Smartphone Security

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg
Showing posts with label Hijacker. Show all posts
Showing posts with label Hijacker. Show all posts

Monday, 5 August 2013

System Changes To Foil Hackers And Browser Hijacker

Posted on 04:19 by Unknown
System Changes To Foil Hackers And Browser Hijacker
Hackers and Browser Hijacking is one area of the Net that affects everyone at some stage.
In addition to having third party utilities such as SpyBot, Anti Virus scanners and firewalls installed there are some changes that can be made to Windows 2000/XP. Below are some details to make your system safer from hackers and hijackers.

Some of these tips require editing of the Registry so it is wise to either backup the registry and/or create a Restore Point.

1. Clearing the Page File at Shutdown
Windows 2000/XP paging file (Sometimes called the Swap File) can contain sensitive information such as plaintext passwords. Someone capable of accessing your system could scan that file and find its information. You can force windows to clear out this file.
In the registry navigate to HKEY_LOCAL_MACHINE\ SYSTEM\ CurrentControlSet\ControlSession\ManagerMemory\Management 
and add or edit the DWORD ClearPageFileAtShutdown. Set it to 1.
Note that when you do this, the system will take much longer to shut down: a system with a really big Page File (! Gig or more) may take a minute or two longer.

2. Disable the POSIX and OS/2 Subsystem.
Windows 2000 and XP come with little-documented subsystems it at allow compatibility with UNIX and OS/2 systems These rues systems are enabled by default but so rarely used that they are best off bring disabled completely to prevent possible service hijackings.
To disable these subsystems, open the registry and navigate to HKEY LOCAL MACHINE\SYSTEM\CurrentControl\ SetControlSession\ManagerSubSystems\ 
Delete the subkeys Os2 and Posix. then reboot.
3. Never leave default passwords blank.
On installation, Windows 2000 sets up an Administrator account with total system access and prompts for a password. Guess what: by default, it allows that password to be blank. If a user doesn't want to type a password, he can simply click Next and the system will be an open door for anyone who wants to log on. Always opt for a password of some kind when setting up the default account on a machine.

4. Install Windows In a different directory.
Windows usually installs itself in the WINDOWS directory. Windows NT 4 0 and 2000 Will opt for WINNT. Many worms and other rogue programs assume this to be the case and attempt to exploit those folders files. To defeat this install Windows to another directory when you're setting it up - you can specify the name of the directory during setup. WINDIR is okay; so some people use WNDWS - A few (not that many) programs may not install properly if you install Windows to another folder but t hey are very few and they are far between.

5. Fake out hackers with a dummy Administrator account
Since the default account in Windows 2000 is always named Administrator, an enterprising hacker can try to break into your system by attempting to guess the password on that account. It you never bothered to put a password on that account, say your prayers.

Rather than be a sucker to a hacker, put a password on the Administrator account it you haven't done so already. Then change the name of the Administrator account. You'll still be able to use the account under its new name, since Windows identifies user accounts by a back-end ID number rather than the name. Finally, create a new account named Administrator and disable it. This should frustrate any would -be break-ins.

You can add new accounts and change the names of existing accounts in Windows 2000 through the Local Users and Groups snap in. Right-click on My Computer, select Manager, open the Local Users and Groups subtree, look in the Users folder and right-click on any name to rename it. To add a new user, right-click on the containing folder and select New User. Finally, to disable an account, double-click it, check the Account is disabled box and click OK.

Don't ever delete the original Administrator account. Some programs refuse to install without it and you might have to log in under that account at some point to setup such software. The original Administrator account is configured with a security ID that must continue to be present in the system.

6. Disable the Guest account
Windows XP comes with a Guest account that's used for limited access, but it's still possible to do some damage with it. Disable it completely if you are not using it. Under Control Panel, select User Accounts, click on Guest Account and then select Turn Off the Guest Account.

7. Set the Hosts file to read-only to prevent name hijacking.
This one's from (and to a degree, for) the experts. The HOSTS file is a text file that all flavors of Windows use to hold certain network addresses that never change. When a network name and address is placed in HOSTS, the computer uses the address listed there for that network name rather than performing a lookup (which can take time). Experts edit this file to place their most commonly-visited sites into it, speeding things up considerably.

