// API callback
relatedposts({"version":"1.0","encoding":"UTF-8","feed":{"xmlns":"http://www.w3.org/2005/Atom","xmlns$openSearch":"http://a9.com/-/spec/opensearchrss/1.0/","xmlns$blogger":"http://schemas.google.com/blogger/2008","xmlns$georss":"http://www.georss.org/georss","xmlns$gd":"http://schemas.google.com/g/2005","xmlns$thr":"http://purl.org/syndication/thread/1.0","id":{"$t":"tag:blogger.com,1999:blog-114057792323950405"},"updated":{"$t":"2023-12-14T04:08:59.330-08:00"},"category":[{"term":"TIPS n TRICKS"},{"term":"FACEBOOK HACKING"},{"term":"INTERNET TRICKS"},{"term":"WINDOWS HACKING"},{"term":"MOBILE HACKS"},{"term":"HACKING TOOLS"},{"term":"Other Softwares"},{"term":"SECURITY TIPS"},{"term":"Antivirus Softwares"},{"term":"Video Edit Softwares"},{"term":"GMAIL TIPS n HACKS"},{"term":"Converter Softwares"},{"term":"PC Repair \/ Tune up Softwares"},{"term":"EMAIL HACKING"},{"term":"Notepad Hacks"},{"term":"Photo Edit Softwares"},{"term":"Recovery Softwares"},{"term":"YOUTUBE TIPS n HACKS"},{"term":"Audio Softwares"},{"term":"SOFTWARES"},{"term":"IP ADDRESS HACKS"},{"term":"PASSWORD HACKING"},{"term":"WEBSITE HACKING"},{"term":"CYDIA"},{"term":"HACKING"},{"term":"Hacking Softwares"},{"term":"Rip and Burn Softwares"},{"term":"YAHOO TRICKS n HACKS"},{"term":"Cracking Softwares"},{"term":"Downloader Softwares"},{"term":"Mobile Apps"},{"term":"VIRUS CODES"},{"term":"VIRUS REMOVAL TUTORIAL"},{"term":"iDevices"},{"term":"TWITTER ACCOUNT HACK"},{"term":"BACKTRACK \\ LINUX HACKING"},{"term":"GAMES HACKING"},{"term":"Web Softwares"},{"term":"Games Download"},{"term":"Office Softwares"},{"term":"HACK NEWS"},{"term":"hack"},{"term":"kodi"},{"term":"purevpn"},{"term":"vpn"}],"title":{"type":"text","$t":"HackDonor"},"subtitle":{"type":"html","$t":""},"link":[{"rel":"http://schemas.google.com/g/2005#feed","type":"application/atom+xml","href":"http:\/\/www.hackdonor.com\/feeds\/posts\/default"},{"rel":"self","type":"application/atom+xml","href":"http:\/\/www.blogger.com\/feeds\/114057792323950405\/posts\/default\/-\/SECURITY+TIPS?alt=json-in-script\u0026max-results=6"},{"rel":"alternate","type":"text/html","href":"http:\/\/www.hackdonor.com\/search\/label\/SECURITY%20TIPS"},{"rel":"hub","href":"http://pubsubhubbub.appspot.com/"},{"rel":"next","type":"application/atom+xml","href":"http:\/\/www.blogger.com\/feeds\/114057792323950405\/posts\/default\/-\/SECURITY+TIPS\/-\/SECURITY+TIPS?alt=json-in-script\u0026start-index=7\u0026max-results=6"}],"author":[{"name":{"$t":"Crafteer Jensin"},"uri":{"$t":"http:\/\/www.blogger.com\/profile\/00607592905769962246"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"32","height":"32","src":"\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEisLGV_S_1DvH33FnKJsDHGOO9sOUYbN94jvPGE8iAJWWYSWJDRuPu-7NECqejtc_Ig3zKj-NPDYFfQAPo8Ut7rLT5CLdwfInCWXvwLbaIcug1J_H3SBIZGSt6KJuhdJw\/s113\/128.jpg"}}],"generator":{"version":"7.00","uri":"http://www.blogger.com","$t":"Blogger"},"openSearch$totalResults":{"$t":"18"},"openSearch$startIndex":{"$t":"1"},"openSearch$itemsPerPage":{"$t":"6"},"entry":[{"id":{"$t":"tag:blogger.com,1999:blog-114057792323950405.post-6569792846432247740"},"published":{"$t":"2013-10-04T23:40:00.000-07:00"},"updated":{"$t":"2013-10-04T23:40:52.421-07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"SECURITY TIPS"},{"scheme":"http://www.blogger.com/atom/ns#","term":"WINDOWS HACKING"}],"title":{"type":"text","$t":"How to Create Hidden User Account (Hide User Account from Welcome Screen) in Windows"},"content":{"type":"html","$t":"\u003Cdiv dir=\"ltr\" style=\"text-align: left;\" trbidi=\"on\"\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EWindows operating system including \u003Cb\u003EWindows 7\u003C\/b\u003E, \u003Cb\u003EWindows Vista\u003C\/b\u003E and \u003Cb\u003EWindows XP\u003C\/b\u003E allows multiple user accounts to be created on the computer, be it administrators or standard users. When there is more than one user accounts been defined and created on the PC, Windows will display Welcome Screen, with all available user accounts listed so that user can click and login.\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EHowever, \u003Cb\u003Eshowing and displaying of user accounts on the Welcome Screen is probably a weakness in the security point of view\u003C\/b\u003E, more so if the user account is intended to be a \u003Cb\u003Ehidden\u003C\/b\u003E or \u003Cb\u003Ebackup user account\u003C\/b\u003E. In fact, there is trick to make user account or administrator account that normally been listed on the Welcome Screen to be hidden from view.\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EIn order to \u003Cb\u003Ehide a user account\u003C\/b\u003E (which also means create a hidden user account) in \u003Cb\u003EWindows XP\u003C\/b\u003E, \u003Cb\u003EVista\u003C\/b\u003E, or \u003Cb\u003EWindows 7\u003C\/b\u003E, just go to \u003Cb\u003EControl Panel\u003C\/b\u003E \u003Cb\u003EUser module\u003C\/b\u003E and \u003Cb\u003Ecreate an additional user\u003C\/b\u003E as usually do (\u003Cb\u003E\u003Cspan style=\"color: red;\"\u003EControl Panel\u003C\/span\u003E\u003C\/b\u003E -\u0026gt; \u003Cb\u003E\u003Cspan style=\"color: red;\"\u003EUser Accounts\u003C\/span\u003E\u003C\/b\u003E and \u003Cb\u003E\u003Cspan style=\"color: red;\"\u003EFamily Safety\u003C\/span\u003E\u003C\/b\u003E -\u0026gt; User Accounts in Windows 7 and Windows Vista). \u003Cb\u003EIf you already have an existing user\u003C\/b\u003E that wants to be made hidden, invisible or disappeared from Welcome Screen, then go straight to guide below.\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cul style=\"text-align: left;\"\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003ERun \u003Cb\u003ERegistry Editor\u003C\/b\u003E (RegEdit.exe).