Friday, April 3, 2009

I won an auction! What now?


Follow some easy steps to submit payment.


Shortly after you have won an auction, or ended it with “Buy it now”, you will receive an email invoice for your purchase. Conveniently located right within that invoice should be a large yellow “Pay Now” button. Click on it and it will take you through the motions of sending the payment through PayPal.


Alternatively, you may go through your eBay account, click on "My eBay" at the top of the screen, and it will display that "you need to pay for 1 item". Click on that link, and then choose the "submit payment" link that will appear on your screen. Follow the steps, including logging in with your email address and PayPal password.


After you have made the payment, you will receive a receipt in your email confirming that the payment has been sent to the seller. The seller also gets an email notification of your payment, and he will proceed to ship the item to you. Most likely, you will soon receive a follow-up message from the seller that your item is on its way.


As you will discover for yourself, making PayPal payments is indeed a very easy process. No more sending checks or money orders via snail mail, or typing in your credit card details, and no more stamps and trips to the post office! The convenience of using a PayPal account is why 96 million people use PayPal every day. Easy to set up, easy to use, and it saves you a whole lot of time, an always hot commodity nobody can put the price on!

How do I send money with Paypal?


This is as easy as sending an email.


Like any good online banking institution, PayPal has really made it as convenient and as simple as one could expect. Futhermore, since PayPal is owned by eBay, it integrates very smoothly with eBay auction transactions.


For most eBay purchases:

Most eBay auctions have a "Pay Now" or "Send Payment" link directly on the eBay page in question. If you follow this link, PayPal will fill in the details of the seller and the auction ID number for you. Often, it will also fill in the S & H information as well. All you will need to do is login with your secret PayPal password and email address, and confirm that your shipping address and primary funding source are correct. You add extra notes for the seller (e.g. "please send via US Post"), and the money transfer takes place immediately. A confirmation email will be sent to you, and your bank/credit card will be debited within two days.


Send money by the recipient's email address:

For some eBay auctions, or for personal money transfers, you go directly to Paypal.com and click "send money". You login, and then copy-paste the recipient's email address into the "send money" form. You'll need to add in the details of the transaction, but the process is very straightforward from there. Again, your personal banking information is always concealed from the buyer.

How does Paypal withdraw my money?

You may choose either "current balance" or "instant withdrawal" for Payment method.

PayPal is flexible, amateur-friendly, and able to extend its own form of short-term credit. Your choices are as follows:
  1. You can just let PayPal withdraw against your credit card or bank account only when you make a purchase. Once you send money, PayPal will send the funds immediately, and then will withdraw the funds from your bank/credit card within two business days. With this option, there is no need to maintain a direct PayPal balance, and there is no fee to use this technique.
  2. You may transfer money to PayPal directly, and leave that money in your PayPal account. Although you will not gain interest with this method, it does make it more convenient to separate your online purchasing budget from your regular banking and credit cards. There is no fee to use this technique, either.

The opposite: "How do I withdraw money from PayPal?

"Withdrawing money from PayPal is easy. No, it is not directly through a bank machine. Rather, PayPal credits your credit card or your bank account through a type of wire transferring. Once the money is transferred tp your bank account, you then withdraw like it any other money. While this PayPal "withdrawal" costs nothing, it can take up to 8 business days for the PayPal-to-your-bank transfer to complete.

How do I set up my new Paypal account?

You can start a new PayPal account within minutes.
The initial credit checking has already been done by your credit card company and you bank... now you just need to get PayPal to connect that information to your email address.

Requirements
You will need:
  • a valid and reliable email address.
  • and either a valid credit card and/or
  • a valid bank account in one of Paypal's 55 countries.

PayPal will record this information in confidence. Your email address will become your unique PayPal ID. Your email and your shipping address are the only two bits of personal information that will be displayed to the seller.

During the setup you will also choose a password to use together with your PayPal ID. Please make sure this password is not easy to guess, and that only you will know and use it!

Note: you may enter multiple credit cards and bank accounts to be used as your “payment sources”.

While only one of these financial sources will be designated as “primary”, you can allocate payments from any of your sources at any time.When you send a PayPal payment, PayPal will debit your primary source of funding within two business days. If you exceed your available credit limit, Paypal will attempt a second debit within another business day. Next: Once set up, you have two options for how PayPal will withdraw funds for payments...

How do I get started with PayPal?

You need to first choose a type PayPal account, and set that up for yourself.

Here are your three PayPal account choices:

Choice 1: PayPal Personal Account
This is the basic PayPal account that lets you pay for your eBay purchases with ease. You can use it to send and receive money. You can send funds to anyone with an email address in 55 countries and regions. Personal account will even let you accept payments should you sell something via eBay. The catch: you can only accept payments from other PayPal accounts, and you cannot accept credit or debit card payments.There is no fee for either the Personal account or the transactions you make through it. There is, however, a limit on how much can you receive per month. If you plan to sell a a high volume of product, the Personal account might be too restrictive.

Choice 2: PayPal Premier Account
This type of a PayPal account has all the functionality of the Personal account, plus you can accept credit and debit cards, and bank account payments. Premier account also offers such features as “shopping cart” and payment reporting tools. This account type is good for a serious amateur seller who wants to move items online on a regular basis.There is a fee to have a Premier account; please check PayPal website for details. The setup process of a Premier account is similar to that of a Personal account. If you currently use a Personal account, you can always upgrade to Premier.

Choice 3: PayPal Business Account
This is the business class of a PayPal account, best suited to individuals running a large scale online business or online store. Business account allows you to operate under your business name, and use Reporting and eBay Tools with no restrictions on transaction size. It is the best choice if you expect complex Accounts Payable. There is broad functionality for the business owners that helps them to manage very large amounts of sales with ease.Like Premier, there is a fee to have this type of account; please check PayPal website for details. The setup process of a Business account is similar to that of a Premier account. If you currently use either Personal or Premier account, you can upgrade to Business.

How safe is PayPal?

PayPal is as safe as any online bank.
Although no system is 100% foolproof, PayPal has designed many checks and balances into its system to keep errors and fraud to a bare minimum. You won’t find another online financial institution that’s better at protecting its customers than PayPal. By utilizing the very latest in secure technology and employing a large team of experts in all areas of online safety, PayPal continues to be a leader in safe online payments around the world.

1. PayPal is guaranteed against fraud and identity theft.
PayPal guarantees 100% protection against unauthorized payments from your account.
Every transaction is confirmed by email to the PayPal account holder. Any transaction you wish to dispute will give you access to a 24/7 support team of analysts who will sort out your problem for you.

2. eBay purchases can also be insured up to $1000 through PayPal.
A service called "PayPal Buyer Protection" is another way that PayPal will certify that certain sellers are trustworthy.

3. PayPal's Anti-Fraud Team works 24/7
Using sophisticated risk models and advanced technology, the team is able to detect, and often predict, suspicious activity to help eliminate identity theft. The anti-fraud team’s sole job is to make every PayPal transaction as safe and seamless as possible.

4. Many other PayPal safety measures distinguish the service from its competitors.

What can I use PayPal for?

1.eBay purchasing.
eBay sellers prefer to receive their payments via PayPal.If you want to participate in eBay, it is imperative that you set up a PayPal account for yourself. Over 90% of eBay sellers choose PayPal as their trusted method of choice for taking payments. eBay does own Paypal, so you can be confident that its ownership is motivated to keep it a stable and reliable service.Furthermore, PayPal is very amateur-friendly. Whether you are a new buyer, or someone just starting out as a new seller, Paypal is truly the most convenient way to do trusted payments online.Answer 2:

2. PayPal is also good for personal transactions.
You don't need to be on eBay to use PayPal. PayPal is also ideal for moving money between strangers, without using credit card or personal information. Maybe you want to collect money for your sports team, your church, or your next group purchase of camping gear.

  • One PayPal Example: if you want to arrange a group discount purchase of paintball gear for your paintball club, you can coordinate with your friends by email, and have them send you their payments through PayPal.
  • Another PayPal Example: you find a digital camera you really like at an obscure online store in Ohio. Instead of trusting a strange store with your credit card, you send them PayPal instead.

Part 2: How does PayPal make money?

As a middleman financial broker, PayPal makes its profit by charging a percentage of the money it transfers for you.
  • PayPal is Free for Buyers. Once a buyer sets up a Paypal account, then it costs nothing to send money to other PayPal users. The funds are withdrawn from the user's credit card or bank account, or both. PayPal does not charge buyers to send money.
  • PayPal Charges Sellers 1.9% to 2.9%. PayPal will only charge you to receive funds. Using a special surcharge formula, PayPal will bill you whenever you receive a payment from a buyer.

