Latest Technology News,Laptop&PC Reviews,Mobile Gadgets,how to,help me,free browsing cheat,hack,tricks,blogging,do it for me, HOW TOS etc. Edit

Advertise with us


Lefkofsky Talks About the Need for More Empathy

Lefkofsky Talks About the Need for More Empathy People who have success in the realm of business innovation, like Eric Lefkofsky, may ...

to keep this blog running please donate to this account

we are currently need finacial help from our readerrs please

bank.__ fedelitybank

account name ___ebhoghemhenrio joshua ehij

account number___ 6019325049

thanks as you support

donate for us to keep you updated

to keep this blog running please donate to this account
we are currently need finacial help from our readerrs please

bank.__ fedelitybank
account name ___ebhoghemhenrio joshua ehij
account number___ 6019325049
thanks as you support


How to Make / Create a Website: The Beginner's A-Z Guide

The essential step by step guide on how to set up a website

How to Start / Create Your Own Website: The Beginner's A-Z Guide

by Christopher Heng,
This tutorial shows you how to make or create a website. It is intended for the beginner and layperson, taking you step by step through the whole process from the very beginning. It makes very few assumptions about what you know (other than the fact that you know how to surf the Internet, since you're already reading this article on the Internet). As some steps are more involved, this guide also links to selected relevant articles on that you will need to click through to read for more information.

The Essential Step-by-Step Guide to Making Your Own Website

  1. Get Your Domain Name

    The first thing you need to do before anything else is to get yourself a domain name. A domain name is the name you want to give to your website. For example, the domain name of the website you're reading is "". To get a domain name, you have to pay an annual fee to a registrar for the right to use that name. Getting a name does not get you a website or anything like that. It's just a name. It's sort of like registering a business name in the brick-and-mortar world; having that business name does not mean that you also have the shop premises to go with the name.
  2. Choose a Web Host and Sign Up for an Account

    A web host is basically a company that has many computers connected to the Internet. When you place your web pages on their computers, everyone in the world will be able to connect to it and view them. You will need to sign up for an account with a web host so that your website has a home. If getting a domain name is analogous to getting a business name in the brick-and-mortar world, getting a web hosting account is analogous to renting office or shop premises for your business.
    • There are many issues involved in finding a good web host. Read up on the various things you need to look for in searching for a good web host in the article How to Choose a Web Host.
    • After you have an idea of what to look for, you can search for one from the Budget Web Hosting page. You can also find out which web host I'm currently using from the Which Web Host Do You Recommend? page.
    After you sign up for a web hosting account, you will need to point your domain to that account on your web host. Information on how to do this can be found in the guide How to Point a Domain Name to Your Website (Or What to Do After Buying Your Domain Name).
  3. Designing your Web Pages

    Once you have settled your domain name and web host, the next step is to design the web site itself. In this article, I will assume that you will be doing this yourself. If you are hiring a web designer to do it for you, you can probably skip this step, since that person will handle it on your behalf.
    • Although there are many considerations in web design, as a beginner, your first step is to actually get something out onto the web. The fine-tuning can come after you've figured out how to get a basic web page onto your site. One way is to use a WYSIWYG ("What You See Is What You Get") web editor to do it. Such editors allow you to design your site visually, without having to muck around with the technical details. They work just like a normal wordprocessor.
      There are many commercial and free web editors around. For those who don't mind spending money on a good commercial web editor, one of the most highly-regarded WYSIWYG web editors is Dreamweaver. If you are planning to use this editor, has an online tutorial called Dreamweaver CS5.5 Tutorial: How to Design a Website with Dreamweaver CS5.5. The tutorial takes you through all the steps of creating a fully-functional website with multiple pages and a feedback form, and provides you with the theoretical and practical foundation that will help you create and maintain your site.
      If you prefer to use free software, you can find a complete tutorial on using KompoZer, a free WYSIWYG web editor, in the article How to Design and Publish Your Website with KompoZer. Like my Dreamweaver tutorial, this one also guides you through the process of creating a website that has a home page, an about page, a site map, a links page and a feedback form. It also shows you some of the main features of the KompoZer software so that you can go on improving and updating your website on your own.
      There are many other web design software around. If you prefer not to use either of the above, you can find some others listed on's Free HTML Editors and WYSIWYG Web Editors page. I also have tutorials for a few other WYSIWYG web editors on this site.
    • After you have followed my tutorial, and are on the way to designing your website, you might want to read the article Appearance, Usability and Search Engine Visibility in Web Design as well. The article takes a brief look at some of the real world issues that every web designer must deal with.
    • An integral part of web design is search engine readiness. Search engine promotion does not start after the web site is made. It starts at the web design stage. The article 6 Tips on How to Create a Search Engine Friendly Website is a must-read. My article on How to Improve Your Search Engine Ranking on Google is also important for the simple reason that Google is the most popular search engine around, at least at the time this article was written.
    • There are many other issues regarding the design of web pages. The above will get you started. However, if you have the time after you get something out onto the web, you may want to read my other articles on Web Design and Website Promotion and Search Engine Ranking.
  4. Testing Your Website