Unfortunately hijackers and hackers also love to put their own information into it - redirecting people from their favorite sites to places they don't want to go. One of the most common entries in HOSTS is local host which is set 1770.0.1. This refers to the local machine and if this entry is damaged the computer can behave very unpredictably.

To prevent HOSTS from being hijacked, set it to read-only. Go to the folder %Systemroot%system32driversetc 
right-click on HOSTS, select Properties check the Read-Only box and click OK. If you want to add your own entries to HOSTS, you can unprotect it before doing so, but always remember to set it to read-only after you're done.

8. Disallow changes to IE settings through IE
This is another anti hijacker tip. IE can be set so that any changes to its settings must be performed through the Internet icon in the Control Panel, rather than through IE's own interface. Some particularly unscrupulous programs or sites try to tamper with setting by accessing the Tools, Options menu in IE. You can disable this and still make changes to IE's settings through the Control Panel.

Open the Registry and browse to HKEY_CURRENT_USER\Software\Policies\MicrosoftInternetExplorer\Restrictions\.
Create or edit a new DWORD value named NoBrowserUptions and set it to 1 (this is a per-user setting). Some third-party programs such as Spybot Search And Destroy allow you to toggle this setting.
You can also keep IE from having other programs rename its default startup page, another particularly annoying form of hijacking. Browse to
HKEY.CURRENT USERSoftwarePolicies MicrosoftInternet ExploreControl Panel and add or edit a DWORD, Homepage and set it to 1.
9. Turn off unneeded Services
Windows 2000 and XP both come with many background services that don't need to he running most of the time: Alerter, Messenger, Server (If you're running a standalone machine with no file or printer shares), NetMeeting Remote Desktop Sharing, Remote Desktop Help Session Manager (the last two if you're not using Remote Desktop or NetMeeting), Remote Registry, Routing and Remote Access (if you're not using Remote Access), SSDP Discovery Service, Telnet, and Universal Plug and Play Device Host.

A good resource and instruction on which of these services can be disabled go to http://www.blkviper.com/WinXP/

10. Disable simple File Shares.
In Windows XP Professional, the Simple File Sharing mode is easily exploited, since it’s a little too easy to share out a file across your LAN (or the NET at large). To turn it off, go m My Computer, click Tools, Folder Option and the View tab, and uncheck Use Simple file sharing (Recommended). Click OK. When you do this you can access the Security tab in the Properties window for all folders; set permissions for folders; and take ownership of objects (but not in XP Home).
Read More
Posted in Browser, Changes, Foil, Hackers, Hijacker, System | No comments

Saturday, 11 May 2013

System Changes To Foil Hackers And Browser Hijacker

Posted on 22:01 by Unknown
System Changes To Foil Hackers And Browser Hijacker
Hackers and Browser Hijacking is one area of the Net that affects everyone at some stage.
In addition to having third party utilities such as SpyBot, Anti Virus scanners and firewalls installed there are some changes that can be made to Windows 2000/XP. Below are some details to make your system safer from hackers and hijackers.

Some of these tips require editing of the Registry so it is wise to either backup the registry and/or create a Restore Point.

1. Clearing the Page File at Shutdown
Windows 2000/XP paging file (Sometimes called the Swap File) can contain sensitive information such as plaintext passwords. Someone capable of accessing your system could scan that file and find its information. You can force windows to clear out this file.

In the registry navigate to HKEY_LOCAL_MACHINE\ SYSTEM\ CurrentControlSet\ControlSession\ManagerMemory\Management and add or edit the DWORD ClearPageFileAtShutdown. Set it to 1.

Note that when you do this, the system will take much longer to shut down: a system with a really big Page File (! Gig or more) may take a minute or two longer.

2. Disable the POSIX and OS/2 Subsystem.
Windows 2000 and XP come with little-documented subsystems it at allow compatibility with UNIX and OS/2 systems These rues systems are enabled by default but so rarely used that they are best off bring disabled completely to prevent possible service hijackings.

To disable these subsystems, open the registry and navigate to HKEY LOCAL MACHINE\SYSTEM\CurrentControl\ SetControlSession\ManagerSubSystems\. Delete the subkeys Os2 and Posix. then reboot.

3. Never leave default passwords blank.
On installation, Windows 2000 sets up an Administrator account with total system access and prompts for a password. Guess what: by default, it allows that password to be blank. If a user doesn't want to type a password, he can simply click Next and the system will be an open door for anyone who wants to log on. Always opt for a password of some kind when setting up the default account on a machine.

