Pls Click... its great

Friday, May 28, 2010

The next Apple TV revealed: cloud storage and iPhone OS on tap... and a $99 price tag

355diggsdiggIf you thought that Apple's foray into the world of home entertainment died with the last iteration of the Apple TV, you're quite wrong. A tip we've received -- which has been confirmed by a source very close to Apple -- details the outlook for the next version of the Apple TV, and it's a doozy. According to our sources, this project has been in the works long before Google announced its TV solution, and it ties much more closely into Apple's mobile offerings. The new architecture of the device will be based directly on the iPhone 4, meaning it will get the same internals, down to that A4 CPU and a limited amount of flash storage -- 16GB to be exact -- though it will be capable of full 1080p HD (!). The device is said to be quite small with a scarce amount of ports (only the power socket and video out), and has been described to some as "an iPhone without a screen." Are you ready for the real shocker? According to our sources, the price-point for the device will be $99. One more time -- a hundred bucks.

Not only will this be priced to sell (like hotcakes), it seems that Apple is moving away from the model of local storage, and will be focusing the new ATV on cloud-based storage (not unlike Amazon's streaming scheme, though we're talking instant-on 1080p, a la Microsoft). For those still interested in keeping their content close, there will be an option to utilize a Time Capsule as an external storage component, but the main course will be all about streaming. The new ATV will do away with its current OS X-lite variation as a operating system, and will instead adopt the iPhone OS for the underlying experience. There's no word at this point on whether apps and the App Store will be coming along for the ride, but it makes sense given the shared platform. Of course, scaling iPhone apps to that 52-inch plasma in your living room isn't exactly a no-brainer. Perhaps not surprisingly, Apple won't deliver the ATV news at the upcoming WWDC -- that event will be focused on the capabilities of the new iPhone -- but development on the product is most definitely full steam ahead. Is your TV screen the next battleground in the platform wars? Survey says: hell yes.

Windows 7 Themes For Xp.


Free Windows XP Themes

About windows themes and how to install

  1. Download and install UXtheme patcher
  2. Download a Windows Theme below
  3. Unzip to C:\WINDOWS\Resources\Themes
  4. Right click Desktop / Properties / Appearance
  5. Choose your theme and apply
  6. All themes are from our friend Kol at Studio Twenty Eight
  7. Windows 7 Themes are coming soon!
Download UXTHEME PATCHER FOR WINDOWS XP
Win xp theme

9 Websites To Show You The Hottest Stuff on Twitter Now

We’ve already taken a look at how to find currently popular online stuff from different sources, but there’s no denying the magnitude of content that can be found in just one place – on Twitter. There are countless ways to filter through the noise, and find the tweets about stuff that matters to you, whether it’s based on a specific topic or based on popularity.

In this article, we’ll take a look at search Twitter for the most popular stories by the number of retweets or favourites a tweet receives, as well as how to find specific kinds of interesting information on Twitter.

Search Twitter For Information Based On Popularity

TweetMeme

There are a variety of services for finding the most retweeted blog posts, stories and articles linked on Twitter, the most popular and influential of which is TweetMeme. Stories on TweetMeme can be browsed by the most popular from all categories in the past 24 hours, the past 7 days, or by specific categories including Entertainment, Comedy, Gaming, and Technology amongst others.

Content can be further broken down by News, Images and Videos. TweetMeme also allows you to keep up to date with the content on their site by subscribing to their RSS feeds. TweetMeme is also searchable if you want to find the hottest stories on specific topics.

twitter search

Logging into TweetMeme with your Twitter account will then enable you to retweet the stories that you want to share with your followers directly from within their website.

twitter search

TweetMeme also have a few extra goodies for users including a bookmarklet, a retweet button or chicklet for your blog posts, and plugins making it easy to incorporate the button on your blog.

