Fitness Wood - How To Do Wood Chops Exercise

Manual step Wood Chop fitness wood is another advanced functional movement that must be learned in three stages fitness wood.

Fitness Monkey - The Ultimate Way To Use Monkey Bars

Monkey Yoga posture is a big difference. fitness monkey Most of the hips can not touch the ground unless we sit squarely on our sit bones. fitness monkey However,

Six Pack Abs Vitamins - Some Of The Best Vitamins And Minerals To Take For A Great Six Pack!

When it comes to flying, vitamins, minerals and herbs, especially some that can really help you reach your goal much faster than you ever thought possible. Some vitamins and minerals actually help you lose fat and get shredded fast

Eat Steak to Get 6 Pack Abs!

Eating meat will help you get six pack abs. Fun? Yes! Real? Yes! Here's how to eat meat and other "forbidden" foods will help you get a ripped six pack. Get ripped abs is never easy, but it can be easier.

Can Potatoes Be A Part Of A Six Pack Abs Diet?

People often ask if they can eat a potato in your six pack abs diet and still get a six pack as a result. The potato is a favorite of many, but often considered one of the worst foods for health. It is commonly accepted that food must taste bad to be healthy. The truth is

dimanche 20 mai 2012

Pre flop holdem


Pre-Flop Holdem


Pre-Flop Holdem is quite a determining strategy in arriving at the odds of winning or losing the table.


poker holdem, poker room, poker online


Pre-Flop Holdem is quite a determining strategy in arriving at the odds of winning or losing the table. Most pre-flop rounds have an ante or a blind bet session after which the players look in to their cards before deciding to bet any further. The pre-flop is the betting round before any street card is dealt to be played. In the most part, the status of the hole cards in this round will tell you about the approximate odds of winning.


Playing the situation of a pre-flop holdem right is very important. You need to learn many combinations and related strategies in making the right decision in a pre-flop.


Not only does the status of the card determine your winning, your table position in the betting round determines your odds:-
     Beginning position
     Middle position
     Last position


The type of players you are going to deal with also would determine the kind of chances that you can take like with:-
     Tight-passive players
     Tight-aggressive players
     Loose-passive players
     Loose-aggressive players


The common options that you need to decide in Pre-flop holdem would be:-
     Muck
     Fold
     Open raising
     Limp and raise
     Limp and re-raise


Some good pre-flop holdem strategies:-
     Aces are good starting hands in pre-flop holdem and they can contribute to a major percentage of winning with any two random deals.
     Pairs of A, K, Q, J are good hands to play in the pre-flop holdem A-K is also a good start
     Pre-flop calculators can be used to calculate the odds before you can decide your next move. A typical pre-flop holdem calculator would just require the combination of the two cards you have got. All you need to do it to just hit in the two cards and the calculator will give you the percentage possibilities to win.


Honestly, the pre-flop holdem round can dictate the whole of the story better despite you having several rounds ahead. Indispensably, the number of players, your position, the poker skills of the participants and the kind of bets that have been placed can also contribute to calculate the odds, but the pre-flop holdem calculator seems to work better than all such odds.
If you are a beginning player you can better do with the pre-flop holdem calculator better than without. It should be difficult at least in the beginning to do that entire mental math in your brain.


 



Recommended For You



Pre diabetes


Pre Diabetes


Type II Diabetes has become somewhat of an epidemic of late. More and more people are being diagnosed with this potentially life threatening condition. Type II Diabetes usually sets on later in life, although more younger people are being diagnosed every day with this disease.


According to the American Diabetes Association, approximately 54 million people in the United States have pre diabetes. Pre diabetes is a condition in which the blood glucose levels are higher than normal but not high enough to be considered Type II diabetes. Although pre diabetes is not a full fledged disease, it can also cause complications in the heart and blood circulation if left untreated.


The good news about pre diabetes is that with proper nutrition and the care of a physician, you can avoid being diagnosed with Type II diabetes. The condition can reverse itself, but it does take work on the part of the individual, as well as compliance with the orders directed by your physician.


Obesity is also an epidemic in the United States and many in the medical community believe that this is contributory to the corresponding diabetic epidemic. It is the general consensus of the medical community that obesity is a precursor to Type II diabetes. Therefore, those who have pre diabetes can stave off the disease by making some healthy life choices that will eliminate their need for medication or insulin in later years.


One way to reverse the effects of pre diabetes is to maintain a healthy weight. This can be easily accomplished through diet and exercise. For those who feel that it is too much trouble to manage their weight or complain that they do not have the time to exercise, they need to realize that the time they spend exercising now can eliminate their time spent on dialysis. While not all people with diabetes experience kidney failure, many do. And when the kidneys fail, these patients must spend many hours each week, hooked up to a machine that functions as their kidneys.


Those who complain that they do not want to watch their diet can be reminded that it is easier to watch their diet than to inject themselves with insulin or monitor their blood glucose levels several times a day. Those who feel that foods that are rich in carbohydrates are less expensive than healthier alternatives can be reminded of the cost of medications and doctor visits for those who refuse to take control of their condition right away.


While some people are pre disposed to diabetes through genetic factors, others acquire this disease by eating too many bad carbohydrates, being inactive and not maintaining a healthy weight. If you have been told that you have pre diabetes, do not fret. You can reverse this condition. Begin an exercise regime, even if it only entails walking. Take a look at the Glycemic Index that explains which foods diabetics should avoid and follow these suggestions.


See your doctor about being put on a weight loss program and make certain that he or she continues to monitor your blood glucose levels. Pre diabetes does not have to turn into Type II diabetes. By developing a healthier lifestyle, you can reverse this condition and lead a longer, healthier life.


 



Recommended For You



Pre diabetes are you susceptible discover how to prevent it developing into type 2 diabetes


Pre-Diabetes - Are you susceptible? Discover how to prevent it developing into type 2 diabetes


Pre-diabetes means you probably have higher than normal blood-sugar levels but, fortunately, not high enough to be classed as being diabetic.

However it does mean that you are susceptible to developing type 2 diabetes and heart disease if you do nothing about it. Learn more about pre-diabetes and what you can do...


pre-diabetes,type 2 diabetes,diabetes,cause of diabetes


Pre-diabetes means you probably have higher than normal blood-sugar levels but, fortunately, not high enough to be classed as being diabetic.

However it does mean that you are susceptible to developing type 2 diabetes and heart disease if you do nothing about it.

Unfortunately, more often than not, there are no physical symptoms to warn you if you are in a pre-diabetes stage. So it's worth getting yourself checked out and, if you fall into any of these categories, ask your physician if you are likely to be at risk of pre-diabetes:

* You are overweight and you are aged 45 or older

* Your weight is OK and you're aged 45+. Ask your doctor during a routine check-up if testing is appropriate for you

* You are an adult under age 45 and you are overweight

* You have high blood pressure; low HDL cholesterol and high triglycerides

* Your family has a history of diabetes

* There's a history of gestational diabetes in your family

* Yo

 



Recommended For You



samedi 19 mai 2012

Rediscovering grilled pizza


Rediscovering Grilled Pizza


Americas favorite food has long been the pizza cooked in a traditional oven but is that about to change? While most Americans have probably never indulged in a grilled pizza, the origins of pizza are making a big comeback. There is no denying that we love our traditional backyard barbeque but rarely, if ever has the barbeque included grilling a pizza. Despite the seemingly odd combination of grill and pizza, the grill is the ideal tool for cooking pizza and in fact is deep i...


grilled pizza, grilling, barbeque, barbeque pizza, bbq, pizza, food, cooking, culinary,favorite food


Americas favorite food has long been the pizza cooked in a traditional oven but is that about to change? While most Americans have probably never indulged in a grilled pizza, the origins of pizza are making a big comeback. There is no denying that we love our traditional backyard barbeque but rarely, if ever has the barbeque included grilling a pizza. Despite the seemingly odd combination of grill and pizza, the grill is the ideal tool for cooking pizza and in fact is deep in the origin of pizza making. The high, dry heat is ideal for a nice crisp crust and the flavor provided from your grill will on a whole new world of backyard grilling.

Before the word pizza was ever used, Greeks and Romans used wood-fired brick ovens to prepare the original version of pizza flatbread. In ancient times each diner was given a piece of flat bread along with a piece of meat on the bread. This food was eaten with the fingers with an occasional knife to cu

 



Recommended For You



Rediscovering chapbooks


Rediscovering Chapbooks


In the 1600's most cultured socialites considered chapbooks vulgar. These 'flimsy' booklets were often sold in less than reputable establishments and contained a variety of less than quality poetry, stories, ballads and political dissent. Often filled with spelling mistakes, factual blunders and little in the way of quality assurance these chapbooks often connected with the uncultured alone.


Today you will find several colleges that are working to collect copies of aging c...


writing,christian writing,freelance writing,chapbooks


In the 1600's most cultured socialites considered chapbooks vulgar. These 'flimsy' booklets were often sold in less than reputable establishments and contained a variety of less than quality poetry, stories, ballads and political dissent. Often filled with spelling mistakes, factual blunders and little in the way of quality assurance these chapbooks often connected with the uncultured alone.


Today you will find several colleges that are working to collect copies of aging chapbooks. International universities have collections of hundred and even thousands of these manuscripts.


What are chapbooks?


This type of literature provides a relatively small grouping of thoughts or poetry in a booklet form that is generally unacceptable in traditional book markets. The length of a chapbook rarely exceeds 50 pages and can be assembled using a home printer and publishing software or using an office supply store that provides copying services.


Chapbook History


In the past these booklets were sold by peddlers to others who enjoyed the simplified nature of the work.


Some chapbooks were purchased if only because paper was scarce and the pages of the chapbook were used to wrap food items for transport.


Chapbooks have historically received very little respect and ultimately faded away for a time with the advent of mass produced newspapers and other periodicals.


In many respects historical chapbooks are now considered desirable folk art and are appreciated in ways the original authors would find surprising.


Chapbooks Today


In the twenty-first century chapbooks are seeing a prominence they have not seen in the past.


Today chapbooks are successfully used to promote an authors poetry or short stories. They are marketed online and in specialty shops. Some chapbook developers have used the work for philanthropic purposes while others have funded group projects and the distribution of personal writings.


A fundraising effort for families involved in the Sego Mining Disaster in West Virginia saw a poetry chapbook used to provide needed finances for those dealing with loss.


With the advent of easy-to-use publishing programs and printers who can mass-produce a chapbook at reasonable prices, there are more people than ever looking to impact others through the distribution of chapbooks.


Chapbook Future


Some chapbooks may be downloadable through PDF technology while other writers of chapbooks may move solidly toward ebook technology in the future in an effort to distribute their chapbooks thus avoiding paper distribution entirely.


