How to use colorful text / words / alphabets in facebook chat



How many times you start chat in facebook by " Hi " ..? ?? I think most of time..! now in this post i'll tell you how you can add colorfull text in facebook chat without any software and addon just to impress your friends .! !!

First of all let me show you a example :-

In this chat box you can see HI in pink color it looks nice, at-least batter then that ordinary boring " hi " .So want to know how to do it:-

How to write HI in pink color :-
just copy the below code :-

[[111356865552629]] [[109294689102123]]
and paste it in chat window and simply hit enter..!

How it works:-

Actually these are not codes these are username of facebook pages.For full explanation please visitgreen link at the bottom of post
Till then assume that these are codes . :D :-)

[[107015582669715]] = A

[[116067591741123]] = B

[[115602405121532]] = C

[[112542438763744]] = D

[[115430438474268]] = E

[[109225112442557]] = F

[[111532845537326]] = G

[[111356865552629]] = H

[[109294689102123]] = I

[[126362660720793]] = J

[[116651741681944]] = K

[[115807951764667]] = L

[[106596672714242]] = M

[[108634132504932]] = N

[[116564658357124]] = O

[[111669128857397]] = P

[[107061805996548]] = Q

[[106699962703083]] = R

[[115927268419031]] = S

[[112669162092780]] = T

[[108983579135532]] = U

[[107023745999320]] = V

[[106678406038354]] = W

[[116740548336581]] = X

[[112416755444217]] = Y

[[165724910215]] = Z

Like in above case we wrote HI


HI :- [[111356865552629]] [[109294689102123]]

H I

So you can create any word using these codes like:-




COMPUTER :- [[115602405121532]] [[116564658357124]] [[106596672714242]] [[111669128857397]] [[108983579135532]] [[112669162092780]] [[115430438474268]] [[106699962703083]]

TRICKS :- [[112669162092780]] [[106699962703083]] [[109294689102123]] [[115602405121532]] [[116651741681944]] [[115927268419031]]

CORNER :- [[115602405121532]] [[116564658357124]] [[106699962703083]] [[108634132504932]] [[115430438474268]] [[106699962703083]]

Other useful codes:-

BIE :- [[116067591741123]] [[109294689102123]] [[115430438474268]]



NOTE:-
Above codes will work only on Facebook chat and private messages . Codes will not work on status updates.!
While creating a word using above codes remember to give space between 2 codes for eg:-
HI :- [[111356865552629]][[109294689102123]] ( WRONG METHOD there is no space between 2 codes and it will appear as a code)
HI :- [[111356865552629]] [[109294689102123]] ( RIGHT METHOD )
This will not work while using facebook on mobile

More than 100 Keyboard Shortcuts must read

Keyboard Shortcuts (Microsoft Windows)
1. CTRL+C (Copy)
2. CTRL+X (Cut)
... 3. CTRL+V (Paste)
4. CTRL+Z (Undo)
5. DELETE (Delete) 6. SHIFT+DELETE (Delete the selected item
permanently without placing the item in the
Recycle Bin)
7. CTRL while dragging an item (Copy the selected
item)
8. CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
9. F2 key (Rename the selected item)
10. CTRL+RIGHT ARROW (Move the insertion point to
the beginning of the next word)
11. CTRL+LEFT ARROW (Move the insertion point to
the beginning of the previous word) 12. CTRL+DOWN ARROW (Move the insertion point
to the beginning of the next paragraph)
13. CTRL+UP ARROW (Move the insertion point to
the beginning of the previous paragraph)
14. CTRL+SHIFT with any of the arrow keys
(Highlight a block of text) SHIFT with any of the arrow keys (Select more than
one item in a window or on the desktop, or select
text in a document)
15. CTRL+A (Select all)
16. F3 key (Search for a file or a folder)
17. ALT+ENTER (View the properties for the selected item)
18. ALT+F4 (Close the active item, or quit the active
program)
19. ALT+ENTER (Display the properties of the
selected object)
20. ALT+SPACEBAR (Open the shortcut menu for the active window)
21. CTRL+F4 (Close the active document in
programs that enable you to have multiple
documents open simultaneously)
22. ALT+TAB (Switch between the open items)
23. ALT+ESC (Cycle through items in the order that they had been opened)
24. F6 key (Cycle through the screen elements in a
window or on the desktop)
25. F4 key (Display the Address bar list in My
Computer or Windows Explorer)
26. SHIFT+F10 (Display the shortcut menu for the selected item)
27. ALT+SPACEBAR (Display the System menu for the
active window)
28. CTRL+ESC (Display the Start menu)
29. ALT+Underlined letter in a menu name (Display
the corresponding menu) Underlined letter in a command name on an open menu (Perform the
corresponding command)
30. F10 key (Activate the menu bar in the active
program)
31. RIGHT ARROW (Open the next menu to the right,
or open a sub-menu) 32. LEFT ARROW (Open the next menu to the left, or
close a sub-menu)
33. F5 key (Update the active window)
34. BACKSPACE (View the folder one level up in My
Computer or Windows Explorer)
35. ESC (Cancel the current task) 36. SHIFT when you insert a CD-ROMinto the CD-ROM
drive (Prevent the CD-ROM from automatically
playing)

