Sunday, July 29, 2012

On 7:30 AM by SMediaSol in ,    5 comments








  • V3.com URL Forwarding: url or domain forwarding (also called 'redirect') transfers your traffic from your V3 Sub Domain to another domain. Build traffic for a V3 domain and then redirect it to any site you want without changing your hosting provider! Matching Email Forwarding: together with your V3 sub domain you get a free email address that will forward wherever you want, i.e. if you get 'mysite.go.to' your email forwarding will be mysite@go.to.

Domain Name Registration Service, Register your domain name through DomainProcessor and use our Free Ad-free URL Forwarding Service! Absolutely NO advertisements on your site! Users type in your domain name and they are sent directly to your existing site. It's straight forward Free Ad-free URL Forwarding.

  • 4-all - Get url like yourname.4-all.org.
  • Domain.TK Free domain forwarding, Register a domain name. It's FREE! For example: www.mydomain-name.tk Dot TK - Renaming The Internet
     
  • Shorturl.com is a cost free and annoying ad free URL forwarding service (a.k.a URL redirection) To get a ShortURL for your website. start by choosing a username.domain.com.
  • Beam.to - http://beam.to/you
  • Active.ws - Redirection service with traffic statistics, useful web site tools and no ads.
  • F2B.be - Get one (or more) subdomains of our domains: you.f2b.be you.ssr.be you.short.be It's all AD-free.
  • Here is - here.is/you and also email address. Only for non comercial use. And only two redirects per user. At the bottom of their redirects (your web pages) there will be space for advertisements (banners).
  • Webalias - webalias.com/you. This URL redirection allow you to add access restricitions on your site. You get statistics too, and will be listed in their directory.
  • Has.it - Choose from: has.it, does.it, knows.it, shows.it, makes.it, owns.it, rules.it, says.it and rock.it. And no advertising.
  • hotRedirect - You can choose from 8 domains: hothere.com, coolhere.com, homepagehere.com, mustbehere.com, onlyhere.com, pagehere.com, surfhere.com and zonehere.com. Plus: URL hiding, path forwarding, unlimited email adresses, detailed hit tracker and free submission to major search engines.
  • ipFox - "You get yourname.ipfox.com subdomain. Fetaures: no advertisements - you will not be annoyed by popup banners or delayed redirection, optional ""www"" - you can access your site with or without ""www."" prefix, path forwarding and URL cloaking."
  • zwap.to This is a totally free URL redirection service that allows you to obtain a shorter, easier to remember URL such as zwap.to, zwitch.to, zlap.to, zmack.to, zlip.to or znap.to. Make it easier for those web surfers to remember your sites address and keep them coming back thanks to zwap.to.
  • Explode.to Explode.to offers FREE URL redirection. Instead of some long and hard to remember address you can have something as easy as http://explode.to/yoursite. This service is 100% free of charge with no annoying popups or ad banners.
  • Shim.net - Currently available: you.shim.net and you.freegaming.org.
  • Ulimit - You can have address: you.fr.st, you.ca.tc, you.be.tf, you.com.bi, you.bsd-fan.com, you.java-fan.com, you.linux-fan.com, you.unixlover.com, you.best.cd or you.fr.fm.
  • MYredirector 16 domains for your shorter URL, ClickToGet.to ClickToSurf.to ClickToLearnHow.to ToGet.to ToFly.to ToZip.to GotIt.at lapageweb.de and more
  • CJB.net yourname.cjb.net
  • IsCool Many URLs
  • Gonow.to This Short address can also be accessed as http://gonowto.com/yourname and http://gonowto.net/yourname. Get it now.
  • Opt.To - Free URL Redirects - Many urls and sub domains to choose from! - Cool Domain Names and Sub Domains We can offer you a Free Redirect URL that will be easy to remember and does look cool ! You keep your current service provider and current URL, which will be the target url.
  • VDirect - Free Lifetime URL and Email Address with a VDirect Redirect If the URL your Internet Service Provider gives you is long, or hard to remember, a VDirect allows you to
so don't worry about long ulr s
DON'T FORGET TO POST A COMMENT 

