Saturday, December 31, 2011

Happy New Year 2012

By Susan Duclos





HAPPY NEW YEAR EVERYONE!!!!!

May 2012 be everything you want it to be.

.

Happy New Year 2012 or "My Whole Life is a Party"

I'm not big on New Year's Eve. It is my least favorite holiday. I get very sad and just want to ignore it because mostly bad things have happened to me on New Year's Eve, like the year my boyfriend popped open an engagement ring box in front of friends and I had to mask my awkward feelings because I knew my answer was "no." But this is a new day. So OK, I give; here goes nothing: "Welcome 2012. Please don't break my heart."


I've got BIG plans for tonight. Rockin out the house (rocking chairs), serving drinks (bottles), jamming to the best tunes of 2011 (mobile music), raising the roof (little bit of crying at the top of our lungs), cleaning up throw up (off of my guests's necks and chins) and passing out on the couch. Of course, this happens every night of my life now. *My Whole Life is Party*

Iranians Decide To Keep Christian Pastor In Prison For Another Year Hoping To Force His Conversion To Islam

Pastor Yousef Nadarkhani was arrested in his home city of Rasht, Iran on October 13, 2009.  He was charged with ‘apostasy’ (renunciation of a religion) and ‘evangelim’. Yousef was tried on Sept. 21–22, 2010 by the 1st Court of the Revolutionary Tribunal and sentenced to death on Nov. 13 for apostasy.

Pastor Yousef Nadarkhani has been under the death threat since 2009.  The Iranian government has imprisoned and torture Pastor Nadarkhani for the last 3 years.
An Iranian court is likely to delay its verdict in a case concerning Pastor Yousef Nadarkhani, who is facing death penalty for converting to Christianity, to allow authorities to further coerce him to convert to Islam as he remains in jail.

Pastor Yousef Nadarkhani
The evangelical pastor’s lawyer has learned that the head of Iran’s judiciary, Ayatollah Sadegh Larijani, has asked the presiding judge over the trial, Ghazi Kashani, to delay the pending judgment and keep him in prison for another year, Present Truth Ministries said in a statement Thursday.

Nadarkhani, a 32-year-old house church leader from the Church of Iran denomination, was convicted of apostasy last year and was sentenced to death by hanging. However, the Supreme Court of Iran asked for the retrial of his case by a lower court in the city of Rasht in northern Gilan Province.

The deliberate delay is meant to let the case “slip away from international attention” even as the authorities continue to “use whatever means necessary to cause him to convert to Islam,” said Jason DeMars, the founder of the ministry that was first to report on the pastor’s arrest two years ago.

It was earlier learnt that the court in Rasht had asked Iran’s supreme leader Ali Khamenei, the highest ranking political and religious authority in Shi’a-majority Iran, to rule on whether the pastor should be put to death.

The pastor was arrested in October 2009 from Rasht for allegedly protesting Islamic instruction in schools for his children, Daniel, 9, and Yoel, 7, and after he sought to register his church. Authorities, however, later changed the charges to apostasy. He has been lodged in a prison in Lakan, about seven miles south of Rasht, since then.

In June 2010, authorities also arrested pastor’s wife Fatemah Pasindedih to pressure him to convert. During this time their boys went to live with a relative. Yousef and his wife were also threatened that their children would be taken away and given to a Muslim family, but they remained firm. Pasindedih was later released.

The Rasht court convicted the pastor of leaving Islam and sentenced him to death in November 2010.

The pastor appealed against the Rasht court’s ruling at the Supreme Court in December 2010, as apostasy is not a crime as per Iran’s penal code. The court, however, held in June 2011 that apostasy was still punishable under Sharia or Islamic law but asked the lower court to reexamine whether Nadarkhani was a believer in Islam when he adopted Christianity at the age of 19.

During the hearings held in September 2011, Pastor Nadarkhani was told by authorities that he would be given three opportunities to embrace Islam and renounce his faith in Christianity to have the charges removed. But he refused to do so.

On Sept. 26, the court determined that Youcef was a Muslim when he adopted Christianity because he was born in a Muslim family. All witnesses stated that he did not practice Islam, yet the court inexplicably determined he was a national apostate.

While the court is likely to wait for another year before reaching a decision, “there are no assurances that he will not be executed,” warned the ministry. “It could happen at any time. This is the way that the Iranian government operates with executions. They do not give advance notice and it is done in secret.”