More than 100 Keyboard Shortcuts must read

Dialog Box - Keyboard Shortcuts
1. CTRL+TAB (Move forward through the tabs)
2. CTRL+SHIFT+TAB (Move backward through the tabs)
3. TAB (Move forward through the options)
4. SHIFT+TAB (Move backward through the options)
5. ALT+Underlined letter (Perform the
corresponding command or select the
corresponding option) 6. ENTER (Perform the command for the active
option or button)
7. SPACEBAR (Select or clear the check box if the
active option is a check box)
8. Arrow keys (Select a button if the active option is
a group of option buttons) 9. F1 key (Display Help)
10. F4 key (Display the items in the active list)
11. BACKSPACE (Open a folder one level up if a
folder is selected in the Save As or Open dialog
box) Microsoft Natural Keyboard Shortcuts
1. Windows Logo (Display or hide the Start menu)
2. Windows Logo+BREAK (Display the System
Properties dialog box)
3. Windows Logo+D (Display the desktop)
4. Windows Logo+M (Minimize all of the windows) 5. Windows Logo+SHIFT+M (Restore the minimized
windows)
6. Windows Logo+E (Open My Computer)
7. Windows Logo+F (Search for a file or a folder)
8. CTRL+Windows Logo+F (Search for computers)
9. Windows Logo+F1 (Display Windows Help) 10. Windows Logo+ L (Lock the keyboard)
11. Windows Logo+R (Open the Run dialog box)
12. Windows Logo+U (Open Utility Manager)
13. Accessibility Keyboard Shortcuts
14. Right SHIFT for eight seconds (Switch Filter Keys
either on or off) 15. Left ALT+left SHIFT+PRINT SCREEN (Switch High
Contrast either on or off)
16. Left ALT+left SHIFT+NUM LOCK (Switch the Mouse
Keys either on or off)
17. SHIFT five times (Switch the Sticky Keys either
on or off) 18. NUM LOCK for five seconds (Switch the Toggle
Keys either on or off)
19. Windows Logo +U (Open Utility Manager)
20. Windows Explorer Keyboard Shortcuts
21. END (Display the bottom of the active window)
22. HOME (Display the top of the active window) 23. NUM LOCK+Asterisk sign (*) (Display all of the
sub-folders that are under the selected folder)
24. NUM LOCK+Plus sign (+) (Display the contents of
the selected folder)
25. NUM LOCK+Minus sign (-) (Collapse the selected
folder) 26. LEFT ARROW (Collapse the current selection if it
is expanded, or select the parent folder)
27. RIGHT ARROW (Display the current selection if it
is collapsed, or select the first sub-folder)
Previous                                                                                       Next

More than 100 Keyboard Shortcuts must read


Shortcut Keys for Character Map
After you double-click a character on the grid of characters, you can move through the grid by
using the keyboard shortcuts:
1. RIGHT ARROW (Move to the right or to the
beginning of the next line)
2. LEFT ARROW (Move to the left or to the end of the
previous line) 3. UP ARROW (Move up one row)
4. DOWN ARROW (Move down one row)
5. PAGE UP (Move up one screen at a time)
6. PAGE DOWN (Move down one screen at a time)
7. HOME (Move to the beginning of the line)
8. END (Move to the end of the line) 9. CTRL+HOME (Move to the first character)
10. CTRL+END (Move to the last character)
11. SPACEBAR (Switch between Enlarged and Normal
mode when a character is selected)
Microsoft Management Console (MMC)
Main Window Keyboard Shortcuts 1. CTRL+O (Open a saved console)
2. CTRL+N (Open a new console)
3. CTRL+S (Save the open console)
4. CTRL+M (Add or remove a console item)
5. CTRL+W (Open a new window)
6. F5 key (Update the content of all console windows)
7. ALT+SPACEBAR (Display the MMC window menu)
8. ALT+F4 (Close the console)
9. ALT+A (Display the Action menu)
10. ALT+V (Display the View menu)
11. ALT+F (Display the File menu) 12. ALT+O (Display the Favorites menu) MMC Console Window Keyboard Shortcuts
1. CTRL+P (Print the current page or active pane)
2. ALT+Minus sign (-) (Display the window menu for
the active console window)
3. SHIFT+F10 (Display the Action shortcut menu for
the selected item) 4. F1 key (Open the Help topic, if any, for the
selected item)
5. F5 key (Update the content of all console
windows)
6. CTRL+F10 (Maximize the active console window)
7. CTRL+F5 (Restore the active console window) 8. ALT+ENTER (Display the Properties dialog box, if
any, for the selected item)
9. F2 key (Rename the selected item)
10. CTRL+F4 (Close the active console window.
When a console has only one console window, this
shortcut closes the console) Remote Desktop Connection Navigation
1. CTRL+ALT+END (Open the Microsoft Windows NT
Security dialog box)
2. ALT+PAGE UP (Switch between programs from
left to right)
3. ALT+PAGE DOWN (Switch between programs from right to left)
4. ALT+INSERT (Cycle through the programs in most
recently used order)
5. ALT+HOME (Display the Start menu)
6. CTRL+ALT+BREAK (Switch the client computer
between a window and a full screen) 7. ALT+DELETE (Display the Windows menu)
8. CTRL+ALT+Minus sign (-) (Place a snapshot of the
active window in the client on the Terminal server
clipboard and provide the same functionality as
pressing PRINT SCREEN on a local computer.)
9. CTRL+ALT+Plus sign (+) (Place a snapshot of the entire client window area on the Terminal server
clipboard and provide the same functionality as
pressing ALT+PRINT SCREEN on a local computer.) Microsoft Internet Explorer Keyboard Shortcuts
1. CTRL+B (Open the Organize Favorites dialog box)
2. CTRL+E (Open the Search bar)
3. CTRL+F (Start the Find utility)
4. CTRL+H (Open the History bar)
5. CTRL+I (Open the Favorites bar) 6. CTRL+L (Open the Open dialog box)
7. CTRL+N (Start another instance of the browser
with the same Web address)
8. CTRL+O (Open the Open dialog box,the same as
CTRL+L)
9. CTRL+P (Open the Print dialog box) 10. CTRL+R (Update the current Web page)
11. CTRL+W (Close the current window)

Previous 

How to Prevent People from Stealing your Wi-Fi Network

Are neighbors piggybacking on your Wi-Fi network? Learn about simple ways to prevent neighbors from using your wireless Internet without permission.

The data LED of your wireless router is constantly blinking and none of the family members are using the Internet at home. This might indicate that someone outside – probably your neighbors – are surfing the web using your Wireless (Wi-Fi) network.

Are neighbors using your Wi-Fi network?

If you would like to confirm whether an outsider is using your wireless home network, here’s a trick. First enter the router’s IP address in the browser’s address bar – here’s how to find the router’s IP Address. Then open the DHCP Client Table (it is under Status – > Local Network – > DHCP Server for Linksys routers). This shows a list of all devices connected to your wireless network including those of strangers.
How to Prevent Wi-Fi Theft

You can’t block the Wi-Fi signals from reaching your neighbor’s house but there are several things you may do to prevent them from piggybacking on your wireless network. Some of the well-known techniques to secure your Wireless network include:
Setup a password for your Wi-Fi network – Open your router’s admin dashboard and set the wireless security mode to either WPA, WPA2 or WEP (use WPA2-mixed if possible). Now people would have to know the password before they can join your Wi-Fi network.
Use MAC Address Filtering – Your laptop computer, mobile phone, tablet and all other gadgets have a unique MAC address. Go to your router’s dashboard and under the Wireless Mac Filter section, add the MAC addresses of all your known devices so that only whitelisted devices can access your wireless Internet.
Discourage Neighbors from using your Wireless Network

Most people in the neighborhood, who are connecting to your Wi-Fi network without permission, could be doing so unintentionally just because their computer showed them that an open wireless network in available in that area.


