Connect With Me In Facebook

Welcome to DefendHackers, If u want to Apply for a Blogroll as a Author , With h4ckfreak Mail me @ suren.click@gmail.com

Mark Zuckerberg tells 8th graders “there’s no shortcuts” and to make friends

By h4ckfreak

Metasploit Quick Start Referennce Guide

Metasploit Quick Start Referennce Guide , By h4ckfreak

IP Security

IP Security By H4ckfreak.

15 Network Admin Apps for Android

15 Network Admin Apps for Android , By h4ckfreak

Break All OS Passwords Using KON

Break All OS Passwords Using KON , By h4ckfreak

Recover Or Reset Ur Windows Pwd Using Ubuntu

Recover Or Reset Ur Windows Pwd Using Ubuntu , By h4ckfreak

Security Blueprint For Ethical Hackers..

By h4ckfreak

Blocking IP Using IPSec

By h4ckfreak

Preventing DDos Attacks, Combat Steps abd Tools...

By h4ckfreak

Showing posts with label Uncategorized. Show all posts
Showing posts with label Uncategorized. Show all posts

Wednesday, March 23, 2011

Hacking The Websites, Methods (n00b Special)


Remote File Inclusion (RFI):
A method of uploading a shell by an off-site .

Local File Inclusion (LFI) AKA Directory traversal attack:
A method of pulling usernames and passwords off a website vulnerable to the exploit of
insufficient security validation / sanitization of user-supplied input file names.

Blind Structured Query Language Injection (blind SQLI):
Method of once again insufficiant security validation and sanitization of user-input.

Basic SQLi
This is the easiest method of SQLi. This method allows you to enter codes such as ' or '1'='1
into the username and password fields to gain access. E.g. you find the admin login on a site
and you may enter the correct username admin and the password as: ' or '1'='1.

Cross Site Scripting (XSS):
A method of injection html/javascript into a website. The can be both persistent attacks, and
non-persistant.


Cross site request forgery (CSRF):
An attack that is commonly sent by e-mail or other means and often tricks a user. given to a target may include HTML, something like this:
Code:
<img src="http://bank.example/withdraw?account=bob&amount=100&for=mallory" height="1" width="1" border="0">
And this will be activated through the victims browser and the site will think it was a valid and intentional move.

Public Exploits:
Public exploits are just scripts that people have released for others to use. Such as
this exploit which exploits a webserver
running this program on one of its open ports. I suggest you have a quick look through the
script to see how/why it works. The way of finding which software you target is using is by using Namp or the GUI Zenmap

DNS hijacking:
This is the method or redirecting the domain name to a rouge domain name. This method is used
particually in phishing attacks.

Bruteforcing:
This method is the practise of running a program to keep guessing the password and username of
a site. This method is fastly going out of fashion as the max login attempts are added and even
without this obstical, it can take weeks to gain the correct password. Programs commonly used
for this are hydra and Brutus.

Password Guessing:
Yes, just as it sounds. This is the method of just guessing common passwords such as:

Code:
admin
admin123
321admin123
password
toor
thesitesname

Packet Sniffing:
If you find a site with FTP access, there may be a chance you can use a tool such as
cain and abel to sniff their password and username when
the login. Not a very easy task as the trafic is sometimes encrypted.

RCE (Remote Command Execution):

This is the method of making the server read command that you have entered for it to.
E.g.
Code:
index.php?cmd=whoami
index.php?cmd=net user


Social Enginering:
A common method used to gain information. This can be a long process, but an effective one.
They can patch software, but it will always be people's ignorance that will let you/your target
down.

Cookie poisoning:
This is a method of editing cookies you have already gained, to gain extra privileges. Not a very common method now as of cookies being encrypted, and having to be signed. This exploit can work on some surprising sites, take a look, you may be surprised.