DailyRT

DailyRT takes a similar approach to TweetMeme, by ranking the most popular Tweets in the past hour, 24 hours or 7 days. The difference however, is that the content is not limited to blog posts and articles, but also includes the most popular tweets in general.

twitter search engine

This does have its downside of course, as the most popular tweets are not necessarily the most informative. Using their search feature however allows users to harness the information found on DailyRT and get the most out of it. One interesting feature found on DailyRT includes the ability to search for the most retweeted items from specific users.

twitter search engine

Logging in with your Twitter account allows you to retweet directly from the website, but gives you no choice in the wording, and each retweet includes a direct link to the DailyRT homepage. DailyRT has a list on Twitter of the 50 most retweeted members on Twitter.

Thoora

Thoora is another site that plugs into the information on Twitter letting people know what the most popular stories are, but it also gets its statistics from the number of blog posts and news articles covering a certain topic. Each article is accompanied by the number of retweets as well as the number of articles or blog posts found online.

twitter search engine

Information is broken down into categories including Business, Controversy and Sci/Tech, amongst others. Stories can also be browsed by the newest developing stories, stories that are currently popular and by those that have been popular for the past week.

Signing up for an account allows you to share the content on Facebook, Buzz, Twitter and via Email, and discuss the stories on the website. Opening up any given story is where Thoora truly excels in comparison to other similar sites. It provides users with statistics on the story, recent tweets about it, links from blogs and official news sources.

Finding Tweets With The Most Favourites

Favstar

Another method of tracking popularity on Twitter is keeping track of how many favourites any given tweet has. Favstar does just that. This might not necessarily lead to a wealth of information and links, but it’s interesting and funny nonetheless. The website gives users a way to pass some free time, reading jokes, interesting witticisms and commentaries on current affairs, and you’ll even find the occasional link to an article or video.

search twitter keywords

Tweets are divided into popular, rising and new. Signing in with your Twitter account allows you to quickly follow interesting users featured on Favstar, add tweets to your favourites, and even retweet. Favstar should however come with a warning that it is not at all PG. Favstar also has a three lists worth following – Tech and Social Media Tweeters, Celebrity Tweeters and Funny, Entertaining or Insightful Tweeters.

search twitter keywords

You can also search Twitter for specific users to see which of their tweets have received the most favourites. The website is available in English, German and Japanese.

Finding Job Listings

Micro.Vois

Micro.Vois features tweets relating to freelance work. Tweets listed on the site are divided into users looking for freelancer work, and users who are looking to hire freelancers – and it does so in a very simple way. Micro.Vois uses Twitter’s hashtags to label the tweets, using #havework or #wantwork to distinguish the tweets from the rest of the chatter online.

search twitter keywords

The listings can also be further narrowed down by profession, with web development, programming, graphics, writing and miscellaneous jobs.

TweetyJobs

TweetyJobs is another site that features job listings mentioned on Twitter. One main difference between Micro.Vois and TweetyJobs is the fact that the latter is searchable. You can search for a specific job title in a specific city or zip code, and filter the results into either listings from corporate sites or Twitter.

Finding Items for Sale

TwitShop

TwitShop is another listings site that uses Twitter’s hashtags to aggregate its information. If you have an item for sale, appending the hashtags, #forsale, #4sale or #auction, will ensure that your tweet shows up on the site.

TwitShop is searchable, so if you want to buy something in particular from another Twitter user, it’s easy to find.

CheapTweet

CheapTweet, like TwitShop, aggregates items that are for sale on Twitter. It features listings in a variety of categories including Tech, Food and Home & Family, amongst others. Not only does it provide you with listings, but users can also vote on how good a deal each listing is.

Finding Popular Music

We Are Hunted

We Are Hunted is a slick site which combs Twitter, along with other social media sites like Facebook and MySpace to give you a list of the 99 most popular songs at the moment. If you want to listen to all 99 songs, simply start at number 1, and it will automatically play through the entire list. You can also limit the results to only the songs that are popular on Twitter.

It also allows you to share any given song on Twitter, Facebook or via email. If you want a more extensive list of what music is currently popular on Twitter, check out David’s article on using The Hype Machine to do just that.

