Monday, March 24, 2008

Firefox Inside Firefox

You know that many of us spend lot of our computing time on the internet and most of that time we use Firefox tabs to open all our favorite Sites and services inside Firefox right?, yes, Gmail inside Ff, Yahoo inside Ff, ebay inside Ff, Banking inside Ff ect. ect. ect….With all these favorites inside Firefox, How about Opening Firefox inside Firefox? Not bad huh? and its really easy too just type in this url in a new tab in Firefox and there you go! Firefox inside Firefox!


Disclaimer: I guarantee that this will work with Firefox. But I have no responsibility of any damage that cause Internet Explorer users by Using this with IE to Open Firefox inside IE

Sunday, March 23, 2008

Disable Error Reporting in Win Xp

By disabling error reporting in Windows XP you can improve your computer performance and it's more useful who have slow computers and getting stumble every time computer get busy.
Disable Error Reporting in Windows Xp
Also by disabling this you can avoid annoying messages every time you get when programme crash and make your computer bit faster.

Ok lets get into the stuff...

First Go to Start >> Then Control panel

Then Double click on SYSTEM

At this moment you must have open SYSTEM PROPERTIES dialog box.

Click ADVANCE tab there

Click on Error reporting tab and then you'll get ERROR REPORTING dialog box.


Tuesday, March 18, 2008

Registration domain - Domain Name Varieties

Registration domainDomain name registration is about identifying your website on the net.It's the first and unique process in your web site creation scheme.Your website needs carefully selected domain name before you proceed for domain name registration. In this tutorial I will explain important steps more than you or you never consider for domain name registration.

Generic Domain Name:

Ideally, domain name may be short and simple for remembering easily. Generic names are easy to remember, and there is always a generic name, no matter which business you are in or doing. Unfortunately, for domain name registration, most generic domains are no longer available. For example, if you deal in baby toys, you will find domain names like,,, etc. are already taken. If you do not mind country-specific domain extensions (like .lk, .uk, and so on), you may be in luck for acquiring a hot name for domain name registration. If lucky to have found one, check whether the domain name infringes any patent or trademark in your country or elsewhere before domain name registration.

Unique Domain name:

If not generic domain names, how about unique names like altavista, google, orange, kanoodle, or word combinations like notyet, tuttos. Those are so simple ,good sound ,easy to remember and pleasant and so on? Perhaps you won't mind slight distortions, such as prioriti instead of priority. Watch closely and you will see these domain names not only sound nice, they are also short and quick on recall. It is likely that many such unique domain names are out of bounds. In that case, as mentioned above, opt for country-specific extension suitable to your need before domain name registration.

Other Considerations:

Sometimes it may be necessary that your domain name reflects your company name. Even so, try grabbing a suitable one, get domain name registration and finally name your company accordingly. Examples like Google, Pcmagazine and Ebay come immediately to mind. Find one such, do domain name registration and you can over time build a solid brand around your domain name.

Whatever you do, avoid small pitfalls on way to domain name registration. Long and hyphenated domains are not good because they add to confusion. Moreover, people rarely remember them.But it doesn't mean they aren't good for standing.Short names with hyphen are really effective same as others.If it proves too much of a hassle, get help with automated name creating tools at

NameBoy =
DomainFellow =

Register A Domain Name

You can register a domain name by going to anyone of the worldwide domain name registrars. Whether you are able to register your domain with a specific name depends on a number of factors; the most important of them being the availability of the domain name. Domain name you have selected should be available in that moment.That means may be you can't get what you exactly want.Some of the widely used domain name registrars are: and there's lots of domain registrars in world wide.

The cost for registering a domain name might differ from one registrar to another. However, you must check different prices charged by various domain name registrars before settling for one.

Domain name being such an important aspect of your website calls for meticulous consideration of a few factors such as:
  • Consider some key factors such as terms, length of service, and price per service package while registering a domain name. You should always choose a service package that suits your existing and future needs even if it cost high in stead of settling for a cheaper service package that could prove costly in the long run.
  • Choose a domain name that should contain either you own product or company’s name. This will not only ensure that your opted domain name is available but also enhance the brand awareness of your product.
  • From SEO (Search Engine Optimization) standpoint, you should consider including the targeted keyword in your domain so that it will be search engine friendly which in turn will immensely benefit your website from SEO perspective.
  • Registering your domain name on a dedicated IP server is always recommended as it will offer you better credibility from search engines. Domain names hosted on shared IP servers stand the risk of being blacklisted incase anyone of the other subscribers engages in some unethical SEO practices.

