Posts by Kush Sharma

I am Kush Kumar Sharma, a student of BCA , designer, developer and a guitarist, who loves to experiment things and passionate in growing my skills. Softnuke is my playground where i can share my thoughts and techniques with others. If you have any idea, suggestion, question, anything just drop me an email. I would love to check it out. Thanks for stopping by. :)

Android : The best music player out there

This music player unlocks a whole new world for mobile audiophiles, including a 10 band equalizer, greatly expanded file support, and a somewhat customizable interface. Ever since Gingerbread days till now, Poweramp continues to be the most powerful music player for Android and has a huge fan following.

What works well on Poweramp

The interface is somewhat similar to the stock music app, but it unlocks several new features for advanced playback that should meet just about any need you might have on your phone or tablet. For example, instead of just using a long, nested set of commands, you can give quick commands like swiping to navigate playlists quickly.

Title Screen

Oh how wonderful the file support is. While listening to FLAC files on your mobile device is a little silly when you think about it (as most phones don’t have a good digital to analog converter chip), being able to equalize your music while listening on the go is fantastic if your music tastes vary. If you have great headphones to match, this is a fantastic way to bring out the best in your music when you’re on the go. As another plus, this app doesn’t seem to chew through as much battery as other music players do.

lockscreen

Lock Screen

Interface and Features

Once installed, you’re presented with a clean and easy to use interface. The UI is extremely novice-friendly giving you oversized media . Your music can be sorted according to the usual artist, album categories or you can choose folder view, which shows you all your music the way you have copied it on your phone. Tapping on this takes you to the playlist from where you can switch folders. The album art area also houses the shuffle and repeat toggle buttons along with a five star rating system.

Library

What makes Poweramp one of the most sought after music player is the long list of audio formats supported. The list includes mp3, mp4/m4a (including alac), ogg, wma, flac, wav, ape, wv, tta, mpc, aiff, which covers pretty much every format you can find audio in these days. The ability to customise the sound is also very extensive. We start off with a 10-band graphic equaliser that can be used to fine tune your music depending on what genre of songs you listen to the most. There are plenty of presets as well and you can also use the sound enhancements (like Dolby or HTC FX) that come with some phones in Poweramp. Besides that, you also have the option to adjust the bass and treble separately along with a volume limiter. You can also add extra effects like Stereo eXpansion, mono mixing and adjust the balance. Every change you make is noticeable provided you have a good pair of headphones. Other features include support for crossfading, gapless playback, queuing system, ability to update missing album art and even download lyrics of the song through the musiXmatch plugin.

Pros & Cons:

Pros

  • One of the best fully featured Android music players
  • Features equalizer for custom or premade presets
  • Super slick user interface with themes

Cons

  • Cannot play Podcasts

Performance

With the right pair of headphones, the audio quality is really good and beats any other player in the market. The equaliser and or audio effects make a huge impact on the audio quality and you can actually make out the difference between mp3 and flac files. One neat feature is the ability to parse .cue and m3u files. If you download radio shows, especially trance music, you’ll often come across one single file that’s an hour long. Cue and m3u files help breakdown this singular file into individual tracks so you can skip to the one you want without having to split the track physically. Gapless playback support is also present for albums that feature it.

EqualizerYou also get plenty of widgets for your homescreen to choose from, including a very nice lockscreen widget. You can customise the amount of information to be displayed on the lockscreen widget too, from album art to equaliser controls. Poweramp also gives you the option to change the theme. You get a bunch of them by default and you can even install third party themes from the Play Store. One feature that we feel should be added is a social component. Apps like MixZing allow you to play your music from your library as well as search for trending tracks around the globe. You can even see what your friends are listening to at the moment and rate songs so your friends can find them.

 

Verdict : Worth the download?

If you want to milk a better audio experience out of your mobile device and don’t want to carry around all sorts of unnecessary clutter like external amps in your pocket, this app is a good way to start consolidating your devices into one unit. Poweramp is available for as little as Rs129 for the full version, which makes it extremely good value. The app is compatible with Android v2.1 and upwards and is constantly being updated with bug fixes and support for the latest version of Android. If you have an Android phone and want to experiment with its audio, Poweramp is the most popular audio app in the Play Store for a reason and we strongly suggest you ditch the stock player for Poweramp.

Get it on Play Store

Fed up with ads everywhere ? Learn how to get rid of them

If you wanna remove those nasty ads from the pages which waste lot of time and bandwidth then here is something for you I believe will help you a lot.  This is done without using any software.

How it works

It’s possible to set up a name server as authoritative for any domain you choose, allowing you to specify the DNS records for that domain. You can also configure most computers to be sort of mini-nameservers for themselves, so that they check their own DNS records before asking a nameserver. Either way, you get to say what hostname points to what IP address. If you haven’t guessed already, the way you block ads it to provide bogus information about the domains we don’t want to see – i.e., all those servers out there that dedicate their existence to spewing out banner ads.

completely fake ad

The hosts file

Probably the most common way people block ads like this is with something called the “hosts file”. The hosts file is a simple list of hostnames and their corresponding IP addresses, which your computer looks at every time you try and contact a previously unknown hostname. If it finds an entry for the computer you’re trying to reach, it sets the IP address for that computer to be whatever’s in the hosts file.

127.0.0.1 is a special IP address which, to a computer, always means that computer. Any time a machine sends a network request to 127.0.0.1, it is talking to itself. This is very useful when it comes to blocking ads, because all we have to do is specify the IP address of any ad server to be 127.0.0.1. And to do that, all we have to do is edit the hosts file. What will happen then is something like this:

1. You visit a web page

2. The web page contains a banner ad stored on the server “ads.example.com”

3. Your computer says “ads.example.com? never heard of it. wait a second, let’s see if I’ve got the number on me…”

4. Your computer finds its hosts file and checks to see if ads.example.com is listed

5. It finds the hostname, which points to 127.0.0.1

6. “Great”, says the computer, and sends off a request to 127.0.0.1 for the banner ad that’s supposed to be on the page

7. “oh”, says the computer, and fails to show anything because it just sent a request to itself for a banner ad

 

Where’s my hosts file?

* Windows 95 / 98 / ME: C:\Windows (I think)

* Windows NT: C:\WinNT\hosts

* Windows 2000: C:\WinNT\system32\drivers\etc\

* Windows XP: C:\Windows\System32\drivers\etc

* Windows 7: C:\Windows\System32\drivers\etc

* FreeBSD / Linux / Mac OS X / Unixish operating systems: /etc/hosts

* Classic Mac OS: please read this helpful information submitted by David “iNerd” B

* Mac OS 9: Marcia Skidmore sent in details that hopefully explain what you need to know

 

Note: Windows 7/8 users might want to open a notepad with administrator rights then edit the host file, without it an error with not enough permission will going to pop up.

The format of the hosts file is very simple – IP address, whitespace, then a list of hostnames (except for older Macs; please see above). However, you don’t need to know anything about the format if you don’t want to as you can just view the list hosts file.

Of course, that’s not the only way to use the list, but it’s probably the most simple for most people.

Here is the hosts list which are serving you the ads just append it to your hosts file and enjoy ad free surfing makes things faster. If you want ad from certain site then just remove it from the list below.

You have to copy all these domain names from here and paste at the end of your hosts file. Here is a text file if you are lazy enough and dont want to copy all of them.

 

