An Easy Way to Avoid Spam

Spam has become a real problem these days. The more people who know your e-mail address, the more unwanted pieces of mail you receive. If you used your e-mail to register on some Web sites or publish a few articles in the newsgroup, you probably started to receive more unwanted messages than welcome ones. Fortunately, the users of Linux and other open-source systems have written a lot of good anti-spam filters. You can find dozens of these programs on GNU.org and Freshmeat. The anti-spam software may be sophisticated or simple, easy or difficult to use, more or less effective. Amidst the larger well-known projects, there is SpamAssassin, written by Justin Mason, and bogofilter, a Bayesian filter written by Eric S. Raymond, and others.

Testmail, the filter discussed in this article, is a Perl filter of average size and moderate complexity. It checks e-mail messages available at the POP3 server, filters them according to defined rules and, depending on the selected method, sends messages to the local mailbox or removes them from the server. Testmail requires the Perl libnet, Net-Ping and Socket modules.
First Steps

To install testmail, run install.sh script as a regular user. The script asks you a few questions about the address of your POP3 host, your user's name at the host, your password and so on. If you use a few mailboxes, you should run install.sh once for each unique name to prepare all the configurations.

At the end of the installation, the script displays information about further steps. After the installation is complete, you should put the addresses of all your trusted senders in ~/.testmail/rul_from_accept file. It also is a good idea to run the testmail --initialize command to prepare some standard files that testmail uses, but it isn't necessary.



Figure 1. The test-*.acce file lists information about all accepted messages.


Assuming you use a_nowak mailbox at wp.pl server, and you prepared the configuration named wp, all you need to do to check you mailbox is run testmail with --test - wp. In this case, the --test parameter means run for testing purposes, and the dash indicates all the messages from the first to the last. If there are eight messages at the server, for example, the dash is the abbreviation of the 1-8 parameter.



Figure 2. The test-*.reje file lists information about all rejected messages at the server.

From here, testmail checks the mailbox, taking into consideration the rules listed in the files in the ~/.testmail directory. It grants the right scores to the particular messages, according to the table of scores kept in the ~/.testmail/cfg_wp file, which is the description of the wp configuration. All the information about the messages available at the server are stored in ~/test-wp.acce (Figure 1), ~/test-wp.reje (Figure 2) and ~/test-wp.log (Figure 3) files. The first one describes the accepted messages, the second lists the rejected ones and the third file includes detailed information about the rules used during the evaluation of the messages.



Figure 3. If you want to know more about the used rules, check test-*.log.


The sample entry in test-*.reje file can be something like this:
  3. [-35]
Date: Fri, 25 Jul 2003 13:37:16
Return-Path:
From:
To:
CC:
Subject: Feel young a.nowak
Content-Type: text/html
Content-Length: 1271

The number at the beginning of the first line is the number of that message at the server, 3 in our example. The number in the square brackets is the score of the message, -35 in the example. The rest of the record is the description of some important header fields. The entry in the test-*.acce file looks similar, but the score is positive rather than negative.

The information about the rules used for that message included in test-*.log file is the following:
3 -10 @mailclub.net
3 +10 a.nowak@bigfoot.com
3 -10 a.?nowak
3 -10 feel
3 -10 young
3 -5 text/html
3 -35 --------------------------------------

The number in the first column is the number of the message at the server. The numbers in the second column are scores, either positive or negative. The fourth column describes the types of rules used. The third column includes the information about each particular rule.

In detail for our example, @mailclub.net is registered as a rejected domain in the rul_from_reject file. a.nowak@bigfoot.com is registered as an accepted recipient's address in the rul_to_accept file. a.?nowak--the account name on the server--feel and young are registered as rejected subject keywords in the rul_subj_reject file. Finally, text/html is registered as a rejected content type in the rul_type_reject file.

The score for an accepted recipient's addresses is +10, the score for rejected senders and subject's keywords is -10 and the score for rejected content types is -5. Next to the underline is the total of all the subscores, -35 in the example. Evaluation like this means this e-mail message is spam, beyond all doubt.
In Practice

Testmail uses scores and divides messages into positively and negatively estimated ones. It then distinguishes highly scored and lowly scored messages. By default, positively scored messages are expected to be retrieved while negatively scored or zero-scored one are deleted. You can change these default by using the appropriate commands.

If you have created the configuration named wp, the command testmail --extdget - wp pulls all the positively scored messages and deletes low scored ones, that is, all the messages scored -15 and below. Then, the command testmail --test - wp displays information about the messages remaining at the server. If three negatively scored messages are on the server, and you want the second one and do not want the others, use the command testmail --getall 2 wp to get the second message. Then, use the command testmail --del -2 wp to delete the two remaining messages.

All retrieved messages for the wp configuration are stored in ~/mbox-wp mailbox. The information about the retrieved messages is stored in the ~/done-wp.acce file, while information about the deleted ones is in the ~/done-wp.reje file.

If you don't want to deal with those sophisticated commands and files at all, you can run the testmail program using a simple testmail --force - wp command. As a result, the program gets all the positively scored messages as well as the negatively scored ones, up to the value determined by the AUTODEL variable listed in the configuration file (-15, by default). It then removes the rest, all the low scored messages. You end up seeing more spam this way than in the former example, but the entire process is be automated.



Figure 4. Testmail displays help, including all the parameters and information about the configuration.

