Everyone fancy a cool status update decorated with facebook symbols. People always wonder how their friends got symbols for status when they add hearts, music notes, stars and other signs into their status. Actually its not difficult. Follow my steps and you will learn how to add facebook symbols for status.
Before you start decoration your status updates with symbols, take a look at complete list of all facebook symbols. These are Unicode text characters that you can put into your status. Just use your imagination and creativity and you will come up with nice ideas. Take these symbols and combine them to create status decoration where you can add your ‘text update’.
Most common facebook symbols people use for decoration are heart symbol, star symbol, math signs and music notes.
Here we have got the most comprehensive list of facebook status symbols. Just copy and paste them in your status.
๑۩۞۩๑ Type your status message!! ๑۩۞۩๑
๑۩๑ Type your status message!! ๑۩๑
▂ ▃ ▅ ▆ █ Type your status message █ ▆ ▅ ▃ ▂
★·.·´¯`·.·★ facebook symbols for status ★·.·´¯`·.·★
..♩.¸¸♬´¯`♬.¸¸¤ Type your status message here o ¤¸¸.♬´¯`♬¸¸.♩..
¤♥¤Oº°‘¨☜♥☞¤ symbols for facebook status ¤☜♥☞¨‘°ºO¤♥¤
♬ •♩ ·.·´¯`·.·♭•♪ This is musical notes ♪ •♭·.·´¯`·.·♩ •♬
»——(¯` Type your status message here ´¯)——»
¸.·’★¸.·’★*·~-.¸-(★ facebook symbols ★)-,.-~*¸.·’★¸.·’★
•(♥).•*´¨`*•♥•(★) Type your status message here (★)•♥•*´¨`*•.(♥)•
O.o°<*)>>>= facebook symbols status =<<<(*>°o.O
<<..•.¸¸•´¯`•.¸¸¤Type your status message here ¤¸¸.•´¯`•¸¸.•..>>
신◈기◈今天◈(★) facebook symbols status (★)◈동방◈기◈天
-漫~*’¨¯¨’*·舞~ Type your status message o ~舞*’¨¯¨’*·~漫-
•☆.•*´¨`*••♥ Type your status message ♥••*´¨`*•.☆•
•♥•♥•♥•♥ ☜ Heart symbols for status☞ ♥•♥•♥•♥•♥•
«-•·.·´¯`·.·•雪 facebook symbols 雪•·.·´¯`·.·•-»
╰☆╮¤°.¸¸.·´¯`»® Type your status message here ®«´¯`·.¸¸.°¤╰☆╮
♥ⓛⓞⓥⓔ♥☜ facebook symbols for your status ☞♥ⓛⓞⓥⓔ♥
●☆● ☆● ☆● ☆● Type your status message ●☆● ☆● ☆● ☆●
◢♂◣◥♀◤ facebook symbols ◢♂◣◥♀◤
๑۞๑,¸¸,ø¤º°`°๑۩ Type your status message ۩๑ ,¸¸,ø¤º°`°๑۞๑
.•°¤*(¯`★´¯)*¤° facebook symbols for status °¤*(¯`★´¯)*¤°
..•.¸¸•´¯`•.¸¸.ஐ symbols for facebook status ஐ..•.¸¸•´¯`•.¸¸.
(¯`•.ゃ_ゃ.• Type your status message •.ゃ_ゃ.•´¯)
¸.•♥•.¸¸.•♥• facebook symbols •♥•.¸¸.•♥•.¸
ஐ¤*¨¨*¤¨°o.O( Type your status message )O.o°¤*¨¨*¤εïз
-~*’¨¯¨’*·~㊅ facebook symbols ㊅~*’¨¯¨’*·~-
☆,.-~*’¨¯¨’*·~-.¸-(★ facebook symbols ★)-,.-~*’¨¯¨’*·~-.¸☆
☜♥☞ º°”˜`”°º☜( Type your status message )☞ º°”˜`”°☜♥☞
(¯`’·.¸(♥)¸.·’´¯) symbols for facebook status (¯`’·.¸(♥)¸.·’´¯)
(¯`·._)♣ ♤ ♥♠(Type your status message here )♣ ♤ ♥♠(¯`·._)
((((¯♀’·.¸(★) Type your status message (★)¸.·’♂ ´¯))))
<º))))><.•´¯`•.( Type your status message )¸.•´¯`•.¸><((((º>
- -¤–^]( facebook symbols )[^--¤- -
~²ººº~( facebook symbols are cool )~²ººº~
._|.<(+_+)>.|_.( Your message with facebook symbols )._|.<(+_+)>.|_.
