<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-5063542324837000555</id><updated>2024-12-18T19:21:18.044-08:00</updated><category term="Hacking"/><category term="Security"/><category term="Learning"/><category term="Certification"/><category term="Email Headers"/><category term="Internet Scam"/><category term="Social Network"/><title type='text'>WebExpert</title><subtitle type='html'>Best articles that have been chosen from all over the web to help you out...</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://nextexpert.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5063542324837000555/posts/default'/><link rel='alternate' type='text/html' href='http://nextexpert.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>HackMeLOL</name><uri>http://www.blogger.com/profile/09525841867171923633</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>12</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-5063542324837000555.post-4002977695792494270</id><published>2009-03-27T11:19:00.000-07:00</published><updated>2009-03-27T11:21:42.320-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Learning"/><title type='text'>Alternatives to a Boot Disk</title><content type='html'>&lt;div class=&quot;post&quot; id=&quot;msg_1747&quot;&gt;&lt;span style=&quot;color: rgb(255, 255, 153);font-size:85%;color:maroon;&quot;  &gt;&lt;span style=&quot;line-height: 1.3em;&quot;&gt;&lt;span style=&quot;font-family:verdana;&quot;&gt;&lt;b&gt;There are alternatives to using a boot disk to locally gain access to a computer.&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 255, 255);&quot; &gt;&lt;b&gt;Introduction&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;This is my paper on gaining access to a computer connected to a secure network locally. Firstly I would like to state that simply getting a boot disk would be simple to do and would be good to use however there is a problem with doing this which I will come to later.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;What is the point?&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Maybe you want to access the computers personal hard disk for various reasons. However if a computer is connected to a network and requires a username and password to login then this is stopping you gaining access to the computers personal hard drive.&lt;br /&gt;&lt;b&gt;&lt;br /&gt;So how can this problem be turned around?&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Well firstly we need to access how the computer is connected to the network there are really only two ways. A wireless connection and a wired connection. It is important to understand that whilst the computer is connected to the network any activities can be logged.&lt;br /&gt;&lt;br /&gt;Here is my example. I was in college talking to What_a_legend on msn, i started looking through the c drive (local drive) for rats. Then i stuck my memory stick in and it detected a port scanner. Two hours later i had been banned from the network. So i went to the head admin and asked why? He told me the reason was because he had monitored everything i did remotely.&lt;br /&gt;&lt;br /&gt;Therefore its important to disconnect from the internet. Simply turn off the computer an unplug the Ethernet cable because if you think logically this is the only cable connected to the computer with the exception of i/o devices and also the power source. If the computer is wireless which is very rare unless it’s a laptop so really we don’t need to go into how wireless can be disconnected before login.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;So now we are disconnected&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;When the computer was connected to the network it could drag information such as login etc from a server. So logically before it was disconnected you would expect to log in with a username and password which is authenticated against what is on the server.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Example&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;User types in username “122406” user types in password “27162729292” the username and password is sent over the network and is compared to the username “122406” to see if the password matches.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;What do we expect?&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;At this point three things could happen, firstly the computer will just log in without any password screen. Secondly nothing will log you in. Thirdly anything can log you in.&lt;br /&gt;&lt;br /&gt;So if the operating system just loads without username and password log in everything is good and you can’t be monitored as you have disconnected. If nothing logs you in, you try something else. If anything logs you in then this is practically the same as not having to log in.&lt;br /&gt;&lt;b&gt;&lt;br /&gt;So we have the problem of still not being able to log in.&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;There are three ways around this, all being simple.&lt;br /&gt;&lt;br /&gt;1. Boot from disk (if you don’t know how to do this then you shouldn’t be reading this in the first place.)&lt;br /&gt;&lt;br /&gt;2. Boot with safe mode (if you cant do this either then you fail.)&lt;br /&gt;&lt;br /&gt;3. Download a DSL stick onto a flash memory drive and boot from that, you will have access to local drive etc.&lt;br /&gt;&lt;br /&gt;Damn Small Linux&lt;br /&gt;&lt;br /&gt;Basically Linux on a stick. Everything you need for it can be found here…&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.pendrivelinux.com/all-in-one-usb-dsl/&quot; target=&quot;_blank&quot;&gt;http://www.pendrivelinux.com/all-in-one-usb-dsl/&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://nextexpert.blogspot.com/feeds/4002977695792494270/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://nextexpert.blogspot.com/2009/03/alternatives-to-boot-disk.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5063542324837000555/posts/default/4002977695792494270'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5063542324837000555/posts/default/4002977695792494270'/><link rel='alternate' type='text/html' href='http://nextexpert.blogspot.com/2009/03/alternatives-to-boot-disk.html' title='Alternatives to a Boot Disk'/><author><name>HackMeLOL</name><uri>http://www.blogger.com/profile/09525841867171923633</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5063542324837000555.post-1967808599901304052</id><published>2009-02-16T11:20:00.000-08:00</published><updated>2009-02-16T11:26:20.749-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Learning"/><title type='text'>Learn Ethical Hacking via IRC Channel</title><content type='html'>&lt;center&gt;&lt;object width=&quot;445&quot; height=&quot;364&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/SFCLhXGn56w&amp;amp;hl=en&amp;amp;fs=1&amp;amp;rel=0&amp;amp;color1=0x234900&amp;amp;color2=0x4e9e00&amp;amp;border=1&quot;&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;embed src=&quot;http://www.youtube.com/v/SFCLhXGn56w&amp;amp;hl=en&amp;amp;fs=1&amp;amp;rel=0&amp;amp;color1=0x234900&amp;amp;color2=0x4e9e00&amp;amp;border=1&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;445&quot; height=&quot;364&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;/center&gt;</content><link rel='replies' type='application/atom+xml' href='http://nextexpert.blogspot.com/feeds/1967808599901304052/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://nextexpert.blogspot.com/2009/02/learn-ethical-hacking-via-irc-channel.