127.0.0.1 007arcadegames.com

127.0.0.1 101order.com

127.0.0.1 123banners.com

127.0.0.1 123found.com

127.0.0.1 180searchassistant.com

127.0.0.1 180solutions.com

127.0.0.1 247media.com

127.0.0.1 247realmedia.com

127.0.0.1 24pm-affiliation.com

127.0.0.1 2log.com

127.0.0.1 2o7.net

127.0.0.1 4affiliate.net

127.0.0.1 4d5.net

127.0.0.1 7adpower.com

127.0.0.1 911promotion.com

127.0.0.1 a-counter.kiev.ua

127.0.0.1 a.consumer.net

127.0.0.1 a.gismeteo.ru

127.0.0.1 a.mktw.net

127.0.0.1 a.r.tv.com

127.0.0.1 a.xanga.com

127.0.0.1 a32.g.a.yimg.com

127.0.0.1 aaddzz.com

127.0.0.1 abcnews.footprint.net

127.0.0.1 abetterinternet.com

127.0.0.1 abz.com

127.0.0.1 ac.rnm.ca

127.0.0.1 accelerator-media.com

127.0.0.1 accipiter.speedera.net

127.0.0.1 action.ientry.net

127.0.0.1 actionsplash.com

127.0.0.1 actualdeals.com

127.0.0.1 ad-annex.com

127.0.0.1 ad-flow.com

127.0.0.1 ad-images.suntimes.com

127.0.0.1 ad-logics.com

127.0.0.1 ad-rotator.com

127.0.0.1 ad-server.gulasidorna.se

127.0.0.1 ad-souk.com

127.0.0.1 ad-space.net

127.0.0.1 ad-tech.com

127.0.0.1 ad-universe.com

127.0.0.1 ad-up.com

127.0.0.1 ad.100.tbn.ru

127.0.0.1 ad.37.com

127.0.0.1 ad.4web.cz

127.0.0.1 ad.71i.de

127.0.0.1 ad.a8.net

127.0.0.1 ad.abcnews.com

127.0.0.1 ad.abctv.com

127.0.0.1 ad.about.com

127.0.0.1 ad.aboutit.de

127.0.0.1 ad.aboutwebservices.com

127.0.0.1 ad.aftonbladet.se

127.0.0.1 ad.allstar.cz

127.0.0.1 ad.altervista.org

127.0.0.1 ad.asap-asp.net

127.0.0.1 ad.bondage.com

127.0.0.1 ad.centrum.cz

127.0.0.1 ad.cgi.cz

127.0.0.1 ad.chip.de

127.0.0.1 ad.clix.pt

127.0.0.1 ad.digitallook.com

127.0.0.1 ad.directconnect.se

127.0.0.1 ad.disney.go.com

127.0.0.1 ad.domainfactory.de

127.0.0.1 ad.dvdforum.nu

127.0.0.1 ad.e-kolay.net

127.0.0.1 ad.e-not.net

127.0.0.1 ad.eurosport.com

127.0.0.1 ad.ezpeer.com

127.0.0.1 ad.fido.net

127.0.0.1 ad.fragzone.se

127.0.0.1 ad.free6.com

127.0.0.1 ad.grafika.cz

127.0.0.1 ad.harmony-central.com

127.0.0.1 ad.hbv.de

127.0.0.1 ad.howstuffworks.com

127.0.0.1 ad.hyena.cz

127.0.0.1 ad.iinfo.cz

127.0.0.1 ad.ilse.nl

127.0.0.1 ad.img.yahoo.co.kr

127.0.0.1 ad.infoseek.com

127.0.0.1 ad.investopedia.com

127.0.0.1 ad.ir.ru

127.0.0.1 ad.itmedia.co.jp

127.0.0.1 ad.jetsoftware.com

127.0.0.1 ad.keenspace.com

127.0.0.1 ad.krutilka.ru

127.0.0.1 ad.leadcrunch.com

127.0.0.1 ad.linx.cz

127.0.0.1 ad.liveinternet.ru

127.0.0.1 ad.lupa.cz

127.0.0.1 ad.mediastorm.hu

127.0.0.1 ad.mgd.de

127.0.0.1 ad.moscowtimes.ru

127.0.0.1 ad.musicmatch.com

127.0.0.1 ad.mwizard.net

127.0.0.1 ad.nachtagenten.de

127.0.0.1 ad.nozonedata.com

127.0.0.1 ad.nrk.no

127.0.0.1 ad.pbs.bb.ru

127.0.0.1 ad.playground.ru

127.0.0.1 ad.preferances.com

127.0.0.1 ad.rambler.ru

127.0.0.1 ad.reunion.com

127.0.0.1 ad.seznam.cz

127.0.0.1 ad.simgames.net

127.0.0.1 ad.spieletips.de

127.0.0.1 ad.suprnova.org

127.0.0.1 ad.surfsecret.com

127.0.0.1 ad.sweclockers.com

127.0.0.1 ad.t2t2.com

127.0.0.1 ad.tbn.ru

127.0.0.1 ad.tiscali.com

127.0.0.1 ad.tisnet.net.tw

127.0.0.1 ad.tomshardware.com

127.0.0.1 ad.top50.to

127.0.0.1 ad.tv2.no

127.0.0.1 ad.tweakpc.de

127.0.0.1 ad.uk.tangozebra.com

127.0.0.1 ad.uol.com.br

127.0.0.1 ad.usatoday.com

127.0.0.1 ad.way.cz

127.0.0.1 ad.wz.cz

127.0.0.1 ad.yadro.ru

127.0.0.1 ad.yieldmanager.com

127.0.0.1 ad.yourmedia.com

127.0.0.1 ad01.mediacorpsingapore.com

127.0.0.1 ad1.emediate.dk

127.0.0.1 ad1.gamezone.com

127.0.0.1 ad1.hardware.no

127.0.0.1 ad1.kde.cz

127.0.0.1 ad1.lbe.ru

127.0.0.1 ad1.outpost.com

127.0.0.1 ad1.zendmedia.com

127.0.0.1 ad2.atlas.cz

127.0.0.1 ad2.bb.ru

127.0.0.1 ad2.insitemedia.hu

127.0.0.1 ad2.lbe.ru

127.0.0.1 ad2.linx.cz

127.0.0.1 ad2.linxcz.cz

127.0.0.1 ad2.lupa.cz

127.0.0.1 ad2.mamma.com

127.0.0.1 ad2.seznam.cz

127.0.0.1 ad2.tisnet.net.tw

127.0.0.1 ad3.tisnet.net.tw

127.0.0.1 ad4.atlas.cz

127.0.0.1 ad4.tisnet.net.tw

127.0.0.1 ad41.atlas.cz

127.0.0.1 ad4ex.com

127.0.0.1 adbanner.ro

127.0.0.1 adboost.de.vu

127.0.0.1 adbot.com

127.0.0.1 adbot.theonion.com

127.0.0.1 adbrite.com

127.0.0.1 adbureau.net

127.0.0.1 adbutler.com

127.0.0.1 adbutler.de

127.0.0.1 adcell.de

127.0.0.1 adcenter.mdf.se

127.0.0.1 adcenter.net

127.0.0.1 adcentriconline.com

127.0.0.1 adcept.net

127.0.0.1 adclick.com

127.0.0.1 adclick.gamespy.com

127.0.0.1 adclick.mint.se

127.0.0.1 adclick.ro

127.0.0.1 adclient.rottentomatoes.com

127.0.0.1 adclient1.tucows.com

127.0.0.1 adcomplete.com

127.0.0.1 adcontent.gamespy.com

127.0.0.1 adcontroller.unicast.com

127.0.0.1 adcreative.tribuneinteractive.com

127.0.0.1 adcycle.com

127.0.0.1 adcycle.icpeurope.net

127.0.0.1 addcontrol.net

127.0.0.1 addesktop.com

127.0.0.1 addfreestats.com

127.0.0.1 addme.com

127.0.0.1 addynamix.com

127.0.0.1 adengage.com

127.0.0.1 adext.inkclub.com

127.0.0.1 adfarm.mediaplex.com

127.0.0.1 adfiles.api.no

127.0.0.1 adflight.com

127.0.0.1 adfly.com

127.0.0.1 adhostcenter.com

127.0.0.1 adi.mainichi.co.jp

127.0.0.1 adimage.asiaone.com.sg

127.0.0.1 adimages.been.com

127.0.0.1 adimages.carsoup.com

127.0.0.1 adimages.go.com

127.0.0.1 adimages.homestore.com

127.0.0.1 adimages.sanomawsoy.fi

127.0.0.1 adimg.cnet.com

127.0.0.1 adimg.com.com

127.0.0.1 adimg1.chosun.com

127.0.0.1 adimgs.sapo.pt

127.0.0.1 adincl.gopher.com

127.0.0.1 adition.de

127.0.0.1 adition.net

127.0.0.1 adjuggler.yourdictionary.com

127.0.0.1 adlegend.com

127.0.0.1 adlink.de

127.0.0.1 adlog.com.com

127.0.0.1 adlogix.net

127.0.0.1 adm.ad.asap-asp.net

127.0.0.1 adman.freeze.com

127.0.0.1 admanagement.ch

127.0.0.1 admanager.beweb.com

127.0.0.1 admanager.btopenworld.com

127.0.0.1 admanager.carsoup.com

127.0.0.1 admanager.persianblog.com

127.0.0.1 admaximize.com

127.0.0.1 admedia.ro

127.0.0.1 admeta.com

127.0.0.1 admex.com

127.0.0.1 adminder.com

127.0.0.1 adminshop.com

127.0.0.1 admonitor.com

127.0.0.1 admonitor.net

127.0.0.1 admotion.com.ar

127.0.0.1 adnet.biz

127.0.0.1 adnews.maddog2000.de

127.0.0.1 ado.internet.cz

127.0.0.1 adorigin.com

127.0.0.1 adpepper.dk

127.0.0.1 adpick.switchboard.com

127.0.0.1 adprofile.net

127.0.0.1 adprojekt.pl

127.0.0.1 adpush.dreamscape.com

127.0.0.1 adq.nextag.com

127.0.0.1 adremedy.com

127.0.0.1 adremote.pathfinder.com

127.0.0.1 adrenaline.cz

127.0.0.1 adrenalinesk.sk

127.0.0.1 adreporting.com

127.0.0.1 adres.internet.com

127.0.0.1 adrevolver.com

127.0.0.1 adrevolver.holzmannverlag.de

127.0.0.1 adriver.ru

127.0.0.1 adroar.com

127.0.0.1 adrotate.de

127.0.0.1 adrotator.net

127.0.0.1 ads-205.quarterserver.de

127.0.0.1 ads-de.spray.net

127.0.0.1 ads.100asians.com

127.0.0.1 ads.5ci.lt

127.0.0.1 ads.aceweb.net

127.0.0.1 ads.adshareware.net

127.0.0.1 ads.adultfriendfinder.com

127.0.0.1 ads.advance.net

127.0.0.1 ads.adverline.com

127.0.0.1 ads.affiliates.match.com

127.0.0.1 ads.allsites.com

127.0.0.1 ads.alwayson-network.com

127.0.0.1 ads.amazingmedia.com

127.0.0.1 ads.amdmb.com

127.0.0.1 ads.aol.com

127.0.0.1 ads.as4x.tmcs.net

127.0.0.1 ads.asia1.com.sg

127.0.0.1 ads.asiafriendfinder.com

127.0.0.1 ads.aspalliance.com

127.0.0.1 ads.battle.net

127.0.0.1 ads.belointeractive.com

127.0.0.1 ads.berlinonline.de

127.0.0.1 ads.betanews.com

127.0.0.1 ads.bfast.com

127.0.0.1 ads.bigcitytools.com

127.0.0.1 ads.bigfoot.com

127.0.0.1 ads.billiton.de

127.0.0.1 ads.bitsonthewire.com

127.0.0.1 ads.blick.ch

127.0.0.1 ads.bloomberg.com

127.0.0.1 ads.bluemountain.com

127.0.0.1 ads.box.sk

127.0.0.1 ads.businessweek.com

127.0.0.1 ads.canalblog.com

127.0.0.1 ads.canoe.ca

127.0.0.1 ads.cavello.com

127.0.0.1 ads.cbc.ca

127.0.0.1 ads.cdfreaks.com

127.0.0.1 ads.centraliprom.com

127.0.0.1 ads.cgnetworks.com

127.0.0.1 ads.channel4.com

127.0.0.1 ads.cimedia.com

127.0.0.1 ads.clearchannel.com

127.0.0.1 ads.collegclub.com

127.0.0.1 ads.com.com

127.0.0.1 ads.currantbun.com

127.0.0.1 ads.cyberfight.ru

127.0.0.1 ads.cybersales.cz

127.0.0.1 ads.danworld.net

127.0.0.1 ads.datingyes.com

127.0.0.1 ads.dbforums.com

127.0.0.1 ads.ddj.com

127.0.0.1 ads.deltha.hu

127.0.0.1 ads.dennisnet.co.uk

127.0.0.1 ads.desmoinesregister.com

127.0.0.1 ads.detelefoongids.nl

127.0.0.1 ads.developershed.com

127.0.0.1 ads.deviantart.com

127.0.0.1 ads.digitalmedianet.com

127.0.0.1 ads.digitalpoint.com

127.0.0.1 ads.directionsmag.com

127.0.0.1 ads.discovery.com

127.0.0.1 ads.dk

127.0.0.1 ads.dmk-internet.com

127.0.0.1 ads.e-planning.net

127.0.0.1 ads.edbindex.dk

127.0.0.1 ads.einmedia.com

127.0.0.1 ads.erotism.com

127.0.0.1 ads.esmas.com

127.0.0.1 ads.eu.msn.com

127.0.0.1 ads.eudora.com

127.0.0.1 ads.exhedra.com

127.0.0.1 ads.ezboard.com

127.0.0.1 ads.fairfax.com.au

127.0.0.1 ads.filmup.com

127.0.0.1 ads.firingsquad.com

127.0.0.1 ads.flooble.com

127.0.0.1 ads.floridatoday.com

127.0.0.1 ads.fool.com

127.0.0.1 ads.forbes.com

127.0.0.1 ads.forbes.net

127.0.0.1 ads.forium.de

127.0.0.1 ads.fortunecity.com

127.0.0.1 ads.foxkidseurope.net

127.0.0.1 ads.freecity.de

127.0.0.1 ads.freeze.com

127.0.0.1 ads.friendtest.com

127.0.0.1 ads.ft.com

127.0.0.1 ads.g4techtv.com

127.0.0.1 ads.game.net

127.0.0.1 ads.gamecity.net

127.0.0.1 ads.gamecopyworld.no

127.0.0.1 ads.gameforgeads.de

127.0.0.1 ads.gamershell.com

127.0.0.1 ads.gamespy.com

127.0.0.1 ads.gamespyid.com

127.0.0.1 ads.gamigo.de

127.0.0.1 ads.gawker.com

127.0.0.1 ads.gettools.com

127.0.0.1 ads.globeandmail.com

127.0.0.1 ads.gotfrag.com

127.0.0.1 ads.goyk.com

127.0.0.1 ads.grindinggears.com

127.0.0.1 ads.guardian.co.uk

127.0.0.1 ads.guardianunlimited.co.uk

127.0.0.1 ads.hbv.de

127.0.0.1 ads.heartlight.org

127.0.0.1 ads.herald-sun.com

127.0.0.1 ads.hollywood.com

127.0.0.1 ads.humorbua.no

127.0.0.1 ads.iafrica.com

127.0.0.1 ads.iboost.com

127.0.0.1 ads.icq.com

127.0.0.1 ads.ign.com

127.0.0.1 ads.imdb.com

127.0.0.1 ads.img.co.za

127.0.0.1 ads.indya.com

127.0.0.1 ads.indystar.com

127.0.0.1 ads.inetfast.com

127.0.0.1 ads.inetinteractive.com

127.0.0.1 ads.infi.net

127.0.0.1 ads.infospace.com

127.0.0.1 ads.internic.co.il

127.0.0.1 ads.inthemix.com.au

127.0.0.1 ads.ipowerweb.com

127.0.0.1 ads.isoftmarketing.com

127.0.0.1 ads.itv.com

127.0.0.1 ads.iwon.com

127.0.0.1 ads.jimworld.com

127.0.0.1 ads.jpost.com

127.0.0.1 ads.jubii.dk

127.0.0.1 ads.katz.ws

127.0.0.1 ads.kinobox.cz

127.0.0.1 ads.krawall.de

127.0.0.1 ads.leo.org

127.0.0.1 ads.linuxjournal.com

127.0.0.1 ads.linuxquestions.org

127.0.0.1 ads.linuxsecurity.com

127.0.0.1 ads.lnkworld.com

127.0.0.1 ads.localnow.com

127.0.0.1 ads.lycos-europe.com

127.0.0.1 ads.lycos.com

127.0.0.1 ads.madison.com

127.0.0.1 ads.mariuana.it

127.0.0.1 ads.mcafee.com

127.0.0.1 ads.mediaodyssey.com

127.0.0.1 ads.mediaturf.net

127.0.0.1 ads.metropol.dk

127.0.0.1 ads.mgnetwork.com

127.0.0.1 ads.monster.com

127.0.0.1 ads.msn.com

127.0.0.1 ads.multimania.lycos.fr

127.0.0.1 ads.musiccity.com

127.0.0.1 ads.myguysolutions.com

127.0.0.1 ads.mysimon.com

127.0.0.1 ads.nandomedia.com

127.0.0.1 ads.nationalreview.com

127.0.0.1 ads.neoseeker.com

127.0.0.1 ads.neowin.net

127.0.0.1 ads.netmechanic.com

127.0.0.1 ads.newcity.com

127.0.0.1 ads.newcitynet.com

127.0.0.1 ads.newdream.net

127.0.0.1 ads.newmedia.cz

127.0.0.1 ads.newsint.co.uk

127.0.0.1 ads.newsobserver.com

127.0.0.1 ads.newsquest.co.uk

127.0.0.1 ads.newtimes.com

127.0.0.1 ads.ngenuity.com

127.0.0.1 ads.ninemsn.com.au

127.0.0.1 ads.nola.com

127.0.0.1 ads.nordichardware.se

127.0.0.1 ads.ntadvice.com

127.0.0.1 ads.nwsource.com

127.0.0.1 ads.nyi.net

127.0.0.1 ads.nyjournalnews.com

127.0.0.1 ads.nypost.com

127.0.0.1 ads.nytimes.com

127.0.0.1 ads.nzcity.co.nz

127.0.0.1 ads.ole.com

127.0.0.1 ads.oneplace.com

127.0.0.1 ads.onlineguiden.com

