Thursday 24 January 2013

Ace Translator 9.7.0.720

Ace Translator 9.7.0.720
 Ace Translator employs the power of Internet machine language translation engines, and enables you to easily translate Web contents, letters, chat, and emails between major International languages.

1.unzip,unrar,install program
2.copy cracked file to app's dir
3.enjoy



 Download

AVG Internet Security -2013 13.0 (x64-x86)

AVG Internet Security -2013 13.0 (x64-x86)

Complete protection for everything you do! With AVG Internet Security, our most advanced protection, you get a worry-free online experience every time. This award-winning product gives you unbeatable Internet security by protecting against viruses, spyware, hackers, spam and malicious websites. AVG Internet Security is a reliable and easy-to-use solution for home and small office users which is trusted by millions of users worldwide. AVG Internet Security’s multiple layers of protection mean you don’t have to worry about identity theft, spam or viruses. And it’ll even prevent you from accidentally visiting harmful sites. It’s faster, smarter security that won’t slow your computer down. With AVG Internet Security you also have access for the first time to AVG Identity Theft Recovery Unit that will help you get your life back in order if you ever become a victim of identity theft – online or offline.

Unique Internet security thanks to new technology – Only AVG gives you real-time protection against malicious websites thanks to our new LinkScanner technology.

• Safely bank and shop online without fear of identity theft thanks to AVG’s new Identity Protection technology
• Surf, and search with confidence, with LinkScanner® checking web pages at the only time that matters – right before you click that link

Additionally, Internet Security 9.0 pulls together elements of AVG’s firewall, identity protection, and anti-virus signature detection capabilities to deliver the most accurate detection of new and unknown threats. This enhanced protection level makes use of cutting-edge technologies like application white-listing and “in-the-cloud” automated testing for tell-tale signs that indicate the presence of a new threat. When you install AVG Internet Security, every one of these features is fully-functional – there’s no need to do a thing.

Banking and shopping online
• AVG Identity Protection – Keeps your private information safe from known and unknown threats
• NEW Enhanced Firewall – Prevents hackers from seeing inside your computer

Surfing and searching the web, social networking
• LinkScanner® Active Surf-Shield – Ensures every web page you visit is safe – even before you go there
• LinkScanner® Search-Shield – Applies safety ratings to your Google, Bing/MSN and Yahoo search results
• NEW Superior Phishing Protection – Checks to make sure web pages really are what they appear to be

Emailing, chatting, and downloading
NEW Enhanced Anti-Spam – Blocks spammers and scammers from clogging your system
Web Shield – Lets you download and exchange files without risking virus infections
E-mail Scanner – Keeps you safe from dangerous attachments and links in your e-mail

Whether you’re online or offline
• Anti-Virus – Makes sure you can’t get or spread a virus, worm, or Trojan horse
• Anti-Spyware – Prevents unauthorized information access by spyware and adware
• Anti-Rootkit – Ensures even the toughest and most sophisticated threats are kept out of your PC
• Game Mode – Keeps you safe without interrupting your game-play
• Update Manager – Makes sure you’re always protected against the latest threats – automatically
• System Tools – Lets you customize how AVG protection works with your system

NEW FEATURES IN VERSION 2013:
* Improved scanning using enhanced scanning algorithms for faster scanning.
* Improved compatibility with a detected 3rd party Firewall.
* Refined threshold for browser memory consumption.
* Boot accelerator optimizes time needed for boot up.
* Fresh and new user interface for easier navigation and better user experience.
* AVG 2013 is fully compatible with Windows 8.
FIXES & IMPROVEMENTS
* Anti-Rootkit: Improved reporting of corrupted sections.
* Anti-Spam: Improved configuration of all Anti-Spam components.
* DNT: Fixed crash in urlmon.dll in Windows 8.
* General: Alert Manager component has been removed.
* General: Update selection dialog has been removed.
* General: System Tools component has been removed.
* Outlook Addin: Fixed possible freeze and compatibility issue with Kerio Outlook Connector.
* Safe Surf: Fixed issue with upload speed while Safe Surf is running.
* Safe Surf: Fixed issue with occasional crash when analyzing *.swf content.
* Scheduler: Only one scheduled scan can be running at the same time.
* Setup: Driver installation logging has been extended to provide enhanced information.
* Setup: Search Shield component will not be installed by default, but only after having been selected for installation.
* Update: Fixed problem with rollback of failed update.  