• ••^v´¯`×)(Type your facebook symbols here )(×´¯`v^•• •
,.-~*'¨¯¨'*•~-.¸-(_( facebook symbols for you )_)-,.-~*'¨¯¨'*•~-.¸
- - --^[( Type your status message here )]^– – -
••.•´¯`•.••( facebook symbols ) ••.•´¯`•.••
`•.¸¸.•´´¯`••._.•( Type your status message here )•.¸¸.•´´¯`••._.•
(¯`•._)( facebook symbols )(¯`•._)
¯¨’*•~-.¸¸,.-~*’( Type your status message )¯¨’*•~-.¸¸,.-~*’
(¯`•._.•[( Type your status message here )]•._.•´¯)
¨°o.O( facebook symbols )O.o°
×÷•.•´¯`•)»( Type your status message )«(•´¯`•.•÷×
Oº°‘¨( symbols for facebook status )¨‘°ºO
׺°”˜`”°º×( facebook symbols )׺°”˜`”°º×
.•´¯`•->( Type your status message here )<-•´¯`•.
-•=»‡«=•-( Type your status message heres )-•=»‡«=•-
•°o.O(facebook symbols )O.o°•
––––•(-•( facebook symbols )•-)•––––
(¯`•¸•´¯)(Type your status message here )(¯`•¸•´¯)
••¤(`×[¤( Type your status message )¤]×´)¤••
»-(¯`v´¯)-»( facebook symbols for status )»-(¯`v´¯)-»
•°¤*(¯`°(☺)(( your status message with facebook symbols ))(☺)°´¯)*¤°•
—¤÷(`[¤*( facebook symbols )*¤]´)÷¤—
¸.´)(`•[( Type your status message here )]•´)(` .¸
•÷±‡±( Type your status message )±‡±÷
+*¨^¨*+( type your message here )+*¨^¨*+
—(••÷[( Type your facebook symbols )]÷••)—
•ï¡÷¡ï•( Type your status message )•ï¡÷¡ï•
•!¦[•(type your message here )•]¦!•
°º¤ø,¸¸,ø¤º°`°º¤ø,¸( Type your status message here )°º¤ø,¸¸,ø¤º°`°º¤ø,¸
,-*’^'~*-.,_,.-*~ facebook symbols ~*-.,_,.-*~’^'*-,
.•¯(_.•¯(_.•¯(_ fbemoticons.com )¯`•._)¯`•._)¯`•.
©º°°º©©º°°º© Type your facebook symbol here ©º°°º©©º°°º©
||¯|_|¯|_( Facebook Symbols for status )_|¯|_|¯||
Tuesday, June 29, 2010
Wednesday, June 23, 2010
Apple accuses HTC of iPhone tech theft (again)
Apple is pressing on with its scorched earth patent offensive against HTC, adding at least one new technology to its list of patents allegedly being infringed by the mobile phone manufacturer.
In a complaint filed Monday, Apple accused HTC of infringing Patent Nos. 6,282,646 and 7,380,116. Although they are two separate patents, they both cover a “system for real-time adaptation to changes in display configuration” and appear to contain identical claim language and involve the same inventors.
The complaint, filed in US District Court in Wilmington, Delaware, also alleges the infringement of Patent Nos. 7,383,453 and 7,657,849, which were included in a suit Apple brought against HTC in early March.
