Saturday 29 October 2011

Hack Google Homepage




















Go to Google , clear the address bar, and paste this

javascript:document.body.contentEditable='true'; document.designMode='on'; void 0

then Edit it and hit Enter

is it funny :)?
plz comment it..

Thursday 27 October 2011

Are you a hacker..

Are you a hacker? If you are geek then chances are you have searched Google for hacking tools. Chances are most geeks do not end up being Hackers but only fantasizing about it. Code is very important to geeks who are programmers and Google is full of them.
To show their appreciation for the Geek community Google has come up with a Google Search specially for hackers. Just visit http://www.google.com/webhp?hl=xx-hacker
google search hackers Google Search for Hackers, Pirates and Klingons

Are you safe from hacker..?

You may think hackers are only focused on FBI break-ins and bank accounts, but nothing could be further from the truth. According to a Ponemon Institute report published this June, 90 percent of surveyed businesses reported at least one IT security breach in the past 12 months. Any breach compromises user data, which means your online activity is always vulnerable to attacks. In fact, many users are most at-risk when visiting their favorite sites. Here you’ll find out where you’re most likely to get hacked, and how you can safeguard your personal information.

Social Networking Sites

These sites are the most popular places users can get hacked. We’ve seen well-publicized reports of celebrities’ Twitter accounts being hacked, and Facebook also has its share of troubles. Not only is your public reputation at stake, your personal information can be lifted and used to access other accounts. Phishing scams for these sites are common. These catch users by sending a link that looks and seems like a social networking login page, but is a fake (see image below).

These phony webpages record your username and password, with the intent of using the information elsewhere. In addition to your online reputation being compromised, hackers may use the information to gain access to your bank accounts, etc.
Stay safe tip: Don’t post sensitive personal information on your profile: name, address, phone number, or other identifiable information. Always login from the actual site page. Create a separate password for each account and avoid common or obvious names or patterns (the more numbers, symbols, mixed case you use, the safer the password).

Online Banking

Although online banking sites generally do all they can to protect their customers’ information, it is not a hack-proof network. Phishing scams are one method, but keylogging is another covert technique used to record your keystrokes and mouse activity. This method targets your computer’s operating system by installing a virus, which tracks your every move.
Stay safe tip: In addition to password protection, use security software, such as ZoneAlarm Extreme Security, which stops malicious software from attacking your computer and bolsters your firewall. And always update your operating system to deploy the latest security patches.

Email

Your email account is highly vulnerable. Hackers tend to target large providers like Gmail, which has had several breaches in the last year. Some safeguards, like password security questions, are easily answered thanks to the information available from social networking profiles (another reason not to post!). Another discreet way hackers monitor your email is through email forwarding.
Stay safe tip: Do not share information with unknown sources – no “company representative” will ever request address or password via email. You should also verify your settings to make sure your mail is not being forwarded to an unknown account. Also, avoid accessing your email over an unsecured network (free Wi-Fi at your local café, for instance). This only increases your chances of being hacked.

Online Shopping

The ease and convenience of online shopping has created a multi-billion dollar industry. And with all those transactions, hackers are eager to intercept your communication – and money.
Stay safe tip: Verify that a business is reputable, and that you are shopping on the appropriate site. Sites with user-rated sellers or that have been verified by a third-party are more likely be accountable and have better safeguards in place. When purchasing, double check that the URL begins with the https:// protocol identifier. This means you’re on a secure network that encrypts information being exchanged between you and the site (instead of the unsecured http://).
You should also avoid leaving a digital trail of transactions, in the form of individual credit card files and accounts for each site. Use a digital wallet service, like PayPal, that protects your payment information. Also keep your online browser updated to offer more security measures.
Though there are many reputable sites that put their users best interests at heart, it’s up to each user to safeguard their online activity. Educating yourself, using common sense, and taking precautions will minimize your chances of being hacked.

Monday 24 October 2011

Advantage of Jailbreaking iPhone

ilbreaking of iPhone is very popular since Apple has launched iPhone devices, a mass community of iPhone Dev Team is putting their effort in Jailbreaking of iPhone with every new iOS releases by apple. Do you know the advantages of Jailbreaking an iPhone? if not then you must have to read this post and know the advantage of jailbreaking iPhone.
Advantage of Jailbreaking iPhone
iOS jailbreaking, or simply jailbreaking, is the process of removing the limitations imposed by Apple on devices running on the iOS operating system through use of custom kernels. Such devices include the iPhone, iPod Touch, iPad, and Apple TV 2G. Jailbreaking allows users to gain full access (or root access) to the operating system, allowing iOS users to download additional applications, extensions, and themes that are unavailable through the official Apple App Store, via installers such as Cydia. You can refer my post about Jailbreak iPhone 4 on iOS 4.3.3(8J2) using redsn0w_win_0.9.6rc17.
A jailbroken iPhone, iPod Touch, or iPad running iOS can still use the App Store, iTunes, and other normal functions, such as making telephone calls. Unlike rooting an Android device, jailbreaking is necessary if the user intends to run software not authorized by Apple.
At its core, jailbreaking an Apple iOS device gives access to its root filesystem, allowing modification and installing third-party software components. This gives the user more control over the device and may enable features that were previously unavailable. In many cases, jailbreaking also voids the device’s warranty.

