<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Cyber World - Computer Programming || Ethical Hacking</title>
		<link>http://cyberworld.moy.su/</link>
		<description></description>
		<lastBuildDate>Sun, 16 Nov 2014 07:55:10 GMT</lastBuildDate>
		<generator>uCoz Web-Service</generator>
		<atom:link href="https://cyberworld.moy.su/news/rss" rel="self" type="application/rss+xml" />
		
		<item>
			<title>10 Top Computer Security Tips</title>
			<description>&lt;p&gt;Your computer holds some of your most important&amp;mdash;and private&amp;mdash;information, so we&amp;rsquo;ve written down the 10 top safety computer tips that help you keep your computer and your information safe. Some tips are very common but are often over looked.Here I specify the very basic of securities required for a computer without which leaves the computer vulnerable to malware attacks and also hackers.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;http://2.bp.blogspot.com/-hWVzfFOhLB4/T-FxdKD-zrI/AAAAAAAAAiw/r_85Bu6LiRI/s1600/login-manager-secuirty.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;br /&gt;
Use Anti-Virus Software&lt;/p&gt;

&lt;p&gt;Anti-virus software is your best protection against the worst kind of computer problems&amp;mdash;viruses. Although most viruses spread through email and Internet downloads, some spread directly through the network and other spread through USB disk drives.There&amp;rsquo;s too many ways for an virus to get on your computer for you to try to guard against all of them, so the first step you take to secure ...</description>
			<content:encoded>&lt;p&gt;Your computer holds some of your most important&amp;mdash;and private&amp;mdash;information, so we&amp;rsquo;ve written down the 10 top safety computer tips that help you keep your computer and your information safe. Some tips are very common but are often over looked.Here I specify the very basic of securities required for a computer without which leaves the computer vulnerable to malware attacks and also hackers.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;http://2.bp.blogspot.com/-hWVzfFOhLB4/T-FxdKD-zrI/AAAAAAAAAiw/r_85Bu6LiRI/s1600/login-manager-secuirty.png&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;br /&gt;
Use Anti-Virus Software&lt;/p&gt;

&lt;p&gt;Anti-virus software is your best protection against the worst kind of computer problems&amp;mdash;viruses. Although most viruses spread through email and Internet downloads, some spread directly through the network and other spread through USB disk drives.There&amp;rsquo;s too many ways for an virus to get on your computer for you to try to guard against all of them, so the first step you take to secure your computer should be to install good anti-virus software.&lt;/p&gt;

&lt;p&gt;But even more important than installing the anti-virus software is keeping it updated. Most anti-virus software will update itself&amp;mdash;just make sure you don&amp;rsquo;t disable updating in the configuration or go too long without connecting to the Internet.&lt;/p&gt;

&lt;p&gt;Anti-virus software can only protect your computer against known viruses. Hackers are writing new viruses everyday, so its important to also follow the rest of the tips in this article to keep yourself safe.&lt;/p&gt;

&lt;p&gt;Beware of Downloading&lt;/p&gt;

&lt;p&gt;The easiest way for hackers to install malware (bad programs) on your computer is by convincing you to install them yourself. Most malware on the Web hides as small but useful-sounding programs. For example, new screen savers, new chat applications, and minor desktop improvements.&lt;/p&gt;

&lt;p&gt;The software you thought you were installing quietly installs a few extra programs you didn&amp;rsquo;t ask for. Some of these programs display ads, some of them report details about your computer to hackers, some of them may even open ports&amp;mdash;short for portals&amp;mdash;that allow hackers to access your computer.&lt;/p&gt;

&lt;p&gt;It&amp;rsquo;s hard to tell which software is legitimate and which software is genuinely useful, but if you have any doubt about a program, it&amp;rsquo;s best left uninstalled.&lt;/p&gt;

&lt;p&gt;Don&amp;rsquo;t Trust Email&lt;/p&gt;

&lt;p&gt;Do you trust your mother? Of course you do, so why wouldn&amp;rsquo;t you download the attachment she sent you in her latest email?&lt;/p&gt;

&lt;p&gt;Viruses know that people trust their friends and family, and they often exploit this by sending rouge emails containing viruses to unsuspecting users. It&amp;rsquo;s not that your mother would ever intentionally try to infect your computer with a virus&amp;mdash;she doesn&amp;rsquo;t know the attachment she sent you contains a virus.&lt;/p&gt;

&lt;p&gt;A specific type of hacker called phisers also use fake emails from respected Internet companies to try to get your passwords. After they get your password, they&amp;rsquo;ll try to use it to empty your online bank accounts.&lt;/p&gt;

&lt;p&gt;All of this means only one thing: don&amp;rsquo;t trust email. Don&amp;rsquo;t download attachments unless they&amp;rsquo;re in in a safe file format. Don&amp;rsquo;t click on links in your email and enter your password. With the state of email today, it&amp;rsquo;s ok to be a little paranoid. There are a few things for you to do to try and stop spam emails, but again it takes common sense mostly.&lt;/p&gt;

&lt;p&gt;Investigate&lt;/p&gt;

&lt;p&gt;Is there something goofy about your computer? Is it running slow? Are you getting strange error messages? Is your ISP complaining that you&amp;rsquo;re sending too many emails?&lt;/p&gt;

&lt;p&gt;All of these problems need to be investigated. Viruses often use your computer processing power for evil, making your computer run slow. Viruses often try to hide among other programs, causing strange error messages. Viruses often send spam emails, making your ISP complain.&lt;/p&gt;

&lt;p&gt;If you see a problem, start investigating it and don&amp;rsquo;t stop until you figure out what the problem was. Otherwise you risk letting a small virus install bigger, worse viruses.&lt;/p&gt;

&lt;p&gt;Restrict Administrative Access&lt;/p&gt;

&lt;p&gt;In a household or office where many people share computers, everyone is at the mercy of everyone else. No matter how safe you try to keep your computer, anyone else with administrator access can install a virus-infected program.&lt;/p&gt;

