create your own proxy site

Posted by MUKESH KUMAR on 26 Aug 2011

Tired of your school blocking every new proxy site you find? Here's an answer. Check out http://www.proxybuilder.com. After you fill in the information you want for your proxy site, it will give you the download link for your files. Then all you have to do is upload the files you download to your web host and you've got your own proxy website. If you find a free hosting site, you can make as many of these as you want!

NOTE***If your site gets blocked, just make another account with the free hosting service. BUT UNDER NO CIRCUMSTANCES SHOULD YOU KEEP ALL YOUR ACCOUNTS! DELETE YOUR CURRENT ACCOUNT BEFORE CREATING A NEW ONE TO KEEP THE HOST'S SERVER CLEAN!

GOOD LUCK!

FOLLOW THE INSTRUCTIONS TO MAKE YOUR PROXY SITE:--

Instructions to Set Up Proxy Sites

  1. Open an account at a web host that allows proxy websites. Many hosting companies do not allow proxies because they can generate a large amount of traffic that overloads the servers. Those that do allow proxy websites will typically prefer that you have a Virtual Private Server (VPS) or a dedicated server. Most hosts do not allow web proxies on a shared server. Here is a list of Proxy Web Hosts.
  2. Obtain a copy of PHProxy. This script acts as the software to power your proxy site. PHProxy is available free of charge, so anyone can make a proxy website without spending a lot of money.
  3. Log into the control panel for your web hosting account. Create a MySQL database that will be used by the PHProxy script. Make note of the database name, user name and password that is associated with the database. This information is needed to configure the script to communicate with the database.
  4. Edit the config.php file that is included with the script. Open the file with a HTML editor  (like Hippie Pro HTML Editor) so that you can edit the contents of the file and save the new copy. Use Windows Notepad if you do not have a HTML editor. Simply open the file, edit the website name, website address, database name, database user name and database password. Save the file after the information has been edited.
  5. Use an FTP program to upload all of the files to your hosting account. You can download a free copy of Filezilla FTP if you do not already have a program. Simply upload all of the files and folders included with PHProxy to your web hosting account. Your proxy website should now be operational.
  6. Read the documentation that is included with PHProxy. Follow the instructions in the documentation to customize your script, such as changing colors, page layout or other visual elements. This will help you make a FTP website that stands out.
** If your web host does not support PHP, you can use CGIProxy as an alternative. This script is made by the same group as PHProxy.
More aboutcreate your own proxy site

Why use Firewalls??? what is Firewalls???