Parameter tampering:  (And i think is method is Often called As SESSION HIJACKING, correct me if i am wrong)

An attack usual done by moderfying values in the url. E.g. changing a value to decrease the amount you have to pay on something.
Code:
<input type=”hidden” id=”1008” name=”cost” value=”70.00”>

In this example, an attacker can modify the “value” information of a specific item, thus lowering its cost.
source: http://www.owasp.org/index.php/Web_Parameter_Tampering

Tamper Data:
A very nifty Firefox addon which is used to modify http/https headers and post parameters.

Admin Auth bypass:
This exploit can be as simple as adding:
Code:
?action=edit
To a URL. This exploit when a server/application allows you to edit by having the valid URL, instead of by cookies. Another method of admin auth bypass is editting the html to proceed even if the password is wrong.


Thursday, August 5, 2010

Anonymity and Privacy on the Internet

Anonymity and Privacy on the Internet  

  Technical 

 General Information


  Here are links to some leading privacy sites

A Note About Web Browsers & Privacy
A brief warning from the early days of the web by Ed Kubaitis
Anonymity, Privacy and Security
Information on how to remain anonymous
Anonymous Communications on the Internet
Study of Internet anonymity and pseudonymity being conducted by the American Association for the Advancement of Science
Bacard's Privacy Page
From the author of the Computer Privacy Handbook
Beyond Concern: Understanding Net Users' Attitudes About Online Privacy
An AT&T Labs study suggests that a "one size fits all" approach to privacy won't work.
CDT's Privacy Watchdog
"Internet users help us assess the state of privacy on the Internet and send a clear message to the business community that privacy matters. Check for privacy policies at the Web sites you visit and answer seven simple questions based on the policy. "
Development of Surveillance Technology and Risk of Abuse of Economic Information
This 1999 document from the Scientific and Technological Options Assessment Panel of the European Parliament looks at the Echelon global surveillance system.
Discovery Channel: Cybersurveillance
A special online report by Patrick J. Kiger
Electronic Communications Privacy Act
Explains the protections afforded to citizens under the US law
EPIC Online Guide to Privacy Resources
Compiled by the Electronic Privacy Information Center
Georgetown Internet Privacy Policy Study (GIPPS)
Assesses the extent to which U.S. consumer-oriented web sites disclose their information practices and policies
Platform for Privacy Preferences (P3P)
This W3C project allows users to be informed of site practices, to delegate decisions to their computer when possible, and allow tailored relationships to specific sites
Privacy Analysis of your Internet Connection
Free, instant analysis of information that is collected about you when visiting a web site. From Privacy.net.
PRIVACY NOW! Campaign
EFF shows support for the essential human right of privacy.

Privacy Site, The
Provides up-to-date electronic privacy news stories from around the Web
Privacy Times
A Washington-based newsletter edited by Evan Hendricks that covers "the legislation, court rulings, industry developments and horror stories that frame the ongoing debate about information privacy".
Privacy.net
Internet privacy information.
Stalker's Home Page, The
Information about the potential for phonebooks on the web to be used for criminal activity.
What's Related?
A solid expose of the privacy implications of Netscape's "What's Related" feature. Ironically, this document is said to be "related" to the Unabomber Manifesto -- huh?
alt.privacy
Privacy issues in cyberspace

