Saturday

Secure Your Computer: HTTP and The Web (Internet)

HTTP and The Web (Internet)

HTTP and The Web (Internet)

When you say, 'the Internet,' what comes to mind for most people is, in fact, the World Wide
Web. The World Wide Web, or just the Web, is not the Internet. Instead, it is a method of using
the Internet to exchange information between computers. The Web uses http or hypertext
transfer protocol and services known as web browsers and web servers to allow information in
the form of web pages to be exchanged between local and remote computers.
On the local side, what you see is the web browser. Information from the remote computer is
sent to your local computer using the http protocol. The web browser interprets that
information and displays it on your local computer in the form of web pages.
The hypertext part of the http protocol refers to a non-linear method of presenting
information. Text is normally read in a linear fashion: word 2 follows word 1; sentence 3 follows
sentence 2; paragraph 5 follows paragraph 4. The idea of hypertext allows information to be
viewed in a non-linear way. This is the major difference between hypertext and the older,
plain text methods of displaying information.
With hypertext, words and ideas can connect, not only with the words that directly surround
them, but also with other words, ideas or images. Hypertext is not restricted to the Web. Most
full-featured word processors will allow you to create locally stored pages in web or http
format. These pages are read using your web browser and act as would any other web page,
only they are stored on your local computer, not a remote computer
On your local Http and The Web Http and The Web computer, you use a client program called a web browser. Contrary to what
you might have been lead to believe, there are actually a number of web browsers available
for both Windows and Linux. These include Microsoft's Internet Explorer, Netscape Navigator,
and the Mozilla Firefox browsers.
HTTP

You can also create your own web page. The easiest way to do this is to use one of the
common word processors, such as Open Office, Microsoft Word, or WordPerfect. These
programs will allow you to produce simple web pages, combining text, hypertext and images
Plenty of people have made useful, clever and innovative web pages using these simple
tools.
But these pages aren't flashy. Flashy means frames and scripts and animations. It also means
spending lots of money on a fancy web page design program. These programs allow you to
create many interesting effects on your web page, but they are more complex to use than
the word processors that you are probably already familiar with.
Once you have the pages designed, you'll need a computer to put them on, so that other
people can view them. This is called web hosting.
The hosting computer will be running a web server. It is possible to run one of these servers
from your own home, using your own computer, but there are several drawbacks, the primary
one of these being persistence. Information stored on a web server is only available when
that server is powered up, operating properly and has an open connection. So, if you want to
run a web server from your own bedroom, you have to leave your computer on all the time;
you have to make sure that the web server program is operating properly all the time (this
includes troubleshooting hardware problems, controlling viruses, worms and other attacks,
and dealing with the inevitable bugs and flaws within the program itself), and you have to
keep a connection to the Internet open. This is why most people pay someone else to do all
this.
HTTP Clint Machine

A web hosting company will store your web page on their computer. A perfect web hosting
company will have multiple, redundant servers and a regular backup policy, so that your
service is not lost because of hardware problems, a support staff to keep the server running
despite hacker attacks and program bugs, and a number of open connections to the
Internet, so that all your have to do is design your web page, upload it to the hosting
company's server, hang up the phone, turn off the computer, and go to sleep, and your web
page will be available to the entire world.
It's also possible to find organizations that offer free web hosting. Some of these organizations
are funded by paid advertising, which means that anyone who wants to view your web page
will first have to view someone else's advertisement. But they don't have to buy anything, and
you don't have to pay anything.

Thursday

Secure Your Computer: Types of Passwords

Types of Passwords

Types of Passwords


There are three main types of Passwords.

Strings of Characters

Strings of characters the most basic level of passwords(strings of characters,numbers and symbols).Access to a keyboard or keypad allows entry of these types of passwords. These passwords are simplest. To the more complicated combinations of characters,numbers and symbols that are recommended for protecting highly confidential information.
Password Forgot ?

