Options” sub menu)
    • iii)”Disable External service control” (In “Options” sub menu)
    • Click on “OK”

  • Close the error message saying that “Protection is not running” .

Couse ot Error massage that, you have not installed any key and the product is not registered also
  •  Restart your PC !

NOTE:- You must Restart your PC Other then it will not work properly

Now , after restart , Open Your Kaspersky product .

Then click On License” (Somewhat in the middle in the bottom)

Click on “Activate new license”

then click on “Activate Beta License”

then click on “Next”

From Now You will Not Blacklist you will get 30 Days Genuine Key .Just click on Activate beta license and click on .Next . That's it The kaspersky server will give u an new 30 days genuine key . So Enjoy!!!


Sunday, 22 January 2012

allaboutrajni.com ( all about rajni ) a funny website works only when you switch off your internet



Today while exploring Google i came across a very funny and innovative website named www.allaboutrajni.com (all about rajnik)

This website is a new launch. its all about Rajnikanth ,It has all the story , facts and jokes about Rajnikanth But the  most funny Part about this website is that it only works when you switch off your Internet connection/Modem .


Try it by visiting following link :-
http://www.desimartini.com/allaboutrajni.htm  
or Click here



its too funny try it..! !!
Note:- you must switch off your Modem to explore this website


And if you try to switch on your Internet/modem while browsing this website it shows a popup which says
" Aiyoo!
That was unexpected,
To keep browsing,
switch off your Internet. "


ROFL . :D :D :D



Saturday, 21 January 2012

Open Multiple File Formats With Single Software

    Is your Computer running too slow due to large number of applications which are installed.If you install a specific software for each file format you will end up with a lot of bloatware.It is a pain for a lot of users to install different softwares for different file formats after installing a fresh copy of their OS.You can save yourself from this trouble by installing a freeware application that is capable of opening multiple file formats (75+ formats) .
    It can give a breath of life to those systems which have low memory.Moreover it can be a lifesaver if you don’t have an idea about how to open a particular file extension, Just give it a try with Free Opener.

Supported File Formats:

    Code Files (.vb, .c, .cs, .java, .js, .php, .sql, .css, .aspx, .asp)
    Web Pages (.htm, .html)
    Photoshop Documents (.psd)
    Images (.bmp, .gif, .jpg, .jpeg, .png, .tif, .tiff)
    XML Files (.resx, .xml)
    PowerPoint Presentations (.ppt, .pptx, .pps)
    Media (.avi, .flv, .mid, .mkv, .mp3, .mp4, .mpeg, .mpg, .mov, .wav, .wmv, .3gp, .flac)
    Microsoft Word Documents (.doc, .docx)
    SRT Subtitles (.srt)
    RAW Images (.arw, .cf2, .cr2, .crw, .dng, .erf, .mef, .mrw, .nef, .orf, .pef, .raf, .raw, .sr2, .x3f)
    Icons (.ico)
    Open XML Paper (.xps)
    ML Paper (.xps)
    Torrent (.torrent)
    Flash Animation (.swf)
    Archives (.7z, .gz, .jar, .rar, .tar, .tgz, .zip)
    Rich Text Format (.rtf)
    Text Files (.bat, .cfg, .ini, .log, .reg, .txt)
    Apple Pages (.pages)
    Microsoft Excel Documents (.xls, .xlsm, .xlsx)
    Comma-Delimited (.csv)
    Outlook Messages (.msg)
    PDF Documents (.pdf)
    vCard Files (.vcf)
    EML Files (.eml)
    Click here To Download Free Opener (25 mb)

Wednesday, 18 January 2012

How do spammers harvest email addresses??

    There are many ways in which spammers can get your email address. The ones I know of are :
    1. From posts to UseNet with your email address.
    Spammers regularily scan UseNet for email address, using ready made programs designed to do so. Some programs just look at articles headers which contain email address (From:, Reply-To:, etc), while other programs check the articles' bodies, starting with programs that look at signatures, through programs that take everything that contain a '@' character and attempt to demunge munged email addresses.
    There have been reports of spammers demunging email addresses on occasions, ranging from demunging a single address for purposes of revenge spamming to automatic methods that try to unmunge email addresses that were munged in some common ways, e.g. remove such strings as 'nospam' from email addresses.
    As people who where spammed frequently report that spam frequency to their mailbox dropped sharply after a period in which they did not post to UseNet, as well as evidence to spammers' chase after 'fresh' and 'live' addresses, this technique seems to be the primary source of email addresses for spammers.
    2. From mailing lists.
    Spammers regularily attempt to get the lists of subscribers to mailing lists [some mail servers will give those upon request],knowing that the email addresses are unmunged and that only a few of the addresses are invalid.
    When mail servers are configured to refuse such requests, another trick might be used - spammers might send an email to the mailing list with the headers Return-Receipt-To: or X-Confirm-Reading-To: . Those headers would cause some mail transfer agents and reading programs to send email back to the saying that the email was delivered to / read at a given email address, divulging it to spammers.
    A different technique used by spammers is to request a mailing lists server to give him the list of all mailing lists it carries (an option implemented by some mailing list servers for the convenience of legitimate users), and then send the spam to the mailing list's address, leaving the server to do the hard work of forwarding a copy to each subscribed email address.
    [I know spammers use this trick from bad experience - some spammer used this trick on the list server of the company for which I work, easily covering most of the employees, including employees working well under a month and whose email addresses would be hard to findin other ways.]