Mikko Hypponen has a brilliant idea to discourage such people from connecting to your wireless network.

You can rename your wireless network name, also known as SSIDs to something scary – like c:\virus.exe - and your neighbors are less likely to connect to your Wi-Fi network ever again. Other suggestions for scary SSID names include Police Van and Network Service Unavailable.

To change the SSID of your wireless router, log in to your router’s admin console and rename the network under Basic Wireless setting.

[*] Find the MAC Address of your devices

If you type “ipconfig /all” at the command prompt, you can easily find the MAC address of your computer’s network card – just look for the string “Physical Address.” The Wi-Fi Mac address of mobile devices is often listed on their Settings page.

The MAC Addresses are also listed inside the DHCP Client Table of your router.

What’s the IP Address of my Router?


Whether you are looking to upgrade the firmware of your router or need to secure your Wireless network with a password, you first need to know the exact IP address of the router in order to access the various settings.



Whether you are looking to upgrade the firmware of your existing router or need to further secure your Wireless network with an even stronger password, you first need to know the exact IP address of the router in order to access the various settings.

Now the default IP address of most routers is either 192.168.1.1 or 192.168.0.1 but in some cases – see example – you might have changed the default IP address at the time of installation and unfortunately, you do not remember that value any more.

Not a problem. There are at least two easy ways by which you can quickly determine the IP address of your router.

Option #1 – Go to Start – > Run and enter the following command in the Run box.cmd /k ipconfig

The IP address listed under “Default Gateway” is your router’s IP address

Option #2 – Open the Run box again and type the traceroute command as shown below:cmd /k tracert www.labnol.org


The IP Address listed at the first hop in the traceroute log is your router’s IP address.

If nothing works, you might have to reset the router to factory defaults and this will change its IP address back to 192.168.1.1 (Google the name of your router model for the exact value).

How to Connect Two Wireless Routers Together

This step-by-step guide describes how you can configure and connect two wireless routers together to extend the range of WiFi signal in your home network.

If you wish to extend the range of your Wifi network, you can purchase an additional wireless router and connect it to your existing router with an Ethernet cable.

The setup is pretty easy, inexpensive and the best part is that your two routers need not have to be from the same manufacturer so, for example, you can easily connect your Linksys (Cisco) router to a router from say Netgear or Belkin. For instance, I am using a 30m long Ethernet cable to connect my two routers – one is a Linksys WRT 160N (N based) and other one is a WRH54G (G based) and the setup works just perfect.
How to Connect One Router to Another

For this example, let’s assume that you have an OLD_ROUTER and a NEW_ROUTER.

Step a: Make sure your old router is working.
Connect the Broadband modem to your OLD_ROUTER’s Internet (WAN) port. Then connect the computer to one of the four available ports on your router through an Ethernet cable.
Make sure that the Internet connection is working on your computer and on your wireless devices.

Step b: Configure your new router

Most routers have an IP address of 192.168.1.1 so before you connect them, you need to ensure that they have been assigned two different IP addresses.
Shut down your OLD_ROUTER and the modem. Also unplug the Ethernet cable from the computer.
Plug the Ethernet cable into any of the numbered ports of NEW_ROUTER and connect the other end to your computer. Switch on the NEW_ROUTER.
Access the web dashboard of NEW_ROUTER (192.168.1.1) and change the local IP address to something like 192.168.2.1 so that there’s no conflict with the old router. Save the changes.
Test the SSID name of the new router and make sure it’s different from the old router. Also make sure that SSID broadcast is turned on. Save the changes.

Step c: Connect the two routers
Connect the modem to the Internet Port of the OLD_ROUTER.
Connect one of the number ports of OLD_ROUTER to your computer.
Connect another free port on the OLD_ROUTER to the Internet Port of your NEW_ROUTER using an Ethernet or LAN cable.

Important Points to remember
It is suggested that the length of the LAN cable connecting the two routers should not exceed 100m and that you should avoid having any joints in the cable. LAN cables are pretty cheap – I got a Cat5e cable for 25 ¢/m.
If you have a compatible router, I suggest upgrading the firmware to DD-WRT as that will slightly boost the wireless signal plus you’ll get access to tons of other settings in your router.
If you have enabled Wi-Fi security in your previous router, use the same settings in your new router as well.
It is important that you assign different SSIDs to the two routers else the same network name will appear twice in your wireless network connections window.
If you don’t remember the username of your router, try these combinations – root + admin, admin + admin, admin + password or admin (as username) and no password.Id

A Visual Guide to Computer Cables and Connectors

Computer cables can be confusing so here’s a visual guide that will help you identify cables, connectors and converters that came with your computers and other electronic gadgets.

Computer cables are confusing to most users. Here’s a visual guide to help you quickly identify all the common cable and connectors that came bundled with your computers, mobile phones and other electronic gadgets. You may also refer to this guide for ideas on how to hook different devices using commonly available connectors and converters.
Also see: Organize Computer Cables with Binder Clips
usb cable

1. USB Cables and Connectors

You can use USB cables to connect most new devices to your computer including flash memory sticks, portable media players, internet modems and digital cameras.
Computer accessories like mice, keyboards, webcams, portable hard-drives, microphones, printers, scanners and speakers can also be connected to the computer through USB ports. Additionally, USB cables are also used for charging a variety of gadgets including mobile phones or for transferring data from one computer to another.
usb symbolHow to recognize USB Cables – The standard USB connector, USB-A, is a rectangular connector. The USB-A end is present on every USB cable as it is the end that connects to your computer.
The other end of the USB cable may have different connectors including USB-B (a square connector commonly used with printers, external hard drives, and larger devices) or smaller connectors such as the Mini-USB and Micro-USB that are commonly used with portable devices such as media players and phones.
USB cable converters
Additionally, many other connectors have USB-A connectors at the end that connects to the computer, and a device-specific connector at the other end (e.g. the iPod or a Zune). Then you have USB Male to Female connectors for extending the length of a USB cable.
Many other non-USB cables can also connect to your computer via a USB converter; these cables have the standard USB-A connector on one end while the other end could have connections for other ports such as Ethernet or audio.