  • Paypal Fee Table:
    For receiving transfers under $3000 USD: the fee is 2.9% + $0.30 USD.
    For receiving transfers $3000.01 to $10,000: the fee is 2.5% + $0.30 USD.
    For receiving transfers $10,000.01 to $100,000: the fee is 2.2% + $0.30 USD.
    Receiving transfers over $100,000: Paypal charges 1.9% + $0.30 USD. As you might guess, smart sellers will increase their prices to offset this charge on their side of PayPal.

Thursday, April 2, 2009

7 Ways To Tweet

Micro-blogging become more popular nowadays. There are more than 10 micro-blogging platforms for you to choose. Anyway, twitter is still the best micro-blogging platform that suits my need. Why? Because it has lots of way to tweet!

I’m going to show you 7 ways that I use to update my tweet. Although some of them are not so useful, you might take it as an alternative way (always think for backup plan!).

7 Ways to Tweet

I’m just simply list out few famous apps in each way. You may discover more from Internet but I think it should be enough for you to tweet in any way. Here I am not going to discuss further for installation or configuration for each app. Try it out and you’ll know. It’s pretty easy!

  1. Desktop client - Third party software that needs installation. Twitteroo and Twhirl are two of the famous ones. Twitteroo is windows version of Twitterrific. While Twhirl is a social desktop client built on Adobe AIR that connects to multiple micro-blogging platform. Make sure you have installed the latest Adobe AIR before installing Twhirl.
  2. Web - This is quite straight forward. Login to Twitter or HelloTxt and tweet in your browser.
  3. Email - I don’t know why people need to tweet via email. The only reason I can think of is a scheduled tweet. Browse to TwitterMail, insert your twitter username and password to get your TwitterMail address instantly. You may schedule email to tweet when you are on travel.:)
  4. Firefox Plugin - My favourite way to tweet. Don’t need to close Firefox. Surf internet and tweet whenever you like. Get FoxyTunes and TwitBin for your Firefox. FoxyTunes plugin not only allow you tweet your own words. But also tweet what you are browsing, watching, reading, etc. URL shortener has been included.
  5. Instant Messenger - I just discovered this new way to tweet recently. You may use most of the IM to tweet. Just add in particular Twitt’d id as your IM friends (for eg: twittd@live.com). It is available for Skype, Windows Live Messenger, Google Talk, Jabber and Yahoo! Messenger user. After add in Twitt’d, chat with the twitt’d robot. It will ask for your twitter’s username and password to activate your account. Quite fun! ;)
  6. Mobile phone - This is perfect feature for traveling tweet. Login Twitter > Settings > Devices. Turn on your device update. After getting verified, you may tweet anywhere using SMS (without a Wifi or 3G connection).
  7. Blog Plugin - The last method is tweeting via your own blog. With Twitter Tools wordpress plugin, you can tweet from front page or admin page. It is quite similar to Web tweet, but from your own blog.

Sunday, March 29, 2009

How to Download and Edit YouTube Videos Free? (Recommendations)

Are you a YouTube fan? Have you thought of downloading and editing the YouTube Videos with your own ideas free? Maybe you have that idea but don’t know the solution. Now, get it here.


This article will tell you how to download the FLV videos from YouTube and other video-sharing sites and make them your style.

All you need are YouTube FLV Downloader and Moyea FLV Editor Lite Beta. Both of them are free. Just enjoy the fun without any charge.


How to download YouTube FLV?

Actually YouTube FLV Downloader provides several ways to download FLV from YouTube, MySpace, Metacafe, Dailymotion, etc. But the most popular and easiest way is to capture the FLV URL and download.

Download, install and launch the downloader. You will be attracted by the GUI.

user posted image

Capture FLV URL. Select Capture section and you will find the screen icon on toolbar. Enable the Capture function. If the capture function is enabled, you will find the icon with a line in it as is shown in the picture below. Get to the webpage where the video is playing. The downloader will get the FLV URL automatically.
user posted image
Create a download task. Select the URL and click the download icon. And then you can set where to put the FLV and name (or rename) it.
user posted image
Start to download FLV. Once you click OK to confirm, the FLV will be downloaded in a short time. And you can see the process in Downloading section. You can download multiple files at one time.


Play FLV. Once the file is downloaded, you will find it in the relative category under Library. You can double click to play it with the embedded FLV Player or right click and select Location to find the specific FLV file.
user posted image

How to Edit YouTube FLV?


With downloaded FLV, you can not only enjoy it anytime you like, but also edit them with your own ideas. It’s still free with Moyea FLV Editor Lite Beta.

Now it is beta version, but still powerful. You can replace the audio, extract audio and video, merge several FLV files into one, and so on. With these functions, you are able to make your own MTV, funny movie collections, etc. Besides, if you are Flash genius, you can also add cue points to get more outstanding effects.

Download, install and launch the program.

Input FLV. Still, you have several ways to input, open it directly on timeline (only a single file can be added at one time), or import to Resource List. You can click the relative buttons on toolbar. Here we will use the latter way.

Click the user posted imagebutton, you can import from My Computer. Just find where the local FLV files are, select them and import.
user posted image

Preview FLV. Once imported, the files will be shown in Resource List. You can double click on the video to play it on Preview Pane. There are thumbnails for each FLV, easier for you to get the right one.

To edit the specific FLV or FLVs, you can drag them to the timeline. To preview the effects, you can click the play icon on the Preview Pane.

user posted image

Edit FLV. You are able to drag as many FLV files as you like to Timeline at one time. The files on timeline will be exported as a single video. With the buttons marked on the picture above, you are able to cut FLV, replace FLV audio and video, and join the FLV files.

Cut FLV.

You can play the FLV on Timeline and click Scissors to cut the FLV at the point where it’s playing.

Join FLV

In the process of editing, you may want to drag and place some FLV files tightly together. You can enable the magnet button (it’s enabled by default), and drag one edge of a clip tightly to the edge of another clip. Actually, this program will ignore blank parts (except the blank at the beginning) on timeline while export the FLV.

Rip FLV video and audio

By default, once the FLV is opened on Timeline, the FLV video and audio are linked. To rip them, you can click Unlink button. Thus you can delete the original video or audio, and replace with a new one. To join and move video and audio together, you can select the video and audio by “Ctrl”, and click Link button.

Make your own MTV

With the above functions, you will find it so easy to make your own MTV.
Just unlink the FLV video and audio, select and delete the original audio and import a new one. By cutting and rearranging the video, you can get the right video effect you like.

Export FLV To export the FLV, you can click the Exportuser posted image button on Toolbar. And then you can change the export folder, name the file, and choose the export type.
user posted image

You can also select to open Export Folder after finish, add FLV to YouTube FLV Downloader Media Library (not available in beta version), or add it to Moyea FLV to Video Converter Pro 2 (free trial).

Click Start and you will get the file in seconds. And then you can share it online, or enjoy it on your portable devices (once converted with Moyea FLV to Video Converter Pro 2).

Port Mapping, WinXP ICF/ICS (SP1 only)

Port Mapping for WinXP ICF (Internet Connection Firewall)

Click Start > Control Panel > Network and Internet Connections > Network Connections

Select Dial-up, Broadband or LAN or High-Speed Internet.

Right Click > Properties > Select Advanced

Dial-up or Broadband.
user posted image

LAN or High-Speed Internet.
user posted image
user posted image

Click Settings

Advanced Settings > Add
user posted image
Description of services: xxxxx (e.g. Azureus, ICQ, VNC)

Name of IP address (for example 192.168.0.12) of the computer hosting this service on your network: xxx.xxx.xxx.xxx

External Port number for this service: XXXX (e.g. Azureus select 1 out of 6881-6999, ICQ 24500-24505 files transfer)

Internal Port number for this service: XXXX (Same as above)

TCP or UDP (Azureus & ICQ Files transfer is TCP)

Click OK

user posted image
Tick the Azureus > Click OK

You should get Green smile for Azureus now or
user posted image

Rev 0.03

Speed up torrent downloads!

This guide relies on the use of Azureus or Yet ABC as they are highly recommended. The ABC core is currently slightly dated, but this will be updated soon. (For those using BitTornado - ABC uses the BitTornado core, but has a queuing system for better control of multiple torrents). Azureus requires Java. If after installation the application will not load, it is because you do not have Java. You are not the first to think you have Java when you do not! More information is available on the Azureus site.

If you are not currently using ABC or Azureus, before starting this guide:
Beginners: Please change to either Yet ABC or Azureus now.
Intermediate: It is recommended that you change client now. If you choose not to, remember to come back to this section if you get stuck during the guide.
Advanced: You will likely be able to find the equivalent options in your current client, assuming your client has all the necessary options.

Other BitTorrent clients are available to switch to after working through this guide.

This guide has been updated for Azureus 2.2.0.2 and ABC 2.6.9. Different versions may vary.

1.0 Why are my downloads going slow?

1.1 Reason 1: Your ISP is limiting your download speed

Some ISPs are limiting download speeds by controlling the bandwidth allocated to traffic using the default BitTorrent ports, which are 6881 to 6999.