Domain Name Guidelines

Monday, March 17, 2008

Google Secrets and Tricks

Sunday, March 16, 2008

Google Search - Special Syntax

Special Syntax for search in Google to more relative and success results
Google Search Special Syntax

Google is clearly the best general-purpose search engine on the Web and Google goes far beyond a regular search engine. Give the tricks in this article a try. You'll be amazed at how many different ways Google can improve your Internet searching.

In addition to the basic AND, OR, and phrase searches, Google offers some rather extensive special syntax for narrowing your searches.

But most people don't use google to its best advantage. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than eight billion pages in Google's index, it's still a struggle to pare results to a manageable number.

But Google is an remarkably powerful tool that can ease and enhance your Internet exploration. Google's search options go beyond simple keywords, the Web, and even its own programmers. Let's look at some of Google's lesser-known options.

Syntax Search Tricks:

Using a special syntax is a way to tell Google that you want to restrict your searches to certain elements or characteristics of Web pages. Google has a fairly complete list of its syntax elements at

Following are descriptions of the special syntax elements, ordered by common usage and function


intitle: restricts your search to the titles of web pages. The variation allintitle: finds pages wherein all the words specified appear in the title of the web page. Using allintitle: is basically the same as using the intitle: before each keyword.

intitle:"george bush"

allintitle:"money supply" economics

You may wish to avoid the allintitle: variation, because it doesn't mix well with some of the other syntax elements.


intext: searches only body text (i.e., ignores link text, URLs, and titles). While its uses are limited, it's perfect for finding query words that might be too common in URLs or link titles.


There's an allintext: variation, but again, this doesn't play well with others.


inanchor: searches for text in a page's link anchors. A link anchor is the descriptive text of a link. For example, the link anchor in the HTML code


As with other in*: syntax elements, there's an allinanchor: variation, which works in a similar way (i.e., all the keywords specified must appear in a page's link anchors).


Lets you see which pages are linking to your Web page or to another page you're interested in. For example, try typing in


Use this for less effort typing LINK


site: allows you to narrow your search by either a site or a top-level domain. The AltaVista search engine, by contrast, has two syntax elements for this function (host: and domain:), but Google has only the one.

Be aware that site: is no good for trying to search for a page that exists beneath the main or default site (i.e., in a subdirectory such as /~sam/album/). For example, if you're looking for something below the main GeoCities site, you can't use site: to find all the

pages in; Google returns no results. Use
inurl: instead site:


restricts your search to the URLs of web pages. This syntax tends to work well for finding search and help pages, because they tend to be rather regular in composition. An
allinurl: variation finds all the words listed in a URL but doesn't mix well with some other special syntax.


allinurl:search help

You'll see that using the inurl: query instead of the site: query has one immediate advantage you can use it to search subdirectories. While the http:// prefix in a URL is ignored by Google when used with site:, search results come up short when including it in an inurl: query. Be sure to remove prefixes in any inurl: query for the best (read: any) results.

You can also use inurl: in combination with the site: syntax to draw out information on subdomains. For example, how many subdomains does really have? A quick query will help you figure that out:

This query asks Google to list all pages from the domain, but leave out those pages which are from the common subdomain www, since you already know about that one

Do you ever wonder how many subdomains google has.I wondered!!!!


cache: finds a copy of the page that Google indexed even if that page is no longer available at its original URL or has since changed its content completely.

If Google returns a result that appears to have little to do with your query, you're almost sure to find what you're looking for in the latest cached version of the page at Google. The Google cache is particularly useful for retrieving a previous version of a page that changes often.


filetype: searches the suffixes or filename extensions. These are usually, but not

necessarily, different file types; filetype:htm and filetype:html will give you different result counts, even though they're the same file type. You can even search for different page generators—such as ASP, PHP, CGI, and so forth—presuming the site isn't hiding them behind redirection and proxying. Google indexes several different Microsoft formats, including PowerPoint (.ppt), Excel (.xls), and Word (.doc).