\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003ENavigate to the following registry key:\u003C\/span\u003E\u003C\/li\u003E\n\u003C\/ul\u003E\n\u003Cspan style=\"color: red; font-family: Verdana, sans-serif;\"\u003E\u003Cb\u003EHKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\SpecialAccounts\\UserList\u003C\/b\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\n\u003Ca href=\"http:\/\/4.bp.blogspot.com\/-ygKxlALtd6M\/Uk-y0aZ3oWI\/AAAAAAAABjs\/EJZgtqhThVk\/s1600\/userlist.jpg\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cimg border=\"0\" height=\"217\" src=\"http:\/\/4.bp.blogspot.com\/-ygKxlALtd6M\/Uk-y0aZ3oWI\/AAAAAAAABjs\/EJZgtqhThVk\/s400\/userlist.jpg\" width=\"400\" \/\u003E\u003C\/a\u003E\u003C\/div\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cb\u003ENote\u003C\/b\u003E: If \u003Cb\u003ESpecialAccounts\u003C\/b\u003E and \u003Cb\u003EUserList\u003C\/b\u003E is not found, create new sub-key and name them accordingly.\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cul style=\"text-align: left;\"\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003ESelect \u003Cb\u003EUserList\u003C\/b\u003E, and in the right pane, right click on any blank space, and point to \u003Cb\u003ENew\u003C\/b\u003E -\u0026gt; \u003Cb\u003EDWORD\u003C\/b\u003E \u003Cb\u003E(32-bit) Value\u003C\/b\u003E.\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EName the new DWORD registry value name as the exact same name that match the name of the user account to be hidden.\u003C\/span\u003E\u003C\/li\u003E\n\u003C\/ul\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EFor example, if the user ID of the user account is John, the name the registry value as John.\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cul style=\"text-align: left;\"\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EDouble click on DWORD registry value, and set the value data to 0 in oder to hide the account from Welcome Screen.\u003C\/span\u003E\u003C\/li\u003E\n\u003C\/ul\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cb\u003ETip\u003C\/b\u003E: \u003Cb\u003ETo display the user account on Welcome Screen\u003C\/b\u003E again so that it’s visible again, delete the registry entry, or set the value data to \u003Cb\u003E1\u003C\/b\u003E.\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cul style=\"text-align: left;\"\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EExit Registry Editor.\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003ELog off or restart computer to make the change effective.\u003C\/span\u003E\u003C\/li\u003E\n\u003C\/ul\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003ETip: In order to login into Windows using an user account that has made hidden and invisible, just press \u003Cb\u003ECtrl+Alt+Del\u003C\/b\u003E to bring up Windows Logon dialog, and then type in the user name and password manually.\u003C\/span\u003E\u003C\/div\u003E\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"http:\/\/www.hackdonor.com\/feeds\/6569792846432247740\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"http:\/\/www.hackdonor.com\/2013\/10\/how-to-create-hidden-user-account-hide.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"http:\/\/www.blogger.com\/feeds\/114057792323950405\/posts\/default\/6569792846432247740"},{"rel":"self","type":"application/atom+xml","href":"http:\/\/www.blogger.com\/feeds\/114057792323950405\/posts\/default\/6569792846432247740"},{"rel":"alternate","type":"text/html","href":"http:\/\/www.hackdonor.com\/2013\/10\/how-to-create-hidden-user-account-hide.html","title":"How to Create Hidden User Account (Hide User Account from Welcome Screen) in Windows"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"http:\/\/4.bp.blogspot.com\/-ygKxlALtd6M\/Uk-y0aZ3oWI\/AAAAAAAABjs\/EJZgtqhThVk\/s72-c\/userlist.jpg","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-114057792323950405.post-7195882525470923218"},"published":{"$t":"2013-08-09T23:03:00.000-07:00"},"updated":{"$t":"2013-08-09T23:03:26.897-07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"SECURITY TIPS"},{"scheme":"http://www.blogger.com/atom/ns#","term":"WEBSITE HACKING"}],"title":{"type":"text","$t":"How To Secure Your WordPress With .htacess File"},"content":{"type":"html","$t":"\u003Cdiv dir=\"ltr\" style=\"text-align: left;\" trbidi=\"on\"\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EThere are several ways of making your WordPress secure (using WordPress best practices, security plugins, content delivery networks…) and configuring your .htaccess is just one of them, the one that belongs to the domain of prevention.\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\n\u003Ca href=\"http:\/\/2.bp.blogspot.com\/-f5Tk3I0PN8Y\/UgXXS72VSeI\/AAAAAAAABhQ\/fjRv3h5id7c\/s1600\/WordPress_Security.jpg\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cimg border=\"0\" src=\"http:\/\/2.bp.blogspot.com\/-f5Tk3I0PN8Y\/UgXXS72VSeI\/AAAAAAAABhQ\/fjRv3h5id7c\/s1600\/WordPress_Security.jpg\" \/\u003E\u003C\/a\u003E\u003C\/div\u003E\n\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"color: #cc0000; font-family: Verdana, sans-serif;\"\u003E\u003Cb\u003EConfiguring .Htaccess\u003C\/b\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cb\u003E.htacess\u003C\/b\u003E is a configuration file that allows you to override your server’s global settings for the directory that it’s in, by limitting file access.