This is not just a problem for those who have nasty ISPs, it affects everybody. To avoid ISPs from damaging the efficiency of a torrent with their controls, some stringent tracker owners are banning the IP addresses of those who are using the standard ports.

So whether your ISP is limiting you or not, all BitTorrent users should stop using the default ports.

For simplicity, this guide recommends the use of ports 16881 - 16999. Adding a 1 to the start is simple administratively, and is in a range unlikely to be used by other programs.

You then need to set up your client to use the new port.

AZUREUS
Tools -> Options -> Connection
-> Add a "1" before the current listen port number. For example, 6881 will now be 16881.

YET ABC
Action-> Preferences -> Network Tab
-> Add a "1" before the minimum and maximum port numbers. For example, 6881 will now be 16881.

Whatever client you use, make sure you update anywhere else you have entered the port numbers to account for the change.

By completing this section, you have helped to avoid problems later down the line, but this will not solve the majority of slow downloads. Therefore, move on to reason 2.


1.2 Reason 2: You have a "NAT Error"

BitTorrent works on a credit system. By uploading parts of a file other people, they allow you to download parts of the file from them. This is BitTorrents anti-leech measure. However, if you have a problem with your NAT (anything between you and the internet, such as a router or firewall), you will not get credit for what you are uploading. The only downloading that you can do is from people who upload a small amount to you in the hope that you will return the favour. Since their client will not recognise your response if you have a NAT problem, then they will stop uploading to you shortly after. This is what is causing your problem. You may also notice that torrent speeds go very high for 5mins, before slowing back down to 0-5kb/s.

1.2.1 How do I know if I have this problem?

You might not have a problem at all. Before continuing with this guide, leave your torrent running for at least ten minutes. If the speed hasn't picked up, stop and restart the torrent. If that fails, try at least two other torrents. If you are still having problems, continue on...

Start to download a file using your chosen client.

AZUREUS
Wait a while for the torrent to get started; this may take up to five minutes.
Look in the "Health" column. If it is showing a yellow spot, then you need to configure your firewall/NAT/router. If it is Green then all is OK. Your slow downloads are being caused by something else.
A full list of the different colours can be seen here.

Azureus can also check your configuration for you.
Select "Tools" -> "Configuration Wizard"
Press "Next >" -> Check the settings and press "Next >" again.
The default port is 6881. If you have changed the listening port, enter the new port in the "Incoming TCP Listening Port."
Press "Test"
If the result is "NAT Error," please continue with the guide.
If the result is "OK", then your slow speeds are being caused by something else.

PLEASE NOTE: The Azureus checker can report a false NAT error if you are running PeerGuardian or Protowall. Make sure these are disabled before using the Azureus wizard.

YET ABC
Wait a while for the torrent to get started; this may take up to five minutes.
Look at the colour of the torrent. If it is yellow (sometimes appears slimy green. If it is green then you will know it), then you need to configure your firewall/NAT/router. If it is green then all is OK. Your slow downloads are being caused by something else.
A full list of the different colours can be seen here.

2.0 It's showing yellow, I have a NAT error - what do I do?

You need to configure your computer and/or network to accept incoming BitTorrent port connections. The tracker port is 6969. If this port is not correctly configured, downloads will not start at all. The download/upload ports used in this guide are 16881-16889. It is these ports that are causing your problems.

2.1 If you are a Azureus user, then switch disable UPnP
** If you are not using Azureus, skip to 2.2 **

Universal Plug and Play (UPnP), it is an Azureus feature that works with some compatible routers to open the required ports automatically. However, some routers, even if they are compatible with UPnP, have problems with this.

Tools -> Options
Expand "Plugins" on the left hand tree.
Select "UPnP"
Deselect "Enable UPnP"

Check if the torrent/health has gone green. If not, move on to section 2.2.

2.2 Configure Your XP Firewall (ICF: Internet Connection Firewall)

Please go to the appropriate sub-section.
- "Configure ICF in SP1" if you have NOT installed Service Pack 2
- "Configure ICF in SP2" if you have installed Service Pack 2

2.2.1 Configure ICF in SP1

Open up your "Network Connections". Right click on your internet connection or LAN connection and select "Properties".
->Select the "Advance" tab
->If the "Internet Connection Firewall" is not ticked, then this is not your problem. Research into whether you need the XP firewall or not and jump to "Configure Your Router" below. If it is ticked, please continue:
->Click "Settings..."
->On the "Services" tab press "Add..."
->Description of service = BitTorrent
Name or IP address of the computer hosting this service on your network = 127.0.0.1 (this means "the local machine.")
External Port number for this service = 16881
Internal Port number for this service = 16881
TCP/UDP = TCP
-> Press OK.

-> With ABC, forward as many ports as you want simultaneous downloads. Start with port 16881 and forward ports in increments of 1. Realistically you don't need more than three ports.
Make sure "Action-> Preferences -> Network -> "Minimum port" is equal to 16881

-> With AZUREUS, this process only needs to be done once. Make sure that "Tools -> Options -> Connection -> Incoming TCP Listen Port" is equal to 16881.

Check if the torrent/health has gone green. If not, move on to section 2.2.

2.2.2 Configure ICF in SP2

-> Open your Windows Control Panel and select "Security Centre."
-> Scroll down to the "Manage security settings for:" section and select "Firewall"
-> Decide whether you want to keep the firewall on or off. Make an informed decision based on more than the information provided by M*crosoft. If you decide to switch it off, then do so and move onto section 2.2. Otherwise, continue this section.
-> Select the "Exceptions" tab.
-> Select "Add Port..."
-> Name: = BitTorrent (or anything of your choice)
-> Port number: = 16881
-> TCP/UDP = TCP
-> Press OK.

-> With ABC, forward as many ports as you want simultaneous downloads. Start with port 16881 and forward ports in increments of 1. Realistically you don't need more than three ports.
Make sure "Action-> Preference -> Network -> Minimum port" is equal to 16881

-> With AZUREUS, this process only needs to be done once. Make sure that "Tools -> Options -> Connection -> Incoming TCP Listen Port" is equal to 16881.

Check if the torrent/health has gone green. If not, move on to section 2.3.

2.3 Configure Your Router

If you are on a LAN with a router or hardware firewall, you may need to configure it. You need to forward BitTorrent's connection ports to your specific PC on the LAN.
If your connection is shared using M*crosoft Internet Connection Sharing (ICS), go to section 2.3.
There are too many routers to cover in this guide, so it is time to head to Google. Search for port forwarding, BitTorrent and the name of your router. Lots of manufacturers provide specific information on their sites. A generic guide to port forwarding for most routers can be found at PortForward.com.

-> With ABC, forward as many ports as you want simultaneous downloads. Start with port 16881 and forward ports in increments of 1. Realistically you don't need more than three ports.
-> Make sure "Action-> Preferences -> Network tab -> Minimum port" is equal to 16881

-> With AZUREUS, forward port 16881. Make sure this matches "Tools -> Options -> Connection -> "Incoming TCP Listen Port"

Check if the torrent/health has gone green. If not, carry on:

2.4 Configure M*crosoft Internet Connection Sharing (ICS)

If you are sharing an internet connection using ICS, then you will need to forward the BitTorrent ports.

Windows 2000 users, click here for information on forwarding (mapping) ports.

Other users:
Practically Networked provides a useful tool, called "ICS Configuration" for changing the settings of ICS. Download the latest version from here.
-> Install the program on the serving computer and run it
-> Click "+ Add"
-> Name = [whatever you want, e.g. BitTorrent]
-> Target = Local IP of machine running BitTorrent, e.g. 192.168.0.2
-> Description = [whatever you want, e.g. "allow BitTorrent for 192.168.0.2"]
-> On the "Ports" tab, slect "+ Add"
-> Select "Port Range" from the drop-down box
-> Enter "16881" and "16889" into the relative boxes
-> TCP/UDP = TCP
-> Data translation = NORMAL
-> Press "OK", Press "Enable", Press "OK".
-> Close everything and reboot the PC.

The settings will be saved in your registry. There is no need to open ICS Configuration with ICS.

With ABC, repeat for as many ports as you want simultaneous downloads. Start with port 16881 and forward ports in increments of 1.
With AZUREUS, forward port 16881. Make sure this matches "Tools -> Options -> Connection -> Incoming TCP Listen Port"
Check if the torrent/health has gone green. If not, carry on:

2.5 Configure Your Firewall

As with routers, there are too many to cover here, so time to head to Google. Unlike with other sections to this guide, ports only have to be opened, rather than forwarded.

With AZUREUS, open port 16881.

With YET ABC, open port 16881 and sufficient consecutive ports for the desired number of simultaneous downloads. This will probably be 3.

3.0 Multiple BitTorrent users on a LAN

The same port can not be forwarded to different computers, so decide who gets what ports, for example:
192.168.0.2 = 16881 - 16883
192.168.0.3 = 16884 - 16886 etc.