32 bit Download

Download

64 bit Download
Download

KMSNano v15 Offline Office and Windows KMS Activator

KMSNano v15 Offline Office and Windows KMS Activator
 KMSNano v15 Offline Office and Windows KMS Activator | 29 Mb
 KMSNano - The Ultimate Activator by heldigard of MDL forums
Based on the work of Ratiborus's KMSmicro v3.10
heldigard gives many thanks in his text file.
Read it and you can find out who else are activation champions.

Release File: LaNanov15.zip
Size: 29.1MB
CRC32: 3F91C13D
MD5: 417C4740D5371F31DC7FC4CF0BEE1A5A
SHA-1: EB01726E9C89ED42CD0229DB37CC14C14B583209

KMSNano is an Offline KMS Activator that emulates a KMS server in the memory of
your computer and sends activation data back and forth attempting to activate
volume versions of Windows and Office. I have personally activated KMSNano without
having my lan drivers even installed on a fresh install of Windows 7.

This is v15. There are other earlier versions that may or may not work currently.
You should always check for the latest version before using.

--------------------------------------------------------------------------------
Activates:
Windows Vista Business/Enterprise N/VL
Windows 7 Pro/Enterprise N/VL
Windows 8 Pro/Enterprise N/VL
Windows Server Std/Data 2008/2008R2/2012
Office/OfficeVL 2010/2013.
--------------------------------------------------------------------------------
Retail-Only Versions of windows that will NOT activate are:
Vista Starter/Homebasic/Homepremium/Ultimate
7 Starter/Homebasic/Homepremium/Ultimate
8 core/ProWMC

N and E versions use same methods, and will NOT activate.
I am unaware of activation methods, besides purchase, for those versions.

Requirements: . NET 4.0 or Windows 8

Instructions:

1. Prescan file and then shut down Security Programs and any other running programs.
(Torrent program caused problem for me)
2. Extract the zip file. (Optional - I ran from within zip)
3. Run KMSnano.exe
4. Wait about 60-80secs while the files run in the background.
(It doesn't let you know when it's done, you can check task manager or just wait)
5. Run the Check_Activation.cmd to verify your activation status.
6. Go about your business. You can get the Win8 watermark to go away by
auto-hiding the taskbar or similar system stuff. (WindowsKey+D works also)

To fix any botched activations from other "hacktivators" or activation problems
in general, you can run admin command prompt command "SFC /SCANNOW"
I very much recommend running that command on older systems with stale system files
that may have a lot of inconsistencies.

To see if your currect activation is working, run the included script:
Check_Activation.cmd inside the zip file. That will list Windows and Office
activations. Read the included text file for more info.

Note that Pre-Release versions of Office or Windows will NEVER activate.
Get an actual release if you want to activate. (RTM or Retail)

For people trying to activate just Office, extract kmsnano.exe to a directory
using 7-zip or Winrar. heldigard mentions editing Manual_Silend.cmd
He mentions to find the line with kmseldi.exe and add /noWin and /no2010 to
just attempt to activate Office 2013. Save that file and right-click and run
as administrator. If it does not activate Office, try running admin command
prompt command "SFC /SCANNOW" then repeating the command.

Why use this program over any other activation method?
-It does not modify any of your system files.
-Because it's not a crack or a hack.
-Because it's the only way to get legit activation without using legit servers.
-Did I mention it activates ALL KMS activation software?

Change Log from v14:
Haven't seen heldigard's official changes yet, but I have noticed that the
tools are updated. TriggerKMS.exe lists version 7 now. I'm fairly sure that
this one will likely have the speed increase that v14 has, as far as KMSNano.exe
is concerned.

(Extract LaNanov15.zip to a directory. Run the "Run Trigger.cmd" to set the
trigger to check activation every time you boot and activate if less than 30
days left on the 180day KMS activation. You can edit "Run Trigger.cmd" to change
how many days activation will have before expiration before the TriggerKMS runs
kmsnano.exe *CHEER*)*

*Note that you will probably need to turn off smart screen filter for
applications and potentially allow the TriggerKMS.exe and KMSNano.exe
through any sort of firewall setups and security programs.

-heldigard mentioned that he thought there was no more work to be done on this.
Time will tell if the legendary heldigard participates further or if someone else
starts running with the baton to help fix problems with small details.
heldigard, on behalf of the rest of the people out here who appreciate your work,
thank you very much.