2. Audio Cables and Connectors

2.1 – 3.5mm headphone jack

Standard 3.5mm audio jack The most common audio cable is the standard headphone jack, otherwise known as a TSR connector. It is available in several sizes, but the most common ones used with computers are the 3.5 mm or 1/8″ mini audio jack.
Most speakers and microphones can connect to the computer with these audio cables. The microphone port on your computer is usually pink while the speaker port, where you insert the stereo audio cable, is colored green. Some computers have additional TSR audio ports colored black, grey, and gold; these are for rear, front, and center/subwoofer output, respectively.
trs connectorA larger variety of the TSR connector, 1/4″ TRS, is commonly used in professional audio recording equipment and it can be connected to a computer using an 1/4″ to 1/8″ converter (pictured right).

2.2 – Digital Optical Audio

For high-end audio, like when you want to connect the output of a DVD player or a set-top box to a Dolby home theater, you need the TOSLINK (or S/PDIF) connector.
toslink optical cable
These are fiber optic cables and can therefore transmit pure digital audio through light. Some laptops and audio equipment have a mini-TOSLINK jack but you can use a converter to connect it to a standard TOSLINK (Toshiba Link) port.

3. Video Cables

3.1 – VGA

One of the most common video connectors for computer monitors and high-definition TVs is the VGA cable. A standard VGA connector has 15-pins and other than connecting a computer to a monitor, you may also use a VGA cable to connect your laptop to a TV screen or a projector.
VGA cables and converters
Converter cables are lso available to let VGA monitors connect to newer computers that only output HDMI or DVI signals. A smaller variant of VGA, Mini-VGA, is available on some laptops but with the help of a converter, you can connect any standard VGA monitor to a Mini-VGA port of your laptop.
Related: How to Connect your Laptop to a TV Set

3.2 – DVI Monitor Port

dvi cableIf you have purchased a computer in the recent past, chances are that it uses DVI instead of VGA. The new breed of “thin” laptops use the smaller variants of DVI like the Mini-DVI and Micro-DVI (first seen in MacBook Air).
A DVI cable has 29 pins, though some connectors may have less pins depending on their configuration. DVI’s video signal is compatible with HDMI, so a simple converter can allow a DVI monitor to receive input from an HDMI cable.
Additionally, DVI to VGA converters are also available for connect your new graphics card to old monitor that supports only VGA mode.
s-video cable

3.3 – S-Video

S-Video cables, otherwise known as Separate Video or Super Video cables, carry analog video signals and are commonly used for connecting DVD players, camcorders, older video consoles to the television.
Standard S-Video connectors are round in shape and may have anywhere between 4-9 pins.

4. Audio and Video Cables

4.1 – RCA Connector Cables

RCA connector cables are a bundle of 2-3 cables including Composite Video (colored yellow) and Stereo Audio cables (red for right channel and white or black for the left audio channel).
RCA cables and connectors
Sometimes additional cables may be included, offering additional audio channels and/or component video instead of composite. Component video offers better picture than composite because the video signal is split in different signals while in the case of composite, everything is transferred through a single yellow plug.
Uses of RCA Connectors – The RCA cables are usually used for connecting your DVD player, stereo speakers, digital camera and other audio/video equipment to your TV. You can plug-in an RCA cable to the computer via a video capture card and this will let you transfer video from an old analog camcorder into your computer’s hard drive.

4.2 – HDMI Cables

hdmi cableHDMI is the new standard that provide both audio and video transmission through a single cable. HDMI support a maximum resolution of 4096×2160p (HD is only 1920×1200) with up to 8 channels of digital audio and are used for connecting Blu-Ray players to an HDTV.
Standard HDMI cables can be up to 5 meters long, but higher quality ones can be up to 15 meters long, and the length can be further increased with amplifiers. HDMI is backwards compatible with DVI so you can use a converter to watch video on a DVI device through the HDMI cable though you will have to use another cable for the audio.

4.3 – DisplayPort

DisplayPort - MacBookA combined digital video and audio cable that is more commonly used in computers is DisplayPort and the smaller derivative Mini DisplayPort. Both support resolutions up to 2560 × 1600 × 60 Hz, and additionally support up to 8 channels of digital audio.
Mini DisplayPort connector is currently used in MacBooks but we could them in other computers as well in the near future.
Standard DisplayPort cables can be up to 3 meters long, but at a lower resolution cables can be up to 15 meters long.  DisplayPort connectors are available to connect VGA, DVI video, or HDMI video and audio with a DisplayPort cable or connection.  Additionally, converters are available to convert Mini DisplayPort into standard DisplayPort.

5. Data Cables

firewire ieee 1394 5.1 – Firewire IEEE 1394

Firewire, otherwise known as IEEE 1394, i.LINK, or Lynx, is a faster alternate to USB and is commonly used for connecting digital camcorders and external hard drives to a computer. It is also possible to ad-hoc network computers without a router over FireWire.
Firewire typically has 6 pins in its connector, though a 4 pin variety is common as well.

5.2 – eSATA Cables

esata for hard drives While SATA cables are used internally for connecting the hard drive to the computer’s motherboard, eSATA cables are designed for portable hard drives, and can transfer data faster than USB or FireWire.
However, the eSATA cable cannot transmit power, so unlike USB, you cannot power an external hard drive with eSATA. The eSATA cable is somewhat different from the internal SATA cable; it has more shielding, and sports a larger connector.

6. Networking Related Cables

phone cable rj411

6.1 – Phone RJ11 Cable

The telephone cable, otherwise known as RJ11, is still used around the world for connecting to the Internet through DSL/ADSL modems. A standard phone cable has 4 wires and the connector has four pins.
The connector has a clip at the top to help maintain a tight connection.
ethernet cable rj45

6.2 – Ethernet Cable

Ethernet is the standard for wired networking around the world. The Ethernet cable, otherwise known as RJ45, is based on Cat5 twisted pair cable and is made from 8 individual wires.
The Ethernet connector, likewise, has 8 pins and looks similar to a phone plug, but is actually thicker and wider. It too has a clip to help maintain a tight connection like a phone connector.

How to Secure Your Wireless (Wi-Fi) Home Network


Learn how you can secure your wireless network fin simple steps. You can prevent hackers from intercepting your Wi-Fi network and also avoid casual users from using your wireless broadband connection.

This article describes how you can secure your Wireless Network from hackers and you’ll also learn about free tools that people generally use to intercept your Wi-Fi signals.


Wireless Networking (Wi-Fi) has made it so easy for you to use the computer, portable media player, mobile phones, video game consoles, and other wireless devices anywhere in the house without the clutter of cables.

With traditional wired networks, it is extremely difficult for someone to steal your bandwidth but the big problem with wireless signals is that others can access the Internet using your broadband connection even while they are in a neighboring building or sitting in a car that’s parked outside your apartment.