   Privacy Organizations  

Electronic Privacy Information Center.
EPIC was established in 1994 to focus public attention on emerging privacy issues relating to the National Information Infrastructure, such as the Clipper Chip, the Digital Telephony proposal, medical records privacy and the sale of consumer data. EPIC conducts litigation, sponsors conferences, produces reports, publishes the EPIC Alert and leads campaigns on privacy issues. For more info email: info@epic.org. EPIC, 666 Penn. Ave, SE, Suite 301, Washington, DC 20003. (202) 544-9240 (tel). Director: Marc Rotenberg.
American Civil Liberties Union.
National civil liberties organization. Originally founded in 1920, the ACLU conducts extensive litigation on Constitutional issues including privacy, and free speech. The ACLU Washington office lobbies Congress for civil liberties and civil rights issues. Email: info@aclu.org. 125 Broad Street, NY, NY 10004-2400. Executive Director: Ira Glasser.
Center for Media Education.
A national non-profit organization dedicated to improving the quality of electronic media, especially on the behalf of children and families. Gruides, reports and other information on children's and consumer privacy. Email: cme@cme.org. 1511 K Street, NW Suite 518, Washington, DC 20005. (202) 628-2620. Fax: (202) 628-2554
Computer Professionals for Social Responsibility.
A national membership organization of people concerned about the impact of technology on society. CPSR sponsors an annual conference, maintains numerous mailing lists on computer-related issues, a large internet site of information and publishes a quarterly newsletter. It has 24 local chapters across the US and several international affiliates. CPSR sponsors working groups on civil liberties, working in the computer industry and others. Contact: cpsr-info@cpsr.org. PO Box 717, Palo Alto, CA 94301. (415) 322-3778 (tel).
Consumer Project on Technology.
The CPT was created by Ralph Nader in the Spring of 1995 to focus on a variety of issues, including telecommunications regulation, pricing of ISDN services; fair use under the copyright law; issues relating to the pricing, ownership and development of pharmaceutical drugs; impact of technology on personal privacy; and several other issues. Box 19367, Washington, DC 20036, (202) 387-8030 (tel), (202) 234-5176 (fax). Director: James Love.
Cypherpunks.
Informal group that develops technological solutions to protect privacy. the Cypherpunks write cryptography and other programs, set up anonymous remailers and discuss political and technical issues. Meetings are also regularly held in California and other states.
EF-Texas.
TX-based, electronic civil liberties organization founded in 1990. Purpose is to engage in and support educational activities that promote a clearer understanding of the social, legal, and technical issues surrounding online telecommunications. Also see newsgroup austin.eff. PO Box 18957, Austin, TX 78760. President: David Smith.
Electronic Frontier Foundation.
Organization formed in 1990 to maintain and enhance intellectual freedom, privacy, and other values of civil liberties and democracy in networked communications. Publishes newsletters, Internet Guidebooks and other documents, provides mailing lists and other online forums, and hosts a large electronic document archive. Email: info@eff.org, ftp: ftp.eff.org, gopher: gopher.eff.org. PO Box 170190, San Francisco, CA 94117, (415) 668-7171 (tel), (415) 668 7007 (fax). Executive Director: Lori Fena.
Global Internet Liberty Campaign.
International coalition of 40 privacy, free speech and human rights groups dedicated to fighting international threats to privacy and free speech on the Internet.
Internet Privacy Coalition.
Coalition of cryptographers, public interest groups and businesses encouraging the widespread use of cryptography and relaxation of export controls on cryptography. Organizes Golden Key Campaign.
Privacy International.
An international human rights group based in London, England with offices in Washington, DC and Sydney, Australia. PI has members in over 40 countries and has led campaigns against national id cards, video surveillance and other privacy violations in numerous countries including Australia, New Zealand, United Kingdom, and the Philippines. PI publishes the International Privacy Bulletin and sponsors yearly international conferences on privacy issues. Email: pi@privacy.org. Privacy International , 666 Penn. Ave, SE, Suite 301, Washington, DC 20003. Director General: Simon Davies.
Privacy Rights Clearinghouse.
A California-based organization formed in 1992. The Clearinghouse has produced many fact sheets and an annual report, and maintains a toll free hotline to provide advice to consumers about their rights. Email: prc@privacyrights.org. 5384 Linda VistaRoad #306, San Diego, CA 92110-2492, 619-298-3396 (phone), 619-298-5681 (fax). Director: Beth Givens.
US Privacy Council. A coalition of US privacy groups and individuals founded in 1991 to deal with privacy issues in the US. USPC works in Washington monitoring legislation and the activities of government agencies. USPC works closely with other groups on privacy issues including National ID cards, reforming credit reporting, Caller ID and international issues. Email: pritimes@nicom.com . (202) 829-3660 (tel). Chair: Evan Hendricks.
US Public Interest Group (PIRG).
The State Public Interest Research Groups (PIRGs). Non-profit, non-partisan consumer and environmental watchdog groups. Advocates for better consumer privacy laws, preventing identity theft and correcting credit reports. Fact sheets and reports available on web. DC Office (U.S. PIRG) Executive Director: Gene Karpinsk.