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5063542324837000555/posts/default/1967808599901304052'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5063542324837000555/posts/default/1967808599901304052'/><link rel='alternate' type='text/html' href='http://nextexpert.blogspot.com/2009/02/learn-ethical-hacking-via-irc-channel.html' title='Learn Ethical Hacking via IRC Channel'/><author><name>HackMeLOL</name><uri>http://www.blogger.com/profile/09525841867171923633</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5063542324837000555.post-1409771680255538204</id><published>2009-02-16T11:08:00.000-08:00</published><updated>2009-02-16T11:10:21.262-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Web Security</title><content type='html'>&lt;p class=&quot;intro&quot;&gt;You are offering your IP address to the entire world at this very moment.&lt;/p&gt; &lt;p class=&quot;intro&quot;&gt;Make sure you are not offering access to your private data at the same time.&lt;/p&gt; &lt;hr /&gt;  &lt;h2&gt;YOUR IP ADDRESS IS PUBLIC&lt;/h2&gt;  &lt;p&gt;&lt;b&gt;Accessing the Internet is a security risk.&lt;/b&gt; &lt;/p&gt;  &lt;p&gt;When you are connected to the Internet, an IP address is used to identify your PC.  If you don&#39;t protect yourself, this IP address can be used to access your computer from the outside world. &lt;/p&gt;  &lt;p&gt;&lt;b&gt;A fixed IP address is a larger security risk.&lt;/b&gt; &lt;/p&gt;  &lt;p&gt;If you&#39;re using a modem with a dial-up connection, you will get a new IP address every time you connect to Internet.&lt;/p&gt; &lt;p&gt;With an ADSL or cable connection users sometimes keep the same IP address for  several months, this represents an increased security risk. &lt;/p&gt;  &lt;p&gt;If you have a fixed IP address, you give potential Internet crackers all the time they need to search for entrances to your computer, and to store and share (with other crackers) information they might find about your unprotected private data. &lt;/p&gt;  &lt;hr /&gt;  &lt;h2&gt;Your Network Shares&lt;/h2&gt;  &lt;p&gt;Personal computers are often connected to a shared network. Personal computers in large companies are connected to large corporate networks. Personal computers in small companies are connected to a small local network, and computers in private homes often share a network between family members.&lt;/p&gt; &lt;p&gt;Most often networks are used to share resources like printers, files and disk storage.&lt;/p&gt; &lt;p&gt;&lt;b&gt;When you are connected to the Internet, your shared resources can be accessed by the rest of the world.&lt;/b&gt;&lt;/p&gt;  &lt;hr /&gt;  &lt;h2&gt;A Common Windows Security Problem&lt;/h2&gt; &lt;p&gt;Unfortunately, many Microsoft Windows users are unaware of a common security leak in their network settings.&lt;/p&gt; &lt;p&gt;This is a common setup for network computers in Microsoft Windows:  &lt;/p&gt; &lt;ul type=&quot;square&quot;&gt;&lt;li&gt;Client for Microsoft Networks&lt;/li&gt;&lt;li&gt;File and Printer Sharing for Microsoft Networks&lt;/li&gt;&lt;li&gt;NetBEUI Protocol&lt;/li&gt;&lt;li&gt;Internet Protocol TCP/IP&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;b&gt;If your setup allows NetBIOS over TCP/IP, you have a security problem:&lt;/b&gt;&lt;/p&gt; &lt;ul type=&quot;square&quot;&gt;&lt;li&gt;Your files can be shared all over the Internet&lt;/li&gt;&lt;li&gt;Your logon-name, computer-name, and workgroup-name are visible to others.&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;b&gt;If your setup allows File and Printer Sharing over TCP/IP, you also have a problem:&lt;/b&gt;&lt;/p&gt; &lt;ul type=&quot;square&quot;&gt;&lt;li&gt;Your files can be shared all over the Internet&lt;/li&gt;&lt;/ul&gt;  &lt;p&gt;Computers that are not connected to any network can also have dangerous network settings because the network settings were changed when Internet was installed.&lt;/p&gt;  &lt;hr /&gt;  &lt;h2&gt;Solving the Problem &lt;/h2&gt;  &lt;p&gt;&lt;b&gt;For Windows 2000 users:&lt;/b&gt; &lt;/p&gt;  &lt;p&gt;You can solve your security problem by &lt;b&gt; disabling NetBIOS over TCP/IP&lt;/b&gt;: &lt;/p&gt;  &lt;ul type=&quot;square&quot;&gt;&lt;li&gt;Open Windows Explorer&lt;/li&gt;&lt;li&gt;Right-click on My Network Places&lt;/li&gt;&lt;li&gt;Select: Properties&lt;/li&gt;&lt;li&gt;Right-click on Local Area Network&lt;/li&gt;&lt;li&gt;Select: Properties&lt;/li&gt;&lt;li&gt;Select: Internet Protocol TCP/IP&lt;/li&gt;&lt;li&gt;Click on Properties&lt;/li&gt;&lt;li&gt;Click on Advanced&lt;/li&gt;&lt;li&gt;Select the WINS tab&lt;/li&gt;&lt;li&gt;Select Disable NetBIOS over TCP/IP&lt;/li&gt;&lt;li&gt;Click OK&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;If you get the message: &quot;This connection has an empty......&quot;, ignore the message and click on YES to continue, and click OK to close the other setup windows.&lt;/p&gt; &lt;p&gt;You should restart your computer after the changes.&lt;/p&gt;  &lt;p&gt;&lt;b&gt;For Windows 95, 98, or ME users:&lt;/b&gt; &lt;/p&gt;  &lt;p&gt;You can solve your security problem by &lt;b&gt; disabling NetBIOS over TCP/IP&lt;/b&gt;: &lt;/p&gt;  &lt;ul type=&quot;square&quot;&gt;&lt;li&gt;Open Windows Explorer&lt;/li&gt;&lt;li&gt;Right-click on My Network Places&lt;/li&gt;&lt;li&gt;Select: Properties&lt;/li&gt;&lt;li&gt;Select: Internet Protocol TCP/IP&lt;/li&gt;&lt;li&gt;Click on Properties&lt;/li&gt;&lt;li&gt;Select the NetBIOS tab&lt;/li&gt;&lt;li&gt;Uncheck: Enable NetBIOS over TCP/IP&lt;/li&gt;&lt;li&gt;Click OK&lt;/li&gt;&lt;/ul&gt;  &lt;p&gt;You must also &lt;b&gt; disable the TCP/IP Bindings&lt;/b&gt; to Client for Microsoft Networks and File and Printer Sharing: &lt;/p&gt;  &lt;ul type=&quot;square&quot;&gt;&lt;li&gt;Open Windows Explorer&lt;/li&gt;&lt;li&gt;Right-click on My Network Places&lt;/li&gt;&lt;li&gt;Select: Properties&lt;/li&gt;&lt;li&gt;Select: Internet Protocol TCP/IP&lt;/li&gt;&lt;li&gt;Click on Properties&lt;/li&gt;&lt;li&gt;Select the Bindings tab&lt;/li&gt;&lt;li&gt;Uncheck: Client for Microsoft Networks&lt;/li&gt;&lt;li&gt;Uncheck: File and Printer Sharing&lt;/li&gt;&lt;li&gt;Click OK&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;If you get a  message with something like: &quot;You must select a driver.........&quot;, ignore the message and click on YES to continue, and click OK to close the other setup windows.&lt;/p&gt; &lt;p&gt;If you still want to &lt;b&gt; share your Files and Printer&lt;/b&gt; over the network, you must use the NetBEUI protocol instead of the TCP/IP protocol. Make sure you have enabled it for your local network: &lt;/p&gt;  &lt;ul type=&quot;square&quot;&gt;&lt;li&gt;Open Windows Explorer&lt;/li&gt;&lt;li&gt;Right-click on My Network Places&lt;/li&gt;&lt;li&gt;Select: Properties&lt;/li&gt;&lt;li&gt;Select: NetBEUI&lt;/li&gt;&lt;li&gt;Click on Properties&lt;/li&gt;&lt;li&gt;Select the Bindings tab&lt;/li&gt;&lt;li&gt;Check: Client for Microsoft Networks&lt;/li&gt;&lt;li&gt;Check: File and Printer Sharing&lt;/li&gt;&lt;li&gt;Click OK&lt;/li&gt;&lt;/ul&gt; &lt;p&gt;You should restart your computer after the changes.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://nextexpert.blogspot.com/feeds/1409771680255538204/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://nextexpert.blogspot.com/2009/02/web-security.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5063542324837000555/posts/default/1409771680255538204'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5063542324837000555/posts/default/1409771680255538204'/><link rel='alternate' type='text/html' href='http://nextexpert.blogspot.com/2009/02/web-security.html' title='Web Security'/><author><name>HackMeLOL</name><uri>http://www.blogger.com/profile/09525841867171923633</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5063542324837000555.post-7272881893688010351</id><published>2009-02-02T04:44:00.000-08:00</published><updated>2009-02-02T04:47:16.754-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Catching Your Website Contents Thieves</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;I know the word &quot;Thieves&quot; is not new to us. Their activities did not start today but from the Stone Age by taking what did not belong to them without permission or by force. You will agree with me that as the technology is improving so their techniques get sophisticated. Online theft is not only in the area of credit cards or affiliate money or hacking to download secret or paid information but also website contents.