It is safe to presume that the time-honored tradition of chapbooks will see these little publications delight, encourage and challenge readers for centuries to come.


 



How To Write Your Own Ebook In 7 Days



Recommended For You



Rediscover your sexual urges with levitra


Rediscover Your Sexual Urges with Levitra


Levitra is an oral prescribed medicine for treating sexual dysfunction effectively. It increases the amount of blood flow into the veins of the penis and gives a satisfactory erection for a prolonged period. Satisfactory results are found till date without any major drawback. First time users are really satisfied and is trying it again and again. Prefer consulting a doctor before using it.


Levitra, Levitra Online Information, Sexual dysfunction, Online Levitra Prescriptions, Online Levitra


Last night you had a commotion with your partner in the bed. Why? For you failed once again to satisfy her sexual urges. If this is the problem you are facing for the last few weeks or months, then it is a high time for you to give some serious thought over it. It is a sure sign of sexual dysfunction and if you go on ignoring it then be ready for a break up from your partner.

Sexual dysfunction can aspire any one at any age. Though a serious problem, but it is definitely curable at any age. Proper treatment with proper medications can return you lost vitality once again and that too significantly.

Sexual dysfunction mainly refers to the inability in a male to sustain a prolonged erection during intercourse or premature ejaculation or even erection hardness. If you somehow experience such problems then there is something you must do. But remember you are not alone and so no need to panic or live your life in depression. Proper medicine

 



Recommended For You



Rediscover tea a personal story


Rediscover Tea - A Personal Story


Tea takes me home each and every day with its refreshing and reflective aroma and taste, even though I am oceans and continents apart from my root.


 


 


I grew up in a tea farm about 20 miles from Taimu Mountain in eastern Fujian province of China. Fujian is one of the major tea growing regions in China. The famous Oolong tea Iron Goddess (aka Tie Kuan Yin) is from southern Fujian. Taimu Mountain is the origin of the exotic White tea.

I spent most of my early childhood in a tea farm with my parents and three brothers and a sister along many other families and their playful kids.

The farm is very large with two separate locations on two different mountains several miles apart. Aside tea growing and processing, the farm also grew crops and raised boars. The farm was state owned. The majority of the workers were young single man and women. Some of them just graduated from high schools. This is during the time of Cultural Revolution when every graduate was sent to a remote farm to learn from the physical work. For most kids, there was no chance to go to college at that time. We all lived in t

 



Recommended For You



Rediscover effective skin care strategies


Rediscover Effective skin care Strategies


With the growing popularity of different skin care products out there, people who have skin problems endlessly search for skin care products to relieve them. But then, due to lack of knowledge and information, more and more people are misled to use products and avail of treatments without consulting a dermatologist or a physician resulting to a more devastating situation.


To avoid mistakes in choosing skin care products and treatments, it is very important to have the knowledge about general causes of skin problemsits types, the age of the patient, current status or conditionso you know what are the products appropriate for each kind.


Developing Healthy Habits Helps A Lot!


Aside from skin problems, experts say that aging greatly contributes to unhealthy skin. In fact, some people feel that aging or growing old is like paying for something they havent consumed. But, if aginglike skin problemsis understood properly, preventive measures can done to avoid seeing aging as a torture or a punishment. The following are just some of the simple skin care strategies that you can practice to your daily life.


1. Watch your weight. Do everything you can to maintain a healthy weight. Maintaining a healthy weight that corresponds to your height is one of the best ways to avoid early signs of aging and ugly skin. By having a healthy weight, you can also avoid various coronary heart diseases and other conditions that can be linked with obesity. By keeping your weight in check, you can be able to achieve a healthy skin that can veer you away from the early signs of aging. Keeping a healthy weight can be possible by eat fruits and vegetables, limiting fat and calories intake, and with regular work out and exercise.


2. Quit smoking. Smoking is truly dangerous not only to your health, to the health of those people surrounding you, and most especially to your skin. If you can, you must start developing a routine in order to quit smoking. When you stop smoking, you can achieve a healthier skin and can reduce the risk of having heart diseases and lung diseases such as cancer.


3. Shield yourself from the sun's damaging rays. Protecting yourself from the sun's deadly rays is one of the best skin care strategies out there. Since exposure to the sun is one of the major causes of skin aging, lesser exposure to it can help you reduce the risk factor of skin cancer. To protect your skin further, avoid long sun exposure 10 a.m. and 2 p.m. and always apply sun block the skin when you're staying outdoors.


4. Drink plenty of water. Hydrating your skin is also one of the best skin care strategies out there. Make sure that you provide your body enough supply of water and not with fluids that can damage organs in the body and weaken the immune system such as alcohol.


5. Stay happy. Most people would agree that staying happy is the best skin care strategy out there because it gives the person a positive outlook in life that makes him or her stay young in body, mind and soul. Laughing when your happy is also a good exercise to the skin, especially to the face.


 



Recommended For You



Redirecting web traffic to a new location


Redirecting web traffic to a new location


If you have to move a website from one domain to another, it will mean that all the links pointing to your old site would now be lost and would generate the dreaded 404 error when visitors came in via old search engine listing or links.

The best way to preserve your links, and have visitors end up on their required page is to setup a redirect from the old domain to the new one.


Web Traffic, web design


If you have to move a website from one domain to another, it will mean that all the links pointing to your old site would now be lost and would generate the dreaded 404 error when visitors came in via old search engine listing or links.

The best way to preserve your links, and have visitors end up on their required page is to setup a redirect from the old domain to the new one.

In this example, we are going to assume that we use to have a domain called OLDSITE.COM and for some reason we have to move everything across to NEWSITE.COM

The first up, dont kill the hosting for the old site but leave it operating for some time. This will then allow us to redirect visitors from the old site to the new site.

A 301 redirect simply tells search engines that visit your site that the old URL has now permanently changed to another URL. Once the search engines find the 301 redirect they will start to convert all the old links in their index across to the new location.
This will take some time and on site sites, this

 



Recommended For You



Red iguana facts


Red Iguana Facts


Facts about the Red Iguana


The Iguana family is considered the largest of the lizard families. The most common are the green iguanas. But there are also some with colorful skin, they are known as the red iguana.


One of the popular red iguanas is the Red sided skink. These are multicolored terrestrial and semi-aquatic lizards that are native to the rocky steppes and open forests habitat of Southern and Eastern Africa.


Today, these red iguanas are now the most common well-liked pet reptiles. They are also one of the most purchased on some pet shops. Thus, these red iguanas are now found in the garden and even inside the house.


Care and Feeding Your Red Iguana


Like any other pet, there are some requirements needed in order for the red iguana to grow on its new environment.


1. Proper Housing


A red iguana can live in an aquarium with 30 gallons of water. Enclosures can vary in shapes, sizes and styles, and are made out of glass or wood. The base should be easy to clean. The most efficient to use is the newspaper, but linoleum and artificial grass are also excellent options as well. Keep enclosures away from soil, sand and bark, as these can lead to impaction or obstruction if your iguana ingests them. It is also important to provide them with shallow container for the food and water. These food and water dishes must be thoroughly disinfected and cleaned regularly. It is also necessary to add climbing materials such as twigs, barks, broad limbs and rocks.


2. Right Feeding


Iguanas in general are herbivores and should be given a variety of vegetable and fruits. The bulk of the diet must contain green leafy vegetables such as mustard greens, escarole, kale, and spinach. But it is also important to feed them with limited amount of protein rich foods. You can also offer mixed vegetable like green peppers, squash, frozen mixed vegetables and green beans, and fruits like, bananas, mangoes, and apples. Like other pets, iguanas should be fed everyday.


3. Appropriate Amount of Water


Water is the most essential needs of the iguanas, thus it should be readily available. Normally, iguanas get water through the plant they consume, others lapping water off wood or on the leaves. Exposing your iguana on your environment early in the morning will avoid them from being dehydrated. These iguanas provided with water dishes can train on their own to purge on their water. So, it is important that their dishes are regularly cleaned to prevent bacterial infections.


4. Grooming your Iguana


Like all pets, your iguana must also be properly groomed. Bathing is a good routine to get your iguana used to. It is one way for your pet to obtain water and cleanse themselves. Bathing should be done using lukewarm water in a shallow container, at least 3 times a week. Always, aid your pet to avoid accidents. Keep in mind that not all iguanas have fun during bath time, some might panic.


5. Handling your Iguana


Iguanas should be handled frequently to discipline or tame them. Your pet iguana can be trained to show fondness for those who handle them regularly. They should be held 2-3 times everyday for at least fifteen minutes. Gently stroke, their back and neck and get your pet reptile used to handling and picking them up. Just keep in mind that iguanas can be aggressive by nature so extreme caution is needed in handling your pet reptile.


The information above are some facts about the red iguanas that you must keep in mind. Remember that the pet iguanas are also important and should be treated with proper care.

 



Recommended For You



Red hot book sales on the internet


Red Hot Book Sales On The Internet


1049


Its no secret that the Net keeps changing all the time; what is a secret to many is how to make the most of the Net and sell some books. When it comes down to it, thats the #1 focus of publishers and authors alike. The Net has become the place to go for book sales, but its more than just having your book listed on or your own website, its about getting people to know about it. With millions of websites coming online every month, that task is getting t...


Internet marketing, social bookmarks, book marketing, book sales, Internet sales


Its no secret that the Net keeps changing all the time; what is a secret to many is how to make the most of the Net and sell some books. When it comes down to it, thats the #1 focus of publishers and authors alike. The Net has become the place to go for book sales, but its more than just having your book listed on or your own website, its about getting people to know about it. With millions of websites coming online every month, that task is getting tougher and tougher each day.


It seems like only yesterday we were telling you that reciprocal linking was *the* way to go to get traffic. What is reciprocal linking? Well, its where you give a link on your site to someone else and they give one to you. This tactic may have worked in 2006 but its no longer a good idea. Why? Because search engines are now looking at high quality one-way (inbound) links. Says Susan Gilbert, AMEs SEO expert: "Google has declared 2007 as the year of the incoming link high quality, one-way links. Now more than ever, it is important to create a long term site building presence that focuses on the community aspect of the World Wide Web."


A backlink is a link which directs others towards your site. They are sometimes referred to as inbound links. These are links that go from another website to your website. But its more than just that, its also about having backlinks that matter. If you havent done a vanity search on yourself in a while try this: Google your name and see what sites come up (when you Google your name use the "+" sign between your first and last name for a more accurate search). Now take a quick peek at the list of sites and see how they rank according to Google, are they on the 20th page of a Google search or are they on the 1st or 2nd page? These are all indicators of high quality, high traffic sites. Now look at the sites that are in your topic/market. Ideally, you want every site linking to you to be your market. Thats the definition of a high quality, high traffic site.


