Sunday, March 29, 2009

How to Download and Edit YouTube Videos Free? (Recommendations)

Are you a YouTube fan? Have you thought of downloading and editing the YouTube Videos with your own ideas free? Maybe you have that idea but don’t know the solution. Now, get it here.


This article will tell you how to download the FLV videos from YouTube and other video-sharing sites and make them your style.

All you need are YouTube FLV Downloader and Moyea FLV Editor Lite Beta. Both of them are free. Just enjoy the fun without any charge.


How to download YouTube FLV?

Actually YouTube FLV Downloader provides several ways to download FLV from YouTube, MySpace, Metacafe, Dailymotion, etc. But the most popular and easiest way is to capture the FLV URL and download.

Download, install and launch the downloader. You will be attracted by the GUI.

user posted image

Capture FLV URL. Select Capture section and you will find the screen icon on toolbar. Enable the Capture function. If the capture function is enabled, you will find the icon with a line in it as is shown in the picture below. Get to the webpage where the video is playing. The downloader will get the FLV URL automatically.
user posted image
Create a download task. Select the URL and click the download icon. And then you can set where to put the FLV and name (or rename) it.
user posted image
Start to download FLV. Once you click OK to confirm, the FLV will be downloaded in a short time. And you can see the process in Downloading section. You can download multiple files at one time.


Play FLV. Once the file is downloaded, you will find it in the relative category under Library. You can double click to play it with the embedded FLV Player or right click and select Location to find the specific FLV file.
user posted image

How to Edit YouTube FLV?


With downloaded FLV, you can not only enjoy it anytime you like, but also edit them with your own ideas. It’s still free with Moyea FLV Editor Lite Beta.

Now it is beta version, but still powerful. You can replace the audio, extract audio and video, merge several FLV files into one, and so on. With these functions, you are able to make your own MTV, funny movie collections, etc. Besides, if you are Flash genius, you can also add cue points to get more outstanding effects.

Download, install and launch the program.

Input FLV. Still, you have several ways to input, open it directly on timeline (only a single file can be added at one time), or import to Resource List. You can click the relative buttons on toolbar. Here we will use the latter way.

Click the user posted imagebutton, you can import from My Computer. Just find where the local FLV files are, select them and import.
user posted image

Preview FLV. Once imported, the files will be shown in Resource List. You can double click on the video to play it on Preview Pane. There are thumbnails for each FLV, easier for you to get the right one.

To edit the specific FLV or FLVs, you can drag them to the timeline. To preview the effects, you can click the play icon on the Preview Pane.

user posted image

Edit FLV. You are able to drag as many FLV files as you like to Timeline at one time. The files on timeline will be exported as a single video. With the buttons marked on the picture above, you are able to cut FLV, replace FLV audio and video, and join the FLV files.

Cut FLV.

You can play the FLV on Timeline and click Scissors to cut the FLV at the point where it’s playing.

Join FLV

In the process of editing, you may want to drag and place some FLV files tightly together. You can enable the magnet button (it’s enabled by default), and drag one edge of a clip tightly to the edge of another clip. Actually, this program will ignore blank parts (except the blank at the beginning) on timeline while export the FLV.

Rip FLV video and audio

By default, once the FLV is opened on Timeline, the FLV video and audio are linked. To rip them, you can click Unlink button. Thus you can delete the original video or audio, and replace with a new one. To join and move video and audio together, you can select the video and audio by “Ctrl”, and click Link button.

Make your own MTV

With the above functions, you will find it so easy to make your own MTV.
Just unlink the FLV video and audio, select and delete the original audio and import a new one. By cutting and rearranging the video, you can get the right video effect you like.

Export FLV To export the FLV, you can click the Exportuser posted image button on Toolbar. And then you can change the export folder, name the file, and choose the export type.
user posted image

You can also select to open Export Folder after finish, add FLV to YouTube FLV Downloader Media Library (not available in beta version), or add it to Moyea FLV to Video Converter Pro 2 (free trial).

Click Start and you will get the file in seconds. And then you can share it online, or enjoy it on your portable devices (once converted with Moyea FLV to Video Converter Pro 2).

Port Mapping, WinXP ICF/ICS (SP1 only)

Port Mapping for WinXP ICF (Internet Connection Firewall)

Click Start > Control Panel > Network and Internet Connections > Network Connections

Select Dial-up, Broadband or LAN or High-Speed Internet.

Right Click > Properties > Select Advanced

Dial-up or Broadband.
user posted image

LAN or High-Speed Internet.
user posted image
user posted image

Click Settings

Advanced Settings > Add
user posted image
Description of services: xxxxx (e.g. Azureus, ICQ, VNC)

Name of IP address (for example 192.168.0.12) of the computer hosting this service on your network: xxx.xxx.xxx.xxx

External Port number for this service: XXXX (e.g. Azureus select 1 out of 6881-6999, ICQ 24500-24505 files transfer)

Internal Port number for this service: XXXX (Same as above)

TCP or UDP (Azureus & ICQ Files transfer is TCP)

Click OK

user posted image
Tick the Azureus > Click OK

You should get Green smile for Azureus now or
user posted image

Rev 0.03

Speed up torrent downloads!

This guide relies on the use of Azureus or Yet ABC as they are highly recommended. The ABC core is currently slightly dated, but this will be updated soon. (For those using BitTornado - ABC uses the BitTornado core, but has a queuing system for better control of multiple torrents). Azureus requires Java. If after installation the application will not load, it is because you do not have Java. You are not the first to think you have Java when you do not! More information is available on the Azureus site.

If you are not currently using ABC or Azureus, before starting this guide:
Beginners: Please change to either Yet ABC or Azureus now.
Intermediate: It is recommended that you change client now. If you choose not to, remember to come back to this section if you get stuck during the guide.
Advanced: You will likely be able to find the equivalent options in your current client, assuming your client has all the necessary options.

Other BitTorrent clients are available to switch to after working through this guide.

This guide has been updated for Azureus 2.2.0.2 and ABC 2.6.9. Different versions may vary.

1.0 Why are my downloads going slow?

1.1 Reason 1: Your ISP is limiting your download speed

Some ISPs are limiting download speeds by controlling the bandwidth allocated to traffic using the default BitTorrent ports, which are 6881 to 6999.

This is not just a problem for those who have nasty ISPs, it affects everybody. To avoid ISPs from damaging the efficiency of a torrent with their controls, some stringent tracker owners are banning the IP addresses of those who are using the standard ports.

So whether your ISP is limiting you or not, all BitTorrent users should stop using the default ports.

For simplicity, this guide recommends the use of ports 16881 - 16999. Adding a 1 to the start is simple administratively, and is in a range unlikely to be used by other programs.

You then need to set up your client to use the new port.

AZUREUS
Tools -> Options -> Connection
-> Add a "1" before the current listen port number. For example, 6881 will now be 16881.

YET ABC
Action-> Preferences -> Network Tab
-> Add a "1" before the minimum and maximum port numbers. For example, 6881 will now be 16881.

Whatever client you use, make sure you update anywhere else you have entered the port numbers to account for the change.

By completing this section, you have helped to avoid problems later down the line, but this will not solve the majority of slow downloads. Therefore, move on to reason 2.


1.2 Reason 2: You have a "NAT Error"

BitTorrent works on a credit system. By uploading parts of a file other people, they allow you to download parts of the file from them. This is BitTorrents anti-leech measure. However, if you have a problem with your NAT (anything between you and the internet, such as a router or firewall), you will not get credit for what you are uploading. The only downloading that you can do is from people who upload a small amount to you in the hope that you will return the favour. Since their client will not recognise your response if you have a NAT problem, then they will stop uploading to you shortly after. This is what is causing your problem. You may also notice that torrent speeds go very high for 5mins, before slowing back down to 0-5kb/s.

1.2.1 How do I know if I have this problem?

You might not have a problem at all. Before continuing with this guide, leave your torrent running for at least ten minutes. If the speed hasn't picked up, stop and restart the torrent. If that fails, try at least two other torrents. If you are still having problems, continue on...

Start to download a file using your chosen client.

AZUREUS
Wait a while for the torrent to get started; this may take up to five minutes.
Look in the "Health" column. If it is showing a yellow spot, then you need to configure your firewall/NAT/router. If it is Green then all is OK. Your slow downloads are being caused by something else.
A full list of the different colours can be seen here.

