RSS
Loading...

How To Level Up Fast In Farm Ville

0 comments
If you've ever wondered whether it's a good idea to use a Farm Ville Bot to level up fast, you're in a right place. My goal is to tell you what kind of Farm Ville Bots you can find on the internet and tell you if they are safe. The truth is that NO Farm Ville guide you'll ever get will be as good as a well made bot. Let my explain why step by step.

When Farm Ville showed up it was a blast. People from around the world struggled to monetize on the amount of people that were getting addicted to the game day after day. That's when people started to create guides. At the moment you can see huge number of guides that are advertised everywhere. They state they will make your farm the best of the best and they will reveal a strategy that was never known before. Actually all these guides lead to disappointment. What you'll find inside of them are well known tips you would have already figured out yourself after reaching level 10 in Farm Ville. I wonder how many of you haven't already known those silly tips without paying 30$ for a useless guide.



Best Programming Languages to Learn as a New Programmer

0 comments
As a new programmer there might often be doubts as to which languages to learn and where to start, I remember I was like that too. I was very interested in learning how to program software but ended up in website development. I am still pursing it though, to be able to program software. Okay here is my recommendation as which languages to learn as a new programmer.
If I was a new programmer today I would learn JavaScript if I have some interests in website development as well. I think JavaScript provides a good introduction to programming; it’s quite a simple language to learn but gave me a lot of headache while I was learning it.


Bill Gates: 11 Rules Your Kids Did Not & Will Not Learn In School

0 comments
This is floating around the Internet again... It didn't sound like Bill Gates - at least some of it. In fact it should be attributed to Charles J. Sykes... Here's an article that claims it was incorrectly attributed.

Rule 1: Life is not fair - get used to it!

Rule 2: The world doesn't care about your self-esteem. The world will expect you to accomplish something BEFORE you feel good about yourself.


How to use your Notepad as a personal diary !

0 comments
1. Open a blank Notepad file.2. Write .LOG and not .log (case sensitive) as the first line of the file, followed by a enter. Save the file and close it.
3. Double-click the file to open it and notice that Notepad appends the current date and time to the end of the file and place the cursor on the line after.
4. Now type your notes, save and close the file.
5. Now place the cursor on the line after and type your notes. Each time you enter your notes, the time and date gets attached to the notes. Thus your Personal diary is ready to use now !


Seriously make your blog/site load faster in 15 minutes

0 comments
I was having cool chat with my blogging friend roezer at Blog HQ. Suddenly he drop me a link and small comment "This looks bad". It showed me a colorful diagram and it wasn't look that bad for me. After looking into the details I figure it out that it is the loading time for the blog. It took over 5seconds to load fully. Seriously, it looked really bad. This is how I made my blog load faster and you can do the same.

Here is the steps I followed and seriously if you want your blog to load fast you can follow the same.

1. Check your blog loading time with Pingdom Tools.

Copy and paste your URL and click Test now.


Website Loading Time is not a Joke

0 comments
This is the time to think about the website loading time. Seriously. Time to time I was going through this and came up with small hacks and tricks to make the blog load faster. However, did I do it seriously. I do not think so. Did you took it seriously and really thought about the loading time each time you do a change to your template or adding new gadget? It is time to take it seriously as Google is using site speed in web search ranking. 


Top 100 Most Dangerous Websites To Your PC : Enlisted

0 comments
Internet security company Norton Symantec has come up with a list of Top 100 Dirtiest sites, which could infect your computer with Malware. Malware is a software that can damage or compromise a computer system without the owner's consent.

Natalie Connor, spokeswoman of the anti-virus company, said that even visiting any of the named websites could expose a computer to infection and put the personal information into the hands of unwanted people.

"What people don't realize is when you type in a website, you're bringing down information on a page and with it could be malware," News.com.au quoted her as saying.


Access two Gmail accounts at once in the same browser

0 comments


I have a couple different Gmail addresses that I use for different purposes. Historically, Google Accounts – including Gmail accounts — have only let people access one account at a time per browser, so using both accounts has been a bit inconvenient. I’ve either had to sign out and sign back in, use a second browser for my second account, or use a Chrome incognito window. And I'm not alone; lots of people have asked us for a better way to use multiple accounts at once in the same browser. 