Advantage of Jailbreaking iPhone

    1. Under the DMCA of 2010, jailbreaking Apple iDevices is legal in the United States, although Apple has announced that the practice “can void the warranty.
    2. Cracked iPhone Games and Apps Installation – Jailbreaking is necessary if the user intends to run software not authorized by Apple.
    3. Gain deeper customization of device (e.g. theming, redesigned user interfaces and customize lock screens.)
    4. Jailbreaking also allows users to use paid apps from the App Store for free.
    5. It’s Fast and Easy – One of the best thing about jailbreaking an iPhone is you can easily jailbreak it within few minutes.
    6. Video chat over 3G Network – FaceTime video chat is a new feature of the iPhone 4, but it only works over a Wi-Fi network, which may be difficult to find in many situations. Jailbreaking the iPhone 4 allows for FaceTime video chat over a 3G connection.

Saturday 22 October 2011

www.WDYL.com from GOOGLE


Most of the internet users, apart from Geeks or Techies are not even aware of various services that Google has to offer. In an effort to connect users to itself, Google has built this search engine for its own services; What Do You Love. Searching across its own territory, any search term generates the content from its various services on a single page for users to scroll across them. Google WDYL Googles Wonderful Things Dashboard (WDYL.com): Search all Google Services at one Place What Do You Love or WDYL generated content includes results from every service provided by Google, ranging image results from Google Images, Google alerts to set alerts or check out trends for entered search terms, to Google blog search, book search, translation to various languages, google news and what not..!!
Google has also tried to allure users to use the services they might not have checked out earlier; say calling someone through Google Voice or promoting Google Chrome for faster web access.
The idea behind this is to find a way to connect the people to products that they might not be knowing about. As google calls it, it’s a ‘wonderful things dashboard‘ that you can even share with your friends through Gmail itself or share it on Google+ or Buzz, right there. It actually ‘awesomely awesome’ that there’s a lot you can do from a single search engine, WDYL. What Do You Love e1310668239965 Googles Wonderful Things Dashboard (WDYL.com): Search all Google Services at one Place
Check out the website yourself at www.WDYL.com. But before that, go through the video and check the search engine in action:

How to Restore Contacts in Gmail


Just log-in to your Gmail account and head over to “Contacts” section (tab). Look for “More actions” menu and click “Restore contacts“.
restore gmail contacts e1292408569400 How to Recover Accidentally Deleted Contacts from Gmail
Next, you’ll see a pop-up section which allows you to choose the duration upto which you wish to restore your contacts. Currently, 30 days is the maximum duration offered by Gmail, so choose accordingly.
In the next step, click “Restore” to revert back to the chosen time:
contacts restore e1292409640542 How to Recover Accidentally Deleted Contacts from Gmail
Wait a second, and you’re done! Depending on what duration you selected above, you’ll see the ‘success’ message as below:
contacts restored e1292408914740 How to Recover Accidentally Deleted Contacts from Gmail
Your contacts have been restored to the original state!
Even if you accidentally deleted your contacts while tweaking the contacts section or organising them or may be it happened while syncing it to some other device, you have a solution for it now!

Secure USB Drives with BitLocker

Secure your USB flash drives using BitLocker encryption. Right-click on your USB drive in My Computer, select Turn on BitLocker and follow the instructions to protect sensitive data on your thumb drives.
The next time you use your USB drive on another computer, it will prompt you for the password before allowing you read-only access to your flash drive. You can even use the drive on older computers running Windows XP/Vista.
Turn On BitLocker

Friday 21 October 2011

How To Hack Facebook Account Using Wireshark



In this tutorial we will have out look on how you can hack facebook account using wireshark. First of all I must clear you even though you'll get access to victim's account you'll not get his/her password, next this trick will work only on LAN with hub. It will also work on LAN with switch but you'll have to perform ARP poisoning, click on link to know more.
Here surely I 'll not discus how to use wireshark please read our previous tutorials to know how to use wireshark.

For this hack you'll need wireshark which is a packet sniffing tool, Mozilla Firefox web browser and add n edit add-on for Mozilla Firefox. Now I assume you have all above components for hacking facebook and you are connected in a hub based LAN or LAN which has been ARP poisoned. So now click on capture button and start capturing packets.
Now using command line shell ping www.facebook.com to get its IP address, filter all IP packets having IP address of www.facebook.com and search for HTTP protocol followed by GET /home.php, this may vary depending on region and time/zone but don't bother try to search all packets with HTTP GET for cookies.
Now from packet details window expand the packet information for above packet and you'll get 8-10 different cookies that are stored by www.facebook.com on victim's PC. Right click and copy all cookies names and values in notepad.
Now open Mozilla Firefox browse to tools and open Cookie editor. Add each cookie to your cookie folder using Cookie editor.
 After adding each value, your cookie editor will show you following values in cookie list for facebook.
Now close Cookie editor and open Facebook, you'll find yourself logged into the victims account.

Defense against this attack:
A system administrator should use tools used for countering sniffing.
Don't log-in into your accounts if you know your LAN is not protected and if you want to log-in better use a tunneled connection.

Download Wireshark from http://www.wireshark.org/.
Download Add N Edit Cookies from Add-Ons Mozzila
Read how to use wireshark.
What is ARP poisoning ?
What is sniffing ?

Facebook Vs Facebooz

In year 2008 a tool was released for facebook hacking the tool is known as facebooz(also known as facebook freezer). A lot had been discussed whether the tool is really capable of hacking facebook passwords. Many think its just a joke that a tool can crack facebook passwords. So keeping unnecessary things behind lets try to find out why this works or if it not works they why. The tool is specially targeted to m.facebook.com, yes that’s the mobile version of facebook. By the way facebook claims that the vulnerability is patched but still the tool has been downloaded millions of times from its release that means the claim is just a false excuse. I created a fake facebook account with password “Monkey” and facebooz got no issues cracking it that means the tool works. Then i changed password to “M0n7e1” and the tool failed to guess it that means it failed to work. The thing which can depress you is its speed of operation, by the way it happens due to need of software needing re-authentication grabbing so you need patience.