In a network of AZUREUS users, each person only needs one port.
Set up your router or ICS to forward the ports to the chosen computers.

Now you need to set up the BitTorrent Clients:

AZUREUS
Each computer only needs one port forwarded to it.
-> Tools -> Options
-> "Connection" on the side menu
-> On "Incoming TCP Listen Port" enter the port number that is being forwarded to that computer. Taking from the above example, computer 192.168.0.3 would enter 16884.
-> Repeat for all the users

YET ABC
Action-> Preferences -> Network tab
-> Set "Minimum port" to the lowest port number that is being forwarded to that computer. Taking from the above example, computer 192.168.0.3 would enter 16884.
-> Set the "Maximum number of simultaneous downloads" to the number of ports forwarded to that computer.
-> Press "apply"
-> Repeat for all users.

4.0 Other things that could be wrong

Try limiting your upload if you have ADSL/DSL. Sometimes BitTorrent can try to upload so much that it floods your upload, making it difficult for incoming connections.

Quote:
It might seem strange to hear that your upload speed can directly affect your download speed, but it can, and quite dramatically. The reason behind it is based on the way the Internet works. When you download a file (or in this case, chunks of a file), your computer sends a tiny message back to the source computer, called an ACKnowledgement packet. These ACK packets tell the source computer that chunk #1 has arrived OK, please send #2. When #2 is down, it sends another, and so on. The source computer will not send #3 until it gets the ACK from #2. It uses a small amount of your upload bandwidth to do this. This works fine when downloading files off the Internet, but with P2P, you tend to upload as well.

This is especially true with BitTorrent - because you upload as well. If done efficiently, downloads can be very fast. The problem lies with the fact that you upload *so much* that the ACK's do not get sent out fast enough, which slows your download. The simplest way to solve this is to limit your upload bandwidth. 80% of the maximum is usually recommended, but I find I can set it to 90% with no adverse effects. This gives your ACKs a bit of breathing space to get out with.

CCSDUDE makes this recommendation on limiting your upload:
Quote:
Originally Posted by CCSDUDE
Try 11kbs up as your limit on a 128k upload package...double it for 256/1.5mb lines and keep going up as you hit 384/ect. That seems to be the sweet spot on BT. Enough to keep everyone happy whilst not slowing your downloads down or slowing your surfing.


5.0 Common BitTorrent problems

This section covers other problems which BT users may be suffering from.

5.1 Client or program freezing

Symptoms: Torrent starts well, achieving good speeds. Speed then falls to zero. This is followed by the client freezing, computer freezing and/or loss of internet connection.

Solutions:
1) This is a common problem with ZoneAlarm 5. Switching it off may not solve the problem. It is recommended that users switch back to version 4.5.
2) Norton Anti-virus sometimes tries to scan the chunks which make up the files you are downloading. Get yourself a decent anti-virus program!

5.2 Freezing torrents and/or 100% CPU usage

Make sure you are running the latest version of your favourite client, as many have now solved this bug.

-RaZ- has provided help for those who are still having problems:

You need to limit the number of peer connections to 60.

AZUREUS
View -> Configuration -> Transfer -> set the "Maximum number of connections per torrent" to 60.

YET ABC
Action -> ABC Preference -> Advanced setting -> set the "Max peer connections" to 60


6.0 Asking for further help

My Recommended Firefox Extensions, you can make your FF powerful too!

user posted image

Many people said Firefox is not as good as Opera and/or Maxthon because it has less functions; they claimed, goodies like mouse gesture and super drag-and-go should be included by default in Firefox, instead of relying third party developers to deliver them through the form of extension.

IMO, Firefox is on the right track. I'd anytime prefer a web browser that is originally simple but can be shaped/tweaked/configured to the way I like. In contrast, I don't need a bloated browser that has tons of functions but end up utilizing maybe only 30% of them.

However, not all extensions are perfectly developed. Some of them come with spyware/malware, some of them aren't actually practical to use, while some of them are just too bloated for minimalists. Thus, I'm here to share all my favorite extensions that are proven to be trustworthy and I personally find them useful:

Adblock Plus
Are you one of the web surfer who's annoyed with web banners and irritating flash animation? Adblock Plus is very effecient extension that allows you to block unwanted content to make your web surfing experience better. Comes with Filterset.G, it has actually blocked 95% of the ads without having you to do anything. For the rest of the 5%, just block it manually! (for example, Right Click and click "Adblock Background Image" in the menu)

All-in-one gestures
It allows you to send specific commands to the browser by combining mouse movements. It's one of my favorite extension in Firefox, and its convenience cannot be just described in words! I can even add new gesture whenever it's needed!

BBCodeXtra
As a LYN regular, I use BBCode very often to format my posts. With this extension, it can be done easily without having to type all the tedious [] tags.

DownloadThemAll
You can call it an extension, but I'd call it a fully functional download manager that's integrated into my Firefox. With DownloadThemAll, I don't have to install external download manager and install Flashgot to get them integrated together. Other than that, I'm also very impressed with its download speed.

ImageShack Toolbar
Imageshack is one of the most popular free image hosting sites. If you upload images to the web frequently, this is a useful extension as you can just do it with two clicks instead of going to the homepage. However, because it's a toolbar - it does actually occupy some space of the browser.

Tab Mix Plus
A very good extension that greatly enhances Firefox Tab-browsing capabilities. For example, you can force all the links to be opened in existing tab instead of a new tab, you can choose whether or not to have 'X' button in every tab, just to name a few. On top of that, it also comes with a built-in session manager.

Video Downloader
I'm a frequent visitor of YouTube and Google Video. With the pathetic speed of my "broadband", it's almost impossible to view the videos smoothly, moreover, some of the good videos are meant to be collected smile.gif Video Downloader is a simple add-on that adds a small icon on the status bar, allowing you to click on it and get the direct download link of the video.

Of course, the above are just the extensions I'm using. I'm sure they are more FF extensions that you might like. Just visit the add-on homepage to discover it by yourself!




Stylish ( https://addons.mozilla.org/firefox/2108/ )

Stylish allows easy management of user styles. User styles empower your browsing experience by letting you fix ugly sites, customize the look of your browser or mail client, or just have fun. With an online repository at userstyles.org, you don't even need to know how to write styles yourself; just a couple clicks and the chosen style is applied. Stylish is to CSS what Greasemonkey is to JavaScript, and unlike other methods of using user styles, most styles take effect immediately.

User guide: http://userstyles.org/stylish/help
Bug reports and feature requests: http://userstyles.org/stylish/discussion

***Having both JSView and Stylish can cause crashes in Firefox 2.0.


Remove It Permanently ( https://addons.mozilla.org/firefox/521/ )
Permanently hide content from web pages using the Context Menu. Simply, click and "Remove it Permanently". Now includes previewing of items before removal, support for IFrame as well as lots of advanced features to make it easy for anyone to remove annoying content from web pages.


Colorful Tabs
More previews... ( https://addons.mozilla.org/firefox/1368/ )
New version 1.6 already available at http://varun21.googlepages.com/main.html

Version 1.5 takes off the close btn from the tab. This has been fixed in v1.6.

The most beautiful yet the simplest add-on that makes a strong colorful appeal. Colors every tab in a different color and makes them easy to distinguish while beautifying the overall appearance of the interface. An essential.


Flashblock ( https://addons.mozilla.org/firefox/433/ )

Never be annoyed by a Flash animation again! Blocks Flash so it won't get in your way, but if you want to see it, just click on it.


Menu Editor ( https://addons.mozilla.org/firefox/710/ )

More previews...
Customize application menus:
Rearrange or remove menuitems from the main context menu (right-click menu) and main menubar (File Edit View etc.)

[TUTORIAL] How to Double Firefox Speed

Firefox is in my opinion the best browser ever made until now. It includes:
-improved tabbed browsing
-pop up blocking
-integrated Goggle search
-enhanced privacy controls
-built-in phishing protection
-online spell checking
-lots of themes, interfaces, and extensions/addons

Mozilla Firefox officially supports:
-Microsoft Windows
-Linux-Mac OS X

Unofficial Support:
-Free BSD-OS/2
-Solaris-SkyOS-BeOS
-XP Professional x64 Edition

Now here are some Tips&Tricks that can help you double the speed of Firefox.

1. Type about:config in the address bar and then press Enter.

2. In the filter search bar type network.http.pipelining. Be sure the value field is set true,if not double-click to set true. HTTP is the application-layer protocol that most web pages are transferred with. In HTTP 1.1, multiple requests can be sent before any responses are received. This is known as pipelining. Pipelining reduces page loading times, but not all servers support it.

3. Go back to the filter search bar and type network.http.pipelining.maxrequests. Double-click this option and set its value to 8.