How twitter can kill your computer

0 comments
Malware Threat is one of the trending topics in twitter search. What is it all about? It is basically about some malware links start to use twitter trending topics. Pretty much a new way to catch large number of twitter users.

how it works? According to mashable.com it malware links comes with normal tweets and and only affect you if you click on any of these links.


Tools for Hacking Bluetooth Enabled Devices

0 comments
Bluetooth technology is great. No doubt. It provides an easy way for a wide range of mobile devices to communicate with each other without the need for cables or wires. However, despite its obvious benefits, it can also be a potential threat for the privacy and security of Bluetooth users (remember Paris Hilton?).
If you are planning to gain a deeper understanding of Bluetooth security, you will need a good set of tools with which to work. By familiarizing yourself with the following tools, you will not only gain a knowledge of the vulnerabilities inherent in Bluetooth-enabled devices, but you will also get a glimpse at how an attacker might exploit them.


20 Great Google Secrets

0 comments
Google is clearly the best general-purpose search engine on the Web
But most people don’t use it to its best advantage. Do you just plug in a keyword or two and hope for the best? That may be the quickest way to search, but with more than 3 billion pages in Google’s index, it’s still a struggle to pare results to a manageable number.
But Google is an remarkably powerful tool that can ease and enhance your Internet exploration.


The World’s Most Secure Flash Drive

0 comments
The Iron Key is “built to withstand attacks both virtual and physical 10 incorrect password attempts, and after that the encryption chip self-destructs.”
The contents of the drive are filled with epoxy, so if a hacker tries to physically access the chips, he’d more likely damage them instead.


Create a CookieLogger and Hack any Account

0 comments
Cookies stores all the necessary Information about one’s account , using this information you can hack anybody’s account and change his password. If you get the Cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Google, Yahoo, Orkut, Facebook, Flickr etc.
What is a CookieLogger?
A CookieLogger is a Script that is Used to Steal anybody’s Cookies and stores it into a Log File from where you can read the Cookies of the Victim.
Today I am going to show How to make your own Cookie Logger…Hope you will enjoy Reading it …


Download Free Softwares, Games, Movies and lot of Hacking Stuff from 50+ FTP Sites

0 comments
Internet definitely has several unheard places also known as underground websites, few of these website offer users 100s and 1000s of softwares, games, movies and lot of Hacking Stuff for downloads. Though these sites are pretty tough to find, I was able to unearth more than 50+ FTP sites that allow users to download softwares, games, movies and  lot of Hacking tools for free.
Here is a list of 50+ FTP sites that will allow you download content for free. Don’t forget to share and bookmark this page so that everyone can take advantage of it.


FACEBOOK TRICKS

0 comments

How to find out who visits your Facbook profile?

In orkut by default there is a nice feature that you can find out who visited your orkut profile, but there is no such kind of feature in Facebook. I have found a simple method through which you can find out who visited your facebook profile recently. 
The integration is very simple and you really do not need to fill any kind of surveys or pay for it
1. In order to see who views your Facebook profile, we will first need to get the tracking code. Visit the website listed here. www.unfaced.com


How to use Bold Underlined Fonts and Smileys in Facebook Chat?

1 comments

Facebook is the most widely used Social Networking website in the world having the most advanced features, but instead of having so many features most people are not able to use it or they don’t know to use ,There are lots of smileys in Facebook chat but lots of people dont know about it, You can you smileys in Facebook chat and increase your Chatting experience,
Below I am placing a chart which will contain smiley's in Facebook chat along with their code


What are Public IP & Private Ip Addresses?

0 comments

Internet Protocol (IP) addresses are usually of two types: Public and Private.

If you have ever wondered to know what is the difference between a public and a private IP address, then you are at the right place. In this post I will try to explain the difference between a public and a private IP address in layman’s terms so that it becomes simple and easy to understand.

What are Public IP Addresses?
A public IP address is assigned to every computer that connects to the Internet where each IP is unique. Hence there cannot exist two computers with the same public IP address all over the Internet. This addressing scheme makes it possible for the computers to “find each other” online and exchange information.


Batch File Virus Making

0 comments
Over the weekend, I've been sending my friends some .exe files as pranks that shut down your computer. It displays "Brian Virus Activated", spits out a bunch of random numbers, and then forces a computer shut down.