The final say is that the tool works only on guess-able passwords which can be found on dictionary. So if you are the one who have used facebooz and haven’t found it useful then it might be the case the victim of whom you want to crack password have strong password, the password which can not be found in any dictionary. And for those whose password can be easily guessed are advised to change their passwords to something which can not be guessed easily. So either facebook will win or facebooz just depends on password strength of victim. So keep your passwords strong and be safe. If you don’t know how to create and remember strong passwords following is the tutorial that can help you.

Wireshark Capture Tips

Using tools like Network Monitor and Wireshark are common place when dealing with troubleshooting issues in Lync Server or when simply attempting to better understand some specific behavior.
As Wireshark is more commonly deployed and often already installed on customer’s servers then it can be beneficial to understand a few basic quirks so that one can dive right into looking at the traffic.  These issues range from simply starting the capture driver to modifying and filtering the output.

Customizing the Display

Although Wireshark has a number of benefits over Network Monitor the least beneficial issue with using Wireshark out-of-the-box is that it can be hard to quickly identify traffic due to the default display behavior.  For some reason the network ports are not listed in the default columns like they are in Network Monitor, and Wireshark also incorrectly marks a lot of traffic with bad checksums.

Adding Port Columns

This should be the first change applied to Wireshark after installation and makes it much easier to read through traffic as the source and destination ports can be as important as the host IP addresses.
  • Open Preferences from the Edit menu and expand the Columns item.  Using the Add button at the bottom create two new columns and for their field types select either the resolved or unresolved selections for both Src port  and Dest port types.  Also double-click the Title fields to rename the columns.
image
The (unresolved) entry will simply show the raw port number (e.g. 5061) while the (resolved) entries will show the port information as a descriptive name if it can be resolved as a known defined port (e.g. sip-tls).
Once these changes are saved then the main Wireshark window will display the new columns.
image

Bad Checksum Errors

When looking at captured traffic often all outbound packets will be highlighted in red/black and the Header Checksum details for each packet are reported as incorrect.  This is typically due to the fact that most modern network interface cards support TCP offloading which means that the checksum data is actually calculated by the NIC and not by computer’s primary processor.   But since Wireshark has to capture the traffic before it leaves the operating system for the NIC then the checksum data for every outbound packet will be null at the time of capture.  The Header Checksum line in the following screenshot indicates this as it reports “0×0000 [incorrect, should be 0x64c7]”.
image
Now this topic has been covered by many articles since the release of Wireshark and is even discussed in the Wireshark FAQ but in the more recent versions of Wireshark these documented resolutions no longer seem to resolve the display issue. Most of the older blog articles covering this topic instruct the reader to disable the Validate TCP or UDP checksum settings in Wireshark, but current versions of the software already have this option disabled by default. 
  • To validate this open Preferences from the Edit menu and then expand the Protocols list.  Look at the settings for both TCP and UDP protocols to see that the “Validate the <protocol> checksum if possible” settings are both already disabled.
image
image
After some digging around an additional step was identified which finally resolved the issue of incorrectly displaying all outbound traffic with checksum errors.
  • In the same Preferences window locate the IP settings and then uncheck the Validate the IP checksum if possible setting which is enabled by default.
image
As soon as this setting is turned off then the displayed color of outbound traffic will immediately change in the captured traffic window, as shown below.  Note that in the highlighted Header Checksum line Wireshark reports that validation is now disabled.
image

NPF Driver Startup

During the initial Wireshark installation the WinPcap NetGroup Packet Filter (NPF) capture driver wizard prompts the user to select whether or not the NPF driver is started automatically with Windows.  If this option was disabled then when Wireshark is launched the following alert will appear.
image
There are two ways to resolve this issue: either manually start the driver each time Wireshark is used or configure the driver to start automatically when Windows is booted.

Manual Startup

  • For the manual approach open the Windows command prompt with Administrator privileges and enter the command  net start npf to start the driver.
image

Automatic Startup

  • To configure automatic startup open the Windows command prompt with Administrator privileges and enter the command sc qc npf to first identity the current status of the START_TYPE parameter.
image
  • Then from the same command prompt window enter the command sc config npf start= auto to configure the driver to start automatically with Windows.
image
Be aware that the command above includes an intended space between the equal sign and the auto value which is required by the sc command. If the space is not entered after the = then the command’s help description will instead be output which includes a note explaining that “a space is required between the equal sign and the value.”
Also note that only setting the driver for automatic startup will not actually start the service until Windows is rebooted so if Wireshark is to be used right away then run the manual start command as well.

Filtering Traffic

Filtering traffic in Wireshark falls into one of two main categories: Capture Filters and Display Filters.  When grabbing short intervals of traffic it is easiest to just capture everything (like during a Lync voice call) and then utilize display filters after the capture is stopped to drill-down to the pertinent traffic.
Since there is no ‘show Lync stuff’ filter then how the traffic should be filtered is the first step.  By IP? Or by protocol? Or by port?  Any and all of these can be used depending on what is being looked for in the traffic.
Traffic was captured using Wireshark on a Lync workstation (not from a server) during the following example scenario:
  • A Windows Lync 2010 client on the host IP address of 192.168.103.100.
  • A Polycom CX3000 Lync Phone Edition device on the host IP address of 192.168.103.104.
  • A Lync Standard Edition Front End server located at 192.168.103.23.
  • A standard peer-to-peer audio call was placed from the Lync client to the CX3000 and answered within 2 rings.
  • After 30 seconds the CX3000 disconnected the call.