4. In the filter search bar and type network.http.proxy.pipelining. Once opened doubleclick on it and set it to true.

5. In IPv6-capable DNS servers, an IPv4 address may be returned when an IPv

6 address is requested. It is possible for Mozilla to recover from this misinformation, but a significant delay is introduced.Type network.dns.disableIPv6 in the filter search bar and set this option to true by double clicking on it.6. CONTENT INTERRUPT PARSINGThis preference controls if the application will interrupt parsing a page to respond to UI events. It does not exist by default. Right-click (Apple users ctrl-click) anywhere in the about:config window, select New and then Boolean from the pop-up menu. Then:A. Enter content.interrupt.parsing in the New boolean value pop-up window and click OKB. When prompted to choose the value for the new boolean, select true and click OK.

7. Rather than wait until a page has completely downloaded to display it to the user, Mozilla applications will regularly render what has been received to that point. This option controls the maximum amount of time the application will be unresponsive while rendering pages. Right-click (Apple users ctrl-click) anywhere in the about:config window, select New and then Integer from the pop-up menu.A. Enter content.max.tokenizing.time in the New integer value pop-up window and click OKB. You will be prompted to enter a value. Enter 2250000 and click OK.

8. CONTENT NOTIFY INTERVAL.This option sets the minimum amount of time to wait between reflows. Right-click (Apple users ctrl-click) anywhere in the about:config window, select New and then Integer from the pop-up menu.A. Type content.notify.interval in the New integer value pop-up window and click OK.B. You will be prompted to enter a value. Enter 750000 and click OK.

9. CONTENT NOTIFY ONTIMERA. This option sets if to reflow pages at an interval any higher than that specified by content.notify.interval. Right-click (Apple users ctrl-click) anywhere in the about:config window and select New and then Boolean from the pop-up menu.B. Type content.notify.ontimer in the New boolean value pop-up window and click OK.C. You will be prompted to choose the value for the new boolean. Select true and click OK.
10. Notify BackoffcountThis option controls the maximum number of times the content will do timer-based reflows. After this number has been reached, the page will only reflow once it is finished downloading. Right-click (Apple users ctrl-click) anywhere in the about:config window and select New and then Integer from the pop-up menu.A. Enter content.notify.backoffcount in the New integer value pop-up window and click OK.B. You will be prompted to enter a value. Enter 5 and click OK.

11. CONTENT SWITCH THRESHOLDYou can interact with a loading page when content.interrupt.parsing is set to true. When a page is loading, the application has two modes: a high frequency interrupt mode and a low frequency interrupt mode. The first one interrupts the parser more frequently to allow for greater UI responsiveness during page load.The low frequency interrupt mode interrupts the parser less frequently to allow for quicker page load. The application enters high frequency interrupt mode when you move the mouse or type on the keyboard and switch back to low frequency mode when you had no activity for a certain amount of time. This preference controls that amount of time. Right-click (Apple users ctrl-click) anywhere in the about:config window and select New and then Integer from the pop-up menu.A. Enter content.switch.threshold in the New integer value pop-up window and click OK.B. You will be prompted to enter a value. Enter 750000 and click OK.

12. NGLAYOUT INITIALPAINT DELAYMozilla applications render web pages incrementally, they display what's been receivedof a page before the entire page has been downloaded. Since the start of a web pagenormally doesn't have much useful information to display, Mozilla applications will waita short interval before first rendering a page. This preference controls that interval. Rightclick (Apple users ctrl-click) anywhere in the about:config window and select New and then Integer from the pop-up menu.

A. Enter nglayout.initialpaint.delay in the New integer value pop-up window and click OK.
B. You will be prompted to enter a value. Enter 0 and click OK

How To Shutdown Computer In 5 seconds

How To Shutdown Computer In 5 Seconds

Follow these steps ..
1. Open 'Windows Task Manager' (Ctrl + Alt + Del).
2. Click 'Shutdown' (At the top next to 'Help').
3. Then HOLD the 'Ctrl' key and Select 'Turn Off'. 4. 5, 4, 3, 2, 1 ..

You PC turns off immidiately.

Ways to Free download video and put it on your iPo

The tutorials introduce many websites that provide free stream video as well as the ways to free download these videos and movies. It also describes the step by step way about putting free videos to iPhone, iPod, Zune, PSP, mobile phones, Sandisk, Pocket PC, Creative Zen, PDA, Archos, iRiver, Apple TV, Xbox 360, PS3 and other MP4 player etc for Windows and Mac.

This article includes four parts:

Part 1: Free Resource of stream video.

Part 2:: How to free download limewire music and video to computer?

Part 3:: How to download free youtube video for free?

Part 4:: How to put free music and video to iPhone, iPod, Zune, PSP, mobile phones, YouTube etc? (Windows & Mac)



Part 1: Free Resources of Stream Video:

This is a list of websites that provide stream video, if you want to download video from those sites, you need some special software to capture the stream video. The step by step guide is given in the next part.The downloaded video is flv format, if you want to convert the flv video to iPod, iPhone, PSP, Zune, Sandisk, Pocket PC, Cell phone, Creative Zen, PDA, Archos, iRiver, Apple TV, Xbox 360, PS3 and other MP4 player, you can use this Video Converter to convert flv to the right format.. Note: this website list will update frequently, you can bookmark this page and return here easily.


www.youtube.com - (Video, Music Video and MP3)video.yahoo.com

www.myspace.com - (Video, Music Video and MP3)

www.photobucket.comuncutvideo.aol.com



www.bebo.com - (Video, Music Video and MP3)

www.metacafe.com




www.imeem.com - (Video, Music Video and MP3)peekvid.com

www.liveleak.comnetlog.com





www.heavy.com


























www.shoutfile.com



www.buzzhumor.com


www.vmix.com

www.videoegg.com







www.funmansion.com

www.chumvideo.comfugly.com


Part 2: How to free download limewire music and video to computer?

1.Download Limewire software, it’s totally free. http://www.limewire.com/download/version.php

2. Install and run the Limewire, Just type in some words that you may be interested in, choose the type, and press search, then you can get a lot of files to download.Find the just file and click download to get it. You can also download multiple files in one time. After you download the file, then right-click on the download files and choose “explore”, then you can locate your download files on your computer. You can also click Option, then you can set the default downloaded directory. Click tool folder for saving your file.



Part 3: How to download free youtube video for free?

Step1. Open this website:http://vixy.net/. It's a free online FLV converter.

Step2. Then go to YouTube http://www.youtube.com/ and find a video that you love. Copy the URL that in the Red box. Like this format: http://www.youtube.com/watch?v=sdUUx5FdySs

Step3. Paste your video file URL to the input box (figure as follow), choose the right format you want. If you want to edit the video, AVI is a good choice. And MP4 is fit for iPod, PSP, Zune, Apple TV and other MP4 players. This online converter also can rip audio to MP3. Then wait for the conversion.

Step4. When the conversion finished, we got the download link of the output video. Click the download link to download the video and save in your computer (remember where you save it in). Done.If you want to download, convert, play and manage your favorite YouTube videos, you can use the YouTube Mate, it can easily:* downloads YouTube videos* supports unlimited simultaneous downloads (a real time saver!)* automatically names the downloaded video the same as the YouTube title* converts YouTube videos to various video formats, including avi, DivX, XviD, rm, rmvb, MOV, MPEG, and WMV for iPod Video, iPod Touch, iPod Nano, iPhone, Zune, PSP, as well as video capable MP3 players, video capable mobile phones, and Pocket PC.



Part 4:

How to put free music and video to iPhone, iPod, Zune, PSP, mobile phones, YouTube etc? (Windows & Mac)For Windows:

1: Download the latest versionUltimate DVD Video Converter Suite, and install it. You can download about it by referrring here.

2. Run the Ultimate Video Converter, load the video files you'd like to convert by clicking 'Open file' button.

3. Profile select. You can choose other video formats: iPod, iPhone, iPod touch, iPod video nano, Zune, PSP, video capable MP3 players, video capable mobile phones, Pocket P.C and so on. iPod MPEG4 Movie(.mp4) is the default video for iPod video quality. Set the appropriate format as you like.

4. Output settings. Set your Audio/Video output Settings and tick appropriate parameters.5. Choose the pathname where you want to save your video files by clicking the right button of Output table. When everything setted well, click the 'Convert' button to start converting.



For Mac:

1. Install and run Aimersoft Video Converter for Mac, click the "Add" button to import your videos. This Video Converter for Mac support batch conversion, so you can import multiple files at a time.

2. This software can convert video to various video formats for iPod, iPhone, PSP, Zune, cell phone, etc. Click the “Format” drop-down list to select the format you prefer for each added file. If you don’t know what formats your device supports, you can just select the format according to the device name.If you want to customize the output quality, click the “Settings” button to open the Settings panel, where you can set resolution, frame rate, video bit rate, audio bit rate, sample, etc. Since Aimersoft Video Converter for Mac supports batch conversion, you can use different profiles for the added video files to save your time. If you don’t want to do these settings, the default settings will just work perfectly.After all you finish the above steps, click “Start” to begin the conversion.