127.0.0.1 ads.optusnet.com.au

127.0.0.1 ads.orsm.net

127.0.0.1 ads.osdn.com

127.0.0.1 ads.osnews.com

127.0.0.1 ads.ourbrisbane.com

127.0.0.1 ads.overclockers.at

127.0.0.1 ads.pcper.com

127.0.0.1 ads.peel.com

127.0.0.1 ads.phparena.net

127.0.0.1 ads.phpclasses.org

127.0.0.1 ads.pittsburghlive.com

127.0.0.1 ads.planet.nl

127.0.0.1 ads.pni.com

127.0.0.1 ads.powweb.com

127.0.0.1 ads.premiumnetwork.com

127.0.0.1 ads.primeinteractive.net

127.0.0.1 ads.prisacom.com

127.0.0.1 ads.pro-market.net

127.0.0.1 ads.realcities.com

127.0.0.1 ads.realmedia.de

127.0.0.1 ads.recoletos.es

127.0.0.1 ads.rediff.com

127.0.0.1 ads.rivals.net

127.0.0.1 ads.rottentomatoes.com

127.0.0.1 ads.rp-online.de

127.0.0.1 ads.rpgdot.com

127.0.0.1 ads.rpgui.com

127.0.0.1 ads.satyamonline.com

127.0.0.1 ads.savannahnow.com

127.0.0.1 ads.scifi.com

127.0.0.1 ads.sexplanets.com

127.0.0.1 ads.shareprovider.com

127.0.0.1 ads.sify.com

127.0.0.1 ads.simtel.net

127.0.0.1 ads.smartclick.com

127.0.0.1 ads.softwareoutfit.com

127.0.0.1 ads.space.com

127.0.0.1 ads.sptimes.com

127.0.0.1 ads.stationplay.com

127.0.0.1 ads.stileproject.com

127.0.0.1 ads.storagereview.net

127.0.0.1 ads.stratics.com

127.0.0.1 ads.switchboard.com

127.0.0.1 ads.techtv.com

127.0.0.1 ads.telegraaf.nl

127.0.0.1 ads.telegraph.co.uk

127.0.0.1 ads.theglobeandmail.com

127.0.0.1 ads.thestar.com

127.0.0.1 ads.thewebfreaks.com

127.0.0.1 ads.thottbot.com

127.0.0.1 ads.tiscali.fr

127.0.0.1 ads.tmcs.net

127.0.0.1 ads.top500.org

127.0.0.1 ads.townhall.com

127.0.0.1 ads.tripod.com

127.0.0.1 ads.tripod.lycos.co.uk

127.0.0.1 ads.tripod.lycos.de

127.0.0.1 ads.tripod.lycos.nl

127.0.0.1 ads.tucows.com

127.0.0.1 ads.ucomics.com

127.0.0.1 ads.uigc.net

127.0.0.1 ads.unixathome.org

127.0.0.1 ads.urli.net

127.0.0.1 ads.usatoday.com

127.0.0.1 ads.v3.com

127.0.0.1 ads.v3exchange.com

127.0.0.1 ads.vesperexchange.com

127.0.0.1 ads.videoaxs.com

127.0.0.1 ads.virtual-nights.com

127.0.0.1 ads.virtualcountries.com

127.0.0.1 ads.vnuemedia.com

127.0.0.1 ads.vnumedia.com

127.0.0.1 ads.wanadooregie.com

127.0.0.1 ads.weather.ca

127.0.0.1 ads.weather.com

127.0.0.1 ads.web.aol.com

127.0.0.1 ads.web.cs.com

127.0.0.1 ads.web.de

127.0.0.1 ads.web21.com

127.0.0.1 ads.webattack.com

127.0.0.1 ads.webheat.com

127.0.0.1 ads.webnet.advance.net

127.0.0.1 ads.whi.co.nz

127.0.0.1 ads.winsite.com

127.0.0.1 ads.wunderground.com

127.0.0.1 ads.x10.com

127.0.0.1 ads.x10.net

127.0.0.1 ads.xtra.co.nz

127.0.0.1 ads.yourfreedvds.com

127.0.0.1 ads.zdnet.com

127.0.0.1 ads001.webwombat.com.au

127.0.0.1 ads1.advance.net

127.0.0.1 ads1.akkuna.com

127.0.0.1 ads1.canoe.ca

127.0.0.1 ads1.erotism.com

127.0.0.1 ads1.mediacapital.pt

127.0.0.1 ads1.sptimes.com

127.0.0.1 ads1.theglobeandmail.com

127.0.0.1 ads10.speedbit.com

127.0.0.1 ads2.advance.net

127.0.0.1 ads2.akkuna.com

127.0.0.1 ads2.clearchannel.com

127.0.0.1 ads2.collegclub.com

127.0.0.1 ads2.collegeclub.com

127.0.0.1 ads2.exhedra.com

127.0.0.1 ads2.firingsquad.com

127.0.0.1 ads2.gamecity.net

127.0.0.1 ads2.jubii.dk

127.0.0.1 ads2.oneplace.com

127.0.0.1 ads2.osdn.com

127.0.0.1 ads2.top500.org

127.0.0.1 ads3.advance.net

127.0.0.1 ads3.gamecity.net

127.0.0.1 ads360.com

127.0.0.1 ads4.advance.net

127.0.0.1 ads4.clearchannel.com

127.0.0.1 ads4.gamecity.net

127.0.0.1 ads4.realcities.com

127.0.0.1 ads4homes.com

127.0.0.1 ads5.advance.net

127.0.0.1 ads5.canoe.ca

127.0.0.1 ads6.advance.net

127.0.0.1 ads6.gamecity.net

127.0.0.1 ads7.gamecity.net

127.0.0.1 ads8.com

127.0.0.1 adsag.com

127.0.0.1 Adsatt.ABCNews.starwave.com

127.0.0.1 adsatt.espn.go.com

127.0.0.1 adsatt.espn.starwave.com

127.0.0.1 Adsatt.go.starwave.com

127.0.0.1 adscholar.com

127.0.0.1 adscpm.com

127.0.0.1 adsdaq.com

127.0.0.1 adserv.aip.org

127.0.0.1 adserv.gamezone.de

127.0.0.1 adserv.geocomm.com

127.0.0.1 adserv.happypuppy.com

127.0.0.1 adserv.iafrica.com

127.0.0.1 adserv.lwmn.net

127.0.0.1 adserv.quality-channel.de

127.0.0.1 adserv1.winboard.org

127.0.0.1 adserve.viaarena.com

127.0.0.1 adserver.71i.de

127.0.0.1 adserver.adultfriendfinder.com

127.0.0.1 adserver.allerinternett.com

127.0.0.1 adserver.anm.co.uk

127.0.0.1 adserver.ath.cx

127.0.0.1 adserver.billiger-surfen.de

127.0.0.1 adserver.billiger-telefonieren.de

127.0.0.1 adserver.bluewin.ch

127.0.0.1 adserver.colleges.com

127.0.0.1 adserver.com

127.0.0.1 adserver.conjelco.com

127.0.0.1 adserver.developersnetwork.com

127.0.0.1 adserver.digitoday.com

127.0.0.1 adserver.dotcommedia.de

127.0.0.1 adserver.eudora.com

127.0.0.1 adserver.filefront.com

127.0.0.1 adserver.freecity.de

127.0.0.1 adserver.freenet.de

127.0.0.1 adserver.friendfinder.com

127.0.0.1 adserver.gamesquad.net

127.0.0.1 adserver.garden.com

127.0.0.1 adserver.geizkragen.de

127.0.0.1 adserver.gr

127.0.0.1 adserver.hardwareanalysis.com

127.0.0.1 adserver.hispavista.com

127.0.0.1 adserver.humanux.com

127.0.0.1 adserver.ign.com

127.0.0.1 adserver.isonews.com

127.0.0.1 adserver.itsfogo.com

127.0.0.1 adserver.janes.com

127.0.0.1 adserver.jolt.co.uk

127.0.0.1 adserver.journalinteractive.com

127.0.0.1 adserver.legacy-network.com

127.0.0.1 adserver.libero.it

127.0.0.1 adserver.m2kcore.com

127.0.0.1 adserver.monster.com

127.0.0.1 adserver.news.com.au

127.0.0.1 adserver.ngz-network.de

127.0.0.1 adserver.nydailynews.com

127.0.0.1 adserver.nzoom.com

127.0.0.1 adserver.pl

127.0.0.1 adserver.plhb.com

127.0.0.1 adserver.portalofevil.com

127.0.0.1 adserver.portugalmail.net

127.0.0.1 adserver.portugalmail.pt

127.0.0.1 adserver.ro

127.0.0.1 adserver.sanomawsoy.fi

127.0.0.1 adserver.securityfocus.com

127.0.0.1 adserver.sharewareonline.com

127.0.0.1 adserver.snowball.com

127.0.0.1 adserver.startnow.com

127.0.0.1 adserver.terra.es

127.0.0.1 adserver.theonering.net

127.0.0.1 adserver.track-star.com

127.0.0.1 adserver.trb.com

127.0.0.1 adserver.tribuneinteractive.com

127.0.0.1 adserver.ugo.com

127.0.0.1 adserver.usermagnet.com

127.0.0.1 adserver.visions.de

127.0.0.1 adserver.webhostlist.de

127.0.0.1 adserver.yahoo.com

127.0.0.1 adserver1-images.backbeatmedia.com

127.0.0.1 adserver1.backbeatmedia.com

127.0.0.1 adserver1.mediainsight.de

127.0.0.1 adserver1.ogilvy-interactive.de

127.0.0.1 adserver1.shareconnector.com

127.0.0.1 adserver2.mediainsight.de

127.0.0.1 adserver2.popdata.de

127.0.0.1 adserver3.eudora.com

127.0.0.1 adserver4.eudora.com

127.0.0.1 adserversolutions.com

127.0.0.1 adservervv.geizkragen.de

127.0.0.1 adserving.eleven-agency.com

127.0.0.1 adservingcentral.com

127.0.0.1 adsfac.net

127.0.0.1 adshadow.net

127.0.0.1 adsmart.co.uk

127.0.0.1 adsmart.com

127.0.0.1 adsmart.net

127.0.0.1 adsmusic.com

127.0.0.1 adsnew.userfriendly.org

127.0.0.1 adsoftware.com

127.0.0.1 adsoldier.com

127.0.0.1 adsp.ilse.nl

127.0.0.1 adspace.ro

127.0.0.1 adsremote.scripps.com

127.0.0.1 adsrv.iol.co.za

127.0.0.1 adsweb.tiscali.cz

127.0.0.1 adsynergy.com

127.0.0.1 adsystem.tt-forums.net

127.0.0.1 adtech.de

127.0.0.1 adtech.m7z.net

127.0.0.1 adtoma.com

127.0.0.1 adtrade.net

127.0.0.1 adtrading.de

127.0.0.1 adtrak.net

127.0.0.1 adtrix.com

127.0.0.1 adv-banner.libero.it

127.0.0.1 adv.for-ua.com

127.0.0.1 adv.freeonline.it

127.0.0.1 adv.hwupgrade.it

127.0.0.1 adv.isdn.cz

127.0.0.1 adv.surinter.net

127.0.0.1 adv.webmd.com

127.0.0.1 adv.wp.pl

127.0.0.1 adv.yo.cz

127.0.0.1 adv1.videoprofessor.com

127.0.0.1 advariant.com

127.0.0.1 adventory.com

127.0.0.1 adverity.com

127.0.0.1 adverserve.net

127.0.0.1 advert.bayarea.com

127.0.0.1 advert.hi-media.com

127.0.0.1 advert.hu

127.0.0.1 adverticum.com

127.0.0.1 adverticum.net

127.0.0.1 advertiseireland.com

127.0.0.1 advertising.com

127.0.0.1 advertising.se

127.0.0.1 advertisingbanners.com

127.0.0.1 advertmarket.com

127.0.0.1 advertmedia.de

127.0.0.1 advertpro.sitepoint.com

127.0.0.1 adverts.carltononline.com

127.0.0.1 advertserve.com

127.0.0.1 advertwizard.com

127.0.0.1 adview.ppro.de

127.0.0.1 adviva.net

127.0.0.1 advlab.it

127.0.0.1 advnt.com

127.0.0.1 advnt01.com

127.0.0.1 advnt02.com

127.0.0.1 advnt03.com

127.0.0.1 advnt04.com

127.0.0.1 advspot.com

127.0.0.1 adware.hu

127.0.0.1 adwealth.com

127.0.0.1 adweb.integctr.com

127.0.0.1 adworldnetwork.com

127.0.0.1 adworx.at

127.0.0.1 adx.allstar.cz

127.0.0.1 adx.arip.co.th

127.0.0.1 adx.atnext.com

127.0.0.1 adx.nu

127.0.0.1 ady.arip.co.th

127.0.0.1 adz.afterdawn.net

127.0.0.1 affiliate.1800flowers.com

127.0.0.1 affiliate.7host.com

127.0.0.1 affiliate.cfdebt.com

127.0.0.1 affiliate.doubleyourdating.com

127.0.0.1 affiliate.dtiserv.com

127.0.0.1 affiliate.gamestop.com

127.0.0.1 affiliate.grasscity.com

127.0.0.1 affiliate.travelnow.com

127.0.0.1 affiliate.viator.com

127.0.0.1 affiliatefuel.com

127.0.0.1 affiliates.allposters.com

127.0.0.1 affiliates.internationaljock.com

127.0.0.1 affiliatetracking.net

127.0.0.1 affiliplus.de

127.0.0.1 afiliados.submarino.com.br

127.0.0.1 ah-ha.com

127.0.0.1 aim4media.com

127.0.0.1 alladvantage.com

127.0.0.1 amedia.techies.com

127.0.0.1 app.lstdesign.com

127.0.0.1 arc1.msn.com

127.0.0.1 as.cmpnet.com

127.0.0.1 as.fotexnet.hu

127.0.0.1 as1.falkag.de

127.0.0.1 as2.falkag.de

127.0.0.1 as3.falkag.de

127.0.0.1 as4.falkag.de

127.0.0.1 as5000.com

127.0.0.1 asv.gameplanet.co.nz

127.0.0.1 atdmt.com

127.0.0.1 atwola.com

127.0.0.1 audit.median.hu

127.0.0.1 audit.webinform.hu

127.0.0.1 autohits.dk

127.0.0.1 avatarresources.com

127.0.0.1 avenuea.com

127.0.0.1 avres.net

127.0.0.1 awarez.net

127.0.0.1 awrz.net

127.0.0.1 azjmp.com

127.0.0.1 azoogleads.com

127.0.0.1 babs.tv2.dk

127.0.0.1 backbeatmedia.com

127.0.0.1 banerovec.cz

127.0.0.1 banex.cz

127.0.0.1 banik.redigy.cz

127.0.0.1 banman.cz

127.0.0.1 banner.ad.nu

127.0.0.1 banner.buempliz-online.ch

127.0.0.1 banner.casino.net

127.0.0.1 banner.casinodelrio.com

127.0.0.1 banner.coza.com

127.0.0.1 banner.cz

127.0.0.1 banner.easyspace.com

127.0.0.1 banner.elisa.net

127.0.0.1 banner.getgo.de

127.0.0.1 banner.img.co.za

127.0.0.1 banner.inyourpocket.com

127.0.0.1 banner.jobsahead.com

127.0.0.1 banner.kiev.ua

127.0.0.1 banner.linux.se

127.0.0.1 banner.media-system.de

127.0.0.1 banner.mindshare.de

127.0.0.1 banner.musikmedia.de

127.0.0.1 banner.nixnet.cz

127.0.0.1 banner.noblepoker.com

127.0.0.1 banner.northsky.com

127.0.0.1 banner.orb.net

127.0.0.1 banner.penguin.cz

127.0.0.1 banner.relcom.ru

127.0.0.1 banner.rojakpot.com

127.0.0.1 banner.t-online.de

127.0.0.1 banner.tanto.de

127.0.0.1 banner.tpage.com

127.0.0.1 banner.webmersion.com

127.0.0.1 banner4all.dk

127.0.0.1 bannerads.de

127.0.0.1 bannerads.zwire.com

127.0.0.1 bannerbank.ru

127.0.0.1 bannerbox.hu

127.0.0.1 bannerboxes.com

127.0.0.1 bannercommunity.de

127.0.0.1 bannerexchange.cjb.net

127.0.0.1 bannerhost.com

127.0.0.1 bannerhosts.com

127.0.0.1 bannerimage.com

127.0.0.1 bannerlandia.com.ar

127.0.0.1 bannermall.com

127.0.0.1 bannermarkt.nl

127.0.0.1 bannerpower.com

127.0.0.1 banners.adultfriendfinder.com

127.0.0.1 banners.amigos.com

127.0.0.1 banners.arachne.cz

127.0.0.1 banners.asiafriendfinder.com

127.0.0.1 banners.babylon-x.com

127.0.0.1 banners.babylonbucks.com

127.0.0.1 banners.bol.com.br

127.0.0.1 banners.clubseventeen.com

127.0.0.1 banners.czi.cz

127.0.0.1 banners.de.clara.net

127.0.0.1 banners.directnic.com

127.0.0.1 banners.dot.tk

127.0.0.1 banners.easydns.com

127.0.0.1 banners.ebay.com

127.0.0.1 banners.freett.com

127.0.0.1 banners.friendfinder.com

127.0.0.1 banners.friendsfinder.com

127.0.0.1 banners.hetnet.nl

127.0.0.1 banners.internetsexprovider.com

127.0.0.1 banners.iq.pl

127.0.0.1 banners.isoftmarketing.com

127.0.0.1 banners.kfmb.com