Display Filters

Before looking at any individual filtering commands the basic syntax used by the Wireshark filter field needs to be briefly reviewed as it is a bit quirky and may seem a bit foreign to anyone used to Network Monitor.  Comparison Operators are supported in either English or C-Like formats, so either ‘eq’ or ‘==’ can be used to filter for an exact match.  A benefit of the Wireshark filter field is that anytime an invalid string is entered the field will display in red, but if the current string is valid it will display in green.  This helps to immediately show when a mistake or invalid format is used.  The examples below will use eq and == interchangeably.
  • To quickly identify where the SIP signaling traffic in a call is routing to set the filter to tcp.port eq 5061 and displayed is only outbound traffic from the local client (.100) to the Lync server (.23) and inbound traffic sent from port 5061 on the Lync server.  Notice that there is no traffic between the two Lync endpoints (.100 and .104) over 5061 as all signaling is handled by the Lync Front End server.
tcp.port eq 5061
image
  • To identify the media traffic flowing between the Lync clients clear the previous filter and then enter ip.addr==192.168.103.104 to locate any traffic between the Lync client (.100) and the CX3000 (.104).  To further filter for traffic by source or destination replace ip.addr with either ip.src or ip.dst.
imageip.addr==192.168.103.104
ip.dst==192.168.103.104
image

Capture Filters

To reduce the size of capture files over long periods of time or to only capture at traffic of a certain type then it can often be a better approach to simply define a capture filter.
  • From the Capture > Options menu in Wireshark simply enter the desired filter string as shown below.  The Capture filter button will display the default filters available and the examples there can be used to create a customer string.  In this example the string host 192.168.103.23 was entered so that only traffic to/from the Lync Front end server will be captured.
image

Tuesday 18 October 2011

FACEBOOK ADD-ONES

Facebook and Mozilla Firefox are among the most popular elements used on Internet. Here is a list of 3 best Mozilla Firefox extensions for Facebook which will enhance your social networking experience. These addons are especially meant to make your Facebooking better and easier.
Check out our articles on Firefox
Mozilla Firefox Add-ons For Facebook
Here are the Top 3 Mozilla Firefox Add-ons For Facebook :

Friendbar

With Friendbar, using Facebook and Twitter is so much easy and fun. Friendbar is actually a toolbar which allows you to post updates and comments, mark posts as LIKE, Retweet straight from the toolbar.
friendbar
You can even create a shortened URL of the page that you are viewing. Friendbar also alters you whenever you get a new message.


Facebook Photo Album Downloader
Facebook Photo Album Downloader helps you to download all the images of your Facebook photo album at once. This add-on is meant for the people like me, who hate wasting much of their time.
Facebook Photo Album Downloader
So instead of downloading images one by one from your Facebook album, using the Facebook Photo Album Downloader is a better and quicker option. FacePAD will let you grab all the photos from any album you need on Facebook.


Facebook Video
We share number of videos on Facebook. And if you really feel like downloading any of them, try our the Firefox add-on namely Facebook Video.
facebook video
This is actually a Grease Monkey script, which lets you download or convert any video embedded on your Facebook wall. Also checkout, How to Download Facebook Videos using Firefox.

chrom
Google Chrome has been constantly gaining market share in browser war, and this has prompted more and more developers to create extensions for Google Chrome. As a result, there are some really interesting Google Chrome extensions available. Here are 3 Chrome extensions that help you manage your WordPress blogs .

WordPress Stats Extension

Wordpress Stats
WordPress Stats is one of my favorite extension for Google Chrome. This extension shows you number of visitors to your blog at any point of time. You can see the visitor count all the time on the icon of this extension. And when you click on the extension itself, you can see more details, like, Popular Posts, Referrers, Search Terms, and Clicks.

WordPress Stats extension works only if you are using WordPress Stats plugin on your website. It pulls your stats directly from WordPress.com using your API key (see here). This plugin is easy to use, and makes it very easy to monitor traffic on your website, without continuously checking your WordPress stats page.

WordPress Comments Checker Extension

Wordpress Comments Checker
WordPress Comments checker extension keeps checking your blog for any pending comments, and shows count of pending comments in header of Google Chrome. It ignores spam comments, and shows count of only those comments that are marked as “Pending”. To use this extension, you do not need to provide login information of your blog. However, you should be login to your blog in Google Chrome, and only then this extension will be able to show count of comments.
On clicking this extension, it takes you to Admin Dashboard of your WordPress blog. There are some cool future updates planned on this extension which will make it even more useful. The developer is planning to add feature to support multiple blogs, and also moderate comments from the extension. My favorite part of this extension is that it ignores tons of spam comments that I receive daily that are stopped by my WordPress Antispam plugins. Otherwise, it would have always displayed some comments as pending.

WordPress Checker Extension

Wordpress Checker
WordPress Checker extension is another Chrome extension that shows you number of pending comments. The icon for this looks exactly same as the previous extension, and even pending comments are displayed in same manner. But the biggest advantage of this plugin is that you can see pending comments of multiple blogs with this. You just need to provide XML-RPC URL of your blogs, along with login id and password. When you click on this extension, it shows you number of pending, approved, and spam comments on each of your blog. If you have multiple blogs that you keep track of, then this is the extension to go with.
All the Google Chrome extensions for Worpdress would ease the management of your WordPress blogs. Do let us know in comments if there is some other Chrome extension that you use to manage your WordPress blog.
This is a guest post by Ishan. He is a tech blogger, and writes about Free Software on his blog.

http://prohackingtricks.blogspot.com/2011/02/you-cant-be-better-programmer-in-21.html


People take a first programming course and they think they’re done - they’re programmers! Well not so fast. There is more to it than that just as there was more to learning and even reading when I finished the first grade. Others come to me and tell me they want to learn enough programming to create a specific application (rarely one that is that easy) or the next Halo 3 (never that easy) or something. There is this cram school mentality that seems to overtake so many people. Unfortunately, programming like so many things takes a while to really, deeply learn.