4. Install Windows In a different directory.
Windows usually installs itself in the WINDOWS directory. Windows NT 4 0 and 2000 Will opt for WINNT. Many worms and other rogue programs assume this to be the case and attempt to exploit those folders files. To defeat this install Windows to another directory when you're setting it up - you can specify the name of the directory during setup. WINDIR is okay; so some people use WNDWS - A few (not that many) programs may not install properly if you install Windows to another folder but t hey are very few and they are far between.

5. Fake out hackers with a dummy Administrator account
Since the default account in Windows 2000 is always named Administrator, an enterprising hacker can try to break into your system by attempting to guess the password on that account. It you never bothered to put a password on that account, say your prayers.

Rather than be a sucker to a hacker, put a password on the Administrator account it you haven't done so already. Then change the name of the Administrator account. You'll still be able to use the account under its new name, since Windows identifies user accounts by a back-end ID number rather than the name. Finally, create a new account named Administrator and disable it. This should frustrate any would -be break-ins.

You can add new accounts and change the names of existing accounts in Windows 2000 through the Local Users and Groups snap in. Right-click on My Computer, select Manager, open the Local Users and Groups subtree, look in the Users folder and right-click on any name to rename it. To add a new user, right-click on the containing folder and select New User. Finally, to disable an account, double-click it, check the Account is disabled box and click OK.

Don't ever delete the original Administrator account. Some programs refuse to install without it and you might have to log in under that account at some point to setup such software. The original Administrator account is configured with a security ID that must continue to be present in the system.

6. Disable the Guest account
Windows XP comes with a Guest account that's used for limited access, but it's still possible to do some damage with it. Disable it completely if you are not using it. Under Control Panel, select User Accounts, click on Guest Account and then select Turn Off the Guest Account.

7. Set the Hosts file to read-only to prevent name hijacking.
This one's from (and to a degree, for) the experts. The HOSTS file is a text file that all flavors of Windows use to hold certain network addresses that never change. When a network name and address is placed in HOSTS, the computer uses the address listed there for that network name rather than performing a lookup (which can take time). Experts edit this file to place their most commonly-visited sites into it, speeding things up considerably.

Unfortunately hijackers and hackers also love to put their own information into it - redirecting people from their favorite sites to places they don't want to go. One of the most common entries in HOSTS is local host which is set 1770.0.1. This refers to the local machine and if this entry is damaged the computer can behave very unpredictably.

To prevent HOSTS from being hijacked, set it to read-only. Go to the folder %Systemroot%system32driversetc, right-click on HOSTS, select Properties check the Read-Only box and click OK. If you want to add your own entries to HOSTS, you can unprotect it before doing so, but always remember to set it to read-only after you're done.

8. Disallow changes to IE settings through IE
This is another anti hijacker tip. IE can be set so that any changes to its settings must be performed through the Internet icon in the Control Panel, rather than through IE's own interface. Some particularly unscrupulous programs or sites try to tamper with setting by accessing the Tools, Options menu in IE. You can disable this and still make changes to IE's settings through the Control Panel.

Open the Registry and browse to HKEY_CURRENT_USER \Software\Policies\MicrosoftInternetExplorer\Restrictions\. Create or edit a new DWORD value named NoBrowserUptions and set it to 1 (this is a per-user setting). Some third-party programs such as Spybot Search And Destroy allow you to toggle this setting.

You can also keep IE from having other programs rename its default startup page, another particularly annoying form of hijacking. Browse to HKEY.CURRENT USERSoftwarePolicies MicrosoftInternet ExploreControl Panel and add or edit a DWORD, Homepage and set it to 1.

9. Turn off unneeded Services
Windows 2000 and XP both come with many background services that don't need to he running most of the time: Alerter, Messenger, Server (If you're running a standalone machine with no file or printer shares), NetMeeting Remote Desktop Sharing, Remote Desktop Help Session Manager (the last two if you're not using Remote Desktop or NetMeeting), Remote Registry, Routing and Remote Access (if you're not using Remote Access), SSDP Discovery Service, Telnet, and Universal Plug and Play Device Host.