Azureus can also check your configuration for you.
Select "Tools" -> "Configuration Wizard"
Press "Next >" -> Check the settings and press "Next >" again.
The default port is 6881. If you have changed the listening port, enter the new port in the "Incoming TCP Listening Port."
Press "Test"
If the result is "NAT Error," please continue with the guide.
If the result is "OK", then your slow speeds are being caused by something else.

PLEASE NOTE: The Azureus checker can report a false NAT error if you are running PeerGuardian or Protowall. Make sure these are disabled before using the Azureus wizard.

YET ABC
Wait a while for the torrent to get started; this may take up to five minutes.
Look at the colour of the torrent. If it is yellow (sometimes appears slimy green. If it is green then you will know it), then you need to configure your firewall/NAT/router. If it is green then all is OK. Your slow downloads are being caused by something else.
A full list of the different colours can be seen here.

2.0 It's showing yellow, I have a NAT error - what do I do?

You need to configure your computer and/or network to accept incoming BitTorrent port connections. The tracker port is 6969. If this port is not correctly configured, downloads will not start at all. The download/upload ports used in this guide are 16881-16889. It is these ports that are causing your problems.

2.1 If you are a Azureus user, then switch disable UPnP
** If you are not using Azureus, skip to 2.2 **

Universal Plug and Play (UPnP), it is an Azureus feature that works with some compatible routers to open the required ports automatically. However, some routers, even if they are compatible with UPnP, have problems with this.

Tools -> Options
Expand "Plugins" on the left hand tree.
Select "UPnP"
Deselect "Enable UPnP"

Check if the torrent/health has gone green. If not, move on to section 2.2.

2.2 Configure Your XP Firewall (ICF: Internet Connection Firewall)

Please go to the appropriate sub-section.
- "Configure ICF in SP1" if you have NOT installed Service Pack 2
- "Configure ICF in SP2" if you have installed Service Pack 2

2.2.1 Configure ICF in SP1

Open up your "Network Connections". Right click on your internet connection or LAN connection and select "Properties".
->Select the "Advance" tab
->If the "Internet Connection Firewall" is not ticked, then this is not your problem. Research into whether you need the XP firewall or not and jump to "Configure Your Router" below. If it is ticked, please continue:
->Click "Settings..."
->On the "Services" tab press "Add..."
->Description of service = BitTorrent
Name or IP address of the computer hosting this service on your network = 127.0.0.1 (this means "the local machine.")
External Port number for this service = 16881
Internal Port number for this service = 16881
TCP/UDP = TCP
-> Press OK.

-> With ABC, forward as many ports as you want simultaneous downloads. Start with port 16881 and forward ports in increments of 1. Realistically you don't need more than three ports.
Make sure "Action-> Preferences -> Network -> "Minimum port" is equal to 16881

-> With AZUREUS, this process only needs to be done once. Make sure that "Tools -> Options -> Connection -> Incoming TCP Listen Port" is equal to 16881.

Check if the torrent/health has gone green. If not, move on to section 2.2.

2.2.2 Configure ICF in SP2

-> Open your Windows Control Panel and select "Security Centre."
-> Scroll down to the "Manage security settings for:" section and select "Firewall"
-> Decide whether you want to keep the firewall on or off. Make an informed decision based on more than the information provided by M*crosoft. If you decide to switch it off, then do so and move onto section 2.2. Otherwise, continue this section.
-> Select the "Exceptions" tab.
-> Select "Add Port..."
-> Name: = BitTorrent (or anything of your choice)
-> Port number: = 16881
-> TCP/UDP = TCP
-> Press OK.

-> With ABC, forward as many ports as you want simultaneous downloads. Start with port 16881 and forward ports in increments of 1. Realistically you don't need more than three ports.
Make sure "Action-> Preference -> Network -> Minimum port" is equal to 16881

-> With AZUREUS, this process only needs to be done once. Make sure that "Tools -> Options -> Connection -> Incoming TCP Listen Port" is equal to 16881.

Check if the torrent/health has gone green. If not, move on to section 2.3.

2.3 Configure Your Router

If you are on a LAN with a router or hardware firewall, you may need to configure it. You need to forward BitTorrent's connection ports to your specific PC on the LAN.
If your connection is shared using M*crosoft Internet Connection Sharing (ICS), go to section 2.3.
There are too many routers to cover in this guide, so it is time to head to Google. Search for port forwarding, BitTorrent and the name of your router. Lots of manufacturers provide specific information on their sites. A generic guide to port forwarding for most routers can be found at PortForward.com.

-> With ABC, forward as many ports as you want simultaneous downloads. Start with port 16881 and forward ports in increments of 1. Realistically you don't need more than three ports.
-> Make sure "Action-> Preferences -> Network tab -> Minimum port" is equal to 16881

-> With AZUREUS, forward port 16881. Make sure this matches "Tools -> Options -> Connection -> "Incoming TCP Listen Port"

Check if the torrent/health has gone green. If not, carry on:

2.4 Configure M*crosoft Internet Connection Sharing (ICS)

If you are sharing an internet connection using ICS, then you will need to forward the BitTorrent ports.

Windows 2000 users, click here for information on forwarding (mapping) ports.

Other users:
Practically Networked provides a useful tool, called "ICS Configuration" for changing the settings of ICS. Download the latest version from here.
-> Install the program on the serving computer and run it
-> Click "+ Add"
-> Name = [whatever you want, e.g. BitTorrent]
-> Target = Local IP of machine running BitTorrent, e.g. 192.168.0.2
-> Description = [whatever you want, e.g. "allow BitTorrent for 192.168.0.2"]
-> On the "Ports" tab, slect "+ Add"
-> Select "Port Range" from the drop-down box
-> Enter "16881" and "16889" into the relative boxes
-> TCP/UDP = TCP
-> Data translation = NORMAL
-> Press "OK", Press "Enable", Press "OK".
-> Close everything and reboot the PC.

The settings will be saved in your registry. There is no need to open ICS Configuration with ICS.

With ABC, repeat for as many ports as you want simultaneous downloads. Start with port 16881 and forward ports in increments of 1.
With AZUREUS, forward port 16881. Make sure this matches "Tools -> Options -> Connection -> Incoming TCP Listen Port"
Check if the torrent/health has gone green. If not, carry on:

2.5 Configure Your Firewall

As with routers, there are too many to cover here, so time to head to Google. Unlike with other sections to this guide, ports only have to be opened, rather than forwarded.

With AZUREUS, open port 16881.

With YET ABC, open port 16881 and sufficient consecutive ports for the desired number of simultaneous downloads. This will probably be 3.

3.0 Multiple BitTorrent users on a LAN

The same port can not be forwarded to different computers, so decide who gets what ports, for example:
192.168.0.2 = 16881 - 16883
192.168.0.3 = 16884 - 16886 etc.

In a network of AZUREUS users, each person only needs one port.
Set up your router or ICS to forward the ports to the chosen computers.

Now you need to set up the BitTorrent Clients:

AZUREUS
Each computer only needs one port forwarded to it.
-> Tools -> Options
-> "Connection" on the side menu
-> On "Incoming TCP Listen Port" enter the port number that is being forwarded to that computer. Taking from the above example, computer 192.168.0.3 would enter 16884.
-> Repeat for all the users

YET ABC
Action-> Preferences -> Network tab
-> Set "Minimum port" to the lowest port number that is being forwarded to that computer. Taking from the above example, computer 192.168.0.3 would enter 16884.
-> Set the "Maximum number of simultaneous downloads" to the number of ports forwarded to that computer.
-> Press "apply"
-> Repeat for all users.

4.0 Other things that could be wrong

Try limiting your upload if you have ADSL/DSL. Sometimes BitTorrent can try to upload so much that it floods your upload, making it difficult for incoming connections.

Quote:
It might seem strange to hear that your upload speed can directly affect your download speed, but it can, and quite dramatically. The reason behind it is based on the way the Internet works. When you download a file (or in this case, chunks of a file), your computer sends a tiny message back to the source computer, called an ACKnowledgement packet. These ACK packets tell the source computer that chunk #1 has arrived OK, please send #2. When #2 is down, it sends another, and so on. The source computer will not send #3 until it gets the ACK from #2. It uses a small amount of your upload bandwidth to do this. This works fine when downloading files off the Internet, but with P2P, you tend to upload as well.