Advanced Use

Testmail has a lot of features, and you can add your own rules to the configuration files to make the program more effective. You also can switch some variables to make testmail more verbose. The additional shell scripts can help you in processing log files. You also can test new sets of rules across log files of already-received and deleted messages. You even can record some statistics about those messages. Sample statistics, as displayed by the program, include the following:
-------------+-------------
 categories | messages
-------------+-------------
 total | 946
 accepted | 773
 rejected | 173
 released | 6
 stopped | 14
 e-mail | 82.6%
 spam | 17.4%
-------------+-------------
 hit | 97.9%
 missed | 2.1%
-------------+-------------

You see here the total number of messages included in the log files, divided into the number of messages accepted and rejected by testmail. Released means the messages classified by the program as accepted but that we actually did not want, while stopped signifies the messages classified as rejected that we wanted anyway. E-mail and spam are the percentages of messages in each of these categories. The summary shows the percentage of hit and missed messages. A well-configured testmail achieves about 95% hits and 5% misses.

For more testmail help, run testmail wp, assuming you have the wp configuration (see Figure 4). If you want to know more, read the entire documentation of the program-readme.txt text file and testmail.1 man's page.
Resources

Testmail

Bogofilter

SpamAssassin

Anti-Spam SoftwareGNU.org

Freshmeat.org

Cezary M. Kruk lives in Wroclaw, Poland. He is an editor for the Polish quarterly magazine CHIP Special Linux.

Read More......

Free Download MP3

I suggest you www.mp3dl.co.cc
Always free,without having an account.

Read More......

Download Rapidshare Book Photoshop Fine Art Effects Cookbook

Photoshop Fine Art Effects Cookbook tells you all you need to know to turn your digital photographs into images that mimic the styles of great visual artists.
From advice on how to choose appropriate subject matter to 62 step-by-step recipes that show you how to create an “original” van Gogh, Vermeer, Edward Weston, or Andy Warhol (among others), this book is an authentic guide to simulating the work of great artists-and a whole lot of fun.

Download from RapidShare

http://rapidshare.com/files/48944219/Photoshop_Fine_Art_Effects_Cookbook_curtis112.rar

Download from Depositfiles

http://depositfiles.com/en/files/1488550

Download from Easy-Share

http://w14.easy-share.com/3168631.html

Read More......

Speaking Notepad

Speaking Notepad is handy text editor with powerful text-to-speech capabilities. Speaking Notepad will read your TXT, DOC, PDF, HTML and RTF documents with SAPI4 and SAPI5-compliant high quality voices, different speed and pitches, read clipboard content, record texts into WAV, MP3 or WMA files and even read every word or sentence you are typing.

Platform: Windows 98/Me/2000/XP/2003
Download size: 5.00 MB

Protected Message:
Code:
http://rapidshare.com/files/142844836/speakingnotepad_downarchive.rar


Crack: (Just copy and past files to installed directory)
Protected Message:
Code:
http://www.mediafire.com/?mdhoyltimug

Read More......

Direct X changer

Direct X changer
The program is intended for carrying out of various actions with versions DirectX. The program can change version DirectX for any another without restart of OS. For example, this program will allow starting many old games and if to establish package DirectX10 for XP, also many new games. And if suddenly OS after changes of version DirectX began to work stably always it is possible to return to DirectX 9.

system requirements :
KMDXC runs on Windows XP or Later

Minimum hardware requirements

* Intel Pentium® or AMD K5 processor with 266 MHz
* 5 MB free hard disk space

* 32 MB RAM
* Video Card with support DirectX 7 or later


Software requirements
KMDXC has been tested on the following platforms:

* Windows XP Professional SP2, SP3
* Windows Vista Home Premium/Ultimate
* Windows 7 Milestone 1 build 6519

Protected Message:
Code:
http://rapidshare.com/files/147062188/kmdxc.zip.html

Read More......

Windows Vista Black Edition 2009 SP1

Windows Vista Black Edition 2009 SP1

Platform: Windows
Compilation Date: 17.07.2008
Author: Benjamin
Size: 4.2GB
Activation Needed: No
CD-Key: N/A
Architecture : 32-Bit
Total Parts: 200 x 21 = 4200MB

Note: Start a Fresh installation from the DVD and install in a separate partition. Dont start the installation from your Previous windows.

Minimum System requirements:

* 1GB RAM
* 20 GB of Hard Drive space
* 128 MB Graphics Memory (To enable Aero)
* 17′inch Monitor (1024 X 76
* DVD-ROM
* Above Pentium 4 Processor
* Pixel Shader 2.0 in hardware
* 32 bits per pixel

This Operating system is purely designed from Genuine Vista Ultimate by Benjamin. It will be more comfortable, faster and reliable when compared to other vista operating systems. All the error which the user faced in vista ultimate are fixed and tweaked. New hot fixes, updates and the Vista SP1 package are integrated. All the dream scene packs are activated. The Dolby digital plugins are also integrated for more fun with musics. New windows sounds, New Gadgets, New Login screen, New Default theme and more…. You can install any hardware without any problem, all the hardware errors are fixed. Just install this Black Edition 2009 and start your work. No need of installing any 3rd party softwares by searching the CD’s or DVD’s. All the softwares which you need to run quickly after installing a OS are inside.