A good resource and instruction on which of these services can be disabled go to http://www.blkviper.com/WinXP/

10. Disable simple File Shares.
In Windows XP Professional, the Simple File Sharing mode is easily exploited, since it’s a little too easy to share out a file across your LAN (or the NET at large). To turn it off, go m My Computer, click Tools, Folder Option and the View tab, and uncheck Use Simple file sharing (Recommended). Click OK. When you do this you can access the Security tab in the Properties window for all folders; set permissions for folders; and take ownership of objects (but not in XP Home).
Read More
Posted in and, Browser, Changes, Foil, Hackers, Hijacker, System, To | No comments
Older Posts Home
Subscribe to: Posts (Atom)

Popular Posts

  • N.T. Rama Rao
    N.T. Rama Rao Nandamuri Taraka Rama Rao, also known as NTR, was born in 1923 in a well-to-do family in Andhra Pradesh. He showed interest in...
  • Breaking the Wishbone for Luck
    Breaking the Wishbone for Luck The tradition of pulling apart the wishbone, or clavicle, may be as much as 2,500 years old. Ancient Etruscan...
  • Celebrities before and after Photoshop
    Celebrities before and after  Photoshop Here is an interesting look at celebrities photos before and after photoshop. These can give you a f...
  • Soldering Tips
    Soldering Tips Soldering is accomplished by quickly heating the metal parts to be joined, and then applying a flux and a solder to the matin...
  • 20 Ugliest Celebrities
    20 Ugliest Celebrities By nature or personal choice, they are rich and famous and yet... ugly as hell!Ugliness is confined to external appea...
  • Interesting Facts About Typewriters
    Interesting Facts About Typewriters One of the first typewriters to allow typists to see work in progress was invented in 1855 by Giuseppe R...
  • 100 YEARSOF INDIAN CINEMA
    100 YEARS OF INDIAN CINEMA About a century ago, in 1912, Dadasaheb Phalke completed the first Indian feature film, Raja Harischandra and rel...
  • The Mysterious Nazca Lines
    The Mysterious Nazca Lines 1. The Nazca were an ancient people that lived in Peru, in South America, about 2,000 years ago. The people are w...
  • Ten Tips to Smartphone Security
    Ten Tips to Smartphone Security Smartphones continue to grow in popularity and are now as powerful and functional as many computers. It is i...
  • The Longest Mustache In The World
    The Longest Mustache In The World Ram Singh Chauhan of India is the proud owner of the world's longest moustache,officially recorded by ...