Posted by MUKESH KUMAR


Firewalls are generally used by a computer to attach your network to other networks, especially the Internet … Unfortunately, some network administrators and managers do not understand the strengths a firewall can offer, resulting in poor product choice, deployment, configuration and management… Like any security technology, firewalls are only effective if the implementation is done properly and there is proper maintenance and response to security events…
One of firewalls’ weaknesses is also one of their strengths… Firewalls are typically deployed as a perimeter defence, usually intersecting network links that connect your network to others… If the firewall is properly deployed on all paths into your network, you can control what enters and leaves your network…
Of course, as with any form of perimeter defence, if an attack is launched from inside, firewalls are not too effective… However, this deployment on your network perimeter allows you to prevent certain kinds of data from entering your network, such as scans and probes, or even malicious attacks against services you run… It would be nearly impossible to configure every workstation to disallow IRC, but blocking ports 6667-7000 (the most common IRC ports) is relatively easy on your perimeter firewalls…
VPN deployment also becomes easy… Instead of loading up VPN software on every desktop that might need it, you can simply employ VPN servers at those network access points, either as separate servers or directly on your firewall, which is becoming increasingly popular…
Controlling one, or even multiple firewalls is a much easier job than maintaining access control lists on numerous separate internal servers that are probably not all running the same operating system or services… With firewalls you can simply block all inbound mail access except for the official mail server… If someone forgets to disable email server software on a newly installed server, you do not need to worry about an external attacker connecting to it and exploiting any flaws…
With VPN-capable firewalls you can easily specify that access to certain networks must be done via encrypted tunnels, or otherwise blocked… With VPN software on each client, you would have more to worry about with misconfiguration or user interference… This results in sensitive data being accidentally sent out unencrypted… If your firewall is set up to block all but a few specific outbound services, then no matter what a user does – even to bring in their own laptop – they will probably not be able to access the blocked services… Enforcing this without firewalls and instead on each client machine is nearly impossible…
You may have a set of corporate guidelines for network usage that include such items as:
  1. Chat clients such as IRC, AIM, and Yahoo IM are strictly forbidden, as they can transfer files.
  2. Accessing external mail servers is forbidden (antivirus policy); only use the internal server to send or receive.
  3. Network games, such as Doom or Quake, are forbidden all weekdays for members of management.
  4. Websites such as playboy.com are forbidden for legal reasons.
Enforcing the first policy without a firewall would be possible, but difficult… In theory, if you managed to secure every single desktop machine and prevent users from installing software, it would be possible… Then you would need to prevent people from attaching “rogue” laptops and so forth to the internal LAN with software preinstalled… While possible, this is a Herculean task compared to configuring a dozen rules (or even a hundred rules) on your firewalls to prevent access to the ports and servers that IRC, AIM and the rest use…
The second policy would be very difficult to enforce without a firewall… You would need to do the above steps to prevent people from installing their own email software or using rogue machines such as laptops with it preinstalled… Moreover, any email software you do use (such as Outlook or Eudora) would need to be configured so that users could not modify any preferences, add new accounts and so on… This is not possible in almost all email clients…
The third policy is virtually impossible to enforce without a firewall…
Enforcing policy number four is basically impossible as well without a firewall… While some Web clients do allow you to list sites that are off limits, keeping the browsers on multiple workstations up to date would be a virtually impossible task… Compare that with configuring the firewall to force WWW access through an application-level…
Generally speaking, any security implementation done in a network will help with its overall health… Cataloguing systems and software versions to decide what needs upgrading first, implementing automated software upgrade procedures, and so on all helps with the overall health of your network and its systems…
A network configuration that creates checkpoints for firewall deployment also means you can easily implement a DMZ, a zone with servers to handle inbound and outbound information with the public… These servers can typically run a hardened and stripped down OS and application software… A proxy email server, for example, only needs to be able to accept and send email. There is no need for user accounts, POP or IMAP services, or GroupWare software integration…
Usually the simpler a system is, the easier it is to secure, and hence the harder it is for an attacker to break into… Securing a messy network is almost impossible… You must find out what you have, which versions, where the servers are deployed, what network links exist, and so on…

More aboutWhy use Firewalls??? what is Firewalls???

How to Hack / bypass Cyberoam!!!

Posted by MUKESH KUMAR

Most of the organisations are implementing cyberoam –unified threat management system now-a-days…. Cyberoam is used to make filtrations to the sites being browsed by the users i.e. unwanted sites are being blocked (Eg: facebook, orkut etc) (I know its a real pain you know where.. :-/)
Let see the details of cyberoam before cracking cyberoam…
Cyberoam is Identity-based unified threat management appliances, offer comprehensive threat protection with firewall-VPN, anti-virus, anti-spam, intrusion prevention system, content filtering in addition to bandwidth management and multiple link load balancing and gateway failover… Basically its a hardware based corporate FIREWALL.. Its probably the most effective firewall in the corporate sector, but that does not mean it can’t be bypassed (fooled)…. :)
For every action there is an equal and opposite reaction…
Similar if cyberoam is blocking something there should be an way to unblock it. Nothing is impossible in the world of programming…. The difficult part of cyberoam it is the system comprising of both hardware and software….
It DOES NOT block individual filetypes, what it does is to block fileservers that are known to peddle software not proper for the target individuals…. Which means even Torrents are mostly blocked….. Not good….. The list of blocked servers are constantly updated by the company so you need to be on the constant lookout for newer ways to fool the firewall…..
There are a few ways to fool the firewall….
1. Go for the data transfer method known as tunneling. By tunneling the download data through an allowed fileserver you could fool the system in thinking that you are downloading some good data (say Anti-Virus updates). In order to do this you will need to know some network programming….
2. Another way would be to use a PROXY software. The best free PROXY softwares that work in the Cyberoam network are
a. Vidalia (Tor) : This used to work wonderfully but I’m not sure wheather this still works. I think its worth a try. You can find it at http://www.torproject.org/
b. Ultrasurf : This one is an awesome Proxy. It can easily bypass the Cyberoam firewall but the connection needs to be good otherwise it keeps disconnecting. Always look for an updated edition at the site http://www.ultrareach.com/
3. Another cool way to fool the system is to use a VPN software like HAMACHI. …Find someone who would be willing to share a network connection with you, then connect through Hamachi and use the Net uninterrupted….. You could even setup a server at you own home and connect to your own computer…. Institutes normally require VPN services so they NEVER block VPN ports
One more way is little complicated and requires two different software’s and manual configurations…But ultimately at the end you get the freedom!! Freedom to be unmonitored!!!!
Step 1 : Download Free Port Scanner Software.
Step 2 : Install free port scanner.
Step 3 : Detecting the static IP assigned to your organisation. www.WhatIsMyIP.com
Step 4 : Scanning open ports for your external IP address
Step 5 : Configuring proxy server – Download Proxifier – proxy software.

