Tuesday, February 5, 2008

IP Address Tools

IP Address Tools on ipinfo.info

Google IP

Google search page with My IP Address added.
Makes a good browser start page.


IP Toolbar
Powerful IP Address Toolbar for Firefox and Internet Explorer.

IP address toolbar with direct access to security tools


small IP page

Small My IP Address webpage


micro IP page

Minimalistic My IP Address webpage (for PDAs)


IP Buttons

Free My IP Address buttons for your website


IPinfo.exe (Executable)

Tool to show the private IP Address of your PC


IP Privacy Check

IP Privacy Check shows what your IP address and browser reveal
about your identity and tests your anonymity.


IP Checker

IP Checker displays IP, network and domain owners and does
service scan and traceroute.



Third Party IP Tools

Subnet Calculator


IP Subnet Mask Calculator


IP Locator

IP Locator, helps locating a stolen notebook by silently tracking it´s IP address. (commercial product)


GEObytes

If you want your product or service to be listed here, please inquire at info@geotek.de.

Internet Anonymity Services and Privacy Solutions

Anonymisierungs

German language service. Proves the preconception that slick design must not be intuitively usable. Too bad. Supports SSL

Anonymizer.com

One of the oldest and most well known commercial anonymous HTTP proxy provider with free services and SSL support. Somewhat obtrusive appearance. No software installation required.

Be hidden

Free traffic-limited HTTP proxy. Encrypts URLs, which don´t even show up in the browser history.

Browzar

If your sole intention is to leave no traces on the Windows PC used for browsing the web, this is a very clever solution. Browzar is a complete webbrowser packed into a single executable file. It´s extremely small footprint of 217 KByte allows it even to be downloaded on demand or to be executed directly from a network drive. By internally using the IE engine it renders most webpages correctly, including those using ActiveX, Java or Flash. Upon termination, all cookies, autocomplete data, cache, history and other files are deleted automatically.

CallingHome

Open Source tool to make and maintain a stable SSH connection via a SSH server to any PC located behind a firewall. This secure connection may then be used to effectively tunnel any TCP/IP port traffic through firewalls and NAT routers. Too bad that It requires MS.Net Framework.

Cloak

HTTP proxy provider, less commercially oriented than others sites and has SSL support. Free service is somewhat slow. No software installation required.

cotse.net

Paid privacy service with anonymous email, multiple domains, PGP encryption, spam protection and SSH tunnelling for port based traffic. The absense of exaggerated claims in combination with thorough information about their services makes cotse stand out clearly from the crowd.

findnot.com

Hastily cobbled website that tries to scare people by showing them how their current ip address is precisely traceable to a specific geographic location. Our location (Berlin, Germany) was consistently located either in China ("close to Bejing") or "close to Holliwood, Florida, United States". Very convincing, indeed.

Guardster

Anonymizing HTTP proxy service with toolbar for controlled blocking of cookies, images, ads and scripts. SSL is available in paid subscription service. Free service is heavily clustered with ads.

HTTPort

Free Client and Server program to transport any TCP port traffic (not just web browsing) encrypted over a HTTP tunnel. HTTPort works quite well but shows unnecessary large latency times. With public servers it is almost unusable due to their slowness. This interesting concept is not appropriate for beginners.

http-Tunnel

Commercial software solution to tunnel traffic from SOCKS compatible applications (such as web browsers) through company firewalls and http proxies. No information about encryption available.

Hujico tip

Free ad-financed HTTP proxy with URL scrambling.

iPrive.com

Commercial site with a broad range of privacy solutions

JAP

One of the best privacy software solutions available, even though development is not yet quite finished. The service is still free at the moment, but operation is not very fast and lacks availability. They are working on a promising concept with multiple proxies (mixes). Servers are located in Germany. You should definitely try this out.

MegaProxy

Commercial HTTP proxy provider with fast, free SSL access. Disables the browser URL-Window in order to avoid browsing inadvertently unsecured. No software installation required.

Metropipe Tunneler

Commercial service with promising concept and high ethical claim. We hope to have a review shortly.

Mezzy

Free ad-financed anonymous search and surf service. Supports HTTP and FTP only and transfers the visited page URL in clear text. After browsing the first page, there is no way to enter another URL.

Mr. Privacy

Free ad-financed HTTP proxy leaving URLs visible

Proxify

Paid HTTP proxy service. A large Info area allows for easy selection of security filters, such as Java and ad blocking, but eats up lots of desktop viewing space. Supports SSL; no software installation required.

SaferSurf.com

Fully commercial service with aggressive marketing, targeting the technically less inclined. Offers broad range of privacy solutions; multilingual.

Surfeasy

Surprisingly fast, free anonymizing service. Scrambles URLs and stands out in replacing / masking all browser information in ACCEPT and USER_AGENT strings.

TheStrongestLinks

New US based Web Anonymizer with URL scrambling and interesting features such as Meta, Referer and Title handling features.

Tor

Very well documented open source toolkit for anoymizing arbitrary IP traffic while traversing the internet. Uses a mechanism called “Onion Routing” where TCP streams are broken up and their packets being sent through a random network of Tor-Servers, similar to the “Mix”-concept of JAP. For anonymous surfing you must install additional proxy software, such as Privoxy. The effective throughput is surprisingly high.

Steganos Internet Anonym Pro

Commercial client software that continuously switches between a number of external proxy servers located all over the world. Steganos has severe security deficits. Test report (German)

thevirtualbrowser

Free anonymizing service. Scrambles URLs and masks browser information. Features easy menu bar configuration and offers a Mozilla Firefox Extension.

Ultimate Anonymity

Commercial anonymity service located in Florida, promising life-time access for a small one-time fee.

Unipeak

Very fast, free Web-Anonymizer with URL-encryption. It is not yet rock-stable but looks promising.

your-freedom

Your Freedom is a complete http-ssl-tunnel solution based on a proprietary java-based client sortware. Free services are speed-limited to 64kb/s, more bandwidth is available at a reasonable charge. Your Freedom supports http, https, socks and a unique and easily configurable port forwarding mechanism. IP traffic is completely ssl-encrypted and routed over a network of automatically changing proprietary proxies. We rate speed, usabilty, functionality and speed as excellent.