* New Windows Sounds
* No more BSOD error screens
* All Windows Ultimate Extras Integrated
* New Default Theme
* 310 Sidebar Gadgets
* 30 Video Dreamescene Packs
* New Logon Screensaver added
* New Login Screen
* New Look for windows media center
* Registry Tweaks are added( Copy to, Move to, Command Prompt, Take ownership, Encrypt and more)
* Maximum parallel downloads for IE to 20 (Default is 2)
* New Updated graphics card drivers are integrated.
* New Explorer View
* Patched Uxtheme files so u can use any 3rd party themes
* Classic Control Panel
* DirectX Updated
* All Chipset Drivers
* All Printers Drivers (Updated)
* All Graphics card drivers (Updated)
* All Sound Card Drivers (Updated)
* All SCSI-RAID Drivers (Updated)
* All Scanners Drivers
* Resolved some reliability issues in the USB core components
* Added hotfix for resolving some performance and reliability issues
* Improved the reliability of Windows Media Player
* Resolved an issue where messages become stuck in the Outbox and cannot be deleted when using
Windows Mail
* Resolved a set of known application compatibility issues

Drivers Which are missed in Vista by default are fixed:

* Graphics card drivers for
Intel(R) G31 Express Chipset
Intel(R) G33 Express Chipset
Intel(R) G35 Express Chipset
Intel(R) G965 Express Chipset
Intel(R) Q33 Express Chipset
Intel(R) Q35 Express Chipset
Intel(R) Q963 Express Chipset
Intel(R) Q965 Express Chipset
Intel(R) 4 Series Internal Chipset
Intel(R) Q45/Q43 Express Chipset
Intel(R) Q45/Q43 Express Chipset
Intel(R) G45/G43 Express Chipset
Intel(R) G45/G43 Express Chipset
Intel(R) G41 Express Chipset
Mobile Intel(R) 45 Express Chipset Family
Mobile Intel(R) GL960 Express Chipset
Mobile Intel(R) GLE960 Express Chipset
Mobile Intel(R) GM965 Express Chipset
Mobile Intel(R) GME965 Express Chipset

For other models which is lower than these models wil be automatically installed by default.

* Graphics card drivers for
NVIDIA GeForce 9800 GX2
NVIDIA GeForce 9800 GTX
NVIDIA GeForce 9600 GT
NVIDIA GeForce 9600 GSO
NVIDIA GeForce 9400 GT
NVIDIA GeForce 9300 GS
NVIDIA GeForce 9300 GE
NVIDIA GeForce 8800 Ultra
NVIDIA GeForce 8800 GTX
NVIDIA GeForce 8800 GTS 512
NVIDIA GeForce 8800 GTS
NVIDIA GeForce 8800 GT
NVIDIA GeForce 8800 GS
NVIDIA GeForce 8600 GTS
NVIDIA GeForce 8600 GT
NVIDIA GeForce 8600 GS
NVIDIA GeForce 8500 GT
NVIDIA GeForce 8400 GS
NVIDIA GeForce 8400 SE
NVIDIA GeForce 8400
NVIDIA GeForce 8300 GS
NVIDIA GeForce 8300
NVIDIA GeForce 8200
NVIDIA GeForce 8200/NVIDIA nForce 730a
NVIDIA GeForce 8100/NVIDIA nForce 720a
NVIDIA GeForce 7950 GX2
NVIDIA GeForce 7950 GT
NVIDIA GeForce 7900 GTX
NVIDIA GeForce 7900 GT/GTO
NVIDIA GeForce 7900 GS
NVIDIA GeForce 7800 SLI
NVIDIA GeForce 7800 GTX
NVIDIA GeForce 7800 GT
NVIDIA GeForce 7800 GS
NVIDIA GeForce 7650 GS
NVIDIA GeForce 7600 GT
NVIDIA GeForce 7600 GS
NVIDIA GeForce 7600 LE
NVIDIA GeForce 7500 LE
NVIDIA GeForce 7350 LE
NVIDIA GeForce 7300 SE
NVIDIA GeForce 7300 LE
NVIDIA GeForce 7300 GT
NVIDIA GeForce 7300 GS
NVIDIA GeForce 7200 GS
NVIDIA GeForce 7100 GS
NVIDIA GeForce 7150 / NVIDIA nForce 630i
NVIDIA GeForce 7100 / NVIDIA nForce 630i
NVIDIA GeForce 7100 / NVIDIA nForce 620i
NVIDIA GeForce 7050 / NVIDIA nForce 630i
NVIDIA GeForce 7050 / NVIDIA nForce 610i
NVIDIA GeForce 7050 PV / NVIDIA nForce 630a
NVIDIA GeForce 7025 / NVIDIA nForce 630a
NVIDIA GeForce 6800 XT
NVIDIA GeForce 6800 XE
NVIDIA GeForce 6800 Ultra
NVIDIA GeForce 6800 Series GPU
NVIDIA GeForce 6800 LE
NVIDIA GeForce 6800 GT
NVIDIA GeForce 6800 GS/XT
NVIDIA GeForce 6800 GS
NVIDIA GeForce 6800
NVIDIA GeForce 6700 XL
NVIDIA GeForce 6610 XL
NVIDIA GeForce 6600 VE
NVIDIA GeForce 6600 LE
NVIDIA GeForce 6600 GT
NVIDIA GeForce 6600
NVIDIA GeForce 6500
NVIDIA GeForce 6250
NVIDIA GeForce 6200SE TurboCache™
NVIDIA GeForce 6200 TurboCache™
NVIDIA GeForce 6200 LE
NVIDIA GeForce 6200 A-LE
NVIDIA GeForce 6200
NVIDIA GeForce 6150SE nForce 430
NVIDIA GeForce 6150 LE
NVIDIA GeForce 6150
NVIDIA GeForce 6100 nForce 420
NVIDIA GeForce 6100 nForce 405
NVIDIA GeForce 6100 nForce 400
NVIDIA GeForce 6100

Note: I did not included graphics driver for NVIDIA Geforce 200 series because the drivers is still in Beta lol.