Download

Inmatrix Zoom Player Home MAX v8.51

Inmatrix Zoom Player Home MAX v8.51

 Inmatrix Zoom Player Home MAX v8.51 | 16 Mb

Zoom Player - a powerful media player that works in two modes - play multimedia files and DVD-player. Plays DIVX, MP3, MPA, WAV, WMA, ASF, ASX, AVI, DAT, MPG, MPEG, VOB, WM, WMV. It supports playlists, manage hotkeys and command-line, full-screen mode, zoom, widescreen movie to remove the strips from the bottom and top of the screen, several kinds of representations of the interface and its variation with the skins. The unique feature - a special feature to zoom the image, which can eliminate overscan (TV-distortion that occurs at the border of the screen), and is allowed to use it as a real-time and use the presets (up to ten videopozitsy). From additional options - modifiable using skins interface, configurable display, advanced control with a mouse, autosave the position at which the show was interrupted by a DVD, audio filters, EQ, and much more.

Features:
"Playing a DVD movie
"Choosing from a variety of DVD audio and video decoders for improved compatibility and reliability
"Play DVD from hard disk, USB drives, etc.
"Parental control with password-protected DVD playback
"Play Broken AVI Files
"Removing backup files, and play
"Support for Windows Media DRM
"Powerful playlist manager
"Support for various media formats
"Built-in 10-band equalizer with presets
"Easy access to most of the interfaces of audio and video filters
"Unicode Support
"Extensive command line support
"Support for skins Interface
"And many other possibilities ...


MAGICMASTER is on a distinguished road
Na Inmatrix Zoom Player Home MAX v8.51


Inmatrix Zoom Player Home MAX v8.51 | 16 Mb

Zoom Player - a powerful media player that works in two modes - play multimedia files and DVD-player. Plays DIVX, MP3, MPA, WAV, WMA, ASF, ASX, AVI, DAT, MPG, MPEG, VOB, WM, WMV. It supports playlists, manage hotkeys and command-line, full-screen mode, zoom, widescreen movie to remove the strips from the bottom and top of the screen, several kinds of representations of the interface and its variation with the skins. The unique feature - a special feature to zoom the image, which can eliminate overscan (TV-distortion that occurs at the border of the screen), and is allowed to use it as a real-time and use the presets (up to ten videopozitsy). From additional options - modifiable using skins interface, configurable display, advanced control with a mouse, autosave the position at which the show was interrupted by a DVD, audio filters, EQ, and much more.

Features:
"Playing a DVD movie
"Choosing from a variety of DVD audio and video decoders for improved compatibility and reliability
"Play DVD from hard disk, USB drives, etc.
"Parental control with password-protected DVD playback
"Play Broken AVI Files
"Removing backup files, and play
"Support for Windows Media DRM
"Powerful playlist manager
"Support for various media formats
"Built-in 10-band equalizer with presets
"Easy access to most of the interfaces of audio and video filters
"Unicode Support
"Extensive command line support
"Support for skins Interface
"And many other possibilities ...

Home:
Code:
www.inmatrix.com

Download:

QuickTime Pro v7.7.3.80.64 Multilingual Incl -Keygen-DI

QuickTime -Pro v7.7.3.80.64 Multilingual Incl- Keygen-DI






The QuickTime family of digital media creation, delivery and playback software lets you deliver live or pre-recorded video and audio to an audience of any size. When combined with QuickTime Player and QuickTime Pro, these applications work together to provide the industry’s first end-to-end, standards-based digital media delivery system. QuickTime 7 is Apple’s cutting-edge digital media software for both Mac and Windows-based computers delivers unparalleled quality for creating, playing and streaming audio and video content over the Internet. Besides playing MPEG-4 and MP3 content, it supports timecode tracks as well as MIDI standards such as the Roland Sound Canvas and GS format extensions. It also supports key standards for web streaming, including HTTP, RTP and RTSP. Plus, it supports every major file format for images, including JPEG, BMP, PICT, PNG and GIF. QuickTime 7 features an ultra efficient new H.264 video codec delivering stunning quality at remarkably low data rates from 3G to iChat AV to HD.

New features in QuickTime 7 Player for Windows:

H.264 video playback
Watch movies created with this state-of-the-art, standards-based codec, which delivers exceptional-quality video.