127.0.0.1 banners.lifeserv.com

127.0.0.1 banners.linkbuddies.com

127.0.0.1 banners.netcraft.com

127.0.0.1 banners.one2one.com

127.0.0.1 banners.resultonline.com

127.0.0.1 banners.sexsearch.com

127.0.0.1 banners.tucson.com

127.0.0.1 banners.uk.clara.net

127.0.0.1 banners.wunderground.com

127.0.0.1 bannerserver.com

127.0.0.1 bannerserver.gator.com

127.0.0.1 bannersgomlm.com

127.0.0.1 bannersng.yell.com

127.0.0.1 bannerspace.com

127.0.0.1 bannerswap.com

127.0.0.1 bannertesting.com

127.0.0.1 bannieres.acces-contenu.com

127.0.0.1 bans.bride.ru

127.0.0.1 bansrv1.n1media.com

127.0.0.1 barnesandnoble.bfast.com

127.0.0.1 bbmedia.cz

127.0.0.1 bbn.img.com.ua

127.0.0.1 bestsearch.net

127.0.0.1 bidclix.com

127.0.0.1 bidclix.net

127.0.0.1 bigads.guj.de

127.0.0.1 bigbangmedia.com

127.0.0.1 billboard.cz

127.0.0.1 bizad.nikkeibp.co.jp

127.0.0.1 bizban.net

127.0.0.1 blast4traffic.com

127.0.0.1 blazefind.com

127.0.0.1 blogads.com

127.0.0.1 bluehavenmedia.com

127.0.0.1 bluestreak.com

127.0.0.1 bm.annonce.cz

127.0.0.1 bn.bfast.com

127.0.0.1 bnr.volgocity.ru

127.0.0.1 boom.ro

127.0.0.1 bpath.com

127.0.0.1 bravenet.com

127.0.0.1 bridgetrack.com

127.0.0.1 british-banners.com

127.0.0.1 bs.yandex.ru

127.0.0.1 bs001.gmx.net

127.0.0.1 bs002.gmx.net

127.0.0.1 bs003.gmx.net

127.0.0.1 bs004.gmx.net

127.0.0.1 bs005.gmx.net

127.0.0.1 bs006.gmx.net

127.0.0.1 bs007.gmx.net

127.0.0.1 bs008.gmx.net

127.0.0.1 bs009.gmx.net

127.0.0.1 bs010.gmx.net

127.0.0.1 bs011.gmx.net

127.0.0.1 bs012.gmx.net

127.0.0.1 bs013.gmx.net

127.0.0.1 bs014.gmx.net

127.0.0.1 bs015.gmx.net

127.0.0.1 bs016.gmx.net

127.0.0.1 bs017.gmx.net

127.0.0.1 bs018.gmx.net

127.0.0.1 bs019.gmx.net

127.0.0.1 bs020.gmx.net

127.0.0.1 bs021.gmx.net

127.0.0.1 bs022.gmx.net

127.0.0.1 bs023.gmx.net

127.0.0.1 bs024.gmx.net

127.0.0.1 bs025.gmx.net

127.0.0.1 bs026.gmx.net

127.0.0.1 bs027.gmx.net

127.0.0.1 bs028.gmx.net

127.0.0.1 bs029.gmx.net

127.0.0.1 bs030.gmx.net

127.0.0.1 bs031.gmx.net

127.0.0.1 bs032.gmx.net

127.0.0.1 bs033.gmx.net

127.0.0.1 bs034.gmx.net

127.0.0.1 bs035.gmx.net

127.0.0.1 bs036.gmx.net

127.0.0.1 bs037.gmx.net

127.0.0.1 bs038.gmx.net

127.0.0.1 bs039.gmx.net

127.0.0.1 bs040.gmx.net

127.0.0.1 bs041.gmx.net

127.0.0.1 bs042.gmx.net

127.0.0.1 bs043.gmx.net

127.0.0.1 bs044.gmx.net

127.0.0.1 bs045.gmx.net

127.0.0.1 bs046.gmx.net

127.0.0.1 bs047.gmx.net

127.0.0.1 bs048.gmx.net

127.0.0.1 bs049.gmx.net

127.0.0.1 budsinc.com

127.0.0.1 burstnet.akadns.net

127.0.0.1 burstnet.com

127.0.0.1 businessfactory.prospero.com

127.0.0.1 c.bigmir.net

127.0.0.1 c1.nowlinux.com

127.0.0.1 candidclicks.com

127.0.0.1 casalemedia.com

127.0.0.1 casalmedia.com

127.0.0.1 cash4banner.com

127.0.0.1 cash4banner.de

127.0.0.1 cash4popup.de

127.0.0.1 cashfiesta.com

127.0.0.1 cashpartner.com

127.0.0.1 cashpartner.net

127.0.0.1 casinogames.com

127.0.0.1 casinorewards.com

127.0.0.1 casinotraffic.com

127.0.0.1 casinotreasure.com

127.0.0.1 cat.clx.ru

127.0.0.1 cben1.net

127.0.0.1 cbx.net

127.0.0.1 cdn2.adsdk.com

127.0.0.1 centrport.net

127.0.0.1 cgicounter.puretec.de

127.0.0.1 ch.questionmarket.com

127.0.0.1 chart.dk

127.0.0.1 checkm8.com

127.0.0.1 chestionar.ro

127.0.0.1 ciaoclick.com

127.0.0.1 cibleclick.com

127.0.0.1 cityads.telus.net

127.0.0.1 cj.com

127.0.0.1 cjbmanagement.com

127.0.0.1 claria.com

127.0.0.1 click-fr.com

127.0.0.1 click.absoluteagency.com

127.0.0.1 click.fool.co.uk

127.0.0.1 click.fool.com

127.0.0.1 click.go2net.com

127.0.0.1 click2freemoney.com

127.0.0.1 click2paid.com

127.0.0.1 click4click.com

127.0.0.1 clickability.com

127.0.0.1 clickagents.com

127.0.0.1 clickbank.com

127.0.0.1 clickbank.net

127.0.0.1 clickbroker.com

127.0.0.1 clickbrokers.com

127.0.0.1 clickcash.webpower.com

127.0.0.1 clickedyclick.com

127.0.0.1 clickfinders.com

127.0.0.1 clickforwebmasters.com

127.0.0.1 clickhere.foronlinegames.com

127.0.0.1 clickhereforcellphones.com

127.0.0.1 clickhouse.com

127.0.0.1 clickhype.com

127.0.0.1 clickmedia.ro

127.0.0.1 clicks.equantum.com

127.0.0.1 clicks.jackpot.com

127.0.0.1 clicks.mods.de

127.0.0.1 clicks.stripsaver.com

127.0.0.1 clickserve.cc-dt.com

127.0.0.1 clicksor.com

127.0.0.1 clickthrutraffic.com

127.0.0.1 clicktracks.com

127.0.0.1 clicktrade.com

127.0.0.1 clickxchange.com

127.0.0.1 clickz.com

127.0.0.1 clictrafic.com

127.0.0.1 clients.tbo.com

127.0.0.1 clixgalore.com

127.0.0.1 cnt.one.ru

127.0.0.1 cnt1.pocitadlo.cz

127.0.0.1 code-server.biz

127.0.0.1 colonize.com

127.0.0.1 comclick.com

127.0.0.1 commission-junction.com

127.0.0.1 commissionmonster.com

127.0.0.1 commonname.com

127.0.0.1 compactbanner.com

127.0.0.1 comprabanner.it

127.0.0.1 contextclick.com

127.0.0.1 cookies.cmpnet.com

127.0.0.1 cornflakes.pathfinder.com

127.0.0.1 count.rin.ru

127.0.0.1 counted.com

127.0.0.1 counter.bloke.com

127.0.0.1 counter.cnw.cz

127.0.0.1 counter.cz

127.0.0.1 counter.nowlinux.com

127.0.0.1 counter.rambler.ru

127.0.0.1 counter.search.bg

127.0.0.1 counter.times.lv

127.0.0.1 counter.webtrends.net

127.0.0.1 counter.yadro.ru

127.0.0.1 counters.honesty.com

127.0.0.1 counts.tucows.com

127.0.0.1 coupling-media.de

127.0.0.1 crazypopups.com

127.0.0.1 creative.whi.co.nz

127.0.0.1 creatives.as4x.tmcs.net

127.0.0.1 cserver.mii.instacontent.net

127.0.0.1 ctnetwork.hu

127.0.0.1 ctxtads.overture.com

127.0.0.1 custom-click.com

127.0.0.1 customad.cnn.com

127.0.0.1 cyberbounty.com

127.0.0.1 cybercount.com

127.0.0.1 cybereps.com

127.0.0.1 cybermonitor.com

127.0.0.1 cydoor.com

127.0.0.1 datingadvertising.com

127.0.0.1 dbbsrv.com

127.0.0.1 dcad.tnn.net

127.0.0.1 dclk.net

127.0.0.1 de.rottentomatoes.com

127.0.0.1 dealhelper.com

127.0.0.1 default-homepage-network.com

127.0.0.1 deloo.de

127.0.0.1 desktop.kazaa.com

127.0.0.1 dgm2.com

127.0.0.1 dgmaustralia.com

127.0.0.1 dialerporn.com

127.0.0.1 didtheyreadit.com

127.0.0.1 digits.com

127.0.0.1 direct-revenue.com

127.0.0.1 direct.lbe.ru

127.0.0.1 directleads.com

127.0.0.1 directtrack.com

127.0.0.1 directwebsearch.net

127.0.0.1 discountclick.com

127.0.0.1 divicash.com

127.0.0.1 dnads.directnic.com

127.0.0.1 domainsponsor.com

127.0.0.1 domainsteam.de

127.0.0.1 doubleclic.com

127.0.0.1 doubleclick.com

127.0.0.1 doubleclick.de

127.0.0.1 doubleclick.net

127.0.0.1 drinkmy.com

127.0.0.1 dw.com.com

127.0.0.1 e-bannerx.com

127.0.0.1 e2give.com

127.0.0.1 eadexchange.com

127.0.0.1 eads.com

127.0.0.1 ecoupons.com

127.0.0.1 elitetoplist.com

127.0.0.1 emarketer.com

127.0.0.1 emarketmakers.com

127.0.0.1 engage.everyone.net

127.0.0.1 engage.omaha.com

127.0.0.1 engine.awaps.net

127.0.0.1 engine.espace.netavenir.com

127.0.0.1 enginenetwork.com

127.0.0.1 entercasino.com

127.0.0.1 erotic-ad.com

127.0.0.1 escati.linkopp.net

127.0.0.1 eshopads2.com

127.0.0.1 espotting.com

127.0.0.1 estats.com

127.0.0.1 etracker.de

127.0.0.1 eu-adcenter.net

127.0.0.1 euniverseads.com

127.0.0.1 euro4banner.com

127.0.0.1 europeanbanners.com

127.0.0.1 euros4click.de

127.0.0.1 eusta.de

127.0.0.1 exchange-it.com

127.0.0.1 exchange.bg

127.0.0.1 exchangead.com

127.0.0.1 exchangeclicksonline.com

127.0.0.1 exit76.com

127.0.0.1 exitexchange.com

127.0.0.1 exitfuel.com

127.0.0.1 ext4.price.ru

127.0.0.1 extreme-dm.com

127.0.0.1 eyeblaster-bs.com

127.0.0.1 eyeblaster.com

127.0.0.1 eyewonder.com

127.0.0.1 ezula.com

127.0.0.1 f1organizer.com

127.0.0.1 falkag.de

127.0.0.1 falkag.net

127.0.0.1 fast-adv.it

127.0.0.1 fastclick.com

127.0.0.1 fastclick.com.edgesuite.net

127.0.0.1 fastclick.net

127.0.0.1 fastcounter.bcentral.com

127.0.0.1 feedbackresearch.com

127.0.0.1 ffxcam.fairfax.com.au

127.0.0.1 findcommerce.com

127.0.0.1 findyourcasino.com

127.0.0.1 fineclicks.com

127.0.0.1 first.nova.cz

127.0.0.1 flexbanner.com

127.0.0.1 flowgo.com

127.0.0.1 fmads.osdn.com

127.0.0.1 focalex.com

127.0.0.1 fragmentserv.iac-online.de

127.0.0.1 free-banners.com

127.0.0.1 freebanner.com

127.0.0.1 freelogs.com

127.0.0.1 freestat.pl

127.0.0.1 freestats.com

127.0.0.1 freewebcounter.com

127.0.0.1 *BLEEP*-access.com

127.0.0.1 g-wizzads.net

127.0.0.1 galaxien.com

127.0.0.1 gamblingbanner.com

127.0.0.1 gamehouse.com

127.0.0.1 gator.com

127.0.0.1 gcads.osdn.com

127.0.0.1 gcirm.californianonline.com

127.0.0.1 gemius.pl

127.0.0.1 giftsky.org

127.0.0.1 globaltrack.com

127.0.0.1 go-clicks.de

127.0.0.1 goingplatinum.com

127.0.0.1 gold.weborama.fr

127.0.0.1 goldstats.com

127.0.0.1 googlesyndication.com

127.0.0.1 googleadservices.com

127.0.0.1 gorillanation.com

127.0.0.1 gostats.com

127.0.0.1 gp.dejanews.com

127.0.0.1 grafstat.ro

127.0.0.1 herbalaffiliateprogram.com

127.0.0.1 hexusads.fluent.ltd.uk

127.0.0.1 hightrafficads.com

127.0.0.1 hit.bg

127.0.0.1 hit.gemius.pl

127.0.0.1 hit.webcentre.lycos.co.uk

127.0.0.1 hitbox.com

127.0.0.1 hitcents.com

127.0.0.1 hitexchange.net

127.0.0.1 hitfarm.com

127.0.0.1 hitlist.ru

127.0.0.1 hitlogger.com

127.0.0.1 hitlounge.com

127.0.0.1 hitometer.com

127.0.0.1 hits4me.com

127.0.0.1 hitslink.com

127.0.0.1 hotlog.ru

127.0.0.1 hotrank.com.tw

127.0.0.1 hotstatistics.com

127.0.0.1 httpads.com

127.0.0.1 httpool.com

127.0.0.1 humanclick.com

127.0.0.1 hurricanedigitalmedia.com

127.0.0.1 hyperbanner.net

127.0.0.1 hypercount.com

127.0.0.1 i-clicks.net

127.0.0.1 i1img.com

127.0.0.1 iad.liveperson.net

127.0.0.1 iadnet.com

127.0.0.1 idot.cz

127.0.0.1 igads.no.publicus.com

127.0.0.1 ilbanner.com

127.0.0.1 ilead.itrack.it

127.0.0.1 iliillliO00OO0.321.cn

127.0.0.1 image.ugo.com

127.0.0.1 imageads.canoe.ca

127.0.0.1 images.v3.com

127.0.0.1 imaginemedia.com

127.0.0.1 img.bannersxchange.com

127.0.0.1 imonitor.nethost.cz

127.0.0.1 imprese.cz

127.0.0.1 impressionz.co.uk

127.0.0.1 imrworldwide.com

127.0.0.1 inboxdollars.com

127.0.0.1 inc.com

127.0.0.1 indieclick.com

127.0.0.1 industrybrains.com

127.0.0.1 inet-traffic.com

127.0.0.1 infinite-ads.com

127.0.0.1 information.com

127.0.0.1 infolinks.com

127.0.0.1 insightexpress.com

127.0.0.1 instacontent.net

127.0.0.1 instantmadness.com

127.0.0.1 intelliads.com

127.0.0.1 intellitxt.com

127.0.0.1 internet-optimizer.com

127.0.0.1 internetfuel.com

127.0.0.1 interreklame.de

127.0.0.1 ip.ro

127.0.0.1 ireklama.cz

127.0.0.1 is.casalemedia.com

127.0.0.1 itadnetwork.co.uk

127.0.0.1 itbannerexchange.com

127.0.0.1 itfarm.com

127.0.0.1 itop.cz

127.0.0.1 iwin.com

127.0.0.1 j.2004cms.com

127.0.0.1 jbeet.cjt1.net

127.0.0.1 jcontent.bns1.net

127.0.0.1 jcount.com

127.0.0.1 jedonkey.cjt1.net

127.0.0.1 jinisearch.co.uk

127.0.0.1 jkazaa.cjt1.net

127.0.0.1 jnova.cjt1.net

127.0.0.1 joetec.net

127.0.0.1 jokedollars.com

127.0.0.1 justwebads.com

127.0.0.1 kanoodle.com

127.0.0.1 kliks.nl

127.0.0.1 klipads.dvlabs.com

127.0.0.1 kliptracker.com

127.0.0.1 klix.cz

127.0.0.1 labeldaily.com

127.0.0.1 laih.com

127.0.0.1 lbn.ru

127.0.0.1 leadingedgecash.com

127.0.0.1 lightningcast.net

127.0.0.1 lightspeedcash.com

127.0.0.1 link4ads.com

127.0.0.1 linkbuddies.com

127.0.0.1 linkexchange.com

127.0.0.1 linkexchange.ru

127.0.0.1 linkprice.com

127.0.0.1 linkreferral.com

127.0.0.1 linksponsor.com

127.0.0.1 linkswaper.com

127.0.0.1 linksynergy.com

127.0.0.1 liquidad.narrowcastmedia.com

127.0.0.1 lnads.osdn.com

127.0.0.1 log.btopenworld.com

127.0.0.1 log.go.com

127.0.0.1 logging.to

127.0.0.1 logs.erasmas.com

127.0.0.1 look2me.com

127.0.0.1 lop.com

127.0.0.1 lstat.susanin.com

127.0.0.1 m.doubleclick.net

127.0.0.1 mads.gamespot.com

127.0.0.1 mainos2.mtv3.fi

127.0.0.1 marketbanker.com

127.0.0.1 marketing.centrebet.com

127.0.0.1 marketing.nyi.com

127.0.0.1 marketing.nyi.net