Categories

  • 10
  • 100
  • 101
  • 111
  • 12
  • 132
  • 148
  • 15
  • 16
  • 17
  • 17.RULES.TO.LIVE.BY.
  • 18
  • 19
  • 20
  • 2013
  • 21
  • 22
  • 25
  • 26
  • 3
  • 30
  • 35
  • 4
  • 47
  • 5
  • 50
  • 51
  • 56
  • 64th
  • 67
  • 67th
  • 7
  • 8
  • 9
  • a
  • ABORTION
  • about
  • achilles
  • Acidity
  • Acne
  • Actor
  • Actress
  • ADDICTION
  • Address
  • ADHD
  • Admin
  • Adopts
  • Ads
  • After
  • AGING
  • Aid
  • AK
  • ALCOHOL
  • alcoholism
  • alert
  • All
  • All About Albert Einstein
  • Allen
  • Almonds
  • Amazing
  • AMAZING FACTS ABOUT TATTOOS
  • Amazingly
  • American
  • Anatomy
  • and
  • Android
  • anger
  • Animal
  • animals
  • Annual
  • Anonymity
  • ANOTHER
  • Ant
  • ANTI
  • Antivirus
  • antivrus
  • Anxiety
  • any
  • Appetizing
  • Apple
  • Apple’s
  • applications
  • April
  • Archicebus
  • Armadillos
  • Around
  • ARP
  • arrow
  • Art
  • Articles
  • Artist
  • Arugula
  • Aspirin
  • Assign
  • Astronomical
  • Atlas
  • Attacks
  • Attitude
  • automatic
  • Awesome
  • Baatara
  • Back
  • Badger
  • Baking
  • ball
  • balls
  • BandWidth
  • Banner
  • Baroque
  • Basic
  • BASIL
  • Bat
  • Bathroom
  • Battery
  • Be
  • Bear
  • Beard
  • Beatles
  • beautifu
  • Beautiful
  • BEAUTY
  • Bee
  • Beep
  • Before
  • BELLY
  • Ben
  • Benefits
  • BERMUDA
  • BEST
  • Better
  • Big
  • biggest
  • Bill
  • BIOS
  • Birth
  • Bizarre
  • Black
  • Blog
  • Blood
  • blowing
  • Blue Hole
  • Body
  • Bodypainting
  • Bollywood
  • Bone
  • Boots
  • Bowling
  • Boys
  • BRAIN
  • BREAkfAsT
  • Breaking
  • BREATHING
  • Bridge
  • BROWN
  • Browser
  • Browsing
  • Bub
  • Buddhism
  • Build
  • Bundy
  • BURNING
  • Business
  • Bypass
  • Cabbage
  • Cactus
  • Cafe
  • Cake
  • Calculations
  • CALM
  • Camera
  • Can
  • Canada
  • Car Care Tips II
  • CARACAL
  • Carambola
  • Care
  • Careful
  • Caribbean
  • Castle
  • Cat
  • Cats
  • Cave
  • CD
  • celebrates
  • Celebrations
  • celebrities
  • Celebrity
  • Celebs
  • cell
  • CEREAL
  • Changes
  • Chapa
  • Chariot
  • check
  • CHILDREN’S DAY
  • China
  • Chinese
  • Chock
  • CHOCOLATE
  • Cholesterol
  • Christian
  • Chuck
  • Cider
  • CINEMA
  • CIRCLES
  • Circlism
  • Circus
  • City
  • ClickJacking
  • Clock
  • Clocks
  • Clown
  • Coca
  • cockroaches
  • Coconut
  • Code
  • Codes
  • Coffee
  • Cola
  • Colosseum
  • Command
  • Commandments
  • Committed
  • Common
  • Communication
  • Companies
  • Competition
  • completely
  • Computer
  • Computer.Pranks.50.in.1.AIO
  • Congress
  • Conjunctivitis
  • CONTACT
  • Conversation
  • Convert
  • Cookie
  • Cookies
  • Cool
  • Coping
  • Cosmetic
  • Cow
  • CRAVINGS
  • Crazy
  • Cream
  • Creative
  • Creatures
  • Crimes
  • Crocodile
  • Cross-sections of bullets
  • Crow
  • Cruz
  • ctr+c
  • ctr+v
  • Customize
  • Dairy
  • dam
  • DAMAGING
  • Dandruff
  • DARK
  • Day
  • Death
  • Deformities
  • Depression
  • Desk
  • desktop
  • Destructive
  • Devices
  • Devils
  • Diamond
  • Die
  • Diet
  • Different
  • Digital
  • dimples
  • DINING
  • Disable
  • Disciplines
  • Disease
  • disk
  • Disorder
  • Disorders
  • Display
  • Diwali
  • DNA
  • DNA Facts
  • DNS
  • do
  • Doctors
  • DOES
  • dog
  • Dogs
  • DONTS
  • Doong
  • Doppelgangers
  • Drag
  • Dragon
  • Drawbridge
  • Drawings
  • Dreams
  • Drinks
  • Drive
  • Drives
  • Dunns
  • Each
  • Early
  • Earthquake
  • EARTHWORM
  • easier
  • Easter
  • EASY
  • Echidna
  • Eckman
  • Ecstasy
  • Effective
  • Eggs
  • EIFFEL
  • EJACULATION
  • Elata
  • ELEGANT
  • Elephant
  • Eliminate
  • EMAIL
  • English
  • Enlightenment
  • Entire
  • Environment
  • Error
  • Espiritu Santo
  • Ethics
  • etiquette
  • Everyday
  • Everyone
  • Evil
  • evolution
  • Exam
  • Examination
  • Examples
  • Exercise
  • Exotic
  • Explained
  • express
  • Extrafine
  • EYE
  • Eyecare
  • Eyeglasses
  • EYES
  • Facebook