&lt;p&gt;In these multi-user environments, it pays to restrict administrator access to only the users who know how to keep the computer safe. In fact, I suggest you create just one administrator account for each computer and then give every user their own non-administrator account.&lt;/p&gt;

&lt;p&gt;Only when you need to install a program or change a setting should you use the administrator account. For everything else, you should use your own user account. This helps avoid the situation where you accidentally leave your administrator account logged in and the next person on the computer uses it to accidentally download a virus.&lt;/p&gt;

&lt;p&gt;Backup always!&lt;/p&gt;

&lt;p&gt;A couple weeks ago shortly after a thunderstorm, I heard fire sirens down the street from my house. There had been a giant nearby bolt of lightning and the power was still out, so I went to investigate&amp;mdash;one of my neighbors&amp;rsquo; houses was on fire. It was tragic.&lt;/p&gt;

&lt;p&gt;I don&amp;rsquo;t know how much they lost, but it made me think of what I&amp;rsquo;d lose if my own house caught fire. I realized that many of the things I&amp;rsquo;d miss most were stored on my computer. So, as soon as the power returned, I double-checked that my backups were still running as expected. I checked all my external hard drives and other backup storage devices I use.&lt;/p&gt;

&lt;p&gt;Nothing can keep your data safer than backing it up. We&amp;rsquo;ve covered several great easy-to-use backup solutions in other articles, and we still recommend Mozy for affordable complete backups. They offer free 2Gb storage and promise better security.&lt;/p&gt;

&lt;p&gt;Watch Your Kids&lt;/p&gt;

&lt;p&gt;Kids these days grow up with the Internet, and that means they&amp;rsquo;re exposed to all of the Internet&amp;rsquo;s less savory aspects from an early age. It&amp;rsquo;s easy enough to install some parental control software and then assume that your kids are safe&amp;mdash;but they&amp;rsquo;re not.&lt;/p&gt;

&lt;p&gt;If there&amp;rsquo;s one thing I&amp;rsquo;ve learned about kids, it&amp;rsquo;s that they&amp;rsquo;re ingenious little buggers. Worse, your kids probably know your computer better than you do. No mere technology is going to stop them from getting into trouble.&lt;/p&gt;

&lt;p&gt;The best way to keep your kids safe is to watch them when they browse the Internet. That may sound hard, but it can be quite easy&amp;mdash;just put the family computer in the room where you or your spouse spend most of your time&amp;mdash;for example, the kitchen or the living room.&lt;/p&gt;

&lt;p&gt;You may also want to check the kid&amp;rsquo;s Web browser logs, but beware&amp;mdash;if the kids know you do this, they&amp;rsquo;ll find ways of removing entries. A better method would be to check the hostname access logs on your router, but again, a crafty kid will eventually figure out how to fool even that.&lt;/p&gt;

&lt;p&gt;Different Websites, Different Passwords&lt;/p&gt;

&lt;p&gt;You&amp;rsquo;ve probably grown used to reading in computer news how such-and-such big site has been hacked and all of its usernames and passwords were stolen. It may not seem terribly important&amp;mdash;after all, most sites don&amp;rsquo;t store any financial information.&lt;/p&gt;

&lt;p&gt;But hackers know that most people use the same username and password for different websites. John Smith very likely uses the same password for his Yahoo! email account that he does for his PayPal account. Minutes after breaking into Smith&amp;rsquo;s email account, the hackers could use PayPal to empty his bank account.&lt;/p&gt;

&lt;p&gt;Each site you use should have a different password&amp;mdash;or, at the very least, you should use a different password for each site with access to your financial information. Protecting your online accounts is extremely important so do not neglect this!&lt;/p&gt;

&lt;p&gt;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Encrypt Sensitive Files&lt;/p&gt;

&lt;p&gt;&lt;br /&gt;
Even if you work really hard at avoiding viruses and other malware, you should prepare yourself for the chance that one will make it onto your computer any way. Backups protect your files from being deleted, but what protects your sensitive files from hackers?&lt;/p&gt;

&lt;p&gt;The only thing that can protect your sensitive files is encryption. Higher-end versions of Windows include encryption, but you can also download a free encryption utility that provides just as much security (if not more&amp;mdash;Microsoft is under pressure by some governments to put a &amp;ldquo;back door&amp;rdquo; into their encryption.)&lt;br /&gt;
To secure your files against hackers and other prying eyes, I suggest the free TrueCrypt encryption software.&lt;/p&gt;

&lt;p&gt;A Firewall&lt;/p&gt;

&lt;p&gt;There&amp;rsquo;s a big difference between good and bad anti-virus software, but the same isn&amp;rsquo;t true of firewall software. Even the free firewall that comes with all recent versions of Windows will fully protect your computer against automatic network virus attacks. Just make sure you turn it on in the control panel.&lt;/p&gt;

&lt;p&gt;If your anti-virus software comes with a firewall, I suggest you use that instead&amp;mdash;not because it&amp;rsquo;s better, but because it will probably be easier for you to use. And keeping things simple is its own safety computer tips.&lt;/p&gt;

&lt;p&gt;Thanks and Cheers!&lt;/p&gt;</content:encoded>
			<link>https://cyberworld.moy.su/news/10_top_computer_security_tips/2014-11-16-26</link>
			<dc:creator>kks</dc:creator>
			<guid>https://cyberworld.moy.su/news/10_top_computer_security_tips/2014-11-16-26</guid>
			<pubDate>Sun, 16 Nov 2014 07:55:10 GMT</pubDate>
		</item>
		<item>
			<title>Turbo C++ By Cyber World</title>
			<description>&lt;p&gt;&lt;span style=&quot;font-family: &apos;Arial Black&apos;; font-size: 8pt; line-height: 18px;&quot;&gt;My first post on Turbo C++ By Cyber World And it will Help &amp;nbsp;All&lt;/span&gt;&lt;/p&gt;