127.0.0.1 marketscore.com

127.0.0.1 mastermind.com

127.0.0.1 masterstats.com

127.0.0.1 matchcraft.com

127.0.0.1 maximumcash.com

127.0.0.1 maxserving.com

127.0.0.1 mbuyu.nl

127.0.0.1 media-adrunner.mycomputer.com

127.0.0.1 media-motor.net

127.0.0.1 media.bigstep.com

127.0.0.1 media.ftv-publicite.fr

127.0.0.1 mediacharger.com

127.0.0.1 mediadvertising.ro

127.0.0.1 mediageneral.com

127.0.0.1 mediamgr.ugo.com

127.0.0.1 mediaplazza.com

127.0.0.1 mediaplex.com

127.0.0.1 mediascale.de

127.0.0.1 mediavantage.de

127.0.0.1 megacash.de

127.0.0.1 megago.com

127.0.0.1 megawerbung.de

127.0.0.1 memorix.sdv.fr

127.0.0.1 metaad.econet.hu

127.0.0.1 metrics.webcriteria.net

127.0.0.1 microstatic.pl

127.0.0.1 microticker.com

127.0.0.1 mindseti.com

127.0.0.1 mirror.qkimg.net

127.0.0.1 mjxads.internet.com

127.0.0.1 mkt.cz

127.0.0.1 mojobucks.com

127.0.0.1 monsterpops.com

127.0.0.1 mostcash.com

127.0.0.1 ms-links.com

127.0.0.1 msads.net

127.0.0.1 mtree.com

127.0.0.1 multi1.rmuk.co.uk

127.0.0.1 musiccounter.ru

127.0.0.1 myaffiliateprogram.com

127.0.0.1 mystat.pl

127.0.0.1 mytrix.com

127.0.0.1 n69.com

127.0.0.1 naj.sk

127.0.0.1 navrcholu.cz

127.0.0.1 nedstat.com

127.0.0.1 nedstat.nl

127.0.0.1 nedstatbasic.net

127.0.0.1 netads.hotwired.com

127.0.0.1 netads.sohu.com

127.0.0.1 netdirect.nl

127.0.0.1 netpool.netbookia.net

127.0.0.1 netvertising.be

127.0.0.1 network.realmedia.com

127.0.0.1 new-ads.eurogamer.net

127.0.0.1 newads.cmpnet.com

127.0.0.1 newnet.qsrch.com

127.0.0.1 newtopsites.com

127.0.0.1 ng3.ads.warnerbros.com

127.0.0.1 ngadcenter.net

127.0.0.1 nitroclicks.com

127.0.0.1 nsads.hotwired.com

127.0.0.1 ntbanner.digitalriver.com

127.0.0.1 oas-central.realmedia.com

127.0.0.1 oas.benchmark.fr

127.0.0.1 oas.foxnews.com

127.0.0.1 oas.roanoke.com

127.0.0.1 oas.salon.com

127.0.0.1 oas.signonsandiego.com

127.0.0.1 oas.toronto.com

127.0.0.1 oas.uniontrib.com

127.0.0.1 oas.villagevoice.com

127.0.0.1 oascentral.chicagobusiness.com

127.0.0.1 oascentral.redherring.com

127.0.0.1 oascentral.theonion.com

127.0.0.1 oascentral.thesmokinggun.com

127.0.0.1 oasis.promon.cz

127.0.0.1 observer.cz

127.0.0.1 offeroptimizer.com

127.0.0.1 oneandonlynetwork.com

127.0.0.1 onestat.com

127.0.0.1 onresponse.com

127.0.0.1 openad.infobel.com

127.0.0.1 openad.travelnow.com

127.0.0.1 overpeer.com

127.0.0.1 overpro.com

127.0.0.1 overture.com

127.0.0.1 oxcash.com

127.0.0.1 p5.omaha.com

127.0.0.1 partner-ads.com

127.0.0.1 partner-source.com

127.0.0.1 partner.gonamic.de

127.0.0.1 partner.topcities.com

127.0.0.1 partner2profit.com

127.0.0.1 partnerkonto.de

127.0.0.1 partners.priceline.com

127.0.0.1 partners.starnetsystems.net

127.0.0.1 paycounter.com

127.0.0.1 paypopup.com

127.0.0.1 payserve.com

127.0.0.1 pbnet.ru

127.0.0.1 pcwizz.com

127.0.0.1 pennyweb.com

127.0.0.1 phoenix-adrunner.mycomputer.com

127.0.0.1 phpads.i-merge.net

127.0.0.1 pillscash.com

127.0.0.1 pimproll.com

127.0.0.1 planetactive.com

127.0.0.1 play4traffic.com

127.0.0.1 pointroll.com

127.0.0.1 pops.freeze.com

127.0.0.1 popup.msn.com

127.0.0.1 popupad.net

127.0.0.1 popupmoney.com

127.0.0.1 popupnation.com

127.0.0.1 popups.infostart.com

127.0.0.1 popupsponsor.com

127.0.0.1 popuptraffic.com

127.0.0.1 porntrack.com

127.0.0.1 postmasterbannernet.com

127.0.0.1 precisioncounter.com

127.0.0.1 premium-offers.com

127.0.0.1 premiumcash.de

127.0.0.1 primaryads.com

127.0.0.1 primetime.net

127.0.0.1 pro-advertising.com

127.0.0.1 profero.com

127.0.0.1 professorbanner.com

127.0.0.1 promote.pair.com

127.0.0.1 promozia.de

127.0.0.1 provexia.com

127.0.0.1 psstt.com

127.0.0.1 pub-g.ifrance.com

127.0.0.1 pub.club-internet.fr

127.0.0.1 pub.hardware.fr

127.0.0.1 pub.realmedia.fr

127.0.0.1 publi.grupocorreo.es

127.0.0.1 publi1.grupocorreo.es

127.0.0.1 publi2.grupocorreo.es

127.0.0.1 publiads.com

127.0.0.1 publicidad.elmundo.es

127.0.0.1 publicidad.ya.com

127.0.0.1 pubs.branchez-vous.com

127.0.0.1 pubs.lemonde.fr

127.0.0.1 q.azcentral.com

127.0.0.1 qckjmp.com

127.0.0.1 qksrv.net

127.0.0.1 quarterserver.de

127.0.0.1 questaffiliates.net

127.0.0.1 quinst.com

127.0.0.1 r.hotwired.com

127.0.0.1 r.kde.cz

127.0.0.1 rad.msn.com

127.0.0.1 radiate.com

127.0.0.1 rampidads.com

127.0.0.1 ranking-charts.de

127.0.0.1 ranking-hits.de

127.0.0.1 rankyou.com

127.0.0.1 rate.ru

127.0.0.1 rb1.design.ru

127.0.0.1 realads.realmedia.com

127.0.0.1 realclix.com

127.0.0.1 realmedia-a800.d4p.net

127.0.0.1 realtechnetwork.com

127.0.0.1 realtechnetwork.net

127.0.0.1 realtracker.com

127.0.0.1 redsherriff.com

127.0.0.1 referralware.com

127.0.0.1 regnow.com

127.0.0.1 reklam.rfsl.se

127.0.0.1 reklama.internet.cz

127.0.0.1 reklama.reflektor.cz

127.0.0.1 relmaxtop.com

127.0.0.1 remotead.cnet.com

127.0.0.1 reply.mediatris.net

127.0.0.1 retaildirect.realmedia.com

127.0.0.1 revenue.net

127.0.0.1 rewardster.com

127.0.0.1 richmails.com

127.0.0.1 richwebmaster.com

127.0.0.1 rightmedia.net

127.0.0.1 rightstats.com

127.0.0.1 rl.auto.ru

127.0.0.1 rle.ru

127.0.0.1 rmads.msn.com

127.0.0.1 rmedia.boston.com

127.0.0.1 rnd.yxo.ru

127.0.0.1 roar.com

127.0.0.1 roings.com

127.0.0.1 roosevelt.gjbig.com

127.0.0.1 rose.ixbt.com

127.0.0.1 rotabanner.dni.ru

127.0.0.1 rotabanner.izvestia.ru

127.0.0.1 rotabanner.rian.ru

127.0.0.1 rpts.net

127.0.0.1 ru-traffic.com

127.0.0.1 ru4.com

127.0.0.1 safe-audit.com

127.0.0.1 safelists.com

127.0.0.1 sageanalyst.net

127.0.0.1 searchlocate.com

127.0.0.1 searchramp.com

127.0.0.1 secure.webconnect.net

127.0.0.1 seeq.com

127.0.0.1 seo4india.com

127.0.0.1 separtnership.com

127.0.0.1 serv0.com

127.0.0.1 servads.aip.org

127.0.0.1 servedby.netshelter.net

127.0.0.1 servethis.com

127.0.0.1 serving-sys.com

127.0.0.1 sexcounter.com

127.0.0.1 sexlist.com

127.0.0.1 sextracker.com

127.0.0.1 sfads.osdn.com

127.0.0.1 shareasale.com

127.0.0.1 sher.index.hu

127.0.0.1 shinystat.it

127.0.0.1 siccash.com

127.0.0.1 sidebar.angelfire.com

127.0.0.1 sitemeter.com

127.0.0.1 sma.punto.net

127.0.0.1 smartadserver.com

127.0.0.1 smartclicks.net

127.0.0.1 smartdirect.com

127.0.0.1 smfgroup.cjb.net

127.0.0.1 smile.modchipstore.com

127.0.0.1 sn.baventures.com

127.0.0.1 softclick.com.br

127.0.0.1 software.global-netcom.de

127.0.0.1 softwaresponsor.com

127.0.0.1 specificclick.com

127.0.0.1 specificpop.com

127.0.0.1 spezialreporte.de

127.0.0.1 spinbox.maccentral.com

127.0.0.1 spinbox.net

127.0.0.1 spinbox.techtracker.com

127.0.0.1 spinbox.versiontracker.com

127.0.0.1 sponsor4you.net

127.0.0.1 sponsoradulto.com

127.0.0.1 sponsorpro.de

127.0.0.1 sponsors.thoughtsmedia.com

127.0.0.1 sprinks-clicks.about.com

127.0.0.1 spylog.com

127.0.0.1 spywarelabs.com

127.0.0.1 spywarenuker.com

127.0.0.1 ssads.osdn.com

127.0.0.1 starffa.com

127.0.0.1 start.freeze.com

127.0.0.1 stat.dealtime.com

127.0.0.1 stat.doxod.net

127.0.0.1 stat.pl

127.0.0.1 stat.webmedia.pl

127.0.0.1 stat.zenon.net

127.0.0.1 statcounter.com

127.0.0.1 static.itrack.it

127.0.0.1 static.smni.com

127.0.0.1 staticads.btopenworld.com

127.0.0.1 stats.blogger.com

127.0.0.1 stats.cts-bv.nl

127.0.0.1 stats.darkbluesea.com

127.0.0.1 stats.klsoft.com

127.0.0.1 stats4all.com

127.0.0.1 stop-popup-ads-now.com

127.0.0.1 sugoicounter.com

127.0.0.1 superclix.de

127.0.0.1 superstats.com

127.0.0.1 supertop.ru

127.0.0.1 supertop100.com

127.0.0.1 synergiinteractive.com

127.0.0.1 targad.de

127.0.0.1 targetnet.com

127.0.0.1 targetpoint.com

127.0.0.1 targetsaver.com

127.0.0.1 targetshop.com

127.0.0.1 teknosurf2.com

127.0.0.1 teknosurf3.com

127.0.0.1 test.com

127.0.0.1 textads.biz

127.0.0.1 textads.opera.com

127.0.0.1 textlinks.com

127.0.0.1 tfag.de

127.0.0.1 the-counter.net

127.0.0.1 theanswerto.com

127.0.0.1 thebannerguru.com

127.0.0.1 thecounter.com

127.0.0.1 thevictorynetwork.com

127.0.0.1 thinkingmedia.net

127.0.0.1 thisbanner.com

127.0.0.1 thruport.com

127.0.0.1 tier1network.com

127.0.0.1 tinybar.com

127.0.0.1 tmsads.tribune.com

127.0.0.1 toads.osdn.com

127.0.0.1 toolbar.netscape.com

127.0.0.1 top.list.ru

127.0.0.1 top.one.ru

127.0.0.1 top.proext.com

127.0.0.1 top100-images.rambler.ru

127.0.0.1 top100.mafia.ru

127.0.0.1 top20.com

127.0.0.1 topbarh.box.sk

127.0.0.1 toplist.cz

127.0.0.1 toplista.mw.hu

127.0.0.1 topping.com.ua

127.0.0.1 topprofits.info

127.0.0.1 toprebates.com

127.0.0.1 topsearcher.com

127.0.0.1 topshop-counter.rambler.ru

127.0.0.1 topstats.com

127.0.0.1 topstats.net

127.0.0.1 tps108.org

127.0.0.1 track.freexxxhost.net

127.0.0.1 tracking.frantic.com

127.0.0.1 tracking101.com

127.0.0.1 trackmysales.com

127.0.0.1 tradedoubler.com

127.0.0.1 traffic-exchange.com

127.0.0.1 trafficdiscount.com

127.0.0.1 trafficmp.com

127.0.0.1 trafficswarm.com

127.0.0.1 trafficsyndicate.com

127.0.0.1 traffictrader.net

127.0.0.1 trafficvenue.net

127.0.0.1 trafic.ro

127.0.0.1 traficdublu.ro

127.0.0.1 trafix.sk

127.0.0.1 trakkerd.net

127.0.0.1 trekblue.com

127.0.0.1 trekdata.com

127.0.0.1 tribalfusion.com

127.0.0.1 trix.net

127.0.0.1 truehits.net

127.0.0.1 truehits1.gits.net.th

127.0.0.1 truehits2.gits.net.th

127.0.0.1 tsms-ad.tsms.com

127.0.0.1 ukaffiliates2.com

127.0.0.1 ukbanners.com

127.0.0.1 ultimatecounter.com

127.0.0.1 updated.com

127.0.0.1 us.a1.yimg.com

127.0.0.1 usapromotravel.com

127.0.0.1 usmsad.tom.com

127.0.0.1 utarget.co.uk

127.0.0.1 utils.mediageneral.net

127.0.0.1 valuead.com

127.0.0.1 valueclick.com

127.0.0.1 valueclick.net

127.0.0.1 valuecommerce.com

127.0.0.1 valuesponsor.com

127.0.0.1 vendaregroup.com

127.0.0.1 vericlick.com

127.0.0.1 vg.ad.asap-asp.net

127.0.0.1 vibrantmedia.com

127.0.0.1 view4cash.de

127.0.0.1 viewpoint.com

127.0.0.1 vortextraffic.com

127.0.0.1 vx2.cc

127.0.0.1 w3exit.com

127.0.0.1 wannaclick.com

127.0.0.1 web-stat.com

127.0.0.1 web2.deja.com

127.0.0.1 webads.bizservers.com

127.0.0.1 webads.co.nz

127.0.0.1 webads.nl

127.0.0.1 webangel.ru

127.0.0.1 webcash.nl

127.0.0.1 webcounter.cz

127.0.0.1 webcounter.goweb.de

127.0.0.1 webmasterplan.com

127.0.0.1 webpdp.gator.com

127.0.0.1 webpower.com

127.0.0.1 websitefreepromotions.com

127.0.0.1 websponsors.com

127.0.0.1 webstars2000.com

127.0.0.1 webstat.com

127.0.0.1 webstat.net

127.0.0.1 webtraxx.de

127.0.0.1 webtrendslive.com

127.0.0.1 wegcash.com

127.0.0.1 wenksdisdkjeilsow.com

127.0.0.1 whenu.com

127.0.0.1 whispa.com

127.0.0.1 window.nixnet.cz

127.0.0.1 windupdates.com

127.0.0.1 wipub.com

127.0.0.1 worldbe.com

127.0.0.1 wtlive.com

127.0.0.1 wustat.windows.com

127.0.0.1 www-banner.chat.ru

127.0.0.1 www.adsxchange.lv

127.0.0.1 www.banner-link.com.br

127.0.0.1 www.dnps.com

127.0.0.1 www.kaplanindex.com

127.0.0.1 www.money4exit.de

127.0.0.1 www.photo-ads.co.uk

127.0.0.1 www.sponsor2002.de

127.0.0.1 x.mycity.com

127.0.0.1 xchange.ro

127.0.0.1 xiti.com

127.0.0.1 xq1.net

127.0.0.1 xtrocash.org

127.0.0.1 xxxcounter.com

127.0.0.1 xxxtoolbar.com

127.0.0.1 xzoomy.com

127.0.0.1 y.ibsys.com

127.0.0.1 yesadvertising.com

127.0.0.1 youclick2earn.com

127.0.0.1 z.times.lv

127.0.0.1 zanox-affiliate.de

127.0.0.1 zanox.com

127.0.0.1 zeads.com

127.0.0.1 zedo.com

127.0.0.1 zencudo.co.uk

127.0.0.1 zi.r.tv.com

127.0.0.1 zmedia.com

The Google Quiz: Are you a Google expert ?

Do you know everything about the company and its services? Or are you still new to the topic, and you only used their search engine for a couple of times so far? Well, you can put your knowledge to the test in this quiz which will answer the question:

How much do you know about Google? Get a pencil and cross the single right answer for every question, and calculate your score afterwards.