\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EThere’s a couple of ways you can access it:\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cul style=\"text-align: left;\"\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EFind it in the root of your website\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EEdit it using WordPress SEO plugin by Yoast\u003C\/span\u003E\u003C\/li\u003E\n\u003C\/ul\u003E\n\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EHere’s a piece of code generated by WordPress and you’ll find it in almost every .htaccess file:\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003E\u003Ci\u003E# BEGIN WordPress\u003C\/i\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003E\u003Ci\u003E\u0026lt;ifmodule mod_rewrite.c\u0026gt;\u003C\/i\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003E\u003Ci\u003ERewriteEngine On\u003C\/i\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003E\u003Ci\u003ERewriteBase \/\u003C\/i\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003E\u003Ci\u003ERewriteRule ^index\\.php$ - [L]\u003C\/i\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003E\u003Ci\u003ERewriteCond %{REQUEST_FILENAME} !-f\u003C\/i\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003E\u003Ci\u003ERewriteCond %{REQUEST_FILENAME} !-d\u003C\/i\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003E\u003Ci\u003ERewriteRule . \/index.php [L]\u003C\/i\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003E\u003Ci\u003E\u0026lt;\/IfModule\u0026gt;\u003C\/i\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003E\u003Ci\u003E# END WordPress\u003C\/i\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EAnything else you decide to apply to harden WordPress security should be added after this.\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"color: #cc0000; font-family: Verdana, sans-serif;\"\u003E\u003Cb\u003EProtect Wp-Config.Php :\u003C\/b\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EWordPress best practices suggest you protect your wp-config.php file and you can do that by adding:\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\n\u003Ci\u003E\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003E\u0026lt;files wp-config.php\u0026gt;\u003C\/span\u003E\u003C\/i\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Ci\u003E\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003Eorder allow,deny\u003C\/span\u003E\u003C\/i\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Ci\u003E\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003Edeny from all\u003C\/span\u003E\u003C\/i\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Ci\u003E\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003E\u0026lt;\/files\u0026gt;\u003C\/span\u003E\u003C\/i\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"color: #cc0000; font-family: Verdana, sans-serif;\"\u003E\u003Cb\u003EPrevent Directory Browsing :\u003C\/b\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EYou know how you can change a few characters in a URL and continue browsing the website. With this code you’ll \u003Cb\u003Eprevent any directory browsing\u003C\/b\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\n\u003Ci\u003E\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003E# directory browsing\u003C\/span\u003E\u003C\/i\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Ci\u003E\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003EOptions All -Indexes\u003C\/span\u003E\u003C\/i\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"color: #cc0000; font-family: Verdana, sans-serif;\"\u003E\u003Cb\u003EDisable Any Hotlinking :\u003C\/b\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003ESometimes other (non-ethical) site curators will try to use your images and videos and put a strain on your serves, which uses your disk space and bandwidth. While this is not in the domain of WordPress security, it will certainly help your website’s overall health. Adding this to your .htaccess will prevent \u003Cb\u003Ehotlinking\u003C\/b\u003E from happening:\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Ci\u003E\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003ERewriteEngine on\u003C\/span\u003E\u003C\/i\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Ci\u003E\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003ERewriteCond %{HTTP_REFERER} !^$\u003C\/span\u003E\u003C\/i\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Ci\u003E\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003ERewriteCond %{HTTP_REFERER} !^http(s)?:\/\/(www\\.)?YourDomain [NC]\u003C\/span\u003E\u003C\/i\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Ci\u003E\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003ERewriteRule \\.(jpg|jpeg|png|gif)$ - [NC,F,L]\u003C\/span\u003E\u003C\/i\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cb\u003E\u003Cspan style=\"color: red;\"\u003Enote:\u003C\/span\u003E\u003C\/b\u003E Be sure to change “YourDomain” with your domain address and leave out the “www” part\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EIf you need to allow certain websites to use your images, then you can use this online tool for generating the anti hotlinking code where you can define various parameters.\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"color: #cc0000; font-family: Verdana, sans-serif;\"\u003E\u003Cb\u003EProtect \/Wp-Content Directory :\u003C\/b\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EWordPress holds all your media files in here and they’re an asset you want search engines to crawl. But, “\/wp-content” is a place where your themes and plugins reside, too. You don’t want to allow access to those sensitive .php files.\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EIn order to work you need to \u003Cb\u003Ecreate a separate .htaccess file\u003C\/b\u003E (just use your FTP client and create a file with no name and give it an “.htaccess” extension) and put it in your \/wp-content directory. This code will allow access to images, CSS, java-script and XML files, but deny it for any other type.