&lt;/div&gt;&lt;p style=&quot;text-align: justify; font-weight: bold;&quot;&gt; Why Website Contents?&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; Have you ever wondered why people visit some websites than others? What make them to come back and even introduce their friends, colleagues, etc to visit the sites? Do you think it is the website designs or image pictures? You will agree with me it is not flash or animated pictures but the answer is contents. Website content is the &quot;King&quot;, it drives traffic to the site, makes visitors to come back and introduce others. Because some webmasters have known this, they go to any length to get good website contents. They steal contents (contents, graphics images, codes, video files, etc) from other people sites.&lt;/p&gt;&lt;p style=&quot;text-align: justify; font-weight: bold;&quot;&gt; How To Catch Web Contents Thieves? &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; It may be difficult to start searching through million of websites to know whether your contents have been stolen, off course if you do, it may take you a month or more or you get frustrated. Search engines are the answer. Go to the popular search engines like Google.com, Yahoo.com, etc and following the steps below.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; (a) Type your website name to search engine box. You will be able to know how many sites that link to you. Search through these site and see whether they have taken your contents without given reference to you.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; (b) Type your company name to search engine box. Search through the sites that appear and find out whether they use your content without permission or reference to your site.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;  &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;  (c) Type your unique graphic name, for most Webmaster will just take image without editing the name.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; (d) Type your article titles or headlines to search engine box and it will reveal the sites that are using your articles. Check whether they give reference to your website by linking to you.&lt;/p&gt;&lt;p style=&quot;font-weight: bold; text-align: justify;&quot;&gt; How To Locate The Thieves?&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; (i) Using domain lookup: Who is? : Is a tool use to view the owner&#39;s or company&#39;s name, postal address, e-mail address and phone number of registered domain name. You can simply type Whois.com to a web browser address space and lookup for the owner of the offender website. Also, go to Google.com, type domain lookup in its search box. This takes you to many websites that enable sourcing the owner of domain name.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; (ii) By checking the contact address, email address and phone number on the offenders website. &lt;/p&gt;&lt;p style=&quot;font-weight: bold; text-align: justify;&quot;&gt; Contact The Offenders.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; Having known their contact information? Contact them by sending mail or make call or both to let the offenders know that they have used your website contents without approval. Tell them to remove the contents or they should acknowledge you by putting your website link.&lt;/p&gt;&lt;p style=&quot;font-weight: bold; text-align: justify;&quot;&gt; Protect your Website Contents.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; (a) You can protect your contents by putting copyright on each page of your website.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; (b) By using code or software that will prevent your graphic image from being saved.   &lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://nextexpert.blogspot.com/feeds/7272881893688010351/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://nextexpert.blogspot.com/2009/02/catching-your-website-contents-thieves.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5063542324837000555/posts/default/7272881893688010351'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5063542324837000555/posts/default/7272881893688010351'/><link rel='alternate' type='text/html' href='http://nextexpert.blogspot.com/2009/02/catching-your-website-contents-thieves.html' title='Catching Your Website Contents Thieves'/><author><name>HackMeLOL</name><uri>http://www.blogger.com/profile/09525841867171923633</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5063542324837000555.post-4317316435037874334</id><published>2009-01-30T22:28:00.000-08:00</published><updated>2009-01-30T22:37:51.757-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>6 Ways To Pick Better Passwords</title><content type='html'>&lt;p&gt;Everyone who uses the internet must user usernames and passwords and that’s just the way it is. Whether it’s for email, instant messaging or any web site that has authentication of any type, passwords are par for the course.&lt;/p&gt; &lt;p&gt;Years ago most people would have only a handful of usernames and passwords to remember, but with the explosion of social media, online video/audio/photo/file storage and so on, many people have 15 or more.&lt;/p&gt; &lt;p&gt;The way most people get around this is to the use same username/password for all their accounts. This is stupid because if one system you use is compromised where your authentication information is found, &lt;em&gt;all&lt;/em&gt; your stuff is then &quot;in the open&quot;, so to speak.&lt;/p&gt; &lt;p&gt;I’ll cover how to choose passwords that can be different yet remembered by you easily in the list below.&lt;/p&gt; &lt;h3&gt;1. Avoid repeating characters&lt;/h3&gt; &lt;p&gt;Example: cccrazylikeafox&lt;/p&gt; &lt;p&gt;The &quot;ccc&quot; is the repeating set of characters. Don’t do this.&lt;/p&gt; &lt;h3&gt;2. Use mixed case&lt;/h3&gt; &lt;p&gt;Uppercase: CRAZYLIKEAFOX&lt;/p&gt; &lt;p&gt;Lowercase: crazylikeafox&lt;/p&gt; &lt;p&gt;Mixed case: CraZylIkeAfOX&lt;/p&gt; &lt;h3&gt;3. Use mixed case letters and numbers&lt;/h3&gt; &lt;p&gt;Example: 27CrAzylIkeAFox93&lt;/p&gt; &lt;h3&gt;4. Use other characters (if allowed)&lt;/h3&gt; &lt;p&gt;Example: 27-C_rA:zy#lIkeAF&lt;ox9!3&gt;&lt;/ox9!3&gt;#&lt;/p&gt; &lt;p&gt;Note: Some web sites don’t allow this (but they all &lt;em&gt;should&lt;/em&gt;).&lt;/p&gt; &lt;h3&gt;5. Let a password manager choose the password&lt;/h3&gt; &lt;p&gt;Example: &lt;a href=&quot;http://www.keepass.info/&quot;&gt;Use KeePass Password Safe&lt;/a&gt;&lt;/p&gt; &lt;p&gt;Example screen shot:&lt;/p&gt; &lt;p&gt;&lt;img title=&quot;image&quot; style=&quot;border-width: 0px; display: inline;&quot; alt=&quot;image&quot; src=&quot;http://www.pcmech.com/wp-content/uploads/2009/01/image51.png&quot; width=&quot;493&quot; border=&quot;0&quot; height=&quot;518&quot; /&gt; &lt;/p&gt; &lt;p&gt;Yes, the above is a crazy password, but that’s the whole point. With 183-bit quality it would be extremely difficult for anyone to find out what it is.&lt;/p&gt; &lt;p&gt;And obviously you should use the password manager software to remember it for you - encrypted, of course.