  1. Google Inc. was founded in …
    • 1996
    • 1998
    • 2000
  2. Google Inc. was founded by …
    • Sergey Page and Larry Brin
    • Eric Schmidt and Larry Page
    • Larry Page and Sergey Brin
  3. Which search operator does Google enable by default?
    • The AND operator
    • The OR operator
    • The NOT operator
  4. Google once used Yahoo’s search result to feed its engine.True?
    • Yes, from 1998-200
    • No, it was the other way round – Yahoo used Google once.
    • No, Google and Yahoo never had any search relationship.
  5. Google Analytics is a service to …
    • Check if your web pages validate
    • Check how many people visit your web pages
    • Check your Google PageRank
  6.   In 2006, Eric Schmidt is Google’s …
    • Vice President Engineering
    • Eric left the company in 2004 to pursue his hobbies
    • Chief Executive Officer
  7.  What was the name of the search engine the Google founders developed before Google?
    • PageRanker
    • BackRub
    • Gogol
  8.  What is the algorithm behind Google’s PageRank?
    • The more pages link to you (and the higher their PageRank), the higher your page’s PageRank
    • You get 1 PageRank point for every web page you own
    • The algorithm behind PageRank is kept secret, similar to the Coca – Cola formula
  9.  Why do some sites get “banned” from the Google index?
    • They tried methods to get their pages ranked better which Google considers spam
    • They have content which is illegal in this state/ country
    • Both are true.
  10.  At which university did the Google founders meet?
    • Oxford University
    • MIT
    • Stanford University
  11.  What is the “Googleplex”?
    • It’s where Google employees work
    • It’s a solar system which shares only the name with Google.com
    • It’s the server farm Google built up to deliver search results to you
  12.   Around how many hits do you get for the word “Hello” (in 2006)?
    • 420,000 pages
    • 420,000,000 pages
    • 42,000,000,000 pages
  13.  If you want to find a place to grab a pizza, you go to …
    • Google Food
    • Google Places
    • Google Local
  14. At the Association of National Advertisers annual conference in October 2005, who said Google will take 300 years to fulfill its mission to index the world’s data?
    • Eric Schmidt
    • Larry Page
    • Marissa Mayer
  15. What colors do the letters of the Google logo have, from left to right?
    • Red – Blue – Green – Yellow – Green
    • Blue – Red – Yellow – Blue – Green – Red
    • Blue – Yellow – Purple – Yellow – Red – Blue

How well did you do?

Calculate your points by adding 10 points for each question you answered like the following:

1 – b, 2 – c, 3 – a, 4 – b, 5 – b, 6 – c, 7 – b, 8 – a, 9 – c, 10 – c, 11 – a, 12 – b, 13 – c, 14 – a, 15 – b.

0–50 points: Though you have a mild interest in Google, you’re new to the topic. Maybe you prefer other search engines, or you’re not using the web for a lot of tasks. You have yet to learn how to become a power searcher, but you’re on your way. 60–110 points: You already understand more than just the basics of how Google works. Using your search power, you can locate almost anything you want. You are likely making good use of Gmail, Google News, and other Google services. 120–150 points: Consider yourself a Google guru. In fact, with your knowledge you could write a book like this. Chances are you are reading a lot of news

7 Apps that every traveler should have

Here are some apps to get you started and on  the way to getting extra value for the money you spend on your upcoming trips, and also in a way unlocking your smartphone’s hidden potential.

Ask A Nomad

ask-a-nomad

For any new place you visit, inevitably there are bound to be a lot of questions – mostly regarding which place to visit. Quite simply, Ask A Nomad lets you ask a question, and get answers from other users who may have some idea about that subject. This is a lot more interactive than just searching for information on the web. Alternatively, you can also answer questions about places you’ve been to. The app divides the world very neatly into continents, countries and then cities. This makes asking a new question, reading other discussions and replying to a query simpler. Better way of getting all the information you need about a place, from people who have probably already been there.

Price: Free

Platform: iOS devices

Agoda.com

Agoda

This is an app you should definitely refer to, because it will surely have information  on the hotel that you plan on staying in. Considering over 1,50,000 hotels worldwide are a part of this database, users can search for hotels based on pricing and type, and even get special deals. This service also lets you book using credit card, along with special offers and deals from time to time.

We believe that even though you may find it a little risky to book from here, it is useful app to check out and compare hotels.

Price: Free

Platform: iOS devices

Foursquare

foursquare

This app isn’t very new, but it is a must have on every smart mobile device and most people have used it. But if you have a number of contacts who are explorers in their own right, this may just be the app for you.

Utilise the knowledge base of your friends to get information about a place you’re going to visit, or have already checked in to. Also get recommendations from other users who have visited the place and written reviews about it.

Price: Free

Platform: Android, Blackberry, iOS, Symbian  and Windows Phone

Expensify

expensify

Use Expensify on your Android™ device to log expenses, capture receipt images and manage reports on the go! Even better, SmartScan will read your receipt images, fill out the expense details, and create a new expense (or attach to an automatically imported bank/card transaction).

An essential app for business travelers, Expensify allows users to scan or log their receipts to be compiled into expense reports.

Price: Free

Platform: Android, iOS

Google Translate & Goggles

google-goggles

Google Translate helps you make sense of 63 different languages. You can even speak text to be translated into the local language.

Search by taking a picture: point your mobile phone camera at a painting, a famous landmark, a bar code or QR code, a product, a storefront, or a popular image. If Goggles finds it in its database, it will provide you with useful information. Goggles can read text in English, French, Italian, German, Spanish, Portuguese, Russian, and Turkish, and translate it into other languages.

Price: Free

Platform: iOS, Android

WeatherBug

weatherbugIf you are sensitive to weather changes or do not like snowfall or rainfall, you would obviously be interested to find out about the weather in the places where you are going to be during your trip. WeatherBug gives accurate and reliable weather information, letting you know beforehand the kind of weather you can expect during your stay in a foreign city.

This app allows you access to the most reliable weather stations across North America to find out the exact weather conditions at thousands of locations around the world. You can thus avoid places where weather is not to your liking if you have this app installed.

Price: Free

Platform: iOS, Android

Google Maps

Whether you need directions to your destination, the closest good place for a bite to eat, or just a sense of where you are, Google Maps for Android can help.

Immediately after Apple Maps landed, customers and critics complained loudly (and rightly) of inaccurate location search and a lack of map data over points of interest. Fortunately, Google does search better than most everyone, and Google Maps for iOS is no exception. You also can search for addresses like you would expect, but also landmarks, local restaurants, businesses, and common search terms like “pizza.” Google database is more extensive and generally much more accurate than Apple’s offering.

Price: Free

Platform: iOS, Android, Windows Phone and Symbian

 

Science behind Linux boot sequence

Identifying each stage of the boot process is invaluable in fixing boot problems and understanding the system as a whole. To start, zero in on the boot loader, which is the initial screen or prompt you get after the computer does its power-on self-test, asking which operating system to run. After you make a choice, the boot loader runs the Linux kernel, handing control of the system to the kernel.

As it turns out, there isn’t much to the boot process:

  1. A boot loader finds the kernel image on the disk, loads it into memory, and starts it.
  2. The kernel initializes the devices and its drivers.
  3. The kernel mounts the root file system.
  4. The kernel starts a program called init.
  5. init sets the rest of the processes in motion.
  6. The last processes that init starts as part of the boot sequence allow you to log in.

There is a detailed discussion of the kernel elsewhere in this book from which this article is excerpted. This article covers the kernel initialization stage, the stage when the kernel prints a bunch of messages about the hardware present on the system. The kernel starts init just after it displays a message proclaiming that the kernel has mounted the root filesystem:

VFS: Mounted root (ext2 filesystem) readonly.

Soon after, you will see a message about init starting, followed by system service startup messages, and finally you get a login prompt of some sort.

NOTE : On Red Hat Linux, the init note is especially obvious, because it “welcomes” you to “Red Hat Linux.” All messages thereafter show success or failure in brackets at the right-hand side of the screen.

Most of this article deals with init, because it is the part of the boot sequence where you have the most control. init

There is nothing special about init. It is a program just like any other on the Linux system, and you’ll find it in /sbin along with other system binaries. The main purpose of init is to start and stop other programs in a particular sequence. All you have to know is how this sequence works.

There are a few different variations, but most Linux distributions use the System V style discussed here. Some distributions use a simpler version that resembles the BSD init, but you are unlikely to encounter this.

Runlevels

memelinuxAt any given time on a Linux system, a certain base set of processes is running. This state of the machine is called its runlevel, and it is denoted with a number from 0 through 6. The system spends most of its time in a single runlevel. However, when you shut the machine down, init switches to a different runlevel in order to terminate the system services in an orderly fashion and to tell the kernel to stop. Yet another runlevel is for single-user mode, discussed later.

The easiest way to get a handle on runlevels is to examine the init configuration file, /etc/inittab. Look for a line like the following:

  • id:5:initdefault:

This line means that the default runlevel on the system is 5. All lines in the inittab file take this form, with four fields separated by colons occurring in the following order: # A unique identifier (a short string, such as id in the preceding example) # The applicable runlevel number(s) # The action that init should take (in the preceding example, the action is to set the default runlevel to 5) # A command to execute (optional)

There is no command to execute in the preceding initdefault example because a command doesn’t make sense in the context of setting the default runlevel. Look a little further down in inittab, until you see a line like this:

l5:5:wait:/etc/rc.d/rc 5

This line triggers most of the system configuration and services through the rc*.d and init.d directories. You can see that init is set to execute a command called /etc/rc.d/rc 5 when in runlevel 5. The wait action tells when and how init runs the command: run rc 5 once when entering runlevel 5, and then wait for this command to finish before doing anything else.

There are several different actions in addition to initdefault and wait, especially pertaining to power management, and the inittab(5) manual page tells you all about them. The ones that you’re most likely to encounter are explained in the following sections.

Respawn

The respawn action causes init to run the command that follows, and if the command finishes executing, to run it again. You’re likely to see something similar to this line in your inittab file:

1:2345:respawn:/sbin/mingetty tty1

The getty programs provide login prompts. The preceding line is for the first virtual console (/dev/tty1), the one you see when you press ALT-F1 or CONTROL-ALT-F1. The respawn action brings the login prompt back after you log out.

CtrlAltDel

The ctrlaltdel action controls what the system does when you press CONTROL-ALT-DELETE on a virtual console. On most systems, this is some sort of reboot command using the shutdown command.

Sysinit

The sysinit action is the very first thing that init should run when it starts up, before entering any runlevels.

How processes in runlevels start

You are now ready to learn how init starts the system services, just before it lets you log in. Recall this inittab line from earlier:

l5:5:wait:/etc/rc.d/rc 5

memelinux-levelsThis small line triggers many other programs. rc stands for run commands, and you will hear people refer to the commands as scripts, programs, or services. So, where are these commands, anyway?

For runlevel 5, in this example, the commands are probably either in /etc/rc.d/rc5.d or /etc/rc5.d. Runlevel 1 uses rc1.d, runlevel 2 uses rc2.d, and so on. You might find the following items in the rc5.d directory:

S10sysklogd S20ppp S99gpm S12kerneld S25netstd_nfs S99httpd S15netstd_init S30netstd_misc S99rmnologin S18netbase S45pcmcia S99sshd S20acct S89atd S20logoutd S89cron

The rc 5 command starts programs in this runlevel directory by running the following commands:

  • S10sysklogd start
  • S12kerneld start
  • S15netstd_init start
  • S18netbase start
  • S99sshd start

Notice the start argument in each command. The S in a command name means that the command should run in start mode, and the number (00 through 99) determines where in the sequence rc starts the command.

The rc*.d commands are usually shell scripts that start programs in /sbin or /usr/sbin. Normally, you can figure out what one of the commands actually does by looking at the script with less or another pager program.

You can start one of these services by hand. For example, if you want to start the httpd Web server program manually, run S99httpd start. Similarly, if you ever need to kill one of the services when the machine is on, you can run the command in the rc*.d directory with the stop argument (S99httpd stop, for instance).

Some rc*.d directories contain commands that start with K (for “kill,” or stop mode). In this case, rc runs the command with the stop argument instead of start. You are most likely to encounter K commands in runlevels that shut the system down.

Adding and removing services

If you want to add, delete, or modify services in the rc*.d directories, you need to take a closer look at the files inside. A long listing reveals a structure like this:

lrwxrwxrwx . . . S10sysklogd -> ../init.d/sysklogd lrwxrwxrwx . . . S12kerneld -> ../init.d/kerneld lrwxrwxrwx . . . S15netstd_init -> ../init.d/netstd_init lrwxrwxrwx . . . S18netbase -> ../init.d/netbase …

The commands in an rc*.d directory are actually symbolic links to files in an init.d directory, usually in /etc or /etc/rc.d. Linux distributions contain these links so that they can use the same startup scripts for all runlevels. This convention is by no means a requirement, but it often makes organization a little easier.

To prevent one of the commands in the init.d directory from running in a particular runlevel, you might think of removing the symbolic link in the appropriate rc*.d directory. This does work, but if you make a mistake and ever need to put the link back in place, you might have trouble remembering the exact name of the link. Therefore, you shouldn’t remove links in the rc*.d directories, but rather, add an underscore (_) to the beginning of the link name like this:

  • mv S99httpd _S99httpd

At boot time, rc ignores _S99httpd because it doesn’t start with S or K. Furthermore, the original name is still obvious, and you have quick access to the command if you’re in a pinch and need to start it by hand.

To add a service, you must create a script like the others in the init.d directory and then make a symbolic link in the correct rc*.d directory. The easiest way to write a script is to examine the scripts already in init.d, make a copy of one that you understand, and modify the copy.

When adding a service, make sure that you choose an appropriate place in the boot sequence to start the service. If the service starts too soon, it may not work, due to a dependency on some other service. For non-essential services, most systems administrators prefer numbers in the 90s, after most of the services that came with the system.

Linux distributions usually come with a command to enable and disable services in the rc*.d directories. For example, in Debian, the command is update-rc.d, and in Red Hat Linux, the command is chkconfig. Graphical user interfaces are also available. Using these programs helps keep the startup directories consistent and helps with upgrades.

HINT: One of the most common Linux installation problems is an improperly configured XFree86 server that flicks on and off, making the system unusable on console. To stop this behavior, boot into single-user mode and alter your runlevel or runlevel services. Look for something containing xdm, gdm, or kdm in your rc*.d directories, or your /etc/inittab.

Controlling init

Occasionally, you need to give init a little kick to tell it to switch runlevels, to re-read the inittab file, or just to shut down the system. Because init is always the first process on a system, its process ID is always 1.

You can control init with telinit. For example, if you want to switch to runlevel 3, use this command:

  • telinit 3

When switching runlevels, init tries to kill off any processes that aren’t in the inittab file for the new runlevel. Therefore, you should be careful about changing runlevels.

When you need to add or remove respawning jobs or make any other change to the inittab file, you must tell init about the change and cause it to re-read the file. Some people use kill -HUP 1 to tell init to do this. This traditional method works on most versions of Unix, as long as you type it correctly. However, you can also run this telinit command:

  • telinit q

You can also use telinit s to switch to single-user mode.

Shutting down

shutdown_button_wallpaperinit also controls how the system shuts down and reboots. The proper way to shut down a Linux machine is to use the shutdown command.

There are two basic ways to use shutdown. If you halt the system, it shuts the machine down and keeps it down. To make the machine halt immediately, use this command:

  • shutdown -h now

On most modern machines with reasonably recent versions of Linux, a halt cuts the power to the machine. You can also reboot the machine. For a reboot, use -r instead of -h.

The shutdown process takes several seconds. You should never reset or power off a machine during this stage.