    3. From web pages.
    Spammers have programs which spider through web pages, looking for email addresses, e.g. email addresses contained in mailto: HTML tags [those you can click on and get a mail window opened]
    Some spammers even target their mail based on web pages. I've discovered a web page of mine appeared in Yahoo as some spammer harvested email addresses from each new page appearing in Yahoo and sent me a spam regarding that web page.
    A widely used technique to fight this technique is the 'poison' CGI script. The script creates a page with several bogus email addresses and a link to itself. Spammers' software visiting the page would harvest the bogus email addresses and follow up the link, entering an infinite loop polluting their lists with bogus email addresses.
    4. From various web and paper forms.
    Some sites request various details via forms, e.g. guest books & registrations forms. Spammers can get email addresses from those either because the form becomes available on the world wide web, or because the site sells / gives the emails list to others.
    Some companies would sell / give email lists filled in on paper forms, e.g. organizers of conventions would make a list of participants' email addresses, and sell it when it's no longer needed.
    Some spammers would actually type E-mail addresses from printed material, e.g. professional directories & conference proceedings.
    Domain name registration forms are a favourite as well - addresses are most usually correct and updated, and people read the emails sent to them expecting important messages.
    5. Via an Ident daemon.
    Many unix computers run a daemon (a program which runs in the background, initiated by the system administrator), intended to allow other computers to identify people who connect to them.
    When a person surfs from such a computer connects to a web site or news server, the site or server can connect the person's computer back and ask that daemon's for the person's email address.
    Some chat clients on PCs behave similarily, so using IRC can cause an email address to be given out to spammers.
    6. From a web browser.
    Some sites use various tricks to extract a surfer's email address from the web browser, sometimes without the surfer noticing it. Those techniques include :
    a. Making the browser fetch one of the page's images through an anonymous FTP connection to the site.
    Some browsers would give the email address the user has configured into the browser as the password for the anonymous FTP account. A surfer not aware of this technique will not notice that the email address has leaked.
    b. Using JavaScript to make the browser send an email to a chosen email address with the email address configured into the browser.
    Some browsers would allow email to be sent when the mouse passes over some part of a page. Unless the browser is properly configured, no warning will be issued.
    c. Using the HTTP_FROM header that browsers send to the server.
    Some browsers pass a header with your email address to every web server you visit. To check if your browser simply gives your email address to everybody this way, visit http://www.cs.rochester.edu/u/ferguson/BrowserCheck.cgi
    It's worth noting here that when one reads E-mail with a browser (or any mail reader that understands HTML), the reader should be aware of active content (Java applets, Javascript, VB, etc) as well as web bugs.
    An E-mail containing HTML may contain a script that upon being read (or even the subject being highlighted) automatically sends E-mail to any E-mail addresses. A good example of this case is the Melissa virus. Such a script could send the spammer not only the reader's E-mail address but all the addresses on the reader's address book.
http://www.cert.org/advisories/CA-99-04-Melissa-Macro-Virus.html
    A web bugs FAQ by Richard M. Smith can be read at http://www.tiac.net/users/smiths/privacy/wbfaq.htm
    7. From IRC and chat rooms.
    Some IRC clients will give a user's email address to anyone who cares to ask it. Many spammers harvest email addresses from IRC, knowing that those are 'live' addresses and send spam to those email addresses.
    This method is used beside the annoying IRCbots that send messages interactively to IRC and chat rooms without attempting to recognize who is participating in the first place.
    This is another major source of email addresses for spammers, especially as this is one of the first public activities newbies join, making it easy for spammers to harvest 'fresh' addresses of people who might have very little experience dealing with spam.
    AOL chat rooms are the most popular of those - according to reports there's a utility that can get the screen names of participants in AOL chat rooms. The utility is reported to be specialized for AOL due to two main reasons - AOL makes the list of the actively participating users' screen names available and AOL users are considered prime targets by spammers due to the reputation of AOL as being the ISP of choice by newbies.
    8. From finger daemons.
    Some finger daemons are set to be very friendly - a finger query asking for raaz@host will produce list info including login names for all people named Raaz on that host. A query for @host will produce a list of all currently logged-on users.
    Spammers use this information to get extensive users list from hosts, and of active accounts - ones which are 'live' and will read their mail soon enough to be really attractive spam targets.
    9. AOL profiles.
    Spammers harvest AOL names from user profiles lists, as it allows them to 'target' their mailing lists. Also, AOL has a name being the choice ISP of newbies, who might not know how to recognize scams or know how to handle spam.
    10. From domain contact points.
    Every domain has one to three contact points - administration, technical, and billing. The contact point includes the email address of the contact person.
    As the contact points are freely available, e.g. using the 'whois' command, spammers harvest the email addresses from the contact points for lists of domains (the list of domain is usually made available to the public by the domain registries). This is a tempting methods for spammers, as those email addresses are most usually valid and mail sent to it is being read regularily.
    11. By guessing & cleaning.
    Some spammers guess email addresses, send a test message (or a real spam) to a list which includes the guessed addresses. Then they wait for either an error message to return by email, indicating that the email address is correct, or for a confirmation. A confirmation could be solicited by inserting non-standard but commonly used mail headers requesting that the delivery system and/or mail client send a confirmation of delivery or reading. No news are, of coures, good news for the spammer.
    Specifically, the headers are -
    Return-Receipt-To: which causes a delivery confirmation to be sent, and
    X-Confirm-Reading-To: which causes a reading confirmation to be sent.
    Another method of confirming valid email addresses is sending HTML in the email's body (that is sending a web page as the email's content), and embedding in the HTML an image. Mail clients that decode HTML, e.g. as Outlook and Eudora do in the preview pane, will attempt fetching the image - and some spammers put the recipient's email address in the image's URL, and check the web server's log for the email addresses of recipients who viewed the spam.
    So it's good advice to set the mail client to *not* preview rich media emails, which would protect the recipient from both accidently confirming their email addresses to spammers and viruses.
    Guessing could be done based on the fact that email addresses are based on people's names, usually in commonly used ways (first.last@domain or an initial of one name followed / preceded by the other @domain)
    Also, some email addresses are standard - postmaster is mandated by the RFCs for internet mail. Other common email addresses are postmaster, hostmaster, root [for unix hosts], etc.
    12. From white & yellow pages.
    There are various sites that serve as white pages, sometimes named people finders web sites. Yellow pages now have an email directory on the web.
    Those white/yellow pages contain addresses from various sources, e.g. from UseNet, but sometimes your E-mail address will be registered for you. Example - HotMail will add E-mail addresses to BigFoot by default, making new addresses available to the public.
    Spammers go through those directories in order to get email addresses. Most directories prohibit email address harvesting by spammers, but as those databases have a large databases of email addresses + names, it's a tempting target for spammers.
    13. By having access to the same computer. .
    If a spammer has an access to a computer, he can usually get a list of valid usernames (and therefore email addresses) on that computer.
    On unix computers the users file (/etc/passwd) is commonly world readable, and the list of currently logged-in users is listed via the 'who' command.
    14. From a previous owner of the email address.
    An email address might have been owned by someone else, who disposed of it. This might happen with dialup usernames at ISPs - somebody signs up for an ISP, has his/her email address harvested by spammers, and cancel the account. When somebody else signs up with the same ISP with the same username, spammers already know of it.
    Similar things can happen with AOL screen names - somebody uses a screen name, gets tired of it, releases it. Later on somebody else might take the same screen name.
    15. Using social engineering.
    This method means the spammer uses a hoax to convince peopleinto giving him valid E-mail addresses.
    A good example is Richard Douche's "Free CD's" chain letter. The letter promises a free CD for every person to whom the letter is forwarded to as long as it is CC'ed to Richard.
    Richard claimed to be associated with Amazon and Music blvd, among other companies, who authorized him to make this offer. Yet hesupplied no references to web pages and used a free E-mail address.
    All Richard wanted was to get people to send him valid E-mail addresses in order to build a list of addresses to spam and/or sell.
    16. From the address book and emails on other people's computers.
    Some viruses & worms spread by emailing themselves to all the email addresses they can find in the email address book. As some people forward jokes and other material by email to their friends, putting their friends' email addresses on either the To: or Cc: fields, rather than the BCc: field, some viruses and warms scan the mail folders for email addresses that are not in the address book, in hope to hit addresses the computer owner's friends' friends, friends' friends' friends, etc.
    If it wasn't already done, it's just a matter of time before such malware will not only spam copies of itself, but also send the extracted list of email addresses to it's creator.
    As invisible email addresses can't be harvested, it's good advice to have the email addresesses of recipients of jokes & the like on BCc:, and if forwarded from somebody else remove from the email's body all the email addresses inserted by the previous sender.
    17. Buying lists from others.
    This one covers two types of trades. The first type consists of buying a list of email addresses (often on CD) that were harvested via other methods, e.g. someone harvesting email addresses from UseNet and sells the list either to a company that wishes to advertise via email (sometimes passing off the list as that of people who opted-in for emailed advertisements) or to others who resell the list.
    The second type consists of a company who got the email addresses legitimately (e.g. a magazine that asks subscribers for their email in order to keep in touch over the Internet) and sells the list for the extra income. This extends to selling of email addresses acompany got via other means, e.g. people who just emailed the companywith inquiries in any context.
    The third type consist of technical staff selling the email address for money to spammers. There was a news story about an AOL employee who sold AOL email addresses to a spammer.
    18. By hacking into sites.
    I've heard rumours that sites that supply free email addresses were hacked in order to get the list of email addresses, somewhatlike e-commerce sites being hacked to get a list of credit cards.
    If your address was harvested and you get spammed, the following pages could assist you in tracking the spammer down :
    1. MindSpring's page explaining how to get an email's headers
http://help.mindspring.com/features/emailheaders/extended.htm
    2. The spam FAQ, maintained by Ken Hollis.
http://digital.net/~gandalf/spamfaq.html
http://www.cs.ruu.nl/wais/html/na-dir/net-abuse-faq/spam-faq.html
    3. The Reporting Spam page, an excellent resource.
http://www.ao.net/waytosuccess/
    4. Reading Mail headers.
http://www.stopspam.org/email/headers/headers.html
    5. Julian Haight's Spam Cop page.
http://spamcop.net/
    6. Chris Hibbert's Junk Mail FAQ.
http://www.fortnet.org/WidowNet/faqs/junkmail.htm
    7. Sam Spade, Spam hunter.
http://samspade.org/
    8. Penn's Page of Spam.
http://home.att.net/~penn/spam.htm
    9. WD Baseley's Address Munging FAQ
http://members.aol.com/emailfaq/mungfaq.html
    10. Fight Spam on the Internet site
http://spam.abuse.net/
    11. The Spam Recycling Center
http://www.spamrecycle.com/
    12. The Junk Busters Site
http://www.junkbusters.com/
    13. The Junk Email site
http://www.junkemail.org/
    14. BCP 30: Anti-Spam Recommendations for SMTP MTAs
http://www.faqs.org/rfcs/bcp/bcp30.html
    15. FYI 28: Netiquette Guidelines
http://www.faqs.org/rfcs/fyi/fyi28.html