This practice, also known as piggybacking, is bad for three reasons:
It will increase your monthly Internet bill especially when you have to pay per byte of data transfer.
It will decrease your Internet access speed since you are now sharing the same internet connection with other users.
It can create a security hazard* as others may hack your computers and access your personal files through your own wireless network.

[*] What do the bad guys use - There have been quite a few instances where innocent Internet users have been arrested for sending hate emails when in reality, their email accounts where hacked though the unsecured Wi-Fi networks that they had at home. Wireshark is a free packet sniffing tool for Linux, Mac and Windows that can scan traffic flowing though a wireless network including cookies, forms and other HTTP requests.
How to Secure Your Wireless Network

The good news is that it is not very hard to make your wireless network secure, which will both prevent others from stealing your internet and will also prevent hackers from taking control of your computers through your own wireless network.

Here a few simple things that you should to secure your wireless network:
 
Step 1. Open your router settings page

First, you need to know how to access your wireless router’s settings. Usually you can do this by typing in “192.168.1.1” into your web browser, and then enter the correct user name and password for the router. This is different for each router, so first check your router’s user manual.

You can also use Google to find the manuals for most routers online in case you lost the printed manual that came with your router purchase. For your reference, here are direct links to the manufacturer’s site of some popular router brands – Linksys, Cisco, Netgear, Apple AirPort, SMC, D-Link, Buffalo, TP-LINK, 3Com, Belkin.

Step 2. Create a unique password on your router

Once you have logged into your router, the first thing you should do to secure your network is to change the default password* of the router to something more secure.

This will prevent others from accessing the router and you can easily maintain the security settings that you want. You can change the password from the Administration settings on your router’s settings page. The default values are generally admin / password.

[*] What do the bad guys use - This is a public database of default usernames and passwords of wireless routers, modems, switches and other networking equipment. For instance, anyone can easily make out from the database that the factory-default settings for Linksys equipment can be accessed by using admin for both username and password fields.

Step 3. Change your Network’s SSID name

The SSID (or Wireless Network Name) of your Wireless Router is usually pre-defined as “default” or is set as the brand name of the router (e.g., linksys). Although this will not make your network inherently* more secure, changing the SSID name of your network is a good idea as it will make it more obvious for others to know which network they are connecting to.

This setting is usually under the basic wireless settings in your router’s settings page. Once this is set, you will always be sure that you are connecting to the correct Wireless network even if there are multiple wireless networks in your area. Don’t use your name, home address or other personal information in the SSID name.

Also see: Change Network Name to Prevent Wi-Fi Theft

[*] What do the bad guys use - Wi-Fi scanning tools like inSSIDer (Windows) and Kismet (Mac, Linux) are free and they will allow anyone to find all the available Wireless Networks in an area even if the routers are not broadcasting their SSID name.

Step 4. Enable Network Encryption

In order to prevent other computers in the area from using your internet connection, you need to encrypt your wireless signals.

There are several encryption methods for wireless settings, including WEP, WPA (WPA-Personal), and WPA2 (Wi-Fi Protected Access version 2). WEP is basic encryption and therefore least secure (i.e., it can be easily cracked*, but is compatible with a wide range of devices including older hardware, whereas WPA2 is the most secure but is only compatible with hardware manufactured since 2006.

To enable encryption on your Wireless network, open the wireless security settings on your router’s configuration page. This will usually let you select which security method you wish to choose; if you have older devices, choose WEP, otherwise go with WPA2. Enter a passphrase to access the network; make sure to set this to something that would be difficult for others to guess, and consider using a combination of letters, numbers, and special characters in the passphrase.

[*] What do the bad guys use - AirCrack and coWPAtty are some free tools that allow even non-hackers to crack the WEP / WPA (PSK) keys using dictionary or brute force techniques. A video on YouTube suggests that AirCrack may be easily used to break WiFi encryption using a jail-broken iPhone or an iPod Touch.


How to Secure Your Wireless (Wi-Fi) Home Network


Step 5. Filter MAC addresses

Whether you have a laptop or a Wi-Fi enabled mobile phone, all your wireless devices have a unique MAC address (this has nothing to do with an Apple Mac) just like every computer connected to the Internet has a unique IP address. For an added layer of protection, you can add the MAC addresses of all your devices to your wireless router’s settings so that only the specified devices can connect to your Wi-Fi network.

MAC addresses are hard-coded into your networking equipment, so one address will only let that one device on the network. It is, unfortunately, possible to spoof a MAC address*, but an attacker must first know one of the MAC addresses of the computers that are connected to your Wireless network before he can attempt spoofing.

To enable MAC address filtering, first make a list of all your hardware devices that you want to connect to your wireless network**. Find their MAC addresses, and then add them to the MAC address filtering in your router’s administrative settings. You can find the MAC address for your computers by opening Command Prompt and typing in “ipconfig /all”, which will show your MAC address beside the name “Physical Address”. You can find the MAC addresses of Wireless mobile phones and other portable devices under their network settings, though this will vary for each device.

[*] What do the bad guys use - Someone can change the MAC address of his or her own computer and can easily connect to your network since your network allows connection from devices that have that particular MAC address. Anyone can determine the MAC address of your device wireless using a sniffing tool like Nmap and he can then change the MAC address of his own computer using another free tool like MAC Shift.

Step 6. Reduce the Range of the Wireless Signal

If your wireless router has a high range but you are staying in a small studio apartment, you can consider decreasing the signal range by either changing the mode of your router to 802.11g (instead of 802.11n or 802.11b) or use a different wireless channel.

You can also try placing the router under the bed, inside a shoe box or wrap a foil around the router antennas so that you can somewhat restrict the direction of signals.

Apply the Anti-Wi-Fi Paint – Researchers have developed a special Wi-Fi blocking paint that can help you stop neighbors from accessing your home network without you having to set up encryption at the router level. The paint contains chemicals that blocks radio signals by absorbing them. “By coating an entire room, Wi-Fi signals can’t get in and, crucially, can’t get out.”
 
Step 7. Upgrade your Router’s firmware

You should check the manufacturer’s site occasionally to make sure that your router is running the latest firmware. You can find the existing firmware version of your router using from the router’s dashboard at 192.168.*.
Connect to your Secure Wireless Network

To conclude, MAC Address filtering with WPA2 (AES) encryption (and a really complex passphrase) is probably the best way to secure your wireless network.