In the preceding example, now is the time to shut down. This argument is mandatory, but there are many ways of specifying it. If you want the machine to go down sometime in the future, one way is to use +n, where n is the number of minutes shutdown should wait before doing its work. For other options, look at the shutdown manual page.

To make the system reboot in 10 minutes, run this command:

  • shutdown -r +10

On Linux, shutdown notifies anyone logged on that the machine is going down, but it does little real work. If you specify a time other than now, shutdown creates a file called /etc/nologin. When this file is present, the system prohibits logins by anyone except the superuser.

When system shutdown time finally arrives, shutdown tells init to switch to runlevel 0 for a halt and runlevel 6 for a reboot. When init enters runlevel 0 or 6, all of the following takes place, which you can verify by looking at the scripts inside rc0.d and rc6.d:

1. init kills every process that it can (as it would when switching to any other runlevel).

# The initial rc0.d/rc6.d commands run, locking system files into place and making other preparations for shutdown. # The next rc0.d/rc6.d commands unmount all filesystems other than the root. # Further rc0.d/rc6.d commands remount the root filesystem read-only. # Still more rc0.d/rc6.d commands write all buffered data out to the filesystem with the sync program. # The final rc0.d/rc6.d commands tell the kernel to reboot or stop with the reboot, halt, or poweroff program.

The reboot and halt programs behave differently for each runlevel, potentially causing confusion. By default, these programs call shutdown with the -r or -h options, but if the system is already at the halt or reboot runlevel, the programs tell the kernel to shut itself off immediately. If you really want to shut your machine down in a hurry (disregarding any possible damage from a disorderly shutdown), use the -f option.

Guide: Choosing A Good Domain Name, Things to Keep in Mind

Choosing a domain name for your site is one of the most important steps towards creating the perfect internet presence. If you run an on-line business, picking a name that will be marketable and achieve success in search engine placement is paramount. Many factors must be considered when choosing a good domain name. This article summarizes all the different things to consider before making that final registration step!

Short and Sweet

Domain names can be really long or really short (1 – 67 characters). In general, it is far better to choose a domain name that is short in length. The shorter your domain name, the easier it will be for people remember. Remembering a domain name is very important from a marketability perspective. As visitors reach your site and enjoy using it, they will likely tell people about it. And those people may tell others, etc. As with any business, word of mouth is the most powerful marketing tool to drive traffic to your site (and it’s free too!). If your site is long and difficult to pronounce, people will not remember the name of the site and unless they bookmark the link, they may never return.

Consider Alternatives

Unless a visitor reaches your site through a bookmark or a link from another site, they have typed in your domain name. Most people on the internet are terrible typists and misspell words constantly. If your domain name is easy to misspell, you should think about alternate domain names to purchase. For example, if your site will be called “MikesTools.com”, you should also consider buying “MikeTools.com” and “MikeTool.com”. You should also secure the different top level domain names besides the one you will use for marketing purposes (“MikesTools.net”, “MikesTools.org”, etc.) You should also check to see if there are existing sites based on the misspelled version of the domain name you are considering. “MikesTools.com” may be available, but “MikesTool.com” may be home to a graphic pornography site. You would hate for a visitor to walk away thinking you were hosting something they did not expect.

Also consider domain names that may not include the name of your company, but rather what your company provides. For example, if the name of your company is Mike’s Tools, you may want to consider domain names that target what you sell. For example: “buyhammers.com” or “hammer-and-nail.com”. Even though these example alternative domain names do not include the name of your company, it provides an avenue for visitors from your target markets. Remember that you can own multiple domain names, all of which can point to a single domain. For example, you could register “buyhammers.com”, “hammer-and-nail.com”, and “mikestools.com” and have “buyhammers.com” and “hammer-and-nail.com” point to “mikestools.com”.

Hyphens: Your Friend and Enemy

Domain name availability has become more and more scant over the years. Many single word domain names have been scooped up which it makes it more and more difficult to find a domain name that you like and is available. When selecting a domain name, you have the option of including hyphens as part of the name. Hyphens help because it allows you to clearly separate multiple words in a domain name, making it less likely that a person will accidentally misspell the name.

domain-hyphenFor example, people are more likely to misspell “domainnamecenter.com” than they are “domain-name-center.com”. Having words crunched together makes it hard on the eyes, increasing the likelihood of a misspelling. On the other hand, hyphens make your domain name longer. The longer the domain name, the easier it is for people to forget it altogether. Also, if someone recommends a site to someone else, they may forget to mention that each word in the domain name is separated by a hyphen. If do you choose to leverage hyphens, limit the number of words between the hyphens to three. Another advantage to using hyphens is that search engines are able to pick up each unique word in the domain name as key words, thus helping to make your site more visible in search engine results.

Dot What?

There are many top level domain names available today including .com, .net, .org, and .biz. In most cases, the more unusual the top level domain, the more available domain names are available. However, the .com top level domain is far and away the most commonly used domain on the internet, driven by the fact that it was the first domain extension put to use commercially and has received incredible media attention. If you cannot lay your hands on a .com domain name, look for a .net domain name, which is the second most commercially popular domain name extension.

Long Arm of the Law

Be very careful not to register domain names that include trademarked names. Although internet domain name law disputes are tricky and have few cases in existence, the risk of a legal battle is not a risk worth taking. Even if you believe your domain name is untouchable by a business that has trademarked a name, do not take the chance: the cost of litigation is extremely high and unless you have deep pockets you will not likely have the resources to defend yourself in a court of law. Even stay away from domain names in which part of the name is trademarked: the risks are the same.

Search Engines and Directories

All search engines and directories are different. Each has a unique process for being part of the results or directory listing and each has a different way of sorting and listing domain names.

google-seo

 

Search engines and directories are the most important on-line marketing channel, so consider how your domain name choice affects site placement before you register the domain. Most directories simply list links to home pages in alphabetical order. If possible, choose a domain name with a letter of the alphabet near the beginning (“a” or “b”). For example, “aardvark-pest-control.com” will come way above “joes-pest-control.com”. However, check the directories before you choose a domain name. You may find that the directories you would like be in are already cluttered with domain names beginning with the letter “a”. Search engines scan websites and sort results based on key words. Key words are words that a person visiting a search engine actually search on. Having key words as part of your domain name can help you get better results.

Howto: Create a File of whatever size you want in Windows

You can create a file of any size using nothing more than what’s supplied with Windows.

There comes a time in every developers life where they need a data file for testing purposes and there are none handy. Rather than searching around for a file that fits your needs, the easiest thing to do is simply to generate one. There are a number of reasons why you might want to generate a data file. For example, recently we needed to test the file upload functionality of a little application we were writing at work, using a whole range of files of different sizes (from <1Mb up to >100Mb).

Rather than hunt around for files that would fit the bill, it was a lot easier to just generate some. Another reason might be when you need to test some functionality (e.g. algorithm) to see how it would handle very large sets of data. Since you normally don’t have files that are 1Gb or more in size just lying around, generating some is probably a good way to go.

Start by converting the desired file size into hexadecimal notation. You can use the Windows Calculator in Scientific mode do to this. Suppose you want a file of 1 million bytes. Enter 1000000 in the calculator and click on the Hex option to convert it (1 million in hex is F4240.) Pad the result with zeroes at the left until the file size reaches eight digits—000F4240.

  • Now open a command prompt window. In Windows 95, 98, or Me, you can do this by entering COMMAND in the Start menu’s Run dialog; in Windows NT 4.0, 2000, or XP/Windows7 enter CMD instead.
  • Enter the command DEBUG BIGFILE.DAT and ignore the File not found message.
  • Type RCX and press Enter. Debug will display a colon prompt. Enter the last four digits of the hexadecimal number you calculated (4240, in our example).

cmd-commands-large-size

  • Type RBX and press Enter, then enter the first four digits of the hexadecimal size (000F, in our example).
  • Enter W for Write and Q for Quit. You’ve just created a 1-million-byte file using Debug. Of course you can create a file of any desired size using the same technique.

cmd-commands-large-size-dir

 

In the above screenshot you can see “BIGFILE.DAT” with size of 1,000,000 bytes.

cmd-commands-large-size-explorer

 

This is the screenshot from explorer. Now you can create file of whatever size you want according to needs.

Explained: What “DirectX” really is, How it works

Ever wondered just what that enigmatic name means?

Gaming and multimedia applications are some of the most satisfying programs you can get for your PC, but getting them to run properly isn’t always as easy as it could be. First, the PC architecture was never designed as a gaming platform. Second, the wide-ranging nature of the PC means that one person’s machine can be different from another. While games consoles all contain the same hardware, PCs don’t: the massive range of difference can make gaming a headache. To alleviate as much of the pain as possible, Microsoft needed to introduce a common standard which all games and multimedia applications could follow – a common interface between the OS and whatever hardware is installed in the PC, if you like. This common interface is DirectX, something which can be the source of much confusion.

DirectX is an interface designed to make certain programming tasks much easier, for both the game developer and the rest of us who just want to sit down and play the latest blockbuster. Before we can explain what DirectX is and how it works though, we need a little history lesson.

DirectX history

Any game needs to perform certain tasks again and again. It needs to watch for your input from mouse, joystick or keyboard, and it needs to be able to display screen images and play sounds or music. That’s pretty much any game at the most simplistic level.

Imagine how incredibly complex this was for programmers developing on the early pre-Windows PC architecture, then. Each programmer needed to develop their own way of reading the keyboard or detecting whether a joystick was even attached, let alone being used to play the game. Specific routines were needed even to display the simplest of images on the screen or play a simple sound.

Essentially, the game programmers were talking directly to your PC’s hardware at a fundamental level. When Microsoft introduced Windows, it was imperative for the stability and success of the PC platform that things were made easier for both the developer and the player. After all, who would bother writing games for a machine when they had to reinvent the wheel every time they began work on a new game? Microsoft’s idea was simple: stop programmers talking directly to the hardware, and build a common toolkit which they could use instead. DirectX was born.

How it works

At the most basic level, DirectX is an interface between the hardware in your PC and Windows itself, part of the Windows API or Application Programming Interface. Let’s look at a practical example. When a game developer wants to play a sound file, it’s simply a case of using the correct library function. When the game runs, this calls the DirectX API, which in turn plays the sound file. The developer doesn’t need to know what type of sound card he’s dealing with, what it’s capable of, or how to talk to it. Microsoft has provided DirectX, and the sound card manufacturer has provided a DirectX-capable driver. He asks for the sound to be played, and it is – whichever machine it runs on.

From our point of view as gamers, DirectX also makes things incredibly easy – at least in theory. You install a new sound card in place of your old one, and it comes with a DirectX driver. Next time you play your favourite game you can still hear sounds and music, and you haven’t had to make any complex configuration changes.

Originally, DirectX began life as a simple toolkit: early hardware was limited and only the most basic graphical functions were required. As hardware and software has evolved in complexity, so has DirectX. It’s now much more than a graphical toolkit, and the term has come to encompass a massive selection of routines which deal with all sorts of hardware communication. For example, the DirectInput routines can deal with all sorts of input devices, from simple two-button mice to complex flight joysticks. Other parts include DirectSound for audio devices and DirectPlay provides a toolkit for online or multiplayer gaming.

dx11 Microsoft

DirectX versions

The current version of DirectX at time of writing is DirectX 11.1. This runs on versions of Windows 7 and Windows 8, before that DirectX 9.0 was the most supported version runs from Windows 98 to XP and including Windows Server 2003. It doesn’t run on Windows 95 though: if you have a machine with Windows 95 installed, you’re stuck with the older and less capable 8.0a. Windows NT 4 also requires a specific version – in this case, it’s DirectX 3.0a.

With so many versions of DirectX available over the years, it becomes difficult to keep track of which version you need. In all but the most rare cases, all versions of DirectX are backward compatible – games which say they require DirectX 7 will happily run with more recent versions, but not with older copies. Many current titles explicitly state that they require DirectX 11 or more, and won’t run without the latest version installed. This is because they make use of new features introduced with this version, although it has been known for lazy developers to specify the very latest version as a requirement when the game in question doesn’t use any of the new enhancements. Generally speaking though, if a title is version locked like this, you will need to upgrade before you can play. Improvements to the core DirectX code mean you may even see improvements in many titles when you upgrade to the latest build of DirectX. Downloading and installing DirectX need not be complex, either.

Upgrading DirectX All available versions of Windows come with DirectX in one form or another as a core system component which cannot be removed, so you should always have at least a basic implementation of the system installed on your PC. However, many new games require the very latest version before they work properly, or even at all.

Generally, the best place to install the latest version of DirectX from the dedicated section of the Microsoft Web site, which is found at http://www.microsoft.com/en-in/download/details.aspx?id=35. As we went to press, the most recent build available for general download was DirectX 11.1. You can download either a simple installer which will in turn download the components your system requires as it installs, or download the complete distribution package in one go for later offline installation.

Another good source for DirectX is games themselves. If a game requires a specific version, it’ll be on the installation CD and may even be installed automatically by the game’s installer itself. You won’t find it on magazine cover discs though, thanks to Microsoft’s licensing terms.

games-directx11

Diagnosing problems

Diagnosing problems with a DirectX installation can be problematic, especially if you don’t know which one of the many components is causing your newly purchased game to fall over. Thankfully, Microsoft provides a useful utility called the DirectX Diagnostic Tool, although this isn’t made obvious. You won’t find this tool in the Start Menu with any version of Windows, and each tends to install it in a different place.

The easiest way to use it is to open the Start Menu’s Run dialog, type in “dxdiag” and then click OK. When the application first loads, it takes a few seconds to interrogate your DirectX installation and find any problems. First, the DirectX Files tab displays version information on each one of the files your installation uses. The Notes section at the bottom is worth checking, as missing or corrupted files will be flagged here.

The tabs marked Display, Sound, Music, Input and Network all relate to specific areas of DirectX, and all but the Input tab provide tools to test the correct functioning on your hardware. Finally, the More Help tab provides a useful way to start the DirectX Troubleshooter, Microsoft’s simple linear problem solving tool for many common DirectX issues.

How to: Hide your data in a Audio Song

Introduction

Due to the way different file types are read it is possible to have a single file that acts differently depending on how it is read. For example sounds & images are read from the header down whereas ZIP files are read from the footer up.

All sound files should work, but some are more unpredictable that others. Mp3s seem to be the most reliable so this tutorial will be using them in the examples (plus who doesn’t love mp3 songs). All the steps are same if you want to use an image(.jpg) instead of sound.

How to create one

Firstly get hold of a sound file you want to hide the data in (example sound.mp3), then gather all your files you want to hide and put them in a ZIP (example secret.zip).

Our chosen Sound and zip file:

sound-secret-files

Windows 7: Shift+right click in the folder containing the files will open command prompt in that directory Windows: Open command prompt (start->run cmd), then use cd to get to the folder where the files are stored. Linux: You know what to do, open terminal and move to directory containing files.

We now need to merge these files together, but we want to use a binary merge to keep the two files intact. With Windows copy command this uses the /B switch. (Binary Data)

Windows

Code:

copy /B sound.mp3+secret.zip newfile.mp3

Linux

Code:

cat sound.mp3 secret.zip > newfile.mp3

You should now have gained a new file called newfile.mp3. This should look identical to the sound you started with when opened with a media player, but with a secret payload hidden within. Here is the example sound containing a ZIP:

sound-secret-files-command

The two simplest ways to get your data back out of these files is to either change the extension from .mp3 to .zip or to open your chosen ZIP program and open newfile.mp3 within that. You should now be presented with your original files.

sound-secret-files-access-data

One more way of getting your .zip file back is to run this code:

copy /b newfile.mp3 file.zip

This is clearly not a secure way to store your data but as a quick and dirt solution to hide files it works well enough. If you are storing text documents in the ZIP then the contents of them will still be visible in a HEX editor looking at newfile.mp3. There are much better steganography tools that use encryption keys to securely store your data within other files.