Strings of Characters Plus a Token

The next level in password is to require a string of characters,numbers and symbols plus a token of some type,Ex.ATM which requires a card , The token plus a personal identification number or pin.

Biometric Passwords

Biometric Passwords this is the use of non-reproducible biological features, such as fingerprints or facial features to allow access. Ex retinal scan ,In which the retina which is the interior surface of the back of the eye is photographed. The retina contains a unique pattern of blood vessels that are easily seen and this pattern is compared to a reference. Biometric passwords are the most sophisticated and are considered “safer” but in reality a password that you 'carry' in your finger or eye is no safer than a strong password that you carry in your mind.


Secure Your Computer: Build A Strong Password

Secure Your Computer: Build A Strong Password

Build A Strong Password

The best passwords:
    • Cannot be found in a dictionary
    • Contain numbers,letters and those odd swear symbols on top of the numbers
    • Contain upper and lower case letters
    • The Longer the “Stronger”.

With a 2 letter password, and 26 letters in the alphabet,plus 10 numbers there are 236 possible combination(687,000,000) possibilities. Increase the password length to 8 characters, and there are 836 combination . You can calculate how many combination of 8 characters.(324 *100000000000)
There are many password generators available on the Internet,but these will generate a nearly impossible to remember password.
Try to use strings of letters or numbers that you can easily recall.
Goliw3b!(goli with 3 bears!)
SlS8w30(shirt (size) L ,souse size 8,pant west 30)

Wednesday

Secure Your Computer: Web Application Problems

 Web Application Problems

Web Application Problems

Common web application problems are classified below 
  • Authentication  These are the identification and authorization mechanisms used to be certain that the person or computer using  the web application is the correct person to be using it .



Authentication
         
  • Non-Repudiation  : A record that proves that the data sent to or from the web application was really sent and where.
  • Confidentiality :   A way to assure that communication with the web application cannot be listened in on by another person.
  • Privacy : A Way to assure that the way you contact and communicate with the web application cannot be per-determined by another person. 
  • Indemnification :These are ways to assure that the web application has legal protection or at the least, can be financially protected with insurance.
  • Integrity : This is a record of the validity of the communication with the web application to assure that what is sent and then received by the other is the same thing and if it changed, both the web pplication
    and the user have a record of the change.


     

Monday

Secure Your Computer: Proxy methods for Web Application Manipulation

Secure Your Computer: Proxy methods for Web Application Manipulation

Secure Your Computer: Proxy methods for Web Application Manipulation

Secure Your Computer: Proxy methods for Web Application Manipulation

Proxy methods for Web Application Manipulation

There are several steps that can be taken to protecting your server. These include ensuring
that your software is always updated and patched with any security updates that are
available from the manufacturer. This includes ensuring that your OS and web servers are
updates as well. In addition, Firewalls and Intrusion detections systems can help protect your
server, as discussed
Firewalls

Firewalls

Firewalls originally were fireproof walls used as barriers to prevent fire from spreading, such as
between apartment units within a building. The same term is used for systems (hardware and
software) that seeks to prevent unauthorized access of an organization's information. Firewalls
are like security guards that, based on certain rules, allow or deny access to/from traffic that
enters or leaves an organization (home) system. They are important systems safe guards that
seek to prevent an organization’s system from being attacked by internal or external users. It is
the first and most important security gate between external and internal systems.
Firewalls are generally placed between the Internet and an organization’s information system.
The firewall administrator configures the firewall with rules allowing or denying information
packets from entering into or leaving the organization.
The rules are made using a combination of Internet Protocol (IP) address and Ports; such rules
are made depending on the organization needs e.g. in a school, students are allowed in
based on identity card.
The rule to the security guard in a school would be to allow all persons that carry a valid
identity card and deny everyone else. However the security guard would have another rule
for exiting from the school; the rule would be to allow everyone exit except small children
unless accompanied by adults. A similar system is followed for firewall configuration
depending on the nature of the organization, the criticality of information asset, cost of
security, security policy and risk assessment.
The firewall just like a security guard cannot judge the contents of the information packet; just
like the guard allows all persons with a valid identity card irrespective of nature of the persons,
firewall allows entry or exit based mainly on IP address and Port numbers. Hence an entry or
exit is possible by masking IP address or Port. To mitigate this risk, organizations use Intrusion
Detection System, which is explained in the next section.
There are various kinds of firewall depending on the features that it has viz. packet filter
(operates on IP packets), stateful firewall (operates based connection state) or application
firewall (using proxy).
Example of a firewall rule could be: Block inbound TCP address 200.224.54.253 from port 135.
(An imaginary example); such rule would tell a computer connected to Internet to block any
traffic originating from the computer with an IP address 200.224.54.253 using Port 135.
Important activities relating to firewalls are initial configuration (creating initial rules), system
maintenance (additions or change in environment), review of audit logs, acting on alarms
and configuration testing.More