&lt;div&gt;&amp;nbsp;&lt;/div&gt;

&lt;div&gt;
&lt;div&gt;&lt;b style=&quot;font-family: Arial; font-size: 12px; line-height: 18px;&quot;&gt;File Details:&lt;/b&gt;&lt;br style=&quot;font-family: Arial; font-size: 12px; line-height: 18px;&quot; /&gt;
&lt;span style=&quot;font-family: Arial; font-size: 12px; line-height: 18px;&quot;&gt;Download:&lt;a href=&quot;http://cyberworld.moy.su/TurboC.exe&quot;&gt; &lt;b&gt;Turbo C++ By Cyber World&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;br style=&quot;font-family: Arial; font-size: 12px; line-height: 18px;&quot; /&gt;
&lt;span style=&quot;font-family: Arial; font-size: 12px; line-height: 18px;&quot;&gt;File Size: 4 MB&lt;/span&gt;&lt;br style=&quot;font-family: Arial; font-size: 12px; line-height: 18px;&quot; /&gt;
&lt;span style=&quot;font-family: Arial; font-size: 12px; line-height: 18px;&quot;&gt;File Extension: .exe (Compressed Archive)&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;</description>
			<content:encoded>&lt;p&gt;&lt;span style=&quot;font-family: &apos;Arial Black&apos;; font-size: 8pt; line-height: 18px;&quot;&gt;My first post on Turbo C++ By Cyber World And it will Help &amp;nbsp;All&lt;/span&gt;&lt;/p&gt;

&lt;div&gt;&amp;nbsp;&lt;/div&gt;