Step 6 : Install proxifier software
Sep 7 : Configuring Proxifier software
Although this method is a tedious , time consuming it yields the best results. It is almost impossible for the network admnistrator to block this method !!!!
Note :
  • It might not work if your organisation does not have an static IP.
  • You need to run proxifier first before opening the browser.
More aboutHow to Hack / bypass Cyberoam!!!

CHANGE YOUR IP ADDRESS THROUGH NOTEPAD

Posted by MUKESH KUMAR on 19 Aug 2011

First press the widows key and type in cmd

Open command prompt then type in "ipconfig" this would show you a list of network addresses and your
ip is one of them.

Or open notepad and type in

cls
ipconfig
pause

save it as a ".bat" file "e.g  ip.bat"

ipv4 address is your ip address.

Thank you all for reading.


More aboutCHANGE YOUR IP ADDRESS THROUGH NOTEPAD

EDIT ANY WEBPAGE USING JAVASCRIPT

Posted by MUKESH KUMAR

Go to the web page of your choice
Copy and paste this code in the URL of the web page

javascript:document.body.contentEditable%20=%20
'true';%20document.designMode='on';%20void%200

Then press enter and drag your mouse cursor to any part of the web page you want to edit
But this effect is not permanent as soon as you refresh the web page it goes back to the original page

This can work on any web page...

Thanks for reading....
More aboutEDIT ANY WEBPAGE USING JAVASCRIPT

HOSTING RADIO on INTERNET or LAN!!!

Posted by MUKESH KUMAR


first u need windows media encoder for this Creating an Internet Radio Station. This article describes a simple and comparatively inexpensive way to build an Internet radio station that streams live audio over the Internet. Internet radio generally is an audio stream that sounds like an over-the-air radio station. It is difficult to put a label on exactly what Internet radio is because, unlike traditional over-the-air radio, you can create an Internet radio experience in a number of ways, including:
  • Live stream. You start with the over-the-air model of a radio station, but instead of plugging the program audio signal into a transmitter that sends the signal over the airwaves, you plug it into an encoder and server that send the signal over the Internet. In the following figures, the solid line arrows indicate the path of the live signal or stream; the broken line arrows indicate file transfers.The live stream type of Internet radio
  • Figure 1. Live stream type of Internet radioThe end-user experience is like listening to a traditional over-the-air radio station.
  • Automated program signal. Many over-the-air radio stations use automation to create program content. Production personnel and announcers produce individual audio segments (such as music, announcer voice-overs, and commercials), and then create a playlist that an automation system uses to play the segments. These automated systems can also be used for Internet radio. The output of the automated system is a program audio signal.The automated program signal type of Internet radio
  • Figure 2. Automated-program-signal type of Internet radio
  • Simulcast. Many over-the-air radio stations both stream and broadcast their signals, in a process called simulcasting.The simulcast type of Internet radio
  • Figure 3. Simulcast type of Internet radioAlthough a simulcast stream is technically not an Internet radio station because it is intended primarily for over-the-air delivery, the end-user experience is the same.
  • Broadcast server-side playlist. This is another form of automation. The difference is that with automated radio, a live stream is encoded from the program signal produced by an automation system. With a broadcast server-side playlist, there is no live audio signal; individual program segments are encoded into Windows Media Audio (WMA) files and the playlist is run on a server running Microsoft® Windows Media® Services, so the server is the automation system.The broadcast server-side playlist type of Internet radio
  • Figure 4. Broadcast-server-side playlist type of Internet radio
  • On-demand playlist. This is a third form of automation in which the automation system creating the Internet radio experience is Microsoft Windows Media Player. Individual audio segments are produced, and then encoded to Windows Media Audio (WMA) files. The playlist is created in a Windows Media metafile with an .asx extension; the Player downloads the file and plays the items in the playlist.The on-demand playlist type of Internet radio
  • Figure 5. On-demand playlist type of Internet radioOne advantage of an on-demand playlist is that the content can be streamed from any server.
This article and its accompanying video describe how to create an Internet radio station using an automated program signal. The article divides setting up an Internet radio station into the following topics:
  • Producing the program content
  • Encoding the live stream
  • Configuring the firewall
  • Converting the IP address
  • Hosting the live stream
  • Playing the live stream
  • For More Information