  • Faces
  • facts
  • Facts.About.Riboflavin.Vitamin. B.2.
  • fake
  • Falling
  • Falls
  • Fame
  • Family
  • Famous
  • Fascinating
  • Fast
  • Fat
  • favourite
  • FESTINA
  • Festival
  • FEVER
  • Fiji
  • FILES
  • film
  • find
  • Firewalls
  • First
  • Fish
  • Fit
  • Flash
  • Flax
  • FLOW
  • Fly
  • Flying
  • Foil
  • font
  • Food
  • FOODS
  • Fools
  • for
  • FORCIBLY
  • Forever
  • FOUL
  • Foxy
  • France
  • Free
  • Fried
  • Friends
  • Friendship
  • Frogs
  • from
  • Fruit
  • Ful
  • Fun
  • Fungus
  • funny
  • Fushun
  • Fussen Germay
  • Gacy
  • Gadjets
  • Garage
  • Garden
  • GARLIC
  • Gates
  • Gateshead Millennium Bridge
  • Gelatin
  • Genetic
  • Genetics
  • getting
  • Giraffe
  • girl
  • Girls
  • Glass
  • Glass Gem PopCorn
  • Globes
  • Glycerine
  • GOATS
  • God
  • Gold
  • golden
  • Golf
  • Gomateshwara
  • Good
  • Google
  • Gorge
  • GOUT
  • Grand
  • Gravies
  • Great
  • Green
  • GREYING
  • Grooming
  • Grouse.
  • GRRRREAT
  • Guide
  • Guinness World Records 1
  • Gun
  • Gunnison
  • Guns
  • guys
  • Habits
  • Hachiko
  • Hack
  • Hackers
  • Hagia
  • Hair
  • HAIRFALL
  • Half
  • Hall
  • Halloween
  • Happiness
  • Happy
  • HEADED
  • Health
  • Healthier
  • healthy
  • HEAT
  • Heine
  • help
  • Herbs
  • Hidden
  • Hide
  • High
  • Highly
  • Hijacker
  • HINDUISM
  • Hints
  • History
  • Holy
  • HOME
  • Hometown
  • Honey
  • Hookah
  • Hooker
  • Horse
  • Hot
  • Household
  • How
  • Howler
  • Human
  • Humans
  • HYPERTENSION
  • I
  • I.Q
  • Ice
  • icons
  • identify
  • II
  • Illustrations
  • IMPOTENCE
  • improve
  • in
  • Increase
  • Independence
  • India
  • INDIAN
  • Indias
  • Infamous
  • Infected
  • Installing
  • Int.
  • interesting
  • Internet
  • Introduction
  • iPhone
  • IRON
  • Is
  • Island
  • Jack
  • jackfruit
  • Jamaica
  • January
  • Japan
  • Jesús
  • John
  • jokes
  • Jr
  • Juice Fasting
  • Junk
  • Just
  • Kapok
  • keep
  • keeping
  • Keira
  • Key Loggers
  • Keyboard
  • Kidney
  • Kids
  • Kilimanjaro
  • Killer
  • killing
  • kinds
  • Kissing
  • Kitchen
  • kitten
  • Klementinum
  • Knife
  • Knightley
  • Know
  • Koalas
  • KONARK
  • l of
  • Lake
  • LANGUAGE
  • Lanka
  • Lantern
  • LAPTOP
  • laptops
  • Largest
  • Latitude
  • Laundry
  • Lavaredo
  • LEANING
  • Learning
  • Leg
  • Lego
  • LENTE
  • Lessons
  • Libra
  • Library
  • life
  • Light
  • lightening
  • Lights
  • likes
  • Lil
  • Lincoln
  • Lines
  • Linux
  • lion
  • Lips
  • LITTLE
  • LIVING
  • Lofoten
  • log
  • Longest
  • Longitude
  • LOOP
  • Loss
  • Lost
  • Louise
  • Love
  • low
  • Lowering
  • Luck
  • Mac
  • machine
  • Macropinna Microstoma
  • Made
  • Mafia
  • MAGNESIUM
  • Magnets
  • Maintain
  • make
  • makeup
  • MAKING
  • Malacara
  • Malware
  • manage
  • Manatee
  • Mango
  • Manual
  • Many
  • Marilyn
  • MARKS
  • Mathematics
  • MEAN
  • MEANING
  • Meats
  • Medicinal
  • Megatrends
  • Memory
  • Men
  • Mental
  • Mercury
  • message
  • Metal
  • Micro
  • Might
  • Milk
  • mind
  • Mobile
  • MOLES
  • Monkey
  • monolithic
  • Monroe
  • Mont
  • MoRaIne LaKe -20 dollar view
  • Moral
  • Moringa
  • MORNING
  • Most
  • Moth
  • Mothers
  • Mount
  • MS
  • MSWindows
  • Mug
  • Multiple
  • Mustache
  • my
  • MYOPIA
  • Mystery
  • Mystical
  • N
  • Nail
  • names
  • Natural
  • Nazca
  • Neodymium
  • Network
  • Neuschwanstein
  • Never
  • New
  • Nights
  • Nike Spoof and Copycat Logos
  • Noodles
  • Norris
  • Norway
  • Not
  • November
  • NTFS
  • Nutrition
  • Nutritional
  • NZ
  • O
  • OATsTAnDing
  • occasions
  • Ocelot
  • Of
  • office
  • Okapi
  • Oldest
  • OMG
  • on
  • Onion
  • online
  • OOo
  • OPOSSUMS
  • Optimum
  • Orange
  • Orchid
  • Oresund
  • Organic
  • organisms
  • organization
  • Original
  • os
  • out
  • Own
  • Oxymoron
  • Pagoda
  • Painting
  • paintings
  • Palace
  • Paper
  • Parents