Surround sound
With QuickTime 7, your PC, and surround speakers, you can enjoy the full effect of your surround sound game or movie.

New and improved playback controls
Easily change settings including jog shuttle, playback speed, bass, treble, and balance.

Zero-configuration streaming
QuickTime automatically determines your optimal Internet connection speed and reconnects dropped connections.

Live resize
Playback continues smoothly as you change the size of the QuickTime Player window

New features in QuickTime 7 Pro for Windows:

Create H.264 video
Create incredible-looking video for any use, from 3G for mobile devices to HD.

Create surround audio
Create a rich multimedia experience by adding multichannel audio to your movie.

Floating controls
Easily access functions like pause, play, fast-forward, and rewind while watching full-screen movies.

Background exporting
Export your movie in the background and continue with your next playback or editing task.

Improved movie authoring
The all-new Movie Properties facilitates simple and efficient movie authoring.

Automate with VB Script
Automate your QuickTime workflow with native VB Script support in QuickTime 7. Developers can also use VB Script to access the new QuickTime Active X control for creating custom multimedia applications.

Download 38.70 MB (Setup + QuickTime Pro v7.7.3.80.64 Keygen-DI)

Download

Download 

 

Original Windows XP Professional SP3 (x86) -Integrated January 2013-[623 MB]

Original Windows-XP Professional SP3 (x86)-Integrated January 2013-[623 MB]
 This is the original Windows XP Professional SP3 (32-bit) ISO from Microsoft. Including Microsoft updates until 9.1.2013, Internet Explorer 8, Adobe Flash Player 11.5 and SATA drivers.


- This release is the best you could find on the net, because Maherz made it just simple:

* NO tweaks or add-ons.
* NO additional programs and software added.
* NO graphics, scripts and wallpapers added or changed.
* NO serial needed during installation, the key is already inserted.
* Activated and passes Microsoft Windows Genuine validation test.
* It's the original image from Microsoft except added updates, IE8, Adobe Flash Player (11.5.502.146) and SATA drivers!
* Windows Messenger, MSN Explorer and Internet Explorer 6 were removed.


- System requirements:

* Pentium 233-megahertz (MHz) processor or faster (300 MHz is recommended).
* At least 64 megabytes (MB) of RAM (128 MB is recommended).
* At least 1.5 gigabytes (GB) of available space on the hard disk .
* Video adapter and monitor with Super VGA (800 x 600) or higher resolution.

Downlaod


 Downlaod

new ESET- NOD32 Antivirus 6.0.306.0 - ESET PureFix -2.03

ESET- NOD32 Antivirus 6.0.306.0- ESET PureFix -2.03




uploaded download

download

 download


 



extabit

 
 

IDM. Internet Download Manager 6.14 -build 5 With- Patch Release -09-Jan-2013

IDM. Internet Download Manager 6.14 -build 5 With- Patch Release -09-Jan-2013



Internet Download Manager (IDM) is a reliabe and very useful tool with safe multipart downloading technology to accelerate from internet your downloads such a video, music, games, documents and other important stuff for you files. IDM has a smart download logic accelerator and increases download speeds by up to 5 times, resumes and schedules downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use. Unlike other download managers and accelerators, IDM segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.

Main Features:
• Internet Download Manager supports all popular browsers including Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla Firefox, Avant Browser, and it can be integrated into any Internet application to take over downloads using unique “Advanced Browser Integration” feature.
• Dynamic Segmentation and Performance.
• Easy downloading with one click. When you click on a download link in a browser, IDM will take over the download and accelerate it. IDM supports HTTP, FTP, HTTPS and MMS protocols.
• Download Speed Acceleration. IDM can accelerate downloads by up to 5 times due to its intelligent dynamic file segmentation technology.
• Download Resume. IDM will resume unfinished download from the place where they left off.
• YouTube grabber. IDM can grab FLV videos from popular sites like YouTube, MySpaceTV, and Google Video.
• Drag and Drop. You may simply drag and drop links to IDM, and drag and drop downloaded files out of Internet Download Manager.
• Automatic Antivirus checking. Antivirus checking makes your downloads free from viruses and trojans.
• Advanced Browser Integration. When enabled, the feature can be used to catch any download from any application.
• Built-in Scheduler. IDM can connect to the Internet at a set time, download the files you want, disconnect, or shut down your computer when it’s done.
• IDM includes web site spider and grabber. IDM downloads all required files that are specified with filters from web sites, for example all pictures from a web site, or subsets of web sites, or complete web sites for offline browsing. It’s possible to schedule multiple grabber projects to run them once at a specified time, stop them at a specified time, or run periodically to synchronize changes.
• IDM supports many types of proxy servers. For example, IDM works with Microsoft ISA, and FTP proxy servers.
• IDM supports main authentication protocols: Basic, Negotiate, NTLM, and Keberos. Thus IDM can access many Internet and proxy servers using login name and password.
• Download All feature. IDM can add all downloads linked to the current page. It’s easy to download multiple files with this feature.
• Download Categories. IDM can be used to organize downloads automatically using defined download categories.
• Download limits. Progressive downloading with quotas feature. The feature is useful for connections that use some kind of fair access policy (or FAP) like Direcway, Direct PC, Hughes, etc.
• IDM is multilingual.