Anonymous Surfing

There is no cause for paranoia, but most IT security professionals will agree that using the internet has serious security and privacy deficits.

If you point your web browser to a website or use any internet related-program, such as Mail, FTP, p2p filesharing services or an MP3 media player, a server at the other end uses your IP address in order to send you the information you requested. It wouldn’t make sense to fake your IP address because then you would never get any reply from the internet. All internet servers and services run some sort of logging, identifying your IP address, the exact access time and your complete surf history at their site. Companies use these log files for statistical, marketing, technical or legal purposes . While accessing the internet at work, your company’s proxy server and firewall will most likely also trace everything you do. Finally, your computer itself also keeps track of many operations.

Even if you were able to control your PC, proxy and firewall completely, you would still never have control over the internet servers you visit. This means, strictly speaking, that there is no such thing as anonymous surfing. All you can do is making it harder to find you. But before you go out and download tons of privacy software packages, consider at least four things:

* Running privacy tools on your computer at work without approval of the IT department is against the rules and can get you fired.
* No matter how much technical knowledge you may have, there is always someone out there who is smarter than you, so don´t become careless.
* Think of the high value of the Human Right to Privacy. Don´t abuse it for unethical purposes.
* Is it really worth the money and effort? Added security comes at a price: the more software you install, the more problems will arise; some sites may need time consuming tweaking and some solutions are really slooooow...

Thus forewarned, let´s take a look at some techniques to hide your web traffic from suspicious eyes.

During a web browsing session, most data is transferred using the HTTP protocol, which is just plain text and not protected in any way. Just replace the “http” string with “https” in your web browser, and all information transferred is encrypted using the Secure Socket Layer (SSL) protocol. SSL was introduced by Netscape in the early Internet days. It uses the proven RSA public / private key exchange mechanism to encrypt all http traffic between your browser and the destination web server. All modern web browsers support SSL encryption out of the box but many web servers have disabled this protocol because the encryption process would mean additional processing burden for their equipment. Unless you work at the NSA, you can safely assume that neither your employer nor your provider have the resources to break this encryption algorithm.

SSL browser encryption by itself only secures web traffic while travelling through the internet. In order to hide your identity from the destination server, you may use anonymizing HTTP proxy services. With these anonymizers, you are not contacting a destination website directly, but rather use one or more proxy severs, which are located between your computer and the final destination web server.

Anonymizing proxies remove your IP Address (and possibly additional information) from each and every TCP/IP packet and substitutes it, on the fly, with their own IP address. This way, a website visited through an anonymizing proxy has no way of knowing where you are located, because all requests look like originating from the proxy server.

In practice, however, things are not quite that simple:

* If your anonymizer doesn´t block or spoof cookies and you have visited a specific website before without an anonymizer, this site may still be able to identify you.
* Companies offering anonymizing services are promising not to disclose their log files to anyone. But can you really trust them? Law enforcing agencies do have access to these logs, and in these days of terrorist threat, it would be quite unrealistic to assume that secret service agencies would confine themselves from using this excellent surveillance instrument.
* Your employer will definitely notice that you are using anonymizing services, he might even see the websites you are visiting embedded in the URL sent to the proxy or from DNS queries. This will at least put you on a watch list.

Monday, January 28, 2008

Hack Tool AIO


In this AIO ( All In One ) have a lot of :
RFI Scanner
dD0s
Crack Hash MD5
Vulnerability Scanners
Keylogger

Download:
http://rapidshare.com/files/86704355/-__Attack__-.rar


password:
eagleitanium

enjoy

P{H}ACKTOOLS V6

*abomber
*AbuseGenerator
*Admin Pass Finder V4
*Advanced Post Scanner 1.2
*Advanced Steam Trojan Generator 1.1
*Aircrack
*Ardamax Keylogger 2.8
*Bakos Shit ~new~
*Bomber
*Brutus-aet2
*Brute Force Dictionnary Maker 1.0
*Bumprat 1.2
*Clown Call
*Crackers Pack All in One ~new~
*Deadly Virus Creator
*Donut http Flooder
*Evidence Eliminator ~new~
*Fishing Bait 2.3
*FloodIT ~new~
*FTP Brute Hacker 0.1
*FTP Cracker ~new~
*Friend Blaster Pro ~new~
*Ghost Keylogger 3.4
*HackerFiles ~new~
*hav rat 1.3 Private Version Fud
*High Risk V5
*httpWatch Professionnal v5 ~new~
*http Website Flooder
*Hypercam 2
*IDApro ~new~
*IMC Tool Set
*immo ~new~
*ipchanger ~new~
*Internet Video Converter 1.50 FR
*Legion 2.11 ~new~
*Messblack MSN Booter 2.1
*Messenger Lockout 4
*MessMatick 5
*M.S.N ~new~
*MSN PFr
*MSN Hack 2.2 Pro
*MSN Friend Hacker
*MSN Messenger Password Hacker]
*MSNMonitor ~new~
*MSN PassCracker
*mspass
*Multi-Hack {MSN-Steam-Cookies...}
*Multi softwares
*MySpaceFriendAdder
*MySpaceMp3Gopher
*NetTools 5
*NiAi Drt ~new~
*Optix 1.33
*p3x
*PC Info Stealer
*Pcontact
*PcpHne ~new~
*PEncrypt 4
*PHP Shells
*PortSNIFFER ~new~
*Powered Klgr 2.2
*ProRat 1.9 pw: pro {Warning if you don't know how use it!!}
*Proxy Finder ~new~
*rat-aio-07 ~new~
*Rainbowcrack 1.2
*ramcheat
*RapidHackerFinalBuild2 ~new~
*ResHack
*Server {Warning if you don't know how use it!!}
*Spam Master 5600
*Super Bluetooth Hack 1.07
*SuperInternet TV Satellite ~new~
*SP SF (~censored~)
*SpideerPig Sniffer
*Steam Checker ~new~
*Steam HAX pack ~new~
*Teamspeack Easy Flooder
*TinyWebcamVier
*The Ghost
*Tools Of Destruction
*TVM 2.8 SE
*UCLSetup ~new~
*Unrat It
*UltraList (For any Brutus version)
*Wall Shadow Flooder Pack
*Website Nuker ~new~
*Windows Live Flooder
*WIN32 srcds Build 3152 {Crack your dedicated server - Steam}
*WINPassword Creator Changer
*World of Warcraft Hacktools
*WorldList {For any Brutus}
*wowTrainer ~new~
*wwwHack ~new~
*Virus Maker
*Yahoo password stealer 2 pw: forgetten
+ !!Hot Extras!!
+ ProFarming RuneEscape
+ 1000 Tutorials Computer Tricks and Tweeks
+ Vista & XP Validation Crack
+ Stealers Folder with 10 stealers
+ Ultra Hack Tools [156 included] ~new~

