Source: prsolutions
CG
FLAT
MPI (some ans wrong)
STM
Source:v4uonline
FLAT
MPI
STM
enjoy:)..
Friday, August 27, 2010
CSE Imp Questions and bits for 1st mid
These imp ques are taken 4m raghu engg colleg website......
You can download by clicking on the respective link
III CSE Descriptive
III CSE Objective
enjoy:)...
You can download by clicking on the respective link
III CSE Descriptive
III CSE Objective
enjoy:)...
Sunday, August 22, 2010
10 unexplained sounds
We have mysteries around us and they leave us head scratching everytime, just taking the sound’s category, we have these ten.
10. Slow Down
“Slow Down” is a sound recorded on May 19, 1997, in the Equatorial Pacific ocean by the U.S. National Oceanic and Atmospheric Administration. The source of the sound remains unknown. The name was given because the sound slowly decreases in frequency over about 7 minutes. The sound was detected at 15°S 115°W / 15°S 115°W / -15; -115. It was recorded using an autonomous hydrophone array. The sound has been picked up several times each year since 1997. One of the hypotheses on the origin of the sound is moving ice in Antarctica. Sound spectrograms of friction closely resemble the spectrogram of the Slow Down. This suggests the source of the sound could be a friction phenomenon of ice rubbing over land. More of similar to this were recorded but later in different areas and different frequencies namely; Julia, Upsweep, and Train.
9. Electronic voice phenomenon
Caution: the recording is violent and may be too intense for some listeners.
“Electronic Voice Phenomenon” or the Phantom Words are electronically generated noises that resemble speech, but may or may not be the result of intentional voice recordings or renderings. Some have claimed these sounds are of paranormal origin, while others give explanations such as apophenia (finding significance in insignificant phenomena), auditory pareidolia (interpreting random sounds as voices in their own language) but no explanation is generally accepted. Now thousands of people across world spend their free time in wandering around haunted locations and installing recorders and video cameras in hopes of spooks and apparition. The evidence could be found at City of Dundee in Scotland, a city packed full of dead people, really a huge part of this city is formed over a massive ancient graveyard. It’s here wondering among the deceased, many EVP investigators have recorded strange findings.
10 Most expensive cars
Here is a list of the ten most expensive cars in the world that are still sold on the market.
Bugatti Veyron
With a price tag of $1,700,000, the Bugatti Veyron holds the distinction of being the most expensive car available on the market today. The Bugatti Veyron also claims the spot for the second fastest car in the world, right behind the SSC Ultimate Aero, with a top speed of 253 mph+. However, it is the fastest accelerating car and can go 0-60 in 2.6 seconds.
Lamborghini Reventon
The Lamborghini Reventon retails for $1,600,000. This version of the Lamborghini packs a lot of power and is the company’s most expensive model. It can reach 60 mph in 3.3 seconds with a top speed of 211 mph. The car has a slick jet-inspired design and is rare: only 20 are manufactured each year.
Monday, August 16, 2010
Google Defends Net Neutrality Plan
Despite a high degree of opposition, Google is defending its net neutrality proposal co-authored with broadband and wireless provider Verizon. The search giant on Thursday issued counterarguments on six points (Google calls them myths) that the company believes have been misunderstood about its proposal. Google says the proposed framework defends net neutrality, would protect the current Internet we enjoy today, and is definitely not about writing legislation from the boardroom.
Let's take a look at the highlights from Google's defense.
We're No Sell-Outs
Google says its proposal has not sold out the fundamental concept of net neutrality. The idea that an Internet provider should not be allowed to restrict Web data traffic based on the traffic's contents."No other company is working as tirelessly [as Google] for an open Internet," the company's statement says. Google goes on to explain how it felt compelled to negotiate a framework with Verizon, because of the stagnant political situation in Washington. The company then said the proposal has "key enforceable protections" for users, which is better than having no protection at all.
The problem is it's unclear whether the Google-Verizon proposal really would protect users. The proposal leaves wireless networks out of net neutrality regulation entirely. The agreement would also create a two-tiered Internet with a net neutral public Internet (the World Wide Web we use today), and a private non-neutral Internet for premium services that could be packaged similarly to cable television. Given the financial incentives from wireless and the private Internet, it's unclear whether the public Internet would survive under this system.