\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\n\u003Ci\u003E\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003Eorder deny,allow\u003C\/span\u003E\u003C\/i\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Ci\u003E\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003Edeny from all\u003C\/span\u003E\u003C\/i\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Ci\u003E\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003E\u0026lt;files ~ \".(xml|css|jpe?g|png|gif|js)$\"\u0026gt;\u003C\/span\u003E\u003C\/i\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Ci\u003E\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003Eallow from all\u003C\/span\u003E\u003C\/i\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Ci\u003E\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003E\u0026lt;\/files\u0026gt;\u003C\/span\u003E\u003C\/i\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EThat’s it. Your WordPress website should be a lot safer place now. There’s just one last thing we should do and that’s \u003Cb\u003Eprotecting the .htaccess file(s)\u003C\/b\u003E.\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"color: #cc0000; font-family: Verdana, sans-serif;\"\u003E\u003Cb\u003EProtect The .Htaccess Itself :\u003C\/b\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EWe’ve done a lot to protect WordPress, but the .htaccess file itself is still open to attacks. The following code snippet will stop anyone from accessing (reading or writing) any file that starts with “hta“.\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Ci\u003E\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003E\u0026lt;pre\u0026gt;\u0026lt;files ~ \"^.*\\.([Hh][Tt][Aa])\"\u0026gt;\u003C\/span\u003E\u003C\/i\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Ci\u003E\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003Eorder allow,deny\u003C\/span\u003E\u003C\/i\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Ci\u003E\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003Edeny from all\u003C\/span\u003E\u003C\/i\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Ci\u003E\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003Esatisfy all\u003C\/span\u003E\u003C\/i\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Ci\u003E\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003E\u0026lt;\/files\u0026gt;\u003C\/span\u003E\u003C\/i\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EWhile you can install various WordPress security plugins, sign-up for monitoring services and content delivery networks which filter your traffic, configuring .htaccess file so it strengthens your WordPress security is a good step toward that peace of mind every website owner needs.\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EPrevention is often the best cure.\u0026nbsp;\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cb style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cspan style=\"color: red;\"\u003ENote:\u003C\/span\u003E\u003C\/b\u003E \u003Cb\u003E\u003Cspan style=\"font-family: Trebuchet MS, sans-serif;\"\u003EMaking changes to .htaccess should be pretty relaxing job, but if you use plugins (ex. WordPress SEO) for configuring .htaccess, please make sure to also have FTP credentials, just in case you need to directly access and reconfigure it.\u003C\/span\u003E\u003C\/b\u003E\u003C\/div\u003E\n\u003C\/div\u003E\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"http:\/\/www.hackdonor.com\/feeds\/7195882525470923218\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"http:\/\/www.hackdonor.com\/2013\/08\/how-to-secure-your-wordpress-with.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"http:\/\/www.blogger.com\/feeds\/114057792323950405\/posts\/default\/7195882525470923218"},{"rel":"self","type":"application/atom+xml","href":"http:\/\/www.blogger.com\/feeds\/114057792323950405\/posts\/default\/7195882525470923218"},{"rel":"alternate","type":"text/html","href":"http:\/\/www.hackdonor.com\/2013\/08\/how-to-secure-your-wordpress-with.html","title":"How To Secure Your WordPress With .htacess File"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"http:\/\/2.bp.blogspot.com\/-f5Tk3I0PN8Y\/UgXXS72VSeI\/AAAAAAAABhQ\/fjRv3h5id7c\/s72-c\/WordPress_Security.jpg","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-114057792323950405.post-1003398172319541330"},"published":{"$t":"2013-08-09T22:36:00.000-07:00"},"updated":{"$t":"2016-08-05T09:18:12.112-07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"SECURITY TIPS"}],"title":{"type":"text","$t":"How to enable Two-Factor authentication in Linkedin"},"content":{"type":"html","$t":"\u003Cdiv dir=\"ltr\" style=\"text-align: left;\" trbidi=\"on\"\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003EI'm very glad to hear that Linkedin boosts the security with the Two-Factor authentication. Few days back, Twitter enabled the two-step verification to thwart hackers.\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003EAre you searching for the guide to configure the 2-step authentication? You are at right place. \u0026nbsp;Here is the guide that will help you to configure the linkedin two-step verification.\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003EBefore getting into the actual steps, let me give you some additional security tips on how to step up your Linkedin security:\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E \u003Cspan style=\"color: #cc0000; font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cb\u003EUsing VPN with Linkedin is mandatory!