Logs and files:
*8000Templates ~new~
*AdminUnbanner
*AOL locker
*CA
*GCF Link Grabber
*Cheat Engine 53
*Craagle 1.191 + Pack 6+ Sniffers Crack & Key
*Codechard 4129
*Dollar Warez Generator
*getlink
*Grabber
*Hack vBulletin
*Hack Password vBulletin
*HTML Code for Hack Steam
*Hideipla ~new~
*How hack website {french}
*IceCold Reloaded
*IPAdress
*IPChanger 2
*IPGet 1.5
*jbonblanc
*Matrix IP Checker
*MSN Password Finder 2
*MSN Password Recovery
*PacsteamT 27/12/07 ~new~
with his last update 10/01/08
*Proxy List
*phpBBP Spammer
*RapidShare Premium Linker
*Sandcat 3.3.2
*SixthSense
*SuperScan
*webcopier
*WebCheck
*Winrar Pass Decoder
+some dictionnaries for Brutus ~new~

Download: 3 Parts of 365 Mo

Part 1---> http://dl.free.fr/nCaGddZOZ/P%7BH%7DackToolsV6+SE.rar.001.xtm
Part 2---> http://dl.free.fr/mWMla1ron/P%7BH%7DackToolsV6+SE.rar.002.xtm
Part 3---> http://dl.free.fr/n3O1DJoLQ/P%7BH%7DackToolsV6+SE.rar.003.xtm

SCRIPTS for the Programmers

SCRIPTS This is for the Programmers.
I've decided to through my Parser up.
However the parser only works with how
the .PHP files are written.


Download Parser code [Visual Basic 6]
Download Proxy PHP Code v1
Parses proxies from all 100 at www.hidemyass.com
and 5 pages of www.samair.ru/proxy/
Download Proxy PHP v2
Parses proxies from www.proxy4free.com
and will work on PHP platforms which are <4.7.x
as socket_stream is unused.


Enjoy! coders.

Rapid Hacker



v3.2

- Bug fixes which causes client to Crash (Proxy Ripper)
- Improved Proxy Ripping Engine (PHP)
(Special thanks to LostBrilliance)
- Rapid Hacker Website is now Centralized within Rapid Hacker
- Added an installation, so that everything works without
needing to Register runtimes.
- Re-designed the way the interface is, for convience of the end user.
- Removed "Am I Spoofed? property because it brought
more confusion, with false positives than anything else.
- Removed Chatroom interface, as it was not being used.

*
- Wrote multilingual engine, but decided not to include as I didn't feel
like optimizing the size of the program, i.e German words are bigger than
english words. I found it to be a bit too confusing, and so that addition
was left dead.

Download : http://pinky.ratman.org/~xyr0x/



Download Rapid Hacker v3.0 ME
697KiB
PE MD5sum: E3EEDC641B412241EB8476AF0713F5D

Download Rapid Hacker v3.2 Installer
957KiB
PE MD5sum: 3D35E77A7616425526A60B9C43307836

Download Rapid Hacker v3.2 Stand Alone
843KiB
PE MD5sum: DB7AA872992DBA85D7B78714CC9C2265
CRC32: 3D7EDB5C

Certified Ethical Hacker v5

Certified Ethical Hacker v5



Download :
http://rapidshare.com/files/86950077/Eccouncil_-_Certified_Ethical_Hacker_v5_InstructorSlides.rar

Lock Folder With Pass without Software

========================================================

cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==[b]"type your password here"[/b] goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End

========================================================

* Now paste it in notepad.
o Save it as batch file(with extension .bat).Any name will do.
o Now you see a batch file. Double click it to create a folder locker.
o A new folder named Locker would be formed at the same location.
o Now brings all the files you want to hide in the locker folder.
o Now double click the batch file to lock the folder namely Locker.
o If you want to unlock your files,double click the batch file again and you would be prompted for password.Enter the password and enjoy access to the folder.

Source :
Posted by Administrator [at] http://md5this.com

Wednesday, January 23, 2008

How the unemployment insurance program works

Since its inception in 1935, the unemployment insurance (UI) program in the United States has operated as the primary safety net for those who involuntarily lose their jobs. Although the UI program's broad guidelines are established by federal law, UI essentially operates as a state-level program. Policy decisions regarding the main components of unemployment insurance, such as eligibility, benefit generosity, and financing, are determined by each state, resulting in substantial variations in UI programs across the country.

Eligibility
Prior to receiving UI benefits, unemployed workers must qualify or be eligible under their state's rules. Nationally, in 2003, 41% of unemployed workers received UI benefits (see Table BAdobe Acrobat (PDF)). For a variety of reasons, many unemployed workers are ineligible to receive benefits. Of those workers who lost their jobs, 74% received UI benefits in 2003. The more common obstacles to eligibility are outlined below.

Initial eligibility
To receive benefits, unemployed workers must file an initial claim with their state's UI program to see if they meet state-determined eligibility criteria. In order to qualify for UI benefits, jobless workers must meet their state's initial monetary eligibility requirements (i.e., a worker must have earned a certain amount of money in a given time period) and nonmonetary requirements related to their separation from their prior employer (i.e., a worker's separation from prior employment must be for allowable reasons).