Doesn't Kill Wireless Neutrality
Google says its proposal would not eliminate network neutrality over wireless cellular networks. The company believes the proposal's transparency rules that force companies to publicly report wireless traffic management policies would ensure providers played fair. Google also stuck to its belief that the wireless market is competitive enough that it doesn't warrant net neutrality regulation. "Network and device openness is now beginning to take off as a significant business model in this [the wireless] space," Google says.I'm not really sure what Google means when it says openness is taking off in the wireless market. Perhaps the company is referring to the fact that you can buy a variety of devices like the iPhone or any number of Android devices that are permanently locked to one carrier. Maybe it's the idea that all four major cellular providers are often criticized for their high early termination fees, device exclusivity contracts that cut out smaller vendors, uniform text messaging costs or other sneaky fees that tend to sneak up on users.
Google also says that managing a wireless network is different from a wired broadband network since Internet traffic sent over airwaves is less robust than its cabled counterpart.
Won't Cannibalize Public Internet
The regular Internet is not going anywhere, Google says. The Google-Verizon framework puts several safeguards in place to make sure the current Internet stays the way it is, according to the search giant. The proposal would force broadband providers to comply with "consumer protection and nondiscrimination standards" before offering private Internet services.Private services must also be "distinguishable in purpose and scope" from what you get on the regular Internet. Finally, the FCC would be able to intervene and prevent carriers from reducing public Internet broadband capacity.
That last point sounds nice, but what about the first two? What exactly will those "nondiscrimination standards" be? How will they be defined to ensure fair play?
Google also says the private services are supposed to be different "in purpose and scope" from what you can get on the regular Internet. Google points to several examples of these new services such as gaming channels, home health monitoring, or more secure banking. The problem with this idea is that, as author Jeff Jarvis recently pointed out, it sounds like the private Internet could be reserved for "anything new." You're offering a new encryption standard on your Website? That's the private Internet. Got a new version of Halo? Private. A new 3D streaming service from Netflix? Private.
Where would this proposal draw the line between upgraded Web services and those that are truly different "in purpose and scope" from what you can get online right now?
Google defends several other points in its blog post. The company says the net neutrality framework was not influenced by business decisions surrounding Android, Google's mobile operating system. The search giant also says this proposal is about moving the debate forward not backward as some have contended.
TCS to bring the power of cloud computing to SMBs
Tata Consultancy Services (TCS), the country’s biggest software exporter, is ready to roll out what is internally being talked about as group chairman Ratan Tata’s next dream project. The company’s senior management has even called it the ‘Nano of IT’. The ambitious project, which is a ‘cloud’ offering, is expected to be launched mid-September, with the lofty aim of making information technology affordable to the country’s 35 million small and medium businesses (SMBs).
Developed by a 250-member TCS team, the cloud offering promises to lower the cost of ownership by 35-40%, compared with the traditional licensing model. Expensive capex investments required in IT will be converted into a monthly subscription model. Pricing per user for the entire IT stack will be Rs 8,000-10,000 per month. The stack includes hardware, networking and software. New customers will be locked in for three years, sources close to the development told FE.
The service is expected to be a major growth engine for TCS. FE has learned that executives have been internally talking about raising up to $1 billion a quarter in the coming years from the service, though it is early days yet. Initially, the focus will be on the domestic market, but the firm plans to take the offering overseas later. To begin with, TCS is confident of adding 100 customers every quarter or 400 in a year’s time.
Cloud services, delivered over the Internet, are an on-demand paradigm that can disrupt the way IT services are delivered today. Cloud computing uses virtualisation technologies and can potentially make an enterprise shed all of its IT assets one day — servers, storage, and applications can all be rented as per the requirement from cloud service providers.
The TCS service has been piloted with 75 customers and Ratan Tata is likely to review the project later this month. “We are checking with his calendar and trying to get a date for the launch in September,” a source said.
When officially launched, this would be one of the biggest cloud rollouts in the world, and perhaps Ratan Tata’s last big-ticket project before he retires in 2012 as Tata group chairman.
Developed by a 250-member TCS team, the cloud offering promises to lower the cost of ownership by 35-40%, compared with the traditional licensing model. Expensive capex investments required in IT will be converted into a monthly subscription model. Pricing per user for the entire IT stack will be Rs 8,000-10,000 per month. The stack includes hardware, networking and software. New customers will be locked in for three years, sources close to the development told FE.