The number of backlinks that your site has is an indication of how popular or important it is according to the major search engines. Backlinks are important for SEO, because search engines, such as Google, Yahoo, and MSN, will give more credit to those sites with a good number of quality backlinks. They will then consider these sites more relevant than others in the results pages of a search query.


Most search engines will want websites to have a level playing field, and so will more often than not look for natural links that have been built slowly over time. Link farms or companies that promise hundreds of backlinks will do nothing but get your site delisted by the search engines. Once this happens, it could take months, and even years to get it back online. (Delisting means that the site no longer comes up in search engines).


Although it can be fairly easy to manipulate the links on a web page in order to achieve a higher ranking, it is a lot harder to influence a search engine with external backlinks from another site. This is why these feature so highly in a search engine's algorithm.


According to research weve done, there are a number of ways in which you can get additional backlinks to your website.


1. Reciprocal Linking.
This is where you link to another site that provides the same service or product as you and they in turn have a link to your site on theirs. While very popular in the past, this exchange of links is not as valuable as one-way links.


2. Site Submissions.
Submit links for your site to directories which allow free submissions, or if you can afford it, some paid directories. There are many sites which offer a service where you can submit your site details to numerous sites. Plus, if you want, you can always create your own directory of similar websites.


3. Blogging.
This has now become an integral part of the Internet, and is one of the most effective ways of linking.


You either have the choice of placing a few words of comments on to someone else's blog, or you may want to link to them from your own blog. However, with so many people creating blogs and wanting to link to each others blogs, this can be extremely time-consuming.


4. Articles.
This is another way of getting great backlinks. Its vital that any articles you write are on the subject, informative and thorough in relation to your site.


Quality articles published on article sites are a great way of getting even more backlinks to your site.


Always include a resource box at the end, as this will include that all important backlink to your site. This resource box should also include a short biography regarding you and your site.


5. Social Bookmarking.
This is a way to record your favorite sites online at the various social bookmarking sites, and that way the search engine spiders pick up your bookmarks and follow these backlinks to your websites.


6. Creating Feeder Sites.
Adding a MySpace or Squidoo page with links back to your website is extremely beneficial and expands your online presence at the same time.


The above are just a few ways that you can get backlinks to your websites to help them rank more highly in the search engines and attract more traffic. Using these techniques you should see an increase in the volume of traffic arriving at your website.


The important thing is to take action today. Things are getting more and more competitive, with thousands of websites coming online every day. If you want to succeed online (and everyone needs to be online), youll want to get started now.


Increasing ranking and traffic are going to be our continued focus in the months and weeks to come. As offline markets become more populated and less accessible, the Internet is the place to go to sell your book.


 



Recommended For You



Red eye


Red Eye and Your Digital Camera
Youve seen the dreaded demon-eye effect that occurs when the camera flash bounces off the eye of a person or pet. An otherwise wonderful picture can be ruined by this. Technically, this is called red-eye and is caused when the pupil of your subjects eye is wide open and the light from the cameras flash reflects off the subjects retina. In people, the color ends up red; in pets, the color is often green.
Many photo editing programs include a red-eye correction filter, but this may not allow your photograph subject to appear normal. These filters also do not work on the green effect produced in a pets eyes. Photo stores sell pens that are used to clear up red-eye, but again they are not always natural-looking and do not work on the green. The best thing is to prevent the demon-eye effect from the start.
It is rare to find a digital camera that does not come with a red-eye reduction feature. This feature can be turned off or on. It is best left on in all circumstances other than direct sunlight. The red-eye reduction feature works by flashing a short burst of light at your subject before you snap the picture. This burst of light causes the subjects pupil to close and makes it less likely for the cameras flash to reflect off the retina. This in turn reduces the chance of red-eye.
It also helps to direct the flash of your camera so it does not directly hit your subjects eyes. Bouncing the flash off a nearby wall or other object will soften its effect and reduce the chances of this unwanted malady. Between bouncing the flash and using your digital cameras red-eye reduction feature, your little angel, whether human or animal, will have eyes that dont glow.


 



Recommended For You



Red cross


Red Cross


The Red Cross is well known for the many types of resources it can offer to those in need. They can offer money, food, and shelter in times of crisis. Most Red Cross locations also collect blood on a regular basis. They may have the resources at a stationary location or they may have a travel RV that takes care of it. Red Cross locations are often the first to arrive and to offer aid in a variety of serious situations where people dont have access to their normal resources.


There are many paid employees of the Red Cross but the majority of people needed to make the organization possible are volunteers. They give of their time in order to do various things that are necessary. Some gather or distribute items for those in need while others head out to deliver it. There are people that offer medical care, help to get the names of people so families will know where they are, and that provide counseling.


The Red Cross has locations all over the United States and you may have one near you. They are a wonderful resource if you find yourself in need. You can also go visit them to find out how you can donate your services to them. You can do something such as give a few hours of your time or offer blood on a regular basis. The Red Cross is a very effective program that is able to operate due to the generosity of people who want to help.


If you arent able to donate your time to the Red Cross you may want to consider a financial donation. You can also offer them clothing, blankets, and other supplies they may need to give out to others. All of these types of donations are also tax deductible so make sure you get a receipt as proof of your contributions.


Some times the efforts of the Red Cross come under fire as well. For example they were said to have not been there fast enough for the victims of Hurricane Katrina. Yet the many wonderful efforts of the Red Cross are often not brought to the attention of those that need to focus on it. As with any organization each outreach can be viewed as a learning situation. This way they are able to learn more and to make better policies for the future.


 



Recommended For You



Red bull energy drinks more good effects or side effects


Red Bull Energy Drinks: More Good Effects Or Side Effects?


With the popularity that Red Bull energy drinks comes the speculations about the side effects that it may have on those who are taking them.


From the time that Red Bull first came out in the market, it became an instant hit among those who have tried and tested its effects on the body. It is no wonder why this energy drink have become a household name in no time at all.


But along with its popularity came the speculations about its side effects. The idea is that if somet...


energy drinks


With the popularity that Red Bull energy drinks comes the speculations about the side effects that it may have on those who are taking them.


From the time that Red Bull first came out in the market, it became an instant hit among those who have tried and tested its effects on the body. It is no wonder why this energy drink have become a household name in no time at all.


But along with its popularity came the speculations about its side effects. The idea is that if something is that good, then there must be something in the ingredient that can bring the opposite reaction. This may be one of the thoughts that the not-so-convinced consumers have in mind.


One of the side effects that is being pointed out in Red Bull energy drinks is its caffeine content. There are those who believe that there are high amounts of caffeine being contained in a single bottle of this energy drink.


What people do not know about is that the amount of caffeine present in Red Bull energy drinks is the same as the amount that is in one cup of coffee that people normally like to take.


Caffeine in every other beverage is really not good for the health. Every health expert knows that high consumption of caffeine can bring about high blood pressure, alleviate heart disease risk and even diabetes. That is, if you are one of those who are addicted or is used to taking any beverage high on caffeine more than the normal number of times.


But caffeine is also known for the benefits that it can bring to the body. Caffeine has the tendency to perk you up in times of weariness. It increases heart rate to give you that energy boost when you feel tired and drained already. These benefits are what the makers of Red Bull energy drink are focusing on.


This just shows that caffeine in Red Bull energy drinks, in other energy drinks and other types of beverage is one issue that can be subjected to debates based from those who have seen more of its positive or negative effects.


For those who are used to drinking Red Bull energy drinks, the only side effects that they have seen so far is the increased nervousness and anxiety. This is especially experienced by those whose body have gotten used to taking regular amounts of this energy drink.


It can be pointed out that this reaction is not only seen from those who are taking Red Bull energy drinks. Almost all people who are dependent on any kind of energy drink have been found to be experiencing the same things.


This is normal and to be expected from energy drinks. For that matter, any beverage that has caffeine content.


That is why it is important that you should know firsthand what your body can tolerate and what it cannot. Before taking on energy drinks, make sure that you are aware of the ingredients that is present in every can or bottle.


If you already have health problems, you first have to ask your doctor if it fine for you to take energy drinks. Experts advice are still the best advice of all.


Try drinking Red Bull energy drinks and see how your body reacts to its effect. If you feel any side effects after sometime, you can always choose to stop drinking Red Bull energy drinks and get another. The choice is up to you.


 



Recommended For You



Red and luscious cherries make tempting desserts. easy to prepare cherry spumoni can be a hit at parties reunions and backyard barbecues.


Red And Luscious Cherries Make Tempting Desserts. Easy-to-prepare Cherry Spumoni can be a hit at parties, reunions and backyard barbecues.


It's a great time to enjoy one of America's favorite fruits. Whether on their own, baked in a pie, mixed in yogurt parfaits or made into ice cream, cherries are popular with people young and old.


Red And Luscious Cherries Make Tempting Desserts. Easy-to-prepare Cherry Spumoni can be a hit at parties, reunions and backyard barbecues.


It's a great time to enjoy one of America's favorite fruits. Whether on their own, baked in a pie, mixed in yogurt parfaits or made into ice cream, cherries are popular with people young and old.

Tart cherries, the kind most famous in pies, are seldom sold fresh because they are highly perishable.

However, canned, frozen and dried tart cherries are available all year long at supermarkets and specialty food stores. Here are some quick and delicious ways to enjoy tart cherries:

• For an energy-packed treat on summer outings, combine dried tart cherries, chopped dates, semisweet chocolate chips and honey-roasted peanuts.

• Quench your summer thirst by combining 100 percent tart cherry juice, red grapefruit juice and lemon-lime carbonated beverage. Serve over ice.

• Add color and flavor to summer fruit salads with canned or frozen tart cherries. Peaches, kiwi fruit, watermelon, cantaloupe and cherries are a great combinatio

 



Recommended For You



Recycling to keep our planet healthy


Recycling To Keep Our Planet Healthy


We've all heard the warnings; acid rain, global warming, landfills without any room, and on and on. We don't recycle because it's the "in" thing to do; we recycle because we don't have any other options if we plan to leave the planet for generations to come.


When you think of recycling you should really think about the whole idea; reduce, reuse and recycle. Think about it; if you don't need it, don't get it. If you have to get it, get something that can be used again and if you get something that needs to be recycled by the professionals, put it in the recycle bin.


These are easy concepts and yet there are still people out there who ignore the signs. The signs aren't just the ones that bare the recycle logo, but the signs that the oceans are warming and the snow caps that were visible a few years ago are barely an outline as far up as you can see. If you've seen the Al Gore movie, An Inconvenient Truth, you'll know that those of us a few miles inland from the coast will be looking at water front property one day, without having to move.