In the the future, we’ll take a look at more ways to search Twitter to get the most out of the content, including finding out what new movies are popular on Twitter, how to find personalised content for you, and sites that list all the information available on specific topics.

How do you find the content that matters to you on Twitter? Let us know in the comments.

Change Your IP Address and Surf The Web Anonymously

Download Invisible IP Map to surf anonymously in internet. Hide your IP and encrypt your connection.

Previously i've posted "How to find the IP address of the email sender in Yahoo! Mail" and "How to Track the location of an IP address". In this article i'm going to show you a software, Invisible IP Map, that can make you be "anywhere" in world. People that hack sites will need this small baby to help em on the way. This tool will put you in selected location all around the world XD.

Invisible IP Map is user-friendly software that masks your real location. Every computer that is connected to the Internet has its own IP address which could easily be located on a map. This program will help you show yourself like you are surfing from another place on the planet.


Product Information:

This is a Mask IP software which is used to change your real Internet address while browsing. The software will deliver you fresh anonymous proxy servers every time you decide to click on "Get IP Locations". The main benefit of this software is that you can't be traced when browsing websites. Also if a website is restricted for users from specified country the program can bypass that protection. By hiding your IP you will prevent receiving spam from marketers which know your interests by tracking your IP when browsing websites. You can use web based e-mail to send anonymous e-mail. Post on bulletin boards without displaying your real IP address.

Main Screens:



  • Map Menu: This is they key part of the software. Here you can change your IP address, retreive IP locations, get information about your IP location or the location of the other server. In addition, you can recheck the servers.
  • IP Information: This screen will give you all the information about your IP and the remote IP. You can see information such as city, region, country, distance between you and the remote server, server type, timeout etc.
  • Custom proxy checker: The proxy checker is specially designed for those of you who have own proxy lists. You can add them to the checker and check whether they are working.
  • VIP Servers: This is optional add-on for Invisible IP Map software. The VIP servers will give you a high-speed internet access with 128 Bit SSL encryption.

Download Invisible IP Map

How To Activate :

1. Replace the original "Options.ini" in the program files folder with the one in the RAR (downloaded one ) and then open the program again. Don't use the details in the ini.


2. After doing that here are the results:


Serial Number for Invisible IP Map:

NAME: SIR_WILLIAMZ
EMAIL: SIRWILLIAMZ@YAHOO.CA
SERIAL: 00822631340408026

This is a very great software and i recommend you to try it. Enjoy :)

Do you have questions, comments, or suggestions? Feel free to post a comment!

Hack E-Mail Account Password - Email Hacking Software

How to Hack E-Mail Account Passwords Using Trojans and Keyloggers

I've been posting a lot about Email Hacking on this blog. Now you know that there are many ways to hack email password, like bruteforcing, social engineering or Reverting, but the main two methods used to hack email passwords are Remote Keylogging and Phishing. In this article i'll show you how to hack email account password using keyloggers and trojans. Here I am demonstrating using PRORAT trojan. You can use any trojan or keylogger as per your ease. The basic functionality of all backdoors are same. Pls make note that all these hacking tools and softwares are detected by antivirus. You have to uninstall or close you running antivirus first. Now we can start.

How to Hack Email Account Passwords Using ProRat?


1. First of all Download ProRat. Once it is downloaded right click on the folder and choose to extract it. A password prompt will come up. The password will be "pro".

2. Open up the program. You should see the following:


3. Next we will create the ProRat Trojan server. Click on the "Create" button in the bottom. Choose "Create ProRat Server".


4. Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message. We will not be using the rest of the options.


5. Now Open General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.

Here is a quick overview of what they mean and which should be checked:


6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. A good suggestion is a picture or an ordinary text document because that is a small file and its easier to send to the people you need.


7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I prefer using .exe files, because it is cryptable and has icon support, but exe’s looks suspicious so it would be smart to change it.


8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document.

9. After this, press Create server, your server will be in the same folder as ProRat. A new file with name "binded_server" will be created. Rename this file to something describing the picture. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it.