The service is expected to be a major growth engine for TCS. FE has learned that executives have been internally talking about raising up to $1 billion a quarter in the coming years from the service, though it is early days yet. Initially, the focus will be on the domestic market, but the firm plans to take the offering overseas later. To begin with, TCS is confident of adding 100 customers every quarter or 400 in a year’s time.
Cloud services, delivered over the Internet, are an on-demand paradigm that can disrupt the way IT services are delivered today. Cloud computing uses virtualisation technologies and can potentially make an enterprise shed all of its IT assets one day — servers, storage, and applications can all be rented as per the requirement from cloud service providers.
The TCS service has been piloted with 75 customers and Ratan Tata is likely to review the project later this month. “We are checking with his calendar and trying to get a date for the launch in September,” a source said.
When officially launched, this would be one of the biggest cloud rollouts in the world, and perhaps Ratan Tata’s last big-ticket project before he retires in 2012 as Tata group chairman.
Microsoft to release IE9 public beta on Sept. 15
Microsoft on Thursday announced that it will release a public beta of Internet Explorer 9 on Sept. 15, a little less than five weeks from now.
Thursday's announcement followed a comment made late last month by Kevin Turner, the company's chief operations officer, that the IE9 beta would show up in September. Until today, Microsoft had declined to set a date or even confirm Turner's statement.
Microsoft first announced IE9 in March, and it has released four developer preview builds since then. The most recent one appeared on Aug. 5, and at that time the company said the fourth such preview would be the last.
But while those previews have trumpeted the new browser's "Chakra" JavaScript engine, its graphics-processor-powered hardware acceleration and its support for the new HTML5, as well as the fact that it is more in line with current Web standards, Microsoft hasn't as much as whispered about IE9's look and feel.
The developer previews have relied on an nearly-nonexistent interface that lacks even the most basic navigational features, such as a Back button or even an address bar.
Most expect that Microsoft will debut IE9's user interface in the beta next month.
According to reports earlier this year, IE9 was to feature a look copied from Windows Phone 7's "Metro" interface. Today, Neowin.net said sources had told it that Metro is out and a "simplistic UI similar to that of Google's Chrome" is in.
If so, it wouldn't be a surprise: Other browser makers, notably No. 2 Mozilla, have headed in that direction, too, as they follow the lead of Google and its cleaner-composed Chrome. Mozilla's next major upgrade, Firefox 4, will feature tabs on top and will eliminate the traditional Windows menus above the browser's content area, two features popularized by Chrome.
IE is on a two-month upswing in usage share, according to the most recent data from metric firm Net Applications, and Microsoft has to hope that IE9 will be able to maintain that momentum.
However, earlier this month Roger Capriotti, a product management lead on Microsoft's IE team, refused to be drawn into a discussion of the company's goals for IE9, or even whether the company thought the new version would entice erstwhile users to come back to the browser.
Vince Vizzaccaro, an executive at Net Applications, had previously pegged IE's increase in usage share to the growth of Windows 7, the Microsoft operating system that includes IE8, and to a national television advertising campaign in the U.S. More recently, he had other explanations.
"[The two-month increase] is more than a blip for IE," said Vizzaccaro in an interview last week. "Something is working for them. Maybe it's related to ongoing privacy concerns on the part of people with Google."
Microsoft has said nothing about a ship date for IE9, though many have speculated on an April 2011 release to coincide with MIX, the company's annual Web conference, which is slated to take place April 12-14, 2011, in Las Vegas.
It's possible the ship date will be significantly later: Microsoft finalized IE8 a full year after it released the first public beta for that browser. If it maintains the same pace for IE9, the upgrade's final edition might not appear until September 2011.
Wednesday, August 11, 2010
Microsoft Scrambles to Squash Bug in Windows Kernel
Microsoft on Friday said it is investigating an unpatched vulnerability in Windows after an Israeli researcher revealed a bug in the operating system's kernel driver.
Artwork: Chip TaylorAccording to Gil Dabah, a researcher from Tel Aviv who goes by the nickname "arkon," the Windows' kernel harbors a heap overflow vulnerability. Dabah also posted a short proof-of-concept to demonstrate the bug on RageStorm.com, a site he and two others run.