We've been careless up to this point with the way we've treated the Earth and it's time to change; not just the way we do things but the way we think. The days of brushing your teeth with the water running the whole time are over and if we want to stay with this forward motion, we can't go back. We can't go back to the days when we believed we had all the room in the world for our trashed "stuff." We're getting full and we have to learn how to make less, use things more or find a way to reuse them again.


If you're traveling, use airlines that work with paperless ticketing (if you have to fly that is) and be sure to scope out hotels that are inline with the recycling idea. Bring your own soaps and shampoos; leave the little bottles provided by the hotel for people who forget to bring their own. Reuse your towels more than once and don't have the linens changed daily, let it go a day or two.


Before you leave for a trip remember to turn down your thermostadt and/or adjust the AC. Unplug your electronics from the wall to stop possible leaking wattage while it's turned off. Utilize some of the power strips for pulling items in and turn off the whole strip when you're leaving the house.


Use linen napkins that can be washed and reused instead of paper products, check your cleaning supplies for any that have the words dangerous, poisonous or hazardous and stop using them right now! The damage they are causing to the earth whether it's through direct contact or drainage from a landfill, these chemicals are not healthy and have no business in our soil and our drinking water.


Be mindful of what you do, pay attention to the items you buy and always check yourself to see if you really need it or if it comes in a package with less waste. We can all do our part and we will make a huge difference.


 



Recommended For You



Recycling on loon mountain


Recycling On Loon Mountain In New Hampshire


Loon Mountain is located in New Hampshire, right in the middle of the state and as a part of the White Mountains. If you know anything about New Hampshire, you'll know that some of the country's best winter sports take place in the White Mountains. When you think of skiing; recycling probably isn't your first visual, but Loon Mountain is looking to change that perception.


Loon Mountain has started a new way of doing things in regards to recycling and energy conservation that should not go unnoticed and will hopefully pave the way for other resorts, all over the world, to follow.


When you think of New Hampshire, the White Mountains, or even the northeastern area of the United States and you picture the area during the winter time, you probably have visions of yummy hot cocoa with tiny marshmellows, hats, mittens and scarves covering as much of a person from Old Mr. Frost, a roaring fire and a foot and a half of snow. Most of that image is accurate, except, unfortunately, for the snow part. For more than a decade or so the northeast region has not been able to enjoy Mother Nature's usual assault of blizzard upon blizzard, resulting in a sno-globe fantasy of winter sports. While there is still an occassional blizzard, and a lot of the White Mountain Resorts are blessed with a foot or so of base snow, it just isn't like the winters of our grandparent's generation. What used to fall from the sky without hesitation or exception, for the most part, today, must be manufactured.


While most resorts have to run their snow-making machines there have been advances made in their production to further help with recycling in mind and using energy saving principles. Loon turned to a new idea in snow-making guns where the gun generates its own compressed air, thereby saving on the energy used to have a compressed air hose as a separate unit. At one place they have combined one "disconnect" between two of their popular slopes; Little Sister Trail and Loon Mountain Park and will be able to service both trails with the same snow-making apparatus.


Other efforts toward recycling include changing their light bulbs over to compact fluorescent alternatives, which are said to use 75% less energy and last ten times longer than the average light bulb. Bathrooms now have motion sensors for the lights and fans, so energy is not being used when no one is in the room. new windows and doors have been put in to replace older models that allowed for heat to leak out and the cold northeastern wind to come in.


Let's take the lead that resorts in New Hampshire have provided and make the changes necessary in our own homes this winter, in the name of recycling and energy-saving efforts. By following the lead set by resorts like the ones on Loon Mountain, you can bet that more resorts will fall in behind, and utilize all of the resources they have in the effort to recycle.


 



Recommended For You



Recumbent stationary bikes


Recumbent Stationary Bikes


The world of stationary bikes and exercise equipment in general is on the verge of major revolution. This may be due in part to the overwhelming success of such interactive video games as Dance Dance Revolution. An orthopedic surgeon from Denver, Ted Parks, devised Gamebike to use with the Sony Playstation console. The players actually pedal to play the games in the same way that Dance Dance Revolution players must dance on a dance pad to interactively play those games.

XM...


recumbent stationary bikes reviews


The world of stationary bikes and exercise equipment in general is on the verge of major revolution. This may be due in part to the overwhelming success of such interactive video games as Dance Dance Revolution. An orthopedic surgeon from Denver, Ted Parks, devised Gamebike to use with the Sony Playstation console. The players actually pedal to play the games in the same way that Dance Dance Revolution players must dance on a dance pad to interactively play those games.

XMAT produces a recumbent bike that can be used with many different home video game consoles. It is not interactive but instead provides the power for the gaming. It requires the gamer to exercise in order to play those hours of video games. While price point is a bit high at nearly $350 the average exercise equipment will set you back plenty too and wont provide built in incentive.

There are more elaborate versions of the same concept. Stationary bikes that have lengthy scenerios which have corresponding changes in pedaling tension for

 



Get The Best Diet Program For Lose Weight.



Recommended For You



Recumbent exercise bikes advantages


Recumbent Exercise Bikes - Advantages


1181


There are so many exercise bikes available that it's easy to be overwhelmed. Spinning bikes, stationary bikes, dual action bikes, and recumbent bikes are probably some of the terms you've heard. It's almost as though you have to be a fitness equipment engineer to understand the differences! Here's a quick summary of these confusing terms.


recumbent exercise bikes, stationary exercise bikes, exercise bikes


There are so many exercise bikes available that it's easy to be overwhelmed. Spinning bikes, stationary bikes, dual action bikes, and recumbent bikes are probably some of the terms you've heard. It's almost as though you have to be a fitness equipment engineer to understand the differences! Here's a quick summary of these confusing terms.

Spinning Bikes

You've probably heard about the spin craze that has become so popular in health clubs. Spinning bikes usually have at least a front wheel that spins (which is why they are so brilliantly named spinning bikes). These bikes might be the current fad, but they aren't very comfortable. The seats are small and hard. The classes make these boring bikes more interesting, but as home exercise bikes, they quickly become tedious.

Stationary Bikes

Stationary bikes (or upright bikes) are the exercise bikes that most people can identify. It's the same basic model as in the 1980's. Once again, it's fairly uncomfortable. You can't really do anything like read

 



Recommended For You



Recruiting software vs crm customer relationship management


Recruiting Software VS CRM (Customer Relationship Management)


Recruiting software and CRM are the same thing for recruitment firms


recruiting software, staffing software. executive search software, applicant tracking, recruitment, resume database software


What is CRM? If I buy crm software will I be a better recruiter?
Should recruiting software have CRM features? Do recruiting software vendors include CRM in their product?

I think CRM is a lot of smoke created by some very good marketing people who could sell ice to Eskimos.

A common definition for CRM is The process of using information to find, secure and keep customers. The people, events, and questions associated with marketing, sales, and service. Yikes! I thought that is what recruiting is?

Why am I on such a soap box? Because I talk to about 50 different recruiters and recruitment firm owners a week and every once in a while I get asked does this software contain CRM. A few years back when the question was asked I was at a loss for words. I had no idea what they were talking about. I was terribly concerned that after 25 years in the recruiting industry putting in 10 hours a day seven days a week I had completely missed s

 



Recommended For You



Recruiting on the internet and the future of recruiting software


Recruiting on the Internet and the future of recruiting software


Recruiting has changed significantly in the last 25 years. The primary vehicle of change has been the Internet. Other driving factors are business changes and technological changes not necessarily related to the Internet. I also think we have a different type of recruiter than we did even 10 years ago.


recruiting software, staffing software. executive search software, applicant tracking, recruitment, resume database software


Recruiting has changed significantly in the last 25 years. The primary vehicle of change has been the Internet. Other driving factors are business changes and technological changes not necessarily related to the Internet. I also think we have a different type of recruiter than we did even 10 years ago.

In todays world it is all about speed and how quickly a company can adapt to change. The professionals sought by successful businesses need to be found quickly and they need to be productive almost overnight. This adaptation to almost instant productivity expected of a new employee requires a high degree of specialization to a very specific area of expertise. Therefore, the recruiter needs a very fast way of finding professionals with the exact type of skills. It wasnt too long ago when an employer just needed an accountant with experience in the retail industry.

Today the employer needs an accountant with retail experience, plus experience in foreign markets, exchange rates, tariffs and knowl

 



Recommended For You



Recruit and develop your own pay on results sales force


Recruit And Develop Your Own Pay On Results Sales Force


If you have created a great product that you know could be a blockbuster hit, but lack the talent, experience or time to get it into the public eye for maximum sales, it might be time to enlist some support.


Fortunately, there is an army of professional internet sales experts ready to help you out and to peddle your product to thousands of potential customers.


To make matters even more enticing, these marketing pros wont require you to make any out-of-pocket expend...


internet marketing UK, Diane Corriette, make money online, internet based business, women online


If you have created a great product that you know could be a blockbuster hit, but lack the talent, experience or time to get it into the public eye for maximum sales, it might be time to enlist some support.


Fortunately, there is an army of professional internet sales experts ready to help you out and to peddle your product to thousands of potential customers.


To make matters even more enticing, these marketing pros wont require you to make any out-of-pocket expenditure. They will work on commission, giving them an added incentive to sell your product as fast and furiously as possible. We are talking about affiliate sales, of course.


The affiliate marketing strategy, in its most simplified form consists of a vendor (in this case you), affiliates (the person selling your product on a commission basis), and the customers (provided by the affiliates). Its a fairly easy model to understand and one that produces some amazing results.


What do you need to recruit affiliates?


One of the best strategies is to open a vendors account at Clickbank, Payloadz, Paydotcom or some other affiliate program management site.


You will usually have to pay a nominal fee, and in return, you will be able to list your product, along with a sales page and a thank you page. After approval (and sometimes at least one sale) your product will be available for any of the thousands of Clickbank members to promote.


There are a few tricks to making it work.


You need to have a great sales page, a solid product and most importantly you need to offer a healthy commission.


It might make you wince to offer half or more of every sale to your affiliates, but it is that income opportunity that motivates them to promote your product.


In most cases, the net financial gain after consideration of registration and commission payments outstrips what you might have been able to make selling your product without affiliate assistance.


Plus you are looking at the long-term. Each new customer your affiliate brings in will be worth a lot of money to your business as your cross-sell, upsell, backend sell and more!


Using systems like Clickbank save you having to manage paying your affiliates but you may decide that you would rather manage the whole system yourself.


Operating your own affiliate program may be a desirable solution for experienced marketers, but Clickbank and similar sites work well for most marketers.


