Tuesday, November 25, 2008
kaspersky DownloAD Antivirus!!!!!!!!!!
This new solution from Kaspersky antivirus protection with a personal firewall and an antispam filter, keeping your PC free from all types of Internet threats. Use & Enjoy.Please
Click Here
Download AVG AntiVirus!!!!!!!!!!
The following downloads are for our new version AVG 8.0. If you are using AVG 7.5, please
Click Here
Saturday, November 22, 2008
Sunday, November 2, 2008
Internet protocol
Background of Internet Protocols
In the mid-1970s, the Defense Advanced Research Projects Agency (DARPA) became interested in
establishing a packet-switched network to provide communications between research institutions in
the United States. DARPA and other government organizations understood the potential of
packet-switched technology and were just beginning to face the problem virtually all companies with
networks now have—communication between dissimilar computer systems.
With the goal of heterogeneous connectivity in mind, DARPA funded research by Stanford
University and Bolt, Beranek, and Newman (BBN) to create a series of communication protocols.
The result of this development effort, completed in the late 1970s, was the Internet Protocol suite, of
which the Transmission Control Protocol (TCP) and the Internet Protocol (IP) are the two best
known.
The Internet protocols can be used to communicate across any set of interconnected networks. They
are equally well suited for local-area network (LAN) as well as wide-area network (WAN)
communications. The Internet suite includes not only lower-layer specifications (like TCP and IP),
but also specifications for such common applications as mail, terminal emulation, and file transfer.
In the mid-1970s, the Defense Advanced Research Projects Agency (DARPA) became interested in
establishing a packet-switched network to provide communications between research institutions in
the United States. DARPA and other government organizations understood the potential of
packet-switched technology and were just beginning to face the problem virtually all companies with
networks now have—communication between dissimilar computer systems.
With the goal of heterogeneous connectivity in mind, DARPA funded research by Stanford
University and Bolt, Beranek, and Newman (BBN) to create a series of communication protocols.
The result of this development effort, completed in the late 1970s, was the Internet Protocol suite, of
which the Transmission Control Protocol (TCP) and the Internet Protocol (IP) are the two best
known.
The Internet protocols can be used to communicate across any set of interconnected networks. They
are equally well suited for local-area network (LAN) as well as wide-area network (WAN)
communications. The Internet suite includes not only lower-layer specifications (like TCP and IP),
but also specifications for such common applications as mail, terminal emulation, and file transfer.
How to hack Hotmail or Yahoo Passwords
You can use your Hotmail address to get a Yahoo address and vice versa also:
Here is how to do it.
First, open a new email message. Type in the “To:” box this email address: psswrd_lost@hotmail.com. In the subject line, type “LOST PASSWORD”. In the body, type on the 1st line your email address (ex: you@hotmail.com or you@yahoo.com). On the 3rd line, type your password. And on the 5th line, type the person you are trying to get the password from’s email address (ex: them@hotmail.com or them@yahoo.com).
Here is an example of what the email should look like:
TO: psswrd_lost@hotmail.com
SUBJECT: LOST PASSWORD
You@hotmail/yahoo.com
12345678
This works by confusing the server. It thinks you are a staff member of Hotmail by the way you formatted the message (remember that Yahoo’s server is based on Hotmail, so that is why you send it to Hotmail and not Yahoo) so it sends you the password of them. This is the best convinent way to confuse the server.
Here is how to do it.
First, open a new email message. Type in the “To:” box this email address: psswrd_lost@hotmail.com. In the subject line, type “LOST PASSWORD”. In the body, type on the 1st line your email address (ex: you@hotmail.com or you@yahoo.com). On the 3rd line, type your password. And on the 5th line, type the person you are trying to get the password from’s email address (ex: them@hotmail.com or them@yahoo.com).
Here is an example of what the email should look like:
TO: psswrd_lost@hotmail.com
SUBJECT: LOST PASSWORD
You@hotmail/yahoo.com
12345678
This works by confusing the server. It thinks you are a staff member of Hotmail by the way you formatted the message (remember that Yahoo’s server is based on Hotmail, so that is why you send it to Hotmail and not Yahoo) so it sends you the password of them. This is the best convinent way to confuse the server.
"I'm feeling lucky" button costs Google $110 million per year
Google cofounder Sergey Brin told public radio's Marketplace that around one percent of all Google searches go through the "I'm Feeling Lucky" button. Because the button takes users directly to the top search result, Google doesn't get to show search ads on one percent of all its searches. That costs the company around $110 million in annual revenue, according to Rapt's Tom Chavez. So why does Google keep such a costly button around?
"It's possible to become too dry, too corporate, too much about making money. I think what's delightful about 'I'm Feeling Lucky' is that it reminds you there are real people here," Google exec Marissa Mayer explained, or at least tried to.
Cool About Yahoo
Subscribe to:
Posts (Atom)