Finish reading here.
The Iranians are giving themselves another year of imprisonment and torture to force this good man to renounce the faith he loves and embrace the horror of Islam.  This is how Islam has converted millions over the years.  Not by logical arguments, but by torture and the sword.

As long as Pastor Yousef Nadarkhani refuses to convert, he will stay alive.  The minute he converts, they will kill him for blasphemy.

Pray for the safety of Pastor Yousef Nadarkhani.  He is in the lion's den.  May G-d send one of his angels to stand besides him.


By Findalis of Monkey in the Middle

Crafty Crafters: Baptism of Jesus






So how crafty are you?

What is your favorite religious craft you make for the Baptism of Jesus?



Here is a craft I make with my students for the Baptism of Jesus:

Introduce craft: What hovered over Jesus’ head after he was baptized? (A white dove.)



Taking Flight- A bird that can be a dove that you make out of white paper and using the child's handprints. (From the Hands of a Child by Anthony Flores, page 41).

*Every craft in this book is illustrated with materials listed and patterns provided. Very easy step by step directions that even a 1st grader can read and follow and make the craft by himself.



Please leave a comment so others can get ideas for crafts.





Bipartisan Emergency Legislation Proposed To Intervene In VA GOP Ballot Battle

By Susan Duclos

Republican and Democratic lawmakers in Virginia are jumping into the ballot dispute which recently roiled the state of Virginia when two of the four GOP candidates that submitted signatures to be included on the VA GOP primary ballot were disqualified after VA's certification process.

FOX News:

Only Mitt Romney and Ron Paul qualified for the Virginia primary, a contest with 49 delegates up for grabs.

The failure of other candidates to qualify -- notably Newt Gingrich and Rick Perry -- led to complaints that the 10,000-signature requirement is too stringent.

Cuccinelli, who is a Republican, shared the concerns.

"Recent events have underscored that our system is deficient," he said in a statement. "Virginia owes her citizens a better process. We can do it in time for the March primary if we resolve to do so quickly."

Cuccinelli's proposal is expected to state that if the Virginia Board of Elections certifies that a candidate is receiving federal matching funds, or has qualified to receive them, that candidate will upon request be automatically added to the ballot.

Two former Democratic attorneys general are also backing the move, along with a former Democratic state party chairman and a former Republican state party chairman.

Former state Attorney General Tony Troy called the Virginia process a "legal and constitutional embarrassment."

Fellow former top Virginia prosecutor Steve Rosenthal said: "This is not a Democratic or Republican issue. If it takes emergency legislation, then we need to do it."

Sources told Fox News that Virginia Gov. Bob McDonnell is expected to support the emergency legislation as well.


Related WuA pieces on this issue:

Virginia GOP Changed Rules For Primary In November 2011?

Rick Perry Sues Virginia For Ballot Access

.

Steep Decline Of Disillusioned 2008 Obama Youth Voters Is Profound Loss To Democratic Party

By Susan Duclos

"I think you'll be able to imagine many things Senator McCain will be able to say. He's never been the president, but he will put forth his lifetime of experience. I will put forth my lifetime of experience. Senator Obama will put forth a speech he made in 2002."--- Hillary Clinton 2008- (Source- CBS News)

The nonpartisan, independent Center for Information and Research on Civic Learning and Engagement (CIRCLE), in an analysis of current voter registration data in the key electoral states of Nevada and North Carolina, found what they term as a "profound loss of the registration advantage Democrats held during the 2008 election cycle."

That loss was shown to be a steep decline of youth voters, which two-thirds of predominantly registered and turned out to support Barack Obama in 2008.

•North Carolina — Between November 2008 and November 2011, North Carolina saw a net gain of 93,709 in the number of overall, new registrations. However, youth registrants (ages 18-25) lost a net of 48,500 new registrations, while older adults (ages 26 and over) gained over 142,000 registrants. Of the 48,500 net loss in youth registrants, 80.4% were lost among registered Democrats, a net loss of 39,049 young Democratic registrants.