“C puls plus” filetype:pdf
"Tt books" filetype:doc


related:, as you might expect, finds pages that are related to the specified page. This is a good way to find categories of pages; a search for returns a variety of search engines, including Lycos, Yahoo!, and Northern Light.

While an increasingly rare occurrence, you'll find that not all pages are related to other page


info: provides a page of links to more information about a specified URL. This information includes a link to the URL's cache, a list of pages that link to the URL, pages that are related to the URL, and pages that contain the URL.

Note that this information is dependent on whether Google has indexed the specified URL; if not information will obviously be far more limited.


phonebook: as you might expect, looks up phone numbers.
phonebook:Mike Doe CA

phonebook:(511) 556-2525


daterange: limits your search to a particular date or range of dates on which a page was indexed. It's important to note that a daterange: search has nothing to do with when a page was created, but when it was indexed by Google. So a page created on February 2 but not indexed by Google until April 11 would turn up in a daterange: search for April 11.
"Geri Halliwell" "Spice Girls" daterange:2450958-2450968

You can find converters on the Web such as

but an easier way is to do a Google Daterange: search by filling in a form at

If one special syntax element is good, two must be better, right? Sometimes. Though someoperators can't be mixed (you can't use the link: operator with anything else) many can be, quickly narrowing your results to a less overwhelming number.

Wanna my favorite searching keywords found by me:: inurl:tutorial,technology,IT,security
(Because blogspot is funny way to wide range of informations)

Friday, March 7, 2008

Anonymity On Internet

Are You Safe?? Do you know.There are many peoples in internet trying to get your info every moment your are connect to the internet. So wanna safe Then you should read this articles
Anonymity On Internet surfing annonymouse

All About Proxy
Anonymity Guide Proxy
Why Hide Your IP Address?


CookieS are act main part when we talk about internet security.
The image “,VS.85).gif” cannot be displayed, because it contains errors.

You have little to fear from the edible variety, but the digital ones can be a major threat to your security and privacy. A cookie is a tiny text file (usually less than 1kb in size), which is created and stored on your hard drive whenever you visit a dynamic (or an interactive if you like) web site. These are used to log your personal details so that you can access members only areas of web sites without having to type in a password every time, or to retain your customised settings so that they are available the next time you visit. If you're using a shared computer, anyone who visits the same site that you have previously logged in to can access your accounts. This is particularly worrying if you have entered your credit card details into a form on an e-commerce site. If your browser is set to automatically fill in these details whenever you return to a previously visited site, this information could be clearly visible - you don't need me to explain the problems this could entail.

The solution to this problem is to delete any cookies which contain sensitive data once you have completed your transactions. Your cookies will be stored in a different place depending on which operating system you are using so you will have to use your detective skills to find them. As an example, in Windows XP they are located in your

'c:\Documents and Settings\USERNAME\Cookies' directory.

If you look in this directory, in some cases it is easy to identify which cookie is associated with which web site, but in other cases it's not so obvious. The cookie which was created when you visited to check your email may be called USERNAME(ID)@yahoo.txt for example.
Unfortunately some cookies refer to the IP address of the site you visited and so look more like
These cookies can be selectively deleted one at a time if it's obvious which ones are causing a threat to your security, or you can just wipe out the whole lot in one fell swoop and have them recreated as and when they are required. However, if
you're really struggling to find your cookie jar, you could delete your cookies via your browser's tool bar instead. In Internet Explorer this can be done through the 'Tools' > 'Internet Options' menu items.

If all this sounds like too much hassle, you can always find a labour saving program which will be happy to take the job off your hands. These 'cookie crunching' programs allow you to be more selective when editing, viewing and deleting cookies from your system, and some of them will even prevent cookies from being created in the first place.

Urls: -Cookie Cruncher -Cookie Crusher

Thursday, March 6, 2008

Anonymity Guide Proxy

Basic Instructions For Use Proxies, How proxies are important to be secure on internet.
Basic Instructions use Proxies

I can see you hiding in the shadows over there and so can the logs of all the web sites, FTP servers and other nooks and crannies you visit on the web. The sort of information gathered by these logs and which is available to the webmasters of the sites you visit include

The address of the previous site you visited
Your IP address,
your computer's ID name,
your physical location
The name of your ISP along with less personal details such as the operating system you're using
Your screen resolution and more.