  • Parrot
  • Part
  • Partition
  • password
  • Passwords
  • Pattaya
  • Patty
  • PCSX2
  • peace
  • peaks
  • Peel
  • Pegasus
  • Penelope
  • People
  • PERFECT
  • Performance
  • Phoenix
  • Phone
  • Photographers
  • Photos
  • Photoshop
  • Piano
  • Pie
  • Piercing
  • Pigs
  • Pilot
  • Pirates
  • PISA
  • Pistachio
  • Pomeranian
  • Pop
  • Popular
  • Portraits
  • POSITIVE
  • Positive Thinking
  • Potala
  • Prague
  • Pranks
  • Precepts
  • PREGNANCY
  • PREMATURE
  • Presidents
  • Pressure
  • prevent
  • PRICKLY
  • primate
  • Programs
  • Promote
  • Prompt
  • protect
  • Protocol
  • Psychotria
  • Puzzle
  • Quack
  • Queens
  • QUETZAL
  • Quick
  • Quotes
  • Raccoon
  • rajnikanth
  • Rama
  • Rambo
  • Rao
  • Rat
  • Rayong
  • Read
  • Real
  • Reasons
  • Recipes
  • recording
  • recover
  • REDUCE
  • Registry
  • REMEDIES
  • Remove
  • Reporting
  • Reptile
  • Republic Day
  • Resolution
  • restart
  • restrict
  • Rewire
  • RICE
  • Ring
  • Risks
  • River
  • Roboy
  • Rock
  • Rolex
  • Rolls
  • ROM
  • Roman
  • Room
  • Roraima
  • ROSE
  • Royce
  • Rugby
  • Rules
  • RulesThumb
  • Rupee
  • Safari
  • Safety
  • Sage
  • Salt
  • Samsung
  • Sanctuary
  • saving
  • Saying
  • Scan
  • Schimmel
  • SCORPIO
  • screen
  • Scribbles
  • Sculpture
  • Sculptures
  • Sea
  • Seasonings
  • Secret
  • Secrets
  • Secure
  • Security
  • Seed
  • SEMINAL
  • Serial
  • Sewing
  • SEX
  • SEXUAL DEBILITY
  • Shocking
  • Shoes
  • Short
  • shortcut
  • shortcuts
  • SHORTSIGHTEDNESS
  • Shot
  • Shots
  • Should
  • Shutdown
  • Shwedagon
  • SICKNESS
  • Sign
  • SIMPLE
  • Simply
  • Six
  • Skills
  • skin
  • SkinType
  • Slauerhoffbrug
  • Sleep
  • slim
  • Small
  • Smallest
  • Smartphone
  • smartphone photos
  • Smoothie
  • Snow
  • Soap
  • Soccer
  • Social
  • Soldering
  • Solutions
  • Solved
  • Some
  • Son
  • Sophia
  • Sorvagsvatn
  • Soybean
  • space
  • Speed
  • SPERMATORRHEA
  • Spider
  • Spirit
  • Split
  • spot
  • SPRAINS
  • Sprouts
  • Squirrel
  • Sri
  • Star
  • Start
  • StartIsBack
  • States
  • Statue
  • stay
  • Steampunk
  • STEPS
  • stick
  • StMichel
  • Stones
  • Story
  • Stress
  • Structure
  • studying
  • Success
  • Sucking
  • Sucks
  • Sugar
  • Sun
  • Super
  • Surgery
  • Swami
  • Sweaters
  • switch
  • System
  • System Tray
  • T
  • Taina
  • TAKE
  • taking
  • Tale
  • Talents
  • Talk
  • Tallest
  • Tattoo
  • Tattooed
  • Tattoos
  • Teachers
  • Techies
  • Technics
  • Ted
  • Television
  • Ten
  • Terminator
  • TERMITE
  • Terms
  • TEST
  • Text
  • Thai
  • Thailand
  • Than
  • Thanksgiving
  • that
  • The
  • their
  • Things
  • think
  • this
  • three
  • Thumbsucking
  • Tiger
  • Tilting
  • Time
  • Tips
  • TISSUE
  • To
  • to Do
  • Toads
  • Tobacco
  • Tollywood
  • Tooth
  • Toothache
  • Top
  • Top 14 Tips To Improve Your Sleep
  • Top 4 Substitutions Tips
  • Top Digital Cameras In India
  • Topics
  • Toting
  • TOWER
  • Toy
  • TRAIN
  • Treat
  • Tree
  • Trees
  • Trevor Williams
  • Triangle
  • Trio
  • Trivia
  • Trojan
  • Truth
  • Tulsi
  • Tweaks
  • Twenty
  • Types
  • Typewriters
  • UAC
  • Ubuntu
  • Ugliest
  • UNDER
  • United
  • Unlikely
  • UNsuccessful
  • Untranslatable
  • Up
  • Upgrading
  • Uptime
  • US
  • USB
  • Useless
  • Uses
  • using
  • Value
  • Vanuatu
  • Varanasi
  • Vardzia
  • Vegetables
  • Venus
  • Version
  • very
  • Via
  • Victoria
  • video
  • Vinegar
  • viruses
  • Vivekananda
  • Vivi
  • voice
  • vs
  • Waist
  • Water
  • Waterfall
  • way
  • Wayne
  • Ways
  • WEAKNESS
  • web
  • Weight
  • Wet
  • What
  • Which
  • while
  • Why
  • Wilderness
  • Win
  • Window
  • Windows
  • Windows 8
  • WINKING
  • Wisdom
  • Wishbone
  • with
  • without
  • Women
  • Wooden
  • Words
  • World
  • World!
  • worlds
  • WOW
  • X
  • XP
  • Year
  • Years
  • You
  • Young
  • your
  • YUCK
  • Zambia
  • Zebra