    Although I list this step separately, this should be done throughout your web design cycle. I list it separately to give it a little more prominence, since too few new webmasters actually perform this step adequately.
    You will need to test your web pages as you design them in the major browsers: the latest versions of Internet Explorer (version 9 at the time of this writing), Firefox, Opera, Safari and Chrome. All these browsers can be obtained free of charge, so it should be no hardship to get them. Unfortunately, directly testing your site in all these browsers is the only way you can really be sure that it works the way you want it to on your visitors' machines.
    Optional: If you have the time, you may want to read my article on how to test your website in multiple versions of Internet Explorer and check your site under earlier versions of Internet Explorer ("IE"), namely IE 8, IE 7, and IE 6. This is not strictly necessary nowadays, since the main culprit causing website problems, IE 6, is slowly disappearing from the Internet, with IE 7 following in its heels.
    If you want to improve the chances that your website will work in future versions of all web browsers, consider validating the code for your web pages. In layman's language, this means that you should check that the underlying code of your web page, called "HTML" and "CSS", have no syntax errors. You don't actually need technical knowledge of HTML and CSS to validate the page, since you can use one of the numerous free web page validators around to do the hard work. On the other hand, if the validator tells you that your page has errors, it may sometimes be hard to figure out what's wrong (and whether the error is actually a serious one) if you don't have the requisite knowledge. Having said that, some validators actually give concrete suggestions on how to fix your code, and one of them, called "HTML Tidy", is even supposed to be able to fix your code for you.
  5. Collecting Credit Card Information, Making Money

    If you are selling products or services, you will need some way to collect credit card information. You should read up on How to Accept Credit Cards on Your Website. I also have a step by step guide on How to Add an Order Form or a "Buy Now" button using PayPal to a Website for those using PayPal.
    If you need advertisers for your website, you might want to read How to Make Money From Your Website and the follow-up article How to Increase Your Website Revenue from Affiliate Programs. A list of advertisers and affiliate programs can be found on Affiliate Programs: Free Sponsors and Advertisers. Those companies are on the constant lookout for new web publishers to display their advertisements.
  6. Getting Your Site Noticed

    When your site is ready, you will need to submit it to search engines like Google and Bing. You can use the links below to do this.
    In general, if your site is already linked to by other websites, you may not even need to submit it to these search engines. They will probably find it themselves by following the links on those websites.
    Apart from submitting your site to the search engine, you may also want to consider promoting it in other ways, such as the usual way people did things before the creation of the Internet: advertisements in the newspapers, word-of-mouth, etc. There are even companies on the Internet, like PRWeb, that can help you create press releases, which may get your site noticed by news sites and blogs. As mentioned in my article on More Tips on Google Search Engine Results Placement, you can also advertise in the various search engines. Although I only mentioned Google in that article, since that was the topic of that discussion, you can also advertise in other search engines like Bing and Yahoo!. This has the potential of putting your advertisement near the top of the search engine results page, and possibly even on other websites.
    There are also less obvious ways of promoting your website, which you might want to look into.

DOWNLOAD Netbus v1.6

Netbus v1.6 - Download

Netbus is a troja developed by Carl-Fredrik Neikter, a Swedish hacker and coded in Delphi. This program works under Windows 95/98/Me/2000/XP and NT operating systems. Netbus was first appeared in 1998 with v1.60 and Netbus v1.70 versions. There are Netbus Pro v2.01 and Netbus Pro v2.10 also, they released in 1999. Netbus trojan is still apotential computer security threat.
Hacking with Netbus:

Before you start hacking , make sure the version of Netbus if you are using Netbus v1.60 and v1.70 versions, then the tracked port is 12345. Netbus Pro v2.01 and Netbus Pro v2.10, search for the port 20034.

