Wednesday 30 January 2013

0 Latest Fashion Trends - Saree in 2050


Tuesday 29 January 2013

0 Chat with friends through MS DOS (command prompt)

1)      All you need is your friend's IP Address and your Command Prompt.

2) Open Notepad and write this code as it is.....!

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A
3) Now save this as "Messenger.Bat".

4) Open Command Prompt.

5) Drag this file (.bat file) over to Command Prompt and press Enter.

6) You would then see something like this:








7) Now, type the IP Address of the computer you want to contact and press enter
You will see something like this:








That's all, Just enter your message and start a Chat.

0 Jonathan James - World Famous Black Hats Hacker

Jonathan Joseph James (December 12, 1983 – May 18, 2008), was an American hacker who was the first juvenile incarcerated for cybercrime in the United States.[1] The South Florida native was 15 years old at the time of the first offense and 16 years old on the date of his sentencing. He died on May 18, 2008, of a self-inflicted gunshot wound.
Initial Department of Defense intrusion

Between August 23, 1999, and October 27, 1999, James committed a series of intrusions into various systems, including those of BellSouth and the Miami-Dade school system.[4] What brought him to the attention of federal authorities, however, was his intrusion into the computers of the Defense Threat Reduction Agency, a division of the United States Department of Defense, the primary function of which is to analyze potential threats to the United States of America, both at home and abroad. James later admitted to authorities that he had installed an unauthorized backdoor in a computer server in Dulles, Virginia, which he used to install a sniffer that allowed him to intercept over three thousand messages passing to and from DTRA employees, along with numerous usernames and passwords of other DTRA employees, including at least 10 on official military computers.[1]

It was later revealed that the precise software obtained was the International Space Station's source code controlling critical life-sustaining elements. According to NASA, "the software supported the International Space Station's physical environment, including control of the temperature and humidity within the living space."[5] This intrusion, when detected, caused NASA to shut down its computers for three weeks that July, costing $41,000 to check and fix its systems.[6]
Arrest, conviction and sentencing

James's house was raided at approximately 6:00AM on January 26, 2000, by agents from the Department of Defense, NASA and local police. James was formally indicted six months later. On September 21, 2000, he entered into an agreement with U.S. Attorney Guy Lewis: he would plead guilty to two counts of juvenile delinquency in exchange for a lenient sentence.[1]

James was sentenced to six months house arrest and probation until the age of eighteen, and was required to write letters of apology to NASA and the Department of Defense. He was also banned from using computers for recreational purposes.[7] James later violated that probation when he tested positive for drug use and was then subsequently taken into custody by the United States Marshals Service and flown to an Alabama federal correctional facility where he ultimately served six months.[3]

Legal experts have suggested that, given the extent of his intrusions, he could have served at least ten years for his crimes if he had been an adult. Both Attorney General Janet Reno and prosecuting attorney Guy Lewis issued statements claiming the James case was proof the Justice Department was willing to get tough with juvenile offenders accused of cybercrime.[8]
Death

In 2007, department store chain TJX was the victim of a massive computer systems intrusion that compromised the personal and credit information of millions of customers. The same ring of hackers also committed intrustions on BJ's Wholesale Club, Boston Market, Barnes & Noble, Sports Authority, Forever 21, DSW, OfficeMax, and Dave & Buster's, and reportedly made a millionaire out of the group's ringleader, Albert Gonzalez. Though he denied having done anything, James—who was friends with some of the hackers involved—was investigated by the Secret Service, who raided James', his brother's, and his girlfriend's houses. Although they apparently discovered no connection to the intrusion, they did discover a legally registered firearm, which they did not take, and notes indicating he had considered killing himself; James' father would later say that his son had been prone to depression. The criminal complaint filed against the TJX hackers mention an additional, unnamed conspirator who was not indicted, who is identified only by the initials "J.J.". In 2004, this co-conspirator assisted one of the hackers in stealing credit card numbers, account numbers, and encrypted PINs from an OfficeMax store via Wi-Fi. These numbers were later allegedly provided to Albert Gonzalez, for whom "J.J." also opened a mail drop. James' father believes "J.J." to have been his son.[3] However, it is plausible that the initials "J.J." may in fact have been referring to "Jim Jones", a (hacker) alias believed to be used by Stephen Watt who was a close friend of computer hacker and criminal Albert Gonzalez.[9]

On May 18, 2008, Jonathan James was found dead in his shower with a self-inflicted gunshot wound to the head. His suicide was apparently motivated by the belief that he would be prosecuted for crimes he had not committed. "I honestly, honestly had nothing to do with TJX," James wrote in his suicide note, "I have no faith in the 'justice' system. Perhaps my actions today, and this letter, will send a stronger message to the public. Either way, I have lost control over this situation, and this is my only way to regain control".

Source - http://en.wikipedia.org/wiki/Jonathan_James 

Monday 28 January 2013

0 My some Photoshop work

Here is my some Photoshop work.