"Microsoft is investigating reports of a possible vulnerability in Windows Kernel," said Jerry Bryant on Friday. "Upon completion of the investigation, Microsoft will take appropriate actions to protect customers." Microsoft issues regular patches, but last week released a fix for a critical zero-day hole.
In an alert published Friday , Danish bug tracker Secunia pinpointed the bug in the "Win32k.sys" kernel-mode device driver, the kernel component of the Windows subsystem. Attackers could exploit the flaw using "GetClipboardData," an API (application programming interface) that retrieves data from the Window clipboard.
A successful exploit would allow hackers to execute their attack code in kernel mode, which would then let them infect the PC with malware or pillage any data on the machine.
The flaw exists in several versions of Windows, including XP SP3, Server 2003 R2, Vista, Windows 7 and Windows Server 2008 SP2, said Secunia, which rated the bug as "less critical," the firm's second-lowest threat ranking.
Microsoft has patched 13 Windows kernel vulnerabilities this year. In June, for example, MS10-032 patched three vulnerabilities in Win32k.sys; in April, it quashed eight bugs with MS10-021 ; and in February, MS10-015 fixed two flaws.
One researcher with experience digging up kernel bugs said the latest is business as usual. "I don't think there's been more than a few days this year that Microsoft [hasn't] been vulnerable to public kernel flaws," said Tavis Ormandy on Twitter . Ormandy reported three of this year's kernel vulnerabilities to Microsoft.
Most of those bugs were rated as "important," Microsoft's second-highest ranking, because they could not be exploited remotely, but required an attacker to have physical access to the PC and valid log-in credentials. It's likely that Dabah's find will as well.
Microsoft will issue 14 security updates, including 10 for Windows, on Tuesday. But unless the company found Dabah's flaw on its own, or the vulnerability was reported by another researcher earlier -- it's not unheard of for several researchers to stumble across the same bug -- a fix won't appear until September or later.
Artwork: Chip TaylorAccording to Gil Dabah, a researcher from Tel Aviv who goes by the nickname "arkon," the Windows' kernel harbors a heap overflow vulnerability. Dabah also posted a short proof-of-concept to demonstrate the bug on RageStorm.com, a site he and two others run.
"Microsoft is investigating reports of a possible vulnerability in Windows Kernel," said Jerry Bryant on Friday. "Upon completion of the investigation, Microsoft will take appropriate actions to protect customers." Microsoft issues regular patches, but last week released a fix for a critical zero-day hole.
In an alert published Friday , Danish bug tracker Secunia pinpointed the bug in the "Win32k.sys" kernel-mode device driver, the kernel component of the Windows subsystem. Attackers could exploit the flaw using "GetClipboardData," an API (application programming interface) that retrieves data from the Window clipboard.
A successful exploit would allow hackers to execute their attack code in kernel mode, which would then let them infect the PC with malware or pillage any data on the machine.
The flaw exists in several versions of Windows, including XP SP3, Server 2003 R2, Vista, Windows 7 and Windows Server 2008 SP2, said Secunia, which rated the bug as "less critical," the firm's second-lowest threat ranking.
Microsoft has patched 13 Windows kernel vulnerabilities this year. In June, for example, MS10-032 patched three vulnerabilities in Win32k.sys; in April, it quashed eight bugs with MS10-021 ; and in February, MS10-015 fixed two flaws.
One researcher with experience digging up kernel bugs said the latest is business as usual. "I don't think there's been more than a few days this year that Microsoft [hasn't] been vulnerable to public kernel flaws," said Tavis Ormandy on Twitter . Ormandy reported three of this year's kernel vulnerabilities to Microsoft.
Most of those bugs were rated as "important," Microsoft's second-highest ranking, because they could not be exploited remotely, but required an attacker to have physical access to the PC and valid log-in credentials. It's likely that Dabah's find will as well.
Microsoft will issue 14 security updates, including 10 for Windows, on Tuesday. But unless the company found Dabah's flaw on its own, or the vulnerability was reported by another researcher earlier -- it's not unheard of for several researchers to stumble across the same bug -- a fix won't appear until September or later.
Indian outsourcing industry hits out at US visa bill
NEW DELHI — India's flagship outsourcing industry has slammed a US bill that could double the cost of a work visa in a move targeting high-profile Indian software exporters. The measure would boost annual US visa costs for India?s outsourcing industry by 200-250 million dollars annually, the National Association of Software and Services Companies (NASSCOM) warned.