Very important: Do not open the "binded_server" file on your system.

10. You can send this trojan server via email, pendrive or if you have physical access to the system, go and run the file. You can not send this file via email as "server.exe", because it will be detected as trojan or virus. Password protect this file with ZIP and then email it. Once your victim download this ZIP file, ask him to unlock it using ZIP password. When the victim will double click on the file, he will be in your control.

11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next.

Once the victim runs the server on his computer, the trojan will be installed onto his computer in the background. The hacker would then get a message telling him that the victim was infected. He would then connect to his computer by typing in his IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to the victims computer and have full control over it.


12. Now the hacker has a lot of options to choose from as you can see on the right. He has access to all victim's computer files, he can shut down his pc, get all the saved passwords off his computer, send a message to his computer, format his whole hard drive, take a screen shot of his computer, and so much more. Below I’ll show you a few examples.


13. The image below shows the message that the victim would get on his screen if the hacker chose to message him.


14. Below is an image of the victims task bar after the hacker clicks on Hide Start Button.


15. Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.


As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected. Many skilled hackers can program their own viruses and Trojans that can easily bypass anti-virus programs.

Do you have questions, comments, or suggestions? Feel free to post a comment!

Hack E-Mail Account Password - Email Hacking Software

How to Hack E-Mail Account Passwords Using Trojans and Keyloggers

I've been posting a lot about Email Hacking on this blog. Now you know that there are many ways to hack email password, like bruteforcing, social engineering or Reverting, but the main two methods used to hack email passwords are Remote Keylogging and Phishing. In this article i'll show you how to hack email account password using keyloggers and trojans. Here I am demonstrating using PRORAT trojan. You can use any trojan or keylogger as per your ease. The basic functionality of all backdoors are same. Pls make note that all these hacking tools and softwares are detected by antivirus. You have to uninstall or close you running antivirus first. Now we can start.

How to Hack Email Account Passwords Using ProRat?


1. First of all Download ProRat. Once it is downloaded right click on the folder and choose to extract it. A password prompt will come up. The password will be "pro".

2. Open up the program. You should see the following:


3. Next we will create the ProRat Trojan server. Click on the "Create" button in the bottom. Choose "Create ProRat Server".


4. Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message. We will not be using the rest of the options.


5. Now Open General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.

Here is a quick overview of what they mean and which should be checked:


6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. A good suggestion is a picture or an ordinary text document because that is a small file and its easier to send to the people you need.


7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I prefer using .exe files, because it is cryptable and has icon support, but exe’s looks suspicious so it would be smart to change it.


8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document.

9. After this, press Create server, your server will be in the same folder as ProRat. A new file with name "binded_server" will be created. Rename this file to something describing the picture. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it.

Very important: Do not open the "binded_server" file on your system.

10. You can send this trojan server via email, pendrive or if you have physical access to the system, go and run the file. You can not send this file via email as "server.exe", because it will be detected as trojan or virus. Password protect this file with ZIP and then email it. Once your victim download this ZIP file, ask him to unlock it using ZIP password. When the victim will double click on the file, he will be in your control.

11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next.

Once the victim runs the server on his computer, the trojan will be installed onto his computer in the background. The hacker would then get a message telling him that the victim was infected. He would then connect to his computer by typing in his IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to the victims computer and have full control over it.


12. Now the hacker has a lot of options to choose from as you can see on the right. He has access to all victim's computer files, he can shut down his pc, get all the saved passwords off his computer, send a message to his computer, format his whole hard drive, take a screen shot of his computer, and so much more. Below I’ll show you a few examples.


13. The image below shows the message that the victim would get on his screen if the hacker chose to message him.


14. Below is an image of the victims task bar after the hacker clicks on Hide Start Button.


15. Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.


As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected. Many skilled hackers can program their own viruses and Trojans that can easily bypass anti-virus programs.

Do you have questions, comments, or suggestions? Feel free to post a comment!