  • Producing the Program Content
The first and most important part of a radio station is its content, which is a live program signal that contains all the individual elements, such as announcer, music, and commercials, played in sequence. In traditional live radio, a disc jockey handles the transitions or segues between elements in real time. For example, the DJ makes announcements, segues to music from a CD, and then segues from music to a commercial. In our Internet radio system, production personnel and announcers create individual program elements, but then a Microsoft Windows-based automation program handles the segues. There are a number of radio-automation systems ranging in price from a little over $1,000 to well over $50,000. In this setup, I will use a radio-automation system from Broadcast Software International, called Simian. Two other similar systems are RMSLive and Audio Vault. For complete details about how to create content for an automation system, see the Help documentation for the product. Basically, the workflow of the automated station is as follows:
  1. Segments or elements are produced. An audio-production studio or station is used to record, digitize, edit, and render the individual audio segments. The studio setup can be as simple as a microphone, computer with a digital audio workstation program, and various devices, such as CD players. Audio from the microphone and devices is digitized on the computer, and edited using the digital audio workstation. The producer then renders each audio segment to an audio file. For example, in one editing session, a producer might create five announcer segments that introduce music segments and identify the station; four commercials; and six music segments from CDs. Information about each segment is included as metadata in the audio files. After the segment files are created, the producer saves the files to the automation computer on the local area network (LAN).
  2. Playlists are created. A playlist file is created using the format of the automation program. The playlist contains the segment files as well as timing information. In many cases, one segment begins playing at the end of the previous segment, however, a segment can also begin at an explicit clock time. For example, a news segment can be scheduled to start at exactly 2:00 pm. Playlist files can often be created on a computer other than the computer actually running the automation program. For example, you could create playlists on an office computer, and the automation computer could access the playlist file over the LAN.
  3. The automation program runs the playlist. The individual audio segments are played in order per instructions contained in the playlist, and the automation system outputs a program audio signal. The signal is sent to the computer’s sound card output, and the signal can then be patched or routed to any audio input. If the signal is destined for over-the-air broadcast, it is patched into a radio transmitter. In our scenario, the signal is patched into the computer running Microsoft Windows Media Encoder, which, in our case, is the same computer.

Encoding the Live Stream

The program signal is encoded into a stream using Windows Media Encoder. To set up the encoder, I open the program and do the following:
  1. On the Windows Media Encoder taskbar, click New Session.
  2. In the New Session dialog box, click Broadcast a live event.
  3. In the New Session Wizard, enter the following information:
    • Device Options. Select the Audio check box only, and click the appropriate sound card.
    • Broadcast Method. Click Pull from the encoder (the server or player initiates the connection.)
    • Broadcast Connection. Enter an HTTP port number. I will use the port 8081. I could also click Find Free Port, and the encoder would generate a random free-port number. Remember this port number because it will be used later to configure the firewall and server.
    • Encoding Options. Select one or more bit rates. I will encode two bit rates: 70 Kbps and 24 Kbps. When a client connects to the stream, the server will automatically send the stream that is most appropriate for the current bandwidth. Keep in mind that the bandwidth on the networks between the encoding computer and Internet server must be high enough to handle both streams. However, the stream from the server to the client will contain only one of the bit rate streams.
    • Archive File. Because my station will broadcasting continuously, it would not be appropriate to create an archive file of the stream.
    • Display Information. Enter information that will be displayed on the Windows Media Player interface, such as title and copyright.
  4. Click Finish to close the wizard.
  5. On the Tools menu, click Broadcast Security.
  6. In the Allow area, click Add, and then type the following information:
    • The IP address of the Internet Windows Media server. You can obtain the address from the streaming service provider. The address is also displayed on the encoder interface after the server connects to the stream in the Connections tab of the Monitor panel.
    • The IP mask value of 255.255.255.255. With this value, only the server can connect to the encoder stream.
    If you do not restrict access to your encoded stream with Broadcast Security, other computers can connect directly to the encoder. This not only reduces available bandwidth on the networks leading to the encoder, it adds to the load on the encoding computer, which can impair the quality of the stream. If you want to monitor the encoder stream on another computer, add the IP address of the monitor computer to the Allow list.
  7. Start Windows Media Encoder. Check the Monitor panel to make sure the encoder is running.
  8. Open the mixer for the sound card by double-clicking the speaker icon on the taskbar. On the Master Volume mixer, make sure the Line In control is muted. If Line In is not muted, a feedback loop will be created in the next step, which could damage your speakers, as well as your ears.
  9. On the sound card, connect the line output to the line input. The program signal from the automation system is patched into Windows Media Encoder.
  10. On the mixer, on the Options menu, click Properties.
  11. On Properties, select Recording.
  12. On the Recording Control mixer, select Line In, and adjust the control to optimize audio levels by reading the VU meter in the Audio panel of the encoder.
The encoder is now generating a live stream, but the data will not go anywhere until a client (player) or server connects to the encoder.