S. Gopalakrishnan, chief executive of India's second-largest outsourcer Infosys Technologies, told reporters late Monday he was "saddened and disheartened" by the step and said the sector would lobby strongly against it.
India, which already holds at least 50 percent of the global outsourcing market, has become the world's back office where Western firms set up call centres, number-crunching and software development outlets to cut costs.
But the 50-billion-dollar industry also sends skilled workers to the United States to develop software and direct projects for US clients.
The visa legislation, sponsored by two Democratic senators and passed unanimously by the Senate last week, still needs to be approved by the US House of Representatives and signed into law by President Barack Obama.
The row has erupted as India gets ready to host Obama later this year.
With anti-outsourcing anger stoked by high US unemployment, critics denounce the Indian firms as "body shops" because they provide Indian professionals to US companies rather than employing Americans.
"We think it (the bill) goes against the notion of free trade and is discriminatory," India's third-largest outsourcer, Wipro, said in a statement.
The measure would raise by 2,000 dollars per application the US fee paid by any company with more than 50 people in which over half the workforce has H-1B and L-1 visas earmarked for skilled foreign workers, industry officials say.
The current visa fee is 2,500 dollars.
The proposal is to use proceeds from the fee hike to pay for the US government's plans to boost security along its border with Mexico to help crack down on illegal immigration and drug smuggling.
"While we understand the need for heightened border security, we believe the extra fees will produce negative consequences for both US and Indian companies," said NASSCOM president Som Mittal.
Sponsors of the bill on a Senate website said the legislation would hike fees on particular Indian companies -- including Wipro, Infosys, Tata and Satyam -- which they accuse of seeking to "exploit" the two categories of visas to "import foreign workers into the United States."
Indian IT firms fly thousands of employees each year to the United States to work at their clients' locations as on-site technicians and engineers in what critics claim is a violation of the "spirit" of US immigration law.
US high-tech firms such as Microsoft, which bring skilled immigrants into the United States on the same visas, would not be hit by the bill as the vast majority of their workforce is composed of Americans.
"US companies, which use the bulk of these visas, would remain unaffected by the legislation," NASSCOM's Mittal said. "This is simply unfair to foreign companies."
S. Gopalakrishnan, chief executive of India's second-largest outsourcer Infosys Technologies, told reporters late Monday he was "saddened and disheartened" by the step and said the sector would lobby strongly against it.
India, which already holds at least 50 percent of the global outsourcing market, has become the world's back office where Western firms set up call centres, number-crunching and software development outlets to cut costs.
But the 50-billion-dollar industry also sends skilled workers to the United States to develop software and direct projects for US clients.
The visa legislation, sponsored by two Democratic senators and passed unanimously by the Senate last week, still needs to be approved by the US House of Representatives and signed into law by President Barack Obama.
The row has erupted as India gets ready to host Obama later this year.
With anti-outsourcing anger stoked by high US unemployment, critics denounce the Indian firms as "body shops" because they provide Indian professionals to US companies rather than employing Americans.
"We think it (the bill) goes against the notion of free trade and is discriminatory," India's third-largest outsourcer, Wipro, said in a statement.
The measure would raise by 2,000 dollars per application the US fee paid by any company with more than 50 people in which over half the workforce has H-1B and L-1 visas earmarked for skilled foreign workers, industry officials say.
The current visa fee is 2,500 dollars.
The proposal is to use proceeds from the fee hike to pay for the US government's plans to boost security along its border with Mexico to help crack down on illegal immigration and drug smuggling.
"While we understand the need for heightened border security, we believe the extra fees will produce negative consequences for both US and Indian companies," said NASSCOM president Som Mittal.
Sponsors of the bill on a Senate website said the legislation would hike fees on particular Indian companies -- including Wipro, Infosys, Tata and Satyam -- which they accuse of seeking to "exploit" the two categories of visas to "import foreign workers into the United States."
Indian IT firms fly thousands of employees each year to the United States to work at their clients' locations as on-site technicians and engineers in what critics claim is a violation of the "spirit" of US immigration law.
US high-tech firms such as Microsoft, which bring skilled immigrants into the United States on the same visas, would not be hit by the bill as the vast majority of their workforce is composed of Americans.
"US companies, which use the bulk of these visas, would remain unaffected by the legislation," NASSCOM's Mittal said. "This is simply unfair to foreign companies."