What’s new in IDM 6.14 build 5 (Jan 09, 2013):
* Added support for Firefox 20
* Improved downloading from some types of video servers
Download

Driver Magician 3.71 with Genuine License

Driver Magician 3.71 with Genuine License
Review:
Driver Magician offers a professional solution for device drivers backup, restoration, update and removal in Windows operating system. It identifies all the hardware in the system, extracts their associated drivers from the hard disk and backs them up to a location of your choice. Then when you format and reinstall/upgrade your operating system, you can restore all the "saved" drivers just as if you had the original driver diskettes in your hands. After one system reboot, your PC will be loaded and running with the required hardware drivers.

What's more, Driver Magician has a built in database of the latest drivers with the ability to go to the Internet to receive the driver updates. It saves lots of time to find the correct drivers and mature drivers will obviously increase the performance of hardware. If there are unknown devices in your PC, Driver Magician helps you detect them easily and quickly with its built in hardware identifier database.  



Features:
  • Back up device drivers of your computer in four modes.
  • Restore device drivers from backup in one mouse click.
  • Update device drivers of your PC to improve system performance and stability.
  • Uninstall device drivers
  • Live Update device identifier database and driver update database.
  • Detect unknown devices.
  • Back up more items such as My Documents and Desktop.
  • Restore more items from backup.
  • Get detailed information of the hardware drivers.
  • Clone all drivers to an auto-setup package (.exe), so you can restore drivers without installing Driver Magician.
Changes in Driver Magician 3.71 (December 5th, 2012):
1. Add more devices in driver update database
2. Some minor tweaks

Installation:
Install the program,add provided registry file for registration

Download:
LINK 1

SoftOrbits Photo Stamp Remover new

SoftOrbits-Photo Stamp Remover
 Photo Stamp Remover is a photo correction utility that can remove scratches, dust, stains, wrinkles, tears, date stamps and other unwanted artifacts that appear on photographs. Offering a fully automatic process, the program uses an intelligent restoration technology to fill the selected area with the texture generated from the pixels around the selection, so that the defect blends into the rest of the image naturally. What takes hours to correct using the clone tool, can be accomplished in a minute using Photo Stamp Remover.

Photo Stamp Remover is a watermark remover that can remove scratches, dust, stains, wrinkles, tears, date stamps and other unwanted artifacts that appear on photographs. With Photo Stamp Remover, you can restore photos with the minimum of fuss.

Remove unwanted artifacts from new photos
Using Photo Stamp Remover, you can erase cleanly unwanted artifacts like date stamps, watermarks, logos and undesirable objects. Face and skin imperfections, such as wrinkles, acne, and tattoos can be cleaned up too. The area with the removed artifact is filled with automatically generated texture. So, the photo looks natural, as if it had always looked like this.

Rejuvenate old photos
Most families have hundreds of photos that they would like to preserve for a lifetime of enjoyment. Unfortunately, many of them sit in albums, books, or lay loose in boxes, getting scratches and accumulating dirt. Fortunately, there's Photo Stamp Remover. Just scan photos into the computer and use the watermark remover to clean up scratches, cracks, and dust spots.

Remove defects with a mouse click
With Photo Stamp Remover, you can restore photos with the minimum of fuss. Just open a photo in the program, select the area that needs to be restored and click Preview. If you like what you see, click Start. That's basically all you need to do. Using its advanced restoration algorithm, the program removes the imperfection automatically. Defects blend into the background cleanly.