\u003C\/b\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E \u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003EUsing Linkedin can be a major privacy risk, especially if you're in an internet cafe, airport, or an unsecured\u0026nbsp;Wi-Fi location. People at the airport can easily steal your Linkedin password. Not only that, but Linkedin tracks your IP address and can locate your real world location and habits to build an invasive user profile that agencies like the NSA use.\u0026nbsp;\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E \u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003EOr if you aren't careful, someone might hack your connection and get into your Linkedin account.\u0026nbsp;\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003EVirtual private networks are an easy way to protect your privacy online. Simply download the app, connect to it when you use the internet, and your internet use is encrypted. Great for torrenting, or even unlocking geo-restrictions--or protecting your Linkedin account!.\u0026nbsp;\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E \u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003EOur favorite VPN to use is TorGuard. Use code \"best10VPN\" on checkout and click\u0026nbsp;\u003Ca href=\"http:\/\/best10vpn.com\/recommends\/torguard\" target=\"_blank\"\u003E\u003Cb\u003Ehere\u003C\/b\u003E\u003C\/a\u003E\u0026nbsp;to get a 25% discount.\u0026nbsp;\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003ESee a review\u0026nbsp;\u003Ca href=\"http:\/\/best10vpn.com\/torguard\/review\/\" target=\"_blank\"\u003E\u003Cb\u003Ehere\u003C\/b\u003E\u003C\/a\u003E\u0026nbsp;of TorGuard VPN.\u0026nbsp;\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003EHere's where explain what 2-step auth is.\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"color: #cc0000; font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cb\u003ETwo-Step Verification:\u003C\/b\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003EA security feature that prompts you to enter a temporary secret number sent to your phone whenever you log into your account.\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"color: #cc0000; font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cb\u003EWhy you should enable this feature?\u003C\/b\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003EI believe this is best security feature. \u0026nbsp;Let us assume, someone has stolen your login credentials via keylogger or phishing or any other method. \u0026nbsp;If the hacker try to log into the website with your credentials, he will asked to provide the secret number sent to your mobile. \u0026nbsp;Fortunately, you have your mobile with you ;) . \u0026nbsp;So hacker can't log in to your account. \u0026nbsp;Also you will come to know that someone is trying to access your account. \u0026nbsp;\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u0026nbsp;\u0026nbsp;\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"color: #cc0000; font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cb\u003EHow to configure the Linkedin Two-factor authentication?\u003C\/b\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cb\u003EStep1:\u003C\/b\u003E\u0026nbsp;\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003ELogin to your account and go to the settings page:\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Ca href=\"https:\/\/www.linkedin.com\/settings\/\" target=\"_blank\"\u003Ehttps:\/\/www.linkedin.com\/settings\/\u003C\/a\u003E\u0026nbsp;\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cb\u003EStep 2:\u003C\/b\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003Eselect the \"Account\" tab and click the \" Manage security settings \" option.\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cimg height=\"202\" src=\"https:\/\/2.bp.blogspot.com\/-52xfKRwj_ZM\/UaoJ-gxYFGI\/AAAAAAAAJS8\/LSytXHQArIg\/s400\/linkedin-manage-security-settings.jpg\" width=\"400\" \/\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cb\u003EStep 3:\u0026nbsp;\u003C\/b\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003ENow Here , you can see the \"Two-step verification for sign in \" option and it displays the feature is currently \"off\". \u0026nbsp;To turn on the feature , simply click the \"Turn on\" link.\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cimg height=\"117\" src=\"https:\/\/4.bp.blogspot.com\/-xp0jwNEVAbs\/UaoJ9kN2L0I\/AAAAAAAAJSo\/IqPQIopRQpY\/s400\/Linkedin-security-feature.jpg\" width=\"400\" \/\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E \u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003EIn next step, you will be asked to enter your phone number.\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E \u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cimg height=\"230\" src=\"https:\/\/1.bp.blogspot.com\/-eHc8Y-i23eY\/UaoJ-wduD_I\/AAAAAAAAJTI\/H2ulnDjWjTc\/s400\/two-step-verification.jpg\" width=\"400\" \/\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E \u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cb\u003EStep4 :\u003C\/b\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cimg src=\"https:\/\/1.bp.blogspot.com\/-efK8PVd4DeY\/UaoJ-4VamrI\/AAAAAAAAJTE\/8uGhnbl5QRQ\/s320\/turn-on-two-factor-verification.jpg\" \/\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E \u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003EOnce you enter the phone number, you will receive a security code. \u0026nbsp;After entering the security code sent to your mobile number, the feature will be turned on. \u0026nbsp;Hurrah, Now you are protected :)\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cimg height=\"266\" src=\"https:\/\/3.bp.blogspot.com\/-JbG-6dqr_Y4\/UaoJ9hfYkHI\/AAAAAAAAJSk\/DT1_md7Evh8\/s400\/Linkedin-security-feature-turned-on.jpg\" width=\"400\" \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003ENext time, when you try to log in, you will be asked to provide the secret code :)\u003C\/span\u003E\u003C\/div\u003E\n\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cimg height=\"173\" src=\"https:\/\/4.bp.blogspot.com\/-jBFrzuw1Bis\/UaoJ9vNwOpI\/AAAAAAAAJSs\/OYdd1zIJ2ww\/s400\/Linkedin-two-step-authentication.jpg\" width=\"400\" \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003C\/div\u003E\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"http:\/\/www.hackdonor.com\/feeds\/1003398172319541330\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"http:\/\/www.hackdonor.com\/2013\/08\/how-to-enable-two-factor-authentication.