If you have a product to sell and want to see it hit it big, consider implementing an affiliate marketing strategy.


The commissioned sales team can find you a steady stream of paying customers for your new product.


 



Recommended For You



Recreational vs educational after school activities


Recreational vs Educational After School Activities


So, your child is beginning to get restless and make you restless. He has got more time than is good for him, and you are now considering after school programs - anything that will keep him busy for a few life-saving hours! Most after school activities can be broadly classified into three - recreational, educational and society-oriented. The last bit usually comes in when your child is already a bit grown up and can voice his own interests.


after school, after school activity, teen activity,educational activity


So, your child is beginning to get restless and make you restless. He has got more time than is good for him, and you are now considering after school programs - anything that will keep him busy for a few life-saving hours! Most after school activities can be broadly classified into three - recreational, educational and society-oriented. The last bit usually comes in when your child is already a bit grown up and can voice his own interests.


Educational activities aim at furthering the knowledge of your child. His general awareness, his understanding and his memory are targeted and he is given various techniques that will help him improve one or all of these. Programs such as intensive memory training and speed mathematics are educational after school activities. There are academic programs that will go over your child's homework and class work and help the child gain more in-depth knowledge in the various subjects. Thus academic programs have a definite edge over the fun and games, especially if parents feel that their child has a lot of catching up to do.


Recreational activities include sports and games, fine arts, painting etc. The main thrust here is to have fun. Of course, classes become more competitive as the child climbs up the ladder. Many sport events, competitions, stage performances etc are held to encourage the child.


When we compare the merits of the two kinds of activities, I believe that the recreational programs have more meat. Firstly, children do not enjoy learning unless they themselves feel curious about something. Most academic programs are standardized courses that are not too flexible. They have a general purpose and a well laid out methodology. After a number of hours at school, the child may feel bored. Further study may overwhelm him and make him feel frustrated. Burnout is very much a possibility here.


Recreational programs provide a welcome break from the monotony of learning and studies. The mental challenge and the physical exertion make the child feel a renewed zest and a pleasant sense of fulfillment. Group activity teaches him social skills, discipline and patience. It is a proven fact that children involved in extra curricular activities get better grades than others. Sometimes closing the textbooks and playing a game may be the best way to handle your studies.


Whatever program you choose for your child, regular evaluation is the key to success. You will have to measure the child's progress. If progress is unsatisfactory, shift your child out of the program. The child should also have the freedom to reject an activity if and when he feels bored with it. Generally, programs that combine the educational with the recreational are best suited especially for younger children. This way, children can have fun while they learn.


 



Recommended For You



Recreational shooting


Recreational Shooting


While most people would think that hunting is only for serious sportsmen, recreational shooting should change their minds. Recreational shooting includes the sport of trap and skeet shooting as well as the popular paint ball and air gun variations. Sling shot shooting is also part of this category along with soft air gun shooting.


Trap and skeet shooting is the sport of shooting clay targets by using a shotgun. These clay targets are called clay pigeons and are released i...


hunting sales, hunting gear online code, hunting coupon, hunting buy, hunting discount, hunting sale


While most people would think that hunting is only for serious sportsmen, recreational shooting should change their minds. Recreational shooting includes the sport of trap and skeet shooting as well as the popular paint ball and air gun variations. Sling shot shooting is also part of this category along with soft air gun shooting.


Trap and skeet shooting is the sport of shooting clay targets by using a shotgun. These clay targets are called clay pigeons and are released into the air at high speeds. Originally using live pigeons, this sport changed the targets to clay discs for a more reliable and humane target. Trap and skeet shooting equipment, include, aside from a high quality shotgun, target throwers, clay targets or discs and of course, shotgun ammunition.


Paintball shooting or simply known as paintball is a recreational shooting sport where competitors try to eliminate each other from the playing field by shooting each other with paint filled gelatin capsules. Using a compressed gas-powered gun or known to paintball enthusiasts as a marker, these paint-filled balls are shot at opponents at an estimated velocity of 300 feet per second, as per safety standards. Paintball hits are painful at any velocity or distance, hence the implementation of safety rules and gear. One safety precaution is in the mandated use of a paintball mask and goggle system. These safety accessories are usually sold as a set and may go for $24.99 to $69.99. Other equipment required for this sport include the marker and the paintballs. Markers sell for somewhere between $99.99 to $299.99, depending on the brand. Paintballs are sold at prices that range from $11.99 to 34.99, depending on the number of balls in the package.


Air guns are pneumatic guns which use compressed air to propel a projectile through the air. Air guns, more popularly known as BB guns, come in rifle configurations. These air rifles come in calibers that include .177 inch or 4.5mm, .20 inch or 5.0 mm, .22 inch or 5.5mm and .25 inch or 6.35 mm. Rifles for this sport usually come in the price brackets of $29.99 for the least expensive model to the top of the line cost of $479.99. Accessories for air guns or air rifles are gun scopes, shooting glasses and of course, ammunition pellets available according to the gun's caliber designation.


Soft air guns are a tamer and softer shooting version of the air rifles. Airsoft, as it is more popularly called, is usually used in war simulation tactical games or war games. As with paintball, airsoft games require a certain amount of protective gear to minimize injury. Impact-rated goggles are a must for this sport and the goggles usually used for paintball is often used here as well. Soft air guns can also be used alone with stationary targets.


Slingshots have come a long way from the old wooden prong and rubber band attachment used to launch stones and other projectiles. The modern slingshot is now composed of a steel prong with a molded plastic handle. While still using the basic principle of the old slingshot, modern sling shots offer a more accurate and controlled shot. These are also sold with their own glass ammo.


 



Recommended For You



Recreation with online backgammon


Recreation with online backgammon


Backgammon is a fun game that takes two persons to play it. Its a board game that combines concentration and focus. It is somehow like chess. The basic principle is that you alternatively move the pieces on the squares of the board and try to get them from one part of it to the other.


online backgammon,backgammon for money,backgammon,money,game,games,play games,play online,fun,enjoy


Backgammon is a fun game that takes two persons to play it. Its a board game that combines concentration and focus. It is somehow like chess. The basic principle is that you alternatively move the pieces on the squares of the board and try to get them from one part of it to the other. Each player has a color and he has to take into consideration when he makes the moves. The first one that gets all his pieces from one part of the board to the other and aligns them is the winner. These rules make online backgammon a very simple game that doesnt involve as much thinking or strategizing like chess does. It is accessible to both children (who can learn from it) and to experts who play backgammon for money.

Online backgammon is one of the best ways to play this game for a number of different reasons. All you have to do is access any search engine on the Internet and search for sites which allow you to play backgammon. Online backgammon is

 



Recommended For You



Recreation sports collecting


For Recreation, Sports Collecting is a Great Hobby

In this fast-paced, stressful age we live in, everyone needs a little recreation. Sports collecting is a hobby that can fill your spare minutes with interest and offer a diversion to the everyday grind. Sports collecting takes many forms depending on the person who is pursuing the hobby. Many people choose to collect memorabilia from their favorite professional teams, but others collect items related to golf, fishing, and other recreation sports. Collecting requires a certain amount of space, but collectors are creative about finding ways to display their collectibles.

If you have a favorite pro team or two there are many items you can collect related to those teams. For instance, you can create scrapbooks in which you save clippings about exciting games, favorite players, and special interviews. You can keep ticket stubs and photographs in your scrapbook, too. Other items, however, won't fit into a scrapbook, such as a game ball, team jersey, or

 



Download 16,000 WoodWorking Plans



Recommended For You



Recovery from pc failure using windows xp s restore point


Recovery From PC Failure Using Windows XP's Restore Point


Have you ever done something to make an improvement and later regretted it?It would be awesome to be able to go back in time and undo the the thing that were supposed to make an improvement.


While life in general will not allow us to return to an earlier time to make changes, we computer users do have such an option should we experience problems with our Windows XP operating systems.


If you update or install the wrong device driver for your video card, and you delete ac...


computer,internet,software,technology,electronics,repair


Have you ever done something to make an improvement and later regretted it?It would be awesome to be able to go back in time and undo the the thing that were supposed to make an improvement.


While life in general will not allow us to return to an earlier time to make changes, we computer users do have such an option should we experience problems with our Windows XP operating systems.


If you update or install the wrong device driver for your video card, and you delete accidentally delete a critical Windows file, so what.


You can simply use Windows XP's Restore Point feature and, Tada, you're back on track and recovered that deleted file.


Restore Points are snapshots of the state your operating system was in during that time.Windows XP automatically creates a restore point when it senses a major change in your operating system.And Restore Points are created every 24 hours as a safety measure.But you can create a Restore Point manually any time you feel there is a need.


If you have a change of some sort that causes problems with the operating system, you can tell Windows XP to revert to any Restore Point established before the problem occured.After the rollback, every change in the operating system that happened after that Restore Point is eliminated.


Restore Points are generally used when you experience such pc problems as extremely slow performance of the system. Your computer responds far more slowly that it did before you installed or updated something.


Other times to run Restore Point is when your system stops responding after an update or installation. Be sure to create a Restore Point before making any significant change to your computer's software or configuration.


To set a Restore Point, click on Start, point to All Programs, click on Accessories, System Tools, and then click on System Restore.When the System Restore windows appears, click on the button labeled "Create A Restore Point" and click Next.


Enter a description of the restore point, something like "Before scanner device driver install" and click the Create button.A notification will inform you that a Restore Point was made.Now click the Close button and you're all set.


Reverting to a Restore Point is as easy as create one.Click on Start, point to All Programs, click Accessories, System Tools, and System Restore.When the System Restore window appears, click on the "Restore My Computer To An Earlier Time" and then click on the Next button.


Choose the date on which you set the Restore Point and click the Next button.Review the information presented and save any open files.Shut down any other programs that may be running.


Click on the Next button and now your computer will restart. As it restarts, it will present a message informing you of the restore point. Click OK and you're done.


After reading all about setting and reverting to restore points, you should make a known restore point if you have not done so already.Whatever you do after reading this article, don't say I'll get to it soon.Familarize yourself with this feature and create a restore point one.


You should try Restore Point and see how it works before you need it.Create a Restore Point now and update something.You can update windows Media Player for example.


After the update or the installation of a program,wait a day or so and go back to Restore Point.Revert to the Restore Point you created and see if the old version of Windows Media Player comes back.Or see if that old device driver is present.


Doing a simple task like this can and will boost your computer skills and give you much more confidence in yourself and the Windows XP operating system.