Remove artifacts by color
You can select the unwanted artifact manually or select the color and watermark remover will remove the artifact that has the same color. For example, it can help you to remove from a photograph text and date stamps that have the same, solid black color.

Retouch more than one photo
With its batch mode support, watermark remover enables you to process more than one photo at a time. For example, you can remove a date stamp, which your camera left on several photos. Simply define the area where the stamp is located and begin the healing process. Photo Stamp Remover will remove the date stamp on all photos automatically while you're sipping your coffee.

No need to install large photo editors
Photo Stamp Remover is primarily aimed at everyday, casual camera owners who just want to remove some imperfections from photos without having to buy a more feature-rich photo editing suite and mess around with its user manual to get started.

Home Page -
 http://www.softorbits.com/

Downlaod link

Folder Lock 7.1.7 - Life time KEY

Folder Lock 7.1.7 - Lifetime KEY

 Folder Lock is fast file-security software that can password-protect,lock, hide, and encrypt any number of files, folders, drives, pictures,and documents in seconds. Locked files are undeletable, unrenamable,unmovable, hidden, and inaccessible. You can lock, scramble, or encryptdepending on speed and security. Folder Lock is fully portable, so youcan protect your files on USB flash drives, disks, CD-RWs, notebooks,and hard disks, and it doesn't require installation on another PC.Folder Lock protects files in Windows, DOS, and Safe modes, even whenyou change your OS or boot from a disk. Folder Lock doesn't let youdelete its own program folder, and it can't be uninstalled without thecorrect password. Additional options include Stealth Mode, HackerAttempt Monitoring, Shred files, AutoLock, Auto Shutdown PC, Lock yourPC, Erase PC tracks, 256-bit Blowfish Encryption and Context Menu inExplorer.

Encrypt Files
Encrypt your personal files using 256-bit on-the-fly encryption technology totally dynamic and fool-proof.

Protect USB / CD
Convert your encrypted storages into executables and take your portable drives anywhere.

Make Wallets
Store sensitive information in encrypted form. A safe haven for private info like Credit Cards and Bank Accounts.
Run Application in complete Stealth.
Don't let anyone know you ever installed Folder Lock on your PC.

Password Security
Restrict access to various parts of the application with use of admin level master password.

Auto Protection
Set inactivity based security policy in order to secure everything when you're away from your PC.

Hack Security
Don't let hackers use dictionary attacks. Monitor, control and perform actions on incorrect password attempts.

Shred Files
Shred and permanently delete restorable files, folders and drives and even empty hard drive space.

Lock Files
Protect important files from unwanted access by blocking visibility or access to files, folders and drives.

Backup Online
Backup all your encrypted files automatically to an online storage and easily restore it back.

Size : 9.46 MB
Operating systems: windows 7/vista/xp (64 bit/32bit)
activation : full with key work lifetime


 [INSTALL NOTES]
======
Step 1: unpack rar archive
Step 2: run the setup
Step 3: Use the given key to activate
Step 4: tell thank you in reply !


 Download link

word press templete-my recipe

word press templete-my recipe

mediafire link

download



Friday 18 January 2013

Frot page Urdu Pdf

Frot page Urdu Pdf 
 

فرنٹ پیج
فرنٹ پیج آفس کا ایک پروگرام ہے
جس کی مدد سے ہم اپنا ایک پرسنل ویب سایَٹ بنا سکتے ہیں
اس کتاب میں فرنٹ پیج پر کام کرنے کا مکمل طریقہ بتایا گیا ہے
جس کی مدد سے ہم اپنا ایک پیج بنا سکتے ہیں۔


Yeh ma nhi likhi r na he yeh ma likh skta hn.... mujhe bs search krty hoye yeh mili thi to socha k ksi DOST ka bhla ho jaye ga......islye share kr rha hn.....

Duaoon Ma Yad Rakhye Ga......
ALLAH HAFIZ

 download link

ubqari magazine january 2013

Ubqari Special Edition
ubqari magazine january 2013
ubqari magazine

Download link


For online Read

Thursday 17 January 2013

What is Tor?new intorduction-proxy ways youtube



Inception

Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the U.S. Naval Research Laboratory. It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications. Today, it is used every day for a wide variety of purposes by normal people, the military, journalists, law enforcement officers, activists, and many others.