Monday, April 16, 2012

On 8:57 AM by SMediaSol in ,    1 comment
It is believed that holes are wrath of god on this earth and are pathway to hell. Most people reading this would agree but here it is certainly not the case. Holes created in different parts of the world either due to human works like mining, as sum of these are diamond mine shafts that have been abandoned or due to wrath of god as we all know through meteor shower or something similar falling that made the dinosaurs extinct are today popular vacation spots as they are a visual extravaganza.
Whether it’s the Great Blue Hole of Belize, Mirny Diamond Mine of Siberia or the Burning Gates of Turkmenistan, all of these attract a hell lot of tourists and adventure seekers every year just to get a glimpse and experience the ultimate souvenir of nature. Check these cool pictures.


Mirny Diamond Mine of Siberia


On 8:19 AM by SMediaSol   No comments
Israel imposed a ban on iPad over disruption of wireless signal.
Yes, the battle is still on. According to Korea Times, Samsung will file court ban of all Apple device in South Korea.
Israel bans iPad
Israel banned Apple's iPad as the government is concerned that the new product will hog wireless signals that may disrupt other gadgets and devices. Thus, the government prevented tourists to bring an iPad with them. The ban was lifted on April 2010.
UAE and Saudi Arabia ban Blackberry
Israel imposed a ban on iPad over disruption of wireless signal.United Arab Emirates and Kingdom of Saudi Arabia placed a ban on the use of Blackberry on grounds of national security. The governments placed the blame on service providers unable to keep the messages private.
Germany bans Galaxy Tab 10.1
Like us on Facebook
Apple bested out its rival Samsung after triumphantly won a court ruling which bans the sale of Samsung's Galaxy Tab 10.1 until the patent war is resolved.
US bans iPod/iPhone
US Track and Field competitions banned the use of iPads/iPhones and headphones to avoid competitive advantage to runners. The organizers said that runners must focus on the marathon and not on the music.

North Korea bans cellphone
After the explosion in the city of Ryongchon, The government of North Korea imposed a ban on cellphones punishable by public execution. However, Theban was lifted in 2008.
Cuba bans cellphone
Former Cuban tyrant Fidel Castro banned the use of cellphone as he said that Cuba must not submit to the ideas proliferated by its number one enemy - United States. When Fidel Castro's brother Raul Castro took office, he lifted the ban and allowed the use of cellphones in public.
India bans Chinese phones and gadgets
India imposed a ban on phones and other gadgets made from China-based companies as they could be equipped with spyware and malware that could threaten nation's security.
UK bans Plasma TV
Climate change battle in UK prompted the European Union to ban Plasma TV that consumes greater energy and has higher carbon emissions. Ministers of countries in Europe welcomed the ban to boost climate change policies.
California bans TV sets
California Energy Commission bans sales of TV sets unless they met the new efficiency standards when they are turned on.
Australia bans laser pointers
After an automatic helicopter was aimed with a laser pointer, Australia considered laser pointers as vicious weapons in Australia. Carrying a pointer in class is subjected to $5000 fine
On 8:10 AM by SMediaSol in    1 comment
Hacking the systems can be both ethical and unethical. There are many hackers who are famous for hacking computer systems and other communication systems. To know, who are the world's top 10 most famous hackers.