&lt;/p&gt; &lt;h3&gt;6. Use a random physical address&lt;/h3&gt; &lt;p&gt;This actually does make for fairly good passwords.&lt;/p&gt; &lt;p&gt;Go to &lt;a href=&quot;http://maps.google.com/&quot;&gt;Google Maps&lt;/a&gt;, pick a town and state that you &lt;em&gt;don’t&lt;/em&gt; live in (nor have you ever), type in a type of business and use its physical address as your password.&lt;/p&gt; &lt;p&gt;Example: I choose &lt;a href=&quot;http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=boise%20idaho&quot;&gt;Boise, Idaho&lt;/a&gt;. I’ve never been there and have never set foot in that state. Then I type &lt;a href=&quot;http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=restaurant&amp;amp;sll=43.602071,-116.212539&amp;amp;sspn=0.047423,0.11158&amp;amp;g=boise+idaho&amp;amp;ie=UTF8&amp;amp;t=h&amp;amp;z=14&amp;amp;iwloc=B&quot;&gt;restaurant&lt;/a&gt; and find a place called Elmer’s. The physical address is 1385 S Capitol Blvd.&lt;/p&gt; &lt;p&gt;The password would be written as 1385SCapitolBlvdBoiseID.&lt;/p&gt; &lt;p&gt;According to KeePass Password Safe, this is a 114-bit quality password and well into the &quot;green&quot;, which is pretty darned good. The fact it’s also 23 characters long and contains letters of mixed case and numbers also helps out quite a bit.&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://www.pcmech.com/wp-content/uploads/2009/01/image52.png&quot;&gt;&lt;img title=&quot;image&quot; style=&quot;border: 0px none ; display: inline;&quot; alt=&quot;image&quot; src=&quot;http://www.pcmech.com/wp-content/uploads/2009/01/image-thumb.png&quot; width=&quot;493&quot; border=&quot;0&quot; height=&quot;518&quot; /&gt;&lt;/a&gt;&lt;/p&gt; &lt;p&gt;To note: &lt;strong&gt;You will remember this easier&lt;/strong&gt; than trying to come up with random words and phrases, because more often than not there are time you have to commit physical addresses to memory just trying to get to places - so this is nothing new to you.&lt;/p&gt; &lt;p&gt;I will note again that if you choose to go with this method, pick locations you’ve &lt;strong&gt;never been to&lt;/strong&gt;.&lt;/p&gt; &lt;h3&gt;Was there anything I missed concerning better passwords?&lt;/h3&gt;</content><link rel='replies' type='application/atom+xml' href='http://nextexpert.blogspot.com/feeds/4317316435037874334/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://nextexpert.blogspot.com/2009/01/6-ways-to-pick-better-passwords.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5063542324837000555/posts/default/4317316435037874334'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5063542324837000555/posts/default/4317316435037874334'/><link rel='alternate' type='text/html' href='http://nextexpert.blogspot.com/2009/01/6-ways-to-pick-better-passwords.html' title='6 Ways To Pick Better Passwords'/><author><name>HackMeLOL</name><uri>http://www.blogger.com/profile/09525841867171923633</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5063542324837000555.post-8070379181612628744</id><published>2009-01-29T22:32:00.000-08:00</published><updated>2009-01-29T22:33:35.365-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type='text'>Hacker vs Cracker</title><content type='html'>&lt;p style=&quot;text-align: justify;&quot;&gt;The New Hacker&#39;s Dictionary defines &lt;em&gt;Hacker&lt;/em&gt; as:&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;ol style=&quot;text-align: justify;&quot;&gt;&lt;li&gt;&quot;A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. RFC1392, the Internet Users&#39; Glossary, usefully amplifies this as: A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations.&quot;&lt;/li&gt;&lt;/ol&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;The term &lt;em&gt;Cracker&lt;/em&gt; was introduced later in defense against journalistic misuse of &lt;em&gt;Hacker&lt;/em&gt;, to differentiate between ethical hackers and the malicious hackers who subvert computer security for vandalism, personal gain, or other types of crime.&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;As the Jargon File states, &quot;While it is expected that any real hacker will have done some playful cracking and knows many of the basic techniques, anyone past larval stage is expected to have outgrown the desire to do so except for immediate, benign, practical reasons (for example, if it&#39;s necessary to get around some security in order to get some work done).&quot;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&quot;Hacking is probably a natural part of exploring computers, no more malicious than figuring out how to put graphics in the border of the C64, disassembling executables, running programs through hex editors or trying to crack copy-restriction schemes on early software. With a world as vast and seemingly limitless as the Net, (and especially in the days before everyone was on it, when commercialism was strictly forbidden) reaching out to the far tentacles of the matrix was an exciting way to learn what was out there, and that included digging around through various computers. What&#39;s here? It&#39;s a host. What is it? Let&#39;s get in and see. Where does it come from? What does it do? Whose is it? Why is it here? What&#39;s on it? These sorts of explorations are a large part of the excitement of youth... Indeed, computer crime, as it is often called, is one of the few ways to keep entertained in the suburbs...&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Too many people are quick to see a few 37337 h4x0r5 d3f4c3 4 w3bp4g3 and jump to the conclusion that everyone out there interested in network security is a little kid with a script who wants to write cryptic messages about owning so-and-so and playing games on irc. Beneath this superficial layer is a group of extremely dedicated advocates of freedom, truth, fair treatment, free information, sharing, exploration, curiosity, and knowledge, a true counter-culture which has remained steadfast as a vanguard against injustices perpetrated by the government, by corporations, by authoritarians. Yes, sometimes people think they go too far and probably suspect they&#39;re characters in a post-apolocyptic sci-fi movie. Still, the diversity among these people who get written off as &quot;crackers&quot; is such that it is unfair to characterize the group as a whole...&quot; &lt;em&gt;(Jason Kroll, Linux Journal editor)&lt;/em&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&quot;It all boils down to what kind of motivations and opportunities the hacker has. If the hacker is unethical, many times his motivations will be based upon greed, hate, bias, and a destructive mindset. If the hacker is ethical, then he may be motivated by an intellectual challenge, innovative ingenuity, and the like. The opportunities for hackers to hack depends heavily upon their own skills and abilities, as well as the targeted system&#39;s own deficiencies. The line between ethical and unethical hacking is a thin one, one which many do not dare to walk on.&quot; &lt;em&gt;(Rich Christie)&lt;/em&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://nextexpert.blogspot.com/feeds/8070379181612628744/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://nextexpert.blogspot.com/2009/01/hacker-vs-cracker.