&lt;div&gt;
&lt;div&gt;&lt;b style=&quot;font-family: Arial; font-size: 12px; line-height: 18px;&quot;&gt;File Details:&lt;/b&gt;&lt;br style=&quot;font-family: Arial; font-size: 12px; line-height: 18px;&quot; /&gt;
&lt;span style=&quot;font-family: Arial; font-size: 12px; line-height: 18px;&quot;&gt;Download:&lt;a href=&quot;http://cyberworld.moy.su/TurboC.exe&quot;&gt; &lt;b&gt;Turbo C++ By Cyber World&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;br style=&quot;font-family: Arial; font-size: 12px; line-height: 18px;&quot; /&gt;
&lt;span style=&quot;font-family: Arial; font-size: 12px; line-height: 18px;&quot;&gt;File Size: 4 MB&lt;/span&gt;&lt;br style=&quot;font-family: Arial; font-size: 12px; line-height: 18px;&quot; /&gt;
&lt;span style=&quot;font-family: Arial; font-size: 12px; line-height: 18px;&quot;&gt;File Extension: .exe (Compressed Archive)&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;</content:encoded>
			<link>https://cyberworld.moy.su/news/turbo_c_by_cyber_world/2013-12-31-25</link>
			<dc:creator>kks</dc:creator>
			<guid>https://cyberworld.moy.su/news/turbo_c_by_cyber_world/2013-12-31-25</guid>
			<pubDate>Tue, 31 Dec 2013 06:31:14 GMT</pubDate>
		</item>
		<item>
			<title>How to Prevent Facebook Hacking</title>
			<description>&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom:12.0pt;line-height:normal&quot;&gt;&lt;font face=&quot;&apos;Times New Roman&apos;, serif&quot; size=&quot;3&quot;&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom:12.0pt;line-height:normal&quot;&gt;&lt;span style=&quot;font-size:12.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;;mso-fareast-font-family:
&quot;Times New Roman&quot;;mso-fareast-language:EN-IN&quot;&gt;Facebook is a social website that
gives people the power to share and make the world more open and connected. For
its growing popularity, hackers have turned their attention to Facebook and its
applications. It is very important for all Facebook account holders to know
some tricks to prevent hacking. Here is a collection of tips that will save
your from Facebook Hackers:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot; align=&quot;center&quot; style=&quot;margin-bottom:0cm;margin-bottom:.0001pt;
text-align:center;line-height:normal&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-_SRGhLWJWL8/To1I_qylZkI/AAAAAAAAATE/8nd1JX8Fflw/s1600/stop-hacker-facebook-hacking.png&quot;&gt;&lt;spa...</description>
			<content:encoded>&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom:12.0pt;line-height:normal&quot;&gt;&lt;font face=&quot;&apos;Times New Roman&apos;, serif&quot; size=&quot;3&quot;&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom:12.0pt;line-height:normal&quot;&gt;&lt;span style=&quot;font-size:12.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;;mso-fareast-font-family:
&quot;Times New Roman&quot;;mso-fareast-language:EN-IN&quot;&gt;Facebook is a social website that
gives people the power to share and make the world more open and connected. For
its growing popularity, hackers have turned their attention to Facebook and its
applications. It is very important for all Facebook account holders to know
some tricks to prevent hacking. Here is a collection of tips that will save
your from Facebook Hackers:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot; align=&quot;center&quot; style=&quot;margin-bottom:0cm;margin-bottom:.0001pt;
text-align:center;line-height:normal&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-_SRGhLWJWL8/To1I_qylZkI/AAAAAAAAATE/8nd1JX8Fflw/s1600/stop-hacker-facebook-hacking.png&quot;&gt;&lt;span style=&quot;font-size:12.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;;mso-fareast-font-family:
&quot;Times New Roman&quot;;color:blue;mso-fareast-language:EN-IN;mso-no-proof:yes;
text-decoration:none;text-underline:none&quot;&gt;&lt;v:shapetype id=&quot;_x0000_t75&quot; coordsize=&quot;21600,21600&quot; o:spt=&quot;75&quot; o:preferrelative=&quot;t&quot; path=&quot;m@4@5l@4@11@9@11@9@5xe&quot; filled=&quot;f&quot; stroked=&quot;f&quot;&gt;
 &lt;v:stroke joinstyle=&quot;miter&quot;&gt;
 &lt;v:formulas&gt;
 &lt;v:f eqn=&quot;if lineDrawn pixelLineWidth 0&quot;&gt;
 &lt;v:f eqn=&quot;sum @0 1 0&quot;&gt;
 &lt;v:f eqn=&quot;sum 0 0 @1&quot;&gt;
 &lt;v:f eqn=&quot;prod @2 1 2&quot;&gt;
 &lt;v:f eqn=&quot;prod @3 21600 pixelWidth&quot;&gt;
 &lt;v:f eqn=&quot;prod @3 21600 pixelHeight&quot;&gt;
 &lt;v:f eqn=&quot;sum @0 0 1&quot;&gt;
 &lt;v:f eqn=&quot;prod @6 1 2&quot;&gt;
 &lt;v:f eqn=&quot;prod @7 21600 pixelWidth&quot;&gt;
 &lt;v:f eqn=&quot;sum @8 21600 0&quot;&gt;
 &lt;v:f eqn=&quot;prod @7 21600 pixelHeight&quot;&gt;
 &lt;v:f eqn=&quot;sum @10 21600 0&quot;&gt;
 &lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:formulas&gt;
 &lt;v:path o:extrusionok=&quot;f&quot; gradientshapeok=&quot;t&quot; o:connecttype=&quot;rect&quot;&gt;
 &lt;o:lock v:ext=&quot;edit&quot; aspectratio=&quot;t&quot;&gt;
&lt;/o:lock&gt;&lt;/v:path&gt;&lt;/v:stroke&gt;&lt;/v:shapetype&gt;&lt;v:shape id=&quot;Picture_x0020_1&quot; o:spid=&quot;_x0000_i1025&quot; type=&quot;#_x0000_t75&quot; alt=&quot;Description: http://4.bp.blogspot.com/-_SRGhLWJWL8/To1I_qylZkI/AAAAAAAAATE/8nd1JX8Fflw/s1600/stop-hacker-facebook-hacking.png&quot; href=&quot;http://4.bp.blogspot.com/-_SRGhLWJWL8/To1I_qylZkI/AAAAAAAAATE/8nd1JX8Fflw/s1600/stop-hacker-facebook-hacking.png&quot; style=&quot;width:96pt;height:96pt;visibility:visible;mso-wrap-style:square&quot; o:button=&quot;t&quot;&gt;
 &lt;v:fill o:detectmouseclick=&quot;t&quot;&gt;
 &lt;v:imagedata src=&quot;file:///C:&amp;#92;Users&amp;#92;USER&amp;#92;AppData&amp;#92;Local&amp;#92;Temp&amp;#92;msohtmlclip1&amp;#92;01&amp;#92;clip_image001.png&quot; o:title=&quot;stop-hacker-facebook-hacking&quot;&gt;
&lt;/v:imagedata&gt;&lt;/v:fill&gt;&lt;/v:shape&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-size:12.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;;
mso-fareast-font-family:&quot;Times New Roman&quot;;mso-fareast-language:EN-IN&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom:0cm;margin-bottom:.0001pt;line-height:
normal&quot;&gt;&lt;span style=&quot;font-size:12.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;;
mso-fareast-font-family:&quot;Times New Roman&quot;;mso-fareast-language:EN-IN&quot;&gt;&lt;br&gt;
&lt;a name=&quot;more&quot;&gt;&lt;/a&gt;&lt;img src=&quot;http://4.bp.blogspot.com/-_SRGhLWJWL8/To1I_qylZkI/AAAAAAAAATE/8nd1JX8Fflw/s1600/stop-hacker-facebook-hacking.png&quot; alt=&quot;&quot;&gt;&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;b&gt;&lt;span style=&quot;color:red&quot;&gt;Strong Password&lt;/span&gt;&lt;/b&gt;&lt;br&gt;
&lt;br&gt;
The first and foremost important trick to prevent hacking is to make Strong
Password. You can make strong password by using both uppercase and lowercase
letters as well as numbers and symbols. Make it sure to compose a new password
with 8 letters at least. Never include your personal information like name or
date of birth or home address etc. Change your password once a month.&lt;br&gt;
&lt;br&gt;
&lt;b&gt;&lt;span style=&quot;color:red&quot;&gt;Protect Your Computer from Virus and Spyware&lt;/span&gt;&lt;/b&gt;&lt;br&gt;