Programs:

* 7-Zip
* Mozilla
* K-Lite Codecs 3.95 Full
* System Utilities
* Image Burn
* CCleaner
* Office 2003
* Vista Codecs
* XVID codecs
* Dolby Digital Surround Plugins
* Cyberlink Power DVD 8
* Avast Professional Edition v4.8
* Damn NFO Viewer
* Spyware Doctor v5.5
* Zoner Photo Studio 10
* Power ISO 4
* Yahoo messenger for Vista Black
* Ashampoo Music Studio
* Screen Capture
* Star Codecs
* Norton Ghost 14
* Ultra ISO 9
* Real Player 11 Gold Plus
* All Codecs for Windows Media Player 2008


Protected Message:
Code:
http://www.filefactory.com/file/777859/n/blacbe_part01_rar
http://www.filefactory.com/file/df868e/n/blacbe_part02_rar
http://www.filefactory.com/file/d6500f/n/blacbe_part03_rar
http://www.filefactory.com/file/1c9214/n/blacbe_part04_rar
http://www.filefactory.com/file/e8ae27/n/blacbe_part05_rar
http://www.filefactory.com/file/5c4c48/n/blacbe_part06_rar
http://www.filefactory.com/file/95d3c6/n/blacbe_part07_rar
http://www.filefactory.com/file/8ae292/n/blacbe_part08_rar
http://www.filefactory.com/file/ac2d5f/n/blacbe_part09_rar
http://www.filefactory.com/file/e89d71/n/blacbe_part10_rar
http://www.filefactory.com/file/eeeeba/n/blacbe_part11_rar
http://www.filefactory.com/file/8b9454/n/blacbe_part12_rar
http://www.filefactory.com/file/f9800e/n/blacbe_part13_rar
http://www.filefactory.com/file/c3c850/n/blacbe_part14_rar
http://www.filefactory.com/file/e2ae75/n/blacbe_part15_rar
http://www.filefactory.com/file/4a923e/n/blacbe_part16_rar
http://www.filefactory.com/file/03e714/n/blacbe_part17_rar
http://www.filefactory.com/file/3b95a1/n/blacbe_part18_rar
http://www.filefactory.com/file/acfa90/n/blacbe_part19_rar
http://www.filefactory.com/file/68fda9/n/blacbe_part20_rar
http://www.filefactory.com/file/ee8cfe/n/blacbe_part21_rar

Protected Message:
Code: NOT ALLOWED

Protected Message:
Code: warez_ben

Read More......

Programming Language



A vocabulary and set of grammatical rules for instructing a computer to perform specific tasks. The term programming language usually refers to high-level languages, such as BASIC, C, C++, COBOL, FORTRAN, Ada, and Pascal. Each language has a unique set of keywords (words that it understands) and a special syntax for organizing program instructions.


High-level programming languages, while simple compared to human languages, are more complex than the languages the computer actually understands, called machine languages. Each different type of CPU has its own unique machine language.

Lying between machine languages and high-level languages are languages called assembly languages. Assembly languages are similar to machine languages, but they are much easier to program in because they allow a programmer to substitute names for numbers. Machine languages consist of numbers only.

Lying above high-level languages are languages called fourth-generation languages (usually abbreviated 4GL). 4GLs are far removed from machine languages and represent the class of computer languages closest to human languages.

Regardless of what language you use, you eventually need to convert your program into machine language so that the computer can understand it. There are two ways to do this:

  • Compile the program
  • Interpret the program

See compile and interpreter for more information about these two methods.

The question of which language is best is one that consumes a lot of time and energy among computer professionals. Every language has its strengths and weaknesses. For example, FORTRAN is a particularly good language for processing numerical data, but it does not lend itself very well to organizing large programs. Pascal is very good for writing well-structured and readable programs, but it is not as flexible as the C programming language. C++ embodies powerful object-oriented features, but it is complex and difficult to learn.

The choice of which language to use depends on the type of computer the program is to run on, what sort of program it is, and the expertise of the programmer.

Read More......

Programming Language



A vocabulary and set of grammatical rules for instructing a computer to perform specific tasks. The term programming language usually refers to high-level languages, such as BASIC, C, C++, COBOL, FORTRAN, Ada, and Pascal. Each language has a unique set of keywords (words that it understands) and a special syntax for organizing program instructions.


High-level programming languages, while simple compared to human languages, are more complex than the languages the computer actually understands, called machine languages. Each different type of CPU has its own unique machine language.

Lying between machine languages and high-level languages are languages called assembly languages. Assembly languages are similar to machine languages, but they are much easier to program in because they allow a programmer to substitute names for numbers. Machine languages consist of numbers only.

Lying above high-level languages are languages called fourth-generation languages (usually abbreviated 4GL). 4GLs are far removed from machine languages and represent the class of computer languages closest to human languages.

Regardless of what language you use, you eventually need to convert your program into machine language so that the computer can understand it. There are two ways to do this:

  • Compile the program
  • Interpret the program

See compile and interpreter for more information about these two methods.

The question of which language is best is one that consumes a lot of time and energy among computer professionals. Every language has its strengths and weaknesses. For example, FORTRAN is a particularly good language for processing numerical data, but it does not lend itself very well to organizing large programs. Pascal is very good for writing well-structured and readable programs, but it is not as flexible as the C programming language. C++ embodies powerful object-oriented features, but it is complex and difficult to learn.