  US-Based Newsletters  

2600 Magazine. Inside technical information on telephone and computer network operations. Published quarterly. Editor: Emmanuel Goldstein. Email: 2600@well.com. P.O. Box 752, Middle Island, NY 11953. Cost:$21/year.
Access Reports. A biweekly newsletter covering the Freedom of Information Act, other federal open government statutes, and information policy issues on both the legislative and administrative level. It also covers case law development on open government issues in the states. Current trends and issues in privacy are also covered. Tele. (804) 384-5334; FAX (804) 384-8272, Email: hhammitt@accessreports.com.
Financial Privacy News. A monthly newsletter detailing all apsects of privacy, offshore banking, and asset protection. Editor: Dr. Styvesant J. Fishdt III 1293 Pavas 1200 Costa Rica or SJO-966, P.O. Box 025216, Miami, FL 33182 Cost $49/Yr. (506) 231-1480 (t/f) Email: stephenw@sol.racsa.co.cr
Full Disclosure. A monthly newspaper on surveillance and civil liberties issues. Editor: Glen Roberts. PO Box 1533, Oil City, PA 16301. Cost: $29.95/year.
Gray Areas. Covers subject matter which is illegal, immoral and/or controversial. Covers all sorts of privacy issues ranging from urine tests to computer crimes to the rights of prisoners. Editor: Netta Gilboa. Address: Gray Areas, Inc. P.O. Box 808, Broomall, PA 19008-0808. Quarterly. Cost: $8.00/sample $12.00 foreign 4-issue subscriptions are $23 bulk/$32 first class mail/$45 foreign.
Privacy and American Business. Industry perspective on privacy. Editor: Bob Belair. Bimonthly with special issues. Two University Plaza, Suite 414, Hackensack, NJ 07601. (201) 996-1154 (tel). Cost: $395/year.
Privacy and Security 2001. Technical and social aspects of privacy and security. Focuses on electronic surveillance and counter-measures. Editor Jim Ross. Ross Group LLC, 7008 Tech Circle, Manassas, VA 20109-7314, Tel/Fax: 703-365-2200/0363. 10/year. $35/year.
Privacy Journal. A monthly journal on privacy, mainly in the U.S., now in its 23th year of publication. Publisher: Robert Ellis Smith. P.O. Box 28577, Providence, RI 02908. (401) 274-7861 (tel). Cost: $118/year. Email: privacyjournal@cwixmail.com
Privacy Newsletter. Monthly newsletter that shows consumers how to get privacy and keep it. Shares key privacy stories, abuses, and public attitudes. Provides hope, encouragement, and inspiration to individuals who seek freedom from Big Brother. Editor: John Featherman. E-mail: privacy@mindspring.com. Address: PO Box 8206, Philadelphia PA 19101-8206.
Privacy Times. Biweekly newsletter on information law. Each issue covers developments related to privacy and information access, including summaries of court decisions on the Freedom of Information Act and other relevant statutes. Editor: Evan Hendricks. Address: P.O. Box 21501, Washington, DC 21501. (202) 829-3660. Cost: $250/Year.