&lt;br&gt;
Do so to protect your personal information stored in your computer. Spyware and
virus can steal your confidential information like passwords, bank information
and important documents by sending them to hackers. If you use a caf&amp;eacute; computer
or of your friend then make it sure to logout properly and never choose the
option to Remember Me.Many &lt;/span&gt;&lt;a href=&quot;http://www.hackmeout.net/search/label/Keylogger&quot;&gt;&lt;span style=&quot;font-size:
12.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;;mso-fareast-font-family:&quot;Times New Roman&quot;;
color:blue;mso-fareast-language:EN-IN&quot;&gt;Keyloggers&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-size:12.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;;mso-fareast-font-family:
&quot;Times New Roman&quot;;mso-fareast-language:EN-IN&quot;&gt;, RATs (Remote Administration
Tools) have become quite&amp;nbsp;wide&amp;nbsp;spread&amp;nbsp;therefore&amp;nbsp;it is also a
must to have a good Antivirus like &quot;Avira&quot;&lt;br&gt;
&lt;br&gt;
&lt;b&gt;&lt;span style=&quot;color:red&quot;&gt;Tweak Privacy Settings&lt;/span&gt;&lt;/b&gt;&lt;br&gt;
&lt;br&gt;
Lots of working is being done to make Facebook safer but still there are many
chances of account hacking. You can prevent hacking by controlling the
information visible to the public. More information you allow the people to see
more will be the chances of hacking. Don’t post your picture in your profile as
hackers can save the image and post on somewhere else. Don’t put your pictures
on internet as it makes people curious to see them.&lt;br&gt;
&lt;br&gt;
&lt;b&gt;&lt;span style=&quot;color:red&quot;&gt;Be Careful While Playing Applications&lt;/span&gt;&lt;/b&gt;&lt;br&gt;
&lt;br&gt;
Don’t be crazy over different &lt;/span&gt;&lt;a href=&quot;http://www.hackmeout.net/search/label/Facebook&quot;&gt;&lt;span style=&quot;font-size:
12.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;;mso-fareast-font-family:&quot;Times New Roman&quot;;
color:blue;mso-fareast-language:EN-IN&quot;&gt;Facebook&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-size:12.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;;mso-fareast-font-family:
&quot;Times New Roman&quot;;mso-fareast-language:EN-IN&quot;&gt; applications. It can be really
addictive if your other friends are also playing the same applications.
Installing these applications, you allow the creators of these applications to
access your computer. You are advised to make a spare account on facebook to
enjoy its applications and protect your personal information from hacking.&lt;br&gt;
&lt;br&gt;
&lt;b&gt;&lt;span style=&quot;color:red&quot;&gt;Use Mozila Firefox/Chrome Web Browser&lt;/span&gt;&lt;/b&gt;&lt;br&gt;
&lt;br&gt;
Firefox claims to stop spywares from entering your computers so switch to this
Web Browser from old one.Chrome being a little new to the web industry has
lesser vulnerabilities ad its simplicity has always been the key to their
protection.I would definitely recommend chrome for personal usages.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot; align=&quot;center&quot; style=&quot;margin-bottom:0cm;margin-bottom:.0001pt;
text-align:center;line-height:normal&quot;&gt;&lt;a href=&quot;http://4.bp.blogspot.com/-_SRGhLWJWL8/To1I_qylZkI/AAAAAAAAATE/8nd1JX8Fflw/s1600/stop-hacker-facebook-hacking.png&quot;&gt;&lt;span style=&quot;font-size:12.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;;mso-fareast-font-family:
&quot;Times New Roman&quot;;color:blue;mso-fareast-language:EN-IN;mso-no-proof:yes;
text-decoration:none;text-underline:none&quot;&gt;&lt;v:shapetype id=&quot;_x0000_t75&quot; coordsize=&quot;21600,21600&quot; o:spt=&quot;75&quot; o:preferrelative=&quot;t&quot; path=&quot;m@4@5l@4@11@9@11@9@5xe&quot; filled=&quot;f&quot; stroked=&quot;f&quot;&gt;
 &lt;v:stroke joinstyle=&quot;miter&quot;&gt;
 &lt;v:formulas&gt;
 &lt;v:f eqn=&quot;if lineDrawn pixelLineWidth 0&quot;&gt;
 &lt;v:f eqn=&quot;sum @0 1 0&quot;&gt;
 &lt;v:f eqn=&quot;sum 0 0 @1&quot;&gt;
 &lt;v:f eqn=&quot;prod @2 1 2&quot;&gt;
 &lt;v:f eqn=&quot;prod @3 21600 pixelWidth&quot;&gt;
 &lt;v:f eqn=&quot;prod @3 21600 pixelHeight&quot;&gt;
 &lt;v:f eqn=&quot;sum @0 0 1&quot;&gt;
 &lt;v:f eqn=&quot;prod @6 1 2&quot;&gt;
 &lt;v:f eqn=&quot;prod @7 21600 pixelWidth&quot;&gt;
 &lt;v:f eqn=&quot;sum @8 21600 0&quot;&gt;
 &lt;v:f eqn=&quot;prod @7 21600 pixelHeight&quot;&gt;
 &lt;v:f eqn=&quot;sum @10 21600 0&quot;&gt;
 &lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:f&gt;&lt;/v:formulas&gt;
 &lt;v:path o:extrusionok=&quot;f&quot; gradientshapeok=&quot;t&quot; o:connecttype=&quot;rect&quot;&gt;
 &lt;o:lock v:ext=&quot;edit&quot; aspectratio=&quot;t&quot;&gt;
&lt;/o:lock&gt;&lt;/v:path&gt;&lt;/v:stroke&gt;&lt;/v:shapetype&gt;&lt;v:shape id=&quot;Picture_x0020_1&quot; o:spid=&quot;_x0000_i1025&quot; type=&quot;#_x0000_t75&quot; alt=&quot;Description: http://4.bp.blogspot.com/-_SRGhLWJWL8/To1I_qylZkI/AAAAAAAAATE/8nd1JX8Fflw/s1600/stop-hacker-facebook-hacking.png&quot; href=&quot;http://4.bp.blogspot.com/-_SRGhLWJWL8/To1I_qylZkI/AAAAAAAAATE/8nd1JX8Fflw/s1600/stop-hacker-facebook-hacking.png&quot; style=&quot;width:96pt;height:96pt;visibility:visible;mso-wrap-style:square&quot; o:button=&quot;t&quot;&gt;
 &lt;v:fill o:detectmouseclick=&quot;t&quot;&gt;
 &lt;v:imagedata src=&quot;file:///C:&amp;#92;Users&amp;#92;USER&amp;#92;AppData&amp;#92;Local&amp;#92;Temp&amp;#92;msohtmlclip1&amp;#92;01&amp;#92;clip_image001.png&quot; o:title=&quot;stop-hacker-facebook-hacking&quot;&gt;
&lt;/v:imagedata&gt;&lt;/v:fill&gt;&lt;/v:shape&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-size:12.0pt;font-family:&quot;Times New Roman&quot;,&quot;serif&quot;;
mso-fareast-font-family:&quot;Times New Roman&quot;;mso-fareast-language:EN-IN&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;</content:encoded>
			<link>https://cyberworld.moy.su/news/how_to_prevent_facebook_hacking/2011-11-01-10</link>
			<dc:creator>kks</dc:creator>
			<guid>https://cyberworld.moy.su/news/how_to_prevent_facebook_hacking/2011-11-01-10</guid>
			<pubDate>Tue, 01 Nov 2011 09:32:22 GMT</pubDate>
		</item>
		<item>
			<title>How to Hack Twitter IDs easily using Phishing page / Fake Login page</title>
			<description>&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 12pt; line-height: 13.5pt; font-size: 12px; font-family: Arial, Helvetica, Georgia, sans-serif; &quot;&gt;&lt;span&gt;&lt;span style=&quot;font-size: 9pt; font-family: Arial; &quot;&gt;My first post on Phishing was how to install a phishing page and
in order to install a phishing page you need one.So in this article I&apos;ll give
you a sample of a Twitter phishing page which i made recently.It is quite
easily to make a phishing page once you understand the whole idea behind it.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;div style=&quot;text-align: center; &quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18px; &quot;&gt;&lt;font face=&quot;Arial&quot;&gt;&lt;img src=&quot;http://i1018.photobucket.com/albums/af309/5416339/69290979.png&quot; alt=&quot;&quot;&gt;&lt;br&gt;&lt;/font&gt;&lt;/span&gt;&lt;/div&gt;