Once you have enabled the various security settings in your wireless router, you need to add the new settings to your computers and other wireless devices so that they all can connect to the Wi-Fi network. You can select to have your computer automatically connect to this network, so you won’t have to enter the SSID, passphrase and other information every time you connect to the Internet.

Your wireless network will now be a lot more secure and intruders may have a tough time intercepting your Wi-Fi signals.
Who is Connected to your Wireless Network

If you are worried that an outsider may be connecting to the Internet using your Wireless network, try AirSnare – it’s a free utility that will look for unexpected MAC addresses on your Wireless network as well as to DHCP requests. Another option is that you open your router’s administration page (using the 192.168.* address) and look for the DHCP Clients Table (it’s under Status > Local Network on Linksys routers). Here you will see a list of all computers and wireless devices that are connected to your home network.

*It is also a good idea to turn off the router completely when you are not planning to use the computer for a longer period (like when you are out shopping). You save on electricity and the door remains 100% shut for wireless piggybackers.

**If you ever want to let a new device connect to your network, you will have to find its MAC address and add it to your router. If you simple want to let a friend connect to your wireless network one time, you can remove his MAC address from the router settings when he or she leaves your place.

Find the Person Behind an Email Address


Cisco N/W Monitoring Tools By Compuage at Amazing Pricing Offer!

You get an email from a person with whom you have never interacted before and therefore, before you reply to that message, you would like to know something more about him or her. How do you do this without directly asking the other person?

Web search engines are obviously the most popular place for performing reverse email lookups but if the person you’re trying to research doesn’t have a website or has never interacted with his email address on public forums before, Google will probably be of little help.

No worries, here are few tips and online services that may still help you uncover the identity of that unknown email sender.

#1. Find the sender’s location





Now paste the IP address in this trace route tool and you should get a fairly good idea about the location of the email sender.

#2. Reverse email search with Facebook



Facebook has 450 million users worldwide and there’s a high probability that the sender may also have a profile on Facebook.

Unlike LinkedIn and most other social networks, Facebook lets you search users by email address so that should make your job simpler. Just paste the email address of the sender into the Facebook search box and you’ll immediately know if a matching profile exists in the network.

If you are able to locate that person on Facebook, download his profile picture and then upload it to Google Images (click the camera icon in the search box). This acts as a reverse image search engine so you can locate his other social profiles where he may have used the same picture.

#3. Check all the other Social Networks

You can use a service like Knowem to quickly determine if a profile with a particular username exists in any of the social networks.

If the email address of the send is something like green_peas@hotmail.com, there’s a probably that he or she may have created accounts of some other social network using the same alias “green_peas” – put that in knowem.com to confirm.

#4. People Search



Finally, if nothing works, you should try a people search service like Pipl and Spokeo – both services let you perform reverse email lookups but Spokeo has a more comprehensive database than Pipl.

Other than regular web documents, Spoke also scans social networks and even the whois information of domain names to find any bit of information associated with an email address. However, some of the results returned by Spokeo are only available to subscribers.





Know the email address of someone but nothing more? Learn techniques to help you uncover the location and other details of the email sender.

Java - MiniProject

Java - MiniProject - Car Sales System




Description :

This program is a simple car sales system, you can add cars with details such as kilometers travelled, price, manufacturer, model, and additional info. Stores the cars using good OO design. The program uses swing and is a GUI application. On exit the cars are saved to a data file named cars.dat in the same directory as the program. Next time the program is loaded it reads the data file and loads in all the cars. Serialisation is used for the reading and saving of the binary file. This program was for a university assignment. It's been graded so hopefully there is no problem with releasing it. It will hopefully teach a lot of things, like swing, awt events, layout managers, swing events, simple menu's, JDialog's, using JTabbedPane. It features a simple sorting algorithm which sorts strings in alphabetical order, and has an example of how you can invoke a method inside a object with only a reference to a object, and not knowing what class it belongs to. It's an alternative to using an interface i suppose. Teaches serialisation also, which is basically saving the contents of an entire object in a data file, which can easily be read back into the object next time the program is loaded. Code is commented using javadoc standards

Download: Click Here to download - MediaFire Link
Comment on clarifications.

Java - MiniProject - Hospital Management


Description:

Hospital Management. The administrator can register new employees and give the required rights to them. Room allocation, medicine, prescriptions, payments, etc will be controlled through this.

Download: Click Here to download - MediaFire Link

Comment on clarifications.

Java - MiniProject - File Split/Merge





Description:

Allows you to split any file into smaller (User defined) chunks and reassemble them. Packaged in class form with an example form interface. Provides information such as operation run time, # of file splits, and file size along with progress bars. Also documented with intellisense and regular comments. Forgot to mention the solution is VS 2008, but the code should copy into VS 2005. I'd appreciate any feedback or suggestions you might have and I plan to update it as time allows to add some verification and the ability to split multiple files at once.

Download: Click Here to download - MediaFire Link
Comment on clarifications.

Java - MiniProject - P2P Filesharing




Description:

Share mp3 and ogg Files Client-Server. A mp3- ogg-Player is integrated. Server with Login-Option, Data encrypted. Tested in Lan and Internet. Connect over Socket.(Multithread)
With resume canceled Downloads. Languages: German and English.

Download: Click Here to download - MediaFire Link

Comment on clarifications.

Java - MiniProject - MCQ Quiz Application





Description:


This code is an implementation of MCQ Quiz System. It was a requirement of my semester, I grabbed the maximum marks and now thought I should share this code with all of you. So that's why it is here now. The system is fully developed in core java and it uses multiple choice questions approach. It is a menu-based application and executes the operation based on user's choice as to be directly inputted in console.
This program uses a simple text file to store and manipulate questions. The questions are stored in CSV (Comma Separated Value) format. It maintains a very very simple data structure. First part meant for the question, the next four sections are four options to be given in console(in front of the user) and last part has the correct answer stored(it points to the element no. in the array of answers). The file "Questions.Txt" is also included in the zip. Anyone can use the file or create new or modify their own questions. The presentation of questions is fully dynamic. Presentation fully depends on the master file (which have the questions data stored). This file will be automatically created by the program if not found in the application path. It also displays the contest summary along with the correct answers of all questions answered wrongly at quiz's end. It has the pin-point focus on number of questions presented, answered or skipped. The program also computes accuracy percentage based on no. of correct answers. See the screenshot. I have put my effort to make it user-friendly and more-n-more dynamically. Personally I think, this code is a great example of Object Oriented Programming (OOPs).