    FYI 35: DON'T SPEW
    A Set of Guidelines for Mass Unsolicited Mailings and Postings
http://www.faqs.org/rfcs/fyi/fyi35.html
    Several sites on the web will help in tracing spam :
    1. Pete Bowden's list of traceroute gateways
http://www.missing.com/traceroute.html
    To find traceroute gateways in any country, visit here.
http://www.traceroute.org/
    2. Allwhois.com gates to whois on any domain world-wide
http://www.allwhois.com/
    3. A list of whois servers, collected by Matt Power
ftp://sipb.mit.edu/pub/whois/whois-servers.list
    4. Alldomains.com site - links to NICs worldwide.
http://www.alldomains.com/
    A similar page can be found at
http://www.forumnett.no/domreg.html
    5. The Coalition Against Usolicited Commerical E-mail.
http://www.cauce.org/
    The European CAUCE.
http://www.euro.cauce.org/en/index.html
    The Coalition Against Unsolicited Bulk Email, Australia.
http://www.caube.org.au/
    The Russian Anti-Spam organization.
http://www.antispam.ru/
    6. No More Spam - ISP Spam-Blocking Interferes With Business
http://www.byte.com/columns/digitalbiz/1999/04/0405coombs.html
    Legal resources :
    1. FTC Consumer Alert - FTC Names Its Dirty Dozen: 12 Scams Most Likely to Arrive Via Bulk email
http://www.ftc.gov/bcp/conline/pubs/alerts/doznalrt.htm
    2. Report to the Federal Trade Commision of the Ad-Hoc Working Group on Unsolicited Commercial Mail.
http://www.cdt.org/paper/report-federal-trade-commission-ad-hoc-working-group-unsolicited-commercial-email?quicktabs_4=1
    3. Pyramid Schemes, Ponzi Schemes, and Related Frauds
http://www.impulse.net/~thebob/Pyramid.html
    4. The AOL vs. Cyberpromo case
http://legal.web.aol.com/decisions/dljunk/cyber.html

    Nine New Lawsuits Press Release.
http://legal.web.aol.com/decisions/dljunk/ninepress.html
    5. "Intel scores in email suit", by Jim Hu, CNET News.com.
http://www.news.com/News/Item/0,4,29574,00.html?st.ne.ni.lh
    6. The John Marshall Law School spam page
http://www.jmls.edu/cyber/index/spam.html
    6. First amendment issues related to UBE, by Paul L. Schmehl.
http://www.utdallas.edu/~pauls/spam_law.html
    7. U.S. Anti-Spam Laws
http://www.the-dma.org/antispam/statespamlaws.shtml
    8. The UK Data Protection Law
http://www.dataprotection.gov.uk/
    9. The Italian Anti-Spam Law
http://www.parlamento.it/parlam/leggi/deleghe/99185dl.htm
    10.The Austrian Telecm Law
http://www.parlament.gv.at/pd/pm/XX/I/texte/020/I02064_.html
http://www.bmv.gv.at/tk/3telecom/recht/tkg/inhalt.htm
    11.The Norwegian Marketing Control Act
http://www.forbrukerombudet.no/html/engelsk/themcact.htm

How To Protect Your Computer Against Malware

Today it is essential to someone imposition against malware (viruses, Trojans, spyware, worms, rootkits and new types of malware) but we also cognize both things roughly your computer to add an histrion infliction.