Configuring the Firewall

The computers on my LAN are connected through a router device that includes a firewall and other functions that enable me to connect my LAN safely to the Internet. In my setup, I use a Microsoft Broadband Networking Wireless Base Station, but there are a number of similar router products from companies such as Linksys and Netgear. The router is connected to the modem supplied by my DSL service provider. Figure 6 shows how the network components connect. For more information about Microsoft home-networking products, see the Microsoft Product Information Center page.How the router, modem, and firewall connect
Figure 6. Connections between all the components of the stationAlthough the firewall is configured by default to prevent Internet computers from connecting to computers on my LAN, in my case, I need to allow Internet computers to connect to the encoder port to receive my live stream. I have already configured the encoder to allow just the server to connect. To enable the server to connect through the firewall, I open the port using the Persistent Port Forwarding feature of the router.
To enable Persistent Port Forwarding on the firewall
  1. Open the Broadband Network Utility of the Microsoft router.
  2. Open the Base Station Management Tool to view and modify the LAN configuration.
  3. Click Security, and then click Port Forwarding.
  4. In the Persistent Port Forwarding window, enter the following information on a new line:
    • Private IP address and port. Type the current IP address of the encoding computer and the port (8081).I use DHCP to dynamically assign IP addresses, so this address might change. However, the Microsoft router keeps track of the changes, and automatically updates this setting.
    • Description. Type a description for the port-forwarding settings, such as ContosoLiveStream.
    • Inbound port. Type the same value you entered for the private port.
    • Type. Type TCP for the type of transport protocol, which is the protocol used by the encoder.
    • Enable the settings.
  5. Close the management tool.

Converting the IP Address

I could go directly to my streaming service provider and configure the server to connect to the IP address assigned to my modem and port 8081. However, my DSL provider dynamically assigns IP addresses to my modem, meaning that it can change at any time. If I configure the server with the dynamic address, the server will not be able to connect to the encoder when the DSL service changes my modem address. To make sure that does not happen, I could apply for a static address. However, I choose to go the less-expensive route, and use a dynamic DNS provider that automatically updates the link.
To use a dynamic DNS provider
  1. I open an account with a dynamic DNS provider, such as No-IP.com or dyndns.org.
  2. I log in to my new account, and choose to add a host.
  3. In the add-a-host form, I enter the following information:
    • Host name. The name I want to give my host, in other words, my modem. For example, I type ContosoRadio.
    • IP address. The current IP address of my modem, for example, 101.101.101.101.
  4. To connect to my host, I use the address supplied by the dynamic DNS provider. My address using No-IP.com is ContosoRadio.No-IP.com.
  5. When a client connects, No-IP.com redirects the client to the current address of my modem. When my modem address changes, it is updated in the No-IP.com database, so clients can continue to connect to my host at ContosoRadio.No-IP.com.