Wipro recognized as first bluetooth test facility in INDIA
BANGALORE: Global software major Wipro Technologies has been recognised as India's first Bluetooth qualification test facility by the Bluetooth trade association, the IT bellwether said late Tuesday.
Bluetooth is an open wireless technology standard for exchanging data over short distances (using short length radio waves) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security.
The recognition makes Wipro competent to perform Bluetooth qualification conformance or compliance tests, the company said in a statement here.
"We will test products submitted by members of the Bluetooth special interest group at our test lab in the electronics city campus. The tests will also include Bluetooth protocol conformance," said Wipro vice-president C.P. Gangadharaiah.
Bluetooth qualification is the certification process required for any product using Bluetooth wireless technology and a pre-condition of the intellectual property (IP) license for Bluetooth technology.
"India is known for its strong software expert pool. Many profiles and protocol stacks of Bluetooth-enabled products were developed in India. This market is influential in the Bluetooth original equipment manufacturer (OEM) automotive market and in the Bluetooth mobile advertising," Bluetooth chief technology officer Andy Glass said in the statement.
Bluetooth technology has expanded beyond headset and mobile phone applications to high-growth market segments, including health and fitness and gaming.
"Gaming is the second largest application in terms of Bluetooth shipments. About 1,000 new Bluetooth enabled product designs were evolved and over 3,000 Bluetooth enabled products were tested and qualified in 2009," Glass added.
Bluetooth is an open wireless technology standard for exchanging data over short distances (using short length radio waves) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security.
The recognition makes Wipro competent to perform Bluetooth qualification conformance or compliance tests, the company said in a statement here.
"We will test products submitted by members of the Bluetooth special interest group at our test lab in the electronics city campus. The tests will also include Bluetooth protocol conformance," said Wipro vice-president C.P. Gangadharaiah.
Bluetooth qualification is the certification process required for any product using Bluetooth wireless technology and a pre-condition of the intellectual property (IP) license for Bluetooth technology.
"India is known for its strong software expert pool. Many profiles and protocol stacks of Bluetooth-enabled products were developed in India. This market is influential in the Bluetooth original equipment manufacturer (OEM) automotive market and in the Bluetooth mobile advertising," Bluetooth chief technology officer Andy Glass said in the statement.
Bluetooth technology has expanded beyond headset and mobile phone applications to high-growth market segments, including health and fitness and gaming.
"Gaming is the second largest application in terms of Bluetooth shipments. About 1,000 new Bluetooth enabled product designs were evolved and over 3,000 Bluetooth enabled products were tested and qualified in 2009," Glass added.
Sunday, August 8, 2010
What is phishing?
Phishing is a type of attack whose goal is to steal private information, such as login credentials or credit card numbers, usually to carry out various types of financial fraud. An attacker impersonates a trusted entity, such as a bank, government, ISP, or large web site, and tries to trick people into giving up their private information. These attacks often take the form of "urgent" emails asking people to take immediate action in order to prevent some impending disaster. Examples include topics such as the following:
- "Our bank has a new security system. Update your information now or you won't be able to access your account."
- "We couldn't verify your information; click here to update your account."
- Sometimes the email claims that something awful will happen to the sender (or a third party), as in "The sum of $30,000,000 is going to go to the Government unless you help me transfer it to your bank account."
The concept behind such an attack is simple: Someone masquerades as someone else in an effort to deceive people into sharing personal or other sensitive information with them. Phishers can masquerade as just about anyone, including banks, email and application providers, online merchants, online payment services, and even governments. And while some of these attacks are crude and easy to spot, many of them are sophisticated and well constructed. That fake email from "your bank" can look very real; the bogus "login page" you're redirected to can seem completely legitimate.
If you think you may have encountered a phishing site, please report the suspicious site to us.
How to Hack Facebook Password using keylogger
Hacking Facebook Account Password: Facebook Keylogging for Hacking Facebook
Everyday I get emails wherein my readers ask me How to Hack a Facebook Account? You as the reader are most likely reading this because you want to hack into someone’s facebook account. So in this post I have decided to uncover the real and working way to hack any facebook account. Actually there are many ways to hack someones facebook password like Phishing, Keylogging or using Hacking softwares used to hack facebook password. In this post i'm going to show you how to hack someones facebook account password using a keylogger - Emissary Keylogger.