Monetary eligibility requirements. Most states determine whether an unemployed worker is eligible for UI benefits based on his or her earnings in the highest quarter or the two highest quarters of the "base period." The majority of states define the base period as the first four of the last five completed calendar quarters. Based on this definition, from three to six months of a jobless worker's most recent earnings history is excluded for the purpose of determining eligibility for UI benefits. Many states also require the unemployed worker to have earned a certain amount in the base period. These earnings requirements vary significantly by state. Table AAdobe Acrobat (PDF) provides some detail on each state's monetary eligibility requirements and whether the state has adopted an "alternative base period" that considers earnings from the worker's most recently completed calendar quarter.

Nonmonetary eligibility requirements. Any of the following circumstances could cause an unemployed worker to be denied UI benefits:

  • job not covered by unemployment insurance (i.e., some states do not cover the self-employed, independent contractors, and some agricultural workers);

  • left job without good cause (states vary as to exceptions to the good cause requirement and whether good cause must be related to employment or can also be for personal reasons); or

  • fired for misconduct cause (some states require gross misconduct or just cause; usually the conduct must be intentional and an employee who made inadvertent mistakes or lacked the ability to perform the job would still be eligible).

Even if one or more of these circumstances applies, a worker should file a UI claim with the state agency and allow the state agency to determine whether or not the employee is eligible for UI benefits. Filing a UI claim regardless of circumstances is advisable because states vary significantly in their definitions of "good cause" and "misconduct," and an unemployed worker may not know whether he or she is eligible for UI without having the state make a formal determination. Similarly, in some cases employers classify individuals as independent contractors even when, in reality, they are employees and should therefore receive unemployment insurance.

Continuing eligibility
Once a worker is deemed eligible for benefits, a worker must also satisfy continuing eligibility requirements. If a worker fails to satisfy these conditions, that worker's benefits may be postponed temporarily, cancelled entirely, or reduced. Typically, unemployed workers must make a weekly "continuing claim" on the UI program verifying that they were "able and available" and "actively searching" for employment. Workers may fail to meet these criteria if they:

  • limit their job search to part-time work in a state that requires workers to be "able and available" for full-time work;
  • fail to search for work in a given week;
  • find a job;
  • turn down a "suitable" job offer; or
  • exhaust UI benefits because they received the maximum amount of benefits for which they were qualified or because they received the maximum number of weeks of benefits for which they were qualified.

Hearings and appeals
Every state permits workers affected by unfavorable decisions to file appeals. All states also provide a hearing before an administrative law judge or hearing officer, as well as further appeals to court. In order to take advantage of these avenues, a worker must file an initial claim, and then appeal any unfavorable decisions within the time required by the state. That time period could range from a few days to 30 days, depending upon each state's rules. Legal aid offices, unions, and community groups offer advice or assistance with appeals in some areas, but a lawyer is not needed to appeal or get a hearing. Depending upon the state, court proceedings may be difficult or impossible for non-lawyers, but all agency appeals are open to unrepresented workers.

Amount of UI benefits
If workers make it over these eligibility hurdles, they can expect, in most states, to have about half their lost (pretax) wages replaced by UI benefits. There are limits on weekly benefits—each state has adopted a maximum weekly benefit amount that is paid to workers in the state. As a result, some workers—particularly higher-wage earners—receive less than 50% of their lost wages. Nationally, UI replaced just over 47% of a worker's lost wages in 2003. (This is referred to as the "replacement rate.") Because, on average, women earn less than men, women have a higher percentage of their earnings replaced by UI (49%) than men (46%). Similarly, Hispanics (50%) and African Americans (49%) have a higher percentage of their earnings replaced than do whites (47%). Although the percentage of lost income replaced by UI benefits has remained fairly stable from 1988 through the present, the real replacement rate has actually fallen due to the fact that, as of 1987, UI benefits are now treated as income and are taxed fully by the federal government.

The average UI weekly benefit check in 2003 was $262 ($1,135 per month). The average weekly benefit amount varies significantly by state, from a low of $173 in Arizona and Mississippi to a high of $357 in Massachusetts (see Table BAdobe Acrobat (PDF)). See EPI's Weekly Benefit Amount (WBA) Calculator to estimate the weekly benefit amount a typical worker might be expected to receive in a given state as of August 2004.

UI benefits rarely provide enough money for families to make ends meet. A 2004 study by the Congressional Budget Office found that "[w]hen UI receipients lost their job, their income—excluding UI benefits—dropped by almost 60 percent. With UI benefits included, the income loss was about 40 percent." The study also found that almost 25% of UI recipients who remained out of work for four months or more fell into poverty despite getting UI benefits.

Duration of UI benefits
Most state UI programs provide a maximum potential duration of 26 weeks during non-recessionary periods. However, the average duration of benefits collected is much lower than 26 weeks. In 2003, the average duration of regular state UI benefits was 16.4 weeks nationally, but varied by state from 12.4 weeks in North and South Dakota to 20.5 weeks in the District of Columbia (see Table BAdobe Acrobat (PDF)). This number is less than 26 weeks for a number of reasons, including cases in which the unemployed worker: (1) found a new job, (2) qualified for less than 26 weeks of benefits, or (3) was disqualified for a continuing eligibility violation (e.g., not actively seeking work, rejecting offer of "suitable" work). Because UI benefits are limited, some individuals run out of benefits, or "exhaust" benefits, before they find a new job. In 2003, 4.4 million workers, or 43.5% of UI recipients, exhausted their UI benefits. Individuals who exhaust the weeks to which they were entitled may only receive additional benefits if they later re-qualify for UI after additional work.