Hosting the Live Stream

I actually use two Internet service providers (ISPs): the first provides the DSL service that connects my LAN to the Internet; the second provides the streaming media service. I could buy a server and host my own live stream, but I would need a lot of advanced networking capability and knowledge to configure and maintain the service. I would also need a fast Internet backbone connection to handle hundreds or thousands of simultaneous connections. The streaming service provider handles all the details and advanced networking issues for me, so I can concentrate on creating the content. To check out service providers that support Windows Media, search for hosting services on the Windows Media Service Provider page. After obtaining my URL from the dynamic DNS provider, I can configure the servers at the streaming service provider to source from my encoding computer by doing the following:
  1. Locate the service provider’s Web site, and log in to my account.
  2. Go to the content configuration Web page to view details of my broadcast and on-demand accounts.
  3. I choose to view or modify the broadcast account, and on the details page enter the following information:
    • Publishing point name. The name that end users will access to connect to my radio stream. My streaming service provider, Playstream.com, assigns a name for me, ContosoLive. Notice that Playstream.com actually calls the publishing point a mount point, but it is the same thing.
    • Publishing-point source address. The URL to which the server connects to receive my stream, in other words, the address and port of my encoding computer, for example http://ContosoRadio.No-IP.com:8081.
    Note You are not typically configuring the servers directly, but entering information into a form that runs a server-side program that makes the modifications.

Playing the Live Stream

After making all the necessary configurations, you can connect to the stream with a client on the Internet by doing the following:
  1. Open Windows Media Player on a client computer.
  2. On the File menu, click Open URL, and then type the URL of the stream from the streaming service provider, for example, mms://win.playstream.com/ContosoLive. You can also test your Windows Media metafile, which your service may provide, for example, http://easylink.playstream.com/winlive/ContosoLive.wvx.
It is a good idea to regularly monitor your live stream with a typical Internet client so that you know what the end-user experience is like. If you fail to connect, retrace your steps and make sure everything is configured correctly. You can monitor the stream at different points in the chain to pinpoint where the trouble might be. For example, you can connect the Internet client directly to the encoder by connecting directly to the modem, http://101.101.101.101:8081, and then after the dynamic DNS provider, http://ContosoRadio.No-IP.com:8081. If the stream is often interrupted by buffering, make sure you have plenty of bandwidth upstream to your DSL provider and downstream to your client computer. If you continue to experience poor streaming reception, contact your streaming service provider. If your client connects to the high-bit-rate stream, you can test your low-bit-rate stream by temporarily changing the Player settings:
  1. In Windows Media Player, on the Tools menu, click Options.
  2. Click the Performance tab, and then click Choose connection speed.
  3. Choose a speed that is just above your low-bit-rate stream. For example, if your low-bit-rate stream is 24 Kbps, choose Modem (28.8 Kbps).
  4. Open the URL of the stream from the service provider. The server delivers the low-bit-rate stream.

For More Information

More aboutHOSTING RADIO on INTERNET or LAN!!!