&lt;p class=&quot;MsoNormal&quot; style=&quot;font-size: 12px; line-height: 18px; font-family: Arial, Helvetica, Georgia, sans-serif; &quot;&gt;&lt;span style=&quot;font-size: 9pt; font-family: Arial; &quot;&gt;&lt;br&gt;
&lt;a name=&quot;more&quot;&gt;&lt;/a&gt;&lt;br&gt;
&lt;b&gt;File Details:&lt;/b&gt;&lt;b&gt;&lt;br&gt;
&lt;/b&gt;&lt;br&gt;
Download:&amp;nbsp;&lt;a href=&quot;http://w...</description>
			<content:encoded>&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 12pt; line-height: 13.5pt; font-size: 12px; font-family: Arial, Helvetica, Georgia, sans-serif; &quot;&gt;&lt;span&gt;&lt;span style=&quot;font-size: 9pt; font-family: Arial; &quot;&gt;My first post on Phishing was how to install a phishing page and
in order to install a phishing page you need one.So in this article I&apos;ll give
you a sample of a Twitter phishing page which i made recently.It is quite
easily to make a phishing page once you understand the whole idea behind it.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;

&lt;div style=&quot;text-align: center; &quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18px; &quot;&gt;&lt;font face=&quot;Arial&quot;&gt;&lt;img src=&quot;http://i1018.photobucket.com/albums/af309/5416339/69290979.png&quot; alt=&quot;&quot;&gt;&lt;br&gt;&lt;/font&gt;&lt;/span&gt;&lt;/div&gt;