1. Lay a firewall package
Although Windows comes with built-in firewall, because galore security holes and comfortableness that can alter the firewall settings, it requires that a other firewall document. Windows XP has a firewall that only protects influent accumulation and instead Windows Vista has a firewall that protects assemblage as input and the production. Withal, many fill advise installing a isolated firewall schedule for Windows Vista and Windows XP protection.

Firewall top angle:
- ZoneAlarm (freeborn variation)
- Settlement Firewall Extricated (liberate version)
- Unrestrained Online Outfit (atrip version)
- PC Tools Firewall Nonnegative (liberal version)


2. Put your antivirus software
An antivirus idea is the one who determined viruses, worms and Trojans, adware, spyware, and opposite types of malware. Ordinarily antivirus and antispyware are desegrated. Antivirus is based on a database of virus signatures to conceptualise, to be renewed (update) from moment to indication. Do you update regularly or activate the antivirus update functions. The foremost antivirus break to sight malware justified if no circumstantial mode in the database, so they are the champion.
Antivirus top table:
- Unoccupied Avast Antivirus (unfixed type)
- Avira AntiVir PersonalEdition (uncommitted type)
- AVG Anti-Virus Liberal Edition (liberate type)
- A-squared Extricated (release version)



3. Download Windows Updates
Windows updates protect against security holes are institute after the outlet versions of Windows. Commonly set comes with windows windows updates enabled. If enabled, this union can be easily activated from the Keep Window.

4. Do not unprotected email attachments and do not utter on course that they content
Never undetermined attachments from emails that you conveyed them to strangers. If it looks suspicious telecommunicate, take it alter. In any event not agaze files with the improver. Exe,. Bat. Sometimes files. Doc may be pussy. But if you want to see the telecommunicate containing attachments, download files to your machine oldest and then interpret them with antivirus database is updated regular.
Links which emails they comprise may also postulate you to sites that score been malware (especially Trojans) and they can be installed without your respond, because of browser guard holes, and then they can instal added programs that can compromise. By these methods can be phishing, in which your information are required your accounts, passwords, users, content nearly your achievement game. Do not trait these sites never, phytologist or sites that you've entered do not ask for your parole or username.

5. Update the programs you are using
E'er use the update utility that provides most of the programs and browsers (Cyberspace Human, Theater, Firefox), telecommunicate consumer (Look Transport, Thunderbird).

6. Swear back-up accumulation
If your machine is viruseaza ordinarily installed programs, but can be uninstalled and the dishonest. There are many programs on the activity that can pass frequenter backups from period to moment.
You should pass symmetrical backups at littlest to individualised collection: documents, pictures, links, e-mail direction accumulation (Destination Collection) and netmail (in sufferer you use telecommunicate clients like Attitude Verbalize or Thunderbird).

7. Download sure with the DC networks and torrents
DC networks and torrents are strong methods of sharing information (penalisation, movies, games, software), they are not ever unhazardous. This may be an strong method of travel trojans or viruses.

Tuesday, 17 January 2012

Search Files On Any Filesharing Server

    Finding a file hosted on a particular filehosting site like rapidshare,mediafire,megaupload,depositfiles or any other filehosting site can be difficult job.But now it is possible to find almost anything on any of these filehosting sites.All you need to do is just enter the name of the file,movie,game,software and press enter and most probably you will get the file.Moreover you will also have the option to find the file on a particular filehosting like mediafire or rapidshare or whichever you prefer.
    I would like to keep this tutorial very short and we will be finding winrar on mediafire in this tutorial.

    Here is the tutorial on How To Search Files On Any Filesharing Server

1. Goto filestube.com.

2. Enter the name of the file you want(In this case winrar) .

3. Click on More in the left side .

4.Select mediafire.Now you will get all files on mediafire.

5. Click on the link that is most appropriate.

6. Now click on download to go to the mediafire server for downloading.

    Enjoy!!

How to export and import Bookmarks in Firefox

Bookmark is the finest way to mark the practical website which you want to admission daily. It is hard to learn the domain name of the all the websites you want to visit. So browser have bookmark feature to add links to bookmark so that user can visit websites without learning the domain of the website.
You can also import and export bookmarks. This helps to take your bookmarks with you. Export bookmarks and hoard to your system. Take it to another system with flash drive and then import it to the browser. Thus you can make your bookmarks portable.

Follow these guides to import bookmarks:
  • Open Mozilla Firefox
  • Select BOOKMARKS from the toolbar at the top of the screen
  • Select ORGANIZE BOOKMARKS from the drop down menu
  • Select FILE --> IMPORT
  • Browse for the location to load the bookmarks


Same steps can be taken for the exporting bookmarks. See below

  • Open Mozilla Firefox
  • Select BOOKMARKS from the toolbar at the top of the screen
  • Select ORGANIZE BOOKMARKS from the drop down menu
  • Select FILE --> EXPORT
  • Browse for the location to save the bookmarks
My other links.

Enter as Admin of a website - How to?

    Do you want to Admin of a website? Is this Possible? Yes! of-course it is Friends. Now this is possible with Tricks With Hacker. Today while surfing i came across a amazing but yet simple trick by the help of which you will be able to log in as the admin of any Website.
    Note - I don't take any responsibility for any harm caused due to this trick because this trick is for educational purpose only and so that if you are a webmaster or owner of a site which is using the same username and password can than you can immediately take steps to prevent unauthorized access to your site.

How To Login As Admin Of Any Website:

    Step 1). Go To Google.com and Then Search For the Following Piece of code,
    "adminlogin.asp" or "admin.asp"
    Step 2). Now Chose any website from the search results and then fill the below details in the login page,
    Username - admin
    Password - 'or''='
    Enjoy :P
    Warning- Again I don't take any responsibility for any harm caused due to this trick because this trick is for educational purpose only.
    Hope you liked my article do share your views in the comments below.