This method only appends new data (from secret.zip, in this article) into after the footer identifier of mask file (sound.mp3). Good media player will only read from header to footer, and will not read further than that. So whatever data we add will not be read, and the original file will remain in good condition. only it’s size is changing because we add more data into it. The same applies to every file which has header and footer identifier (e.g. jpeg, png, gif, mp3, mp4, exe, and most of known file format).

Story of How Computer Viruses Evolved

Like any other field in computer science, viruses have evolved a great deal indeed over the years. In the series of press releases which start today, we will look at the origins and evolution of malicious code since it first appeared up to the present.

Going back to the origin of viruses, it was in 1949 that Mathematician John Von Neumann described self-replicating programs which could resemble computer viruses as they are known today. However, it was not until the 60s that we find the predecessor of current viruses. In that decade, a group of programmers developed a game called Core Wars, which could reproduce every time it was run, and even saturate the memory of other players’ computers. The creators of this peculiar game also created the first antivirus, an application named Reeper, which could destroy copies created by Core Wars.

However, it was only in 1983 that one of these programmers announced the existence of Core Wars, which was described the following year in a prestigious scientific magazine: this was actually the starting point of what we call computer viruses today.

At that time, a still young MS-DOS was starting to become the preeminent operating system worldwide. This was a system with great prospects, but still many deficiencies as well, which arose from software developments and the lack of many hardware elements known today. Even like this, this new operating system became the target of a virus in 1986: Brain, a malicious code created in Pakistan which infected boot sectors of disks so that their contents could not be accessed. That year also saw the birth of the first Trojan: an application called PC-Write.

Shortly after, virus writers realized that infecting files could be even more harmful to systems. In 1987, a virus called Suriv-02 appeared, which infected COM files and opened the door to the infamous viruses Jerusalem or Viernes 13. However, the worst was still to come: 1988 set the date when the “Morris worm” appeared, infecting 6,000 computers.

From that date up to 1995 the types of malicious codes that are known today started being developed: the first macro viruses appeared, polymorphic viruses … Some of these even triggered epidemics, such as Michael Angelo. However, there was an event that changed the virus scenario worldwide: the massive use of the Internet and e-mail. Little by little, viruses started adapting to this new situation until the appearance, in 1999, of Melissa, the first malicious code to cause a worldwide epidemic, opening a new era for computer viruses.

Part 1

This second installment of ‘The evolution of viruses’ will look at how malicious code used to spread before use of the Internet and e-mail became as commonplace as it is today, and the main objectives of the creators of those earlier viruses. Until the worldwide web and e-mail were adopted as a standard means of communication the world over, the main mediums through which viruses spread were floppy disks, removable drives, CDs, etc., containing files that were already infected or with the virus code in an executable boot sector.

When a virus entered a system it could go memory resident, infecting other files as they were opened, or it could start to reproduce immediately, also infecting other files on the system. The virus code could also be triggered by a certain event, for example when the system clock reached a certain date or time. In this case, the virus creator would calculate the time necessary for the virus to spread and then set a date –often with some particular significance for the virus to activate. In this way, the virus would have an incubation period during which it didn’t visibly affect computers, but just spread from one system to another waiting for ‘D-day’ to launch its payload. This incubation period would be vital to the virus successfully infecting as many computers as possible.

One classic example of a destructive virus that lay low before releasing its payload was CIH, also known as Chernobyl. The most damaging version of this malicious code activated on April 26, when it would try to overwrite the flash-BIOS, the memory which includes the code needed to control PC devices. This virus, which first appeared in June 1998, had a serious impact for over two years and still continues to infect computers today.

Because of the way in which they propagate, these viruses spread very slowly, especially in comparison to the speed of today’s malicious code. Towards the end of the Eighties, for example, the Friday 13th (or Jerusalem) virus needed a long time to actually spread and continued to infect computers for some years. In contrast, experts reckon that in January 2003, SQLSlammer took just ten minutes to cause global communication problems across the Internet.

Notoriety versus stealth

For the most part, in the past, the activation of a malicious code triggered a series of on-screen messages or images, or caused sounds to be emitted to catch the user’s attention. Such was the case with the Ping Pong virus, which displayed a ball bouncing from one side of the screen to another. This kind of elaborate display was used by the creator of the virus to gain as much notoriety as possible. Nowadays however, the opposite is the norm, with virus authors trying to make malicious code as discreet as possible, infecting users’ systems without them noticing that anything is amiss.

Part 2

This third installment of ‘The evolution of viruses’ will look at how the Internet and e-mail changed the propagation techniques used by computer viruses.

Internet and e-mail revolutionized communications. However, as expected, virus creators didn’t take long to realize that along with this new means of communication, an excellent way of spreading their creations far and wide had also dawned. Therefore, they quickly changed their aim from infecting a few computers while drawing as much attention to themselves as possible, to damaging as many computers as possible, as quickly as possible. This change in strategy resulted in the first global virus epidemic, which was caused by the Melissa worm.

With the appearance of Melissa, the economic impact of a virus started to become an issue. As a result, users above all companies started to become seriously concerned about the consequences of viruses on the security of their computers. This is how users discovered antivirus programs, which started to be installed widely. However, this also brought about a new challenge for virus writers, how to slip past this protection and how to persuade users to run infected files.

The answer to which of these virus strategies was the most effective came in the form of a new worm: Love Letter, which used a simple but effective ruse that could be considered an early type of social engineering. This strategy involves inserting false messages that trick users into thinking that the message includes anything, except a virus. This worm’s bait was simple; it led users to believe that they had received a love letter.

This technique is still the most widely used. However, it is closely followed by another tactic that has been the center of attention lately: exploiting vulnerabilities in commonly used software. This strategy offers a range of possibilities depending on the security hole exploited. The first malicious code to use this method –and quite successfully were the BubbleBoy and Kakworm worms. These worms exploited a vulnerability in Internet Explorer by inserting HTML code in the body of the e-mail message, which allowed them to run automatically, without needing the user to do a thing.

Vulnerabilities allow many different types of actions to be carried out. For example, they allow viruses to be dropped on computers directly from the Internet such as the Blaster worm. In fact, the effects of the virus depend on the vulnerability that the virus author tries to exploit.

Part 3

In the early days of computers, there were relatively few PCs likely to contain “sensitive” information, such as credit card numbers or other financial data, and these were generally limited to large companies that had already incorporated computers into working processes.

In any event, information stored in computers was not likely to be compromised, unless the computer was connected to a network through which the information could be transmitted. Of course, there were exceptions to this and there were cases in which hackers perpetrated frauds using data stored in IT systems. However, this was achieved through typical hacking activities, with no viruses involved.

The advent of the Internet however caused virus creators to change their objectives, and, from that moment on, they tried to infect as many computers as possible in the shortest time. Also, the introduction of Internet services like e-banking or online shopping brought in another change. Some virus creators started writing malicious codes not to infect computers, but, to steal confidential data associated to those services. Evidently, to achieve this, they needed viruses that could infect many computers silently.

trojan-horse

Their malicious labor was finally rewarded with the appearance, in 1986, of a new breed of malicious code generically called “Trojan Horse”, or simply “Trojan”. This first Trojan was called PC-Write and tried to pass itself off as the shareware version of a text processor. When run, the Trojan displayed a functional text processor on-screen. The problem was that, while the user wrote, PC-Write deleted and corrupted files on the computers’ hard disk.

After PC-Write, this type of malicious code evolved very quickly to reach the stage of present-day Trojans. Today, many of the people who design Trojans to steal data cannot be considered virus writers but simply thieves who, instead of using blowtorch or dynamite have turned to viruses to commit their crimes. Ldpinch.W or the Bancos or Tolger families of Trojans are examples of this.

Part 4

Even though none of them can be left aside, some particular fields of computer science have played a more determinant role than others with regard to the evolution of viruses. One of the most influential fields has been the development of programming languages.

These languages are basically a means of communication with computers in order to tell them what to do. Even though each of them has its own specific development and formulation rules, computers in fact understand only one language called “machine code”.

Programming languages act as an interpreter between the programmer and the computer. Obviously, the more directly you can communicate with the computer, the better it will understand you, and more complex actions you can ask it to perform.

According to this, programming languages can be divided into “low and high level” languages, depending on whether their syntax is more understandable for programmers or for computers. A “high level” language uses expressions that are easily understandable for most programmers, but not so much for computers. Visual Basic and C are good examples of this type of language.

On the contrary, expressions used by “low-level” languages are closer to machine code, but are very difficult to understand for someone who has not been involved in the programming process. One of the most powerful, most widely used examples of this type of language is “assembler”.

In order to explain the use of programming languages through virus history, it is necessary to refer to hardware evolution. It is not difficult to understand that an old 8-bit processor does not have the power of modern 64-bit processors, and this of course, has had an impact on the programming languages used.

In this and the next installments of this series, we will look at the different programming languages used by virus creators through computer history:

– Virus antecessor: Core Wars

As was already explained in the first chapter of this series, a group of programs called Core Wars, developed by engineers at an important telecommunications company, are considered the antecessor of current-day viruses. Computer science was still in the early stages and programming languages had hardly developed. For this reason, authors of these proto-viruses used a language that was almost equal to machine code to program them.

Curiously enough, it seems that one of the Core Wars programmers was Robert Thomas Morris, whose son programmed years later the “Morris worm”. This malicious code became extraordinarily famous since it managed to infect 6,000 computers, an impressive figure for 1988.

– The new gurus of the 8-bits and the assembler language.

The names Altair, IMSAI and Apple in USA and Sinclair, Atari and Commodore in Europe, bring memories of times gone by, when a new generation of computer enthusiasts “fought” to establish their place in the programming world. To be the best, programmers needed to have profound knowledge of machine code and assembler, as interpreters of high-level languages used too much run time. BASIC, for example, was a relatively easy to learn language which allowed users to develop programs simply and quickly. It had however, many limitations.

This caused the appearance of two groups of programmers: those who used assembler and those who turned to high-level languages (BASIC and PASCAL, mainly).

Computer aficionados of the time enjoyed themselves more by programming useful software than malware. However, 1981 saw the birth of what can be considered the first 8-bit virus. Its name was “Elk Cloner”, and was programmed in machine code. This virus could infect Apple II systems and displayed a message when it infected a computer.

Part 5

Computer viruses evolve in much the same way as in other areas of IT. Two of the most important factors in understanding how viruses have reached their current level are the development of programming languages and the appearance of increasingly powerful hardware.

In 1981, almost at the same time as Elk Kloner (the first virus for 8-bit processors) made its appearance, a new operating system was growing in popularity. Its full name was Microsoft Disk Operating System, although computer buffs throughout the world would soon refer to it simply as DOS.

DOS viruses

The development of MS-DOS systems occurred in parallel to the appearance of new, more powerful hardware. Personal computers were gradually establishing themselves as tools that people could use in their everyday lives, and the result was that the number of PCs users grew substantially. Perhaps inevitably, more users also started creating viruses. Gradually, we witnessed the appearance of the first viruses and Trojans for DOS, written in assembler language and demonstrating a degree of skill on the part of their authors.

Far less programmers know assembler language than are familiar with high-level languages that are far easier to learn. Malicious code written in Fortran, Basic, Cobol, C or Pascal soon began to appear. The last two languages, which are well established and very powerful, are the most widely used, particularly in their TurboC and Turbo Pascal versions. This ultimately led to the appearance of “virus families”: that is, viruses that are followed by a vast number of related viruses which are slightly modified forms of the original code.

Other users took the less ‘artistic’ approach of creating destructive viruses that did not require any great knowledge of programming. As a result, batch processing file viruses or BAT viruses began to appear.

Win16 viruses

The development of 16-bit processors led to a new era in computing. The first consequence was the birth of Windows, which, at the time, was just an application to make it easier to handle DOS using a graphic interface.

The structure of Windows 3.xx files is rather difficult to understand, and the assembler language code is very complicated, as a result of which few programmers initially attempted to develop viruses for this platform. But this problem was soon solved thanks to the development of programming tools for high-level languages, above all Visual Basic. This application is so effective that many virus creators adopted it as their ‘daily working tool’. This meant that writing a virus had become a very straightforward task, and viruses soon appeared in their hundreds. This development was accompanied by the appearance of the first Trojans able to steal passwords. As a result, more than 500 variants of the AOL Trojan family designed to steal personal information from infected computers were identified.

Part 6

This seventh edition on the history of computer viruses will look at how the development of Windows and Visual Basic has influenced the evolution of viruses, as with the development of these, worldwide epidemics also evolved such as the first one caused by Melissa in 1999.

While Windows changed from being an application designed to make DOS easier to manage to a 32-bit platform and operating system in its own right, virus creators went back to using assembler as the main language for programming viruses.

Versions 5 and 6 of Visual Basic (VB) were developed, making it the preferred tool, along with Borland Delphi (the Pascal development for the Windows environment), for Trojan and worm writers. Then, Visual C, a powerful environment developed in C for Windows, was adopted for creating viruses, Trojans and worms. This last type of malware gained unusual strength, taking over almost all other types of viruses. Even though the characteristics of worms have changed over time, they all have the same objective: to spread to as many computers as possible, as quickly as possible.

With time, Visual Basic became extremely popular and Microsoft implemented part of the functionality of this language as an interpreter capable of running script files with a similar syntax.

At the same time as the Win32 platform was implemented, the first script viruses also appeared: malware inside a simple text file. These demonstrated that not only executable files (.EXE and .COM files) could carry viruses. As already seen with BAT viruses, there are also other means of propagation, proving the saying “anything that can be executed directly or through an interpreter can contain malware.” To be specific, the first viruses that infected the macros included in Microsoft Office emerged. As a result, Word, Excel, Access and PowerPoint become ways of spreading ‘lethal weapons’, which destroyed information when the user simply opened a document.

Melissa and self-executing worms

The powerful script interpreters in Microsoft Office allowed virus authors to arm their creations with the characteristics of worms. A clear example is Melissa, a Word macro virus with the characteristics of a worm that infects Word 97 and 2000 documents. This worm automatically sends itself out as an attachment to an e-mail message to the first 50 contacts in the Outlook address book on the affected computer. This technique, which has unfortunately become very popular nowadays, was first used in this virus which, in 1999, caused one of the largest epidemics in computer history in just a few days. In fact, companies like Microsoft, Intel or Lucent Technologies had to block their connections to the Internet due to the actions of Melissa.

The technique started by Melissa was developed in 1999 by viruses like VBS/Freelink, which unlike its predecessor sent itself out to all the contacts in the address book on the infected PC. This started a new wave of worms capable of sending themselves out to all the contacts in the Outlook address book on the infected computer. Of these, the worm that most stands out from the rest is VBS/LoveLetter, more commonly known as ‘I love You’, which emerged in May 2000 and caused an epidemic that caused damage estimated at 10,000 million euros. In order to get the user’s attention and help it to spread, this worm sent itself out in an e-mail message with the subject ‘ILOVEYOU’ and an attached file called ‘LOVE-LETTER-FOR-YOU.TXT.VBS’. When the user opened this attachment, the computer was infected.

As well as Melissa, in 1999 another type of virus emerged that also marked a milestone in virus history. In November of that year, VBS/BubbleBoy appeared, a new type of Internet worm written in VB Script. VBS/BubbleBoy was automatically run without the user needing to click on an attached file, as it exploited a vulnerability in Internet Explorer 5 to automatically run when the message was opened or viewed. This worm was followed in 2000 by JS/Kak.Worm, which spread by hiding behind Java Script in the auto-signature in Microsoft Outlook Express, allowing it to infect computers without the user needing to run an attached file. These were the first samples of a series of worms, which were joined later on by worms capable of attacking computers when the user is browsing the Internet.

The never-ending war of Viruses has still too much to evolve.