How to Hack Facebook Password using Keylogger?
1. First of all Download Emissary Keylogger. It takes screenshots of the victim's computer and sends it to your gmail along with the logs.
2. Make sure that you have Microsoft .Net Framework installed in your Windows. You can download it from www.microsoft.com/net/. Else it won't work.
3. Extract the files using WinRar or any other zip/unzip program.
4. Open "Emissary.exe" to see something like this:
How to Create Your Own Phisher to Hack Any Website Account Password
Learn how to hack any website account password | Phishing Creator Tool
Previously i've posted how to hack websites using phishing, like eBay, Gmail and Facebook. Here i want to show you how to make a phishing page using a Phishing Creator - Super Phisher and get account information for various websites from many people. Тhis is the easyest and also a very effectively way to make a phisher and hack any website account password.

Here are some features of Super Phisher:
- Fastest phisher maker tool ever
- Makes phisher for almost any site
- Useful for users who dont knows HTML, PHP coding
- No manual work except entering URL of website, for which u want to make phisher
- Fully automated tool
- Small in size.
- Instant access to phishers you created.
Thursday, August 5, 2010
Censor Talk: DON SEENU (Exclusive)
Mass Hero RAVI Teja Upcoming movie “DON SEENU” is purely a laugh riot..A movie purely based on point “A boy who is inspired from amitabh’s ‘DON’ and wanna be DON after he grows up”
Recently on Aug 03, movie passed through censor recieved U/A (Unrestricted Public Exhibition with parental guidance for children below 12 years) cerificate.Except Two minor Cuts(violence scene and hot bits in song), no major edits have Censor people done with it.Movie made with budget of 23crores .Movie 160+ min run time .
Recently on Aug 03, movie passed through censor recieved U/A (Unrestricted Public Exhibition with parental guidance for children below 12 years) cerificate.Except Two minor Cuts(violence scene and hot bits in song), no major edits have Censor people done with it.Movie made with budget of 23crores .Movie 160+ min run time .
USA wasted $ 1024 Billions on War from 2001 for what?
The calculator busily counting out how much money the United States has spent on wars since 2001 has raced past $1 trillion — $1,024 billion plus at the start of August. There is little point in trying to give a more refined figure since the clock ticks remorselessly on, mesmerizingly faster than you can write the sum down, about $260,000 blown away in each passing minute.*
Meanwhile, the wars are being lost rather than won, U.S. and allied soldiers are dying and being maimed every day, tens and sometimes hundreds of innocent civilians are killed daily, and billions of dollars are being wasted and millions of lives being destroyed for no good reason apart from the overweening egos of politicians who are not prepared to admit that they are wrong.
25 Facts of A R Rahman
1. Rahman has no nick names. All the family members including sisters and his mom call him “Rahman” with full fleged love and affection.
2. Due to the family situation Rahman discontinued his studies in Padma Sheshadree Higher Secondary School during his 9th.
3. Rahman doesnt celebrate his birthday in a grandeur way. Early morning prayers, orphanage visits are the activities he do on that day peacefully.
Wednesday, August 4, 2010
What is Solar Tsunami?
While almost everyone knows about the tsunami, that refers to destructive waves of the sea, the news of solar tsunami heading towards Earth has left the world jittery of the relatively new and unknown phenomenon.
Solar Tsunami is a towering wave of hot plasma racing across the sun's surface. It has suddenly grabbed the attention of the inhabitants of the third planet from the sun as the news of the waves heading towards earth hit the headlines on Tuesday, Aug 3.
Solar Tsunami is a towering wave of hot plasma racing across the sun's surface. It has suddenly grabbed the attention of the inhabitants of the third planet from the sun as the news of the waves heading towards earth hit the headlines on Tuesday, Aug 3.
Monday, August 2, 2010
Beauty of Mathematics! !!!!!!
1 x 8 + 1 = 9
12 x 8 + 2 = 98
123 x 8 + 3 = 987
1234 x 8 + 4 = 9876
12345 x 8 + 5 = 98765
123456 x 8 + 6 = 987654
1234567 x 8 + 7 = 9876543
12345678 x 8 + 8 = 98765432
123456789 x 8 + 9 = 987654321
1 x 9 + 2 = 11
12 x 9 + 3 = 111
123 x 9 + 4 = 1111
1234 x 9 + 5 = 11111
12345 x 9 + 6 = 111111
123456 x 9 + 7 = 1111111
1234567 x 9 + 8 = 11111111
12345678 x 9 + 9 = 111111111
123456789 x 9 +10= 1111111111
This is what happens in ZIMBABWE!!!!!