Monday, 16 January 2012

Facebook Doesn’t Delete Cookies When Logging Out But Uses Them To Protect Users

    Today while surfing on Facebook I guess that Facebook is not using cookies to track you. At least not after you log out. Users, however, should still be wary about what Facebook knows about them and what it chooses to do with this information.
    According to writer and hacker, Nik Cubrilovic, Facebook’s tracking cookies are not deleted when you log out of Facebook, but instead are simply altered. These cookies can then be used to track your online presence wherever you go via social plugins, to sell your information to third parties and for ad targeting.

    Facebook has recently responded to these allegations via a comment on ZDNet. A Facebook engineer denied that Facebook is using these altered cookies as a source of information, but says they are instead used to protect users against hackers, prevent underage users from trying to re-register and to identify shared computers (again, to protect users who choose the “keep me logged in” option).
    Even if this is true, we should all keep in mind that cookies can definitely be used for tracking. For example, if you log on to Facebook from a public computer, your account information stays on that computer even after you log out. What this information is used for by Facebook is one thing, but your tracks are not covered.
    Also keep in mind that one of Facebook’s new features, frictionless sharing, will automatically share in your news feed any article you read which has the Facebook plugin. No active clicking involved – it will just happen. Another good reason to stay logged out of your account while you’re surfing.

Invite People To Google Plus By Sharing A Link - 300 Invites

    Are you Looking to boost your circle or circles of Google+ friends? ok then you are in right Place to do that. Actually The major problems with Google+ so far has been the process of inviting people. At first inviting people did not work at all. Then, the invite process started working, but you had to work with the cumbersome process of entering the email address of every person you wanted to invite.

    Finally, the people at Google have realized that this is just an impractical solution to get invites to your friends. They grant you 150 invites, but realistically who wants to sit there and enter 150 different email addresses, and furthermore, who even knows all of their friends email addresses off the top of their head?
    Enter the invite link. As of now when you click on the “invite people” button on the right side of the screen you can invite friends by email, or you can share your registration link with them. They still limit you to 150 invites because they don’t want Google Plus to become flooded with people, but at least it will help to actually get people you care about on to Google Plus.
    Users can now just put a status on their Facebook wall and let their friends come to Google+. Hopefully, this will make Google+ a more active place.
    Here is Dave’s invite link for anyone who would like to sign up for Google Plus, and here is Mark’s link. 150 invites to each link. Get them while they’re hot!
    Enjoy..!!

Control Other Computers Remotely For Free With Chrome Remote Desktop - Cross-Platform

    Today I am going to share a Trick How to control Computers remotely with cross platform remote assistance using only Google Chrome. I don’t do this “commercially”, so my free tool of choice is TeamViewer. It’s free for non-commercial use, fast, and very easy to use even for people who don’t know very much about computers. But when I heard Google released something called Chrome Remote Desktop (Click Here), my curiosity was piqued, so I decided to give it a try. This add-on is interesting because you set it up within Chrome, but you can use it to control the entire computer remotely, not just the Chrome session.
    For a Chrome add-on, Remote Desktop is positively huge – it’s a 20MB download, so if you don’t have a fast connection, it might take a minute or two. Just for comparison, the latest version of TeamViewer weighs in at 4MB, so Chrome Remote Desktop is five times as big. Once you’re done downloading it, the add-on appears as a new button on your New Tab page. Clicking this button shows a somewhat-scary “extra permission” authorization page. Not a big deal for users who know what they’re doing, but if you’re guiding someone through the setup process over the phone, this might be a little stressful. You basically need to hit the Continue button:

    … and then the allow access button:
    And that’s it. Now you’re set up to remote control the computer, or use it to control other computers. When I guided a user through this setup process remotely, the trickiest part was actually getting them to see the Chrome Remote Desktop button on the New Tab page:
    The user was looking for a button for an add-on (by the address bar), so I had to guide them to the New Tab page. Other than that, it was a fairly smooth setup process.
    You can now either Share This Computer or access another computer:
    When you click Share This Computer, you will get a single 12-digit PIN code, which you can copy and paste into a chat session or even dictate over the phone:
    This is a nice simplification over TeamViewer, which uses a system of two codes (a user ID and a session password). With Chrome Remote Desktop, you have just a single number. To gain control over the computer, the other party needs to click the “access a shared computer” link on their Chrome Remote Desktop, and enter the PIN code:
    Once you click Connect, the remote desktop instantly materializes, and if the connection is fast enough, it even keeps Windows’ Aero interface on, with drop shadows and transparency:
    There’s a positively huge “Close Remote Desktop BETA” window that is always set on top, so that both you and the user sitting in front of the remote computer can terminate the session at any time. In fact, the window is so very large, that it sometimes gets in the way and needs to be moved around.

Is It Better Than TeamViewer?

    In a word – no. Chrome Remote Desktop is a larger download, and provides less options than TeamViewer (for example, it doesn’t support file transfer). But it does have two very important advantages that might make you use it instead of TeamViewer. The first is that it is entirely free, not just for non-commercial use, but for all use. The second key advantage is that it is fully cross-platform – it works on Windows, Linux, Mac, and even Chromebooks. In fact, I believe it is currently one of the only ways to remotely control a Chromebook computer.
    As a beta and a tech experiment, it is certainly impressive. I usually tend to see the browser as a sandbox of sorts – i.e, what happens in the browser stays in the browser. Chrome Remote Desktop definitely breaks that perception, and shows that Chrome can reach deep into your system if you only let it.
    What is your preferred remote access solution? Will you be giving Chrome Remote Desktop a spin? Let me know your thoughts below!

Sunday, 15 January 2012

Top 11 Windows 7 Hacks You Must Know

    Are you looking for Windows 7 Tips, Tricks and Hacks? Here I organized a set Top 11 Windows 7 Hack You Must Know. This list includes some of the handy posts on Windows 7 hacks in my blog. I have also provided the sources where you can find the hacks.

1. How to Get Windows Vista-Style Taskbar in Windows 7:

    It's hard to deny that Windows Vista scores high on appearance. Here's your chance to give the Windows 7 a Vista look. Just follow the steps mentioned below:
    Step 1: Right-click on the taskbar and choose the properties dialog. Select the small icons checkbox
    Step 2: Under the taskbar buttons setting, choose combine when taskbar is full. Although it’s not pixel-perfect in accuracy, but, it’s close from a functionality point.