The abstract of the new patents reads:
In a complaint filed Monday, Apple accused HTC of infringing Patent Nos. 6,282,646 and 7,380,116. Although they are two separate patents, they both cover a “system for real-time adaptation to changes in display configuration” and appear to contain identical claim language and involve the same inventors.
The complaint, filed in US District Court in Wilmington, Delaware, also alleges the infringement of Patent Nos. 7,383,453 and 7,657,849, which were included in a suit Apple brought against HTC in early March.
The abstract of the new patents reads:
A hot-plugging capability for video devices is achieved by shifting the responsibility for recognizing changes in the configuration of a display environment from a computer's operating system to a device manager. When an input/output device is added to or removed from the computer system, an interrupt signal informs a device manager of the fact that a change in configuration has occurred.Apple's press release from March said 20 patents were included in its initial complaint, but I was able to find only 10 of them. In May, HTC struck back with its own patent suit against Apple. It wouldn't be surprising to see the Taiwanese handset maker strikes back again.
In response thereto, the device manager determines whether the changed component relates to the computer's display function. If so, the device manager makes a call to the computer's display manager, to inform it of the fact that the display configuration has changes.
In response to this call, the display manager reconfigures the display space for the computer system and notifies clients as appropriate, to accommodate display features associated with the added component. With this change in the configuration of the display space, the added component becomes immediately available for use.
Tuesday, June 15, 2010
How to Spot Fake Torrent Files
How to Tell If a Movie Torrent File Is Fake
Don't get fooled into downloading viruses and codec scam files!
Scammers and dishonest P2P individuals use false torrents to phish people's identities, bilk them for money, or vandalize their computers through trojan infections. Gratefully, helpful P2P users like 'already_dead' and other longtime supporters of Isohunt.com have built up methods of identifying false torrents and avoiding them.
Below are 10 strong suggestions on how to spot fake torrent movie and music files. This list is changing, and will update regularly with changes in torrent swarming technology.
1. Confirm Both the Torrent and the Movie Release Date
For brand new movie torrents, take a minute to visit these two sites:
www.imdb.com to check release dates
www.VCDQ.com to confirm that the new movie exists as a torrent
If the torrent does not exist at VCDQ.com, and/or is released before the actual movie date, then do not trust it.
2. Avoid Using the Following Software
These torrent software clients have earned a bad reputation for seeding malware, fradulent codec downloaders, keyloggers and trojans. Avoid using any of the following:
For the most part, true movie files are either .avi (audio video interleave) or .mkv (Matroska files) format. Conversely, the great majority of .wma and .wmv files are fake. While there are some authentic examples, most .wma and .wmv files will link to other sites to get paid codecs or malware downloads.
4. Password Instructions, Special Instructions, or Exe Files Are Included
If you see a file in the movie/music torrent that says 'password', 'special instructions', 'codec instructions', 'unrar instructions, 'important read me first', 'download instructions here', then the torrent is quite likely a scam fake. These suspicious files are telltale signs that someone is trying to sneak malware onto your computer! Futhermore: if there is an exe executable file included, then avoid that download! For movies and music, there is no need for an executable file to be present, nor should there be any passwords or any special download instructions.
5. Check for 'Verified' Status on the Torrent
Sites like Isohunt and Torrentbox will actually employ a committee of core users to confirm and 'verify' torrents. While these verified files are small in number, they are very likely true torrents that can be trusted. Keep your Avira antivirus updated and active, and 'verified' files should be safe to download.
6. Read the Comments, Always
Some torrent sites like Isohunt.com will capture user comments. Like eBay feedback on other eBay users, these comments can give you a sense of how legit the file is. If you see no comments on a file, be suspicious. If you see any negative comments on the file, then move on and find a better torrent.
7. A Disportionate Number of Thousands of Seeds, but No Comments
Abusive uploaders will falsify the number of seeds and peers. By using software tools like BTSeedInflator, abusers will make their torrents look like 10,000+ users are sharing it. If you see these massively large seed/peer numbers, but there are no user comments on the file, then avoid the file! Any true torrent that has more than a few thousand seeds should also have positive user comments.