There are two programs that may extend the 26-week maximum benefit duration during economic hard times:

  • First, there is a federal-state Extended Benefits program under which UI recipients in every state may be able to receive up to 13 additional weeks of benefits for a total of up to 39 weeks. The state and federal government each pay half of the costs of the Extended Benefits program and weekly benefits are identical to those in the regular UI program. The Extended Benefits program is activated automatically, or "triggers on," when a state's 13-week average insured unemployment rate reaches 5% and is a 120% increase from the same 13-week period in the last two years. A second, optional trigger (which has been adopted by most states) occurs when a state's 13-week average insured unemployment rate reaches 6% (the 120% factor does not need to be met). Unfortunately, these programs do not always work well, with only a handful of states helping their long-term unemployed in this way in the last recession.
  • Second, Congress may decide to use existing federal UI trust fund monies to pay temporary extended UI benefits. During 2002 and 2003, UI recipients in most states were able to receive up to 13 additional weeks of benefits through the Temporary Extended Unemployment Compensation Act of 2002 (TEUC), with "high" unemployment states providing their workers another 13 weeks. Unfortunately, the TEUC program expired in December 2003 with benefits phased out by March 31, 2004. These extended benefits are therefore no longer available despite the high number of UI recipients who continue to exhaust benefits. Measures to extend TEUC past its December 2003 expiration in the Senate and House have been defeated by a relatively small number of votes each time.

Financing of UI benefits
Adequate financing for the UI program is crucial because it determines, at least in part, each state's policies on eligibility and benefit generosity. Most states adjust their employer tax rates based on their trust fund solvency. In some states, the financial solvency of the UI program directly determines benefit levels. For example, some state legislatures have voted to cut UI benefits or restrict eligibility when their trust fund balances are low. Louisiana 's law is a particularly unique example of the interdependence between benefits and trust fund solvency—the state's trust fund balance directly determines the formula that is used to compute weekly benefits and the maximum weekly benefit amount.

The unemployment insurance program is financed primarily by taxes levied on employers. There are two components of these taxes: (1) a federal tax that is used to pay for the federal and state administration of the program; and (2) a state tax that is used to pay state UI benefits.

Federal UI taxes pay administrative costs
Federal UI taxes pay for federal and state administrative costs, the federal portion of the Extended Benefits program, and loans to states with insolvent trust funds. Technically, the federal UI payroll tax is 6.2% of the first $7,000 of a covered employee's wages. However, employers in states with UI programs that meet the federal guidelines (a $7,000 taxable wage base, a maximum employer tax rate of at least 5.4%, state administrative performance standards) receive a 5.4% credit toward their federal tax payment, reducing their tax rate to 0.8%. Since all states have federally approved programs, 0.8% is the effective federal tax rate. The 0.8% rate includes a surtax of 0.2% that Congress passed in 1976 and has extended multiple times; this surtax is set to expire on December 31, 2007.

In March 2002, Congress approved an unprecedented $8 billion "Reed Act" distribution to the states and encouraged states to use it to expand their UI programs. A General Accounting Office report found that most states used this money to avoid raising their state unemployment taxes on employers. The Department of Labor has been considering proposals that would change the manner in which administrative costs are funded.

State UI taxes pay benefits
Each state determines the amount of an employee's wages that is subject to the state UI tax and the tax rates it charges employers. These state taxes pay for state UI benefits and one-half of the federal-state Extended Benefits program. The first component of an employer's state UI taxes is the state's taxable wage base. Federal law requires states to tax at least the first $7,000 of a covered employee's wages. While 10 states (20%) set their 2004 taxable wage base at $7,000, the remaining states have adopted a higher taxable wage base (see Table CAdobe Acrobat (PDF)). In a state with a taxable wage base of $9,000, an employer would pay the same state UI taxes on an employee who earns $9,000 a year as it would for an employee who earns $100,000 a year. Because a portion of the cost of a payroll tax is likely to be passed on to workers in the form of lower wages, low-wage workers and part-time workers (and their employers) "pay" more than higher-wage and full-time workers. Finally, some states' taxable wage base increases automatically every year because they index their taxable wage base to their individual state's average annual wage or annual weekly wage.

The second component of an employer's state UI taxes is the tax rate an individual employer is charged. The UI program is experience-rated, meaning that, within a given state, firms that lay off a higher percentage of workers and whose employees collect a higher amount of UI benefits pay higher tax rates than firms that lay off fewer workers. The goal of experience rating is to discourage employers from laying off workers, particularly during temporary downturns. The United States' experience rating system is unique—no other country taxes its employers based on their past "experience" laying off workers. The national average state tax rate in 2003 was 2.1%, from a low of 0.6% in Georgia and Utah to a high of 4.1% in New York. Depending on the employer and the state, an employer's maximum UI state payroll tax rate in 2004 could range from a low of 5.4% (Missouri) to almost 11% (Arkansas, Massachusetts) (see Table CAdobe Acrobat (PDF) ). In addition, a state's tax schedule typically changes so that the same employer would pay a higher tax rate when the state UI trust fund balance is low, and a lower tax rate when the state UI trust fund balance is healthier. In addition, three states (Alaska, New Jersey, and Pennsylvania) also require employees to make a contribution.

UI taxes are comparatively small, representing just over half of one percent (0.6%) of all earnings for those workers covered by the program in 2003. On average, the combined annual state and federal UI tax on employers was just $253 per employee in 2003 ($201 in average state taxes and $52 in federal taxes).

UI trust fund solvency
Many state UI programs have had problems because they have failed to collect enough tax revenue from employers during economic expansions, setting tax rates too low and subjecting too small a share of wages to taxation. Since more workers file UI claims in bad economic times—when tax revenues are low because employment is lower—it is vital for states to build adequate trust funds in good economic times.

The "average high cost multiple" (AHCM) is one measure that is used to analyze state UI trust fund solvency. A state's AHCM is the average of the three most recent high-cost calendar years that include either three recessions or at least 20 years of UI payment history. An AHCM of 1 indicates that a state has one year's worth of reserves to pay benefits, based on the average of the three most recent high-cost years. In 1995, the Advisory Council on Unemployment Compensation recommended that states maintain an AHCM of 1. Unfortunately, after the most recent recession and slow jobless recovery, the nationwide AHCM was at 0.42 for the 49 states reporting an AHCM for the first quarter of calendar year 2004.