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5063542324837000555/posts/default/8070379181612628744'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5063542324837000555/posts/default/8070379181612628744'/><link rel='alternate' type='text/html' href='http://nextexpert.blogspot.com/2009/01/hacker-vs-cracker.html' title='Hacker vs Cracker'/><author><name>HackMeLOL</name><uri>http://www.blogger.com/profile/09525841867171923633</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5063542324837000555.post-2348770641902102519</id><published>2009-01-29T22:30:00.000-08:00</published><updated>2009-01-29T22:34:06.883-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type='text'>Hacking Groups</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Legion of Doom (LOD)&lt;/strong&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;H/P group, founded by Lex Luthor. The group later split into LOD (phreaking) and LOD/LOH  (hacking). Involved in the &lt;em&gt;Great Hacker War&lt;/em&gt; (1990-1991), an online conflict between MOD  and the group Legion of Doom (LOD).&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;Members of LOD were: Lex Luthor, Erik Bloodaxe, Bill From RNOC, Lord Digital, The Mentor, Mark Tabas, Agrajag The Prolonged, King Blotto, Phiber Optik (joined MOD), The Urvile, Doc Holiday, Dead Lord, Doctor Who, Paul Muad&#39;Dib, Prime Suspect, Frank Drake, Riot, The Leftist, Thomas Covenant, The Prophet, Monster X, The Marauder, Skinny Puppy, Professor Falken, Control C/Phase Jitter, Unknown Soldier, Phantom Phreaker, Sharp Razor, Phucked Agent 04, X-man, Randy Smith, Steve Dahl, The Warlock, Terminal Man, Silver Spy, The Videosmith, Malefactor, Blue Archer, The Dragyn, Gary Seven, Carrier Culprit, Kerrang Khan, The m0nit0r, Master of Impact, Doom Prophet, Sundry.&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;  &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;&lt;strong&gt;Masters Of Deception (MOD)&lt;/strong&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;H/P group, founded by Acid Phreak, Scorpion and HAC. MOD controlled all the major telephone RBOC&#39;s and X.25 networks as well as controlling large parts of the backbone of the rapidly emerging Internet. Involved in the &lt;em&gt;Great Hacker War&lt;/em&gt; (1990-1991), an online conflict between MOD  and the group Legion of Doom (LOD).&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt; &lt;/div&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;The original members of MOD were: Phiber Optik, Acid Phreak, Scorpion, HAC, Corrupt/Netw1z, Outlaw. Other members were: Wing, Supernigger, Nynex Phreak, Billy The Kid, Crazy Eddie, The Plague, ZOD, Neutrino, Seeker, Red Knight and Lord Micro.&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://nextexpert.blogspot.com/feeds/2348770641902102519/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://nextexpert.blogspot.com/2009/01/hacking-groups.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5063542324837000555/posts/default/2348770641902102519'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5063542324837000555/posts/default/2348770641902102519'/><link rel='alternate' type='text/html' href='http://nextexpert.blogspot.com/2009/01/hacking-groups.html' title='Hacking Groups'/><author><name>HackMeLOL</name><uri>http://www.blogger.com/profile/09525841867171923633</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5063542324837000555.post-3804788676024142440</id><published>2009-01-28T11:11:00.000-08:00</published><updated>2009-01-28T11:15:42.470-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Email Headers"/><title type='text'>Extracting Email Headers</title><content type='html'>&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;/span&gt;Email header is the information contained in  every mail message which is used by mail programs to provide the user with a  summary of the origin and contents of each message.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span class=&quot;yshortcuts&quot; id=&quot;lw_1233169825_0&quot; style=&quot;border-bottom: 1px dashed rgb(0, 102, 204); background: transparent none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial; font-weight: bold;&quot;&gt;Hotmail&lt;/span&gt;&lt;/span&gt; &lt;br /&gt;Log into Hotmail.&lt;br /&gt;Click on &quot;Options&quot; tab on the &lt;span class=&quot;yshortcuts&quot; id=&quot;lw_1233169825_1&quot;&gt;top navigation bar&lt;/span&gt;.&lt;br /&gt;Click on the &quot;Mail Display  Settings&quot; link.&lt;br /&gt;Change the &quot;Message Headers&quot; option to &quot;Full&quot;.&lt;br /&gt;Click the  &quot;OK&quot; button.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Yahoo Mail&lt;/span&gt;&lt;br /&gt;Log into your &lt;span class=&quot;yshortcuts&quot; id=&quot;lw_1233169825_2&quot;&gt;Yahoo! Mail account&lt;/span&gt;.&lt;br /&gt;Click the &quot;Mail Options&quot; link  on the &lt;span class=&quot;yshortcuts&quot; id=&quot;lw_1233169825_3&quot;&gt;left-hand navigation  bar&lt;/span&gt;.&lt;br /&gt;Click the &quot;General Preferences&quot; link on the right.&lt;br /&gt;Locate  the Show Headers heading and select &quot;All.&quot;&lt;br /&gt;Click the &quot;Save&quot; button to put  your new settings into effect.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span class=&quot;yshortcuts&quot; id=&quot;lw_1233169825_4&quot; style=&quot;border-bottom: 1px dashed rgb(0, 102, 204); font-weight: bold;&quot;&gt;Outlook Express&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;  4,5,6 and XP for Windows&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;Select the message.&lt;br /&gt;Click on File menu. &lt;br /&gt;Select Properties.&lt;br /&gt;Click on Details tab.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Outlook 2000,  XP&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;Right click on the message without opening it.&lt;br /&gt;Select Options, then  Full Headers.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Microsoft Outlook 98 &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;Open the message and select View,  then Options from the drop-down menus.&lt;br /&gt;Near the bottom of the screen there  is a section titled INTERNET HEADERS.&lt;br /&gt;Copy the header.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span class=&quot;yshortcuts&quot; id=&quot;lw_1233169825_5&quot; style=&quot;border-bottom: 1px dashed rgb(0, 102, 204); font-weight: bold;&quot;&gt;IncrediMail&lt;/span&gt;&lt;/span&gt; &lt;br /&gt;Select File &gt; Properties and then the Details tab.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Rediff  Mail&lt;/span&gt;&lt;br /&gt;Click &#39;Folder Options&#39;.&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot; class=&quot;yshortcuts&quot; id=&quot;lw_1233169825_6&quot;&gt;Microsoft&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt; Entourage(Office X for Mac) &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;Select the  message in the Inbox.&lt;br /&gt;Go to View &gt; Source.&lt;br /&gt;The new window will  contain full headers and message text.&lt;br /&gt;Alternately, go to Edit &gt;  Preferences &gt; Mail and News.&lt;br /&gt;Under the View tab, there is a checkbox for  Show Internet Headers.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;kmail (KDE Desktop)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;Select Message.&lt;br /&gt;View  Source.&lt;br /&gt;Copy the text from the &quot;Message as Plain Text&quot; window.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span class=&quot;yshortcuts&quot; id=&quot;lw_1233169825_7&quot; style=&quot;border-bottom: 1px dashed rgb(0, 102, 204); font-weight: bold;&quot;&gt;Gmail&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;Open the  message you&#39;d like to view headers for.&lt;br /&gt;Click the down arrow next to Reply,  at the top-right of the message pane.&lt;br /&gt;Select Show original.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Pegasus  Mail&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;Right click the message, and select Message headers...&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Netscape  Messenger &lt;/span&gt;&lt;br /&gt;Windows users, simply press Ctrl-U (meta-U in unix, ?