8. Distrust .RAR, .TAR, .ACE Files
Yes, while there are legit uploaders who use .rar archives to share files, but for movies and music, the majority of rar and archive files are fake. Abusers use the rar format to conceal trojans and codec scam files. Video is already compressed, so there is no need to compress further.
If you see an attractive torrent movie file that is in .rar, .tar, or .ace format, distrust it and examine its listed file contents before you download. If there is no list of the contents, do not trust it. If the file list is disclosed, but the file list includes an .exe executable file, or text files with the words 'password' or 'download instructions', do not trust it.
9. Trackers that Can't Be Found on Google
Open the published torrent details, and copy-paste the tracker names into Google. If a tracker is legitimate, you will see many Google hits where many torrent sites point to the copy-pasted tracker. If the tracker is false, you will find many unrelated hits at Google, often with the words 'fake' as P2P users post warnings on that fake tracker.
10. Only Use the Following Media Players
These are the trusted movie and music players of 2010. Anything other than these products is a candidate for being a trojan or malware tool.
Don't get fooled into downloading viruses and codec scam files!
Scammers and dishonest P2P individuals use false torrents to phish people's identities, bilk them for money, or vandalize their computers through trojan infections. Gratefully, helpful P2P users like 'already_dead' and other longtime supporters of Isohunt.com have built up methods of identifying false torrents and avoiding them.
Below are 10 strong suggestions on how to spot fake torrent movie and music files. This list is changing, and will update regularly with changes in torrent swarming technology.
1. Confirm Both the Torrent and the Movie Release Date
For brand new movie torrents, take a minute to visit these two sites:
www.imdb.com to check release dates
www.VCDQ.com to confirm that the new movie exists as a torrent
If the torrent does not exist at VCDQ.com, and/or is released before the actual movie date, then do not trust it.
2. Avoid Using the Following Software
These torrent software clients have earned a bad reputation for seeding malware, fradulent codec downloaders, keyloggers and trojans. Avoid using any of the following:
- BitLord
- BitThief
- Get-Torrent
- TorrentQ
- Torrent101
- Bitroll
For the most part, true movie files are either .avi (audio video interleave) or .mkv (Matroska files) format. Conversely, the great majority of .wma and .wmv files are fake. While there are some authentic examples, most .wma and .wmv files will link to other sites to get paid codecs or malware downloads.
4. Password Instructions, Special Instructions, or Exe Files Are Included
If you see a file in the movie/music torrent that says 'password', 'special instructions', 'codec instructions', 'unrar instructions, 'important read me first', 'download instructions here', then the torrent is quite likely a scam fake. These suspicious files are telltale signs that someone is trying to sneak malware onto your computer! Futhermore: if there is an exe executable file included, then avoid that download! For movies and music, there is no need for an executable file to be present, nor should there be any passwords or any special download instructions.
5. Check for 'Verified' Status on the Torrent
Sites like Isohunt and Torrentbox will actually employ a committee of core users to confirm and 'verify' torrents. While these verified files are small in number, they are very likely true torrents that can be trusted. Keep your Avira antivirus updated and active, and 'verified' files should be safe to download.
6. Read the Comments, Always
Some torrent sites like Isohunt.com will capture user comments. Like eBay feedback on other eBay users, these comments can give you a sense of how legit the file is. If you see no comments on a file, be suspicious. If you see any negative comments on the file, then move on and find a better torrent.
7. A Disportionate Number of Thousands of Seeds, but No Comments
Abusive uploaders will falsify the number of seeds and peers. By using software tools like BTSeedInflator, abusers will make their torrents look like 10,000+ users are sharing it. If you see these massively large seed/peer numbers, but there are no user comments on the file, then avoid the file! Any true torrent that has more than a few thousand seeds should also have positive user comments.
8. Distrust .RAR, .TAR, .ACE Files
Yes, while there are legit uploaders who use .rar archives to share files, but for movies and music, the majority of rar and archive files are fake. Abusers use the rar format to conceal trojans and codec scam files. Video is already compressed, so there is no need to compress further.