This is especially true with BitTorrent - because you upload as well. If done efficiently, downloads can be very fast. The problem lies with the fact that you upload *so much* that the ACK's do not get sent out fast enough, which slows your download. The simplest way to solve this is to limit your upload bandwidth. 80% of the maximum is usually recommended, but I find I can set it to 90% with no adverse effects. This gives your ACKs a bit of breathing space to get out with.

CCSDUDE makes this recommendation on limiting your upload:
Quote:
Originally Posted by CCSDUDE
Try 11kbs up as your limit on a 128k upload package...double it for 256/1.5mb lines and keep going up as you hit 384/ect. That seems to be the sweet spot on BT. Enough to keep everyone happy whilst not slowing your downloads down or slowing your surfing.


5.0 Common BitTorrent problems

This section covers other problems which BT users may be suffering from.

5.1 Client or program freezing

Symptoms: Torrent starts well, achieving good speeds. Speed then falls to zero. This is followed by the client freezing, computer freezing and/or loss of internet connection.

Solutions:
1) This is a common problem with ZoneAlarm 5. Switching it off may not solve the problem. It is recommended that users switch back to version 4.5.
2) Norton Anti-virus sometimes tries to scan the chunks which make up the files you are downloading. Get yourself a decent anti-virus program!

5.2 Freezing torrents and/or 100% CPU usage

Make sure you are running the latest version of your favourite client, as many have now solved this bug.

-RaZ- has provided help for those who are still having problems:

You need to limit the number of peer connections to 60.

AZUREUS
View -> Configuration -> Transfer -> set the "Maximum number of connections per torrent" to 60.

YET ABC
Action -> ABC Preference -> Advanced setting -> set the "Max peer connections" to 60


6.0 Asking for further help

My Recommended Firefox Extensions, you can make your FF powerful too!

user posted image

Many people said Firefox is not as good as Opera and/or Maxthon because it has less functions; they claimed, goodies like mouse gesture and super drag-and-go should be included by default in Firefox, instead of relying third party developers to deliver them through the form of extension.

IMO, Firefox is on the right track. I'd anytime prefer a web browser that is originally simple but can be shaped/tweaked/configured to the way I like. In contrast, I don't need a bloated browser that has tons of functions but end up utilizing maybe only 30% of them.

However, not all extensions are perfectly developed. Some of them come with spyware/malware, some of them aren't actually practical to use, while some of them are just too bloated for minimalists. Thus, I'm here to share all my favorite extensions that are proven to be trustworthy and I personally find them useful:

Adblock Plus
Are you one of the web surfer who's annoyed with web banners and irritating flash animation? Adblock Plus is very effecient extension that allows you to block unwanted content to make your web surfing experience better. Comes with Filterset.G, it has actually blocked 95% of the ads without having you to do anything. For the rest of the 5%, just block it manually! (for example, Right Click and click "Adblock Background Image" in the menu)

All-in-one gestures
It allows you to send specific commands to the browser by combining mouse movements. It's one of my favorite extension in Firefox, and its convenience cannot be just described in words! I can even add new gesture whenever it's needed!

BBCodeXtra
As a LYN regular, I use BBCode very often to format my posts. With this extension, it can be done easily without having to type all the tedious [] tags.

DownloadThemAll
You can call it an extension, but I'd call it a fully functional download manager that's integrated into my Firefox. With DownloadThemAll, I don't have to install external download manager and install Flashgot to get them integrated together. Other than that, I'm also very impressed with its download speed.

ImageShack Toolbar
Imageshack is one of the most popular free image hosting sites. If you upload images to the web frequently, this is a useful extension as you can just do it with two clicks instead of going to the homepage. However, because it's a toolbar - it does actually occupy some space of the browser.

Tab Mix Plus
A very good extension that greatly enhances Firefox Tab-browsing capabilities. For example, you can force all the links to be opened in existing tab instead of a new tab, you can choose whether or not to have 'X' button in every tab, just to name a few. On top of that, it also comes with a built-in session manager.

Video Downloader
I'm a frequent visitor of YouTube and Google Video. With the pathetic speed of my "broadband", it's almost impossible to view the videos smoothly, moreover, some of the good videos are meant to be collected smile.gif Video Downloader is a simple add-on that adds a small icon on the status bar, allowing you to click on it and get the direct download link of the video.

Of course, the above are just the extensions I'm using. I'm sure they are more FF extensions that you might like. Just visit the add-on homepage to discover it by yourself!




Stylish ( https://addons.mozilla.org/firefox/2108/ )

Stylish allows easy management of user styles. User styles empower your browsing experience by letting you fix ugly sites, customize the look of your browser or mail client, or just have fun. With an online repository at userstyles.org, you don't even need to know how to write styles yourself; just a couple clicks and the chosen style is applied. Stylish is to CSS what Greasemonkey is to JavaScript, and unlike other methods of using user styles, most styles take effect immediately.

User guide: http://userstyles.org/stylish/help
Bug reports and feature requests: http://userstyles.org/stylish/discussion

***Having both JSView and Stylish can cause crashes in Firefox 2.0.


Remove It Permanently ( https://addons.mozilla.org/firefox/521/ )
Permanently hide content from web pages using the Context Menu. Simply, click and "Remove it Permanently". Now includes previewing of items before removal, support for IFrame as well as lots of advanced features to make it easy for anyone to remove annoying content from web pages.


Colorful Tabs
More previews... ( https://addons.mozilla.org/firefox/1368/ )
New version 1.6 already available at http://varun21.googlepages.com/main.html

Version 1.5 takes off the close btn from the tab. This has been fixed in v1.6.

The most beautiful yet the simplest add-on that makes a strong colorful appeal. Colors every tab in a different color and makes them easy to distinguish while beautifying the overall appearance of the interface. An essential.


Flashblock ( https://addons.mozilla.org/firefox/433/ )

Never be annoyed by a Flash animation again! Blocks Flash so it won't get in your way, but if you want to see it, just click on it.


Menu Editor ( https://addons.mozilla.org/firefox/710/ )

More previews...
Customize application menus:
Rearrange or remove menuitems from the main context menu (right-click menu) and main menubar (File Edit View etc.)

[TUTORIAL] How to Double Firefox Speed

Firefox is in my opinion the best browser ever made until now. It includes:
-improved tabbed browsing
-pop up blocking
-integrated Goggle search
-enhanced privacy controls
-built-in phishing protection
-online spell checking
-lots of themes, interfaces, and extensions/addons

Mozilla Firefox officially supports:
-Microsoft Windows
-Linux-Mac OS X

Unofficial Support:
-Free BSD-OS/2
-Solaris-SkyOS-BeOS
-XP Professional x64 Edition

Now here are some Tips&Tricks that can help you double the speed of Firefox.

1. Type about:config in the address bar and then press Enter.

2. In the filter search bar type network.http.pipelining. Be sure the value field is set true,if not double-click to set true. HTTP is the application-layer protocol that most web pages are transferred with. In HTTP 1.1, multiple requests can be sent before any responses are received. This is known as pipelining. Pipelining reduces page loading times, but not all servers support it.

3. Go back to the filter search bar and type network.http.pipelining.maxrequests. Double-click this option and set its value to 8.

4. In the filter search bar and type network.http.proxy.pipelining. Once opened doubleclick on it and set it to true.

5. In IPv6-capable DNS servers, an IPv4 address may be returned when an IPv

6 address is requested. It is possible for Mozilla to recover from this misinformation, but a significant delay is introduced.Type network.dns.disableIPv6 in the filter search bar and set this option to true by double clicking on it.6. CONTENT INTERRUPT PARSINGThis preference controls if the application will interrupt parsing a page to respond to UI events. It does not exist by default. Right-click (Apple users ctrl-click) anywhere in the about:config window, select New and then Boolean from the pop-up menu. Then:A. Enter content.interrupt.parsing in the New boolean value pop-up window and click OKB. When prompted to choose the value for the new boolean, select true and click OK.

7. Rather than wait until a page has completely downloaded to display it to the user, Mozilla applications will regularly render what has been received to that point. This option controls the maximum amount of time the application will be unresponsive while rendering pages. Right-click (Apple users ctrl-click) anywhere in the about:config window, select New and then Integer from the pop-up menu.A. Enter content.max.tokenizing.time in the New integer value pop-up window and click OKB. You will be prompted to enter a value. Enter 2250000 and click OK.