-U on &lt;span class=&quot;yshortcuts&quot; id=&quot;lw_1233169825_8&quot;&gt;Macintosh&lt;/span&gt;).&lt;br /&gt;A new window will  open with the full message including the complete header.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Netscape  Webmail &lt;/span&gt;&lt;br /&gt;While viewing the message, click on the yellow triangle to the right  of the brief message headers. This will display the full headers along with the  message body.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Operamail&lt;/span&gt;&lt;br /&gt;Choose Options and enable &lt;br /&gt;Show Message Headers in Body of Message.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Outlook Express for  Macintosh&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;Select the email.&lt;br /&gt;From the View menu, choose Source.&lt;br /&gt;Email  with full headers will be displayed.&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;&lt;span class=&quot;yshortcuts&quot; id=&quot;lw_1233169825_9&quot; style=&quot;border-bottom: 1px dashed rgb(0, 102, 204); font-weight: bold;&quot;&gt;Outlook Web  Access&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;Left click on the letter you want to open and click on  properties.&lt;br /&gt;When that opens click on the Details tab.&lt;br /&gt;Then on message  source.&lt;br /&gt;This will open the email with the full headers.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Pine&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;You  must configure Pine to allow showing message headers. You may skip steps 1-3  below if you have performed this configuration.&lt;br /&gt;From the main Pine menu,  type S for Setup, then C for Config.&lt;br /&gt;Use the space bar and down arrow to  scroll until you reach the option [ ] enable-full- header-cmd, then type X in  the box to toggle the option on.&lt;br /&gt;Type E to exit Config, and Y to save  changes.&lt;br /&gt;The next time you read a message, type H and the full headers will  be displayed at the top of the message. Type H again to hide the headers. &lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Pronto Mail (GTK/unix)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;Click &quot;Message&quot; then &quot;View Source&quot;. &lt;br /&gt;Exchange&lt;br /&gt;Open the message.&lt;br /&gt;Choose File then Properties then Internet. &lt;br /&gt;The header will be visible and will be highlighted.&lt;br /&gt;Simply right click  and copy it.&lt;br /&gt;In some versions of Exchange, go to the File Menu &gt;  Properties &gt; Details &gt; Message Source.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Bat!&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;From The Bat email  software:&lt;br /&gt;Message &gt; SaveAs &gt; Save as Type - I.&lt;br /&gt;Select &lt;span class=&quot;yshortcuts&quot; id=&quot;lw_1233169825_10&quot;&gt;Unix&lt;/span&gt; Mailboxes [*.mbx].&lt;br /&gt;Open the  file in your preferred editor, then simply copy from there.&lt;br /&gt;For &lt;span class=&quot;yshortcuts&quot; id=&quot;lw_1233169825_11&quot;&gt;The Bat&lt;/span&gt;! v1.53b :&lt;br /&gt;Select the  message.&lt;br /&gt;Click on the &quot;Messages&quot; menu.&lt;br /&gt;Select &quot;View Source&quot;. &lt;br /&gt;Alternatively, you may push F9 instead of the last two steps.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot; class=&quot;yshortcuts&quot; id=&quot;lw_1233169825_12&quot;&gt;AOL&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt; Mail&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;If the email is sent  from anywhere OTHER then AOL, and you are receiving it in AOL, then open the  email you want to trace, or have your client open the email, and look for the  link Details. This link is usually just below the To:email in the email message.  If the email is sent from an AOL user to another AOL user then our Reverse AOL  Screenname search can get you the sender&#39;s information.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;XtraMail &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;Log  into XtraMail&lt;br /&gt;Click on &quot;Options&quot; in the Left-hand navigation bar.&lt;br /&gt;Click  the &quot;Display&quot; button.&lt;br /&gt;Change the &quot;Message Headers&quot; option to &quot;Full&quot;. &lt;br /&gt;Click the &quot;OK&quot; button</content><link rel='replies' type='application/atom+xml' href='http://nextexpert.blogspot.com/feeds/3804788676024142440/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://nextexpert.blogspot.com/2009/01/extracting-email-headers.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5063542324837000555/posts/default/3804788676024142440'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5063542324837000555/posts/default/3804788676024142440'/><link rel='alternate' type='text/html' href='http://nextexpert.blogspot.com/2009/01/extracting-email-headers.html' title='Extracting Email Headers'/><author><name>HackMeLOL</name><uri>http://www.blogger.com/profile/09525841867171923633</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5063542324837000555.post-4361246365253566177</id><published>2009-01-25T12:05:00.000-08:00</published><updated>2009-01-25T12:26:28.084-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Certification"/><title type='text'>Map Out Your Future Through Microsoft Certification</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot; class=&quot;article_text&quot;&gt;&lt;p&gt;The influence that the Microsoft Corporation has had on the development of the computer industry and on the Western World cannot be easily quantified. It would be difficult if not impossible to estimate how many people actually hold Microsoft Certification around the globe.&lt;/p&gt; &lt;p&gt;Microsoft themselves estimate that the figure must run into the tens of thousands. It is possible to hold certification in the most simple software program right up to the most complicated of network service managers, with all the stations in between.&lt;/p&gt; &lt;p&gt;Anyone who holds certification from this vast global enterprise that is Microsoft has to be taken seriously. These people do not necessarily work for Microsoft, or even for a certified service provider. They may be freelancers, who will proudly display their certification, knowing that they will instill into their client the peace of mind that only working with a person who takes their profession seriously can bring.&lt;/p&gt; &lt;p&gt;Even with the entire gloomy picture being painted of the economy and job prospects for 2009 and even parts of 2010, professionals in the computer software industry stand a better chance than most of keeping their heads above water. Especially those who had the sense and the ability to think forward. Those who were prepared to settle only for one of the many Microsoft software certifications.&lt;/p&gt; &lt;p&gt;The powers that be at Microsoft, still the World&#39;s leading software designers decided that they would group their programs under as single umbrella when it came to studying the software as well as being granted certification on a particular aspect of it.