The health of the UI trust funds varies from state to state, but many states' trust funds are considered inadequate to meet their state's needs (see Table CAdobe Acrobat (PDF)). For example, 14 reporting states (31%) had an AHCM of 0 to 0.5 and 32 states had an AHCM below 1.0. A state's AHCM could be low for a variety of reasons, including a low taxable wage base, low employer tax rates, high unemployment, or state eligibility and benefit rules. In the event that a state runs out of money and becomes "insolvent," the state may borrow from specially established federal funds.

Differences across states
Because each state is free to establish the components of its state UI program, the benefits an unemployed worker receives and the taxes an employer pays both vary significantly across the country. Some state-level characteristics are presented in Tables A, B, and C.Adobe Acrobat (PDF)

Washington is an example of a state offering a more generous UI program. In determining eligibility, Washington considers hours instead of earnings, and it considers earnings in the most recent quarter. Washington offers a higher than average weekly benefit amount and indexes the amount with average weekly wages in the state. Workers in Washington are more likely than the average U.S. worker to receive UI benefits. Its financing mechanism is also sound: Washington has one of the highest taxable wage bases ($30,200), and that wage base is indexed.

Recommendations
Many aspects of the state UI programs are in need of reform. Since states determine their own policies, the degree of reform needed varies dramatically. However, the UI program would be better if the states adopted the following broad general guidelines:

  • Simplify eligibility rules and benefit calculations. This would counter the false perception many workers have that they are ineligible for UI benefits, and it would allow workers to gain a sense of how much of their income they can expect to be replaced by the UI program.
  • Modernize eligibility rules to reflect the needs of the current workforce. To do this, states should adopt three important recommendations of the Advisory Council on Unemployment Compensation. First, states should stop discarding up to six months of a worker's most recent earnings by adopting an "alternative base period." Eighteen states and the District of Columbia have already adopted an alternative base period. Second, states should extend eligibility to workers seeking part-time jobs. Third, states should base their eligibility requirements on the number of hours worked, not earnings. Almost all states' monetary eligibility rules (with the exception of Washington and Oregon) currently discriminate against low-wage workers because low-wage workers with a part-year or part-time work schedule may be ineligible to receive UI benefits whereas higher-wage workers with an identical work schedule would qualify. Adopting an hour-based eligibility approach, instead of the current earnings-based approach, would eliminate this bias and help workers at the lowest end of the pay scale.
  • Offer more generous UI benefits to keep workers and their families out of poverty.
  • Adopt a higher taxable wage base and index it to increases in their states' wages to help ensure the solvency of their UI trust funds.
Taken from : www.epinet.org

Freelance

Freelance is not a bad job. I think you should try it. How about the project? Don't worry, you can get all of them in the internet. Or event from your neighbour. You just need to search, and finish them. The project waiting for you on the outside there.

I believe you can do that. And you shoul believe it too if you can do that. No body perfect. But there so much person to try the best they can to be perfect. Every body have their own ablility, and so you do.

Just try it.


Raising Hell : Freelance Hellraiser

Below is interview with McClain Jhonson about hellraiser freelance.

Freelance Hellraiser became famous for creating bootlegs (taking vocals from one song, and putting them on top of beats from another) out of his Essex bedroom. His early work (putting Christina Aguilera’s “Genie in a Bottle” over The Strokes “Hard to Explain”) showcased creativity, humor, and skill. This year he’s done a string of great remixes, and will soon release his debut album. In this interview, Mr. Hellraiser discusses bootleg tips, the BBC and how his former careers help his DJing.

Is there one question that you wish the press would stop asking you?
Well I do get quite embarrassed when people ask me about the Nirvana v Destiny's Child booty. For some reason everybody thinks I did it and it was 2 Many DJs. It's a great tune and I feel bad that people think I'm claiming credit for it. For the record - it wasn't me !

What has been your wildest gig?
Definitely Glastonbury 2002.

What's the longest set you've played?
Probably about 7 hours at the FHM magazine "100 Sexiest Women" party in London. I was quite happy to play for that period of time.

Do you remember your first gig DJing?
Yes - it was at Dundee University in 1991. I remember playing 'Sympathy For The Devil' by the Rolling Stones and mixing in The Funky Drummer break using a crappy little sampler while my mate banged away on his congas. We thought it was the coolest thing ever!

You've done a lot of great remixes this year, what has been your favorite?
Probably “Fighter” by Christina Aguilera.

What is the biggest misconception people have about bootleggers?
That we're Internet pirates who believe all music should be free for everyone.

Did your bootlegging start out as an experiment and grow from there?
It started so I'd have some interesting mixes to play out in my DJ sets. It still is.

What has been your quickest bootleg?
I did an Obie Trice one the other day in 4 hours. It's actually quite good which is very surprising. I rushed it one Saturday afternoon so I could play it out that night.

Do you have any tips for people who want to create quality bootlegs?
Make sure both or all of the tracks are in the same key. I'm amazed at the ones I hear that are in completely different keys.

Who are some of your favorite DJs/Producers?
Blimey - too many to mention. Here's a few of them;
2 Many DJ's, Dr Dre, Timbaland, DJ Shadow, Norman Cook, The Neptunes, The DFA, Felix Da Housecat, Just Blaze, Jacknife Lee, Youth, Giorgio Moroder, Sir George Martin, Quincy Jones, DJ Yoda, Kanye West, Prince Paul, Moby, Prince, Nile Rodgers. It's endless! ...

Is there anything that you wish the press would ask you more about?
Not really. I'm happy that they're asking me anything at all!

What was the oddest experience you had working as a freelance hellraiser (a person who is paid to get celebrities angry) for the tabloids?
I was asked to go back to my old school and talk to the young kids about how to become a hellraiser. I had them fighting the teachers in mock celebrity battles. Very surreal seeing your old head-master dressed as Liam Gallagher, being attacked by an 11 year old.

Did anything from your last career as a postman help to make you a better DJ?
It was working for the post office that pushed me into music. My advice is to get the worst job imaginable. Nothing spurs you on to succeed better than a terrible job.

What are some of your favorite tunes of the year?
“Crazy In Love” by Beyonce is one of the best tunes ever, The Speakerboxxx/Love Below album by Outkast, the Colder album, Final Straw by Snow Patrol, Electromagnetic EP by Freeform Five, House Of Jealous Lovers by The Rapture.