I ran across the article Teach Yourself Programming in Ten Years by Peter Norvig recently and it does a good job of addressing this very issue.

Why is everyone in such a rush?

Walk into any bookstore, and you'll see how to Teach Yourself Java in 7 Days alongside endless variations offering to teach Visual Basic, Windows, the Internet, and so on in a few days or hours. I did the following power search at Amazon.com:

     pubdate: after 1992 and title: days and
      (title: learn or title: teach yourself)

and got back 248 hits. The first 78 were computer books (number 79 was Learn Bengali in 30 days). I replaced "days" with "hours" and got remarkably similar results: 253 more books, with 77 computer books followed by Teach Yourself Grammar and Style in 24 Hours at number 78. Out of the top 200 total, 96% were computer books.

The conclusion is that either people are in a big rush to learn about computers, or that computers are somehow fabulously easier to learn than anything else. There are no books on how to learn Beethoven, or Quantum Physics, or even Dog Grooming in a few days. Felleisen et al. give a nod to this trend in their book How to Design Programs, when they say "Bad programming is easy. Idiots can learn it in 21 days, even if they are dummies.

Let's analyze what a title like Learn C++ in Three Days could mean:

  • Learn: In 3 days you won't have time to write several significant programs, and learn from your successes and failures with them. You won't have time to work with an experienced programmer and understand what it is like to live in a C++ environment. In short, you won't have time to learn much. So the book can only be talking about a superficial familiarity, not a deep understanding. As Alexander Pope said, a little learning is a dangerous thing.

  • C++: In 3 days you might be able to learn some of the syntax of C++ (if you already know another language), but you couldn't learn much about how to use the language. In short, if you were, say, a Basic programmer, you could learn to write programs in the style of Basic using C++ syntax, but you couldn't learn what C++ is actually good (and bad) for. So what's the point? Alan Perlis once said: "A language that doesn't affect the way you think about programming, is not worth knowing". One possible point is that you have to learn a tiny bit of C++ (or more likely, something like JavaScript or Flash's Flex) because you need to interface with an existing tool to accomplish a specific task. But then you're not learning how to program; you're learning to accomplish that task.

  • in Three Days: Unfortunately, this is not enough, as the next section shows.

Teach Yourself Programming in Ten Years

Researchers (Bloom (1985), Bryan & Harter (1899), Hayes (1989), Simmon & Chase (1973)) have shown it takes about ten years to develop expertise in any of a wide variety of areas, including chess playing, music composition, telegraph operation, painting, piano playing, swimming, tennis, and research in neuropsychology and topology. The key is deliberative practice: not just doing it again and again, but challenging yourself with a task that is just beyond your current ability, trying it, analyzing your performance while and after doing it, and correcting any mistakes. Then repeat. And repeat again.

There appear to be no real shortcuts: even Mozart, who was a musical prodigy at age 4, took 13 more years before he began to produce world-class music. In another genre, the Beatles seemed to burst onto the scene with a string of #1 hits and an appearance on the Ed Sullivan show in 1964. But they had been playing small clubs in Liverpool and Hamburg since 1957, and while they had mass appeal early on, their first great critical success, Sgt. Peppers, was released in 1967. Malcolm Gladwell reports that a study of students at the Berlin Academy of Music compared the top, middle, and bottom third of the class and asked them how much they had practiced:

Everyone, from all three groups, started playing at roughly the same time - around the age of five. In those first few years, everyone practised roughly the same amount - about two or three hours a week. But around the age of eight real differences started to emerge. The students who would end up as the best in their class began to practise more than everyone else: six hours a week by age nine, eight by age 12, 16 a week by age 14, and up and up, until by the age of 20 they were practising well over 30 hours a week. By the age of 20, the elite performers had all totalled 10,000 hours of practice over the course of their lives. The merely good students had totalled, by contrast, 8,000 hours, and the future music teachers just over 4,000 hours.

So it may be that 10,000 hours, not 10 years, is the magic number. Samuel Johnson (1709-1784) thought it took longer: "Excellence in any department can be attained only by the labor of a lifetime; it is not to be purchased at a lesser price." And Chaucer (1340-1400) complained "the lyf so short, the craft so long to lerne." Hippocrates (c. 400BC) is known for the excerpt "ars longa, vita brevis", which is part of the longer quotation "Ars longa, vita brevis, occasio praeceps, experimentum periculosum, iudicium difficile", which in English renders as "Life is short, [the] craft long, opportunity fleeting, experiment treacherous, judgment difficult." Although in Latin, ars can mean either art or craft, in the original Greek the word "techne" can only mean "skill", not "art".