The choice of which language to use depends on the type of computer the program is to run on, what sort of program it is, and the expertise of the programmer.

Read More......

Filter Linux Spam

A spam filter will try to detect incoming mail for spam messages. When spam is detected thespam filter can be configured to deal with the message in a number of way commonly of which would be to delete the message outright, redirect the message elsewhere or append a tag to the subject of the message for easy identification by the user.

This is example site that you can try :

http://www.spamexperts.com/

Frequently Asked Questions

What is spam?

Spam is unsolicited mail being sent to you which is usually commercial in nature.

Does the spam filter detect every piece of spam?

No, the system is not 100% perfect and some messages may still come through.

My question wasn't answered here?

Feel free to contact us for further information.

Read More......

How to Become a Programmer

Unlike what you might find in some books and articles, programming can not be actually learned in 7, 21 or even 365 days. It is an accumulative process that builds up your skills day after day and year after year. However, programming can also be fun and rewarding (both mentally, spiritually and financially). This guide does not promise to give a magical easy way to becoming a programmer, and the ordering of the steps is not sacred, but you'll get a general outline of how to become a programmer in one of the modern programming fields.

Step:


  1. Prepare yourself for becoming a programmer:

    1. Take at least one introductory course in Mathematics (i.e. introductory calculus as it significantly improves your experience as a programmer).

    2. Take an introductory course in logic, discrete Mathematics or both.

    3. Learn at least one of the following program conception techniques. As you advance in programming you'll need to learn almost all of them. The methods are listed in the most often used order.

      • Flow Charting (globally considered the easiest to learn)

      • Pseudo-Code

      • Unified Modeling Language (UML)

      • Object Relational Mapping (ORM)

    4. Learn simple database concepts such as tables, views/queries and procedures. You can use any simple database package to do this, such as MS access, DB V, Fox Pro, Paradox.

    5. Learn about programming paradigms (an introduction is enough for now), the most important being procedural, object oriented, functional, logic and declarative programming.

  2. Decide what type of programmer you are/want to be. Programmers generally fall under one of the following categories:

    • Web Programmer

    • Desktop Application Programmer

      • Operating System (OS) Oriented (tied to a single operating system or set of operating systems)

      • Platform Independent

    • Distributed Applications Programmer

    • Library/Platform/Framework/Core Programmer

    • System Programmer

      • Kernel Programmer

      • Driver Programmer

      • Compiler Programmer

    • Programming Scientist

  3. Learn the technologies and programming languages related to your programming field of choice. The following sections break down the tasks for different types of programming.

Read More......

Tutorial Get the serial number you need

Get the serial number you need ! (For Certain Things)

* Go to Google.

* In the search field type: "Product name" 94FBR

* Where, "Product Name" is the name of the item you want to find the serial number for.

* And voila - there you go - the serial number you needed.

HOW DOES THIS WORK?

Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things. 1) The pages that are returned are pages dealing specifically with the product you're wanting a serial for. 2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.

See these example searches:

"Photoshop 7" 94FBR
"Age of Mythology" 94FBR
"Nero Burning Rom 5.5" 94FBR

Read More......

How to bypass web filters

There are several occasions where you will be at a public te How to bypass web filters
rminal, and require access to a particular website that is blocked for some reason or another. How to bypass these restrictions is a very common question, and will be covered here.

Lets pretend for a moment that the Internet is made up of 26 websites, A-Z. The web filter blocks your browser from accessing sites X-Z, but not sites A-W. Simply make the browser think you’re going to A-
W. There are a variety of ways to do this:


Proxy Servers: 
This is a list of http proxies. These sites may not be up forever, so you may need to search for “free http proxy” or “public proxy servers” or other similar terms.

Proxy server lists:
• http://www.aliveproxy.com
• http://www.multiproxy.org
• http://www.publicproxyservers.com/index.html
• http://www.tehbox.com/proxy
• http://www.proxz.com
• http://www.proxy4free.com/index.html
• http://free-proxies.com

Now that you have a list of proxies, you would open IE (internet explorer) and click on Tools > Internet Options > Connections > LAN Settings > Advanced. Enter the address and port of one of the servers from the list in the proper area (http) and make sure the “use a proxy server for your LAN” option is selected. Remember to replace the proxy and port at your terminal to the original when you're done.

*Note: Some proxies listed may not work, and this method may decrease your surfing speed. By trying various entries, you’ll find one that works, or works faster.

The infamous translation trick:
Go to a web page translation site and use their services to “translate a page to English” thus accessing the blocked page through their trusted site.

You’ll notice that several translation sites are blocked, but by using less popular ones, this method can still be effective. Here is a list of some translation services. Again, these sites may not be up forever, so you may need to search for them.

• http://babelfish.altavista.com
• http://world.altavista.com
• http://translation.langenberg.com
• http://freetranslation.com/web.thm

Url Scripting:



Url scripting is the easiest method. It works on a select few web filters and is based on the same principal as the translation trick. By typing and address like “www.yahoo.com@www.restricted_site.com the filter will not go into effect as it recognizes the trusted site (in this case yahoo.com)

Other tricks:
Simply open the command prompt and type:
Ping restricted.com ? restricted.com obviously being the restricted site
At this point you can take down the IP address (ex. 216.109.124.73) and enter it into the browser. If access to the command prompt is also restricted, see “How to bypass restrictions to get to the command prompt.” If this article has been taken from information leak, then know that it involves anything from opening the browser, selecting view > source, then saving it as X.bat and opening it to opening a folder or browser and typing in the location of cmd.exe depending on the OS. I will not go into further, as this a completely different topic.