Proxy methods for Web Application Manipulation

There are several steps that can be taken to protecting your server. These include ensuring
that your software is always updated and patched with any security updates that are
available from the manufacturer. This includes ensuring that your OS and web servers are
updates as well. In addition, Firewalls and Intrusion detections systems can help protect your
server, as discussed
Firewalls
Firewalls originally were fireproof walls used as barriers to prevent fire from spreading, such as
between apartment units within a building. The same term is used for systems (hardware and
software) that seeks to prevent unauthorized access of an organization's information. Firewalls
are like security guards that, based on certain rules, allow or deny access to/from traffic that
enters or leaves an organization (home) system. They are important systems safe guards that
seek to prevent an organization’s system from being attacked by internal or external users. It is
the first and most important security gate between external and internal systems.
Firewalls are generally placed between the Internet and an organization’s information system.
The firewall administrator configures the firewall with rules allowing or denying information
packets from entering into or leaving the organization.
The rules are made using a combination of Internet Protocol (IP) address and Ports; such rules
are made depending on the organization needs e.g. in a school, students are allowed in
based on identity card.
The rule to the security guard in a school would be to allow all persons that carry a valid
identity card and deny everyone else. However the security guard would have another rule
for exiting from the school; the rule would be to allow everyone exit except small children
unless accompanied by adults. A similar system is followed for firewall configuration
depending on the nature of the organization, the criticality of information asset, cost of
security, security policy and risk assessment.
The firewall just like a security guard cannot judge the contents of the information packet; just
like the guard allows all persons with a valid identity card irrespective of nature of the persons,
firewall allows entry or exit based mainly on IP address and Port numbers. Hence an entry or
exit is possible by masking IP address or Port. To mitigate this risk, organizations use Intrusion
Detection System, which is explained in the next section.
There are various kinds of firewall depending on the features that it has viz. packet filter
(operates on IP packets), stateful firewall (operates based connection state) or application
firewall (using proxy).
Example of a firewall rule could be: Block inbound TCP address 200.224.54.253 from port 135.
(An imaginary example); such rule would tell a computer connected to Internet to block any
traffic originating from the computer with an IP address 200.224.54.253 using Port 135.
Important activities relating to firewalls are initial configuration (creating initial rules), system
maintenance (additions or change in environment), review of audit logs, acting on alarms
and configuration testing.More

Secure Your Computer: Proxy methods for Web Application Manipulation

Proxy methods for Web Application Manipulation

Proxy methods for Web Application Manipulation

5-Pack Premium Reusable LCD Screen Protector with Lint Cleaning Cloth for Apple iPhone 3G 8GB 16GB [Accessory Export Packaging]An HTTP proxy server serves as a middle man between a web server and a web client
(browser). It intercepts and logs all connections between them and in some cases can
manipulate that data request to test how the server will respond. This can be useful for testing
applications for various cross-site scripting attacks (provide reference link here), SQL Injection
attacks and any other direct request style attack. A proxy testing utility (SpikeProxy, WebProxy,
etc), will assist with most of these tests for you. While some have an automation feature, you
will quickly learn that it is actually a weak substitute for a real person behind the wheel of such
tools.
Exercise 1: Choose your software
1. Download a proxy utility
2. Install the software according to the README file
3. Change your browser setting to point to the new proxy
• This is usually port 8080 on localhost for these tools but read the
instructions to be sure.
OtterBox Defender Case for iPhone 4 (Black)
Proxy Server