  International Newsletters  

International Privacy Bulletin. Published quarterly by Privacy International. The IPB covers international trends and new technologies. Each issue also includes reports from different countries and reviews of new publications. Editor: Dave Banisar. 666 Penn. Ave, SE, #301, Washington, DC 20003. (202) 544-9240 (tel). Cost: $50/year individuals,$125/year Libraries/Govt. Agencies $200/year, Commerical organizations.
Privacy Files. Canadian-based newsletter providing comprehensive analysis and reports. Published 10 times a year by Progesta Publishing Inc. E-mail: privacy.files@progesta.com. Snail mail: 1788 d'Argenson, Ste-Julie (Quebec) CANADA J3E 1E3. Voice: +1 (514) 922 9151 Fax: +1 (514) 922 9152. Voice (toll free from Canada & US): (800) 922 9151. To receive Privacy Files Abstracts, send the message "Add me to 'Privacy Files Abstracts' list < your name >" to: privacy.files@progesta.com.
Privacy Laws and Business. UK-based newsletter that focuses on international privacy and data protection from a business perspective. Editor: Stewart Dresner. Roxeth House, Shaftesbury Avenue, Harrow, Middlesex HA2 0PZ, United Kindgom. 44-181-423-1300(tel), 44-181-423-4536 (fax). Info@privacylaws.co.uk. Cost: $US 464/year.
Privacy Law and Policy Reporter. A well written, law-oriented overview of privacy developments in NZ, Australia and South Pacific. 10 issues/year. Level 11, Carlton Centre, 55-63 Elizabeth Street, Sydney, NSW 2000, Australia. 61-2-221-6199 (tel). Cost: $AZ 345

   U.S. Net Sites 

ACLU Freedom Network. Reports, testimony and other materials on privacy, free speech and other civil liberties issues. America Online Keyword: ACLU
The Antitelemarketers Source. Extensive information and help on fighting telemarketing.
The Coalition Against Unsolicited Commercial Email. Ad hoc coalition of Internet users, network technology professionals, and Internet Service administrators opposing junk email.
CPSR Internet Library. Maintains the online archives for CPSR, EPIC Privacy International and other groups.
Cypherpunks. Archives on cryptography and other privacy technologies.
Electronic Frontier Foundation Archives. Archives on privacy, free speech, underground newsletters.
Electronic Privacy Information Center. Includes back issues of EPIC Alert, privacy resources, legislation, and articles.
Encryption Policy Resource Page. Materials and news on current debates in US encryption debate.
Federal Trade Commission. Information on credit reports, kids, and consumer privacy.
Fight Spam on the Internet! Campaign to fight unsolicited email.
Junkbusters. Materials on fighting junk mail, spam, telemarketing calls and other privacy invasive marketing. Also tools to protect privacy.
Privacy.net. Extensive archives on consumer privacy and federal and state levels.
Privacy Rights Clearinghouse. Email: prc@privacyrights.org.
Private Citizen. Dedicated to junking junk mail, spam and telemarketers.
Tech Law Journal. Decisions, legislation, news, and other materials on privacy, encryption, censorship, copyright and other online legal issues.
US PIRG's Consumer Credit & Privacy Page. Reports, testimony, fact sheets and advice on credit reports, identity theft and privacy.
Yahoo's Privacy Resources. Link to Yahoo Web resources page on privacy.

     International Privacy Sites 

Arge Daten. Web Site on Austrian Privacy. Mostly in German.
New South Wales Privacy Committee
Canadian Office of the Privacy Commissioner. Materials on Candian privacy. Includes text of law, reports. In English and French.
British Columbia, Canada Information and Privacy Commissioner. Official web page of the commissioner. Includes the text of the BC act and decision.
Ontario, Canada Information and Privacy Commissioner. Text of law, reports, guides, orders and investigations.
Cyber-Rights & Cyber-Liberties (UK). UK-based civil liberties group
Data Surveillance and Information Privacy Web Page. Extensive materials on privacy of transactional records and data matching.
Electronic Frontiers Canada. Materials on Privacy and Civil Liberties in Canada.
Electronic Frontiers Australia. Australian Cyber-rights groups. Materials on free speech, privacy, and encryption.
Finland Privacy Commission. Mostly in Finnish.
German Privacy Information from Humbalt University. Extensive collection of German data protection information. All in German.
Global Internet Liberty Campaign. Coalition of human rights, privacy, anti-censorship and cyberliberties groups.
Italian Privacy Site. New site on recently enacted Italian Data protection law. Mostly in Italian.
Netherlands Privacy Page. Materials on Privacy in the Netherlands and internationally. In Dutch and English.
New Zealand Office of Privacy Commissioner. Guides and fact sheets on wide range of privacy issues including the NZ Privacy Act, case notes, and medical records.
The Norwegian Data Inspectorate (Datatilsynet). Web page of Norway Privacy Commissioner. English available.
The Policing & Surveillance WWW-page. Information on technologies of surveillance and control. In German.
Privacy International. Extensive materials on international privacy and human rights. Includes fact sheets on current issues such as national id cards, CCTV and others. Detailed country pages
Statewatch. UK-based civil liberties group. Extensive database (15+ years) of materials on civil liberties in the UK and Europe.
Swiss Data Protection Agency WWW page. In German, French and Italian.
UK Data Protection Registrar. Overview of UK Data Protection Act.