Here's my recipe for programming success:
  • Get interested in programming, and do some because it is fun. Make sure that it keeps being enough fun so that you will be willing to put in ten years.
  • Talk to other programmers; read other programs. This is more important than any book or training course.
  • Program. The best kind of learning is learning by doing. To put it more technically, "the maximal level of performance for individuals in a given domain is not attained automatically as a function of extended experience, but the level of performance can be increased even by highly experienced individuals as a result of deliberate efforts to improve." (p. 366) and "the most effective learning requires a well-defined task with an appropriate difficulty level for the particular individual, informative feedback, and opportunities for repetition and corrections of errors." (p. 20-21) The book Cognition in Practice: Mind, Mathematics, and Culture in Everyday Life is an interesting reference for this viewpoint.
  • If you want, put in four years at a college (or more at a graduate school). This will give you access to some jobs that require credentials, and it will give you a deeper understanding of the field, but if you don't enjoy school, you can (with some dedication) get similar experience on the job. In any case, book learning alone won't be enough. "Computer science education cannot make anybody an expert programmer any more than studying brushes and pigment can make somebody an expert painter" says Eric Raymond, author of The New Hacker's Dictionary. One of the best programmers I ever hired had only a High School degree; he's produced a lot of great software, has his own news group, and made enough in stock options to buy his own nightclub.
  • Work on projects with other programmers. Be the best programmer on some projects; be the worst on some others. When you're the best, you get to test your abilities to lead a project, and to inspire others with your vision. When you're the worst, you learn what the masters do, and you learn what they don't like to do (because they make you do it for them).
  • Work on projects after other programmers. Be involved in understanding a program written by someone else. See what it takes to understand and fix it when the original programmers are not around. Think about how to design your programs to make it easier for those who will maintain it after you.
  • Learn at least a half dozen programming languages. Include one language that supports class abstractions (like Java or C++), one that supports functional abstraction (like Lisp or ML), one that supports syntactic abstraction (like Lisp), one that supports declarative specifications (like Prolog or C++ templates), one that supports coroutines (like Icon or Scheme), and one that supports parallelism (like Sisal).
  • Remember that there is a "computer" in "computer science". Know how long it takes your computer to execute an instruction, fetch a word from memory (with and without a cache miss), read consecutive words from disk, and seek to a new location on disk. (Answers here.)
  • Get involved in a language standardization effort. It could be the ANSI C++ committee, or it could be deciding if your local coding style will have 2 or 4 space indentation levels. Either way, you learn about what other people like in a language, how deeply they feel so, and perhaps even a little about why they feel so.
  • Have the good sense to get off the language standardization effort as quickly as possible.

With all that in mind, its questionable how far you can get just by book learning. Before my first child was born, I read all the How To books, and still felt like a clueless novice. 30 Months later, when my second child was due, did I go back to the books for a refresher? No. Instead, I relied on my personal experience, which turned out to be far more useful and reassuring to me than the thousands of pages written by experts.

Fred Brooks, in his essay No Silver Bullet identified a three-part plan for finding great software designers:

  1. Systematically identify top designers as early as possible.
  2. Assign a career mentor to be responsible for the development of the prospect and carefully keep a career file.
  3. Provide opportunities for growing designers to interact and stimulate each other.

This assumes that some people already have the qualities necessary for being a great designer; the job is to properly coax them along. Alan Perlis put it more succinctly: "Everyone can be taught to sculpt: Michelangelo would have had to be taught how not to. So it is with the great programmers".

So go ahead and buy that Java book; you'll probably get some use out of it. But you won't change your life, or your real overall expertise as a programmer in 24 hours, days, or even months.

References

Bloom, Benjamin (ed.) Developing Talent in Young People, Ballantine, 1985.

Brooks, Fred, No Silver Bullets, IEEE Computer, vol. 20, no. 4, 1987, p. 10-19.

Bryan, W.L. & Harter, N. "Studies on the telegraphic language: The acquisition of a hierarchy of habits. Psychology Review, 1899, 8, 345-375

Hayes, John R., The Complete Problem Solver, 2nd Edition Lawrence Erlbaum, 1989.

Chase, William G. & Simon, Herbert A. "Perception in Chess" Cognitive Psychology, 1973, 4, 55-81.

Lave, Jean, Cognition in Practice: Mind, Mathematics and Culture in Everyday Life, Cambridge University Press, 1988.

Answers

Approximate timing for various operations on a typical PC:

execute typical instruction1/1,000,000,000 sec = 1 nanosec
fetch from L1 cache memory0.5 nanosec
branch misprediction5 nanosec
fetch from L2 cache memory7 nanosec
Mutex lock/unlock25 nanosec
fetch from main memory100 nanosec
send 2K bytes over 1Gbps network20,000 nanosec
read 1MB sequentially from memory250,000 nanosec
fetch from new disk location (seek)8,000,000 nanosec
read 1MB sequentially from disk20,000,000 nanosec
send packet US to Europe and back150 milliseconds = 150,000,000 nanosec

Appendix: Language Choice

Several people have asked what programming language they should learn first. There is no one answer, but consider these points:

Use your friends. When asked "what operating system should I use, Windows, Unix, or Mac?", my answer is usually: "use whatever your friends use." The advantage you get from learning from your friends will offset any intrinsic difference between OS, or between programming languages. Also consider your future friends: the community of programmers that you will be a part of if you continue. Does your chosen language have a large growing community or a small dying one? Are there books, web sites, and online forums to get answers from? Do you like the people in those forums?

Keep it simple. Programming languages such as C++ and Java are designed for professional development by large teams of experienced programmers who are concerned about the run-time efficiency of their code. As a result, these languages have complicated parts designed for these circumstances. You're concerned with learning to program. You don't need that complication. You want a language that was designed to be easy to learn and remember by a single new programmer.

Play.
Which way would you rather learn to play the piano: the normal, interactive way, in which you hear each note as soon as you hit a key, or "batch" mode, in which you only hear the notes after you finish a whole song? Clearly, interactive mode makes learning easier for the piano, and also for programming. Insist on a language with an interactive mode and use it.

Given these criteria, my recommendations for a first programming language would be Python or Scheme. But your circumstances may vary, and there are other good choices. If your age is a single-digit, you might prefer Alice or Squeak (older learners might also enjoy these). The important thing is that you choose and get started.