1. Kevin David Mitnick
Kevin David Mitnick At the age of 16, Kevin Mitnick hacked the computer systems of Digital Equipment Corporation (DEC) and copied the software, which they had developed for their computer's operating system and also hacked the Pacific Bell voice mail computers. Kevin used social engineering to get the confidential information of the people by manipulating them. He used cloned cell phone to hide his location from the police. He even copied the valuable software by hacking into the computer systems of Motorola, NEC Corporation, Nokia, Sun Microsystems and Fujitsu Siemens.
2. Gary McKinnon
Gary McKinnon His nick name is Solo. He is famous for hacking military and NASA computers. Gary hacked the military computers and deleted very important files from the operating systems of the computer network, which caused automatic shut down of 2000 computers for 24 hours. He also hacked 16 NASA computers. In a BBC interview, Gary McKinnon said that "he was not a malicious hacker bent on bringing down US military systems, but rather more of a bumbling computer nerd". The government officials claim that he caused a $700,000 loss for the government.
3. Jonathan James
Jonathan James, a.k.a., c0mrade, intruded into the Defense Threat Reduction Agency (DTRA) servers and hacked the emails and passwords of the employees by installing a back door in the server. He also stole a software from NASA, which was worth $1.7 million.
4. Adrian Lamo
He hacked the computer network systems of The New York Times, Yahoo!, and Microsoft. He worked on the WikiLeaks scandal case and reported to the federal authorities that Bradley Manning, an army officer, leaked confidential information from the government documents.
5. Stephen Gary Wozniak
Stephen Wozniak (Woz) is the founder of Apple computers, who is basically a computer engineer and a programmer. He invented machines which significantly contributed to the 1970s computer revolution. He is a white hat hacker and he assembled a computer by designing his own hardware and software. He and his best buddy, Steve Jobs (co-founder and CEO of Apple), researched on frequencies and created an electronic device called 'blue box', to make distance calls, free of cost. Woz, once called The Pope, using his blue box and made Pope believe him to be Henry Kissinger. He received the National Medal of Technology (1985) and Doctor of Engineering degree (1989) from the University of Colorado at Boulder.
6. Kevin Poulsen
He is a former black hat hacker who crashed thousands of telephone lines connecting to a radio station in Los Angeles, named KIIS-FM, to get a prize to be the 102nd caller. He is also famous for lock-picking, money-laundering and cyber-crime, etc. He even hacked the computer systems of FBI and was sentenced to 51 months imprisonment. He is currently working as a journalist in Wired News.
7. Robert Tappan Morris
Robert Tappan Morris is an American scientist who created the world's first computer worm which was called Morris Worm. While doing his graduation in Cornell University, Robert created this worm, which affected many computer systems. He was also accused under Computer Fraud and Abuse Act and was sentenced to three years of imprisonment, 400 hours of community service and a huge fine of $10,050.
8. Vladimir Levin
He used dial-up wire transfer service to hack the username and password of the Citibank account holders and stole $10.7 million. He was sent to jail for three years, and later Citibank upgraded their systems.
9. Richard Stallman
He is also called the 'Father of free software'. He claims that software should not have restricted access and so he created codes to break it. He also nullified the password settings of the users in computer labs.
10. Tsutomu Shimomura
Tsutomu Shimomura is a computer security expert and a scientist from Japan. He became instantly famous for helping the FBI to arrest the famous hacker, Kevin Mitnick. He employed a cellular frequency antenna and connected it to his laptop and traced Kevin Mitnick.
On 7:51 AM by SMediaSol in , ,    No comments
What is 3G Technology?
3G is the next generation of technology which has revolutionized the telecommunication industry. Apart from increasing the speed of communication, the objective of this technology is to provide various value added services like video calling, live streaming, mobile internet access, IPTV, etc on the mobile phones. These services are possible because the 3G spectrum provides the necessary bandwidth.
What is 3G Technology
Technically speaking 3G is a network protocol which refers to the generations of mobile phones and telecommunication equipments which are compatible with the International Mobile Telecommunications-2000 (IMT-2000) standards stated by International Telecommunication Union (ITU). The basic requirement for compiling to IMT-2000 standards is that the technology should provide peak data rates of atleast 200 kbit/s. It’s worth mentioning that speed isn’t the only criteria for deciding whether the network protocol is 3G or not. 3G isn’t just any high speed network but a protocol which has its own standards defined under IMT-2000 by ITU.
3G Technology is designed for multimedia communication. It provides services like higher data transfer rates. One of its key visions is to provide seamless global roaming, enabling users to move across
borders while using the same number and handset. According to ITU it is expected that IMT-2000 will provide higher transmission rates: a minimum speed of 2Mbit/s for stationary or walking users, and 348kbit/s in a moving vehicle.
Birth of IMT-2000
The concept of IMT came into existence in the mid-1980s at ITU. It took more than ten years for the approval of standards for the next generation systems. These standards are branded as IMT-2000. Under the technical specifications the spectrum between 400 MHz and 3 GHz was dictated technically suitable for the third generation. IMT-2000 is the result of collaboration of many entities, inside the ITU (ITU-R and ITU-T), and outside the ITU (3GPP, 3GPP2, UWCC and so on). This approval has made possible the full interoperability and interworking of mobile systems.