If someone was snooping through your dustbin to gather information on consumer trends or tracking your every move to see where it is you go everyday you wouldn't be too chuffed would you. Well the web is no different, it's still an invasion of privacy and a threat to security and you don't have to put up with it.

Proxy servers:

Every time you visit a web site, detailed information about your system is automatically provided to the webmaster. This information can be used by hackers to exploit your computer or can be forwarded to the market research departments of consumer corporations who by tracking your activities on the internet are better equipped to direct more relevant spam at you. Your best defence against this is to use what is known as a proxy server, which will hide revealing information from the web sites you visit, allowing you to surf the web anonymously. These work by altering the way in which your browser retrieves web pages or connects to remote servers. With a proxy server set up, whenever you 'ask' IE or Netscape to look at a web page, the request is first sent through an external server which is completely independent of your ISP's servers. This third party server then does the requesting on your behalf so that it appears that the request came from them rather than you and your real IP address is never disclosed to the sites you visit. There is nothing to download and the whole process takes less than a minute.

There are two different ways to use proxy servers and both have their advantages and disadvantages. The first method is to use a web based service. What this involves is visiting the proxy's home page each time you want to browse a web site anonymously. The core component of such a system is the dialog box where you enter the address of the web site you want to visit. Each time you enter the URL of the site you want to browse via the proxy into this box, your personal information, IP address and so on is first encrypted before being sent to the site allowing you to maintain your anonymity. Two of the best examples of this type of web based proxy service are Code:

Obviously one disadvantage of using a web based service like proxyroll or prospector, however, is that you have to visit the proxies home page each time you want to surf anonymously. You could choose to select this page as your default home page, but it's still quite awkward if you're forever site hopping at the speed of light. The second main 'con' is that you often have to put up with extra adverts on the pages you visit. These are automatically inserted into the pages by the proxy - they have to pay for service somehow. More sophisticated and convenient solutions are also on offer yet they come with a price tag.

The second method you can use to protect your privacy via a proxy server involves adjusting the settings of your web browser so that you can surf anonymously without having to visit the home page of your proxy each time. To do this you will first need to know the name of your proxy server and the port number it uses. This information can be gleaned from either a public proxy server list or the FAQ referring to a private subscription based service. Once you have the name of the proxy server you wish to use, select 'Internet Options' from the 'Tools' menu of your browser. Now select 'Connections' followed by 'Settings' and tick the 'use a proxy server' check box. To finish the job all you have to do now is enter the name of the server in the 'address' box, the port which it uses in the 'port' box and go forth and surf anonymously.

Free, manual proxy servers as advertised on anonymity sites, if you can find one at all, are likely to be highly over subscribed, and as a result the speed at which they retrieve web pages can deteriorate. In which case you can go in pursuit of a public proxy server list and select an alternative from it, which can then be set up manually. To locate such a list you can investigate sites such as Code:

however, this method isn't problem free either, so before you get too carried away and go jumping on the anonymity bandwagon there are a few things you should be aware of. It's very easy to use proxies to protect your privacy, but often the disadvantages of using them far out weigh the benefits. You see, the problem is that, like the proxy servers provided Rewebber at all, free, public proxies are nearly all over subscribed and so they can slow down web browsing considerably. Digging out fast reliable proxy servers is an art form in itself and is a skill which takes considerable practice. You could find a list of public proxy servers and then experiment with each one until you find one that runs at a reasonable speed, but this can be very time consuming and frustrating. Instead, your search would be much more efficient if you got a dedicated program to carry out this task for you. There are literally dozens of proxy seeking programs around which can do just that, and many of them are available as freeware. What these do is scan the internet for public proxy servers. These servers are then tested for speed and anonymity (not all of them are truly anonymous, even if they claim to be!) and once you find one which suits your requirements you can select it as your default proxy with the click of a button.