How long did it take you to complete "Want You To Know?"
About 2 years on and off. It's still not finished to be honest...

Have you finished your debut album?
Not yet - still working on it. I'm hoping it will be finished by the end of Feb '04.

Do you have a title for it?
Not yet.

Describe the sound of the new album.
Psychadelic folktronica rock and roll soul.

What's your favorite thing about living in England?
Our radio is not as genre-defined as yours which I personally love. BBC radio and XFM in London play Hip-Hop and Rock n Roll and Pop and R&B and House music one after the other. Having said that – most of the music they play is American!

Keep an eye out for Freelance Hellraiser's debut single "Want You to Know."

Taken from : www.thefreelancehellraiser.com

Yuwie is like Friendster but it pays you to use their site

Yuwie is like Friendster but it pays you to use their site It is not a get rich quick scheme but if you like socialising and you use Yuwiè for just that you will recieve some money!

Money is made on Yuwiè through advertising and Yuwiè want to give back to us and pay us for what most of us already do in Friendster.

Yuwiè will actually pay you to,

- Blog
- Upload and share Photos
- Upload and share Videos
- Hang Out
- Refer Yuwiè to others
- Recieve Visitors

You will be paid thru PayPal if you have one or thru check which will be mailed to your address.

Click the link below to join immediately:
http://www.yuwie.com

Yuwiè calculates how much money they recieve from advertisers, then they figure out how much a page view is worth to them, and then they pay members based on the number of pages views they have for that month.

HAVE FUN AND GET PAID AT THE SAME TIME!

Join now and meet some new friends and refer to your friends, its exciting to be there. Many people are actually signing up everyday.

Yuwiè just started August 2007, if you're still thinking it's too late, you should know that according to Friendster they have 50 million members, Yuwiè is just starting and blowing the doors off and the ones who get in now are going to be the real winners.

Click the link below to join:
http://www.yuwie.com

ClixSense

ClixSense.com, Inc.
2115 Old Ashland City Road
Clarksville, TN 37043

Advertisers:
ClixSense is an industry proven method that allows website publishers of every size or budget to direct targeted and unique traffic to their website. This is the same system that the largest online retailers in the world take advantage of for their advertising needs. ClixSense offers this opportunity to every web merchant whether you are a start up business with a minimal advertising budget or if your business is already established but you are desiring additional web exposure. For as little as $5.00 you can position your website to be exposed to potential customers. ClixSense has developed sophisticated online tracking and monitoring systems to ensure that every dollar you spend advertising with ClixSense delivers to you the most bang for your hard earned advertising dollar. Our industry leading software virtually eliminates any type of Internet bots that automatically click through your ads. For this reason, you can rest assured that your ads are being viewed by real customers with true buying power.

Customers:
By taking advantage of the ClixSense online advertising program, as a potential online consumer, you can actually get paid for your web browsing, up to $5.00 for every 30 seconds worth of work. The income you earn is paid directly to you every month. The best part about the ClixSense program is that as a potential online consumer, there is no charge to register your new account and begin earning money immediately.

ClixSense.com

Monday, January 21, 2008

Code For Sellular

Kode Bintang & Pagar :
*     => activate
**   => register and activate
*#   => check status
#     => unregister
##   => unregister and deactivate

Perihal Security
**03*OldCode*NewCode*NewCode#  ----------> Change code for call barring
**03*330*OldCode*NewCode*NewCode# ----->  Change code for call barring
**04*OldPIN*NewPIN*NewPIN# -------------> Change PIN code
**042*OldPIN2*NewPIN2*NewPIN2# --------> Change PIN2 code
**05*PUK*NewPIN*NewPIN#  --------------->  Unlock PIN code
**052*PUK2*NewPIN2*NewPIN2# -----------> Unlock PIN2 code

Call Barring
**33*code# => Activate barr all outgoing calls (for code see "Safety" above)
#33*code# => Deactivate barr all outgoing calls
*#33# => Check status of barr all outgoing calls
**330*code# => Activate barr all calls
#330*code# => Deactivate barr all calls
*#330*code# => Check status of barr all calls
**331*code# => Activate barr all outgoing international calls
#331*code# =>  Deactivate barr all outgoing international calls
*#331*code# => Check status of barr all outgoing international calls
**332*code# => Activate barr all outgoing international calls except home country
#332*code# => Deactivate barr all outgoing international calls except home country
*#332*code# => Check status of barr all outgoing international calls except home country
**333*code#  => Activate barr all outgoing calls
#333*code#  =>  Deactivate barr all outgoing calls
*#333# => Check status of barr all outgoing calls
**35*code# => Activate barr all incomming calls
#35*code# => Deactivate barr all incomming calls
*#35#  => Check status of barr all incomming calls
**351*code#  =>  Activate barr all incomming calls when roaming
#351*code#  =>  Deactivate barr all incomming calls when roaming
*#351#  =>  Check status of barr all incomming calls when roaming
**353*code#  => Activate barr all incomming calls
#353*code#  => Deactivate barr all incomming calls
*#353#   =>   Check status of barr all incomming calls
##002#   =>  Unregister all call diversions
**004*   =>  PhoneNumber# Set all configured call diversions to PhoneNumber
##004#   =>  Unregister all configured call diversions
**21* => PhoneNumber# Register and activate divert all calls to PhoneNumber
*21#   =>   Activate divert all calls
#21# => Deactivate divert all calls
##21# =>  Unregister divert all calls
*#21# =>  Check status of divert all calls
**61*   =>   PhoneNumber# Register and activate divert on no answer to PhoneNumber
*61#  =>   Activate divert on no answer
#61#   =>  Deactivate divert on no answer
##61#   =>  Unregister divert on no answer
*#61#  =>   Check status of divert on no answer
**62*   =>  PhoneNumber# Register and activate divert on not reachable
*62# => Activate divert on not reachable
#62#  => Deactivate divert on not reachable
##62# => Unregister divert on not reachable
*#62# => Check status of divert on not reachable