Appendix: Books and Other Resources

Several people have asked what books and web pages they should learn from. I repeat that "book learning alone won't be enough" but I can recommend the following:

Scheme: Instructor's Manual t/a Structure and Interpretation of Computer Programs - 2nd Edition is probably the best introduction to computer science, and it does teach programming as a way of understanding the computer science. You can see online videos of lectures on this book, as well as the complete text online. The book is challenging and will weed out some people who perhaps could be successful with another approach.

Scheme: How to Design Programs is one of the best books on how to actually design programs in an elegant and functional way.

Python: Python Programming: An Introduction to Computer Science is a good introduction using Python.

Python: Several online tutorials are available at Python.org.

Trending: Anonymous Claims not to Support Killing Facebook June 14, 2011 Top 20 Best Peer to Peer (P2P)

Users can use software that connects in to a peer-to-peer network to search for shared files on the computers of other users (i.e. peers) connected to the network. Files of interest can then be downloaded directly from other users on the network. Typically, large files are broken down into smaller chunks, which may be obtained from multiple peers and then reassembled by the downloader. This is done while the peer is simultaneously uploading the chunks it already has to other peers.

Due to the vastness of the p2p landscape,  searching for the most efficient file sharing app as dictated by your needs and preferences can prove tiresome – that’s why we thought we should make this task easier for you by listing 20 of the best peer-to-peer programs currently in use.

Considering the vast psp softwares availabe, searching for the most efficient file sharing apps can be tiresome, most espcially with the increase of malware, viruses and spywares - for that reason i though it would be good to make this task easier for you by collating the best peep to peer file sharing softwares.

Note: Make sure you know what you are downloading, coz most software disguises as being genuine whereas they are habouring viruses and some hackers uses this medium to penetrate into your system.

So be careful and good luck.

20 Best p2p (Peer to Peer) File Sharing Apps and Softwares

1) µTorrent:

The program is designed to use minimal computer resources while offering functionality comparable to larger BitTorrent clients such as Vuze or BitComet.

2) SoulSeek:

Soulseek is a peer-to-peer (P2P) file-sharing network and application. It is used mostly to exchange music, although users are able to share a variety of files. It was created by Nir Arbel, a former Napster programmer. The server used is composed of two networks since 2006. Since 6 July 2008, there has been an attempt to merge them with the arrival of a new stable release.

3) DC++:

DC++ is a free and open-source, peer-to-peer file sharing client alternative to the original client, NeoModus Direct Connect (NMDC); it connects to the same file-sharing network and supports the same file-sharing protocol. One of the reasons commonly attributed to the aforementioned popularity of DC++ is that it has no adware of any kind, unlike NMDC.

4) Vuze:

Vuze (previously Azureus) is a BitTorrent client used to transfer files via the BitTorrent protocol. Vuze is written in Java, and uses the Azureus Engine. In addition to downloading data linked to by .torrent files, Azureus allows users to view, publish and share original DVD and HD quality video content.

Content is presented through channels and categories containing TV shows, music videos, movies, video games and others. Additionally, if users prefer to publish their original content, they may earn money from it.

5) LimeWire:

LimeWire is a free peer-to-peer file sharing (P2P) client program that runs on Windows, Mac OS X, Linux, and other operating systems supported by the Java software platform. LimeWire uses the gnutella network as well as the BitTorrent protocol. A free software version and a purchasable "enhanced" version are available.

6) eMule:

eMule is a free peer-to-peer file sharing application for Microsoft Windows. Started in May 2002 as an alternative to eDonkey2000, eMule now connects to both the eDonkey network and the Kad network.

The distinguishing features of eMule are the direct exchange of sources between client nodes, fast recovery of corrupted downloads, and the use of a credit system to reward frequent uploaders. Furthermore, eMule transmits data in zlib-compressed form to save bandwidth.

7) Shareaza:

Shareaza is a peer-to-peer file sharing client running under Microsoft Windows which supports the gnutella, Gnutella2 (G2), eDonkey, BitTorrent, FTP, HTTP and HTTPS network protocols and handles magnet links, ed2k links, and the now deprecated gnutella and Piolet links. It is available in 30 languages.

One unique thing about Shareaza is that it hashes its files for all networks, and then distributes those hash values on G2 which then allows it to download one file from several networks at once. When another Shareaza client connected to G2 finds such a file, it is given the hash values for all networks and can search on the other networks with their respective hash values, which increases the number of sources and the download speed of the file. Shareaza also uses its G2 network to find more sources for torrents.

8 ) BitComet:

The BitComet program is a multi-threaded multi-protocol hybrid download manager and BitTorrent Peer-to-peer (P2P) file-sharing application. It supports simultaneous download tasks. To complete a particular download, it can draw parts of files from many sources across different P2P and client–server protocols.

9) aMule:

aMule is a free peer-to-peer file sharing application that works with the EDonkey network and the Kad Network, offering similar features to eMule and adding others such as GeoIP (country flags). It was forked from the xMule source code on August 18, 2003, which itself is a fork of the lMule project, which was the first attempt to bring the eMule client to Linux.

10) giFT:

giFT is a collection of various software components geared towards improving the overall usability of a multitude of peer-to-peer file-sharing networks. This goal is accomplished by unifying the components such that a user of the software may choose any of the available interfaces to access any of the available networks. The central application, giftd, uses a plugin-based architecture capable of using multiple networks simultaneously through a single user interface.

11) Ares Galaxy:

Ares Galaxy is an open source peer-to-peer file sharing application that uses its own decentralized supernode/leaf network. It was spun off from the gnutella network in 2002, and is currently hosted on SourceForge.net. Ares Galaxy has a simple, quick access interface with a built in audio/video viewer. The latest versions also support the BitTorrent protocol and Shoutcast radio stations.