 



Recommended For You



Recovery for your hard drive


Recovery For Your Hard Drive


These days, computers have become a must have for nearly everyone. Even though they are great to have around and make our lives easier, they are also known to crash as well. With computers being electronic, there really is no way to make them fool proof. The hard drives that hold all of the information have mechanical parts, which means that they can crash at any given time - resulting in a loss of information, and maybe even a ruined hard drive.


In general, hard drive recovery is the process you use to restore a hard drive that has crashed, been a victim of a virus, or possibly tampered with. Keep in mind that recovery isnt just limited to restoring everything on the hard drive, but it is also useful for finding lost files, fixing corrupt hard drives, and even locating data that you may have deleted by accident.


For many years, hard drive recovery has helped those with bad hard drives or lost information to retrieve their data. What many people arent aware of, in the event of data that has been deleted by accident, is the fact that some data will remain on your computer even after you may have removed it from the recycle bin. Windows doesnt always delete files completely, but more or less puts them to the side until it has the necessary data to overwrite the files.


If data was indeed gone forever, then it wouldnt be possible to recover. Most files, even after your hard drive crashes and the data appears to be gone, are still there on your hard drive. All it takes is someone experienced with data recovery to retrieve the information. Although data recovery is an exceptional way to retrieve lost data, there is also a downside to using it as well.


The real downside to data recovery is the fact that most information can be retrieved. If you have data on your hard drive that you dont want anyone to view, deleting it from your hard drive doesnt always get rid of it completely. Hackers can easily retrieve the data as well, if they are experienced enough. For this very reason, computer experts and avid computer geeks will tell you that erasing a file doesnt always remove it from your hard drive.


The way that hard drive recovery works is by reconstructing the lost data on your hard drive. It doesnt matter if your files were deleted by accident or the result of a crash, most data can be reconstructed and brought back to life so that you can access it. Although most crashes are due to the PC failing or a virus, there are some instances that are due to hardware failure, such as the actuator arm or platters not working properly. You wont be able to use the hard drive if this happens, although hard drive recovery can fix the problem.


No matter what type of problem you are experiencing with your hard drive, recovery can normally fix the problem. Whether it is hardware malfunction, crash, computer virus, or accidental deletion, you can normally almost always retrieve your files. Keep in mind that youll normally have to take your hard drive to a specialist, either locally or by mailing it to them. Computer technicians that are experienced with data recovery can bring back your files and make your hard drive appear to be new again. This way - the loss of data wont slow down your performance.


 



Recommended For You



Recovering internet explorer passwords theory and practice


Recovering Internet Explorer Passwords: Theory and Practice


5740


The article classifies types of private data stored in Internet Explorer, analyses Internet Explorer password recovery programs, and give us some examples of recovering lost Internet passwords.


internet, explorer, ie, internet explorer, password, recovery, change, find, forgot, remove, lost, software, reset, cracker, browser, asterisk, decrypt, site, web, stealer, cracker, viewer, reader, revealer, cached, best, free, reveal


Recovering Internet Explorer Passwords: Theory and Practice



  1. Introduction

  2. Types of passwords stored in Internet Explorer

  3. Internet Credentials

  4. AutoComplete data

  5. AutoComplete passwords

  6. FTP passwords

  7. Synchronization passwords

  8. Identities passwords

  9. AutoForms data

  10. Content Advisor password

  11. Brief overview of Internet Explorer password recovery programs

  12. PIEPR - the first acquaintance

  13. Three real-life examples

  14. Recovering current user's FTP passwords

  15. Recovering website passwords from unloadable operating system

  16. Recovering uncommonly stored passwords

  17. Conclusion



1. Introduction
Nobody will likely dispute the fact that Internet Explorer is today's most popular Web browser. According to the statistics, approximately 70% of online users prefer to use just this program. Arguments about its pros and cons may last forever; still, this browser is the leader of its industry, and this is a fact that requires no proof. Internet Explorer carries several built-in technologies, designed to make average user's life easier. One of them - IntelliSense - is made for taking care of the routine tasks, like the automatic completion of visited webpage addresses, automatic filling of form fields, users' passwords, etc.


Many of today's websites require registration, which means, user would have to enter user name and password. If you use more than a dozen of such websites, you will likely need a password manager. All modern browsers have a built-in password manager in their arsenal, and Internet Explorer is not an odd. Indeed, why would one have to remember yet another password if it is going to be forgotten some time soon anyway? Much easier would be to have browser do the routine work of remembering and storing passwords for you. It's convenient and comfortable.


This would be a totally perfect solution; however, if your Windows operating system crashed or reinstalled not the way it's supposed to be reinstalled, you can easily lose the entire list of your precious passwords. That's the toll for the comfort and convenience. It's good just about every website has a saving 'I forgot password' button. However, this button will not always take your headache from you.


Each software developer solves the forgotten password recovery problem their own way. Some of them officially recommend copying a couple of important files to another folder, while other send all registered users a special utility that allows managing the migration of private data, and the third ones pretend they are not seeing the problem. Nevertheless, the demand creates the offer, and password recovery programs are currently on a great demand.


In this article, let's try to classify types of private data stored in Internet Explorer, look at programs for the recovery of the data, and study real-life examples of recovering lost Internet passwords.



2. Types of passwords stored in Internet Explorer
- Internet Explorer may store the following types of passwords:
- Internet Credentials
- AutoComplete Data
- AutoComplete Passwords
- FTP Passwords
- Synchronization Passwords for cached websites
- Identities Passwords
- AutoForms Data
- Content Advisor Password
Let's take a closer look at each listed item.



2.1. Internet Credentials for websites
Internet credentials mean user's logins and passwords required for accessing certain websites, which are processed by the wininet.dll library. For example, when you try to enter the protected area of a website, you may see the following user name and password prompt (fig.1 ).


If the option 'Remember my password' is selected in that prompt, the user credentials will be saved to your local computer. The older versions of Windows 9a stored that data in user's PWL file; Windows 2000 and newer store it in the Protected Storage.


2.2. AutoComplete Data
AutoComplete data (passwords will be covered further) are also stored in the Protected Storage and appear as lists of HTML form field names and the corresponding user data. For example, if an HTML page contains an e-mail address entry dialog: once user has entered his e-mail address, the Protected Storage will have the HTML field name, the address value, and the time the record was last accessed.


The HTML page title and website address are not stored. Is that good or bad? It's difficult to determine; more likely to be good than bad. Here are the obvious pros: it saves free space and speeds up browser's performance. If you think the last note is insignificant, try to imagine how you would have to perform several extra checkups in a multi-thousand (this is not as rare as it may seem to be) auto-fill list.


Another obvious plus is that data for identical by name (and often by subject) HTML form fields will be stored in the same place, and the common data will be used for the automatic filling of such pages. We will see this by this example. If one HTML page contains an auto-fill field with the name 'email', and user entered his e-mail address in that field, IE will put in the storage, roughly, 'email=my@email.com'. From now on, if the user opens another website, which has a page with the same field name 'email', the user will be suggested to auto-fill it with the value that he entered on the first page (). Thus, the browser somewhat discovers AI capabilities within itself.


The major drawback of this data storage method comes out of its advantage that we just described. Imagine, user has entered auto-fill data on a webpage. If someone knows the HTML form field name, that person can create his own simplest HTML page with the same field name and open it from a local disk. To uncover the data entered in this field, such person will not even have to connect to the Internet and open the original WWW address.



2.3. AutoComplete Passwords
In the case with passwords data, however, as you might have guessed, the data will not be filled in automatically. Since auto-complete passwords are stored along with the Web page name, and each password is bound to only one specific HTML page.


In the new version, Internet Explorer 7, both AutoComplete passwords and data are encrypted completely different; the new encryption method is free from the shortcoming just described (if that can be classified as a shortcoming.)


It is worth noticing that Internet Explorer allows users to manage auto-fill parameters manually, through the options menu (fig.2 ).


2.4. FTP passwords
FTP site passwords are stored pretty much the same way. It would be relevant to notice that beginning with Windows XP FTP passwords are additionally encrypted with DPAPI. This encryption method uses logon password. Naturally, this makes it much more difficult to recover such lost passwords manually, since now one would need to have the user's Master Key, SID and the account password.


Starting with Microsoft Windows 2000, the operating system began to provide a Data Protection Application-Programming Interface (DPAPI) API. This is simply a pair of function calls that provide OS-level data protection services to user and system processes. By OS-level, we mean a service that is provided by the operating system itself and does not require any additional libraries. By data protection, we mean a service that provides confidentiality of data through encryption. Since the data protection is part of the OS, every application can now secure data without needing any specific cryptographic code other than the necessary function calls to DPAPI. These calls are two simple functions with various options to modify DPAPI behavior. Overall, DPAPI is a very easy-to-use service that will benefit developers that must provide protection for sensitive application data, such as passwords and private keys.
DPAPI is a password-based data protection service: it requires a password to provide protection. The drawback, of course, is that all protection provided by DPAPI rests on the password provided. This is offset by DPAPI using proven cryptographic routines, specifically the strong Triple-DES and AES algorithms, and strong keys, which we'll cover in more detail later. Since DPAPI is focused on providing protection for users and requires a password to provide this protection, it logically uses the user's logon password for protection.
DPAPI is not responsible for storing the confidential information it protects. It is only responsible for encrypting and decrypting data for programs that call it, such as Windows Credential manager, the Private Key storage mechanism, or any third-party programs.
Please refer to Microsoft Web site for more information.



2.5. Synchronization Passwords for cached websites
Synchronization passwords free user from having to enter passwords for cached websites (sites set to be available offline.) Passwords of this type are also stored in IE's Protected Storage.



2.6. Identities passwords
So are identities passwords. The identity-based access management mechanism is not widespread in Microsoft's products, except, perhaps, Outlook Express.