How does it work? The .exe is really a .bat file in disguise. A .bat file is known as a batch file, which is like writing a really simple program in command prompt. If you've ever coded before, batch files are extremely easy to make. All they do is run the commands top to bottom. The .bat file is then converted to an .exe, which I'll talk about later. It is completely harmless, but you can make it really powerful and do things like format the drive. I won't teach you that, because that's just cruel.

NOTE: FOR EDUCATIONAL PURPOSE ONLY..PLEASE DON'T USE THEM FOR ILLEGAL PURPOSE..WE ARE NOT RESPONSIBLE FOR ANY CONSEQUENCES..
BE CAREFUL




Why people create computer viruses ? #7 Reasons

0 comments
One of the most common questions we get asked by our tech support customers who hire us for virus removal is this: why do people create computer viruses? The answer is a complicated one that involves psychology and the darker side of human nature.

In the interest of simplicity, the word “virus” may sometimes be referring to other types of malware including worms, trojan horses, spyware, adware, and rootkits.

The seven deadly reasons for creating a computer virus:

Boredom: Young people, in this first level of severity, can sometimes simply make poor choices. The ones with inquisitive minds sometimes try their hand at hacking, or “playfully” tinker with joke viruses.


Seven maintenance tips to optimize Mac performance

0 comments

Mac systems are pretty trouble free, and OS X is a pretty solid system. However, as with all things, an ounce of prevention is better than a pound of cure, and there are some things that you can do with OS X to keep it running in tip-top shape.

#1 Back it up

The first and most crucial  thing to do is to keep a backup of your important files, or even the entire system. To clone the entire system (great for backups and quick restoration in the case of hardware failure), an external hard drive and SuperDuper! are the best solution as far as I am concerned. SuperDuper! makes a bootable clone of your hard drive; a great thing to do before performing large system updates, or something to schedule routinely. Other options include buying an Apple Time Machine and scheduling backups that way.


Anonymous Surfing - Surf Anonymously and Protect Yourself

0 comments
Have you ever wondered how some companies are able to lay hold on your email address in order to send spam mails to you? Or have you ever wondered how some sites like Google are able to open pages according to the country or region you stay? How do you think hackers are able to have access to the information you share online? These questions will remain unanswered until you understand what an internet protocol address is.


Google Looses Its Gravity - Awesome Google

0 comments

There are a lot of Tricks which you can do with Google by writing the Trick's text and click the "I'm Feeling Lucky" button present under the Google's logo on Google homepage.
This time, a new trick which is really awesome and cool. This trick will finish Google's gravity. How? Do it yourself and see.
Step1. Go to Google.com
Step 2. Write the following in the search bar Google Gravity
Step 3. And Click on the I'm Feeling Lucky button.

And also later you can click on the google logo and see the same as many times as you like

And enjoy :)


CHECK IF YOUR SENT MAILS ARE READ OR NOT

0 comments
At times, you want to know if the email you sent to someone has been received and read by that person. Think about proposals or invitations etc. So if you are wondering that the recipient has checked you mail or not, here is a free tool for tracking your outgoing emails.
SpyPig enables you to track your outgoing emails just by submitting your email address and the subject of email you want to track. After getting the tracking image, copy and paste into the body of email message that you are sending out.


RE-ENABLE RIGHT CLICK ON SITES WHICH DISABLED IT

0 comments
Now, I'll tell you how to enable right click function on the websites on which right click is disabled.

 
This is very simple. There are a lot of ways doing this. One way is by disabling JavaScript but the simplest and easiest way is by entering the following Script into the address bar while viewing the page.

How to enable right click function?

1. Go to the website on which right click is disabled. Click Here For Right Click Disabled Website
2. Copy the following code and paste it in the address of the browser while viewing the page.

javascript:void(document.oncontextmenu=null)
3. Hit enter key and now click right mouse button and see.. Right click will be enabled.
Plz comment and enjoy



DISABLE RIGHT CLICK ON YOUR WEBSITE OR BLOG

0 comments
It is quiet clear that disabling right click can ruin your web page. But if you still want to disable right click on you website/blog, then following is the simplest method for it.

Use the script below so when someone right clicks to save an image off your page, a message will come up letting people know that your information is copyrighted.