&lt;/p&gt; &lt;p&gt;This means that a graduate of the Microsoft study program would be given the status as a professional operator, with specialization within a certain role. Some of the roles are designated as follows: &lt;/p&gt;&lt;ul&gt;&lt;li&gt;Microsoft Certified IT Professional&lt;/li&gt;&lt;li&gt;Microsoft Certified Professional&lt;/li&gt;&lt;li&gt;Microsoft Certified Systems Engineer&lt;/li&gt;&lt;li&gt;Microsoft Certified Systems Administrator&lt;/li&gt;&lt;/ul&gt;  &lt;p&gt;Microsoft Certification provides the programs&#39; participants with the following very worthwhile ammunition to help them get ahead in the tough World of network supervision. &lt;/p&gt;&lt;ul&gt;&lt;li&gt;Total familiarity with all Microsoft Windows network programs&lt;/li&gt;&lt;li&gt;The ability to design, plant and implement network systems&lt;/li&gt;&lt;li&gt;The ability to analyze, detect and prepare any problems that can appear in any Microsoft Windows network programs&lt;/li&gt;&lt;li&gt;The ability to design and implement a network security program in any of the Microsoft Windows network programs&lt;/li&gt;&lt;/ul&gt;  &lt;p&gt;In order to allow certification, potential candidates must attend and complete a course, covering the general aspects of Microsoft software programs for networks, as well as particular certification on the student&#39;s specialist subject. There is also the possible to study online, through the purchase of an online study guide. However the student must attend the examinations on site, in order to receive certification on the subject that they reach the necessary standards.&lt;/p&gt; &lt;p&gt;Students can also acquire more than one specialist certificate, with many of them adding to their list of specialist subjects gradually over the years, either in the quest of increased knowledge or particular demands of their career.&lt;/p&gt; &lt;p&gt;Whatever way you look at it, Microsoft Certification holds the key that will open doors to the most successful career in network management.&lt;/p&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://nextexpert.blogspot.com/feeds/4361246365253566177/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://nextexpert.blogspot.com/2009/01/map-out-your-future-through-microsoft.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5063542324837000555/posts/default/4361246365253566177'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5063542324837000555/posts/default/4361246365253566177'/><link rel='alternate' type='text/html' href='http://nextexpert.blogspot.com/2009/01/map-out-your-future-through-microsoft.html' title='Map Out Your Future Through Microsoft Certification'/><author><name>HackMeLOL</name><uri>http://www.blogger.com/profile/09525841867171923633</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5063542324837000555.post-6342062313703208518</id><published>2009-01-23T03:41:00.000-08:00</published><updated>2009-01-23T03:52:24.460-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Social Network"/><title type='text'>Using Social Networks Properly</title><content type='html'>So you want to get free advertising, traffic and back links from the multitude of social networks out there but you don&#39;t know which to use and what to do. Hopefully today you&#39;ll learn a few useful tips to boost your profile and maximize the buzz of social networks.&lt;p style=&quot;text-align: justify;&quot;&gt;  &lt;b&gt;Where To Start?&lt;/b&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; &lt;b&gt;Digg&lt;/b&gt; is hard to use unless you&#39;ve been around a while. It&#39;s top users really flex their collective muscle when it comes to dominating the front page. That doesn&#39;t mean you shouldn&#39;t add your articles - Not at all - Adding your articles to Digg, making tons off friends and testing the water is well worth it. Chances are you WON&#39;T make the front page, but if you do......traffic jackpot.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; &lt;b&gt;Propeller&lt;/b&gt; is fast to use, which means you can get in and out with much fuss, so I highly recommend adding your link there.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; &lt;b&gt;Stumble Upon&lt;/b&gt; is nowhere near as good as it was and you have to stumble a ton of site to get and credibility. You should add your profile and your blog/site, but don&#39;t expect the promise you may hear.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; &lt;b&gt;Reddit&lt;/b&gt; is pretty good and low effort so definitely give it a try.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; &lt;b&gt;Delicious&lt;/b&gt; is a little bit of a pain - The tool bar you have to download is annoying and the whole submission process could be handled better, but if your site gets buzz from delicious then it will all be worth the fuss.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; The key to the major sites is to make friends, comment on articles and be positive. You will get reciprocal votes, as long as you appear genuine and give someone a value of sorts.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;  &lt;b&gt;Twitter&lt;/b&gt; - Here is a little trick for twitter to get an extra &quot;dofollow&quot; link. You get to add your website or blog, but if you stick your site url in your bio entry, you&#39;ll get an extra &quot;dofollow&quot; link. A nicve little bonus.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; &lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; Using &lt;b&gt;Myspace&lt;/b&gt; and &lt;b&gt;Facebook&lt;/b&gt; - These two can be useful as you just upload your links on your profile and add friends galore. People who follow you on Social Networks have a greater trust for you and therefore your site or blog, making preselling easier. The slot machine chat room on Facebook is a great way to find new friends to add.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;  &lt;b&gt;Qassia&lt;/b&gt; is relatively new, but a lot of smart people are using it to get backlinks (pr5) to there websites. With Qassia, you add articles and get rewarded with a &quot;dofollow&quot; backlink and Qassia &quot;cash&quot;.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; Qassia Cash can be used to advance you link positions and there is talk that it will be able to be used to purchase advertising. I find Qassia the easiest source of &quot;dofollow&quot; backlinks available.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; You can join Qassia &lt;a href=&quot;http://theace.qassia.com/&quot;&gt;Here&lt;/a&gt; - It&#39;s worth joining believe me.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;  &lt;b&gt;Pligg Sites&lt;/b&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; These mini &quot;Digg&quot; sites are worth a mention as they when used properly , help you build up some nice little traffic. Pligg sites are Digg clones and as such are easy to submit and vote on. They a much smaller so they won&#39;t get you anywhere near as much traffic, but because they are small they are easier to dominate and make the front page.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; Just like the big social bookmarking networks, Pligg sites work by you submitting a link and then others vote on it. You can add friends and get more votes, which is always a good strategy.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; The best Pligg based sites are Topstumbles, DropJack and StuffDaily.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt;  Using these can help get you the extra traffic boost you want to take your &quot;numbers&quot; to the next level.&lt;/p&gt;&lt;p style=&quot;text-align: justify;&quot;&gt; You can find more info on Small Business strategies and other helpful advice at &lt;a href=&quot;http://www.thesolutionwebsite.com/&quot;&gt;The Solution Website&lt;/a&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://nextexpert.blogspot.com/feeds/6342062313703208518/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://nextexpert.blogspot.com/2009/01/using-social-networks-properly.