It facilitates five radio interfaces based on three technologies namely FDMA, TDMA and CDMA. The accommodated radio interfaces are : IMT-DS, IMT-MC, IMT-SC, IMT-TC, IMT-FT
Disadvantages of 3G Technology and its impact upon acceptability
  • Penetration of internet is still below average in rural India. To understand the tech-savvy specifications of 3G technology will definitely be problem.
  • This technology is not compatible with all mobile phones. The user has to buy a new mobile phone that can support 3G technology.
  • Till its launch, there are only two service providers offering 3G technology service. Lack of multiple options might be a disadvantage.
  • Video conferencing is not possible if one of the persons engaged in the conversation does not have 3G compatible phone.
On 7:37 AM by SMediaSol in , , ,    1 comment
hi friends i hope you are regularly visiting our Free airtel gprs trick 2012 and all working proxy tricks.We have include one more trick in this list.We have found another two new working proxies that we are giving in this article.This article is posted under free latest new airtel 3G gprs trick april 2012..
smsandhra

#instructions

Step 1 : Create new internet/gprs setting
apn: airtelgprs.com
proxy: lodgeus.com
port: 80
HP: fb.me

[Proxy is 100 working and testing.]

Sunday, April 15, 2012

On 9:23 AM by SMediaSol in , , ,    No comments
This tutorial will tell you how to hack Yahoo Messenger while you are engaged in chatting with some person. While you are chatting through Yahoo Messenger , Yahoo will hide the IP addresses of all the computers that are connected through the Yahoo Messenger application to the chat room. So it is not possible to directly find out the IP of the person you want to hack. Then how to get the IP address? Yes it is still possible to hack the IP address during the Yahoo Messenger chat. The procedure to Hack Yahoo Messenger is discussed in detail below.
While you are chatting via Yahoo Messenger the communication between you and the person you want to hack, takes place indirectly via Yahoo server and not directly. It is not possible to hack Yahoo Messenger directly to get the IP address. So to hack his IP, you must establish a direct communication with him. So ,how to do this? It’s easy. Just start chatting with some one via Yahoo Messenger . During the process of chatting send him a big file. Now the file transfer takes place directly between your computer and the victim’s computer(via Yahoo Messenger application). So now, you are ready to go. Here’s the step-by-step process to hack Yahoo Messenger and get the IP address of the person .
  • Goto the COMMAND PROMPT (START>>>RUN>>>Type CMD).
  • Here Type “netstat -n” (without quotes).
NOTE: If you are new to “netstat” and other IP related commands refer this tutorial: Windows XP IP Utilities
  • The pic given below shows netstat results of my computer. I was not chatting when i took this pic and hence it looks modified.
  • Here local address is your own IP and the foreign address is the IP address of the recipient with whom you are connected via Yahoo Messenger (There may be multiple recipients and hence multiple foreign addresses).
  • Now send him the file.
  • Check the output by typing the command “netstat -n” (without quotes).
  • Assume the output is something like this.
TCP 127.0.0.10:5101 124.55.23.11:1246 ESTABLISHED
Here 124.55.23.11 is the IP address of the person with whom you are chatting and 1246 is the port number where connection is established. That’s It! You have now hacked Yahoo Messenger to get his IP address.
Once you hack Yahoo Messenger  and get his IP address you can use any of the Remote Administration tools or perform NETBIOS Hacking .
  • NOTE: Some times there are chances where in the file transfer gets encrypted (takes place via Yahoo server itself). So in this case the above hack may fail to work.