•Nevada — Nevada’s registration rolls have shrunk by a net of 117,109 people since the 2008 election, of whom 50,912 (or 43% of the decline) are between the ages of 18-24. The significant challenge for Democratic candidates in Nevada in 2012, including the re-election campaign of President Barack Obama, is not the ratio of Democrats to Republicans among Nevada youth, since Democratic young people still outnumber Republican young people on the registration rolls by 45,222 to 25,182. However, the potentially, negative electoral impact for the re-election campaign of President Obama is due to the decline in the youth share of all registrants — youth were 11% of Nevada’s registered voters in 2008 election but just 7.85% in October 2011. Given the overwhelming support young voters showed President Obama’s 2008 campaign, with nearly two-thirds of young voters casting their ballot for Obama, this drop in the share of the electorate comprised of young voters could prove a major difficulty to the 2012 re-election campaign for President Obama in Nevada.


This is representative of what is being seen across the nation and shouldn't be a huge surprise since polling has shown this pattern of disillusionment from youth voters for a while now.

Back in June, The Hill reported that a plurality of youth voters disapproved of Obama's handling of the economy by a 44 percent to 31 percent margin and 61 percent said they would "place higher priority on a candidate’s position on issues and record in office, rather than charisma and likability when they cast their vote for president next year."

Young voters just becoming politically active are often taken in by "hope and change" rhetoric, feel good speeches, and unrealistic and impossible campaign promises, but hopefully the youth voters from 2008 learned a valuable lesson about the importance of experience and voting records.

.

January Wreath Change-up

Linking up to Becky over at Beyond the Picket Fence!
What do you get when you mix a salvaged grain bin door, an iron pulley, silver tipped garland, wintery trees, an old metal tool box, a Mason jar resting on casters (purchased at JunkFest 2011!) and an old locker basket? Well, let's see now...













...a fireplace mantel and hearth all dressed up for the remainder of


WINTER.
Stay cozy!

Stolen Art Watch, Leonardo Da Vinci Madonna of the Yarnwinder Intoxicating As Ever !!


Leonardo Da Vinci mystery still to be solved after trial let-down, says art expert

BRITAIN’S leading Leonardo da Vinci expert has spoken out over the “deeply unsatisfying” result of the trial of five men, arrested in the recovery of Scotland’s only painting by the artist three years after it was stolen.

Martin Kemp, a former University of St Andrews art historian with nearly 50 years’ work on Da Vinci behind him, was an expert witness in the two-month court case.

It ended last year with all five defendants cleared of an extortion plot to extract £4.25 million for the return the Madonna of the Yarnwinder.

“I thought it was deeply unsatisfactory. I’ve been involved in three major court cases as a witness,” he told The Scotsman. “My view is that the full story hasn’t come out. There is still a lot more to be unearthed.”

Mr Kemp has co-authored a new book about Da Vinci’s Madonna of the Yarnwinder, long owned by the family of the Duke of Buccleuch and a similar one owned by a New York collector.

In it he concludes the two paintings were worked on in Leonardo’s studio at the same time in about 1501 – though art critics have long argued over the two works, and which is better authenticated.

The Buccleuch Yarnwinder, showing Mary with the Christ child holding a winding stick for yarn, is a star exhibit in the exhibition, Leonardo da Vinci: Painter in the Court of Milan, at the National Gallery in London.

The once-in-a-lifetime show of Da Vinci works, which ends in early February, has brought huge crowds and reports of touts selling advance tickets for hundreds of pounds.

Yesterday, the duke told The Scotsman that he hopes the painting will return direct from London to go on show again at the National Gallery of Scotland. It went on display there in 2009 after its recovery.

“The London exhibition ends in February, my hope is that she will come almost immediately back to Edinburgh,” he said.

But the duke said he is also eager to see the picture hang again in Drumlanrig Castle in Dumfriesshire, from where two men armed with an axe stole it in a daylight raid in 2003.

It was almost a “point of honour” marking the huge effort by the Dumfries and Galloway Police to get the painting back, he said, but security was a major issue. “I’m very keen that she should be back there. At some point, during the summer opening season, next year,” he added.

“It’s an instinctive feeling, that whoever perpetuated the theft, and we don’t know who it was ultimately, shouldn’t so disrupt everything that the picture is never seen there again.”

Mr Kemp said he has had three queries a week recently from people who believe they have a Da Vinci, along with conspiracy theorists who think they have solved bizarre mysteries of the Mona Lisa or other works.