SAFE Blueprint: Security Blueprint for Enterprise and Smaller Networks


SAFE blueprint is a network s ecurity framework developed by Cisco Systems. SAFE is intended to be a flexible and dynamic blueprint for network security that is based on the Cisco Architecture for Voice, Video, and Integrated Data (AVVID). The original SAFE blueprint was introduced by Cisco in 2000 in the white paper "SAFE: A Security Blueprint for Enterprise Networks", which applied only to enterprise networks. Cisco has continued to expand and develop the SAFE blueprint to cover other network architectures such as small, medium-sized, and remote-user networks; IP telephony networks; wireless networks; and IPSec-based VPNs.
The original SAFE blueprint for enterprise divides the network into various modules based on the common function of the devices. The focus of the design is the concept of "separation of duties and trust". Where there are different levels of trust, the devices for that function are segregated and isolated in their own module to help mitigate any possible vulnerabilities and attacks that may occur through those devices. The SAFE blueprint for e nterprise suggests that network designers should follow security-oriented objectives when designing a network. These design objectives are:
  • Security and attack mitigation based on policy
  • Security implementation throughout the infrastructure
  • Secure management and reporting
  • Authentication and authorization of users and administrators to critical network resources
  • Intrusion detection for critical resources and subnets
  • Support for emerging network application
The SAFE blueprint for midsize network follows similar objectives . However, in this blueprint, the complexity of the Corporate Internet Module is significantly less than in the Enterprise network blueprint. This blueprint includes network intrusion detection systems (NIDSs) as part of the overall security strategy.
The SAFE blueprint for small network emphasis the application of the SAVE blueprint to a small business network. The redundancy in device functionality in the SAFE Enterprise blueprint is removed to achieve cost-effective deployment of security throughout the network.
The SAFE blueprint for VPN (IPsec based) is discussed in detail in the Cisco White pager "SAFE VPN : IPSec Virtual Private Networks in Depth". The paper includes specific design considerations and best-practice recommendations for enterprise IPSec VPN deployment. The design objectives used in the SAFE VPN include :
  • The need for secure connectivity
  • Reliability, performance, and scalability of the design
  • Options for high availability
  • Authentication of users and devices in the VPN
  • Secure management of the VPN and devices attached
  • Security and attack mitigation before and after IPSec tunnels
The SAFE blueprint for Wireless LAN implementation is discussed in another Cisco white paper "SAFE : Wireless LAN Security in Depth (Version 2)". This white paper describes the following design objectives, listed in order of priority:
  • Security and attack mitigation based on policy
  • Authentication and authorization of users to wired network resources
  • Wireless data confidentiality
  • User differentiation
  • Access point management
  • Authentication of users to network resources
  • Options for high availability (large enterprise only)
The SAFE blueprint for VOIP implementation is discussed in the Cisco white paper "SAVE : IP Telephony Security in Depth". The basic principle of the white paper is that the IP telephony deployment must provide secure, ubiquitous IP telephony services to the locations and users that require it. The following design objectives, listed in order of priority, guided the decision-making process:
  • Security and attack mitigation based on policy
  • Quality of service
  • Reliability, performance, and scalability
  • Authentication of users and devices (identity)
  • Options for high availability (some designs)
  • Secure management
SAFE Blueprint for Enterprise Large Network
SAFE Blueprint for Enterprise Large Network
SAFE Blueprint for Enterprise Large Network
SAFE Blueprint for Middle Size Network
SAVE Blueprint for Middle Size Network
SAFE Blueprint for Middle Size Network
SAFE Blueprint for Small Size Network
SAVE Blueprint for Small Size Network

Tuesday, May 11, 2010

How to Survive a Heart Attack when you are alone?