This script only works on newer browsers, and it's not foolproof. If someone really wants something from your page they can find ways around it, but at least it's a warning to people who want to take your graphics. Copy and paste the following code, and make sure it comes right after your <HEAD> tag:


WHY RIGHT CLICK IS DISABLED IN SOME WEBSITES

0 comments
You would have noticed that the Right Click function of Mouse is disabled in some websites.
But why the owners of the website disable Right Click function of Mouse?

Well! We all know that Contents Theft is one of the biggest crime (you can say) of the Internet World.

According to me, more than 90% Websites and Owners are fed with Stolen Contents. This is shame for those thieves. They found it very easy and straight, just Highlight all the Text and Click Copy and then Paste it in the new post. They do it just for money and rank and when they get a higher Rank then they are Boosting to their friends (etc...) that they have a High Rank on the Web. But this is not the good way. And I also don't like this.


Some tips to Avoid Getting Spyware/Malware

0 comments

Adware, malware, spyware and viruses can bring your system to its knees. They are detrimental, lowering the performance of your computer. You might need to replace data. You might lose unique files. Keep the nasties away from your computer using these ten simple tips.

1. Use Firefox: Internet Explorer is the most popular browser on the market, controlling over 50% of the market share. The virus and adware creators specifically look for exploitable vulnerabilities within IE because they know that they will receive the best return on investment. Your switch to Firefox prevents some adware from infecting your machine.


Some Cool Tricks of Notepad

0 comments

Write ".LOG" in the starting of Text file and your text document will be like a diary i.e. whenever you will open your file Current Time and Date will be appended in the file.

Try to Write in a Text file:
hack the mac apple
Reopen it, aaahhaan where is the text, here is only boxes. This is bug of Windows Notepad(in XP), whenever you will write anything in 4 3 3 5 combinations, you will always have Boxes there.

Write "Q33N" which is the flight number of Airplane crashed in to the Twin Towers and set the font to "Wingdings". May be it's a coincidence or terrorists got this before !!

LIKE
this post if u liked it.


TIPS FOR A HEALTHIER GAMING P.C

0 comments
After forking over your hard-earned cash on a new gaming PC, you want to make sure it stays in ship-shape. In this article I look at some good practices for minimizing damage and unnecessary wear on your PC.


COOL TRICK TO IMPRESS ALL USING NOTEPAD

0 comments
THIS IS A VERY COOL TRICK .YOU CAN ACTUALLY CREATE A SYSTEM MESSAGE BOX WHICH POPS UP NOW AND THEN IN YOUR PC INFORMING YOU ABOUT AN ERROR :


WELL USING THIS TRICK YOU CAN ACTUALLY MAKE SUCH SYSYTEM MESSAGE BOX AND DISPLAY MESSAGE OF YOUR CHOICE.
HERE'S AN EXAMPLE:------


A Good Password.

0 comments

A password is a sequence of characters used to determine that a computer user requesting access to a computer system is really that particular user. Typically, users of a multiuser or securely protected single-user system claim a unique name (often called a user ID) that can be generally known. In order to verify that someone entering that user ID really is that person, a second identification, the password, known only to that person and to the system itself, is entered by the user. A password is typically somewhere between four and 16 characters, depending on how the computer system is set up. When a password is entered, the computer system is careful not to display the characters on the display screen, in case others might see it.


Hack The Facebook Account Password With Keyloggers

0 comments
As you must have read at many blogs, it is very easy to hack the facebook accounts with the help of keyloggers. Black hat hackers are using such techniques to spy on Facebook accounts.
All you need to know is the Email Id of the Victim. We’re explaining here how to break its password. There are many software for hacking , phishing, keylogging which are freely downloaded from the Internet to break the Email  or any Account passwords. The one of  the common software used is Emissary Keylogger to hack the facebook password & So we are using it to demonstrate this tutorials.
Step for Hacking Facebook using Keyloggers:


How to open Tabs in Notepad?

0 comments
Are you tired of opening new instance of Notepad everytime you open a new Text Document? If the answer to the above question is Yes then you don’t have to worry about this anymore. You can use NotepadTabs to open different Text Documents in the same instance in form of Tabs as in Firefox.