This is what it looks like in Zimbabwe?????
(Inflation at 231 million percent a year has meant 25 million Zimbabwe dollars equals to just 1 US dollar)
The pictures below look funny, but the story is really sad??..
Visiting the neighborhood grocer!
Seen water falls??? Now see Fire falls... !!!
Yosemite National Park, California, USA
This park was gazetted as a national park in 1890. It is world famous for its rugged terrain, geysers, waterfalls and century-old pine trees. It covers 1200 sq km and the "fire" waterfall of El Capitan is one of the most spectacular of all scenery.
The spectacular view of the waterfall is created by the reflection of sunlight hitting the falling water at a specific angle. This rare sight can only be seen during a 2-week period towards the end of Feburary. To photograph this rare event, photographers would often have to wait and endure years of patience in order to capture it. The reason is because its appearance depends on a few natural phenomena occurring at the same time, and luck.
First is the formation of the waterfall. The water is formed by the melting of snow and ice at the top of the mountain. It melts between the month of December and January and by the end of February there might not be much snow left to melt.
Second is the specific angle of the sun’s rays hitting the falling water. The sun's position must be exactly at a particular spot in the sky. This occurs only in the month of February and during the short minutes of dusk. If it is a day full of clouds or something is obscuring the sun, you can only take pictures of your own sorry faces on the waterfall. It coincides with the fact that the weather in the National Park at that time of the year is often volatile and unpredictable. It compounds the difficulty of getting these pictures.
However, someone DID and we all get to see them!!!
Amazing Snake with a Human Head: Can you see it?
It’s over 5,000 miles from Greece but residents from Pahang in Malaysia claim to have found a Gorgon, like the famed Medusa.
The strange creature, which has the body of a snake and the head of a human, was reportedly captured by Malaysian aborigines. The story goes that the men spotted two of the beasts, one male and one female, but only managed to catch the female. Witnesses claimed that the creature initially begged to be released back into the mountains, others say it was trying to summon the male monster to come and rescue it.
The top most dangerous websites for your PC enlisted
Internet security company Norton Symantec has come up with a list of Top Dirtiest sites, which could infect your computer with malware.
Malware is a software that can damage or compromise a computer system without the owner''''s consent.
Natalie Connor, spokeswoman of the anti-virus company, said that even visiting any of the named websites could expose a computer to infection and put the personal information into the hands of unwanted people.
"What people don''''t realise is when you type in a website, you''''re bringing down information on a page and with it could be malware," News.com.au quoted her as saying.
Malware is a software that can damage or compromise a computer system without the owner''''s consent.
Natalie Connor, spokeswoman of the anti-virus company, said that even visiting any of the named websites could expose a computer to infection and put the personal information into the hands of unwanted people.
"What people don''''t realise is when you type in a website, you''''re bringing down information on a page and with it could be malware," News.com.au quoted her as saying.
New Look of New 10 Rupee Indian Coin
New Indian rupee – New Indian Coin: Take a look at the New Indian Coin. This new Indian coin has been approved by the Indian government as a new symbol for Indian Rupee and this is the newest look of Rs. 10 coin
The Indian rupee symbol is a mix of the Devanagri ‘Ra’ and Roman ‘R’, and becomes the fifth currency in the world to have such a distinct identity. As you are aware, this new Indian rupee symbol is designed by IIT post-graduate D Uday Kumar and has been approved by the Union Cabinet today.
The new Indian rupee will now join the elite club of US dollar, British pound-sterling, Euro and Japanese Yen to have its own symbol.
The response received for this new Indian rupee symbol has already been great
The Indian rupee symbol is a mix of the Devanagri ‘Ra’ and Roman ‘R’, and becomes the fifth currency in the world to have such a distinct identity. As you are aware, this new Indian rupee symbol is designed by IIT post-graduate D Uday Kumar and has been approved by the Union Cabinet today.
The new Indian rupee will now join the elite club of US dollar, British pound-sterling, Euro and Japanese Yen to have its own symbol.
The response received for this new Indian rupee symbol has already been great
Subscribe to:
Posts (Atom)