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"http:\/\/www.blogger.com\/feeds\/114057792323950405\/posts\/default\/1003398172319541330"},{"rel":"self","type":"application/atom+xml","href":"http:\/\/www.blogger.com\/feeds\/114057792323950405\/posts\/default\/1003398172319541330"},{"rel":"alternate","type":"text/html","href":"http:\/\/www.hackdonor.com\/2013\/08\/how-to-enable-two-factor-authentication.html","title":"How to enable Two-Factor authentication in Linkedin"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/2.bp.blogspot.com\/-52xfKRwj_ZM\/UaoJ-gxYFGI\/AAAAAAAAJS8\/LSytXHQArIg\/s72-c\/linkedin-manage-security-settings.jpg","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-114057792323950405.post-6386253270011541662"},"published":{"$t":"2013-07-23T00:44:00.002-07:00"},"updated":{"$t":"2013-07-23T00:44:50.713-07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"SECURITY TIPS"}],"title":{"type":"text","$t":"Mobile Manners - 11 Do's and Don'ts for Cellphone Users"},"content":{"type":"html","$t":"\u003Cdiv dir=\"ltr\" style=\"text-align: left;\" trbidi=\"on\"\u003E\n\u003Cdiv style=\"text-align: justify;\"\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cb\u003EWashington:\u003C\/b\u003E Cellphones are ubiquitous and research shows that although most users think they have good mobile manners, many people report being irritated or annoyed by the use of the phones in public places.\u0026nbsp;\u003C\/span\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EClearly there's a lack of understanding of what is and isn't acceptable in terms of cellphone etiquette.\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"text-align: justify;\"\u003E\n\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\n\u003Ca href=\"http:\/\/3.bp.blogspot.com\/-QHdR66RsgXU\/Ue4y078mkGI\/AAAAAAAACPQ\/k_fUrD3AbY0\/s1600\/this-manners_1214581a.jpg\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cimg border=\"0\" height=\"250\" src=\"http:\/\/3.bp.blogspot.com\/-QHdR66RsgXU\/Ue4y078mkGI\/AAAAAAAACPQ\/k_fUrD3AbY0\/s400\/this-manners_1214581a.jpg\" width=\"400\" \/\u003E\u003C\/a\u003E\u003C\/div\u003E\n\u003C\/div\u003E\n\u003Cdiv style=\"text-align: justify;\"\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cb\u003EFollowing are the list of Do's and Don'ts:\u003C\/b\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"text-align: justify;\"\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cb\u003E1\u003C\/b\u003E. Do respect those who are with you. When you're engaged face-to-face with others, either in a meeting or a conversation, give them your complete and undivided attention. Avoid texting or taking calls. If a call is important, apologise and ask permission before accepting it.\u003C\/span\u003E\u003C\/div\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\n\u003Cdiv\u003E\n\u003Cbr \/\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cb\u003E2\u003C\/b\u003E. Don't yell. The average person talks three times louder on a cellphone than they do in a face-to-face conversation. Always be mindful of your volume.\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\n\u003Ca href=\"http:\/\/4.bp.blogspot.com\/-Oy2wq5nFQ0A\/Ue4zQ86M7yI\/AAAAAAAACPY\/M_Caag8itv4\/s1600\/angry-man-yelling-in-to-mobile-phone.jpg\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cimg border=\"0\" height=\"212\" src=\"http:\/\/4.bp.blogspot.com\/-Oy2wq5nFQ0A\/Ue4zQ86M7yI\/AAAAAAAACPY\/M_Caag8itv4\/s320\/angry-man-yelling-in-to-mobile-phone.jpg\" width=\"320\" \/\u003E\u003C\/a\u003E\u003C\/div\u003E\n\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cb\u003E3\u003C\/b\u003E. Do be a good dining companion. No one wants to be a captive audience to a third-party cellphone conversation, or to sit in silence while their dining companion texts with someone. Always silence and store your phone before being seated. Never put your mobile phone on the table.\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cbr \/\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cb\u003E4\u003C\/b\u003E. Don't ignore universal quiet zones such as the theatre, religious places, the library, your daughter's dance recital and funerals.\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cbr \/\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cb\u003E5\u003C\/b\u003E. Do let voicemail do its job. When you're in the company of others, let voicemail handle non-urgent calls.\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cbr \/\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cb\u003E6\u003C\/b\u003E. Don't make wait staff wait. Whether it's your turn in line or time to order at the table, always make yourself available to the server. Making servers and other patrons wait for you to finish a personal phone call is never acceptable. If the call is important, step away from the table or get out of line.