It was “part of the Leonardo insanity that has been escalating since the 19th-century”, he said. “He does attract a following and corresponding levels of lunacy,” he said. “I’m besieged on a daily basis by the Leonardo loonies.”

His book, Madonna of the Yarnwinder, a historical and scientific detective story, is the latest of several on the painter.

With the Buccleuch painting, Scotland is uniquely privileged in having a Da Vinci, he said, with only about 20 paintings accredited to him.

But it is becoming increasingly difficult to stage exhibitions, he said. “The difficulty now is to get the loans. There are things in the National Galleries exhibition that won’t travel again.”

Owners, are being asked to show works again and again, and he has seen drawings suffering from light exposure during his career, he said.

The Buccleuch Yarnwinder was described in the National Gallery’s exhibition catalogue as a work “devised and to a great extent executed by Leonardo” with help from other hands in his studio. Praised for its “warm, softly blurred colours and the strongly accented, beautiful controlled passages of light and shade”, it is thought to be worth £60 million.

Friday, December 30, 2011

How to Login to Any Website Without Registration



Some of the websites force you to register your details and create your account first , to be able to get access to their downloads or any other features that they require an account. But this can be dangerous when a lot of websites are being hacked these days and your private information may be compromised when any of these sites get hacked. Also all these registration processes, wastes a lot of time in filling up those fields and confirming it via email etc. So here is a simple and quick solution that you can easily log into any websites without even having the hassle of registering or creating an account.



BugMeNot is a popular service that lets users share their login information ,so that  it could be used by others and hence be available for any website they are trying to log in.
You will just need to enter the website url in the box provided in the home page of  BugMeNot and it will return a list of login usernames and passwords for you to access the website with the percentage of success rates for each of the respective passwords.
So you can now login to majority of website without even registering or creating an account first.If you share your thoughts or want to share some sites similar to this please leave your suggestions on the comment section below.Cheers..:)

Most Powerful Computer Viruses of all Time



The Internet has been a revolutionary technology that changed the world and the hackers have been trying to crack the vulnerabilities that they can use for their own gains. They also pose a threat to the internet.Here are the top 10 viruses and worms that impacted the world.



1. Melissa
Davil L Smith in 1999 created a virus called Melissa based on Microsoft Word Macro.The virus propagated through the email messages with a attachment called ”Here is that document you asked for, don’t show it to anybody else.”When the victim clicks the attachment, the virus replicates itself by sending it to top 50 emails on the contact list.

2. ILOVEYOU
Developed in Philippines it propagated through Internet Relay Chat and by emails in a Visual Basic Script attachment by tricking them to believe the email is from a secret admirer.It hid several copies of the file in victims computer and replaced several files in the Hard disk of itself.It downloaded a virus file Win-BugsFix.Exe from the internet and executed it.The file would then email the passwords to the Hackers email address.The worm accounted for over 10 billion in damages.

3.  Code Red & Code Red II
Found in 2000, Created a backdoor in the victims computer and used it to control remote access to carry of various kinds of attacks including Denial of Service using the victims computer. The virus used a vulnerability in Windows 2000 and Windows NT , where the buffer overwrites the adjacent memory if the buffer overflows due to too much information.

4. The KLEZ
The Klez debuted in late 2000 , lasted fo several months and spread using spoofed emails to the contact list in the victims computer.It could either act as a Trojan Horse,virus or a worm.The virus made the operaating system inoperable or sometimes could even stop a antivirus program.

5. Nimda
Nimda, Admin spelled backwards, found in 2001 the virus spread rapidly and attacked major internet servers and created backdoors in the victims computer for Denial of Service Attacks.It spread through various methods including emails and gained similar level of access as the person logged into the computer, i e as a administrator or limited user.It bought down many network services by taking up and depleting its resources.

6. SQL slammer/Sapphire
Found in January 2003, the Virus bought down several major web services including Bank Of America ATM services and Continental Airlines and caused more than 1 billion in losses.It spread rapidly doubling every few seconds and infecting half of internet backbone servers in fifteen minutes before the antivirus software’s caught it.

7. MyDoom
Created in 2004 , created a backdoor in victims computer and spread through spoofed emails and peer to peer networks. MyDoom had 2 triggers , where one trigger command was used to command it to Denial of Service attack and the second trigger was used to command stop distribution of the virus.