Once the proxy server is installed and your browser is pointed at it, surf around the site your
testing. Remember, be sure to use a website that you have permission to test. Once you have
surfed around, point your browser to the proxy's admin page (for SpikeProxy, it
http://www.immunitysec.com/resources-freesoftware.shtml) and begin testing the site. From
the admin interface you can have the tool brute force the site's authentication methods or
test for cross-site scripting. (Actually, we recommend using Mozilla or Firefox and
http://livehttpheaders.mozdev.org/ and http://addneditcookies.mozdev.org/ together to
modify headers and cookies on the fly without the need for a seperate proxy port. Not only
does it really simplify things, it's a much more powerful tool set as we teach it in ISECOM's
OSSTMM Professional Security Tester class (OPST). But since you will need to know about
setting up proxies for other things, like ad and spam filters, privacy filters, etc. We thought you
should actually set one up for real and Spike is a good one to try.)
A proxy server can be a powerful tool in helping you determine how solid a web application
is. For penetration tests or vulnerability assessments, you must have a good proxy tool in your
toolbox. There are detailed tutorials available on using SpikeProxy at
http://www.immunitysec.com/resources-papers.shtml.

Protecting your server
 There are several steps that can be taken to protecting your server. These include ensuring
that your software is always updated and patched with any security updates that are
available from the manufacturer. This includes ensuring that your OS and web servers are
updates as well. In addition, Firewalls and Intrusion detections systems can help protect your
server more.

Saturday

Thought Leaders in the Cloud: Talking with Todd Papaioannou, VP of Architecture, Cloud Computing Group at Yahoo - ITinsights - Site Home - TechNet Blogs

Thought Leaders in the Cloud: Talking with Todd Papaioannou, VP of Architecture, Cloud Computing Group at Yahoo - ITinsights - Site Home - TechNet Blogs

Secure Your Computer: E-Mails

 E-Mails

Secure Your Computer: POP and SMTP

POP and SMTP

POP and SMTP

After your e-mail client knows your e-mail address, it's going to need to know where to look for
incoming e-mail and where to send outgoing e-mail.
Your incoming e-mails are going to be on a computer called a POP server. The POP server –
usually named something like pop.smallnetwork.net or mail.smallnetwork.net – has a file on it
that is associated with your e-mail address and which contains e-mails that have been sent to
you from someone else. POP stands for post office protocol.
Your outgoing e-mails will be sent to a computer called a SMTP server. This server – named
smtp.smallnetwork.net – will look at the domain name contained in the e-mail address of any
e-mails that you send, then will perform a DNS lookup to determine which POP3 server it
should send the e-mail to. SMTP stands for simple mail transfer protocol.
When you start up your e-mail client, a number of things happen:
1. the client opens up a network connection to the POP server
2. the client sends your secret password to the POP server
3. the POP server sends your incoming e-mail to your local computer
4. the client sends your outgoing e-mail to the SMTP server.
The first thing to note is that you do not send a password to the SMTP server. SMTP is an old
protocol, designed in the early days of e-mail, at a time when almost everyone on the
Internet knew each other personally. The protocol was written with the assumption that
everyone who would be using it would be trustworthy, so SMTP doesn't check to ensure that
you are you. Most SMTP servers use other methods to authenticate users, but – in theory –
anyone can use any SMTP server to send e-mail

E-Mails

How E-mail Works ?
Just like airmail is sent through the air, 'e'-mail is sent through the 'e' – the 'e' in this case being
the web of electronic connections within and between the networks that make up the
Internet. When you send an e-mail from your computer, the data is sent from your computer
to an SMTP server. The SMTP server then searches for the correct POP3 server and sends your
e-mail to that server, where it waits until your intended recipient retrieves it.