2.7. AutoForms Data
A special paragraph must cover the form auto-fill method, which constitutes a hybrid way of storing data. This method stores the actual data in the Protected Storage, and the URL, which the data belong to, is stored in user's registry. The URL written in the registry is stored not as plaintext - it is stored as hash. Here is the algorithm for reading form auto-fill data in IE 4 - 6:


===8<




//Get autoform password by given URL
BOOL CAutoformDecrypter::LoadPasswords(LPCTSTR cszUrl, CStringArray *saPasswords)
{
assert(cszUrl && saPasswords);


saPasswords->RemoveAll();


//Check if autoform passwords are present in registry
if ( EntryPresent(cszUrl) )
{
//Read PStore autoform passwords
return PStoreReadAutoformPasswords(cszUrl,saPasswords);
}


return FALSE;
}


//Check if autoform passwords are present
BOOL CAutoformDecrypter::EntryPresent(LPCTSTR cszUrl)
{
assert(cszUrl);


DWORD dwRet, dwValue, dwSize=sizeof(dwValue);
LPCTSTR cszHash=GetHash(cszUrl);


//problems computing the hash
if ( !cszHash )
return FALSE;


//Check the registry
dwRet=SHGetValue(HKCU,_T("Software\\Microsoft\\Internet Explorer\\IntelliForms\\SPW"),cszHash,NULL,&dwValue,&dwSize);
delete((LPTSTR)cszHash);


if ( dwRet==ERROR_SUCCESS )
return TRUE;


m_dwLastError=E_NOTFOUND;
return FALSE;
}


//retrieve hash by given URL text and translate it into hex format
LPCTSTR CAutoformDecrypter::GetHash(LPCTSTR cszUrl)
{
assert(cszUrl);


BYTE buf[0x10];
LPTSTR pRet=NULL;
int i;


if ( HashData(cszUrl,buf,sizeof(buf)) )
{
//Allocate some space
pRet=new TCHAR [sizeof(buf) * sizeof(TCHAR) + sizeof(TCHAR)];
if ( pRet)
{
for ( i=0; i<sizeof(buf); i++ )
{
// Translate it into human readable format
pRet[i]=(TCHAR) ((buf[i] & 0x3F) + 0x20);
}
pRet[i]=_T('\0');
}
else
m_dwLastError=E_OUTOFMEMORY;
}


return pRet;
}


//DoHash wrapper
BOOL CAutoformDecrypter::HashData(LPCTSTR cszData, LPBYTE pBuf,
DWORD dwBufSize)
{
assert(cszData && pBuf);


if ( !cszData || !pBuf )
{
m_dwLastError=E_ARG;
return FALSE;
}


DoHash((LPBYTE)cszData,strlen(cszData),pBuf,dwBufSize);
return TRUE;
}


void CAutoformDecrypter::DoHash(LPBYTE pData, DWORD dwDataSize,
LPBYTE pHash, DWORD dwHashSize)
{
DWORD dw=dwHashSize, dw2;


//pre-init loop
while ( dw-->0 )
pHash[dw]=(BYTE)dw;


//actual hashing stuff
while ( dwDataSize-->0 )
{
for ( dw=dwHashSize; dw-->0; )
{
//m_pPermTable = permutation table
pHash[dw]=m_pPermTable[pHash[dw]^pData[dwDataSize]];
}
}
}
===8<




 


The next, seventh generation of the browser, is most likely going to make this user's data storage mechanism its primary data storage method, declining the good old Protected Storage. Better to say, auto-fill data and passwords, from now on, are going to be stored here.


What is so special and interesting in this mechanism that made MS decide to use it as primary? Well, first of all, it was the encryption idea, which isn't new at all but still simple and genius, to disgrace. The idea is to quit storing encryption keys and generate them whenever that would be necessary. The raw material for such keys would be HTML page's Web address.


Let's see how this idea works in action. Here is IE7's simplified algorithm for saving auto-fill data and password fields:



  1. Save Web page's address. We will use this address as the encryption key (EncryptionKey).

  2. Obtain Record Key. RecordKey = SHA(EncryptionKey).

  3. Calculate checksum for RecordKey to ensure the integrity of the record key (the integrity of the actual data will be guaranteed by DPAPI.) RecordKeyCrc = CRC(RecordKey).

  4. Encrypt data (passwords) with the encryption key EncryptedData = DPAPI_Encrypt(Data, EncryptionKey).

  5. Save RecordKeyCrc + RecordKey + EncryptedData in the registry.

  6. Discard EncryptionKey.


It is very, very difficult to recover password without having the original Web page address. The decryption looks pretty much trivial:



  1. When the original Web page is open, we take its address (EncryptionKey) and obtain the record key RecordKey = SHA(EncryptionKey).

  2. Browse through the list of all record keys trying to locate the RecordKey.

  3. If the RecordKey is found, decrypt data stored along with this key using the EncryptionKey. Data = DPAPI_Decrypt(EncryptedData, EncryptionKey).


In spite of the seeming simplicity, this Web password encryption algorithm is one of today's strongest. However, it has a major drawback (or advantage, depending which way you look at it.) If you change or forget the original Web page address, it will be impossible to recover password for it.



2.8. Content Advisor password
And the last item on our list is Content Advisor password. Content Advisor was originally developed as a tool for restricting access to certain websites. However, for some reason it was unloved by many users (surely, you may disagree with this.) If you once turned Content Advisor on, entered a password and then forgot it, you will not be able to access the majority of websites on the Internet. Fortunately (or unfortunately), this can be easily fixed.


The actual Content Advisor password is not stored as plaintext. Instead, the system calculates its MD5 hash and stores it in Windows registry. On an attempt to access the restricted area, the password entered by user is also hashed, and the obtained hash is compared with the one stored in the registry. Take a look at PIEPR source code checking Content Advisor password:


===8<




void CContentAdvisorDlg::CheckPassword()
{
CRegistry registry;


//read the registry
registry.SetKey(HKLM, "SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\policies\\Ratings");


BYTE pKey[MD5_DIGESTSIZE], pCheck[MD5_DIGESTSIZE];
if ( !registry.GetBinaryData("Key",pKey,MD5_DIGESTSIZE) )
{
MessageBox(MB_ERR,"Can't read the password.");
return;
}


//Get one set by user
CString cs;
m_wndEditPassword.GetWindowText(cs);
MD5Init();
MD5Update((LPBYTE)(LPCTSTR)cs,cs.GetLength()+1);
MD5Final(pCheck);


//Check hashes
if ( memcmp(pKey,pCheck,MD5_DIGESTSIZE)==0 )
MessageBox(MB_OK,"The password is correct!");
else
MessageBox(MB_OK,"Wrong password.");
}
===8<




 


The first thing you may think about is to try to pick the password by using the brute force or dictionary attack. However, there is a more elegant way to that. You can simply remove the hash from the registry. That's it; so simple... Well, it's better to rename it instead, so that if you ever need it, you can restore it back. Some programs also let users check Content Advisor password, "drag out" password hint, toggle password on/off, etc.



3. Brief Overview of Internet Explorer Password Recovery Programs
It's worth noticing that not all password recovery programs suspect there are so many ways to recover passwords. Most likely, this is related to the fact that some passwords (e.g., synchronization passwords) are not often used in the real life, and FTP passwords are not so simple to be 'dragged out'. Here is a brief overview of the most popular commercial products for recovering passwords for the most popular browser on earth :)


Advanced Internet Explorer Password Recovery from the not unknown company, ElcomSoft - does not recognize AutoForm passwords and encrypted FTP passwords. Not to be excluded, the last version of the program may have learnt to do that. Simple, convenient user interface. The program can be upgraded online automatically.


Internet Explorer Key from PassWare - similarly, does not recognize certain types of passwords. Sometimes the program halts with a critical error when reading some uncommon types of IE's URLs. Displays first two characters of passwords being recovered. The advantages worth noticing are the Spartan user interface and operating convenience.


Internet Explorer Password from Thegrideon Software - not bad, but can recover just three types of Internet Explorer passwords (this is enough for the majority of cases.) Deals with FTP passwords properly. Version 1.1 has problems recovering AutoForm passwords. Has convenient user interface, which in some way reminds one from AIEPR. One can be totally overwhelmed with the beauty and helpfulness of the company's website.


Internet Password Recovery Toolbox from Rixler Software - offers some greater functionality than the previously covered competitors. It can recover encrypted FTP passwords and delete selected resources. However, it has some programming errors. For example, some types of IE records cannot be deleted. The program comes with a great, detailed help file.


ABF Password Recovery from ABF software - quite a good program with friendly user interface. The list of IE record types supported by the program is not long. Nevertheless, it deals with all of them properly. The program can be classified as a multi-functional one, since it can restore passwords for other programs also.


The major drawback of all programs named here is the capability to recover passwords only for user currently logged on.
     
As it was said above, the general body of stored Internet Explorer resources is kept in a special storage called Protected Storage. Protected Storage was developed specially for storing personal data. Therefore the functions for working with it (called PS API) are not documented. Protected Storage was first introduced with the release of the version 4 of Internet Explorer, which, by the way, unlike the third version, was written from scratch.


Protected Storage provides applications with an interface to store user data that must be kept secure or free from modification. Units of data stored are called Items. The structure and content of the stored data is opaque to the Protected Storage system. Access to Items is subject to confirmation according to a user-defined Security Style, which specifies what confirmation is required to access the data, such as whether a password is required. In addition, access to Items is subject to an Access rule set. There is an Access rule for each Access Mode: for example, read/write. Access rule sets are composed of Access Clauses. Typically at application setup time, a mechanism is provided to allow a new application to request from the user access to Items that may have been created previously by another application.
Items are uniquely identified by the combination of a Key, Type, Subtype, and Name. The Key is a constant that specifies whether the Item is global to this computer or associated only with this user. The Name is a string, generally chosen by the user. Type and Subtype are GUIDs, generally specified by the application. Additional information about Types and Subtypes is kept in the system registry and include attributes such as Display Name and UI hints. For Subtypes, the parent Type is fixed and included in the system registry as an attribute. The Type group Items is used for a common purpose: for example, Payment or Identification. The Subtype group Items share a common data format.

So, until very recent time, all programs for recovering Internet Explorer passwords used those undocumented API. That's the reason why one significant restriction was applied to the recovery work: PS API can only work with passwords for user that is currently logged on. When the system encrypts data stored in Protected Storage, besides everything else it uses user's SID, without which it is literally impossible (taking into account the current level of computers' calculating performance) to recover stored passwords.


Protected Storage uses a very well thought through data encryption method, which uses master keys and strong algorithms, such as des, sha, and shahmac. Similar data encryption methods are now used in the majority of modern browsers; e.g. in Opera or FireFox. Microsoft, meanwhile, quietly but surely develops and tests new ones. When this article is written, in the pre-Beta version of Internet Explorer 7 Protected Storage was only used for storing FTP passwords.


The analysis of this preliminary version suggests that Microsoft is preparing another 'surprise' in the form of new, interesting encryption algorithms. It is not known for sure, but most likely the new company's data protection technology InfoCard will be involved in the encryption of private data.


Thus, with a great deal of confidence one can assert that with the release of Windows Vista and the 7th version of Internet Explorer passwords will be stored and encrypted with fundamentally new algorithms, and the Protected Storage interface, to all appearances, will become open for third-party developers.