Hack Proof Passwords

0 comments
Creation of strong passwords is the key to online safety these days. With the rapid increase in the web applications, which require you to register with them, there are virtually hundreds of passwords, which an average Internet user has to create to sustain his online presence. Remembering these passwords is a bit tedious work, and because of this, most of us tend to create passwords, which are just easy to remember, often overlooking whether somebody can hack passwords or not. And also repeat these passwords for more than one services.
However, this leaves a hole in our defence against potential online threats. These passwords, which are not that strong, can be hacked sometimes by experts of this dubious art. These masters know the weaknesses of people to create passwords with birthdays, own names, spouse or children names, zip codes and so on.
So today I am going to teach you an incredibly useful skill to make your Passwords Hack Proof.
Things that make a good password:


How to Hack passwords using a USB

0 comments
Hello Friends,
Have you ever thought that a Simple USB Drive can be used as a Destructive Tool for Hacking Passwords? Today I will show you how to hack Passwords using an USB Pen Drive.
As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places.
Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend’s/college Computer. We need the following tools to create our rootkit.


Hack to make free STD calls

0 comments
STD call rates are reducing in India every day, but still, they are not free. Today we bring you a hack to make free STD calls. We are exploiting a loophole in Rediff’s ad service. You can search for an ad on Rediff local ads and call the advertiser through Rediff. Rediff will call you first and then connect you with the advertiser of that ad. In this hack you basically need to post one ad, with your phone number. After that, every time you have to call a friend, you can search for that ad and pretend to be your friend. you want to call. Rediff will thus, call you as the advertiser and it will call your friend whose number you provided. Confused? Let us explain it step by step.


100+ Free Portable Apps

0 comments
This stuff can be installed on any portable drive, i.e. USB thumbdrive, PDA or an iPod. You can use them at work, school, or any other place where you can plugin your device. Check them out, you can either scroll-down for relevant category, i.e office software, email tools, messengers, games, etc. or get a ‘all-in-one’ package (all essential tools) . While there are more apps for windows users, I tried to include a mac version for each essential tool. All free. Enjoy!
What is a portable program ? : A portable program is a piece of software that you can carry around with you on a portable device and use on any other computer. It can be your email program, your browser, system recovery tools or even an operating system. The coolest part about it, is that all of your data and settings are always stored on a thumbdrive so when you unplug the device, none of your personal data is left behind.


20 Best Twitter Desktop Apps for Windows

0 comments
Twitter’s popularity has spurred the development of countless high-quality apps that let you use Twitter from the web, desktop or even your mobile phone.
If you’re an avid Twitter user, chances are you’re using one of these Twitter Desktop Applications that basically allow you to receive and post Tweets from your desktop. Meaning, you don’t have to visit your Twitter.com page from time to time to find out  what’s new about your Twitter friends. If you haven’t used a Twitter desktop application before, well this might be the right time to do so. We’ve picked best of the Twitter Desktop Applications available for you to use.
Some of the Twitter clients mentioned here are based on Adobe AIR so you may use them on Linux and Mac as well. Let’s dive in.


HTML COLOR CODES AND NAMES..

0 comments
Major hexadecimal color codes


Color
Color Code
Color
Color Code
Red
#FF0000
White
#FFFFFF
Turquoise
#00FFFF
Light Grey
#C0C0C0
Light Blue
#0000FF
Dark Grey
#808080
Dark Blue
#0000A0
Black
#000000
Light Purple
#FF0080
Orange
#FF8040
Dark Purple
#800080
Brown
#804000
Yellow
#FFFF00
Burgundy
#800000
Pastel Green
#00FF00
Forest Green
#808000
Pink
#FF00FF
Grass Green
#408080



8 Hidden Firefox Secrets Revealed

0 comments
The best thing about Firefox is that just when you think you know everything there is to know about the browser, something new comes along and surprises you. Here are few hidden tips and tricks. Maybe these are old hat and you know them already. Or maybe you had no idea these could be done. Lets see how many of these you know already.
1. Open docx file using Firefox without Office 2007: Now, you can view docx files using Firefox by installing OpenXMLViewer which is available for Windows, Mac and Linux users. It is an useful extension for users who haven’t upgrade to Microsoft Office 2007. Basically, the extension will convert docx documents into HTML format so that web browsers can render and display to users. So, the extension is not able to shows embedded objects.