Blog Archive

  • ▼  2013 (478)
    • ▼  November (35)
      • Breaking the Wishbone for Luck
      • Thanksgiving Day 28-11-2013
      • A Reptile of Many Talents
      • Some Amazing Facts
      • Fun facts about Pomeranian dogs
      • Uses of Neodymium Magnets
      • Common Computer Terms
      • Fungus facts
      • EARTHWORM FACTS
      • Amazing Facts About Cats!
      • Animal fun facts
      • Chuck Norris Jokes
      • World Television Day - November 21
      • Story of a Famous dog in Japan - Hachiko
      • Different kinds of Malware
      • SPEED UP WEB BROWSING WITH GOOGLE DNS
      • Son Doong - the world’s largest cave
      • Lofoten Island, Norway
      • Installing Ubuntu from a USB memory stick
      • CHILDREN’S DAY
      • How to protect your USB from getting infected
      • Glass Gem PopCorn
      • Slauerhoffbrug ‘Flying’ Drawbridge
      • Mount Kilimanjaro: 25 fun facts
      • Fun facts About Micro-Organisms
      • AMAZING FACTS ABOUT COFFEE
      • Ten Tips to Smartphone Security
      • Mobile Phone Tips
      • Soldering Tips
      • ‘Diwali’ -the Festival of Lights
      • 10 tips to spot a fake Rolex
      • Parrot Facts
      • Amazing Facts About Human Body
      • Amazing Bone Facts
      • Fun facts about the Presidents of the United States
    • ►  October (49)
    • ►  September (58)
    • ►  August (75)
    • ►  July (42)
    • ►  June (32)
    • ►  May (27)
    • ►  April (8)
    • ►  March (56)
    • ►  February (28)
    • ►  January (68)
  • ►  2012 (22)
    • ►  December (22)
Powered by Blogger.

About Me

Unknown
View my complete profile