E-mail accounts are available through many different sources. You may get one through
school, through your work or through your ISP. When you get an e-mail account, you will be
given a two part e-mail address, in this form: username@domain.name. The first part,
username identifies you on your network, differentiating you from all the other users on the
network. The second part, domain.name is used to identify your specific network. The
user name must be unique within your network, just as the domain name must be unique
among all the other networks on the Internet. However, user names are not unique outside of
their networks; it is possible for two users on two different networks to share user names. For
example, if there is one user with the address nj12@yahoo.com, there will not be another
user on yahoo.com whose user name is bill. However, nj12@gmail.com andnj12@yahoo.com are both valid e-mail addresses that can refer to different users.

One of the first things that you will do when you are setting up your e-mail is to enter your email
address into your e-mail client program. Your e-mail client is the program that you will use
to send and receive e-mails. Microsoft's Outlook Express may be the most widely known (since
it comes free with every copy of a Microsoft operating system), but there are many others
available for both Windows and Linux, including Mozilla, Eudora, Thunderbird and Pine.




POP And SMTP

Secure Your Computer: Good Safety Advice For Your Computer

 Good Safety Advice For Your Computer

Good Safety Advice For Your Computer

There are a number of simple things that you can do in order to minimize your risk to Malware.
• Only download from reputable sources ( that means no W4R3Z, please. )
• Don't open e-mail attachments from people you don't know.
• Don't leave macros enabled by default in your applications.
• Keep your OS and applications up to date with patches.
• If downloading and installing software with a checksum – check the checksum.

Friday

Computer Troma Center: Viruses

Computer Troma Center: Viruses

Computer Troma Center: Whats your password? (article on password safely)

Computer Troma Center: Whats your password? (article on password safely)

Logicbombs and Timebombs

Time bomb programming is used to allow you to download and try a program for a period of time – usually 30 days. At the end of the trial period, the program ceases to function, unless a registration code is
provided.Logic bombs and Time bombs are programs which have no replication ability and no
ability to create an access method, but are applications or parts of applications that will
cause damage to data should they become active. They can be stand-alone, or part of
worms or viruses.

Thursday

Whats your password? (article on password safely)

Hello friends
        I am back with the new tutorial on Password safety.

Now what is password safety bcoz this word known as a safety object itself.

But our passwords need safety bcoz its a straight-a-way key to your personal files or data.

so, here we go with some tricks and tips for you to keep your password safe.

Choice of your Password

          First and the most important step is choosing your password.
          some tips to be remembered before you select a password.

Your Password should not :-
  • be your Name, Last Name.
  • be your birth date, cell / car/bike registration number or library card number.
  • be a dictionary word.
  • be one of your favourite celebrity, movie or book/author/character name.
  • be less then 8(eight) character.
  • be any of your owns name.(i.e. name of your own house,car/bike,piano,company etc)
  • be any well known company/brand/website name.
  • be lucky number(i.e 786,13,007 etc).
  • follow any perticulare pattern or series.(i.e. 11aa22bbcc, 123456,1111,3333 etc)
Giving strength to your password
  • your password should contain Alphabets (lower and upper case), digits and symbols (i.e: a-z,A-Z,0-9,~!@#$%&* etc)
  • For example: $p@3pU#
Precautionary suggestions
  • Never disclose your password to anybody.
  • Never write your password anywhere, if though necessary write it in a way which is reachable to you only.
  • Use different passwords for different accounts.
  • Never mention you password and ID on Networking site.
  • Never choose "Remember my Password" option anywhere.
  • Always use on-screen keyboard to type your password if available.
  • Never use cyber cafe to access online baking.
  • In case you use cyber cafe, befor leaving the pc do not forget to delet cookies and history files shown as in image below.
CBC Links | SEO Link Submission

Saturday

Computer Troma Center: Viruses

Computer Troma Center: Viruses

Viruses

Viruses or virii are self-replicating pieces of software that, similar to a biological virus, attach
themselves to another program, or, in the case of “macro viruses”, to another file. The virus is
only run when the program or the file is run or opened. It is this which differentiates viruses from
worms. If the program or file is not accessed in any way, then the virus will not run and will not
copy itself further.