8. CONTENT NOTIFY INTERVAL.This option sets the minimum amount of time to wait between reflows. Right-click (Apple users ctrl-click) anywhere in the about:config window, select New and then Integer from the pop-up menu.A. Type content.notify.interval in the New integer value pop-up window and click OK.B. You will be prompted to enter a value. Enter 750000 and click OK.

9. CONTENT NOTIFY ONTIMERA. This option sets if to reflow pages at an interval any higher than that specified by content.notify.interval. Right-click (Apple users ctrl-click) anywhere in the about:config window and select New and then Boolean from the pop-up menu.B. Type content.notify.ontimer in the New boolean value pop-up window and click OK.C. You will be prompted to choose the value for the new boolean. Select true and click OK.
10. Notify BackoffcountThis option controls the maximum number of times the content will do timer-based reflows. After this number has been reached, the page will only reflow once it is finished downloading. Right-click (Apple users ctrl-click) anywhere in the about:config window and select New and then Integer from the pop-up menu.A. Enter content.notify.backoffcount in the New integer value pop-up window and click OK.B. You will be prompted to enter a value. Enter 5 and click OK.

11. CONTENT SWITCH THRESHOLDYou can interact with a loading page when content.interrupt.parsing is set to true. When a page is loading, the application has two modes: a high frequency interrupt mode and a low frequency interrupt mode. The first one interrupts the parser more frequently to allow for greater UI responsiveness during page load.The low frequency interrupt mode interrupts the parser less frequently to allow for quicker page load. The application enters high frequency interrupt mode when you move the mouse or type on the keyboard and switch back to low frequency mode when you had no activity for a certain amount of time. This preference controls that amount of time. Right-click (Apple users ctrl-click) anywhere in the about:config window and select New and then Integer from the pop-up menu.A. Enter content.switch.threshold in the New integer value pop-up window and click OK.B. You will be prompted to enter a value. Enter 750000 and click OK.

12. NGLAYOUT INITIALPAINT DELAYMozilla applications render web pages incrementally, they display what's been receivedof a page before the entire page has been downloaded. Since the start of a web pagenormally doesn't have much useful information to display, Mozilla applications will waita short interval before first rendering a page. This preference controls that interval. Rightclick (Apple users ctrl-click) anywhere in the about:config window and select New and then Integer from the pop-up menu.

A. Enter nglayout.initialpaint.delay in the New integer value pop-up window and click OK.
B. You will be prompted to enter a value. Enter 0 and click OK

How To Shutdown Computer In 5 seconds

How To Shutdown Computer In 5 Seconds

Follow these steps ..
1. Open 'Windows Task Manager' (Ctrl + Alt + Del).
2. Click 'Shutdown' (At the top next to 'Help').
3. Then HOLD the 'Ctrl' key and Select 'Turn Off'. 4. 5, 4, 3, 2, 1 ..

You PC turns off immidiately.

Ways to Free download video and put it on your iPo

The tutorials introduce many websites that provide free stream video as well as the ways to free download these videos and movies. It also describes the step by step way about putting free videos to iPhone, iPod, Zune, PSP, mobile phones, Sandisk, Pocket PC, Creative Zen, PDA, Archos, iRiver, Apple TV, Xbox 360, PS3 and other MP4 player etc for Windows and Mac.

This article includes four parts:

Part 1: Free Resource of stream video.

Part 2:: How to free download limewire music and video to computer?

Part 3:: How to download free youtube video for free?

Part 4:: How to put free music and video to iPhone, iPod, Zune, PSP, mobile phones, YouTube etc? (Windows & Mac)



Part 1: Free Resources of Stream Video:

This is a list of websites that provide stream video, if you want to download video from those sites, you need some special software to capture the stream video. The step by step guide is given in the next part.The downloaded video is flv format, if you want to convert the flv video to iPod, iPhone, PSP, Zune, Sandisk, Pocket PC, Cell phone, Creative Zen, PDA, Archos, iRiver, Apple TV, Xbox 360, PS3 and other MP4 player, you can use this Video Converter to convert flv to the right format.. Note: this website list will update frequently, you can bookmark this page and return here easily.


www.youtube.com - (Video, Music Video and MP3)video.yahoo.com

www.myspace.com - (Video, Music Video and MP3)

www.photobucket.comuncutvideo.aol.com



www.bebo.com - (Video, Music Video and MP3)

www.metacafe.com




www.imeem.com - (Video, Music Video and MP3)peekvid.com

www.liveleak.comnetlog.com





www.heavy.com


























www.shoutfile.com



www.buzzhumor.com


www.vmix.com

www.videoegg.com







www.funmansion.com

www.chumvideo.comfugly.com


Part 2: How to free download limewire music and video to computer?

1.Download Limewire software, it’s totally free. http://www.limewire.com/download/version.php

2. Install and run the Limewire, Just type in some words that you may be interested in, choose the type, and press search, then you can get a lot of files to download.Find the just file and click download to get it. You can also download multiple files in one time. After you download the file, then right-click on the download files and choose “explore”, then you can locate your download files on your computer. You can also click Option, then you can set the default downloaded directory. Click tool folder for saving your file.



Part 3: How to download free youtube video for free?

Step1. Open this website:http://vixy.net/. It's a free online FLV converter.

Step2. Then go to YouTube http://www.youtube.com/ and find a video that you love. Copy the URL that in the Red box. Like this format: http://www.youtube.com/watch?v=sdUUx5FdySs

Step3. Paste your video file URL to the input box (figure as follow), choose the right format you want. If you want to edit the video, AVI is a good choice. And MP4 is fit for iPod, PSP, Zune, Apple TV and other MP4 players. This online converter also can rip audio to MP3. Then wait for the conversion.

Step4. When the conversion finished, we got the download link of the output video. Click the download link to download the video and save in your computer (remember where you save it in). Done.If you want to download, convert, play and manage your favorite YouTube videos, you can use the YouTube Mate, it can easily:* downloads YouTube videos* supports unlimited simultaneous downloads (a real time saver!)* automatically names the downloaded video the same as the YouTube title* converts YouTube videos to various video formats, including avi, DivX, XviD, rm, rmvb, MOV, MPEG, and WMV for iPod Video, iPod Touch, iPod Nano, iPhone, Zune, PSP, as well as video capable MP3 players, video capable mobile phones, and Pocket PC.



Part 4:

How to put free music and video to iPhone, iPod, Zune, PSP, mobile phones, YouTube etc? (Windows & Mac)For Windows:

1: Download the latest versionUltimate DVD Video Converter Suite, and install it. You can download about it by referrring here.

2. Run the Ultimate Video Converter, load the video files you'd like to convert by clicking 'Open file' button.

3. Profile select. You can choose other video formats: iPod, iPhone, iPod touch, iPod video nano, Zune, PSP, video capable MP3 players, video capable mobile phones, Pocket P.C and so on. iPod MPEG4 Movie(.mp4) is the default video for iPod video quality. Set the appropriate format as you like.

4. Output settings. Set your Audio/Video output Settings and tick appropriate parameters.5. Choose the pathname where you want to save your video files by clicking the right button of Output table. When everything setted well, click the 'Convert' button to start converting.



For Mac:

1. Install and run Aimersoft Video Converter for Mac, click the "Add" button to import your videos. This Video Converter for Mac support batch conversion, so you can import multiple files at a time.

2. This software can convert video to various video formats for iPod, iPhone, PSP, Zune, cell phone, etc. Click the “Format” drop-down list to select the format you prefer for each added file. If you don’t know what formats your device supports, you can just select the format according to the device name.If you want to customize the output quality, click the “Settings” button to open the Settings panel, where you can set resolution, frame rate, video bit rate, audio bit rate, sample, etc. Since Aimersoft Video Converter for Mac supports batch conversion, you can use different profiles for the added video files to save your time. If you don’t want to do these settings, the default settings will just work perfectly.After all you finish the above steps, click “Start” to begin the conversion.

Blackberry Bold Review


Blackberry Bold Review



Right, a pretty overdue Blackberry Bold review which has been probably done to death but I'm finally comfortable in writing a review after using it for several weeks and given time for problems to crop up.


I'll keep it more based on personal experience rather than the Bold's features which have been overdone already.