**67*PhoneNumber# => Register and activate divert on busy
*67# => Activate divert on busy
#67# => Deactivate divert on busy
##67# => Unregister divert on busy
*#67# => Check status of divert on busy
**Function**Seconds# => Delay at diversion may be altered 5-30 sek

Provider : PROXL
Sim Card : XL Bebas

*111# => XL Life
*123# => Cek Pulsa
*555# => Cek Poin

Manufacturer : NOKIA
Model : ALL

*#06# => Cek IMEI


Provider : Indosat
Sim Card : IM3

*389*2# : Counter sms,,kalo dah nyampe 10 berarti dah dapet bonus sms gratis

Memasukan File Rahasia ke Dalam Gambar

Bagaimana caranya kita ingin memasukan file rahasia kita ke dalam gambar dan orang selain kita yang melihat gambar tersebut tidak tahu bahwa di dalam file yg ia buka ada file yang tersembunyi didalamnya..

langkah-langkahnya sbb :

1. Settinglah windows anda agar menampilkan ekstensi file. Bukalah Windows Explorer ---> Tab Tools ---> Folder Options di dalam Folder Options pilih tab View ----> centang Show hidden files and folders lalu untick/hilangkan centang pada Hide extension for know file types dan Hide protected operating system files (Recommended) klik ok, trus ok lagi.



2. Siapkan File rahasia anda (ekstensi file terserah), contoh memiliki nama rahasia.mp3 dan sebuah file gambar(*.bmp, *.jpg, *gif) misalnya dengan nama gambarku.jpg. Simpanlah kedua file tersebut dalam sebuah directory yang sama.

3. Klik kanan pada file rahasia.mp3 lalu pilih menu [Add to “rahasia.rar”]. Akan tercipta file baru dengan nama rahasia.rar

4. Sekarang bukalah aplikasi NOTEPAD (start -> Run ketik NOTEPAD) lalu ketik/copy script berikut:
----------------------------cut here---------------------------------
@echo off
ren rahasia.rar rahasia.mp3.rar
copy /b gambarku.jpg+rahasia.mp3.rar Hasil.jpg
del rahasia.mp3
del gambarku.jpg
del rahasia.mp3.rar
del hide.bat
----------------------------cut here---------------------------------

Simpanlah file ini pada lokasi yang sama dengan file-file anda tadi. Klik File --> Save lalu pada form isian File name ketik hide.bat Sedangkan pada Save as type pilih ‘All files’. Klik Save sesudahnya.

WELLDONE

Cobalah anda buka file hasil.jpg. Sekilas tidak akan ada bedanya dengan file gambar milik anda kecuali ukuran filenya yang bertambah besar. Tidak ada tanda-tanda bahwa sebenarnya ada rahasia besar didalamnya hahahhaha

Lho, lalu dimana file rahasia saya?? Tenang, jangan panik!! Klik kanan pada file hasil.jpg lalu pilihlah Open With --> Choose Program Pilihlah WinRar lalu klik OK.

Mematikan AutoRun Windows

Mematikan AutoRun Windows berfungsi meminimalisasikan virus yg masuk lewat autorun ^_^

langsung saja ke kotak box run klik Start yg ada di pojok kiri bawah ----> Run lalu ketik regedit lalu ok

trus menuju kesini
HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

klik 2x/double klik pada string NoDriveTypeAutoRun
Isi value data dengan ff yang berarti fungsi Aturun/Autoplay akan di matikan pada 255 drive

lalu ke HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
sama seperti yang diatas ganti value data dengan ff

atau pakai cara ini juga sama saja

tulis gpedit.msc dikotak run

di tab Computer Configuration
administrative templates ----> system --> turn off autoplay

matiin juga di tab User Configuration

restart komputer agar perubahan terasa

Sunday, January 20, 2008

W0w




Premature Baby Left In Hole For 24 Hours Survives

Emergency Light




I remember that I used some recycled parts, also a tranformerless power supply. This circuit should be completely covered by a plastic container with the appropiate ventilation. Here is the schematic:

A small sealed maintenance-free battery is perfect, it can provide up to 4 hours of light. If you want someting smaller and easy to install, you can replace the battery and lightbulb with a super bright white led (12,000 mcd at least) and a 1F supercapacitor. Here is the circuit:

When the circuit receives power, it acts like a trickle charger for the lead-acid battery. When the power fails, the relay is off and it sends the battery power to the lightbulb.

I'm not sure if this circuit can work with ni-cad batteries, but I think it may work without modifications. The zener diode must be 13V for the battery-version and 5 volts for the LED version.

Mini Amplifier with LM386

The LM386 is a low voltage audio power amplifier. It can provide 125mW to 750mW, enough for any project that uses audio. This circuit can work with batteries, requieres minimum external parts and works from 4 to 18 Volts (contact the manufacturer or read the technical info. Some versions works only with 5 to 15V.)

The power output depends of the voltage. The power output is 125mW when the voltage is 6V. The voltage gain goes from 20 to 200 and the output is self-centering, so doesn't need dual voltage as other amplifiers. It can be used on battery radios, tape players, intercoms, also, as ultrasonic amplifier. This chip is the "555" of the amplifiers.

Here is the typical application for this chip. Here are two schematics, the first one have a gain of 200 and the second one is only 20. You can use a switch for the 10uF capacitor to have the "boost" option.

The 10k resistor is used to adjust the sensibility if the electret microphone, the 100k resistor is used to adjust the volume.

In theory, this circuit will not work because it needs a pre-amplifier. Supposedly, a 741 or any othe pre-amplifier is needed. As I said before, I don't follow the theory. I already verified that the pre-amplifier is not needed, just adjust the 10k variable resistor. In fact, You may not be able to get the circuit to work properly with a pre-amplifier.

Warning: May be too loud

The 220uF capacitor can be replaced by any other if that value is not available. Do not connect the speaker directly to the output pin. If you are using a tweeter (or piezoelectric) you can connect it directly.

UPDATE: This schematic can be used for almost ANY application that needs an amplifier. The switch labeled "Boost" activates the gain of 200 if the input signal is too weak.