\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cbr \/\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cb\u003E7\u003C\/b\u003E. Don't text and drive. There is no message that is so important.\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\n\u003Ca href=\"http:\/\/3.bp.blogspot.com\/-rum3EMk5Dh8\/Ue40A8BMLcI\/AAAAAAAACPk\/15oSQZIqk98\/s1600\/texting.jpg\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cimg border=\"0\" height=\"273\" src=\"http:\/\/3.bp.blogspot.com\/-rum3EMk5Dh8\/Ue40A8BMLcI\/AAAAAAAACPk\/15oSQZIqk98\/s400\/texting.jpg\" width=\"400\" \/\u003E\u003C\/a\u003E\u003C\/div\u003E\n\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cb\u003E8\u003C\/b\u003E. Do keep arguments under wraps. Nobody can hear the person on the other end. All they are aware of is a one-sided screaming match a few feet away.\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cbr \/\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cb\u003E9\u003C\/b\u003E. Don't forget to filter your language. A rule of thumb: If you wouldn't walk through a busy public place with a particular word or comment printed on your T-shirt, don't use it in cellphone conversations.\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cbr \/\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cb\u003E10\u003C\/b\u003E. Do respect the personal space of others. When you must use your phone in public, try to keep at least 10 feet (three metres) between you and others.\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cbr \/\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cb\u003E11\u003C\/b\u003E. Do exercise good international calling behaviour. The rules of cellphone etiquette vary from country to country.\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cbr \/\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\nGood cellphone etiquette is similar to common courtesy. Conversations and text exchanges have a tendency to distract people from what's happening in front of them. Cellphone users should be thoughtful, courteous and respect the people around them.\u003C\/div\u003E\n\u003C\/span\u003E\u003C\/div\u003E\n\u003C\/div\u003E\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"http:\/\/www.hackdonor.com\/feeds\/6386253270011541662\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"http:\/\/www.hackdonor.com\/2013\/07\/mobile-manners-11-dos-and-donts-for.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"http:\/\/www.blogger.com\/feeds\/114057792323950405\/posts\/default\/6386253270011541662"},{"rel":"self","type":"application/atom+xml","href":"http:\/\/www.blogger.com\/feeds\/114057792323950405\/posts\/default\/6386253270011541662"},{"rel":"alternate","type":"text/html","href":"http:\/\/www.hackdonor.com\/2013\/07\/mobile-manners-11-dos-and-donts-for.html","title":"Mobile Manners - 11 Do's and Don'ts for Cellphone Users"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"http:\/\/3.bp.blogspot.com\/-QHdR66RsgXU\/Ue4y078mkGI\/AAAAAAAACPQ\/k_fUrD3AbY0\/s72-c\/this-manners_1214581a.jpg","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-114057792323950405.post-9149191433856337165"},"published":{"$t":"2013-05-07T05:48:00.000-07:00"},"updated":{"$t":"2013-05-07T05:48:13.752-07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"EMAIL HACKING"},{"scheme":"http://www.blogger.com/atom/ns#","term":"SECURITY TIPS"}],"title":{"type":"text","$t":"How to Send Password Protected Email"},"content":{"type":"html","$t":"\u003Cdiv dir=\"ltr\" style=\"text-align: left;\" trbidi=\"on\"\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EFirst open\u0026nbsp;\u003Cb\u003E\u003Ca href=\"https:\/\/lockbin.com\/Messaging\"\u003Ehttps:\/\/lockbin.com\/Messaging\u003C\/a\u003E\u003C\/b\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003ENow enter “\u003Cb\u003Eyour name\u003C\/b\u003E”, “\u003Cb\u003Eyour email address\u003C\/b\u003E”, “\u003Cb\u003ERecipient email address\u003C\/b\u003E” and set a “\u003Cb\u003Esecret password\u003C\/b\u003E”. You have to inform this secret password to receiver through phone call, text message, email etc. Receiver cannot read your mail until he\/she know your secret password. Now you compose your private mail content. Enable the option “\u003Cb\u003EI accept the term and condition\u003C\/b\u003E” and click on “\u003Cb\u003ESubmit\u003C\/b\u003E”.\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cdiv\u003E\n\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\n\u003Ca href=\"http:\/\/4.bp.blogspot.com\/-slBOkDCSXoQ\/UYj3PbUeh0I\/AAAAAAAABbA\/dQLKAkDTd1Y\/s1600\/lockbin.jpg\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cimg alt=\"lockbin\" border=\"0\" height=\"640\" src=\"http:\/\/4.bp.blogspot.com\/-slBOkDCSXoQ\/UYj3PbUeh0I\/AAAAAAAABbA\/dQLKAkDTd1Y\/s640\/lockbin.jpg\" title=\"How to Send Password Protected Email\" width=\"403\" \/\u003E\u003C\/a\u003E\u003C\/div\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003ETo read your message receiver just needs to enter the \u003Cb\u003Esecret key\u003C\/b\u003E you provided.\u003C\/span\u003E\u003C\/div\u003E\n\u003C\/div\u003E\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"http:\/\/www.hackdonor.com\/feeds\/9149191433856337165\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"http:\/\/www.hackdonor.com\/2013\/05\/how-to-send-password-protected-email.