Heart Attack is something very common these days, earlier, it was something found only in people of age group like late 40s or 50s, hardly we use to come across this problem in 20s and 30s age group. However these days due to changes in lifestyle and working environment, the trend has changed and due to which the heart attack cases in 20s and 30s have increased.
Generally the reasons for a heart attack could be –
  • Excessive Smoking – Smoking is the major cause of arteries getting clogged, hence the blood pressure rises, resulting into a major cause of Heart Attack.
  • Excessive Drinking – Alcohol raises your blood pressure, making you more prone to Heart Attacks.
  • Getting angry very often is another reason for heart attacks.
  • Getting stressed out.
  • Losing control over your cholesterol level.
  • Over exerting yourself, etc.
Mostly Heart Attacks are caused as a result of a condition known as – Coronary Artery Disease. In Coronary Artery Disease, a fatty material called plaque covers up the inside walls of the coronary arteries (these are the arteries which supply blood and oxygen to the heart). Eventually, an area of plaque can rupture, causing a blood clot to form on the surface of the plaque. If the clot becomes large enough, it can mostly or completely block the flow of oxygen-rich blood to the part of the heart muscle fed by the artery. [Read More...]

Heart attack diagram
Now, it could be a Heart Attack, if suddenly you start experiencing severe pain in your chest that starts to radiate out into your arm and up into your jaw, and the situation worsens if you are alone at this moment.
What to do in this situation ?
  • Do not panic, but start coughing repeatedly and very vigorously.
  • A deep breath should be taken before each cough; the cough must be deep and prolonged, as when producing sputum from deep inside the chest.
  • A breath and a cough must be repeated about every two seconds without let-up until help arrives, or until the heart is felt to be beating normally again.
Deep breaths get oxygen into the lungs and coughing movements squeeze the heart and keep the blood circulating. The squeezing pressure on the heart also helps it regain normal rhythm. In this way, heart attack victims can get to a hospital.
However, dont forget or delay your hospital visit after this. This information has been collected from various sites, and a session on heart care, which I got to attend recently.

Wednesday, April 14, 2010

American Accent training Free Downloads




After you have downloaded the zip files, unzip it and enter this password: pinoybisnis
Click the link: Improve Your American English Accent to Download eBooks.
Click the link: Improve Your American English Accent to Download CD 1
Click the link: Improve Your American English Accent to Download CD 2
Click the link: Improve Your American English Accent to Download CD 3
divider
Title: Accent Reduction Made Easy
Size: 164 Mb
Format: PDF + MP3
Click the link Accent Reduction Made Easy to download ebook
Click the link Accent Reduction Made Easy to download CD 1
Click the link Accent Reduction Made Easy to download CD 2
Click the link Accent Reduction Made Easy to download CD 3
Designed for anyone desiring to speak English with Standard American pronunciation, this popular program includes a comprehensive illustrated Listening Guide for reference. This course features a variety of drills and exercises to improve and practice correct English pronunciation. Both professionals and non-professionals will find this program effective as well as easy and convenient to use at home, in the car or anywhere. Author Jane Wellborn has helped thousands improve their speech and along with that, improved their social and professional lives.
divider
Title: Resumes That Get You Hired

Tuesday, March 30, 2010

Convert Text To Speech

Convert Text To Speech

CarryoutText is an easy to use service that converts your text to a MP3 file. It converts English text to a downloadable MP3 file that you can listen at the computer or with your MP3 player.
Convert Text into Downloadable MP3 Audio



You can use your commute time more productively by converting your blogs, news articles and any other text to an audio file that can be played on your IPod or your favorite MP3 player. Students can also use it for their studies.
Go to CarryoutText: Link