&lt;p class=&quot;MsoNormal&quot; style=&quot;font-size: 12px; line-height: 18px; font-family: Arial, Helvetica, Georgia, sans-serif; &quot;&gt;&lt;span style=&quot;font-size: 9pt; font-family: Arial; &quot;&gt;&lt;br&gt;
&lt;a name=&quot;more&quot;&gt;&lt;/a&gt;&lt;br&gt;
&lt;b&gt;File Details:&lt;/b&gt;&lt;b&gt;&lt;br&gt;
&lt;/b&gt;&lt;br&gt;
Download:&amp;nbsp;&lt;a href=&quot;http://www.mediafire.com/?3aytaie3f93cy0k&quot; target=&quot;new&quot; style=&quot;border-style: initial; border-color: initial; &quot;&gt;&lt;b&gt;&lt;span style=&quot;border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-top-color: windowtext; border-right-color: windowtext; border-bottom-color: windowtext; border-left-color: windowtext; border-top-width: 1pt; border-right-width: 1pt; border-bottom-width: 1pt; border-left-width: 1pt; padding-top: 0in; padding-right: 0in; padding-bottom: 0in; padding-left: 0in; text-decoration: none; &quot;&gt;Twitter Phishing Page&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;br&gt;
File Size: 4 KB&lt;br&gt;
File Extension: .rar (Compressed Archive)&lt;br&gt;
&lt;b&gt;&lt;br&gt;
&lt;/b&gt;&lt;br&gt;
I have made a generalized tutorial on how to use
fake login pages and how to set them up for hacking over here&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</content:encoded>
			<link>https://cyberworld.moy.su/news/how_to_hack_twitter_ids_easily_using_phishing_page_fake_login_page/2011-09-21-7</link>
			<dc:creator>kks</dc:creator>
			<guid>https://cyberworld.moy.su/news/how_to_hack_twitter_ids_easily_using_phishing_page_fake_login_page/2011-09-21-7</guid>
			<pubDate>Wed, 21 Sep 2011 15:06:45 GMT</pubDate>
		</item>
		<item>
			<title>How to Delete any Facebook Account without accessing Victim&apos;s Profile</title>
			<description>&lt;font face=&quot;Arial, Helvetica, Georgia, sans-serif&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18px;&quot;&gt;n this article I will be telling you how to lock/delete your friend&apos; FB&amp;nbsp;Account&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;font face=&quot;Arial, Helvetica, Georgia, sans-serif&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18px; &quot;&gt;.This Trick&lt;/span&gt;&lt;/font&gt;&lt;font face=&quot;Arial, Helvetica, Georgia, sans-serif&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18px;&quot;&gt;&amp;nbsp;has been recently tested by me and is confirmed to be 100% working !&lt;/span&gt;&lt;/font&gt;&lt;br&gt;&lt;img src=&quot;https://lh4.googleusercontent.com/_Sz8sjma4JlQ/TbKyExoGcSI/AAAAAAAAALQ/LYx8J7gJfoU/s800/how-to-delete-facebook-account-0.jpg&quot; alt=&quot;&quot;&gt;&lt;br&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;font face=&quot;Arial, Helvetica, Georgia, sans-serif&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18px;&quot;&gt;&lt;br&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;font face=&quot;Arial, Helvetica, Georgia, sans-serif&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18px;&quot;&gt;&lt;a name=&quot;more&quot;&gt;&lt;/a&gt;&lt;/span&gt;&lt;/font&gt;&lt;br&gt;&lt;br&gt;&lt;span style=&quot;font-weight: bo...</description>
			<content:encoded>&lt;font face=&quot;Arial, Helvetica, Georgia, sans-serif&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18px;&quot;&gt;n this article I will be telling you how to lock/delete your friend&apos; FB&amp;nbsp;Account&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;font face=&quot;Arial, Helvetica, Georgia, sans-serif&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18px; &quot;&gt;.This Trick&lt;/span&gt;&lt;/font&gt;&lt;font face=&quot;Arial, Helvetica, Georgia, sans-serif&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18px;&quot;&gt;&amp;nbsp;has been recently tested by me and is confirmed to be 100% working !&lt;/span&gt;&lt;/font&gt;&lt;br&gt;&lt;img src=&quot;https://lh4.googleusercontent.com/_Sz8sjma4JlQ/TbKyExoGcSI/AAAAAAAAALQ/LYx8J7gJfoU/s800/how-to-delete-facebook-account-0.jpg&quot; alt=&quot;&quot;&gt;&lt;br&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;font face=&quot;Arial, Helvetica, Georgia, sans-serif&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18px;&quot;&gt;&lt;br&gt;&lt;/span&gt;&lt;/font&gt;&lt;/div&gt;&lt;font face=&quot;Arial, Helvetica, Georgia, sans-serif&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18px;&quot;&gt;&lt;a name=&quot;more&quot;&gt;&lt;/a&gt;&lt;/span&gt;&lt;/font&gt;&lt;br&gt;&lt;br&gt;&lt;span style=&quot;font-weight: bold; font-family: Arial, Helvetica, Georgia, sans-serif; font-size: 12px; line-height: 18px; &quot;&gt;What you will be needing ?&lt;/span&gt;&lt;br&gt;&lt;br&gt;&lt;font face=&quot;Arial, Helvetica, Georgia, sans-serif&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18px;&quot;&gt;1.Victim&apos;s Profile Link - ex.http://www.facebook.com/profile.php?id=112741086148511&lt;/span&gt;&lt;/font&gt;&lt;br&gt;&lt;font face=&quot;Arial, Helvetica, Georgia, sans-serif&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18px;&quot;&gt;2.Victim&apos;s Email - Which is being used to log into his&amp;nbsp;Facebook Account&lt;/span&gt;&lt;/font&gt;&lt;br&gt;&lt;font face=&quot;Arial, Helvetica, Georgia, sans-serif&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18px;&quot;&gt;3.Victim&apos;s Birthday - Can be found out easily if you know the victim personally or you can use social engineering to get the password !&lt;/span&gt;&lt;/font&gt;&lt;br&gt;&lt;font face=&quot;Arial, Helvetica, Georgia, sans-serif&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18px;&quot;&gt;4. Make an Email ID on Gmail or Yahoo with the same First name and Last name same as on victim&apos;s Facebook profile.&lt;/span&gt;&lt;/font&gt;&lt;br&gt;&lt;br&gt;&lt;font face=&quot;Arial, Helvetica, Georgia, sans-serif&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18px;&quot;&gt;So you have to make sure you do the above steps in order to proceed.&lt;/span&gt;&lt;/font&gt;&lt;br&gt;&lt;br&gt;&lt;span style=&quot;font-weight: bold; font-family: Arial, Helvetica, Georgia, sans-serif; font-size: 12px; line-height: 18px; &quot;&gt;How to do it ?&lt;/span&gt;&lt;br&gt;&lt;br&gt;&lt;font face=&quot;Arial, Helvetica, Georgia, sans-serif&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18px;&quot;&gt;1.Go to this link :&lt;/span&gt;&lt;/font&gt;&lt;br&gt;&lt;br&gt;&lt;a href=&quot;http://adf.ly/2fwk6&quot; target=&quot;new&quot; style=&quot;text-decoration: none; color: rgb(34, 119, 221); font-weight: bold; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; font-family: Arial, Helvetica, Georgia, sans-serif; font-size: 12px; line-height: 18px; &quot;&gt;http://www.facebook.com/help/contact.php?show_form=hack_nologin_access&lt;/a&gt;&lt;br&gt;&lt;br&gt;&lt;font face=&quot;Arial, Helvetica, Georgia, sans-serif&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18px;&quot;&gt;2.Enter the appropriate details in the above page.In the TextBox &quot;Email address where you can be contacted&quot; enter the fake E-mail which you created.&lt;/span&gt;&lt;/font&gt;&lt;br&gt;&lt;br&gt;&lt;font face=&quot;Arial, Helvetica, Georgia, sans-serif&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18px;&quot;&gt;3. You will get a mail on that ID in which Facebook Staff will ask your problem. Reply to them that you are &quot;Someone&quot;(Victim&apos;s name) and your unable to access your Facebook account. Also you have lost access to your Email Address associated with the account. You don&apos;t know what to do now. The hacker is coming online regularly and using your account. If the victim is a girl also write &apos; I am a girl and it poses threat to my social life &apos; and write anything you want that could make them take action to delete the account or something like that !(No need though in 100 % cases they delete the account).&lt;/span&gt;&lt;/font&gt;&lt;br&gt;&lt;br&gt;&lt;font face=&quot;Arial, Helvetica, Georgia, sans-serif&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18px;&quot;&gt;4. After 2-3 days you will get a reply. They will again ask you that you have access to your associated Email or not? Reply them that you still don&apos;t have access to it. And repeat what all you wrote in first mail.&lt;/span&gt;&lt;/font&gt;&lt;br&gt;&lt;br&gt;&lt;font face=&quot;Arial, Helvetica, Georgia, sans-serif&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18px;&quot;&gt;5.After that,the Facebook staff will automatically delete your Account in order to keep your privacy !&lt;/span&gt;&lt;/font&gt;&lt;br&gt;&lt;br&gt;&lt;font face=&quot;Arial, Helvetica, Georgia, sans-serif&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18px;&quot;&gt;Thats it ! Your done with this simple trick !&lt;/span&gt;&lt;/font&gt;&lt;br&gt;&lt;br&gt;&lt;font face=&quot;Arial, Helvetica, Georgia, sans-serif&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 18px;&quot;&gt;Hope you like this article.Feel free to comment ,share and subscribe if you liked this !&lt;/span&gt;&lt;/font&gt;</content:encoded>
			<link>https://cyberworld.moy.su/news/how_to_delete_any_facebook_account_without_accessing_victim_s_profile/2011-09-21-6</link>
			<dc:creator>kks</dc:creator>
			<guid>https://cyberworld.moy.su/news/how_to_delete_any_facebook_account_without_accessing_victim_s_profile/2011-09-21-6</guid>
			<pubDate>Wed, 21 Sep 2011 15:04:23 GMT</pubDate>
		</item>
		<item>
			<title>RestoreIt! : Restore and Recover your Deleted Data from Recycle Bin</title>
			<description>&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom:12.0pt;line-height:13.5pt&quot;&gt;&lt;font face=&quot;Arial&quot;&gt;&lt;span style=&quot;font-size: 12px;&quot;&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom:12.0pt;line-height:13.5pt&quot;&gt;&lt;font face=&quot;Arial&quot;&gt;&lt;span style=&quot;font-size: 9pt; font-family: Arial; &quot;&gt;&lt;span style=&quot;font-size: 10pt; &quot;&gt;Hello Everyone,&lt;br&gt;
&lt;br&gt;
Here is yet another interesting post.This tool was helpful for me because i
deleted an Important file by mistake from my PC and luckily i came across this
wonderful tool which set me right back on track.Yes,I&apos;m not joking ! This
really works 100%,I can guarantee you that.&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;&lt;font face=&quot;Arial&quot;&gt;