There are a number of types of viruses, although, significantly, the most common form today is
the macro virus, and others, such as the boot sector virus are now only found “in captivity

0 Worst Computer Virus

Boot Sector Viruses
The boot sector virus was the first type of virus created. It hides itself in the executable
code at the beginning of bootable disks. This meant that in order to infect a machine, you
needed to boot from an infected floppy disk. A long time ago, ( 15 years or so ) booting
from floppy was a relatively regular occurrence, meaning that such viruses were actually
quite well spread by the time that people figured out what was happening. This virus ( and
all other types ) should leave a signature which subsequent infection attempts detect, so
as not to repeatedly infect the same target. It is this signature that allows other software
( such as Anti-Virus-software ) to detect the infection

 The Executable File Virus
Kaspersky Anti-Virus 2011 3-User
 The Executable File virus attaches itself to files, such as .exe or .com files. Some viruses
would specifically look for programs which were a part of the operating system, and thus
were most likely to be run each time the computer was turned on, increasing their
chances of successful propagation. There were a few ways of adding a virus to an
executable file, some of which worked better than others. The simplest way ( and the least
subtle ) was to overwrite the first part of the executable file with the virus code. This meant
that the virus executed, but that the program would subsequently crash, leaving it quite
obvious that there was an infection – especially if the file was an important system file.
  
The Terminate and Stay Resident (TSR) Virus
 TSR is a term from DOS where an application would load itself into memory, and then
remain there in the background, allowing the computer to run as normal in the
foreground. The more complex of these viruses would intercept system calls that would
expose them and return false results - others would attach themselves to the 'dir'
command, and then infect every application in the directory that was listed – a few even
stopped ( or deleted ) Anti-Virus software installed onto the systems


The Polymorphic Virus
 Norton Antivirus 2011 - 1 User/3 Pc
Early viruses were easy enough to detect. They had a certain signature to identify them,
either within themselves as a method to prevent re-infection, or simply that they had a
specific structure which it was possible to detect. Then along came the polymorphic virus.
Poly – meaning multiple and morphic – meaning shape. These viruses change themselves
each time they replicate, rearranging their code, changing encryption and generally
making themselves look totally different. This created a huge problem, as instantly there
were much smaller signatures that remained the same – some of the “better” viruses were
reduced to a detection signature of a few bytes. The problem was increased with the
release of a number of polymorphic kits into the virus writing community which allowed
any virus to be recreated as a polymorph.

 The Macro Virus The
  Macro Virus makes use of the built-in ability of a number of programs to execute
code. Programs such as Word and Excel have limited, but very powerful, versions of the
Visual Basic programming language. This allows for the automation of repetitive tasks, and
the automatic configuration of specific settings. These macro languages are misused to
attach viral code to documents which will automatically copy itself on to other
documents, and propagate. Although Microsoft has turned off the feature by default now
on new installations, it used to be that Outlook would automatically execute certain code
attached to e-mails as soon as they were read. This meant that viruses were propagating
very quickly by sending themselves to all of the e-mail addresses that were stored on the
infected machine.


Worms
McAfee AntiVirus Plus 2011 3-User 
 Worms are older than viruses. The first worm was created many years before the first virus.
This worm made use of a flaw in the UNIX finger command to quickly bring down most of
the Internet.A worm is a program that, after it has been started, replicates without any need for
human intervention. It will propagate from host to host, taking advantage of an
unprotected service or services. It will traverse a network without the need for a user to
send an infected file or e-mail. Most of the large incidents in the press recently have been
worms rather than viruses.