Blackberry Bold Review


Blackberry Bold Review



Right, a pretty overdue Blackberry Bold review which has been probably done to death but I'm finally comfortable in writing a review after using it for several weeks and given time for problems to crop up.


I'll keep it more based on personal experience rather than the Bold's features which have been overdone already.


Pros:
>Amazing screen, crystal clear and probably the best screen on a mobile phone at this point in time
>A lot more responsive with the faster processor than the Curve and the extra memory seems to help with running more programs at once (especially IM applications which hung constantly on my Curve).
>Camera is clearer than the Curve although technically the same.
>Rock stable (see proviso in Cons later) and has not crashed for more than 2 weeks
>Great connectivity options with Wifi, 3G, EDGE and GPRS.
>Call quality has improved on the Curve
>Speaker quality is also decent now so you can actually listen to music without headphones (not great but hey, sometimes you just want some background music and not have crappy tinny sound coming out).
>Price has dropped from initial estimates during the offer period it was in the low RM2000s and now it's in RM2499 from Celcom though I believe there are some discounts available for new accounts. Makes it more compelling to go for the Bold instead of the initial estimate of RM2800.
>Looks extremely sexy
>Updating the OS took a lot shorter (maybe about 15 minutes instead of the half or hour or more on the Curve).

In my opinion the best Blackberry out at the momentCons:
>The OS (version 4.6.0.126) is pretty flaky out of the box which crashed repeatedly, had immense battery issues (certain days it would die within one afternoon), and constant 'hangs'. >This OS is shipped by default in both Celcom and Maxis Bolds. This to me was a very bad thing as it gave people a bad impression of the Bold especially since it's only a minority of users who know how to upgrade their BB OSes. Staff from the telcos also seemed to be generally oblivious to this. Upgrading to the current 162 build (which is not even available from Celcom/Maxis' website but a third party site (crackberry.com) solved all these issues.
>Battery life is slightly worse than the Curve with 3G on. On light use, with 3G on it can last about 2 days without charge but on regular use it would fall flat in about a day or so. It will definitely last the day and it's still decent considering the power packed in the device. Running the media player is also extremely battery consuming.
>Browsing experience has improved with better support in displaying websites in its intended nature but still sluggish in loading as compared to the Iphone despite the 3G speed. Still decent enough for general usage but it's not too fun to use.
>Media functions have improved but still not as intuitive as the Iphone's. Also codec support is still not all-encompassing with divx files being a hit or miss. In most cases you would still need to do encoding conversions. Processor still not powerful enough for full sized DivX/Xvid videos. This may be just a hardware limitation on phones in general at this point in time rather than a flaw.
>Default Headset quality was poor with a tinny sound on music though it was comfortable on the ears.
>Youtube does NOT work on Celcom's network. Unsure about Maxis' network but unless you are going through wifi, Youtube is confirmed as non-working. Celcom is working on a resolution and they are not the only telco experiencing this problem. This is a Network issue rather than a >Bold problem but really disappointed me as I really wanted to youtube while I was waiting for things.

>For some reason I didn't really like the leather at the back as I was also afraid of scratching it with my fingernails and kinda became sticky with my sweaty hands a lot faster ;P Minor quibble.


Conclusions

The Bold is a gorgeous device and I absolutely love it. However if you were looking for a lifestyle device, then the phone will probably disappoint in this regard when compared to the Iphone though it has done a decent job at it.It has covered all the previous weaknesses of the Curve and improved on it but there is still room for improvement on its Media functions.Also the Telcos should be more proactive about updating their OS versions on their phones or at least inform people of this option. People expect their phones to work out of the box and mind you that most people will not update their OS versions so their experience is based unfairly on poor software (which has already been rectified) on what is otherwise a great phone.

Tracing A Hacker

Tracing a Hacker
Sometimes, it's just not enough to simply know that there's a Trojan or Virus onboard. Sometimes you need to know exactly why that file is onboard, how it got there - but most importantly, who put it there.By enumerating the attacker in the same way that they have enumerated the victim, you will be able to see the bigger picture and establish what you're up against. But how can you do this?

## Connections make the world go round ##
The computer world, at any rate. Every single time you open up a website, send an email or upload your webpages into cyberspace, you are connecting to another machine in order to get the job done. This, of course, presents a major problem, because this simple act is what allows malicious users to target a machine in the first place.

# How do these people find their victim?
Well, first of all, they need to get hold of the victim's IP Address. Your IP (Internet Protocol) address reveals your point of entry to the Internet and can be used in many ways to cause your online activities many, many problems. It may not reveal you by name, but it may be uniquely identifiable and it represents your digital ID while you are online (especially so if you're on a fixed IP / DSL etc).With an IP address, a Hacker can find out all sorts of weird and wonderful things about their victim (as well as causing all kinds of other trouble, the biggest two being Portnukes/Trojans and the dreaded DoS ((Denial of Service)) attack). Some Hackers like to collect IP Addresses like badges, and like to go back to old targets, messing them around every so often. An IP address is incredibly easy to obtain - until recently, many realtime chat applications (such as MSN) were goldmines of information. Your IP Address is contained as part of the Header Code on all emails that you send and webpages that you visit can store all kinds of information about you. A common trick is for the Hacker to go into a Chatroom, paste his supposed website address all over the place, and when the unsuspecting victim visits, everything about your computer from the operating system to the screen resolution can be logged...and, of course, the all important IP address. In addition, a simple network-wide port scan will reveal vulnerable target machines, and a war-dialler will scan thousands of lines for exposed modems that the hacker can exploit.So now that you know some of the basic dangers, you're probably wondering how these people connect to a victim's machine?

## Virtual and Physical Ports ##
Everything that you recieve over the Internet comes as a result of other machines connecting to your computer's ports. You have two types; Physical are the holes in the back of your machine, but the important ones are Virtual. These allow transfer of data between your computer and the outside world, some with allocated functions, some without, but knowing how these work is the first step to discovering who is attacking you; you simply MUST have a basic knowledge of this, or you won't get much further.

# What the phrases TCP/UDP actually mean
TCP/IP stands for Transmission Control Protocol and Internet Protocol, a TCP/IP packet is a block of data which is compressed, then a header is put on it and it is sent to another computer (UDP stands for User Datagram Protocol). This is how ALL internet transfers occur, by sending packets. The header in a packet contains the IP address of the one who originally sent you it. Now, your computer comes with an excellent (and free) tool that allows you to see anything that is connected (or is attempting to connect) to you, although bear in mind that it offers no blocking protection; it simply tells you what is going on, and that tool is NETSTAT.

## Netstat: Your first line of defence ##
Netstat is a very fast and reliable method of seeing exactly who or what is connected (or connecting) to your computer. Open up DOS (Start/Programs/MS-DOS Prompt on most systems), and in the MSDOS Prompt, type:

netstat -a

(make sure you include the space inbetween the "t" and the "a").

If you're connected to the Internet when you do this, you should see something like:

QUOTE
Active Connections

Proto Local Address Foreign Address State
TCP macintosh: 20034 modem-123.tun.dialup.co.uk: 50505 ESTABLISHED
TCP macintosh: 80 proxy.webcache.eng.sq: 30101 TIME_WAIT
TCP macintosh MACINTOSH: 0 LISTENINGTCP macintosh MACINTOSH: 0 LISTENING
TCP macintosh MACINTOSH: 0 LISTENING


Now, "Proto(col)" simply means what kind of data transmission is taking place (TCP or UDP), "Local address" is your computer (and the number next to it tells you what port you're connected on), "Foreign Address" is the machine that is connected to you (and what port they're using), and finally "State" is simply whether or not a connection is actually established, or whether the machine in question is waiting for a transmission, or timing out etc.

Now, you need to know all of Netstat's various commands, so type:

netstat ?

You will get something like this:

QUOTE
Displays protocol statistics and current TCP/IP network connections.

NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval]

-a Displays all connections and listening ports.
-e Displays Ethernet statistics. This may be combined with the -s option.
-n Displays addresses and port numbers in numerical form.-p proto Shows connections for the protocol specified by proto; proto may be TCP or UDP. If used with the
-s option to display per-protocol statistics, proto may be TCP, UDP, or IP.
-r Displays the routing table.-s Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the -p option may be used to specify a subset of the default.

Have a play around with the various options, but the most important use of these methods is when you combine them. The best command to use is

netstat -an

because this will list all connections in Numerical Form, which makes it a lot easier to trace malicious users....Hostnames can be a little confusing if you don't know what you're doing (although they're easily understandable, as we shall see later). Also, by doing this, you can also find out what your own IP address is, which is always useful.

Also,

netstat -b

will tell you what ports are open and what programs are connecting to the internet.