Use https://restrictedsite.com as referring to it as a secured site may confuse the filter.

Note: These are ancient methods that many new filters defend against, but still may be applicable in your situation. If not, a little history never hurt anyone.

Web based Proxies:
Another one of the easier, yet effective methods include web based proxies. These are simple in the fact that you just enter the restricted address and surf! Some of these have some restrictions, like daily usage limits, etc but you can also use another proxy (perhaps one that sucks, like a text only) to bypass their restrictions as well. Here is a list of some:

• http://proxify.com]http://proxify.com
• http://www.anonymizer.com/index.cgi]http://www.anonymizer.com/index.cgi
• http://www.guardster.com/]http://www.guardster.com/
• http://anonymouse.ws/anonwww.html]http://anonymouse.ws/anonwww.html
• http://www.the-cloak.com/login.html]http://www.the-cloak.com/login.html
• https://www.megaproxy.com/freesurf]https://www.megaproxy.com/freesurf
• http://www.anonymizer.ru]http://www.anonymizer.ru
• https://nadaily.com/cgi-bin/nph-proxyb.cgi]https://nadaily.com/cgi-bin/nph-proxyb.cgi
• http://www.userbeam.de/cgi-bin/nph-userbeam.cgi]http://www.userbeam.de/cgi-bin/nph-userbeam.cgi
• http://www.free2.surffreedom.com/nph-free.cgi]http://www.free2.surffreedom.com/nph-free.cgi

Proxy Programs:
There are many proxy programs that allow you to surf anonymously that are more or less based on the same topics we’ve covered here. I’ve added them just to cover the topic thoroughly:

• http://www.hotscripts.com/Detailed/28480.html]http://www.hotscripts.com/Detailed/28480.html
• http://www.inetprivacy.com/a4proxy/anonymous-grc.htm]http://www.inetprivacy.com/a4proxy/anonymous-grc.htm
• http://www.orangatango.com/home/index.ie.html]http://www.orangatango.com/home/index.ie.html
• http://www.steganos.com]http://www.steganos.com
• http://www.anonymization.net]http://www.anonymization.net ? toolbar that requires admin rights to install

Making your own CGI proxy server:

Making your own proxy server may come in handy, but I personally find that simply uploading a txt file/w a list of proxies to a free host makes for a much easier and headache free solution. If you don’t know PERL, there is code out there to help you set it up. Check out these sites for more info:

• http://httpbridge.sourceforge.net]http://httpbridge.sourceforge.net
• http://www.jmarshall.com/tools/cgiproxy]http://www.jmarshall.com/tools/cgiproxy
• http://www.manageability.org/blog/stuff/open-source-personal-proxy-servers-written-in-java/view]http://www.manageability.org/blog/stuff/op...en-in-java/view



Admin Access:
When all else fails, you can simply take over the PC and alter or delete the damn filter. This method varies according to the OS (operating system) you are dealing with. Please see “Hacking Windows NT” for more information. If this tutorial has been taken from information leak, then I will go as far as to say it involves booting the PC in another OS, copying the SAM file and cracking it using a program like saminside or LC5 rather than start a whole new topic within one.

Read More......

How to bypass web filters

There are several occasions where you will be at a public te How to bypass web filters
rminal, and require access to a particular website that is blocked for some reason or another. How to bypass these restrictions is a very common question, and will be covered here.

Lets pretend for a moment that the Internet is made up of 26 websites, A-Z. The web filter blocks your browser from accessing sites X-Z, but not sites A-W. Simply make the browser think you’re going to A-
W. There are a variety of ways to do this:


Proxy Servers: 
This is a list of http proxies. These sites may not be up forever, so you may need to search for “free http proxy” or “public proxy servers” or other similar terms.

Proxy server lists:
• http://www.aliveproxy.com
• http://www.multiproxy.org
• http://www.publicproxyservers.com/index.html
• http://www.tehbox.com/proxy
• http://www.proxz.com
• http://www.proxy4free.com/index.html
• http://free-proxies.com

Now that you have a list of proxies, you would open IE (internet explorer) and click on Tools > Internet Options > Connections > LAN Settings > Advanced. Enter the address and port of one of the servers from the list in the proper area (http) and make sure the “use a proxy server for your LAN” option is selected. Remember to replace the proxy and port at your terminal to the original when you're done.

*Note: Some proxies listed may not work, and this method may decrease your surfing speed. By trying various entries, you’ll find one that works, or works faster.

The infamous translation trick:
Go to a web page translation site and use their services to “translate a page to English” thus accessing the blocked page through their trusted site.

You’ll notice that several translation sites are blocked, but by using less popular ones, this method can still be effective. Here is a list of some translation services. Again, these sites may not be up forever, so you may need to search for them.

• http://babelfish.altavista.com
• http://world.altavista.com
• http://translation.langenberg.com
• http://freetranslation.com/web.thm

Url Scripting:



Url scripting is the easiest method. It works on a select few web filters and is based on the same principal as the translation trick. By typing and address like “www.yahoo.com@www.restricted_site.com the filter will not go into effect as it recognizes the trusted site (in this case yahoo.com)

Other tricks:
Simply open the command prompt and type:
Ping restricted.com ? restricted.com obviously being the restricted site
At this point you can take down the IP address (ex. 216.109.124.73) and enter it into the browser. If access to the command prompt is also restricted, see “How to bypass restrictions to get to the command prompt.” If this article has been taken from information leak, then know that it involves anything from opening the browser, selecting view > source, then saving it as X.bat and opening it to opening a folder or browser and typing in the location of cmd.exe depending on the OS. I will not go into further, as this a completely different topic.