To run Netbus, we need the 2 files, namely NetBus.exe and Patch.exe. NetBus.exe a control file that is placed on our computers, while placed Patch.exe in the computer "victim" which is a server.
There are many ways to "grow" patch.exe on victim computer. For example by sending as an attachment when you send an email. If the email recipient to execute the file Patch.exe is going to get a copy to the Windows folder. Or use a safe way to spread the patch file.
The next stage is to determine the host or IP addresses that are hack. To find the host address and IP Address terifeksi patch.exe, click the Scan button and then click the Start button. Fill the box with the IP Address Scan start and the box with the IP Address to the end. Wait a moment, if the connection succeeded Connect button will change the Cancel button, and after that we can do what we like, including intercepting another person's email password.
Next, we copy one of these IP addresses, paste it into the field Host name / IP in the main window Netbus programs. Click the Connect button. If the user has not yet decided his connections to the Internet then we will see the connection status message in the window that shows Netbus programs already connected.
Now we can do some things against the victim's computer. Netbus available at least 22 buttons, click the "Active wnds" to see all running programs on the computer person. Or if we are interested to see what is being typed, then click the "Listen." You will see a window as shown in the picture above. Next, please experiment yourself with this program, easy is not it?
Protection against Netbus attacks:
1. Update on anti-virus on your computer, because the virus is categorized Netbus Trojan
2. Install a firewall called Snort for detecting intruders. This software can be obtained for free in
3. Install firewall software-based proxy such as an alarm zone that aims to filter and control all data traffic coming in and been trusted enough to protect your computer from hackers or crackers interference. Explanation of Zone Alarm and downloaded file in here.
4. Install Netbus Detective 5.2. This is a specialist software detecting Netbus all versions.
DOWNLOAD Netbus v1.6


How to Hack Facebook Account Passwords 100%?

How to Hack Facebook Account Passwords 100%?

Hi friends, Today I am going to reveal all the Best methods that can be used to hack a Facebook account password. I will show Best ways to Hack Facebook Account Password that all hackers usually use to hack any Facebook account.
1. Facebook Phishing Attack:

I am explaining this method first because its the most easiest and also the most popular method for hacking Facebook password. You can also search on Google the various famous Facebook hacking methods and you will find Phishing technique on the top always. And I am explaining the methods according to their popularity.
Now you want to know which is my favorite method for Hacking Facebook account passwords and i will undoubtedly tell its simply PHISHING.
I will recommend my users to read this post for knowing how to hack Facebook using Phishing as i have explained it in detail here:
How to hack Facebook accounts or Passwords using Phishing 
2. Hacking Facebook account password remotely using Keyloggers and RAT's:

Best method for advanced Hackers and my second favorite too. Its popularity is little but lower than Phishing only because it involves you to download hack tool and then create your keylogger and send it to victim which is a lengthy process and also unsecured too as you don't aware that the keylogger that you downloading is himself contain some spyware or simply a keylogger attached with it. Keylogging becomes more easy if you have physical access to victim computer as only thing you have to do is install a keylogger and direct it to your destination so that it will send all recorded keystrokes to pointed destination. What a keylogger does is it records the keystrokes into a log file and then you can use these logs to get required Facebook password and thus can hack Facebook password. 
3. Hacking the Primary Email address: 
If Facebook hacker or any specific Keylogger, by some means, hacks your primary Gmail or yahoo account which you are using as primary email address, then this information account can easily hack your Facebook password using "Forgot password" trick. The Hacker will simply ask Facebook to send password to the primary email address and ask Facebook administrators to send the reset email to your primary email address- which is already hacked. Thus, your Facebook account password will be reset and it will also be hacked. 
So, always remember to protect your primary email address that you have used to create Facebook account and try to keep unknown or useless mail id as your primary email address in Facebook.
4. Social Engineering or Guessing Passwords:
A social engineering attack is one in which the intended victim is somehow tricked into doing the attacker's bidding. An example would be responding to a phishing email, following the link and entering your banking credentials on a fraudulent website. The stolen credentials are then used for everything from finance fraud to outright identity theft. An old adage comes to mind here, "it pays to be suspicious". With socially engineered attacks, the opposite is also true - if you aren't suspicious, you likely will end up paying. In addition to phishing, social engineering attacks can come in many forms - email that masquerades as breaking news alerts, or greeting cards, or announcements of bogus lottery winnings. Pump and dump stock scams are also a form of social engineering, playing on the recipients' natural desire to take advantage of a good deal. It's important to remember that if something sounds too good to be true, it's probably a scam. Social engineering attacks are also often used to trick users into infecting their own systems - for example, by disguising the malware as a video codec or Flash update. An email is sent enticing the recipient to view a bogus video clip, the victim visits the link contained in the email and installs the "codec/update" which turns out to be a backdoor Trojan or keystroke logger.
Remember: with social engineering scams, the attacker is relying on you to make the wrong choice. Choose not to be a victim.
Some Common passwords that you can try on your friends are : 
1. Their mobile number or their girlfriend or boyfriend mobile number. 
 (always try his previous or old mobile number as they are not as much as fool that they appears)
2. Their Girlfriend or boyfriend names or their own names concatenating with their Girlfriend or boyfriend names.
3. Date of births
4. Their favorite movie names , cartoon character names or favorite music band names or simply the hero names like batman,dark knight, Superman,Godzilla, Spartacus and much more..
5. Most important now most website ask that password should be alphanumeric now what users do they just adds 1,2,3 in their normal passwords and some more smart guys adds !,@,# in their passwords and amazingly all in Sequence.