Earn money with AlertPay

Secure your Web Experiance

Trojans and Spyware

The first Trojan Horse was created by the Greeks several thousand years ago.The basic concept is that you sneak something nasty into an
otherwise secure computer in the guise of something nicer. This can range from a
downloaded game trailer to an e-mail promising naked pictures of your favorite celebrity. This
section covers Trojans and spy ware.

Trojans are pieces of malware which masquerade as something either useful or
desirable in order to get you to run them. At this point they may well do something unpleasant
to your computer such as install a backdoor or rootkit  or - even worse - dial a
premium rate phone number that will cost you money.
Spyware is software that installs itself surreptitiously, often from websites that you might
visit. Once it is installed it will look for information that it considers valuable. This may be usage
Horse As a Virus            











 The Movie Troy,You can Imagine that horse as a Trojan Virus.

 Logicbombs and Timebombs

 Time bomb programming is used to allow you to download and try a program for a period of time – usually 30 days. At the end of the trial period, the program ceases to function, unless a registration code is
provided.Logic bombs and Time bombs are programs which have no replication ability and no

ability to create an access method, but are applications or parts of applications that will
cause damage to data should they become active. They can be stand-alone, or part of
worms or viruses.
More About Computer Security

Hacking,Secure Your Web Experiance,How to Create Password ?

Computer Troma Center: Reasons Why Computer Crash

Computer Troma Center: Reasons Why Computer Crash

Friday

Computer Troma Center: Backlink Article ?

Computer Troma Center: Backlink Article ?

How To Secure Your Wifi Connection!

Hello Friends,
                     I am posting this bcoz some losser who hacked open Wifi connection and email from there to claim bomb blast which happned in Varanasi, India.
                     many company and home users uses the wifi connection to access Internet. But they don't secure their wifi connections & Reason  is just ignorance. Beware hackers are in their way. I've some idea to secure ur wifi connection.

step 1:
             Go to your wifi device setup. normally its ip address is 192.168.1.1

step 2:
             Go to the wireless settings and find security tab.
step 3:
              There You'll see WEP encryption setting.. make it Enable.
step 4:
              Make Encryption strength 128-bit
              give a Network Key. It should be at least 10 cherector long. (i.e: 21gl@di@tor12)
Network key is like a password to your wifi connection. when ever you want to access the Internet you'll need it.
           
                 so like password keep it secret.
                 give a strong password ....

now how to give a strong password? I'll show you in my next post.


Till then enjoy.

Monday

Backlink Article ?

WebMaster and Blogger can create There Backlink by just doing easy step here
The trick is very easy, you just copy the link located below on condition that you must remove the link from the list at rank 1, then move that was number 2 become number 1, number 3 becomes number 2, number 4 to number 3, etc.. Then input your own blog link at the bottom of the order (number 10). And please invite your friends to follow this way and help spread this way to as much as your friend.
  1. RenunganHarian - http://www.renunganharian.net/
  2. TGIF - http://www.heedeew.co.cc/
  3. DailyNews - http://articles-news-4free.blogspot.com/
  4. GetInvolve - http://storiesonwords.blogspot.com/
  5. CyberMinistries - http://glorianet.org/
  6. GloriaGraffa - http://bukugloria.blogspot.com/
  7. MotoExpert - http://www.massis.co.cc/
  8. Living Next Level - http://extreamly-urgent.blogspot.com/
  9. My Kind of Worship - http://www.pujian.co.cc/
10. ManuaTech Site - http://www.manualtech.info/
11. Computer  http://system-ctc.blogspot.com/
From the side you've got 1,953,125 SEO backlinks and the side effects, if visitor click on your link then you also get extra traffic.
I recommend you try this way and please copy and distribute this article to your friends. Eliminate the link number 1 and input your blog address at number 10.

Shop

Wolf - 150 x 150

Dmoz

Comments