Pros:
>Amazing screen, crystal clear and probably the best screen on a mobile phone at this point in time
>A lot more responsive with the faster processor than the Curve and the extra memory seems to help with running more programs at once (especially IM applications which hung constantly on my Curve).
>Camera is clearer than the Curve although technically the same.
>Rock stable (see proviso in Cons later) and has not crashed for more than 2 weeks
>Great connectivity options with Wifi, 3G, EDGE and GPRS.
>Call quality has improved on the Curve
>Speaker quality is also decent now so you can actually listen to music without headphones (not great but hey, sometimes you just want some background music and not have crappy tinny sound coming out).
>Price has dropped from initial estimates during the offer period it was in the low RM2000s and now it's in RM2499 from Celcom though I believe there are some discounts available for new accounts. Makes it more compelling to go for the Bold instead of the initial estimate of RM2800.
>Looks extremely sexy
>Updating the OS took a lot shorter (maybe about 15 minutes instead of the half or hour or more on the Curve).

In my opinion the best Blackberry out at the momentCons:
>The OS (version 4.6.0.126) is pretty flaky out of the box which crashed repeatedly, had immense battery issues (certain days it would die within one afternoon), and constant 'hangs'. >This OS is shipped by default in both Celcom and Maxis Bolds. This to me was a very bad thing as it gave people a bad impression of the Bold especially since it's only a minority of users who know how to upgrade their BB OSes. Staff from the telcos also seemed to be generally oblivious to this. Upgrading to the current 162 build (which is not even available from Celcom/Maxis' website but a third party site (crackberry.com) solved all these issues.
>Battery life is slightly worse than the Curve with 3G on. On light use, with 3G on it can last about 2 days without charge but on regular use it would fall flat in about a day or so. It will definitely last the day and it's still decent considering the power packed in the device. Running the media player is also extremely battery consuming.
>Browsing experience has improved with better support in displaying websites in its intended nature but still sluggish in loading as compared to the Iphone despite the 3G speed. Still decent enough for general usage but it's not too fun to use.
>Media functions have improved but still not as intuitive as the Iphone's. Also codec support is still not all-encompassing with divx files being a hit or miss. In most cases you would still need to do encoding conversions. Processor still not powerful enough for full sized DivX/Xvid videos. This may be just a hardware limitation on phones in general at this point in time rather than a flaw.
>Default Headset quality was poor with a tinny sound on music though it was comfortable on the ears.
>Youtube does NOT work on Celcom's network. Unsure about Maxis' network but unless you are going through wifi, Youtube is confirmed as non-working. Celcom is working on a resolution and they are not the only telco experiencing this problem. This is a Network issue rather than a >Bold problem but really disappointed me as I really wanted to youtube while I was waiting for things.

>For some reason I didn't really like the leather at the back as I was also afraid of scratching it with my fingernails and kinda became sticky with my sweaty hands a lot faster ;P Minor quibble.


Conclusions

The Bold is a gorgeous device and I absolutely love it. However if you were looking for a lifestyle device, then the phone will probably disappoint in this regard when compared to the Iphone though it has done a decent job at it.It has covered all the previous weaknesses of the Curve and improved on it but there is still room for improvement on its Media functions.Also the Telcos should be more proactive about updating their OS versions on their phones or at least inform people of this option. People expect their phones to work out of the box and mind you that most people will not update their OS versions so their experience is based unfairly on poor software (which has already been rectified) on what is otherwise a great phone.

Tracing A Hacker

Tracing a Hacker
Sometimes, it's just not enough to simply know that there's a Trojan or Virus onboard. Sometimes you need to know exactly why that file is onboard, how it got there - but most importantly, who put it there.By enumerating the attacker in the same way that they have enumerated the victim, you will be able to see the bigger picture and establish what you're up against. But how can you do this?

## Connections make the world go round ##
The computer world, at any rate. Every single time you open up a website, send an email or upload your webpages into cyberspace, you are connecting to another machine in order to get the job done. This, of course, presents a major problem, because this simple act is what allows malicious users to target a machine in the first place.

# How do these people find their victim?
Well, first of all, they need to get hold of the victim's IP Address. Your IP (Internet Protocol) address reveals your point of entry to the Internet and can be used in many ways to cause your online activities many, many problems. It may not reveal you by name, but it may be uniquely identifiable and it represents your digital ID while you are online (especially so if you're on a fixed IP / DSL etc).With an IP address, a Hacker can find out all sorts of weird and wonderful things about their victim (as well as causing all kinds of other trouble, the biggest two being Portnukes/Trojans and the dreaded DoS ((Denial of Service)) attack). Some Hackers like to collect IP Addresses like badges, and like to go back to old targets, messing them around every so often. An IP address is incredibly easy to obtain - until recently, many realtime chat applications (such as MSN) were goldmines of information. Your IP Address is contained as part of the Header Code on all emails that you send and webpages that you visit can store all kinds of information about you. A common trick is for the Hacker to go into a Chatroom, paste his supposed website address all over the place, and when the unsuspecting victim visits, everything about your computer from the operating system to the screen resolution can be logged...and, of course, the all important IP address. In addition, a simple network-wide port scan will reveal vulnerable target machines, and a war-dialler will scan thousands of lines for exposed modems that the hacker can exploit.So now that you know some of the basic dangers, you're probably wondering how these people connect to a victim's machine?

## Virtual and Physical Ports ##
Everything that you recieve over the Internet comes as a result of other machines connecting to your computer's ports. You have two types; Physical are the holes in the back of your machine, but the important ones are Virtual. These allow transfer of data between your computer and the outside world, some with allocated functions, some without, but knowing how these work is the first step to discovering who is attacking you; you simply MUST have a basic knowledge of this, or you won't get much further.

# What the phrases TCP/UDP actually mean
TCP/IP stands for Transmission Control Protocol and Internet Protocol, a TCP/IP packet is a block of data which is compressed, then a header is put on it and it is sent to another computer (UDP stands for User Datagram Protocol). This is how ALL internet transfers occur, by sending packets. The header in a packet contains the IP address of the one who originally sent you it. Now, your computer comes with an excellent (and free) tool that allows you to see anything that is connected (or is attempting to connect) to you, although bear in mind that it offers no blocking protection; it simply tells you what is going on, and that tool is NETSTAT.

## Netstat: Your first line of defence ##
Netstat is a very fast and reliable method of seeing exactly who or what is connected (or connecting) to your computer. Open up DOS (Start/Programs/MS-DOS Prompt on most systems), and in the MSDOS Prompt, type:

netstat -a

(make sure you include the space inbetween the "t" and the "a").

If you're connected to the Internet when you do this, you should see something like:

QUOTE
Active Connections

Proto Local Address Foreign Address State
TCP macintosh: 20034 modem-123.tun.dialup.co.uk: 50505 ESTABLISHED
TCP macintosh: 80 proxy.webcache.eng.sq: 30101 TIME_WAIT
TCP macintosh MACINTOSH: 0 LISTENINGTCP macintosh MACINTOSH: 0 LISTENING
TCP macintosh MACINTOSH: 0 LISTENING


Now, "Proto(col)" simply means what kind of data transmission is taking place (TCP or UDP), "Local address" is your computer (and the number next to it tells you what port you're connected on), "Foreign Address" is the machine that is connected to you (and what port they're using), and finally "State" is simply whether or not a connection is actually established, or whether the machine in question is waiting for a transmission, or timing out etc.

Now, you need to know all of Netstat's various commands, so type:

netstat ?

You will get something like this:

QUOTE
Displays protocol statistics and current TCP/IP network connections.

NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval]

-a Displays all connections and listening ports.
-e Displays Ethernet statistics. This may be combined with the -s option.
-n Displays addresses and port numbers in numerical form.-p proto Shows connections for the protocol specified by proto; proto may be TCP or UDP. If used with the
-s option to display per-protocol statistics, proto may be TCP, UDP, or IP.
-r Displays the routing table.-s Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the -p option may be used to specify a subset of the default.

Have a play around with the various options, but the most important use of these methods is when you combine them. The best command to use is

netstat -an

because this will list all connections in Numerical Form, which makes it a lot easier to trace malicious users....Hostnames can be a little confusing if you don't know what you're doing (although they're easily understandable, as we shall see later). Also, by doing this, you can also find out what your own IP address is, which is always useful.

Also,

netstat -b

will tell you what ports are open and what programs are connecting to the internet.