If you see an attractive torrent movie file that is in .rar, .tar, or .ace format, distrust it and examine its listed file contents before you download. If there is no list of the contents, do not trust it. If the file list is disclosed, but the file list includes an .exe executable file, or text files with the words 'password' or 'download instructions', do not trust it.
9. Trackers that Can't Be Found on Google
Open the published torrent details, and copy-paste the tracker names into Google. If a tracker is legitimate, you will see many Google hits where many torrent sites point to the copy-pasted tracker. If the tracker is false, you will find many unrelated hits at Google, often with the words 'fake' as P2P users post warnings on that fake tracker.
10. Only Use the Following Media Players
These are the trusted movie and music players of 2010. Anything other than these products is a candidate for being a trojan or malware tool.
- WinAmp
- Windows Media Player
- VLC Media Plyer
- GMPlayer
- KMPlayer
Thursday, June 10, 2010
aircrack-ng – WEP and WPA-PSK Key Cracking Program
Aircrack-ng is the next generation of aircrack with lots of new features:
- Better documentation (wiki, manpages) and support (Forum, trac, IRC: #aircrack-ng on Freenode).
- More cards/drivers supported
- New WEP attack: PTW
- More OS and platforms supported
- Fragmentation attack
- Improved cracking speed
- WEP dictionary attack
- Capture with multiple cards
- New tools: airtun-ng, packetforge-ng (improved arpforge), wesside-ng and airserv-ng
- Optimizations, other improvements and bug fixing
Linux – aircrack-ng-0.9.1.tar.gz
Windows – aircrack-ng-0.9.1-win.zip
Or you can read more here.
Remember you need this to use aircrack-ptw – the fast WEP cracking tool.
Wednesday, June 9, 2010
Get Rid of Windows Genuine Advantage Notifications
You may know Windows Genuine Advantage as a system devised by Microsoft in 2005 to combat piracy of its software products. Others may know it as those annoying messages that keep informing you that something may be wrong with your copy of Windows, even though everything else is working fine.Unfortunately, WGA Validation doesn't always work. A 2007 survey of Windows users, conducted by Ars Technica, suggested that the "false positive" rate -- incorrect identifications of pirated software -- might be as high as 20 percent. Also, because WGA depends on your computer communicating with Microsoft's servers, an outage or other problem with the network may cause validation to fail even on a genuine Windows PC.
The Microsoft way
To Microsoft's credit, it recognizes that WGA Validation is not perfect, and provides instructions on how to disable the on-screen Notifications that persist after a failed check.
1. Using your admin login, click Start > Control Panel
2. Double-click Add or Remove Programs
3. Select Windows XP > Software > Windows Genuine Advantage Notifications
4. Click Click here for support information
5. Rename the following files by changing the extension to .old:
1. Rename %Windir%\system32\WgaLogon.dll to %Windir%\system32\WgaLogon.old
2. Rename %Windir%\system32\WgaTray.exe to %Windir%\system32\WgaTray.old
6. Restart the computer.
If your PC fails a WGA Validation check, you will still be able to download "critical" updates from Microsoft, including Windows security patches, but you will be unable to install other important software features.
Notifications, not validation
"Validation" is separate from "Notification." Disabling WGA Notifications does not address the problem which caused your WGA Validation to fail in the first place. For a more detailed list of possible issues and solutions, see: http://www.pchell.com/support/windowsgenuineadvantage.shtml
If your WGA Validations fail repeatedly, you should contact your PC vendor or Microsoft support for help. It's not uncommon to find pirated copies of Windows that look authentic and even include official-looking certificates and hologram stickers. Always make sure you're buying your software from a vendor you trust, and who offers some kind of guarantee or warranty on their sales.
In the future
With Windows 7, Microsoft has changed the name of their anti-piracy system from "Windows Genuine" to "Windows Activation." There are no indications that the company will remove these features in the near future, but they are working to make them more user-friendly.