How to Hack Password of any Operating System

0 comments
One thing any hacker should know is how to hack into login account of any operating system. Major Operating Systems that are used these days are Windows, Linux and Mac. So today I will show you how to hack into these Operating Systems. Are you curious how easy it is for someone to gain access to your computer? If so, read on to see the technique one might use to figure out your computer password.


Secret ‘GodModes’ in Windows 7

0 comments
The foxy-sounding name is a little deceiving, because as far as we know, it is exactly what people are calling it – a glorified control panel.  However, that goes without saying how useful this feature actually is.
GodMode is the name given to cheats in video games that provided you with all weapons and access to all areas. As it turns out, Windows 7 has a GodMode cheat as well. It is basically a control panel of sorts which provides you access to all the features in one explorer window. In the Windows 7 control panel, features are grouped together either in categories or control panel item names. Nothing is grouped under anything in GodMode.

How to access GodMode?



Hack Twitter Using Twitter Bot

0 comments


Twitter is becoming an important marketing tool for online publishers and marketers. But it can be time consuming to keep your profile up to date and it often gets forgotten. I guess Everybody is waiting for a Solution. So Today I will give you a software which will automate all your twitter tasks.
Twitter Bot can do a lot of amazing things without any need of User Intervention thats why it is called a Bot. Why one should have this software? I would say checkout the functions of this software and you will get your answer.


Hack to Bypass Trial Period Expiration

0 comments
Most of us are familiar with many softwares that run only for a specified period of time in the trial mode. Once the trial period is expired these softwares stop functioning and demand for a purchase. But today I will show you how you can run the software beyond their trial period.

How does this work?

Before I tell you how to hack the software and make it run in the trial mode forever, lets understand how this software works
When these softwares are installed for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc. After installation every time you run the software, it compares the current system date and time with the installed date and time. So, with this it can make out whether the trial period is expired or not.


43 Excellent WordPress Security Tips & Plugins

0 comments
After putting in all of the time, and perhaps money, into your WordPress website or blog, its now time to secure and protect it from outside enemies and general bad guys: hackers, spammers and all round tossers.
Without a doubt, for a self-hosted blog, WordPress is the best blog CMS that you can get. Though it comes packed with security features, being a popular and open source software, it also means that hackers have full access to the code which they can scrutinize to find any exploits they can use to hack into any WordPress-enabled site.
On the good side, one of the best things about WordPress is its plugin system that allows anyone to install any plugins or create your own plugins to extend its functionality, including improving security.
Here, I have listed some wordpress security tips and plugins that you can use to secure WordPress blog.


7 Alternatives for Microsoft Office

0 comments
Microsoft Office is one of the most popular application suits which no doubt facilitates the users to the full extent. But due to its high price or due to any compatibility issue with the operating system, it is always desirable to have some alternatives. Lets have a summarized look on the available alternatives.


How to Stop Promotional Calls & SMS

0 comments
Do pesky telemarketers call up you mobile phone to sell you car loans, credit cards or unbelievable deals for petty commissions. In a major initiative to stop telemarketing calls, the Telecom Regulatory Authority of India has started the National Do Not Call Registry of India. Any mobile or landline subscriber who does not wish to receive telemarketing calls, can request their telephone number be included in the NDNC Registry. Here are some ways to block unsolicited calls from top mobile operators and private banks in India.


Why are you Scared of Linux?

0 comments
Note: Before you read this Article I want to tell you that I am a big Linux fan and Linux being an open source Operating System is doing a Great Job.

Most of the people I know think Linux is very difficult for a layman to understand. They fear that after installing Linux they will not be able to do the normal tasks they do with Windows and thus they prefer paying money to Microsoft instead of even trying Linux.
There are lot of reasons behind this. Few reasons that I could figure out are:


How to view Removed Videos on Youtube

0 comments
Hello Friends,
Have you ever found an Interesting Video on Youtube but when you try to view that video you find out that the video has been removed by Youtube due to terms of Use Violation. According to the policy of Youtube, it has a right  to remove any video from public viewing if it is found to be violating the terms and conditions of Youtube. But now I will show you how to view that video.


 
Copyright © 2010 | Flash News Converted into Blogger Template by HackTutors