It is somewhat sad, for we think the true potential of Protected Storage was still not uncovered. And this is why we think so:
- First, Protected Storage is based on module structure, which allows plugging other storage providers to it. However, for the last 10 years while Protected Storage exists, not a single new storage provider was created. System Protected Storage is the only storage provider in the operating system, which is used by default.
- Second, Protected Storage has its own, built-in access management system, which, for some reason, is not used in Internet Explorer or in other MS products.
- Third, it is not very clear why MS have decided to decline Protected Storage in storing AutoComplete data and passwords. Decline it as a tried and true data storage, and not data encryption mechanism. It would be more logically proven to keep Protected Storage at least for storing data when implementing a new encryption algorithm. Without fail, there were weighty reasons for that. Therefore, it would be interesting to hear the opinion of MS specialists concerning this subject matter.


4. PIEPR - the First Acquaintance
Passcape Internet Explorer Password Recovery was developed specifically to bypass the PS API's restriction and make it possible to recover passwords directly, from the registry's binary files. Besides, it has a number of additional features for advanced users.


The program's wizard allows you to choose one of several operating modes:
- Automatic: Current user's passwords will be recovered by accessing the closed PS API interface. All current user's passwords currently stored in Internet Explorer will be recovered with a single click of the mouse.
- Manual: Passwords will be recovered without PS API. This method's main advantage is the capability to recover passwords from your old Windows account. For that purpose, you will need to enter path to the user's registry file. Registry files are normally not available for reading; however, the technology used in PIEPR allows doing that (provided you have the local administrative rights.)


User's registry file name is ntuser.dat; its resides in the user's profile, which is normally %SYSTEMDRIVE%:\Documents and Settings\%USERNAME%, where %SYSTEMDRIVE% stands for the system disk with the operating system, and %USERNAME% is normally account name. For instance, path to registry file may look like this: C:\Documents and Settings\John\ntuser.dat


If you have ever been a happy owner of Windows 9x/ME, after you upgrade your operating system to Windows NT, Protected Storage will providently save a copy of your old private data. As a result of that, Protected Storage may contain several user identifiers, so PIEPR will ask you to select the right one before it gets to the decryption of the data (fig.3 ).


One of the listed SIDs will contain data left by the old Windows 9x/ME. That data is additionally encrypted with user's logon password, and PIEPR currently does not support the decryption of such data.


If ntuser.dat contains encrypted passwords (e.g., FTP sites passwords), the program will need additional information in order to decrypt them (fig.4 ):
- Logon password of user whose data are to be decrypted
- Full path to the user's MasterKey
- User's SID


Normally, the program finds the last two items in user's profile and fills that data automatically. However, if ntuser.dat was copied from another operating system, you will have to take care of that on your own. The easiest way to get the job done is to copy the entire folder with user's Master Key (there may be several of them) to the folder with ntuser.dat. Master Key resides in the following folder on your local computer: %SYSTEMDRIVE%:\Documents and Settings\%USERNAME%\Application Data\Microsoft\Protect\%UserSid%, where %SYSTEMDRIVE% stands for the system disk with the operating system, %USERNAME% - account name, %UserSid% - user's SID. For example, path to the folder with a master key may look as follows: C:\Documents and Settings\John\Application Data\Microsoft\Protect\S-1-5-21-1587165142-6173081522-185545743-1003. Let's make it clear that it is recommended to copy the entire folder S-1-5-21-1587165142-6173081522-185545743-1003, for it may contain several Master Keys. Then PIEPR will select the righ

Windows marks some folders as hidden or system, so they are invisible in Windows Explorer. To make them visible, enable showing hidden and system objects in the view settings or use an alternative file manager.


Once the folder with user's Master Key was copied to the folder with ntuser.dat, PIEPR will automatically find the required data, so you will only have to enter user's password for recovering FTP passwords.


Content Advisor
Content Advisor passwords, as it was said already, is not kept as plain text; instead, it is stored as hash. In the Content Advisor password management dialog, it is enough to just delete (you can restore the deleted password at any time later) or change this hash to unlock sites locked with Content Advisor. PIEPR will also display your password hint if there is one.


Asterisks passwords
PIEPR's fourth operating mode, which allows recovering Internet Explorer passwords hidden behind asterisks. To recover such password, simply drag the magnifier to the window with a **** password. This tool allows recovering passwords for other programs that use IE Frames as well; e.g., Windows Explorer, some IE-based browsers, etc.


We have reviewed the basic Internet Explorer password recovery modes. There is also a number of additional features for viewing and editing cookies, cache, visited pages history, etc. We are not going to cover them in detail; instead, we are going to look at a few password recovery examples done with PIEPR.



5.1. Three Real-Life Examples.
Example 1: Recovering current user's FTP password
When opening an FTP site, Internet Explorer pops up the log on dialog (fig.5 ).


If you have opened this site and set the 'Save password' option in the authentication dialog, the password must be saved in Protected Storage, so recovering it is a pretty trivial job. Select the automatic operating mode in PIEPR and then click 'Next'. Locate our resource in the dialog with decrypted passwords that appears (the site name must appear in the Resource Name column.)


As we see, the decryption of current user's password should not cause any special difficulties. Oh, if the password is not found for some reason - don't forget to check IE's Auto-Complete Settings. Possibly, you have simply not set the program to save passwords.



5.2. Three Real-Life Examples.
Example 2: We will need to recover Web site passwords. The operating system is unbootable.
This is a typical, but not fatal situation. The necessity to recover Internet Explorer passwords after unsuccessful Windows reinstallation occurs just as often.


In either case, we will have user's old profile with all files within it. This set is normally enough to get the job done. In the case with the reinstallation, Windows providently saves the old profile under a different name. For example, if your account name was John, after renaming it may look like John.WORK-72C39A18.


The first and the foremost what you must do is to gain access to files in the old profile. There are two ways to doing this:
- Install a new operating system on a different hard drive; e.g., Windows XP, and hook the old hard drive to it.
- Create a Windows NT boot disk. There are many different utilities for creating boot disks and USB flash disks available online. For instance, you can use WinPE or BartPE. Or a different one. If your old profile was stored on an NTFS part of your hard drive, the boot disk will have to support NTFS.


Let's take the first route. Once we gain access to the old profile, we will need to let the system show hidden and system files. Otherwise, the files we need will be invisible. Open Control Panel, then click on Folder Options, and then select the View tab. On this tab, find the option 'Show hidden files and folders' and select it. Clear the option 'Hide protected operating system files'. When the necessary passwords are recovered, it's better to reset these options to the way they were set before.


Open the program's wizard in the manual mode and enter path to the old profile's registry file. In our case, that is C:\Documents And Settings\ John.WORK-72C39A18\ntuser.dat. Where John.WORK-72C39A18 is the old account name. Click 'Next'.


This data should normally be sufficient for recovering Internet Explorer passwords. However, if there is at least a single encrypted FTP password, the program will request additional data, without which it will not be able to recover such types of passwords:
- User's password
- User's Master Key
- User's SID.
Normally, the program finds the last two items in user's profile and fills that data automatically. However, if that didn't happen, you can do that by hand: copy ntuser.dat and the folder with the Master Key to a separate folder. It is important to copy the entire folder, for it may contain several keys, and the program will select the right one automatically. Then enter path to file ntuser.dat that you have copied to another folder.


That's it. Now we need to enter the old account password, and the recovery will be completed. If you don't care for FTP password, you can skip the user's password, Master Key, and SID entry dialog.



5.3. Three Real-Life Examples.
Example 3: Recovering uncommonly stored passwords.
When we sometimes open a website in the browser, the authentication dialog appears. However, PIEPR fails to recover it in either automatic or manual mode. The 'Save password' option in Internet Explorer is enabled. We will need to recover this password.


Indeed, some websites don't let browser to save passwords in the auto-complete passwords list. Often, such websites are written in JAVA or they use alternative password storage methods; e.g., they store passwords in cookies. A cookie is a small bit of text that accompanies requests and pages as they go between the Web server and browser. The cookie contains information the Web application can read whenever the user visits the site. Cookies provide a useful means in Web applications to store user-specific information. For example, when a user visits your site, you can use cookies to store user preferences or other information. When the user visits your Web site another time, the application can retrieve the information it stored earlier. Cookies are used for all sorts of purposes, all relating to helping the Web site remember you. In essence, cookies help Web sites store information about visitors. A cookie also acts as a kind of calling ca

If the password field is filled with asterisks, the solution is clear: select the ASTERISKS PASSWORDS operating mode and then open the magic magnifier dialog. Then simply drag the magnifier to the Internet Explorer window (fig.6 ).

The password (passwords, if the Internet Explorer window has several fields with asterisks) is to appear in the PIEPR window (fig.7 ).


But it's not always that simple. The password field may be empty or that field may indeed contain




 


We can suppose, the password is stored in cookies. Let's try to locate it. Choose the IE Cookie Explorer tool (fig.8 ).

The dialog that appears will list the websites that store cookies on your computer. Click on the URL column header to order the websites list alphabetically. This will help us find the right website easier. Go through the list of websites and select the one we need. The list below will display the decrypted cookies for this website (fig.9 ).


As the figure shows, in our case the login and password are not encrypted and are stored as plain text.


Cookies are often encrypted. In this case, you are not likely to succeed recovering the password. The only thing you can try doing in order to recover the old account is to create a new account. Then you will be able to copy the old cookies in a text editor and replace them with the new ones. However, this is only good when the worst comes to the worst; it is not recommended to use it normally.


Don't forget also that just about all pages and forms with passwords have the 'Forgot password' button.



Conclusion
As this article shows, recovering Internet Explorer passwords is a pretty simple job, which does not require any special knowledge or skills. However, despite of the seeming simplicity, password encryption schemes and algorithms are very well thought through and just as well implemented. Although the Protected Storage concept is over 10 years of age, don't forget that it has proven the very best recommendations of the experts and has been implemented through three generations of this popular browser.


With the release of the next, 7th version of IE, Microsoft is preparing fundamentally new schemes for protecting our private data, where it uses improved encryption algorithms and eliminates shortages peculiar to Protected Storage.


In particular, the analysis of the preliminary beta versions of Internet Explorer 7 has revealed that autoform password encryption keys are no longer stored along with data. They are not stored, period! This is a little know-how, which is to be estimated at its true worth by both professionals and end users, who, finally, will benefits of it anyway.


But the main thing is, the release of the new concept will eliminate the major drawback peculiar to Protected Storage, which is the possibility to recover passwords without knowing the additional information. Better to say, was enough for a potential hacker to gain physical access to the contents of a hard drive, in order to steal or damage passwords and user's other private data. With the release of Internet Explorer 7, the situation will somewhat change.


Meanwhile, we will only have to wait impatiently for the advent of Windows Vista and IE 7 to take a closer look at new encryption mechanisms used in the next generation of this popular browser.


 


This document may be freely distributed or reproduced provided that the
reference to the original article is placed on each copy of this document.
(c) 2006 Passcape Software. All rights reserved.


 



Recommended For You