How to secure files from other users on external disks

How to secure files from other users on external disks

If you use an external disk drive with OS X, you may notice that when it is mounted, it becomes available for all users on the system. Therefore, if you have files you have saved to a USB drive and you attach it to your system and you switch user accounts, those files will be viewable within the second account.
In addition, if you have network file sharing enabled, the files on this drive will be accessible to any user who logs in via the network.
This behavior may seem a bit concerning, especially for those who have set up encryption on secondary drives in hopes of preventing others from viewing their files, but this is normal behavior in OS X, and essentially means two things:
Mounted external drive in OS X
An attached and mounted drive and even private contents on it will be viewable in all user accounts.
(Credit: Screenshot by Topher Kessler/CNET)
  1. Encryption by itself is only meant to secure a drive's contents from access if the drive has been locked (ie, removed from the system, or the system shut down). It is not meant to protect one users' files from another user on the same system. While unlocking the drive is limited to those who have the password, once unlocked then all users will have access just like any other USB or Firewire drive.

    On a related note, there has been past concern about encrypted drives being easily remounted if you tell it to eject but do not detach them from the system; however, this is ultimately not a security threat. Simply do not use encryption to protect data from another account on the system, as this purpose is not its intent. Instead, only use it to prevent a thief or other third-party who you have not given access to your computer, from accessing your files.
  2. External hard drives are open to all users by default. Even though all hard drives are capable of containing permissions restrictions like any other folder on the system, for external drives OS X turns this feature off. This is primarily because permissions settings are specific to one operating system installation, so those set by one system may either not be observed by another, or be interpreted to mean something entirely different and result in improper access to the files.
If set up independently, encryption will not protect your files from other local users, and permissions may be overcome by using the drive with another system. Therefore, the way to fully secure the files on your external drive is to enable both of these features.
To do this, first enable encryption on the drive by right-clicking it in the Finder and choosing the Encrypt Drive option. Supply the password to use when prompted, and then wait for the drive to remount as an encrypted volume.
Permissions settings for external hard drives in OS X
Uncheck this box to enable observation of access permissions on the external drive. Then set specific access privileges in the list of users and groups.
(Credit: Screenshot by Topher Kessler/CNET)
Next, enable permissions observation on the drive by selecting it and pressing Command-I to get information on the drive. In the information window that appears, expand the Sharing section and click the lock to authenticate. Then uncheck the option to "Ignore Ownership on this volume."
With this setting in place, the system will now observe permissions restrictions on the drive, which you can set to permit or deny access to specific users (note that this will only work to manage access for nonadministrator accounts -- admin accounts will always be able to grant themselves access to files and folders).
By default, the drive will be owned by the account that formatted it, so you should see your username listed as the first item in the Sharing & Permissions list. Next the drive should have a group association of "staff" (underneath your username) which is the default group for all local accounts on the system. This allows you to set global permissions for accounts other than yours.
Finally, there should be an "everyone" group that encompasses all other users on the system, such as a guest user account that is not a member of the "staff" group.
At this point, you have two possible approaches for the drive. The first is to set its permissions so only you have access to it, and the second is to set it up with a subdirectory or two that is only restricted to your account, so other accounts can do the same and have their sequestered and private folders.
Single user access permissions for external drive
To only allow your account access, remove all groups and users except for your account, and set "everyone" to "no access."
(Credit: Screenshot by Topher Kessler/CNET)
Single-user access
To set the drive so only you have access, in the Sharing & Permissions section of the information window, choose "no access" for the "staff" group (or simply select and remove this group altogether). Then set the "everyone" group to likewise have "no access."