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5063542324837000555/posts/default/6342062313703208518'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5063542324837000555/posts/default/6342062313703208518'/><link rel='alternate' type='text/html' href='http://nextexpert.blogspot.com/2009/01/using-social-networks-properly.html' title='Using Social Networks Properly'/><author><name>HackMeLOL</name><uri>http://www.blogger.com/profile/09525841867171923633</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5063542324837000555.post-8616076115437548395</id><published>2009-01-22T12:10:00.000-08:00</published><updated>2009-01-22T12:12:12.105-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Internet Scam"/><title type='text'>Scareware Beware!</title><content type='html'>&lt;div style=&quot;text-align: justify; font-family: georgia;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;There is a new internet scam going around now. It is called Scareware! So what exactly is Scareware? You have heard of spyware and shareware, and now there is Scareware. And it can be scary indeed, along with costly. Scareware shows up on a computer, saying that there is a problem and offers to fix it, for a price. The ads warn people their computer is infected, maybe with illegal porn or worse a dreaded virus that will crash their computer. Experts say these ads are a front for a nasty virus. They are a mask for a virus that tries to scare people in to buying anti-spyware. You are at risk even if you don&#39;t buy the anti-spyware. What they are doing is basically asking you to pay money to protect your computer from them!&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;text-align: justify; font-family: georgia;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; Scammers make very realistic copies of real sites and then booby trap these sites with a virus. Once you are on of these sites the Scareware alerts you to a problem and offers to scan your computer and then finds all kinds of problems. And then tries to sell you anti-virus software at $49.95. It doesn&#39;t matter if you buy the software or not because by this time pop-up ads take over your computer multiplying too fast to close and you can&#39;t get your computer to release until you buy the software!&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify; font-family: georgia;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; Microsoft&#39;s latest intelligence report says that 8 million computers have been infected with Scareware! The Federal Trade Commission says 1 million people have had their computers infected with Scareware and the scammers have scammed those million people out of $40,000!&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify; font-family: georgia;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; So, how can you protect yourself from this Scareware? You can always check out the RipOff Report or the Better Business Bureau before you do ANYTHING online. But the best advice I can give you is NEVER click on a link in an email unless you know who that email is from and NEVER EVER click on an ad saying you may have a virus on your computer because if you do click, you will definitely have a problem. It will fry your computer!&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;text-align: justify; font-family: georgia;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt; An informed consumer is a smart consumer!&lt;/span&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://nextexpert.blogspot.com/feeds/8616076115437548395/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://nextexpert.blogspot.com/2009/01/scareware-beware.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5063542324837000555/posts/default/8616076115437548395'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5063542324837000555/posts/default/8616076115437548395'/><link rel='alternate' type='text/html' href='http://nextexpert.blogspot.com/2009/01/scareware-beware.html' title='Scareware Beware!'/><author><name>HackMeLOL</name><uri>http://www.blogger.com/profile/09525841867171923633</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5063542324837000555.post-1577029592357656586</id><published>2009-01-22T11:13:00.000-08:00</published><updated>2009-01-22T11:22:47.693-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking"/><title type='text'>What is Hacking?</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;What is your definition of hacking? Most people think of the news stories that relate to big companies having embarrassing problems as their data is compromised. But in truth, hacking goes a lot further than this.&lt;br /&gt;&lt;br /&gt;It doesn&#39;t always have to be someone you don&#39;t know who hacks into your systems and causes problems for your business. It could equally be someone who works for you that doesn&#39;t have your best interests at heart. This is because the basic meaning of hacking is when someone accesses some or all of your computer systems without permission. And it doesn&#39;t just happen over the internet.&lt;br /&gt;&lt;br /&gt;Quite often, many people don&#39;t see how widespread computer hacking computer hacking that they are only in danger from internet based attacks means they may not be covered for all risks. Even those companies that do all they can to prevent hacking which occurs online may have unwittingly turned a blind eye to other dangers.&lt;br /&gt;&lt;br /&gt;This is why an understanding of what hacking is and what it involves can help you to protect your own business more fully. But what do you do if you don&#39;t know all the ins and outs of the threats posed?&lt;br /&gt;&lt;br /&gt;The easiest solution is to rely on an expert to make sure every potential hole is plugged, and no one can break into your systems. Network penetration testing is one of the best ways to see how good your computer network really is. If you do have vulnerabilities it&#39;s best to find out via someone who is honest and is looking for them to benefit you. If you assume everything is okay and it isn&#39;t, you could be in for a nasty shock at some point in the future.&lt;br /&gt;&lt;br /&gt;It is probably because people limit their definition of hacking that some businesses are more in danger than they realise. Everyone likes to think that all their employees are working honestly and for the company&#39;s good, but it doesn&#39;t always pan out that way.&lt;br /&gt;&lt;br /&gt;Supposing an employee was given notice to leave but they had until the end of the day to clear their desk. They could potentially do a lot of damage to your computer system before they left, if the mood took them that way. Even though you could have them arrested for their actions, the damage would still be done and it would take time to rectify.&lt;br /&gt;&lt;br /&gt;An expert in the field of ethical hacking would be able to highlight any potential problems and solve them before anyone else had a chance to exploit them. And that is certainly a service that is worth paying for.&lt;br /&gt;&lt;br /&gt;Don&#39;t make the mistake of thinking this should only be done once though. Hackers are constantly finding new ways into previously secure systems. If you employ a company to see how up to date your security measures really are, make sure you do it on a regular basis. If you don&#39;t, you still run the risk of being caught out.&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://nextexpert.blogspot.com/feeds/1577029592357656586/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://nextexpert.blogspot.com/2009/01/what-is-hacking.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5063542324837000555/posts/default/1577029592357656586'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5063542324837000555/posts/default/1577029592357656586'/><link rel='alternate' type='text/html' href='http://nextexpert.blogspot.com/2009/01/what-is-hacking.html' title='What is Hacking?'/><author><name>HackMeLOL</name><uri>http://www.blogger.com/profile/09525841867171923633</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>