Download: Click Here to download - MediaFire Link


Comment on clarifications.

Java - MiniProject - Networking Payroll System


Description:
A Detailed implementation of Payroll system - The DTR and Payroll System is Connected via Local area Network.
Download: Click Here to download - MediaFire Link

Comment on clarifications.

Java - MiniProject - Networking Library System


Description:
This Networking Library System system contain complete functionality of a Library and it can work on LAN network.


Download: Click Here to download - MediaFire Link


Comment on clarifications.

Java - MiniProject - Advanced Payroll System




Description:

This is complete Payroll Application including Printpreviw and printing also no need to make ODBC connection directly run anywhere.

Download: Click Here to download - MediaFire Link
Comment on clarifications.

Java - MiniProject - Basic Library System



Description:
A basic library inventory system. Ready to implement. Contains some major modules.

Download: Click Here to download - MediaFire Link
Comment on clarifications.

Java - MiniProject - Insertion Sort




Description:
About this code I called this one insertion sort it is another sorting algorithm in computer science that is widely used to sort numbers and strings. I created this program to give insights on how to use and how it works. I hope this will help somebody who wish to learn sorting algorithms using Java as their tool in software development.

Download: Click Here to download - MediaFire Link
Comment on clarifications.

Java - MiniProject - Shell Sort




Description:
This is another version of a sorting algoritm it is called Shell Sort. It was developed by Dr. Donald Shell an american computer scientist. It is one of the most efficient sorting algorithm that is widely used.

Download: Click Here to download - MediaFire Link

Comment on clarifications.

Java - MiniProject - Selection Sort



Description: This code is another sorting algorithm called selection sort written in Java.
Download: Click Here to download - MediaFire Link

Comment on clarifications.

Java - MiniProject - Hotel Reservation

 Hotel Reservation
Description:

This is a hotel reservation System with all the necessary properties.

Download: Click Here to download - MediaFire Link

Comment on clarifications.

Samsung GT-B9150 with Flexible Screen Specification and Reviews

The first rumors that this year Samsung may provide the first commercial device with flexible display appeared in the middle of last year and is actively developed at one time, but after it became unequivocally clear that this device will not be the future flagship of the company, Galaxy S IV, completely subsided. Well, then it’s time to start another revolution: smartphone with flexible screen can still be submitted, and they will become well known for benchmarks Samsung GT-B9150.


According to the latest unofficial information, the sale of this device can go under the trade name Samsung Galaxy Q. But, despite the possible presence of such incredible by modern standards, things like flexible display other characteristics were not the top-end:

• Dual Super AMOLED HD display with a resolution of 1920 x 1080 pixels
• dual-core Exynos 5250 processor with a clock frequency of 1.7 GHz
• 8 megapixel rear camera
• 2-megapixel front camera
• battery with 3500 mAh
• Android 4.2.1 Jelly Bean

Unfortunately, more details about the new device, we do not know, and the information available, to be honest, it sounds quite plausible. However, the same sources say that the device to see with their own eyes, we can have at the exhibition MWC 2013. Like it or not, we learn very soon – by the end of this month.

solve Problem with android soft brick while installing custom ROM ICS and revert to original rom

solve Problem with android soft brick while installing custom ROM ICS and revert to original rom

This is common Problem many android users facing Mostly android users with Gingerbread 2.3.6 Smartphone support only this version but we root the android and install Kernel version and Custom ROM ICS these version are not original there theme Pretends to be ICS

Recently i had a problem with my Samsung y dous S6102 Mobile i have rooted it and install a kernel version to increase my RAM and Internal Memory ….

Is this possible Many of as came across Surfing in internet regarding increasing Internal memory and RAM to increase system performance…

I did the procedure mentioned in forum.xda-developers.com

1.Just partition ur memory card in 3 parts 1st part with FAt32 2nd part with ext2 form internal memory extension
3rd part with Linux swap for RAm increase

this method can be used in all android mobiles with less internal memory like Samsung vibrant Samsung galaxy and mini

2.Next install following apps in ur android device Link2sd ,a2sd and swapper for additional information please refer above procedure mentioned in forum.xda-developers.com

There was no problem with this procedure all went correct and working fine …

i thought of upgrading my OS to ICS since i have increased my internal memory…

So installed custom ROM named Fusion

This OS was not nice and i am not satisfied so tried to revert my ROM back to original gingerbread 2.3.6 ..
i have tried Wipe data /factory reset and wipe Cache partition through CWM Clockworkmod recovery

But this time my Android device got brick and not able to start up . when i power on my device it shows on Samsung logo there was not further move…. i got scared since i have rooted my mobile so void the warranty .

Never ever try to install any custom ROM all waste with use when u meet such a problem i was searching in net and got some procedure such as install original custom rom form samsung Os website using ODIN software.. not kies ..

I have try this also Since i have installed custom Kernel Rom i was not able to solve this original ROM installation also…

I went to samsung Customer care they did a simple step and got my phone worked no installation required..

Just Clear all custom rom and data with simple step. remove ur memory card …..

1.Press POwer On +Menu and Volume Up button android system mode recovery appears


2.Select wipe data /factory reset and android clear some process and restarts now again samsung logo only shows
No panic..

3.Again switch off ur device and ON in android recovery mode by press above combination keys..
Now select wipe cache partition..

now again android device restarts..

Wowo this time to got back ur Original Os ……. If u still find only logo displays put ur mobile off by removing battery and put back again without power on put it undisturbed for 1hr or more and do the Step 2 and 3 again.. every android Original device has internal small battery for emergency cases …

mobile will work instruction give my Samsung customer care but he doesn’t said my to root my device again.
Hope this work for u also friends

Problems with Google Android

Believe it or not, Google doesn't care a damn about Android. Why should they? It's not their primary product compared to Apple/Blackberry/Nokia! Google Search is! Android is just a fun project for them with a bunch of investment as a throw away. Remember the time when Google wanted to have Android as an Independent company? Remember how Google didn't pay lot of attention to the sale of Google Nexus One and finally shut the production?

Here are some clearly visible problems with Android and why it's not still the best in the market.

1. No Liability.

Google doesn't want to take responsibility of filtering quality apps. As you read this, there are 300k apps in iTunes, 250k+ on Android, 50-80k on Blackberry and so on. None of the Android developers will disagree with me if I say that 80% of the Android apps are useless. Where is the Quality? People launch apps just to promote their own product?!

Hello! There is something called as HTML 5 and Mobile Web for that! But why would Google care for an orphan?