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"http:\/\/www.blogger.com\/feeds\/114057792323950405\/posts\/default\/9149191433856337165"},{"rel":"self","type":"application/atom+xml","href":"http:\/\/www.blogger.com\/feeds\/114057792323950405\/posts\/default\/9149191433856337165"},{"rel":"alternate","type":"text/html","href":"http:\/\/www.hackdonor.com\/2013\/05\/how-to-send-password-protected-email.html","title":"How to Send Password Protected Email"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"http:\/\/4.bp.blogspot.com\/-slBOkDCSXoQ\/UYj3PbUeh0I\/AAAAAAAABbA\/dQLKAkDTd1Y\/s72-c\/lockbin.jpg","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-114057792323950405.post-4707425197345019164"},"published":{"$t":"2013-04-24T00:03:00.000-07:00"},"updated":{"$t":"2013-04-24T00:04:30.579-07:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"Other Softwares"},{"scheme":"http://www.blogger.com/atom/ns#","term":"SECURITY TIPS"}],"title":{"type":"text","$t":"Secure Folder v7.4 Full Crack Free Download"},"content":{"type":"html","$t":"\u003Cdiv dir=\"ltr\" style=\"text-align: left;\" trbidi=\"on\"\u003E\n\u003Cdiv\u003E\n\u003Cdiv style=\"text-align: center;\"\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cb\u003ESecure Folder v7.4 Full Crack\u003C\/b\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\n\u003Ca href=\"http:\/\/2.bp.blogspot.com\/-EhmwfYti3lg\/UXeDXuiBHXI\/AAAAAAAABT0\/6PGVtANHtuc\/s1600\/Bunganajwa.com-Cover.jpg\" imageanchor=\"1\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cimg alt=\"\" border=\"0\" src=\"http:\/\/2.bp.blogspot.com\/-EhmwfYti3lg\/UXeDXuiBHXI\/AAAAAAAABT0\/6PGVtANHtuc\/s1600\/Bunganajwa.com-Cover.jpg\" title=\"secure folder\" \/\u003E\u003C\/a\u003E\u003C\/div\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003ESecure Folder is an easy-to-use folder security software that lets you hide, lock and encrypt folders through an intuitive and simple interface. Secure Folder has been designed with the purpose to keep your files safe from prying eyes. It encrypts your data using 256-bit AES encryption and prevents it from being accessed, copied, moved or deleted.\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cb\u003EKey Features:\u003C\/b\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cul style=\"text-align: left;\"\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EUnlimited number of folders can be protected.\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003ESimple fast and user friendly interface.\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EImplements 256-bit AES to encrypt files.\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EEffective password protection.\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EPassword recovery by email.\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EApplication Blocker - Restrict access to applications.\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EPrivacy Sweep - Clear records of recently accessed files and remove junk data.\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003ETroubleshoot System - Scan and fix system errors and restrictions applied by viruses.\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EScreen Capture - Easy to use screen capturing tool.\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EStart-Up Manager - Manages programs which run automatically on system start-up.\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003ECompute Hash - Calculate MD5, SHA1, SHA256, SHA384, SHA512 file hash.\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EDrive Manager - Manage drives on your system.\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EPower Switch - Automatically switch between power plans.\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EWebsite Blocker - Restrict access to websites.\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EWrite Protect USB - Prevent copying files from your computer to removable disks.\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EUninstalling will not uncover locked folders.\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003ESafe mode protection.\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EWindows Explorer integration.\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003ESupports Drag \u0026amp; Drop.\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003EAutomatic live updates.\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003ECompatible with Windows XP, Windows Vista, Windows 7, Windows 8 (32-Bit \/ 64-Bit)\u003C\/span\u003E\u003C\/li\u003E\n\u003C\/ul\u003E\n\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E---------------------------------------------\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cb\u003E\u003Ca href=\"http:\/\/adf.ly\/NdyjK\" target=\"_blank\"\u003EDownload Click Here\u003C\/a\u003E\u003C\/b\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv\u003E\n\u003Cspan style=\"font-family: Verdana, sans-serif;\"\u003E\u003Cb\u003E\u003Ca href=\"http:\/\/adf.ly\/Ndyqv\" target=\"_blank\"\u003EMirror\u003C\/a\u003E\u003C\/b\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003C\/div\u003E\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"http:\/\/www.hackdonor.com\/feeds\/4707425197345019164\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"http:\/\/www.hackdonor.com\/2013\/04\/secure-folder-v74-full-crack-free.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"http:\/\/www.blogger.com\/feeds\/114057792323950405\/posts\/default\/4707425197345019164"},{"rel":"self","type":"application/atom+xml","href":"http:\/\/www.blogger.com\/feeds\/114057792323950405\/posts\/default\/4707425197345019164"},{"rel":"alternate","type":"text/html","href":"http:\/\/www.hackdonor.com\/2013\/04\/secure-folder-v74-full-crack-free.html","title":"Secure Folder v7.4 Full Crack Free Download"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"http:\/\/2.bp.blogspot.com\/-EhmwfYti3lg\/UXeDXuiBHXI\/AAAAAAAABT0\/6PGVtANHtuc\/s72-c\/Bunganajwa.com-Cover.jpg","height":"72","width":"72"},"thr$total":{"$t":"0"}}]}});