## Types of Port ##
It would be impossible to find out who was attacking you if computers could just access any old port to perform an important function; how could you tell a mail transfer from a Trojan Attack? Well, good news, because your regular, normal connections are assigned to low, commonly used ports, and in general, the higher the number used, the more you should be suspicious. Here are the three main types of port:

# Well Known Ports-
These run from 0 to 1023, and are bound to the common services that run on them (for example, mail runs on channel 25 tcp/udp, which is smtp (Simple Mail Transfer Protocol) so if you find one of these ports open (and you usually will), it's usually because of an essential function.

# Registered Ports-
These run on 1024 to 49151. Although not bound to a particular service, these are normally used by networking utilities like FTP software, Email client and so on, and they do this by opening on a random port within this range before communicating with the remote server, so don't panic (just be wary, perhaps) if you see any of these open, because they usually close automatically when the system that's running on them terminates (for example, type in a common website name in your browser with netstat open, and watch as it opens up a port at random to act as a buffer for the remote servers). Services like MSN Messenger and ICQ usually run on these Ports.

# Dynamic/Private Ports-
Ranging from 49152 to 65535, these things are rarely used except with certain programs, and even then not very often. This is indeed the usual range of the Trojan, so if you find any of these open, be very suspicious. So, just to recap:

QUOTE
Well Known Ports 0 to 1023 Commonly used, little danger.
Registered Ports 1024 to 49151 Not as common, just be careful.
Dynamic/Private Ports 49152 to 65535 Be extremely suspicious.

## The hunt is on ##
Now, it is essential that you know what you're looking for, and the most common way someone will attack your machine is with a Trojan. This is a program that is sent to you in an email, or attempts to bind itself to one of your ports, and when activated, it can give the user your passwords, access to your hard drive...they can even make your CD Tray pop open and shut. At the end of this Document, you will find a list of the most commonly used Trojans and the ports they operate on. For now, let's take another look at that first example of Netstat....

QUOTE
Active ConnectionsProto Local Address Foreign Address State

TCP macintosh: 27374 modem-123.tun.dialup.co.uk: 50505 ESTABLISHED
TCP macintosh: 80 proxy.webcache.eng.sq: 30101 TIME_WAIT
TCP macintosh MACINTOSH: 0 LISTENINGTCP macintosh MACINTOSH: 0 LISTENING
TCP macintosh MACINTOSH: 0 LISTENING

Now, straight away, this should make more sense to you. Your computer is connected on two ports, 80 and 27374. Port 80 is used for http/www transmissions (ie for all intents and purposes, its how you connect to the net, although of course it's a lot more complicated than that). Port 27374, however, is distinctly suspicious; first of all, it is in the registered port range, and although other services (like MSN) use these, let's assume that you have nothing at all running like instant messengers, webpages etc....you're simply connected to the net through proxy. So, now this connection is looking even more troublesome, and when you realise that 27374 is a common port for Netbus (a potentially destructive Trojan), you can see that something is untoward here. So, what you would do is:


QUOTE
1)run Netstat , and use:

Netstat -a

thenNetstat -an

So you have both Hostnames AND IP addresses.

## Tracerouting ##
Having the attacker's IP is all well and good, but what can you do with it? The answer is, a lot more! It's not enough to have the address, you also need to know where the attacker's connections are coming from. You may have used automated tracerouting tools before, but do you jknow how they work?Go back to MSDOS and type

QUOTE
tracert *type IP address/Hostname here*

Now, what happens is, the Traceroute will show you all the computers inbetween you and the target machine, including blockages, firewalls etc. More often than not, the hostname address listed before the final one will belong to the Hacker's ISP Company. It'll either say who the ISP is somewhere in there, or else you run a second trace on the new IP/hostname address to see who the ISP Company in question is. If the Hostname that you get back doesn't actually seem to mention an actual geographical location within its text, you may think all is lost. But fear not! Suppose you get a hostname such as

http://www.haha.com

Well, that tells us nothing, right? Wrong....simply enter the hostname in your browser, and though many times you will get nothing back, sometimes it will resolve to an ISP, and from there you can easily find out its location and in what areas they operate. This at least gives you a firm geographical location to carry out your investigations in.

If you STILL have nothing, as a last resort you COULD try connecting to your target's ISP's port 13 by Telnet, which will tell you how many hours ahead or behind this ISP is of GMT, thus giving you a geographical trace based on the time mentioned (although bear in mind, the ISP may be doing something stupid like not having their clocks set correctly, giving you a misleading trace. Similarly, a common tactic of Hackers is to deliberately have their computer's clock set to a totally wrong time, so as to throw you off the scent). Also, unless you know what you're doing, I wouldn't advise using Telnet (which is outside the parameters of this tutorial).

## Reverse DNS Query ##
This is probably the most effective way of running a trace on somebody. If ever you're in a chatroom and you see someone saying that they've "hacked into a satellite orbiting the Earth, and are taking pictures of your house right now", ignore them because that's just bad movie nonsense. THIS method is the way to go, with regard to finding out what country (even maybe what State/City etc) someone resides, although it's actually almost impossible to find an EXACT geographical location without actually breaking into your ISP's Head Office and running off with the safe.

To run an rDNS query, simply go back to MS-DOS and type

netstat

and hit return. Any active connections will resolve to hostnames rather than a numerical format.


# DNS
DNS stands for Domain Name Server. These are machines connected to the Internet whose job it is to keep track of the IP Addresses and Domain Names of other machines. When called upon, they take the ASCII Domain Name and convert it to the relevant numeric IP Address. A DNS search translates a hostname into an IP address....which is why we can enter "www.Hotmail.com" and get the website to come up, instead of having to actually remember Hotmail's IP address and enter that instead. Well, Reverse DNS, of course, translates the IP Address into a Hostname (ie - in letters and words instead of numbers, because sometimes the Hacker will employ various methods to stop Netstat from picking up a correct Hostname

So, for example,

298.12.87.32 is NOT a Hostname.
mail6.bol.net.au IS a Hostname.

Anyway, see the section at the end? (au) means the target lives in Australia. Most (if not all) hostnames end in a specific Country Code, thus narrowing down your search even further. If you know your target's Email Address (ie they foolishly sent you a hate mail, but were silly enough to use a valid email address) but nothing else, then you can use the Country codes to deduce where they're from as well. You can also deduce the IP address of the sender by looking at the emails header (a "hidden" line of code which contains information on the sender)...on Hotmail for example, go to Preferences, and select the "Full Header's Visible" option. Alternatively, you can run a "Finger" Trace on the email address, at:

www.samspade.org

Plus, some ISP's include their name in your Email Address with them too (ie Wanadoo, Supanet etc), and your Hacker may be using an email account that's been provided by a Website hosting company, meaning this would probably have the website host's name in the email address (ie Webspawners). So, you could use the information gleaned to maybe even hunt down their website (then you could run a website check as mentioned previously) or report abuse of that Website Provider's Email account (and thus, the Website that it goes with)

to

abuse@companynamegoeshere.com

If your Hacker happens to reside in the USA, go to:

www.usps.gov/ncsc/lookups/abbr_state.txt

for a complete list of US State abbreviatons.

## List of Ports commonly used by Trojans ##
Please note that this isn't a complete list by any means, but it will give you an idea of what to look out for in Netstat. Be aware that some of the lower Ports may well be running valid services.

UDP: 1349 Back Ofrice DLL
31337 BackOfrice 1.20
31338 DeepBO
54321 BackOfrice 2000

TCP: 21 Blade Runner, Doly Trojan, Fore, Invisible FTP, WebEx, WinCrash
23 Tiny Telnet Server
25 Antigen, Email Password Sender, Haebu Coceda, Shtrilitz Stealth, Terminator, WinPC, WinSpy, Kuang2 0.17A-0.30
31 Hackers Paradise
80 Executor
456 Hackers Paradise
555 Ini-Killer, Phase Zero, Stealth Spy
666 Satanz Backdoor1001 Silencer, WebEx
1011 Doly Trojan
1170 Psyber Stream Server, Voice
1234 Ultors Trojan
1243 SubSeven 1.0 - 1.8
1245 VooDoo Doll
1492 FTP99CMP
1600 Shivka-Burka
1807 SpySender
1981 Shockrave
1999 BackDoor 1.00-1.03
2001 Trojan Cow
2023 Ripper
2115 Bugs
2140 Deep Throat, The Invasor
2801 Phineas Phucker
3024 WinCrash
3129 Masters Paradise
3150 Deep Throat, The Invasor
3700 Portal of Doom
4092 WinCrash
4567 File Nail
14590 ICQTrojan
5000 Bubbel
5000 Sockets de Troie
5001 Sockets de Troie
5321 Firehotcker
5400 Blade Runner 0.80 Alpha
5401 Blade Runner 0.80 Alpha
5402 Blade Runner 0.80 Alpha
5400 Blade Runner
5401 Blade Runner
5402 Blade Runner
5569 Robo-Hack5742 WinCrash
6670 DeepThroat
6771 DeepThroat
6969 GateCrasher, Priority
7000 Remote Grab
7300 NetMonitor
7301 NetMonitor
7306 NetMonitor
7307 NetMonitor
7308 NetMonitor
7789 ICKiller
8787 BackOfrice 2000
9872 Portal of Doom
9873 Portal of Doom
9874 Portal of Doom
9875 Portal of Doom
9989 iNi-Killer
10067 Portal of Doom
10167 Portal of Doom
10607 Coma 1.0.9
11000 Senna Spy
11223 Progenic trojan
12223 Hack´99 KeyLogger
12345 GabanBus, NetBus
12346 GabanBus, NetBus
12361 Whack-a-mole12362 Whack-a-mole
16969 Priority
20001 Millennium
20034 NetBus 2.0, Beta-NetBus 2.01
21544 GirlFriend 1.0, Beta-1.35
22222 Prosiak23456 Evil FTP, Ugly FTP
26274 Delta
30100 NetSphere 1.27a
30101 NetSphere 1.27a
30102 NetSphere 1.27a
31337 Back Orifice
31338 Back Orifice, DeepBO
31339 NetSpy DK
31666 BOWhack
33333 Prosiak
34324 BigGluck, TN
40412 The Spy
40421 Masters Paradise
40422 Masters Paradise
40423 Masters Paradise
40426 Masters Paradise
47262 Delta
50505 Sockets de Troie
50766 Fore53001 Remote Windows Shutdown
54321 SchoolBus .69-1.11
61466 Telecommando
65000 Devil