Use https://restrictedsite.com as referring to it as a secured site may confuse the filter.

Note: These are ancient methods that many new filters defend against, but still may be applicable in your situation. If not, a little history never hurt anyone.

Web based Proxies:
Another one of the easier, yet effective methods include web based proxies. These are simple in the fact that you just enter the restricted address and surf! Some of these have some restrictions, like daily usage limits, etc but you can also use another proxy (perhaps one that sucks, like a text only) to bypass their restrictions as well. Here is a list of some:

• http://proxify.com]http://proxify.com
• http://www.anonymizer.com/index.cgi]http://www.anonymizer.com/index.cgi
• http://www.guardster.com/]http://www.guardster.com/
• http://anonymouse.ws/anonwww.html]http://anonymouse.ws/anonwww.html
• http://www.the-cloak.com/login.html]http://www.the-cloak.com/login.html
• https://www.megaproxy.com/freesurf]https://www.megaproxy.com/freesurf
• http://www.anonymizer.ru]http://www.anonymizer.ru
• https://nadaily.com/cgi-bin/nph-proxyb.cgi]https://nadaily.com/cgi-bin/nph-proxyb.cgi
• http://www.userbeam.de/cgi-bin/nph-userbeam.cgi]http://www.userbeam.de/cgi-bin/nph-userbeam.cgi
• http://www.free2.surffreedom.com/nph-free.cgi]http://www.free2.surffreedom.com/nph-free.cgi

Proxy Programs:
There are many proxy programs that allow you to surf anonymously that are more or less based on the same topics we’ve covered here. I’ve added them just to cover the topic thoroughly:

• http://www.hotscripts.com/Detailed/28480.html]http://www.hotscripts.com/Detailed/28480.html
• http://www.inetprivacy.com/a4proxy/anonymous-grc.htm]http://www.inetprivacy.com/a4proxy/anonymous-grc.htm
• http://www.orangatango.com/home/index.ie.html]http://www.orangatango.com/home/index.ie.html
• http://www.steganos.com]http://www.steganos.com
• http://www.anonymization.net]http://www.anonymization.net ? toolbar that requires admin rights to install

Making your own CGI proxy server:

Making your own proxy server may come in handy, but I personally find that simply uploading a txt file/w a list of proxies to a free host makes for a much easier and headache free solution. If you don’t know PERL, there is code out there to help you set it up. Check out these sites for more info:

• http://httpbridge.sourceforge.net]http://httpbridge.sourceforge.net
• http://www.jmarshall.com/tools/cgiproxy]http://www.jmarshall.com/tools/cgiproxy
• http://www.manageability.org/blog/stuff/open-source-personal-proxy-servers-written-in-java/view]http://www.manageability.org/blog/stuff/op...en-in-java/view



Admin Access:
When all else fails, you can simply take over the PC and alter or delete the damn filter. This method varies according to the OS (operating system) you are dealing with. Please see “Hacking Windows NT” for more information. If this tutorial has been taken from information leak, then I will go as far as to say it involves booting the PC in another OS, copying the SAM file and cracking it using a program like saminside or LC5 rather than start a whole new topic within one.

Read More......

How to bypass web filters

There are several occasions where you will be at a public te How to bypass web filters
rminal, and require access to a particular website that is blocked for some reason or another. How to bypass these restrictions is a very common question, and will be covered here.

Lets pretend for a moment that the Internet is made up of 26 websites, A-Z. The web filter blocks your browser from accessing sites X-Z, but not sites A-W. Simply make the browser think you’re going to A-
W. There are a variety of ways to do this:


Proxy Servers: 
This is a list of http proxies. These sites may not be up forever, so you may need to search for “free http proxy” or “public proxy servers” or other similar terms.

Proxy server lists:
• http://www.aliveproxy.com
• http://www.multiproxy.org
• http://www.publicproxyservers.com/index.html
• http://www.tehbox.com/proxy
• http://www.proxz.com
• http://www.proxy4free.com/index.html
• http://free-proxies.com

Now that you have a list of proxies, you would open IE (internet explorer) and click on Tools > Internet Options > Connections > LAN Settings > Advanced. Enter the address and port of one of the servers from the list in the proper area (http) and make sure the “use a proxy server for your LAN” option is selected. Remember to replace the proxy and port at your terminal to the original when you're done.

*Note: Some proxies listed may not work, and this method may decrease your surfing speed. By trying various entries, you’ll find one that works, or works faster.

The infamous translation trick:
Go to a web page translation site and use their services to “translate a page to English” thus accessing the blocked page through their trusted site.

You’ll notice that several translation sites are blocked, but by using less popular ones, this method can still be effective. Here is a list of some translation services. Again, these sites may not be up forever, so you may need to search for them.

• http://babelfish.altavista.com
• http://world.altavista.com
• http://translation.langenberg.com
• http://freetranslation.com/web.thm

Url Scripting:



Url scripting is the easiest method. It works on a select few web filters and is based on the same principal as the translation trick. By typing and address like “www.yahoo.com@www.restricted_site.com the filter will not go into effect as it recognizes the trusted site (in this case yahoo.com)

Other tricks:
Simply open the command prompt and type:
Ping restricted.com ? restricted.com obviously being the restricted site
At this point you can take down the IP address (ex. 216.109.124.73) and enter it into the browser. If access to the command prompt is also restricted, see “How to bypass restrictions to get to the command prompt.” If this article has been taken from information leak, then know that it involves anything from opening the browser, selecting view > source, then saving it as X.bat and opening it to opening a folder or browser and typing in the location of cmd.exe depending on the OS. I will not go into further, as this a completely different topic.