Overview

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.
Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.
Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization.
Groups such as Indymedia recommend Tor for safeguarding their members' online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company's patent lawyers?
A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.
The variety of people who use Tor is actually part of what makes it so secure. Tor hides you among the other users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected.

Why we need Tor

Using Tor protects you against a common form of Internet surveillance known as "traffic analysis." Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. This can impact your checkbook if, for example, an e-commerce site uses price discrimination based on your country or institution of origin. It can even threaten your job and physical safety by revealing who and where you are. For example, if you're travelling abroad and you connect to your employer's computers to check or send mail, you can inadvertently reveal your national origin and professional affiliation to anyone observing the network, even if the connection is encrypted.
How does traffic analysis work? Internet data packets have two parts: a data payload and a header used for routing. The data payload is whatever is being sent, whether that's an email message, a web page, or an audio file. Even if you encrypt the data payload of your communications, traffic analysis still reveals a great deal about what you're doing and, possibly, what you're saying. That's because it focuses on the header, which discloses source, destination, size, timing, and so on.
A basic problem for the privacy minded is that the recipient of your communications can see that you sent it by looking at headers. So can authorized intermediaries like Internet service providers, and sometimes unauthorized intermediaries as well. A very simple form of traffic analysis might involve sitting somewhere between sender and recipient on the network, looking at headers.
But there are also more powerful kinds of traffic analysis. Some attackers spy on multiple parts of the Internet and use sophisticated statistical techniques to track the communications patterns of many different organizations and individuals. Encryption does not help against these attackers, since it only hides the content of Internet traffic, not the headers.

The solution: a distributed, anonymous network

How Tor works Tor helps to reduce the risks of both simple and sophisticated traffic analysis by distributing your transactions over several places on the Internet, so no single point can link you to your destination. The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you — and then periodically erasing your footprints. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several relays that cover your tracks so no observer at any single point can tell where the data came from or where it's going.
To create a private network pathway with Tor, the user's software or client incrementally builds a circuit of encrypted connections through relays on the network. The circuit is extended one hop at a time, and each relay along the way knows only which relay gave it data and which relay it is giving data to. No individual relay ever knows the complete path that a data packet has taken. The client negotiates a separate set of encryption keys for each hop along the circuit to ensure that each hop can't trace these connections as they pass through.
Tor circuit step two
Once a circuit has been established, many kinds of data can be exchanged and several different sorts of software applications can be deployed over the Tor network. Because each relay sees no more than one hop in the circuit, neither an eavesdropper nor a compromised relay can use traffic analysis to link the connection's source and destination. Tor only works for TCP streams and can be used by any application with SOCKS support.
For efficiency, the Tor software uses the same circuit for connections that happen within the same ten minutes or so. Later requests are given a new circuit, to keep people from linking your earlier actions to the new ones.
Tor circuit step three

Hidden services

Tor also makes it possible for users to hide their locations while offering various kinds of services, such as web publishing or an instant messaging server. Using Tor "rendezvous points," other Tor users can connect to these hidden services, each without knowing the other's network identity. This hidden service functionality could allow Tor users to set up a website where people publish material without worrying about censorship. Nobody would be able to determine who was offering the site, and nobody who offered the site would know who was posting to it. Learn more about configuring hidden services and how the hidden service protocol works.

Staying anonymous

Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don't want the sites you visit to see your identifying information. For example, you can use Torbutton while browsing the web to withhold some information about your computer's configuration.
Also, to protect your anonymity, be smart. Don't provide your name or other revealing information in web forms. Be aware that, like all anonymizing networks that are fast enough for web browsing, Tor does not provide protection against end-to-end timing attacks: If your attacker can watch the traffic coming out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit.

The future of Tor

Providing a usable anonymizing network on the Internet today is an ongoing challenge. We want software that meets users' needs. We also want to keep the network up and running in a way that handles as many users as possible. Security and usability don't have to be at odds: As Tor's usability increases, it will attract more users, which will increase the possible sources and destinations of each communication, thus increasing security for everyone. We're making progress, but we need your help. Please consider running a relay or volunteering as a developer.
Ongoing trends in law, policy, and technology threaten anonymity as never before, undermining our ability to speak and read freely online. These trends also undermine national security and critical infrastructure by making communication among individuals, organizations, corporations, and governments more vulnerable to analysis. Each new user and relay provides additional diversity, enhancing Tor's ability to put control over your security and privacy back into your hands.