8. Sasser and Netsky 
Created by  a 17-year-old German named Sven Jaschan , though both programs behaved in different ways, the similarity in coding led in finding out the person. Sasser virus attacked a windows vulnerability and propagated by attacking the victim computer and scanning potential IP addresses for other vulnarable computers for downloading the virus. It even made the victim’s computer difficult in shutting down their computer.   Netsky moves through email’s and windows networks through a attachment and causes a Denial of service attack in taking down web services.

9. Leap-A
Malicious program designed specifically for attacking vulnerability in Mac. Found in 2006, it uses the iChat program to send out messages to all the contacts in the contact list and propagating further to other vulnerable Mac computers. The virus sends out a corrupted file which looks like a jpeg image file attached through the iChat application.

10. Storm Worm
Storm Worm is a Trojan horse program.Found in the year 2006 and called with different names,storm worm is used to carry different payloads of programs in it.This was also used to create Botnets which is used for remote control of the victims computer for sending out spam mails.It was found that more than 200 million emails were infected in carrying the Storm Worm virus in  a span of few days.The Worm was downloaded off the links disguised of the recent events taking place at the time, like the Beijing Olympics or Earthquake in China.

Airtel Offers Free Twitter Access in India



Bharti Airtel the largest Mobile Carrier network in india has collaborated with Twitter to offer free twitter access on its network till March 12,2012 according to reports by MediaNama. The service is a addition to the already available free twitter status updates subscription using the text messages by registering via the number 53000.




According to Twitter Co-founder and Chairman Jack Dorsey , he mentioned in the AsiaD Conference in October that majority of its users are coming from asian countries and the company plans to focus on the asian market like india,japan and phillipines. The service will be available to around 170 million Bharti Airtel Network user base in india. The Service can be accessed through the url mobile.twitter.com.
This service can be accessed by users even without the data connection plans on their mobile phones as in the free Facebook service which doesn’t require a data connection registration. Using this service the users can post tweets, follow friends and celebrities, and access twitter trends and news for free.
This move has been in realizing the  raise in social networking potential in india  . FaceBook had already offered free access to its service with tie up’s with over 50 service providers from March 2010 and free Facebook data access through “Every Phone Java” app from July 2011 with over 20 service providers with 4 from India including Airtel, Aircel , Idea and Reliance.
This service is available till 1,March 2012.

Find out what RAM type you have in Linux





To check what RAM memory type yo have installed (and also see other useful information about your system), do a
sudo dmidecode
Depending on the version of dmidecode you have installed and the hardware configuration you have, each hardware device will have a certain type number assigned t it. On my machine, the RAM has type 6. So to see what RAM type and speed you have, do a
sudo dmidecode --type 6
and the output will be something like
# dmidecode 2.9
SMBIOS 2.3 present.

Handle 0×0008, DMI type 6, 12 bytes
Memory Module Information
Socket Designation: ROW-0
Bank Connections: 1 0
Current Speed: 800
Type: DIMM SDRAM
Installed Size: 256 MB (Double-bank Connection)
Enabled Size: 256 MB (Double-bank Connection)
Error Status: OK

Download the latest 642-902 exam questions with complete 642-813 study guides to successfully pass SY0-201 exam.

How to Easily Block Your Facebook Timeline ?



A lot of People has been asking me to help them to remove timeline. I was surprised with the amount of visits which i got for my post ‘Remove Facebook Timeline (Beta)’ . The method mentioned in that was only meant for removing the developers version of timeline . So If you go through the comments you could see many who dislike the new timeline and want to remove that.






I was in search of a method to solve this issue and at last I found this .The method will help you to get back your old profile without deleting any app as I said in my previous post.

The method is a temporary adjustment with you browser , like the Change The New Facebook Chat Sidebar Back To The Original trick which is working fine even now.

So below I have listed the methods for disabling the timeline feature for each browsers;

For FireFox Users:

  • Open Firefox and click on the Orange Firefox button and choose add-ons.




  • Now the add-on window will be opened. Now Look for the search bar on Top Right and Search  “User agent Switcher” and when search completes and the results come click on the install button and Restart Firefox.




  • After restarting the add-on button should be there in the navigation bar , If its not there right click on the navigation bar and click customize , drag the add-on to navigation bar.
  • Now click on the User Agent Switcher button and slide through Internet Explorer and Choose Internet Explorer 7.