One of the most significant advantages of using an automated tool to locate proxy servers is that you do not have to keep editing your proxy settings manually each time you wish to try out a new one. Instead, what you do is enter 'localhost' or '' into the 'address' box and '8088' into the 'port' box of your browser's proxy settings menu and then forget about it. All future proxy switching is then orchestrated from within your proxy seeking software, which subsequently relays the information to your browser or whatever type of application you are attempting to make anonymous. For those of you who are curious 'localhost' and the IP address '' are the names by which every computer on the internet refers to itself.
Here's a good selection of links, which should help you to get started -Anonymity 4 Proxy -Hi Proxy -Proxy Verifier -Stealther.

You may find that even when using these programs you have difficulty finding good proxy servers. It is for this reason that many people choose only to use proxy servers temporarily whilst doing something which may land them in trouble with their ISP, or in a worst case scenario with the law. The most obvious example of a situation in which you would want to cover your tracks is when scanning for public FTP servers and subsequently uploading to them. Most other net activities are unlikely to incur serious consequences so under these circumstances you can safely surf the web without a proxy. If you're really serious about protecting your privacy, however, your best bet is probably to invest in a dedicated, stable proxy such as the ones offered by Ultimate Anonymity

These aren't free, but may be worth the expense if you aren't keen on continuously switching proxy servers.

Before splashing out though it may be worth checking if your current ISP has a proxy server of its own which you can use. These aren't there to help you to commit cyber crimes and get away with it, they actually have a legitimate purpose as well - otherwise they wouldn't exist. You see, proxy servers were originally designed to help speed up web page loading times. Proxy servers contain a cache of all the web pages which have been requested via the browsers of the people using the proxy. When someone surfs the web using a proxy, the proxy first checks to see if it already has a copy of the web page stored in its cache. If this version of the page is bang up to date, it is sent to your computer and appears in your browser. If the page found in the cache of the proxy server is older than the one stored on the server hosting the page, a new request to the web server is made and the page is updated in the cache of the proxy before being sent to you. Because these servers use very fast internet connections they can retrieve web pages at much greater speeds than you can via your modest home setup. If these servers are located physically nearer to your home than the web host servers you wish to retrieve web pages from, the speed at which you browse the web will be accelerated.

All About ProxyS

Anonymity of Proxy
Anonymity of Proxy

The exchange of information in Internet is made by the "client - server" model. A client sends a request (what files he needs) and a server sends a reply (required files). For close cooperation (full understanding) between a client and a server the client sends additional information about itself: a version and a name of an operating system, configuration of a browser (including its name and version) etc. This information can be necessary for the server in order to know which web-page should be given (open) to the client. There are different variants of web-pages for different configurations of browsers. However, as long as web-pages do not usually depend on browsers, it makes sense to hide this information from the web-server.
What your browser transmits to a web-server:

A name and a version of an operating system
A name and a version of a browser
configuration of a browser (display resolution, color depth, java / javascript support, ...)
IP-address of a client
Other information

The most important part of such information (and absolutely needless for a web-server) is information about IP-address. Using your IP it is possible to know about you the following:

A country where you are from
A city
Your provider?s name and e-mail
Your physical address

Information, transmitted by a client to a server is available (accessible) for a server as environment variables. Every information unit is a value of some variable. If any information unit is not transmitted, then corresponding variable will be empty (its value will be undetermined).

These are some environment variables:

REMOTE_ADDR ? IP address of a client

HTTP_VIA ? if it is not empty, then a proxy is used. Value is an address (or several addresses) of a proxy server, this variable is added by a proxy server itself if you use one.

HTTP_X_FORWARDED_FOR ? if it is not empty, then a proxy is used. Value is a real IP address of a client (your IP), this variable is also added by a proxy server if you use one.

HTTP_ACCEPT_LANGUAGE ? what language is used in browser (what language a page should be displayed in)

HTTP_USER_AGENT ? so called "a user?s agent". For all browsers this is Mozilla. Furthermore, browser?s name and version (e.g. MSIE 5.5) and an operating system (e.g. Windows XP) is also mentioned here.

HTTP_HOST ? is a web server?s name

This is a small part of environment variables. In fact there are much more of them (DOCUMENT_ROOT, HTTP_ACCEPT_ENCODING, HTTP_CACHE_CONTROL, HTTP_CONNECTION, SERVER_ADDR, SERVER_SOFTWARE, SERVER_PROTOCOL, ...)
Their quantity can depend on settings of both a server and a client.