2. Lack of Interest:

I have seen the forums. There are teams who answer questions related to problems but the entire thing is so slow and there is no fun involved. Developers are not excited about asking questions for the appstore.

3. Google Market:

The market is a big thumb down. I don't like it at all. Let us take some examples:

A. Android Publisher Accounts has Big Problems:

There's always some maintenance or upgrades or something or the other not working. Especially in last couple of months this has increased.

B. The Publisher Account is a ONE MAN ARMY:

Let's say you have a team, OH NO, Market doesn't allow teaming concepts. It's linked to your primary account. How on earth Google assumes the app publishers will hand over their primary account password to the developers to upload and maintain the apps? Companies launch 2-3 apps weekly and it's a big problem for us to convince clients to send their Google Password. This is surely not expected out of Google. To top it, our clients think we do not know our stuff!

C. Merchant Accounts:

Well Google, Did you know how many Android developers are there in India? Atleast far more than what you think. For those of you who didn't know this. Google doesn't allow Paid apps in India and many other countries. Such a pity!

D. Ratings/ Comments:

People keep commenting in and out. Negative comments on competitor products. A good product turns evil! One cannot even mark a comment as SPAM!

E. Free Apps to Paid Apps Switching Not Possible:

What if I want to offer my App free for a few days during holiday season? What if I want to run a promotion campaign?


Problems with Google Android

F. Copy Protection:

Google missed out the long term thinking here. They have this feature of now allowing the apps to move from internal memory to SDCard. It was made to ensure that apps aren't copied. Hey Google, didn't you know ROOTed devices does that anyway. Obviously if someone wants to copy will copy it anyhow! But look at the negative side? There are devices with just 128MB of internal memory. How do you expect these devices to run apps out of internal memory?

G. No limelight for New Apps:

Google android store has become a place where there is no room for fresh apps. Whenever you open the Google Market, you'll see top free/top paid etc and on the last is new releases. This is not the case with Apple iOS. Apple ensures that new apps do come on limelight by presenting the user with this screen first. As a result of this silly thing which Google fails to understand, the top apps keep topping all the time and there is very less scope for new apps to come on limelight.

I. Google doesn't Earn from Apps:

They earn from selling support for their Android OS. There are 100s of manufacturers today who go to google for customizing their OS in the way they like it. Samsung and HTC are top ones. Google makes good money with this and they're just not bothered about retail consumer markets.

Android Tip's & Trick's

How to Switch between Open Apps
How to Close a Running App
How to Set and Clear a Default App
How to Uninstall an App
How to Add and Remove Icons from Home Screens
How to Send Instant Messages
How to Edit Bookmarks and Folders in Android's Bro...
How to Add a Web Clip Icon to Home Screen
How to Access Notifications
How to Select Wallpapers for your Android
How to Print Screen
How to Lock Screen Orientation
How to Turn Off Auto-Correction
How to Cut, Copy and Paste
How to Type Special Characters
How to Create, Rename and Remove Folders
How to Type Special Characters
How to Re-arrange Icons
Enjoy your Android Experience Over-the-Air Using y...
How to Copy Files between your Mobile and PC
How to Browse and Edit Files on your Mobile
How to Share Mobile Data Connection
How to Sync Emails, Contacts and Calendars
How to Backup and Restore your Data
How to Add a Mail Signature
How to Lock your Android Device & How to Reboot th...
How to Setup Mail Accounts and Sync Options

How to Setup Mail Accounts and Sync Options

The Android system allows for adding multiple mail accounts including GMail, Exchange, Yahoo, Hotmail and others. To set up a mail account is straightforward especially for this example, GMail.
Open the app Email.
Enter Email address and Password, then tap 'Next' for verifying.
Leave 'Sync email form this account' checked, select other options you like, and tap 'Next'.
Enter your name to be displayed on outgoing messages, and tap 'Next' to finish.

After this setting, you can then open the app Email to send emails and read incoming mails, which are automatically synced with your GMail account over the air.

How to Lock your Android Device & How to Reboot the System

How to Lock your Android Device

Don't like your kids to mess with your mobile or someone to read your emails on your device? Lock it with a password, pin, pattern or even use Face Unlock.
Open the app Settings and select 'Security' under PERSONAL.
Select 'Screen lock' under SCREEN SECURITY.
Tap a type of security either Pattern, Pin, Password or Face Unlock to lock your device.

Each time when your device is turned on, you'll have to use the same security type to access your device.


How to Reboot the System

In the event your Android apps freeze or the system becomes unresponsive, you can try to reboot the system as follows:
Press and hold the Power button of your device until a pop-up menu appears. Select 'Power off' and tap 'OK' to confirm. The system will then turn off.
Turn the system on by pressing and holding the Power button until the Google logo appears.

How to Add a Mail Signature


Each time you send out an email using the Email app, you can have a mail signature, such as 'Sent from my mobile device', automatically added at the end of your message.
Open the app Email, tap the Menu button, then Settings.
Tap the email account that you've set up.
Tap 'Signature', enter a signature in a few words you like then tap 'OK' to confirm.





adults africa amici amicizia amore art business children climatechange confusione culture developmentdonne education environment festa film for free globalwarming health international internet libri life media musicanational news paura peace pensieri personal pieces politics posts pueblosoriginarios racconti ricordiriflessioni sogni sport technology uncategorized università updates varie video vita world youtyouth бог духовное истина

Organizations // Events // Toolkits & Publications 

activism africa aids art canada children community culture development education empowerment environment global health hivhiv/aids humanrights international leadership media music peace poverty quebec sustainability technology volunteer women world youth 

Organizations // Events // Toolkits & Publications 

activism africa aids art canada children community culture development education empowerment environment global health hivhiv/aids humanrights international leadership media music peace poverty quebec sustainability technology volunteer women world youth 

Take Action

Commitments
 // Projects // Petitions 

change children climate climatechange culture democracy earth education energy environment freedom globalhealth help human humanrights learning life love peace people poverty ramziabdou reduce respect volunteer water women worldyouth 
Make Connections 

Groups
africa culture daily education environment equity from global health home humanrights international internetlife make makemoney makemoneyonline media money online opportunities opportunity payment peace rights technologyvolunteer work world youth GlobalGallery // Panorama // TIG Blogs abstract africancrafts aids angels art belonging children china climatechange culture drawingenvironment food globalangels globalwarming graphics hiv hiv/aids hope hungary landscape love naturepainting paintings peace stilllife sunset teenegers youth