12) ANts P2P:

ANts P2P is an anonymous peer-to-peer open source file sharing software written in Java. The software was initially conceived in 2003 to explore the potentials offered by a number of novel routing protocols (ARA, ants-based routing, MANET routing protocols) based on swarm intelligence. A report (in Italian) about the initial phases of the project can be downloaded from the software website. A short summary in english is available on the ANts P2P website.

13) BitTornado:

BitTornado is a free BitTorrent client for transfer of computer files over networks, including the Internet. It is developed by John Hoffman, who also created its predecessor, Shad0w's Experimental Client. Based on the original BitTorrent client, the interface is largely the same, with added features such as

  • upload/download speed limitation;
  • prioritised downloading when downloading batches (several files);
  • detailed information about connections to other peers;
  • UPnP Port Forwarding (Universal Plug and Play);
  • IPv6 support (OS support required);
  • PE/MSE support as of version 0.3.18
14) FrostWire:

FrostWire is a Peer-to-Peer file sharing program for the Gnutella network and BitTorrent protocol. It is built on the LimeWire source code, and it is written in the Java programming language. Development of the program has been active since the program was first released in September 2004.

Since LimeWire was closed down on 26th October 2010, LimeWire was put under a court injunction to stop them from distributing the software and developing it, FrostWire has become increasingly popular as it is almost identical to LimeWire 4.x series and has the same features.

15) Morpheus:

Morpheus was a file sharing and searching peer-to-peer client for Microsoft Windows, developed and distributed by the company StreamCast, that originally used the Opennap protocol, but later supported many different peer-to-peer protocols.

On April 22, 2008, distributor StreamCast Networks filed for Chapter 7 bankruptcy after a long legal battle with music companies; all of their employees were laid off and the official download at www.morpheus.com stopped being available, though for a small period the website remained online. As of October 29, 2008 the official Morpheus website is offline, including all other websites owned by StreamCast Networks including Morpheus.com, MusicCity.com, Streamcastnetworks.com and NeoNetwork.com

16) gtk-gnutella:

Gtk-gnutella is programmed in C with an emphasis on efficiency and portability without being minimalistic but rather head-on with most of the modern features of the gnutella network. Therefore, it requires less resources (such as CPU and/or RAM) than the major gnutella clients. It can also be used as headless gnutella client not requiring Gtk+ at all.

gtk-gnutella has a filtering engine that can reduce the amount of spam and other irrelevant results. gtk-gnutella supports a large range of the features of modern gnutella clients. gtk-gnutella was the first gnutella client to support IPv6 and encryption using TLS. It can handle and export magnet links. It has strong internationalization features, supporting English, German, Greek, French, Hungarian, Spanish, Japanese, Norwegian, Dutch and Chinese. gtk-gnutella also has support to prevent spamming and other hostile peer activity.

17) Acquisition:

Acquisition is a Gnutella-based peer-to-peer client that is also capable of supporting BitTorrent designed specifically for Mac OS X. It is based on LimeWire and is a shareware product, priced from $25. Acquisition is more noted for its focus on user interface and integration with Mac OS X than for its originality in features, making full use of Apple's Cocoa APIs, and has integration with iTunes.

18) Cabos:

Cabos is a free gnutella file sharing program. It is based on LimeWire's source code, and has a similar feel in terms of interface. However, it lacks the chat and library features found in LimeWire. Also, while LimeWire is completely written in Java, the GUI of Cabos is written in REALbasic

19) MLDonkey:

MLDonkey is an open source, multi-protocol, peer-to-peer file sharing application that runs as a back-end server application on many platforms. It can be controlled through a user interface provided by one of many separate front-ends, including a Web interface, telnet interface and over a dozen native client programs.

Originally a Linux client for the eDonkey protocol, it now runs on many flavors of Unix-like, Mac OS X, Windows and MorphOS and supports numerous peer-to-peer protocols.

20) KTorrent:

KTorrent is a bittorrent application for KDE which allows you to download files using the BitTorrent protocol. It enables you to run multiple torrents at the same time and comes with extended features to make it a full-featured client for BitTorrent.

Get Back Your Old Facebook Chat In Any Browser

Google Chrome

  • In case, you want to download the latest version, download it Download Google Chrome.
  • After you have downloaded and installed Chrome, Install This script
  • Then finally click Install.
  • Now, restart your browser (Close it and open it again).
  • You’re done!
  • Restart your browser; go to facebook.com and voila! You have the old chat back.
  • If it doesn’t work then you done it wrong!, Start over again.

Mozilla Firefox

  • You have to, Install this addon, Greasemonkey
  • After installing that, just install, This script
  • You’re done!
  • Restart your browser; go to facebook.com and voila! You have the old chat back, if it doesn’t work then you done it wrong!

Internet Explorer

  • First, Install Trixie
  • If you havent already got it installed. Then install This script, else you need not to.
  • You’re done!
  • Now restart your browser, go to facebook.com again, and see that you have the old chat.

Safari

  • Install Greasemonkey
  • If you haven’t already got it installed. Then install,
  • This script
  • You’re done!
  • Now restart your browser,
  • Go to facebook.com again, and see that you have the old chat, If it doesn’t work then you done it wrong!

Opera

  • Use, This guide on how to install This script
  • You’re done!
  • Now restart your browser, go to facebook.com again, and see that you have the old chat.
So , you must be done now restoring the old Facebook chat.It’s better than the new one any day.


If you liked this post then please click on the like button below and feel free to send this as well to ur friends/groups/pages.