## Summary ##
I hope this tutorial is useful in showing you both how to secure yourself against unwanted connections, and also how to determine an attacker's identity. The Internet is by no means as anonymous as some people think it is, and although this is to the detriment of people's security online, this also works both ways....it IS possible to find and stop even the most determined of attackers, you just have to be patient and keep hunting for clues which will help you put an end to their exploits.

Review of the Iphone 3G for the average Joe and Jane


This review is for the average person who wants to buy an IPHONE 3G OOB (out of the box), it isn't for techies smack talking.


Iphone - Unboxing

Ok i got the phone some weeks ago, and was mildly surprised at the chic box i got. First off, the box is SMALL or for want a better word COMPACT. It's smaller than any of my other pda/touchscreen phones i have ever owned. Inside you will find a small pin for the sim insertion card, a quick guide (pretty useless), a very compact (and detachable connector) charger, a nice embossed micro swipe, a stereo headphone and a USB cable for synchronisation. The box has perforations for the charger to be put in directly. You can't put it in any other way lol. And of course you will find the phone placed on top of it all.The phone's is slim and has a got new shiny black plastic background (a nightmare really) and the rim has a silver rim around it. It looks good but its pretty oversized compared to some of previous smartphones. Having said that, its an Iphone so doh!


Boot!

First thing i noticed about the iphone on booting, is the nice Apple logo. You will find the unit asking to be plugged into Itunes once its finished booting, so its ESSENTIAL that you find a computer to do this. The Itunes application needs to be downloaded too if you don't have it. Basically if you don't like Itunes, don't have a comp or don't use Itunes because you hate it .. well you're SCREWED especially if you don't have a comp.Once you're in, (and assuming you got Itunes on the comp), the phone will switch to default mode. The UI display is really immaculate, seeing is believing. The way it moves and coupled with the multi-touch thing, is like you tracing your tongue on Angelina Jolie's tatooed back. It's that sexy!So a lot of people been complaining about the iphone's lack of customisation (out of the box) and the answer is yes, it's true. I'm pretty used to the fact i like my interfaces to be customisable and unfortunately the iphone default interface wont allow that. What does this mean for you? Well. it's pretty simple. The iphone interface (as in settings) is pretty IDIOT proof. It's meant to be simple so that normal people (and I don't mind hardcore techies) can straight away into it without asking "i can't make it work?". I can even fathom that slapstick-moronic-comedians-that-aren't-even-remotely-funny from Malaysia can figure this one outOn the flip side, if you're a techie than you need to jailbreak it (unlocking previous locked capabilities of the iphone).


Getting the Groove On

Before you start using 3G data services ensure its not limited type as in 10kbp per sen because its going to cost you a bomb if you start using it. Best way, switch on wifi. Wifi on the iphone is PAINLESS. Unlike most of my other pda/smartphones it ALWAYS require some kind of tweaking. Right out of the box, the Iphone doesn't disappoint which is a plus in my books.Right, so I get itunes running and start looking at that App Store (IMPORTANT). Lo and behold, there's a multitude of apps, vids, etc on the store. And a LOT of them are FREE. So i'm thinking "nah it's prolly be shit anyway" so i start downloading tons of stuff. Let me just say, the stuff i downloaded are bloody awesome. Internet radio, online games etc are top notch. So were the vids (battlestar galactica anybody?). I especially like the IM software like FRING and Gtalk. The Facebook app is also pretty gorgeous looking. The software also has some acceloremeter based stuff like Tap Tap and which is pretty fun.Getting lost? LBS (location based service) software on the iphone is running on the Gmap application. How is it different than other GMap on other phones? Well first off, its faster due to its A-GPS, secondly the animation to show where you going is pretty nice to look at and again the idiot-proof thing comes into play.Watching the you tube thingy on the iphone was actually faster than my Dell xps (WTF?). The sound is rich using the supplied earphone. Impressive playback and excellent audio. All the search functions worked as expected so no gripes there.Which comes to the Ipod functionality, the Ipod app is THE application to have if you're a music addict and it doesn't disappoint. Flawless.


Mail and Messaging and Camera

The iphone comes with several options for push email, and since I'm using Gmail I love the way it works with the iphone. Just like the wifi configuration, it's a Dumb and Dumber proof way of getting mail. It's that easy. Fill in the details (basic), tap and voila! Email to you. The mail isn't truncated or butchered like you see on some other devices. So again yummy.The SMS functionality is again based on the same philosophy - Apple's idiot-free configuration. It's indeed friendly BUT here is where it fails. There isn't any way to filter messages, there isn't a way to display the messages in a different way and no way to put categories to them. Gah.Now comes the big booo booo. Lot's of iphone fans have ridiculed the use of MMS on phones as anything but a gimmick i.e. for kiddies and angst-teens. But the truth of the matter is, lots of people USE MMS. Period. They have said email can do better but you see not everyone use Email on their phone or even capable of doing it. MMS is the alternative and ITS CHEAPER on most occasions. And on the iphone --- NO MMS. Phailz! The IM capability is sound though as mentioned before so you be the judge. Like SMS/MMS fumbles, the camera on the iphone is a big letdown. 2MP is ok-ish but that isn't the issue. The issue is there are NO SETTINGS whatsoever. And no video recording unless you jailbreak your phone and use a 3rd party app. There isnt a 2nd camera for 3G either. Doh?


Connect the dots

Right you got the files, images and documents and you want to transfer them to your friends laptop/pda/phone? You got the bluetooth up and you scan .. and scan and scan. And you get - ZIPPO. Yes- nothing, nyet, bohliaow, elek, nada. That's because for some ungodly reason the bluetooth profile is wired to audio BT only. WTF apple? Even my super ancient Ericsson can do it And before you iphone fanbois open your mouths about it being possible with JBreak, please STFU because I'm talking about the iphone out of the box. This imo, is the BIGGEST boo boo that Apple has made. So the ONLY way is thru your wired connection. Yup thats right - wired.


Ugga Ugga

Ok you're looking for a stylus because you're used to it - you wont find it on the iphone lol. How do you write then? The iphone's virtual keyboard that's how! First off it looks good and it seems to be intuitive but after a few weeks I'm getting pretty peeved the closeness of the keys especially in portrait mode. And i got bony hands! You can't use nails either. Must use fingers! So the chances of you mistyping is HUGE. Pretty frustrating especially messaging really tbh.


Thiz Iz Serious Biznes

Would I recommend the Iphone to business people then? And the answer is a big NO. It lacks the most important stuff - SPEED! imagine you typing into it. IT's HARD! Lack of multi tasking abilities is another issue. If you're a business dude stay away from this phone like the plague. No BT, no scan reader, basic messaging and typing into that that tiny vkeyboard and the list goes on. Still... if you can bear all of this and style and charisma is more important, the Iphone exudes it like Britney wearing no panties! Everyone wants to take a look at it!


All your bases belongs to me

Is the Iphone worth RM2500-2800 pricetag? Answer is yes. Despite all of its shortcomings, the Iphone turns the phone industry inside out with WinMo devices clambering with a slew of Iphone-like interfaces. Yeah granted it sucks not being able to send files thru BT, it has a sucky v-keyboard, horrible messaging capabilites (good email though), horrible camera (lack of 3g twin camera configuration even) and lack of true business-centric stuff. You got to remember Apple is still a NOOB in the tele-c industry and with just their second phone, they're already shaking the industry to the core.Verdict: Go get it (if you can live with ALL of it drawbacks) or Don't get it (coz wtf ... insert whine)