2. How to Change Windows 7 Log On Screen:

    If you don't want the same old blue log on screen for your Windows Vista, here's what you gotta do. Go ahead with the steps below.
    Step 1: Download the file - http://www.mediafire.com/?e9y3j3vme0w.
    Step 2: Click on Save and save the .zip file to the desktop.
    Step 3: Open the .zip file and extract the .reg file to the desktop.
    Step 4: Right click the .reg file (On Desktop) and click on Merge. .
    Step 5: Click on Run, and press Yes, Yes, and OK when prompted.
    Step 6: Save the custom .jpg image you want to use to the desktop with the name backgroundDefault.jpg.
    Step 7: Check to see what your primary display screen resolution is. (You can do it by right clicking on any empty space on your desktop and choose screen resolution and then actuate it with your monitor's specification.) . [NOTE: For example, mine is 1920 x 1280.]
    Step 8: Open Paint, and click on the File icon (top left corner), Open, and navigate to and select the .jpg image from step 6. [NOTE: You can open Paint by typing mspaint.exe in the Start menu search line]
    Step 9: In Paint, click on Resize, dot Pixels, uncheck Maintain aspect ratio, then resize the .jpg image to the screen resolution size in step 7 (whatever be yours)
    Step 10: Save the .jpg file to the desktop with the exact file name below with the screen resolution size of the image. When completed, close Paint
    Step 11: In Windows Explorer, navigate to C:\Windows\system32\oobe\info\backgrounds
    Step 12: Copy and Paste the .jpg files from step 10, and from step 6 into the C:\Windows\system32\oobe\info\backgrounds folder, then close the window
    Step 13: You're logon screen is now changed. You can press Ctrl+Alt+Del to test it. Click on Cancel to return to the desktop. [NOTE: You can now delete the .reg and .zip files on the desktop if you like.]

3. How to Unlock the Windows 7 Hidden Themes:

    The Windows 7 beta has a pack of hidden and locked themes. Let's see how you can unlock the hidden themes.
    Step 1: Open the Explorer (Windows + E) and go to C:\Windows\winsxs
    Step 2: Enter *.theme into the search field. Alternately you can use the * sign on the number block.
    Step 3: You'll get the Click me prompt
    Step 4: Double-click the themes ZA, US, GB, CA, AU to install them.

4. How to Enable the Windows Aero in Windows 7:

    If you were looking for the best designed and most transparent Microsoft user interface then you can't escape Windows Aero. Here's a hack to enable Windows Aero in Windows 7. But before you proceed with the steps keep a backup of your registry.
    Step 1: Click on the Start Menu and type “regedit” into the search box. When the program appears click to open the regedit.exe icon.
    Step 2: Locate the Key below
    HKEY_CURRENT_USERSoftwareMicrosoftWindowsDWM
    Step 3: Look to the pane on the right of the key hierarchy. Right click on the white area and select New > DWORD (32 bit) Value.
    Step 4. As the value appears name it UseMachineCheck.
    Step 5. Repeat and create 2 more DWORD Values, Blur and Animations
    Step 6. First double-click the value just created with the UseMachineCheck and enter 0 in the Value Data box. Do the same for Values Blur and Animations. Then click OK.
    Step 7: Now close the Registry Editor.
    Step 8: Open the Start Menu and type “cmd” into the search box, right-click on cmd.exe when the program appears in the search results. Now, select Run as Administrator from the drop-down.
    Step 9: As the Command Prompt opens type the commands below
    i) Net Stop uxsms – this command will stop the Desktop Windows Manager Session Manager
    ii) Net Start uxsms– this command will restart it
    Step 10: Once you close the Command Prompt. Right click on the desktop and click on Personalize from the menu.
    Step 11: Click on the Window Color and Appearance in the Personalization Windows Aero the Color Scheme menu.

5. How to Enable the Quick Launch Bar in Windows 7:

    It is a surprising to see that the Quick Launch Bar has not been enlisted in the easy to enable list. Here's what you gotta to do to enable the Quick Launch Bar.
    Step 1: Right-click on the Taskbar and select Toolbars > New Toolbar from the menu.
    Step 2: Copy and paste the address provided below into the Address bar
    %SystemDrive%Users%username%AppDataRoamingMicrosoftInternet Explorer
    then click the arrow to the right of the Address bar to navigate to the folder.
    Step 3: Select the Quick Launch folder listed and click the Select Folder button

6. How to Remove Send Feedback link in Windows 7:

    The bug that troubles the window in Windows 7 is the send feedback link. This is a simple fix to get rid of this pique. Make sure you have a backup of the registry before you proceed.
    Step 1: Click on the Start Menu and type “regedit” without quotes into the search box, click to open the regedit.exe icon when the program appears.
    Step 2: Look for the following Key HKEY_CURRENT_USER>Control Panel>Desktop
    Step 3: Right-click on the white space in the In the pane to the right of the key hierarchy and select New > DWORD (32 bit) Value.
    Step 4: Now as the value appears name it FeedbackToolEnabled
    Step 5: Double-click the value that was created with FeedbackToolEnabled and enter 0 in the Value Data box, and then click OK.
    Step 6: To effect the changes Log off the computer and log on to the system.

7. How to Start Windows Explorer from ‘My Computer’:

    For those who are in the habit of customizing the Windows for convenience and fun can try this out on Windows 7. With this hack you can set the indows Explorer to start from My Computer instead. This will help you to access the different hard disk drives or removable disks easily. Let's go through the steps
    Step 1: navigate to Windows Explorer in the Start Menu (it’s in the Accessories folder). Then edit the properties and change the target to read:
    %SystemRoot%\explorer.exe /root,::{20D04FE0-3AEA-1069-A2D8-08002B30309D}
    This will make the explorer open folders/drives in new Windows. To fix this see the next step
    Step 2: Set the target to
    %SystemRoot%\explorer.exe /e,::{20d04fe0-3aea-1069-a2d8-08002b30309d}

8. Remove Watermark from Windows 7 beta 1 Desktop:

    Windows 7 is in its beta version and you can realize it well with the lapses in the operating system. One such annoying feature with the OS is the water mark embedded in the desktop. To remove the watermark you can follow the steps below. Before beginning with the steps you need to ensure that the User Account Control is disabled.
    Step 1: Click on the Start Menu> Control Panel
    Step 2: Click on User Accounts. Change User Account Control Settings and adjust the slider so that it is at the bottom of the screen (Never Notify).
    Step 3: Next restart the computer
    Step 4: After the rebooting browse to the following directory
    C:WindowsSystem32en-US
    Step 5: Once you’re in the directory locate and right-click the following file user32.dll.mui
    Step 6: From the drop down menu select the properties. Click on the Security tab and click on the Advanced button at the buttom.
    Step 7: In the Advanced Security Settings window click on the Owner tab and click Edit.
    Step 8: Click OK to effect the changes and return to the original file Properties window.
    Step 9: Under the security tab, Click Edit.
    Step 10: Select Users and a checkmark to the all the checkboxes giving you full control of the file
    Step 11: Rename user32.dll.mui to user32-backup.dll.mui
    Step 12: Download the patched version of the files - 32 bit Download or 64 bit Download
    Step 13: After the files have been downloaded extract it from the original directory
    C:WindowsSystem32en-US>
    Step 14: Restart the computer