  • Now Goto Facebook and you will see your old Profile.

For Chrome Users:

  • Before Opening the Chrome browser Right click on the chrome icon and choose Properties.




  • Now Look for the Target box and add the following code after ‘chrome.exe’. (leave space adter chrome.exe)
  • Windows 7 / vista users should add the first code and XP users should add the later.



--user-agent="Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)"
--user-agent="Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)"


  • Now click ‘Apply’ and then ‘ok’.
  • Restart Chrome.
  • Now Goto Facebook and you will see your old Profile.


For Safari users:

  • Open Safari and click ‘Alt’ button to display all menus.
  • Now Goto Developer>User Agent>Internet Explorer 7.0





  • Now Restart Safari.
  • Now Goto Facebook and you will see your old Profile.
  • Enjoy Facebook without timeline
  • Plz comment if occure any promblem

Re-entry for youth with disabilities.

For the full report on re-entry programs for youth with disabilities in the juvenile justice system, go here.





------------from Education Week-------------

When young people with disabilities end up in the juvenile justice system, they're less likely to return to youth prisons after their sentence is up if they have jobs or go to school quickly after being released, a new paper says.

However, comprehensive programs that help these youth go from prison to the outside world are scarce, says this piece from Project Forum at the National Association of State Directors of Special Education. And juveniles with disabilities have a high recidivism rate—more than the 55 percent rate for youth without disabilities.

The report looks closely at the practices in four states—Arizona, Georgia, Hawaii, and Oregon—when it comes to supporting all juveniles, including those with disabilities, who are leaving the justice system.

Some common practices the report found in states with programs intended to reduce recidivism for these young people include: a continuum of supports for youth that begins in prison and keeps going once they leave; transition facilitators or coordinators who are dedicated to working with these youth; and programs for reentering society that are comprehensive, addressing education, employment, social and behavioral skills, mental health, substance-abuse issues, housing, and transportation. Another common theme in the report? Budget problems often keep these programs from going long-term.

Here are some details of individual state's programs:


•Before youths' release, Arizona's Department of Juvenile Corrections assigns them a transition coordinator who establishes a relationship and supports them after they leave. Four of these coordinators travel the state and work with parole officers, the state director of special education, and school districts to ensure these juveniles are enrolled in the right programs at the end of their sentences. These coordinators even go to students' IEP meetings.

•Georgia's "Think Exit at Entry" program provides educational planning, progress reviews, transition facilitators, and other supports to youth in the juvenile justice system, including those with disabilities. The program has been scaled back since a federal grant expired in 2007, although some parts of it have kept going because of the partnerships already established among state agencies.

•Hawaii's Olomana School serves students in the Hawaii Youth Correctional Facility, and youth participate in regular meetings about their behavior and school work. Because the state runs all schools in Hawaii, transferring records back to schools when students are released is seamless—and transfer of records is critical to a successful reentry for students with disabilities, the report says.

•Oregon's Project STAY OUT—Strategies Teaching Adolescent Young Offenders to Use Transition Skills—is specifically for youth with an IEP, 504 plan, or mental health diagnosis. Youth work on self-determination skills, social skills, finding work, and other goals. One study found that 66 percent of STAY OUT participants were either employed or in school during the first six months after their release from juvenile justice programs, the very things that are likely to keep them from returning.

How to Enable Facebook Timeline Right Now with One Click



How to Enable Facebook Timeline Right Now with One Click

Facebook officially launched the latest Facebook Timeline feature on 15th December 2011 and it seems to be huge changes on Facebook. On 15th December they rolled out the Facebook Timeline to all its users and it was declared released. Now your profile is going to look more awesome and it is going to be open to the entire world to see what all is changing in your life.
Facebook Timeline gives you an easy way to rediscover the things you shared, and collect your most important moments. It also lets you share new experiences, like the music you listen to or the miles you run.
7-day review period of Facebook Timeline
When you upgrade to Facebook timeline, you’ll have seen seven days to review everything that appears on your Facebook timeline before anyone else can see it. You can also choose to publish your Facebook timeline at any time during the review period. If you decide to wait, your Facebook timeline will go live automatically after seven days. Your new Facebook Timeline will replace your profile, but all your stories and photos will still be there.
If you want to see how your Facebook Timeline appears to other people, click the gear menu at the top of your timeline, and select “View as”. You can choose to see how your timeline appears to a specific friend or the public.