&lt;p class=&quot;MsoNormal&quot; align=&quot;center&quot; style=&quot;text-align:center;line-height:13.5pt&quot;&gt;&lt;b&gt;&lt;img src=&quot;https://lh4.googleusercontent.com/_Sz8sjma4JlQ/TbKwhU4kxCI/AAAAAAAAAG4/yhabzpdYjXg/s800/67396-delete-key.jpg&quot; alt=&quot;&quot;&gt;&lt;br&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom:12.0pt;line-height:13.5pt&quot;&gt;&lt;a name=&quot;more&quot;&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 9...</description>
			<content:encoded>&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom:12.0pt;line-height:13.5pt&quot;&gt;&lt;font face=&quot;Arial&quot;&gt;&lt;span style=&quot;font-size: 12px;&quot;&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom:12.0pt;line-height:13.5pt&quot;&gt;&lt;font face=&quot;Arial&quot;&gt;&lt;span style=&quot;font-size: 9pt; font-family: Arial; &quot;&gt;&lt;span style=&quot;font-size: 10pt; &quot;&gt;Hello Everyone,&lt;br&gt;
&lt;br&gt;
Here is yet another interesting post.This tool was helpful for me because i
deleted an Important file by mistake from my PC and luckily i came across this
wonderful tool which set me right back on track.Yes,I&apos;m not joking ! This
really works 100%,I can guarantee you that.&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;&lt;font face=&quot;Arial&quot;&gt;

&lt;p class=&quot;MsoNormal&quot; align=&quot;center&quot; style=&quot;text-align:center;line-height:13.5pt&quot;&gt;&lt;b&gt;&lt;img src=&quot;https://lh4.googleusercontent.com/_Sz8sjma4JlQ/TbKwhU4kxCI/AAAAAAAAAG4/yhabzpdYjXg/s800/67396-delete-key.jpg&quot; alt=&quot;&quot;&gt;&lt;br&gt;&lt;/b&gt;&lt;/p&gt;

&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom:12.0pt;line-height:13.5pt&quot;&gt;&lt;a name=&quot;more&quot;&gt;&lt;/a&gt;&lt;span style=&quot;font-size: 9pt; font-family: Arial; &quot;&gt;&lt;br&gt;
&lt;br&gt;
So before we see more about this program lets first download it&lt;br&gt;
&lt;br&gt;
&lt;b&gt;File Details:&lt;br&gt;
&lt;/b&gt;&lt;br&gt;
Download:&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.mediafire.com/file/8r11mhcv6y25dyb/Restore%20it%20%21.rar&quot; target=&quot;new&quot;&gt;&lt;b&gt;&lt;span style=&quot;border-top-style: none; border-right-style: none; border-bottom-style: none; border-left-style: none; border-top-color: windowtext; border-right-color: windowtext; border-bottom-color: windowtext; border-left-color: windowtext; border-top-width: 1pt; border-right-width: 1pt; border-bottom-width: 1pt; border-left-width: 1pt; padding-top: 0in; padding-right: 0in; padding-bottom: 0in; padding-left: 0in; &quot;&gt;Restore it !&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;br&gt;
File Size: 150 KB&lt;br&gt;
File Extension: .rar (Compressed Archive)&lt;br&gt;
&lt;b style=&quot;color: black; &quot;&gt;&lt;br&gt;&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;/font&gt;&lt;p&gt;&lt;/p&gt;</content:encoded>
			<link>https://cyberworld.moy.su/news/restoreit_restore_and_recover_your_deleted_data_from_recycle_bin/2011-09-21-5</link>
			<dc:creator>kks</dc:creator>
			<guid>https://cyberworld.moy.su/news/restoreit_restore_and_recover_your_deleted_data_from_recycle_bin/2011-09-21-5</guid>
			<pubDate>Wed, 21 Sep 2011 10:41:51 GMT</pubDate>
		</item>
	</channel>
</rss>