When finished, click the small gear menu and select the option to apply these settings to all enclosed items (this step is not needed on an empty drive).
At this point the entire drive will be a private, detachable folder for your account. Even though it will show up as a device in other accounts on the system, if they try to access it then they will be given a "permission denied" error.
Multi-user access permissions for external drive
To allow multiple users to read the drive, set the "staff" permissions accordingly. If you set it to "Read Only" (so the top level of the drive cannot be modified) then be sure to put a folder on the drive, and set its permissions so each user can read it. Additionally, be sure to set "everyone" to have no access.
(Credit: Screenshot by Topher Kessler/CNET)
Multiuser access
To set the drive up so other users have access, leave the drive's permissions as their default so the "staff" group is intact and has full read and write permissions. Then open the drive in the Finder and create a folder on it to store your files. Now get information on this folder and set it so only your account is in the Sharing & Permissions list, with "read & write" access, and with all others set to "no access."
From here, your account will be able to view the files in this folder, but other accounts will not.
As an additional security measure, you can set up a similar folder for each account on the system, and when finished get information on the drive itself and set the "staff" group to "read only" permissions (do not use the gear menu's option to apply permissions to enclosed items). With this setup, when another user opens the drive, they will only be able to drag items to their specific folder, and neither to another user's folder nor to the top level of the drive.
Regardless of the approach you use, at this point you will have a drive that has secured resources from other users, and one that is also encrypted and thereby protected from someone attempting to override the permissions settings by attaching it to another computer.

How to make your Bluetooth speaker sound better

How to make your Bluetooth speaker sound better

(Credit: Steve Guttenberg/CNET)
One great thing about Bluetooth speakers is you can use them to learn about how room size and acoustics affect a given speaker's sound quality. Experiment with placement and you'll quickly learn that where you put a speaker in a room can make a big difference in the sound, for better or worse. That's true for all speakers, but since BT speakers tend to be small and light, they're easier to move around.
Start by putting the speaker on the floor in the middle of the room, and you'll hear that it makes more bass than it does sitting on a table. It will also probably sound dull and lacking in detail down there. Next, try putting the speaker in a corner, on the floor, and it will make even more bass. After that, try putting it on a table in the corner, and you'll get back the missing treble, but the speaker will probably sound better a couple of feet away from the corner. Move the speaker to each wall in the room, again at the same 3-foot height, and see if one wall sounds better than the others. Then move it a foot at a time along that wall, and you might see that one or two spots might be better than the others. So you see, everything changes the sound; a little experimentation might yield surprising results.
Battery-powered Bluetooth speakers are the easiest to move about, but if you move any speaker from a large room to a small tiled bathroom, and don't adjust the volume control, you'll be surprised how much louder the speaker sounds. Without adjusting the volume setting, take the speaker outside; it will seem much quieter, and you might not even hear it outdoors. Again, the environment changes the way a speaker sounds -- and the differences are far from subtle.
Of course, you can try the same experiments with wired speakers; it's just a little harder to do, but definitely worth the effort. The better the speaker, the bigger the differences you're likely to hear as you change positions, and the changes will be more pronounced with stereo speakers (BT speakers are nearly always mono or single-speaker systems).
After you try out some changes, please share your experiences in the comments section below.
Enjoyed this post?
Be sure to subscribe to get regular updates delivered to your email inbox, for free.

Popular search

Advertise with us

Popular Posts All time

Search the web

Facebook Like

Submit Guest Post

Submit Guest Post
Hello we are EJTB we accept sponsored post

Popular Posts

Sponsored advert

Sponsored advert
Send FREE Bulk SMS Text Messages to Mobile Phones

Readers Online

Advertise here

Advertise here
I can help you promote your offline/online business, start-up, seminar etc to my targeted blog readers and you will get a good value for your money.