View As Facebook Timeline

Feature of Hide Stories
As you explore your Facebook timeline, you may see stories that you want to feature, like your graduation or the day you bought your first mobile. There might also be tuff that you want to remove or hide from your Facebook timeline.
To feature something on your timeline, roll over the story and click the star to expand it to tow columns. Or you can click the pencil to hide, delete or edit a post.

Hide From Facebook Timeline

Use the privacy dropdown to adjust who can see any of your posts. You can even select “Only Me” for posts you want to keep but don’t want to others to see.

Privacy Option of Facebook Timeline

See all your Activity on Facebook Timeline

With Facebook Timeline, now you have access to a new tool called Activity Log. Your activity log is a place where you can review all your posts and activity, from today back to when you first started using Facebook. Only you can see your activity log.
You’ll see two dropdown menus next to each story in your activity log. The first lets you see and adjust the privacy of a post. The second lets you decide if you want the post to appear on your Facebook Timeline. You can feature, hide or delete any of your post.
To quick find the certain type of story, click the “All” dropdown at the top of your activity log and select what you’re looking for. For example, you can choose to see only photos or posts from apps.

Activity Log of Facebook Timeline

Get Facebook Timeline Today with One Click
To get Facebook Timeline, simply go to the Introducing Timeline page and click “Get Timeline” and click “Publish Now” or you can wait until you see an announcement at the top of your profile. If you want to setup your Facebook Video chat then go to How to setup Facebook Video Chat.
Starting today, Facebook Timeline will also be available on Android and m.facebook.com.

How to type Bold Italic Underline on Facebook chat



Facebook chat is great way to stay connected with your Facebook buddies. Previously I have discussed about how to rotate your Facebook Upside Down to make your profile unique from others. Except normal text typing, you can use different text formatting on Facebook Chat like making text Blog, Italic and Underline.


How to make text bold on Facebook Chat?
While typing text add “*” in begin and end of the message.
Example, you want to make XploringMinds.Com bold on chat then
Type *XploringMinds.Com*



How to make underline text on Facebook Chat?
While typing text add “_” in begin and end of the message.
Example, you want to make XploringMinds.Com underline on chat then
Type _XploringMinds.Com_

How to make Italics text on Facebook Chat?
Unfortunately, Facebook chat doesn’t support italics text on Facebook Chat. Instead of Italics you can use bold or underline on Facebook Chat.

Rotate your Facebook Upside Down



Facebook is large social networking website and used for different purposes. Some of the Facebook user wants to make their profile unique then others. As I have already discussed in previous post how to tag in status, post and comments. Here I will explain

facebook upside down

Follow these steps to rotate your Facebook Upside down

  • Login to your Facebook account
  • Go to “Account”
  • Click on “Account Settings”
  • Go to “Language” tab
  • Choose “English (Upside Down)” from drop down menu.
You are done.
Note: Later you want to make it as default then choose your own language. Example: “English (UK)

Remove DRM from Amazon Kindle’s ebooks using Linux





When you buy an ebook using your Kindle, there’s a 99% chance it’s a DRM file. That means you won’t be able to read it anywhere else but on your Kindle. And we won’t accept that. To be able to convert that file and remove its DRM protection, you need a set of Python scripts called MobiDeDRM.
Now open your Kindle and type 411 on the keypad. This will bring up a window containing information. Write down the 16-character alphanumeric Serial.
Through your computer, buy a book from Amazon.com and save it to your harddrive. The filename shoud be something like Book-Title.azw.
Be sure you have Python installed in Linux. In Ubuntu you can easily install it with sudo apt-get install python.
Extract de files from the MobiDeDRM.zip file and run one of them like this:
python kindlepid.py XXXXXXXXXXX
where XXXXXXXXXXXX is your 16-character Serial. The Terminal window will return something like
Mobipocked PID for Kindle serial# XXXXXXXXXXXXXXXX is Z1QFCDQ*74
That “Z1QFCDQ*74” string is what you need.
Now all you have to do to remove the DRM from the .AZW file is:
python mobidedrm.py Book-Title.azw Book-Title.mobi Z1QFCDQ*74
In a minute or so you should have a DRM-free MobiPocket book you can later convert in any other format you like. If that doesn’t work, try
python mobidedrm2.py Book-Title.azw Book-Title.mobi Z1QFCDQ*74