## Types of Port ##
It would be impossible to find out who was attacking you if computers could just access any old port to perform an important function; how could you tell a mail transfer from a Trojan Attack? Well, good news, because your regular, normal connections are assigned to low, commonly used ports, and in general, the higher the number used, the more you should be suspicious. Here are the three main types of port:

# Well Known Ports-
These run from 0 to 1023, and are bound to the common services that run on them (for example, mail runs on channel 25 tcp/udp, which is smtp (Simple Mail Transfer Protocol) so if you find one of these ports open (and you usually will), it's usually because of an essential function.

# Registered Ports-
These run on 1024 to 49151. Although not bound to a particular service, these are normally used by networking utilities like FTP software, Email client and so on, and they do this by opening on a random port within this range before communicating with the remote server, so don't panic (just be wary, perhaps) if you see any of these open, because they usually close automatically when the system that's running on them terminates (for example, type in a common website name in your browser with netstat open, and watch as it opens up a port at random to act as a buffer for the remote servers). Services like MSN Messenger and ICQ usually run on these Ports.

# Dynamic/Private Ports-
Ranging from 49152 to 65535, these things are rarely used except with certain programs, and even then not very often. This is indeed the usual range of the Trojan, so if you find any of these open, be very suspicious. So, just to recap:

QUOTE
Well Known Ports 0 to 1023 Commonly used, little danger.
Registered Ports 1024 to 49151 Not as common, just be careful.
Dynamic/Private Ports 49152 to 65535 Be extremely suspicious.

## The hunt is on ##
Now, it is essential that you know what you're looking for, and the most common way someone will attack your machine is with a Trojan. This is a program that is sent to you in an email, or attempts to bind itself to one of your ports, and when activated, it can give the user your passwords, access to your hard drive...they can even make your CD Tray pop open and shut. At the end of this Document, you will find a list of the most commonly used Trojans and the ports they operate on. For now, let's take another look at that first example of Netstat....

QUOTE
Active ConnectionsProto Local Address Foreign Address State

TCP macintosh: 27374 modem-123.tun.dialup.co.uk: 50505 ESTABLISHED
TCP macintosh: 80 proxy.webcache.eng.sq: 30101 TIME_WAIT
TCP macintosh MACINTOSH: 0 LISTENINGTCP macintosh MACINTOSH: 0 LISTENING
TCP macintosh MACINTOSH: 0 LISTENING

Now, straight away, this should make more sense to you. Your computer is connected on two ports, 80 and 27374. Port 80 is used for http/www transmissions (ie for all intents and purposes, its how you connect to the net, although of course it's a lot more complicated than that). Port 27374, however, is distinctly suspicious; first of all, it is in the registered port range, and although other services (like MSN) use these, let's assume that you have nothing at all running like instant messengers, webpages etc....you're simply connected to the net through proxy. So, now this connection is looking even more troublesome, and when you realise that 27374 is a common port for Netbus (a potentially destructive Trojan), you can see that something is untoward here. So, what you would do is:


QUOTE
1)run Netstat , and use:

Netstat -a

thenNetstat -an

So you have both Hostnames AND IP addresses.

## Tracerouting ##
Having the attacker's IP is all well and good, but what can you do with it? The answer is, a lot more! It's not enough to have the address, you also need to know where the attacker's connections are coming from. You may have used automated tracerouting tools before, but do you jknow how they work?Go back to MSDOS and type

QUOTE
tracert *type IP address/Hostname here*

Now, what happens is, the Traceroute will show you all the computers inbetween you and the target machine, including blockages, firewalls etc. More often than not, the hostname address listed before the final one will belong to the Hacker's ISP Company. It'll either say who the ISP is somewhere in there, or else you run a second trace on the new IP/hostname address to see who the ISP Company in question is. If the Hostname that you get back doesn't actually seem to mention an actual geographical location within its text, you may think all is lost. But fear not! Suppose you get a hostname such as

http://www.haha.com

Well, that tells us nothing, right? Wrong....simply enter the hostname in your browser, and though many times you will get nothing back, sometimes it will resolve to an ISP, and from there you can easily find out its location and in what areas they operate. This at least gives you a firm geographical location to carry out your investigations in.

If you STILL have nothing, as a last resort you COULD try connecting to your target's ISP's port 13 by Telnet, which will tell you how many hours ahead or behind this ISP is of GMT, thus giving you a geographical trace based on the time mentioned (although bear in mind, the ISP may be doing something stupid like not having their clocks set correctly, giving you a misleading trace. Similarly, a common tactic of Hackers is to deliberately have their computer's clock set to a totally wrong time, so as to throw you off the scent). Also, unless you know what you're doing, I wouldn't advise using Telnet (which is outside the parameters of this tutorial).

## Reverse DNS Query ##
This is probably the most effective way of running a trace on somebody. If ever you're in a chatroom and you see someone saying that they've "hacked into a satellite orbiting the Earth, and are taking pictures of your house right now", ignore them because that's just bad movie nonsense. THIS method is the way to go, with regard to finding out what country (even maybe what State/City etc) someone resides, although it's actually almost impossible to find an EXACT geographical location without actually breaking into your ISP's Head Office and running off with the safe.

To run an rDNS query, simply go back to MS-DOS and type

netstat

and hit return. Any active connections will resolve to hostnames rather than a numerical format.


# DNS
DNS stands for Domain Name Server. These are machines connected to the Internet whose job it is to keep track of the IP Addresses and Domain Names of other machines. When called upon, they take the ASCII Domain Name and convert it to the relevant numeric IP Address. A DNS search translates a hostname into an IP address....which is why we can enter "www.Hotmail.com" and get the website to come up, instead of having to actually remember Hotmail's IP address and enter that instead. Well, Reverse DNS, of course, translates the IP Address into a Hostname (ie - in letters and words instead of numbers, because sometimes the Hacker will employ various methods to stop Netstat from picking up a correct Hostname

So, for example,

298.12.87.32 is NOT a Hostname.
mail6.bol.net.au IS a Hostname.

Anyway, see the section at the end? (au) means the target lives in Australia. Most (if not all) hostnames end in a specific Country Code, thus narrowing down your search even further. If you know your target's Email Address (ie they foolishly sent you a hate mail, but were silly enough to use a valid email address) but nothing else, then you can use the Country codes to deduce where they're from as well. You can also deduce the IP address of the sender by looking at the emails header (a "hidden" line of code which contains information on the sender)...on Hotmail for example, go to Preferences, and select the "Full Header's Visible" option. Alternatively, you can run a "Finger" Trace on the email address, at:

www.samspade.org

Plus, some ISP's include their name in your Email Address with them too (ie Wanadoo, Supanet etc), and your Hacker may be using an email account that's been provided by a Website hosting company, meaning this would probably have the website host's name in the email address (ie Webspawners). So, you could use the information gleaned to maybe even hunt down their website (then you could run a website check as mentioned previously) or report abuse of that Website Provider's Email account (and thus, the Website that it goes with)

to

abuse@companynamegoeshere.com

If your Hacker happens to reside in the USA, go to:

www.usps.gov/ncsc/lookups/abbr_state.txt

for a complete list of US State abbreviatons.

## List of Ports commonly used by Trojans ##
Please note that this isn't a complete list by any means, but it will give you an idea of what to look out for in Netstat. Be aware that some of the lower Ports may well be running valid services.