7 super tools to secure your mobile phone secure

Posted by MUKESH KUMAR

Mobile phones, the ultimate gadget in this wireless and busy world. And with this much reach your phone has also made some enemies that are always there to harm your phones data either by installing malicious codes or by some sort of physical attacks.
every time you connect your phone to the computer to transfer your images or share something , you are just opening yourself to a host of malicious coding. Also now whenever you turn on your bluetooth, there may be someone  trying bluesnarfing on your device.
So below , I have given a list of some applications intended to secure your device up to some extent.
Hide photos and videos
Well today hardly anyone uses a mobile phone without a camera, and with brands like Nokia and Samsung offering cameras with 3 to 12 megapixel they are actually bridging the gap between a cell phone and a digital camera.  We alllove to click pictures of ourselves and our loved ones and would cherish to keep them with us on the go but seldom we want someone else to take a hold of them from our cellphones to misuse them , to safeguard your cell phone from this misery here’s the apps that may help.
bulambod
bulambod
Bulambod is an unbreakable cipher software . The only way to crack it is by brute force. But it will take so much time that you will regret doing it. In cryptography terminology cipher is an algorithm that performs encryption and decryption operations on any given information or data. All you need to do is to select the file you need to encrypt and then choose a password and then Bulambod will do the rest. There is no length of password so you can make it really difficult for someone to crack it.
Download Bulambod : http://bit.ly/cQDRLM
PictureEncrypter if you need to encrypt your images you can use this. This application lets you Zip your images and assign a password to it. To view your image, all you need to do is type the password and it will let you have your image.
visit website: http://bit.ly/b8DE3h
Download PictureEncrypter : http://bit.ly/bNy6ed
PrivateCallandSmsGuard use this application to hide and password protect access to messages. Since the main function of a mobile phone is to make voice calls and messaging,with these two features secure you can have a sound sleep that your phine is secure. for this you can use this application. This application lets you personalize your phone by assigning rules to call. You can individually set rules to accept or reject calls , this way you don’t have to bother whose call to receive and whose not. The same can be done for messages. encryption of messages can also be obtained with the use of another app calledBlender xxTea edition.
Download PrivateCallandSmsGuard : http://bit.ly/9a23f8
Download Blender xxTea edition : http://bit.ly/doVbQz
Mobile Antivirus : well there are many mobile antiviruses in the market most of them by the makers of the PC antivirus suites. Norton, Kaspersky,all have there editions of mobile antivirus , but you’ll have to buy them to use them , yes they do offer a trial download. For those searching for a free alternative they can  opt for Netqin.Netqin is really a good antivirus for mobiles and you should not judge it by the fact that its free,you must try it.Fsecure offers perhaps the best security in the category of paid ones it serves as a anti theft app, anti-spyware,and firewall, it even offers real time protection.
Download Netqin: http://bit.ly/aFa7BA
Download Fsecure : http://bit.ly/c6S1VH
Hide contact list: Mobile phones hold our personal details and contacts to such an extent tah today we need to protect them. To cater such a need of yours is the application Hidden contacts by Tektronic SRL.With this app loaded you can assign a password to select contactson your list. Not just this it also sends your message directly to the contact without storing them in your default sent items folder.
Download Hidden contacts by Tektronic SRL: http://bit.ly/aEism6
Theft Protection: One of the biggest problems these days is of phone theft. We have all heard of technologies like mobile tracker and all being implemented by mobile phone manufacturers. But what if your phone is not that sophisticated to have one of these technologies. Well then you can use Phone Guardian this application works by auto locking your phone in case it is stolen all you need to do is to send a SMS to lock it. With the latest version you can even track your phone with its GPS module. But remer don’t forget your password or else you won’t be able to get you phone back in case it gets locked.
Download Phone Guardian: store.ovi.com/content/7996
Filter spam messages : as if spams were not causing enough trouble in our emails they are now present as messages also. One app that verry well effective in controlling this is SMS Spam Manager . All you need to do is to set the rules for blocking the SMS. You can either choose the number from which the message originates or you can either choose a phrase that appears in the message. This feature is quite interesting cause suppose your telecom operator keeps sending you SMS on love and beauty tips or astrology and you don’t want those messages instead of blocking that number , cause your cell phone bill originates from the smae number you can choose a phrase or keyword to block such messages. Having said all this  don’t worry if something accidentally gets blocked just like the spam folder in your mail you have all your blocked messages stored in your spam folder where messages gets deleted automatically after a certain time-line.
Download SMS Spam Manager : http://bit.ly/99tojg
Well but remember the beast and the ultimate tool for security of your phone is your carefulness , so make sure you are quite careful in handling your phone and its data.

More about7 super tools to secure your mobile phone secure

Online Radios and Top 10 Music Streaming sites

Posted by MUKESH KUMAR


Listening to music on internet is a one of the most popularonline-entertainment methods. For many, it is the second-most frequent reason for accessing internet; other than surfing or checking mail. There are thousands of websites that provide this service. Music for every language, genre, etc. is available on internet. These services, also know as Online Radio Services orMusic Streaming Services, have several advantages over traditional form of listening music by downloading or buying a CD.
Online Radios Why prefer Online Radio Services?
Portability: One doesn’t have to carry its music everywhere. Online services let you access music when one doesn’t have their iPod, Laptop or PC or other media-players.
Lots of music: Second reason why Online radio services are popular because there’s lots of music available to listen. Users can listen to tens of thousands of albums available in the catalog. Almost all major artist albums are available to listen. Then, there are also many independent and upcoming artists promoting their content as well.
Discover music and artists: Major music streaming sites cover many genres , all the popular ones and many not-so-popular ones. These websites also have a huge catalog of music artists, big and small. Often, these websites have a music recommendation service. It means that, based on your current listening tastes, these websites will suggest you other artists or songs which you might like.
Social Networking part. Online radios let you share the music you’re playing with friends of yours on social networks, see what your friends are listening to and find people whose music tastes are similar to yours.
Experiment New Genres: Online music services are the best option when one wants to try new genres. These websites help you find prominent artists in those genre, suggest good albums, etc.
Here’s a list of some of the most popular online music streaming services (both free and paid).
5. We7
6. eMusic

More aboutOnline Radios and Top 10 Music Streaming sites