Monitor your changed files in real-time in Linux





Everybody knows top or htop. Ever wished there was something similar but to monitor your files instead of CPU usage and processes? Well, there is.
Run this:
watch -d -n 2 ‘df; ls -FlAt;’
and you’ll get to spy on which files are getting written on your system. Every time a file gets modified it will get highlighted for a second or so. The above command is useful when you grant someone SSH access to your box and wish to know exactly what they’re modifying.

How to Add Shutdown / Restart / Sleep to the Windows 8 Metro Start Screen



00_new_tiles_on_start_screen
If you have installed the Developer Preview of Windows 8, you probably have discovered the rather obscure method of shutting down the system. There is an easier way of shutting down, restarting, sleeping, and hibernating your computer. You can add tiles to the Windows 8 Metro Start screen that allow you to perform these tasks with one click.
To begin, click the Desktop tile on the Start screen to access the Desktop.

Right-click on the Desktop and select New | Shortcut from the popup menu.

Enter the following command in the Type the location of the item edit box and click Next.
shutdown.exe -s -t 00

Enter a name for the shortcut in the Type a name for this shortcut edit box and click Finish.

The default icon is not very representative of what the shortcut does, so let’s change it. To do so, right-click on the shortcut and select Properties.

The Shortcut tab on the Properties dialog box displays. Click Change Icon.

Because the shutdown.exe program you specified has no icons associated with it, the following message displays. Click OK.

By default, the icons in the shell32.dll file display. You can use the Browse button to select another .exe, .dll, or .ico file, but the shell32.exe file has many icons available. We selected a power symbol icon. Click OK once you have selected your icon.

The selected icon displays on the Properties dialog box. Click OK on the dialog box to close it.

The shortcut has to be copied to another directory to be available on the Start screen, so, copy the shortcut on the desktop.

Paste the shortcut into the following directory:
C:\ProgramData\Microsoft\Windows\Start Menu\Programs
You can either copy the path above and paste it into the address bar in Explorer or you can navigate to the directory. If you can see the ProgramData directory, see the note below.

NOTE: The ProgramData directory is a hidden directory. To gain access to it, click the Hidden items check box in the Show/hide group on the View tab.

Paste the shortcut into the specified directory. You will probably see the following dialog box when you try to paste the file. Click Continue to give permission to paste the file into the directory.

You should see a Shut down tile on the Start screen. One click on this tile will shut down your system.

If you don’t see the Shut down tile on the Start screen, you can search for it and pin it to the Start screen. To find the shortcut, move your mouse over the Start icon in the lower, left corner on the desktop to display the Start menu. Select Search.
NOTE: If you are using a touch screen, you can swipe from the right side of the screen to the left to access the Start menu.

NOTE: You can also access the Start menu in the same way on the Metro Start screen.

The Search panel displays on the right side of the screen. Scroll down and select Apps from the list. Enter “shut down” (or the name you gave your shortcut) in the Search Apps edit box. Press Enter or click the magnifying glass.

The Shut down shortcut displays on the left side of the screen. Right-click the shortcut. The options for the shortcut display in the lower, right corner of the desktop (instead of on a popup menu, like in Windows 7, and earlier). Click the Pin icon. You should now see the Shut down tile on the Start screen.
NOTE: Press Escape to exit the search and go back to the desktop.

To add tiles for Restart, Lock Workstation, Hibernate, and Sleep, enter the following commands create new shortcuts and enter the following commands on the first screen of the Shortcut wizard.
  • Restart Computer: shutdown.exe -r -t 00
  • Lock Workstation: rundll32.exe user32.dll,LockWorkStation
  • Hibernate Computer: rundll32.exe powrProf.dll,SetSuspendState
  • Sleep Computer: rundll32.exe powrprof.dll,SetSuspendState 0,1,0
The rundll32.exe file does have an icon available; however, you may want to change it. Use the Browse button to access a file with more icons. The shell32.dll file is located in C:\Windows\System32.
NOTE: For the Hibernate and Sleep options, make sure that the hardware in your computer support these options and that they are enabled.