Use https://restrictedsite.com as referring to it as a secured site may confuse the filter.

Note: These are ancient methods that many new filters defend against, but still may be applicable in your situation. If not, a little history never hurt anyone.

Web based Proxies:
Another one of the easier, yet effective methods include web based proxies. These are simple in the fact that you just enter the restricted address and surf! Some of these have some restrictions, like daily usage limits, etc but you can also use another proxy (perhaps one that sucks, like a text only) to bypass their restrictions as well. Here is a list of some:

• http://proxify.com]http://proxify.com
• http://www.anonymizer.com/index.cgi]http://www.anonymizer.com/index.cgi
• http://www.guardster.com/]http://www.guardster.com/
• http://anonymouse.ws/anonwww.html]http://anonymouse.ws/anonwww.html
• http://www.the-cloak.com/login.html]http://www.the-cloak.com/login.html
• https://www.megaproxy.com/freesurf]https://www.megaproxy.com/freesurf
• http://www.anonymizer.ru]http://www.anonymizer.ru
• https://nadaily.com/cgi-bin/nph-proxyb.cgi]https://nadaily.com/cgi-bin/nph-proxyb.cgi
• http://www.userbeam.de/cgi-bin/nph-userbeam.cgi]http://www.userbeam.de/cgi-bin/nph-userbeam.cgi
• http://www.free2.surffreedom.com/nph-free.cgi]http://www.free2.surffreedom.com/nph-free.cgi

Proxy Programs:
There are many proxy programs that allow you to surf anonymously that are more or less based on the same topics we’ve covered here. I’ve added them just to cover the topic thoroughly:

• http://www.hotscripts.com/Detailed/28480.html]http://www.hotscripts.com/Detailed/28480.html
• http://www.inetprivacy.com/a4proxy/anonymous-grc.htm]http://www.inetprivacy.com/a4proxy/anonymous-grc.htm
• http://www.orangatango.com/home/index.ie.html]http://www.orangatango.com/home/index.ie.html
• http://www.steganos.com]http://www.steganos.com
• http://www.anonymization.net]http://www.anonymization.net ? toolbar that requires admin rights to install

Making your own CGI proxy server:

Making your own proxy server may come in handy, but I personally find that simply uploading a txt file/w a list of proxies to a free host makes for a much easier and headache free solution. If you don’t know PERL, there is code out there to help you set it up. Check out these sites for more info:

• http://httpbridge.sourceforge.net]http://httpbridge.sourceforge.net
• http://www.jmarshall.com/tools/cgiproxy]http://www.jmarshall.com/tools/cgiproxy
• http://www.manageability.org/blog/stuff/open-source-personal-proxy-servers-written-in-java/view]http://www.manageability.org/blog/stuff/op...en-in-java/view



Admin Access:
When all else fails, you can simply take over the PC and alter or delete the damn filter. This method varies according to the OS (operating system) you are dealing with. Please see “Hacking Windows NT” for more information. If this tutorial has been taken from information leak, then I will go as far as to say it involves booting the PC in another OS, copying the SAM file and cracking it using a program like saminside or LC5 rather than start a whole new topic within one.

Read More......

Affiliate Program Pay Per Click

You can get a long way with regular search engine optimization techniques. However, sometimes a pay per click text ad campaign may be necessary to bring in the needed visitors. Here is part 1 of Kalena Jordan's beginner's guide to pay per click search advertising.

By Pandia Guest Writer Kalena Jordan

happy girls using pay per click advertising

The success of pay per click advertising

(May 2005) Pay per click (PPC) advertising via search engines has become extremely popular with businesses of all sizes, due to the booming search market and the massive growth in online sales over the past few years.

According to ComScore Networks online consumer spending for the 2004/5 financial year is expected to top USD 66 billion dollars, up 25% on the previous year.

That's right, 66 BILLION dollars! A large chunk of that expenditure will come from leads generated via pay per click search engines.

If you've been thinking about trying out PPC engines but are confused about the different models available and the costs involved, this article will shed some light.

I will also explain the newly launched PPC products offered by Yahoo! Search Marketing (formerly operating under the Overture brand).

The most popular PPC packages

Below is a current list of the most popular pay for performance search engine advertising models.

By "pay per click" is meant programs where you pay for click throughs for text ads outside the regular search engine results. "Paid inclusion" programs get your web pages included in the regular search engine results.

  • Yahoo! Sponsored Search -- Pay Per Click
  • Yahoo! Content Match -- Pay Per Click
  • Yahoo! Local Sponsored Search -- Pay Per Click
  • Yahoo! Search Submit Express -- Paid Inclusion
  • Yahoo! Search Submit Pro -- Hybrid Paid Inclusion / Pay Per Click
  • Google AdWords -- Pay Per Click
  • Google AdSense -- Pay Per Click affiliate program
  • Looksmart LookListings -- Pay Per Click

You will find that some of these will provide better results than others. I'm not going to recommend one over another here because results vary widely and really depend on your site content, your market and your budget.

In the next part of this article you will find a brief description of each Yahoo! product offering and the minimum cost involved.

Go to part 2 of this article!

Copyright © 2005 by Kalena Jordan. All rights reserved under U.S. and international law.

Read More......