9. How to Uninstall Internet Explorer:

    This is for those users who never need to use the Internet Explorer. Just follow the steps below to uninstall IE
    Step 1: Click on the Start Menu and move to the Control Panel
    Step 2: Select the Programs and Features
    Step 3: Click on Turn Windows features on or off link located on the left pane
    Step 4: The Turn Windows features on or off window appears. Uncheck the Internet Explorer 8 and click OK
    Step 5: After a couple of restarts Internet Explorer should be gone for good

10. How to Enable Recording in Windows 7:

    In windows 7 the Wave Mix and Sterio Mix are disabled by default. I'll let you the hack to activate the recording device. Here are the steps
    Step 1: Right click on the speaker icon. Now look for the Recording Devices and select it.
    Step 2: Now right click and select the option Show Disabled Devices
    Step 3: Select the Wave Out Mix device and Enable it. Click on Set as Default Device and open up the Audacity.

11. How to Get Rid of Windows 7 Expiry Date:

    Install the Timer Nuke patch to remove the files associated with activation. It will disable the related services. So you can continue with the Windows 7 even after the activation timeline is over. Just download the patch and install.
    Click Here to Download
    Enjoy..!!

Saturday, 14 January 2012

Post status or comment in Blue Text on Facebook - How to?

    Now post status or comment on facebook in blue colour. So whats so cool about this blue text trick? whats so special about it? so the simple answer that i found to this question is that Most of the facebook users get excited when they see something new and this is something different as the default colour of the text on facebook is Black....and yes according to my research these blue texts get more likes and comments then that ordinary black satuses . And i think you too must have observed that some normal Blue statuses like Good Morning and they get hundreds of comments saying how you did this ,its so cool ,awesome and all that and makes you feel special...So i will strongly recommend you to try this trick and be an point of attraction between your friends.....and yeah the special thing about this trick is that it is as easy as 123.....so lets take a look.....!!!

EXCLUSIVELY COPYRIGHT TO "http://trickswithhacker.blogspot.com" AND DO NOT REPRODUCE WITHOUT AUTHOR'S PERMISSION.


Steps to write blue text on facebook:-

    1). Login To Facebook if you haven't already logged in.
    2). Now click on Update Status.
    3). Now here comes the main thing..... paste the below code in your status update text space
    @@[0:[181685035214061:1: WRITE YOUR TEXT HERE]]
    @[181685035214061:]
    4). Now Replace YOUR TEXT with the your status for Example:-
    @@[0:[181685035214061:1: Hello Friends How r u??? isn'this blue text cool!! ]]
    @[181685035214061:]
    5). Then Click On the post button, here's a preview of the text you must have entered in the status update text box,
    And your status will look like this,
    you can also try some ASCII ART's like this,
    Just copy the Code Below,
    @@[0:[181685035214061:1:
    ╔══╗╔╗──╔╗─╔╦═══╦════╦═══╦═╗╔═╦════╗ ║╔╗║║║──║║─║║╔══╣╔╗╔╗║╔══╩╗╚╝╔╣╔╗╔╗║ ║╚╝╚╣║──║║─║║╚══╬╝║║╚╣╚══╗╚╗╔╝╚╝║║╚╝ ║╔═╗║║─╔╣║─║║╔══╝─║║─║╔══╝╔╝╚╗──║║ ║╚═╝║╚═╝║╚═╝║╚══╗─║║─║╚══╦╝╔╗╚╗─║║ ╚═══╩═══╩═══╩═══╝─╚╝─╚═══╩═╝╚═╝─╚╝]]
    @[181685035214061:]
    And it will look like below,

For those who are still having problem here's the whole trick in short,

    Type or copy & paste this code: @@[0:[ 181685035214061:0: then type your post or comment,
    then type 2 ending brackets at the end and then type @[181685035214061:]
    and it will look like this,
    @@[0:[ 181685035214061:1: WRITE YOUR TEXT HERE ]] @[181685035214061:]
    Share this amazing blue text Trick with your friends......if you are still having any problem just comment below and i have a lott of alternatives and suggestions for you.....please follow this blog to stay updated with the latest technology, you can…

Friday, 13 January 2012

Use Trial Version software forever without Expiration - How to?

    Today I am going to share this Trick on how to use trail version software's without expiration and without any license. Trial version expires after some days. You can stop that expiration. You can tell trial version of the software to not count days or do not bother about time. The software will stay and keep working like original software forever and will not expire or cease to work. You do not have to change your system clock. This little software does it all.
All Hacking Tricks

    Time Stopper is the software which can stop the time for try out version software. When you stop the time you can use your try-out versions forever. When you stop the time of a try-out version using this Time Stopper it works via this Time Stopper. Real time and date run normally on your system. You can use any number of try-out version softwares with this software.

How it Works:

    1.Open Time Stopper
    2.Browse and select .exe of required trial software
    3.Choose the new date (Any date which occurs in between your trial software time period before expiration, suggestion: set it to two days before trial software expiration date.)
    4.Choose any time
    5.Click open software on your selected date
    If you wish to create an icon for your modified trial software and do not want to open Time stopper every time then use last button in software to create new icon. open that trial software after that from that newly created icon always otherwise it can expire.
    Size: 844 KB

Download Time StopperClick Here

    Alternative Software: Run As Date
    Click Here To Download
    Enjoy!!

Tips And Tricks To Speed up windows 7

All Hacking Tricks

    Today I am going to share how to speed up window 7. This article will helps you to increase your PC's performance/speed of windows 7 operating system. I am not providing here any softwares for this purpose I am just giving you tips and tricks to tweak your windows 7 according to your needs and you will certainly get your desired performance from your windows 7 operating system. Here is the step by step tutorial with screenshots on how to increase your windows 7 speed .