These are examples of variable values:

HTTP_USER_AGENT = Mozilla/4.0 (compatible; MSIE 5.0; Windows xp)
HTTP_HOST = www.webserver.en
HTTP_VIA = (Squid/2.4.STABLE7)

Anonymity at work in Internet is determined by what environment variables "hide" from a web-server.

If a proxy server is not used, then environment variables look in the following way:

HTTP_VIA = not determined
HTTP_X_FORWARDED_FOR = not determined

According to how environment variables "hided" by proxy servers, there are several types of proxies

Transparent Proxies:

They do not hide information about your IP address:

HTTP_VIA = proxy IP

The function of such proxy servers is not the improvement of your anonymity in Internet. Their purpose is information cashing, organization of joint access to Internet of several computers, etc.

Anonymous Proxies:

All proxy servers, that hide a client?s IP address in any way are called anonymous proxies

Simple Anonymous Proxies:

These proxy servers do not hide a fact that a proxy is used, however they replace your IP with its own:
HTTP_VIA = proxy IP

These proxies are the most wide spread among other anonymous proxy servers.

Distorting Proxies:

As well as simple anonymous proxy servers these proxies do not hide the fact that a proxy server is used. However a client?s IP address (your IP address) is replaced with another (arbitrary, random) IP:

HTTP_VIA = proxy IP
HTTP_X_FORWARDED_FOR = random IP address

High Anonymity Proxies:

These proxy servers are also called "high anonymity proxy". In contrast to other types of anonymity proxy servers they hide a fact of using a proxy:

HTTP_VIA = not determined
HTTP_X_FORWARDED_FOR = not determined

That means that values of variables are the same as if proxy is not used, with the exception of one very important thing ? proxy IP is used instead of your IP address.


Depending on purposes there are transparent and anonymity proxies. However, remember, using proxy servers you hide only your IP from a web-server, but other information (about browser configuration) is accessible!

File Sharing and Related - Torrents , YouTube & Rapidshare

File Sharing - Free Ebook Sites

Free Ebook Sites Collection

All about sharing ebooks (huge ebook site)

O'Reilly online

Computer books and manuals

The Network Book

Some #bookwarez.efnet.irc links
Some #bookwarez.efnet.irc fiction

Pimpas online books (Indonesia)

Security, privacy and cryptography |

My own misc online reading material |

Computer books

Linux documentation

FreeBSD documentation

Sun documentation

SGI documentation;td=2 |

IBM Online Redbooks

Digital Unix documentation

Filesystem Hierarchy Standard

UNIX stuff

Programmers reading

Programming Pearls 2nd edition

C stuff

Perl stuff |

Java stuff

Lisp stuff

Ada stuff

Database reading

SQL stuff |

Visual Basic stuff

Handbook of Applied Cryptography

X Window System | |

GTK and Gnome stuff

QT and KDE stuff

Corba stuff

TCP/IP info

Misc programmers reading

Some useful tech articles |

Considering Hacking Constructive

Eric's Random Writings

IBM's History

Electronic Publishing

Digital processing

The Hardware Book

Network iQ Router Reference Manual

Cisco Product Documentation

Novell developers appnotes

Icons for your desktop

Hackers' Hall of Fame at Discovery Online

Symbols and signs and ideograms and stuff

Dictionaries |

Misc reading material

Dantes Inferno |

Books and texts |

Literature stuff

Octavo books

Project Gutenberg - books and texts

Project Runeberg - Scandinavian in books and texts

The Elements of Style

Bigtext - illustrated books and manuals for DOS

Breeze - a complete text system for Windows

Language links

Grimms' fairy tales

Winnie the Pooh

Seven Wonders of the World

Medieval history

Misc history

Stonehenges Legends

In Parentheses historical papers

Bulfinchs Mythology

The Dead Sea Scrolls

Qumran historical

Index of cults

Heretical speculation

The esoteric Ordo Supremus Militaris Templi Hierosolymitani

Runes and Norse stuff

Extinction level events | |

Stephen Hawkings Universe

The constellations

Falling into a black hole

Gravity is a push

Online audiobooks


NewMedia Classics

Online Books Archive

Internet Public Library

PalmPilot E-Text Ring

Virtual Free Books

All About Ebooks