UDP: 1349 Back Ofrice DLL
31337 BackOfrice 1.20
31338 DeepBO
54321 BackOfrice 2000

TCP: 21 Blade Runner, Doly Trojan, Fore, Invisible FTP, WebEx, WinCrash
23 Tiny Telnet Server
25 Antigen, Email Password Sender, Haebu Coceda, Shtrilitz Stealth, Terminator, WinPC, WinSpy, Kuang2 0.17A-0.30
31 Hackers Paradise
80 Executor
456 Hackers Paradise
555 Ini-Killer, Phase Zero, Stealth Spy
666 Satanz Backdoor1001 Silencer, WebEx
1011 Doly Trojan
1170 Psyber Stream Server, Voice
1234 Ultors Trojan
1243 SubSeven 1.0 - 1.8
1245 VooDoo Doll
1492 FTP99CMP
1600 Shivka-Burka
1807 SpySender
1981 Shockrave
1999 BackDoor 1.00-1.03
2001 Trojan Cow
2023 Ripper
2115 Bugs
2140 Deep Throat, The Invasor
2801 Phineas Phucker
3024 WinCrash
3129 Masters Paradise
3150 Deep Throat, The Invasor
3700 Portal of Doom
4092 WinCrash
4567 File Nail
14590 ICQTrojan
5000 Bubbel
5000 Sockets de Troie
5001 Sockets de Troie
5321 Firehotcker
5400 Blade Runner 0.80 Alpha
5401 Blade Runner 0.80 Alpha
5402 Blade Runner 0.80 Alpha
5400 Blade Runner
5401 Blade Runner
5402 Blade Runner
5569 Robo-Hack5742 WinCrash
6670 DeepThroat
6771 DeepThroat
6969 GateCrasher, Priority
7000 Remote Grab
7300 NetMonitor
7301 NetMonitor
7306 NetMonitor
7307 NetMonitor
7308 NetMonitor
7789 ICKiller
8787 BackOfrice 2000
9872 Portal of Doom
9873 Portal of Doom
9874 Portal of Doom
9875 Portal of Doom
9989 iNi-Killer
10067 Portal of Doom
10167 Portal of Doom
10607 Coma 1.0.9
11000 Senna Spy
11223 Progenic trojan
12223 Hack´99 KeyLogger
12345 GabanBus, NetBus
12346 GabanBus, NetBus
12361 Whack-a-mole12362 Whack-a-mole
16969 Priority
20001 Millennium
20034 NetBus 2.0, Beta-NetBus 2.01
21544 GirlFriend 1.0, Beta-1.35
22222 Prosiak23456 Evil FTP, Ugly FTP
26274 Delta
30100 NetSphere 1.27a
30101 NetSphere 1.27a
30102 NetSphere 1.27a
31337 Back Orifice
31338 Back Orifice, DeepBO
31339 NetSpy DK
31666 BOWhack
33333 Prosiak
34324 BigGluck, TN
40412 The Spy
40421 Masters Paradise
40422 Masters Paradise
40423 Masters Paradise
40426 Masters Paradise
47262 Delta
50505 Sockets de Troie
50766 Fore53001 Remote Windows Shutdown
54321 SchoolBus .69-1.11
61466 Telecommando
65000 Devil

## Summary ##
I hope this tutorial is useful in showing you both how to secure yourself against unwanted connections, and also how to determine an attacker's identity. The Internet is by no means as anonymous as some people think it is, and although this is to the detriment of people's security online, this also works both ways....it IS possible to find and stop even the most determined of attackers, you just have to be patient and keep hunting for clues which will help you put an end to their exploits.

Review of the Iphone 3G for the average Joe and Jane


This review is for the average person who wants to buy an IPHONE 3G OOB (out of the box), it isn't for techies smack talking.


Iphone - Unboxing

Ok i got the phone some weeks ago, and was mildly surprised at the chic box i got. First off, the box is SMALL or for want a better word COMPACT. It's smaller than any of my other pda/touchscreen phones i have ever owned. Inside you will find a small pin for the sim insertion card, a quick guide (pretty useless), a very compact (and detachable connector) charger, a nice embossed micro swipe, a stereo headphone and a USB cable for synchronisation. The box has perforations for the charger to be put in directly. You can't put it in any other way lol. And of course you will find the phone placed on top of it all.The phone's is slim and has a got new shiny black plastic background (a nightmare really) and the rim has a silver rim around it. It looks good but its pretty oversized compared to some of previous smartphones. Having said that, its an Iphone so doh!


Boot!

First thing i noticed about the iphone on booting, is the nice Apple logo. You will find the unit asking to be plugged into Itunes once its finished booting, so its ESSENTIAL that you find a computer to do this. The Itunes application needs to be downloaded too if you don't have it. Basically if you don't like Itunes, don't have a comp or don't use Itunes because you hate it .. well you're SCREWED especially if you don't have a comp.Once you're in, (and assuming you got Itunes on the comp), the phone will switch to default mode. The UI display is really immaculate, seeing is believing. The way it moves and coupled with the multi-touch thing, is like you tracing your tongue on Angelina Jolie's tatooed back. It's that sexy!So a lot of people been complaining about the iphone's lack of customisation (out of the box) and the answer is yes, it's true. I'm pretty used to the fact i like my interfaces to be customisable and unfortunately the iphone default interface wont allow that. What does this mean for you? Well. it's pretty simple. The iphone interface (as in settings) is pretty IDIOT proof. It's meant to be simple so that normal people (and I don't mind hardcore techies) can straight away into it without asking "i can't make it work?". I can even fathom that slapstick-moronic-comedians-that-aren't-even-remotely-funny from Malaysia can figure this one outOn the flip side, if you're a techie than you need to jailbreak it (unlocking previous locked capabilities of the iphone).


Getting the Groove On

Before you start using 3G data services ensure its not limited type as in 10kbp per sen because its going to cost you a bomb if you start using it. Best way, switch on wifi. Wifi on the iphone is PAINLESS. Unlike most of my other pda/smartphones it ALWAYS require some kind of tweaking. Right out of the box, the Iphone doesn't disappoint which is a plus in my books.Right, so I get itunes running and start looking at that App Store (IMPORTANT). Lo and behold, there's a multitude of apps, vids, etc on the store. And a LOT of them are FREE. So i'm thinking "nah it's prolly be shit anyway" so i start downloading tons of stuff. Let me just say, the stuff i downloaded are bloody awesome. Internet radio, online games etc are top notch. So were the vids (battlestar galactica anybody?). I especially like the IM software like FRING and Gtalk. The Facebook app is also pretty gorgeous looking. The software also has some acceloremeter based stuff like Tap Tap and which is pretty fun.Getting lost? LBS (location based service) software on the iphone is running on the Gmap application. How is it different than other GMap on other phones? Well first off, its faster due to its A-GPS, secondly the animation to show where you going is pretty nice to look at and again the idiot-proof thing comes into play.Watching the you tube thingy on the iphone was actually faster than my Dell xps (WTF?). The sound is rich using the supplied earphone. Impressive playback and excellent audio. All the search functions worked as expected so no gripes there.Which comes to the Ipod functionality, the Ipod app is THE application to have if you're a music addict and it doesn't disappoint. Flawless.


Mail and Messaging and Camera

The iphone comes with several options for push email, and since I'm using Gmail I love the way it works with the iphone. Just like the wifi configuration, it's a Dumb and Dumber proof way of getting mail. It's that easy. Fill in the details (basic), tap and voila! Email to you. The mail isn't truncated or butchered like you see on some other devices. So again yummy.The SMS functionality is again based on the same philosophy - Apple's idiot-free configuration. It's indeed friendly BUT here is where it fails. There isn't any way to filter messages, there isn't a way to display the messages in a different way and no way to put categories to them. Gah.Now comes the big booo booo. Lot's of iphone fans have ridiculed the use of MMS on phones as anything but a gimmick i.e. for kiddies and angst-teens. But the truth of the matter is, lots of people USE MMS. Period. They have said email can do better but you see not everyone use Email on their phone or even capable of doing it. MMS is the alternative and ITS CHEAPER on most occasions. And on the iphone --- NO MMS. Phailz! The IM capability is sound though as mentioned before so you be the judge. Like SMS/MMS fumbles, the camera on the iphone is a big letdown. 2MP is ok-ish but that isn't the issue. The issue is there are NO SETTINGS whatsoever. And no video recording unless you jailbreak your phone and use a 3rd party app. There isnt a 2nd camera for 3G either. Doh?


Connect the dots

Right you got the files, images and documents and you want to transfer them to your friends laptop/pda/phone? You got the bluetooth up and you scan .. and scan and scan. And you get - ZIPPO. Yes- nothing, nyet, bohliaow, elek, nada. That's because for some ungodly reason the bluetooth profile is wired to audio BT only. WTF apple? Even my super ancient Ericsson can do it And before you iphone fanbois open your mouths about it being possible with JBreak, please STFU because I'm talking about the iphone out of the box. This imo, is the BIGGEST boo boo that Apple has made. So the ONLY way is thru your wired connection. Yup thats right - wired.


Ugga Ugga

Ok you're looking for a stylus because you're used to it - you wont find it on the iphone lol. How do you write then? The iphone's virtual keyboard that's how! First off it looks good and it seems to be intuitive but after a few weeks I'm getting pretty peeved the closeness of the keys especially in portrait mode. And i got bony hands! You can't use nails either. Must use fingers! So the chances of you mistyping is HUGE. Pretty frustrating especially messaging really tbh.