1.Disable Startup Services

    Windows startup services can be found by clicking on start and the and typing “ msconfig ” and pressing enter.Now click on services tab.Now you can disable the unwanted services by checking them and clicking on disable.While this should be done according to your requirements.Services like “Offline Files,” “Tablet PC Input Services,” Terminal Services,” “Fax” and “Windows Search. “Offline Files,” “Tablet PC Input Services,” Terminal Services,” “Fax” and “Windows Search have a large impact on windows 7 speed/performance.

2.Utilize Readyboast

    Microsoft introduced readyboast service with the launch of windows vista and continued the service in windows 7.In ready boast service whenever you plugin your pendrive into your computer you will get an option to use your pendrive to speed up your windows 7 or windows vista.It will increase your windows memory.By using ready boast you can also specify how much memory of the pendrive should be used to speed up your windows 7.

3.Disable Windows transparency

    Disabling the windows 7 transparency option will certainty give a good speed to your windows 7 speed/performance.Disabling transparency is very easy in windows 7.Simply right-click on your desktop, select “Personalize,” choose the active theme and then navigate to “Windows Color.” Finally, uncheck the “Enable Transparency” option.

4.Remove Unwanted Programs from Startup

    Disabling unwanted programs such as messengers or other programs from startup will not only increase speed of your windows 7 it will also decrease the startup time of windows 7.

5.Disable Unwanted Features Of Windows 7

    To disable unwanted features from windows 7 click on “ Start “ then on control panel.Now click on “ Programs “ then on “Turn Windows features on or off”.Now disable the features you think you dont want.We recommend you to disable the “ Indexing Service “ it will have a noticeable effect on the speed.

6.Defragment Your Windows Regularly

    Adding and deleting files from drives will make your drives fragmented and it will take longer to access files so defragmenting the drive will decrease file access time.To start defragmentation click on “ Start “ and type “ Disk Defragmenter “ And press enter.Now start the defragmentation.
    Enjoy..!!

Thursday, 12 January 2012

Jump to a Specific Search Result Page In Google - How to?

    Google is the most popular search engine in the world. But while so many people use it, few actually get formal instructions on how to search with Google. This simple trick will allow you to jump to a specific search result page in Google search. Confused! For example, if you are searching a certain query on Google say "blogging" what would you do if you want to go to the 50th result page? You'll put next 50 times right?
    But by using this simple trick, you can jump to nth search result page of your query. I'll explain this with these simple steps.
    1. Put your search query in Google and hit enter.
    2. After your search results are displayed right click on the Next button in the bottom and select Copy Link Location.
    3. Replace the contents in the address bar with newly copied address.
    4. The new address will be look like this:
    http://www.google.co.in/search?q=blogging&hl=en&prmd=ilvbfd&ei=5MtwTKe3HM_QcdSdiLQN&start=10&sa=N
    5. Change the number on Green to any number that which result page you have to go, and hit enter.
    For example if you have to go page 11, then replace 10 with 100.Yes you are now on the specific page.

If You Enjoyed This Post Please Take 5 Seconds To Share It.

Wednesday, 11 January 2012

Control Your Privacy With The Facebook Timeline - How to?

    Previously I wrote a Post on Facebook timeline starts rolling out to change users profiles and Today I am going to share this Trick with you on How to control this Timeline's Privacy.
    Now, while the Facebook timeline looks fantastic, there are a few privacy concerns worth keeping in mind. For most people, certain things will need adjusting before you can be completely sure that your posts aren’t being exposed to the public unintentionally. We’ll take you through some of the major things you should check.
    Note that even if you have chosen to use the new timeline it still needs to be published in order to be seen publicly. You can do this yourself after enabling the timeline, or Facebook will do it for you eventually. This gives you a chance to test your privacy settings before they’re live.

1. Testing Your Settings

    There’s so many aspects of Facebook that can be controlled with different privacy settings that it can get a little bit confusing. Remember though, that at any time you can check how your Facebook profile looks to any person you are friends with. Simply go to your profile and click on the cog-like edit icon and choose “View as…” to choose a person to view the profile as.
    If you’ve been setting your privacy settings by using custom filters, a good idea would be to check a family member, a colleague, a good friend and an acquaintance. This will give you an idea how these different types of people can see your profile. Check your profile like this before and after checking the following settings.
Image

2. Limit Your Past & Future Default Post Settings

    There is a way to limit the audience for past posts easily. If you think it’s possible you made some embarrassing public posts when you first joined Facebook and hadn’t yet friended your boss, this is the tool for you. Go to Home > Privacy Settings and find the section for "Limit the Audience for Past Posts", clicking on the “Manage Past Post Visibility” link. Follow the prompts and confirmation to limit all of your “More than Friends” posts from your past to just your friends.
    This will include public posts and friends of friends, so it should catch all those unexpected posts. There’s no way to reverse it with one click, so make sure it’s what you really want to do.
Image

    Also keep in mind that this setting is entirely different from future posts you make. If you want to limit default privacy for future posts, there’s a simple choice to make on your privacy settings page.
Image

3. Manually Tweak Individual Items On Your Page

    This is the tool for you if you’re fairly sure your privacy settings are what you want. For instance, if you’ve already viewed your profile as your boss and there’s just a few things you want to get rid of or feature on your profile.
Image

    Head to the box containing the post you want to feature or delete. You may realise in hindsight that the update was a little silly, or it might be an update that you want everyone to know the second they see your profile. The feature/hide buttons are right next to each other in the top right of every update.

4. Controlling Who Sees Things Others Post On Your Timeline

    If you had previously controlled which of your friends can view posts on your wall, this setting will have migrated to cover your timeline. Sadly, Facebook won’t let you control which of your friends can post to your wall/timeline. It’s either all of your friends or just yourself. So, you need to instead control who can view what your friends write.
Image

    Head to Home > Privacy Settings > How You Connect and click on the control for “Who can see posts by others on your timeline?” to set things up properly. This is best controlled using custom friends lists to both nominate who can see the posts and who can never see the posts your friends make. Just think, your high school friends, relatives, boss and current friends can all write on your wall/timeline. Who do you want to see those messages? Who do you NOT want to see them?

5. Check The Privacy Of Your Contact Information

    Now’s a great time to check just how public each bit of your profile information is. Go to your profile and click on “Update Info” to see your work history, education, relationships, contact details and other details. Each piece of information can be limited to friends, custom friend groups or just yourself. Who should know where you live? Your phone number? Edit the section, then click on the icon to the right of any piece of information in order to change who can see it.
    Enjoy..!!