Thiz Iz Serious Biznes

Would I recommend the Iphone to business people then? And the answer is a big NO. It lacks the most important stuff - SPEED! imagine you typing into it. IT's HARD! Lack of multi tasking abilities is another issue. If you're a business dude stay away from this phone like the plague. No BT, no scan reader, basic messaging and typing into that that tiny vkeyboard and the list goes on. Still... if you can bear all of this and style and charisma is more important, the Iphone exudes it like Britney wearing no panties! Everyone wants to take a look at it!


All your bases belongs to me

Is the Iphone worth RM2500-2800 pricetag? Answer is yes. Despite all of its shortcomings, the Iphone turns the phone industry inside out with WinMo devices clambering with a slew of Iphone-like interfaces. Yeah granted it sucks not being able to send files thru BT, it has a sucky v-keyboard, horrible messaging capabilites (good email though), horrible camera (lack of 3g twin camera configuration even) and lack of true business-centric stuff. You got to remember Apple is still a NOOB in the tele-c industry and with just their second phone, they're already shaking the industry to the core.Verdict: Go get it (if you can live with ALL of it drawbacks) or Don't get it (coz wtf ... insert whine)

What to do when Adsense Account is Suspended

Frequently, there are people posting messages at the Google AdSense Help group saying their account had been suspended. The usual reason is invalid clicks (what clicks are invalid it totally up to AdSense to judge but this is how AdSense Help define invalid clicks: "Invalid clicks are clicks generated through prohibited methods. These prohibited methods include but are not limited to: repeated manual clicks, or the use of robots, automated clicking tools, or other deceptive software." For invalid clicks, account holders are often given no warning before their account is suspended.

Accounts can be suspended because of other reasons, such as invalid impressions by participating in autosurf programs (traffic exchange programs like BlogExplosion are in a gray area, and AdSense is rather vague about it, but I have stopped using BlogExplosion for sites that contain AdSense products), for violating the Program Policy, etc., but before suspension, account holders often get warning emails and have a chance at rectifying the problem.

If your account has been suspended, you can apply for reinstatement. It is very hard but not impossible as some people have applied for reinstatement and got their account plus earnings back. However, if you are planning to apply for reinstatement, do some homework first, prepare your appeal letter carefully and give as much information as you can to support your appeal. Your first appeal may be your best chance at getting reinstated. Subsequent appeals will be much harder.

The best thing to do is to do some research and read about the experience and get tips from people who got suspended from the AdSense program, appealed and got reinstated. Below are some links to site that you should read before you apply for reinstatement.

Here is one person who got suspended, but got his account back: "How to Bring Google AdSense Down" Or "You are Guilty but We will not Tell You Why" and "How to Resurrect Your Google AdSense Account". It is a first hand account of someone who had his account suspended, and how he had to appeal twice to get it back.

You too can get banned from AdSense with no money down (Enquire Within)
This is an account of someone who got banned, and not only got back into the program plus got back his earnings.

What to Do if Google Wrongly Bans You from AdSense, By Paul Middleton
This is a personal account of how Paul Middleton got banned and how he got his account back.

Geek Talk This is Geek Talk, a forum. There is a thread with a message from a poster Larwee where he detailed what why the situation is as it is and what a publisher should try to do to get his account back.

How to ensure your AdSense account will not be cancelled
It is a list of the top 10 list of what to do (and not to do!) to ensure your AdSense account remains in good standing.

15 Common Mistakes by Google AdSense Publishers that Violates Terms of Service A good list of thing an AdSense account holder should avoid or what to do in order to stay in good standing with Google AdSense.

AdSense Bowling An account of how an enemy can get you banned from AdSense. If you are an AdSense publisher, try not to make enemies. This is how a person who have differences with you can do to try to get you into trouble with AdSense. He can go to your site, click View > Page Source in the menu bar and open up the source code file of your site. Included in the source code will be the AdSense script from which he can get your AdSense ID. With that ID, he can set up sites that violates AdSense TOS, etc with AdSense products with your AdSense ID. Sometimes, it is not even necessary to go to that length. All he has to do is to go to one of your sites and click on the ads repetitively. Moral of the story: DON'T MAKE ENEMIES.

Contact Form for appealing for reinstatement of AdSense account

If your account was disabled for invalid clicks, here is the contact form for you to appeal for reinstatement: Appeal

Contact Form for reporting AdSense invalid clicks

This is for those whose account have not been suspended but have accidentally clicked on their own ads or have reasons to suspect that there are invalid clicks being generated. In such cases, it is always better for you to let AdSense know first rather than for them to find out about it later. Here is the contact form for reporting invalid clicks:
Reporting AdSense Invalid Clicks (close new window to get back to this page).

Table to calculate earnings from Adsense

Earnings from AdSense contextual ads can come from clicks or impressions, but the amount earned may be below 2 decimal points and may show as zero in the report. The Cost for a single impression may be such a small figure that it may take many decimal places before you see any significant figures. So Google AdSense has come up with something called CPM which stand for Cost per 1000 impressions and is calculated with the formula

CPM = (earnings X 1000)/no. of impressions

A rearrangement of the above figure will give the formula

earnings = (eCPM X no. of impressions)/1000.

where eCPM is the effective (average) Cost per 1000 Impressions. Sometimes, you see in the report no clicks for a particular channel, zero earnings but a positive figure for eCPM. That means you have earned something from those impressions. You can use the above formula to calculate how much you earn or, simpler, enter the no. of impressions and the eCPM into the respective cells of the spreadsheet below (the spreadsheet is interactive), and the earnings will be automatically calculated for you. Try it and see. You can also use the table to confirm the CPM earnings reported when you see a small figure for earnings but zero for clicks.

What is eCPM?

This is a common question in forums. People are mystified by exactly what eCPM stand for. Well, eCPM is effective Cost per 1000 impressions. It represent the average earning which a publisher will earn for every 1000 impressions that he gets. It is easily calculated.

eCPM = earnings divided by number of impressions multiply by 1000.

What is eCPM used for? It is used to gauge the effectiveness of your ads. If you have optimised your ads properly, have good content and have used keywords effectively which attract high paying ads, you may be high earnings for clicks even though the no of clicks are low, and that will give you a high eCPM. On the other hand, if you have got low paying ads, you may be getting low earnings or even public service ads for which no earnings are given even if you are getting a high no. of impressions, then you will have a low or even zero eCPM.

eCPM and CTR (Click Through Rate) is also probably closely watched by AdSense. If you are getting very high eCPM, but a very low CTR, your earnings may have been driven up by a lot of invalid clicks from just a few impressions. This may cause AdSense to examine your account closely. However, a high eCPM with a low CTR may also mean that your site is getting a lot of high paying ads because you have keywords which attract high paying ads, or have optimized the color and the positioning of your ads. So whether Google really pay attention to your eCPM is only guesswork, but for you, it is a good indication of the effectiveness of your ads in your site.

To make the meaning of eCPM clearer, I give below some hypothetical examples below. The eCPM was calculated by using the formula eCPM = earnings divided by number of impressions multiply by 1000 (in the C2 cell, typing the formula C2=A2/B2*1000) with MS Excel:

Google AdSense eCPM
The figures for eCPM in the last column above was calculated by Excel using the formula =a2/b2*1000 for the second row, and similar calculations were done for the earnings in the following rows, except that they were given in 2-digit figures

Another hypothetical example:
calculation of earnings using figures given for eCPM and Page Impressions
The earnings, in an actual reports may shows $0.00, leading one to think that nothing were earned for the impressions. The figures for the earnings in the above hypothetical example above were calculated using the formula earnings=eCPMxPageImpressions/1000 in the second row. Note that if the figures rounded up to 2 digits will end up as $0.00. That however doesn't mean that you didn't earn anything even though the number of clicks is zero, but you earn an amount too small to show in the Earnings report as it was rounded up to 2 digits. You actually earned something from impressions generated which are accumulated and paid to you.

If you see 0 clicks in your report, but a non-zero figure for eCPM, and you want to know how much you earned for those impressions, you can get the earnings by using the table in this post Table to calculate your earnings from CPM ads (click "BACK" button to get back to this site).