0 Reality of Animation Industry in India

I post this article because I'm animation student in Arena Animation (Durgapur).
and I know what is reality. This is no matter Animation industry is good or bad. The main matter is Animation scope and salary. of course their is huge scope in Bangalore and Mumbai but salary is not good.  fresher got only 36000-65000 yearly (according to Naukri.com, Shine.com and Monster.com). a BPO(call center) employee got starting 5800/mo, it's mean 70000/yearly. and everyone know, to joining BPO(call center) no high education required. so why we invest 1.5 lakh to learn animation ?
someone told me to BPO industry is bad because their is no chance to promotion. but it's not truth. when you joining GPRS department in BPO than you got starting per month 8000 rupees.
all in one Animation industry is not good in India. but in foreign huge scope in Animation. so after complete your course join foreign Animation company like "MANGA".
I post another review in my next post.I'm waiting for your response Guys. Bye take care.

0 Courses on Demand - so funny


Sunday 27 January 2013

5 Access in banned website with two simple tricks


Many work places and schools are cracking down on the web sites and online services. Blocking access to social sites has been a common tactic. The most common websites that are blocked in schools include MySpace, Bebo and Facebook. Let’s know how to unblock sites with two simple tricks.

There are however always legitimate reasons to bypass the internet filters and visit the blocked websites. The following methods will help you access blocked websites in school, college or your company.

Requirements:

For Trick A:
1. Proxy Site

For Trick B:
1.Download Ultrasurf

Trick A: Using a web proxy to bypass restrictions. Proxies that focus on website browsing are called web proxies. A web proxy works by acting as a “middle man”: it downloads the requested pages to its proxy server and in turn you download the page, all images and other such objects from the proxy server to your browser, thus bypassing any filters and annoying firewalls.

Assban.com is a popular web proxy. You can search on Google for “myspace proxy” and find a great deal of other web proxies as well.

But chances are that your school administration has already blocked access to most web proxies as well. In that case, you have one more options:

Trick B: You can download Ultrasurf and save it to a USB stick. UltraSurf is a green software, which means no installation process is needed nor system setting is required to change when using the software. UltraSurf implements almost all browser functions based on HTTP and user needs, such as browsing websites, login and posting on web forums, using Web mail, uploading and downloading data files, real time audio, video and other multimedia programs, etc.

The more people are aware of these tricks, the more likely your network administrators will catch on and find ways to shut them down. So be sure not to let others know how to do these tricks. Accessing unauthorized web sites using the above tricks may be considered a violation of school or work policies and might put you in trouble. Use them at your own risk.

0 Download Bitdefender 2013 with serial key

Download Bitdefender total security 2013 with working serial key (crack).
Download Link : http://www.putlocker.com/file/768E34E571E8FAE6 

1 Create your own shutdown program using Notepad

Create your own shutdown program (some one called "shutdown virus") using Notepad. It's too easy like A,B and C.
Just copy and paste this program in your Notepad :

@echo off
msg * I don't like you
shutdown -c "Error! You are Hacked!" -s

save your file using .bat (like yourname.bat ) extensions. That's all your shutdown program is ready for use. if some one click on this program than their computer is shut down under 30 sec. have any problem let me know here. Thanks !!



3 Download latest web scripts

I find a very good site of web scripts. Here you can download all old and latest scripts.
Visit here : http://webscripts.softpedia.com/

0 Download Latest Anime Videos on HDDANIMES

Download all your favorite Anime videos on HD format.
Visit here : http://hddanimes.blogspot.in/  

0 Download Win7 MAC Address Changer 1.9.5

0 FBI wanted Algerian Hacker Arrested in Thailand

Thai police arrested an Algerian Hacker, wanted by the US Federal Bureau of Investigation for allegedly making millions from cybercrime. Hamza Bendelladj, 24, was arrested late Sunday while attempting to transit through Bangkok's Suvarnabhumi Airport from Malaysia.
FBI wanted Algerian Hacker Arrested in Thailand

Police confiscated from Bendelladj two laptops, one tablet computer, a satellite phone and a number of external hard drives, where satellite phone and notebook computer were his main tools, the commissioner said.

Bendelladj graduated in computer sciences from Algeria in 2008, has allegedly hacked private accounts in 217 banks and financial companies worldwide. "With just one transaction he could earn 10 to 20 million dollars," Lt Gen Phanu said. "He's been travelling the world flying first class and living a life of luxury."

Bendelladj will be extradited to the U.S. state of Georgia, where a district court has issued an arrest warrant. “I'm not in the top 10, maybe just 20th or 50th,” Bendelladj said with a laugh. “I am not a terrorist.”

0 Top three MS DOS command

Here is the top three MS DOS (command prompt) command :
  • Netstat 
  • Ping google.com (replace google.com to any site you want)
  • Ipconfig/all

Friday 25 January 2013

0 Happy Republic Day


Thursday 24 January 2013

0 My Recent Anonymous Photo-shoot

I'm Anonymous Lover. You can see My latest Anonymous Photo-shoot here :

Tuesday 22 January 2013

1 Resident Evil 4 PC Game Full Version With Crack Serial Key

Resident Evil 4 HD Edition (2004/ENG/RePack From NBB)
2004 | PC | English | Developer: Capcom and Sourcenext | Publisher: Ubisoft Entertainment | 4.59GB
Genre: Action / Horror / 3D / 3rd Person
Description: Leon S. Kennedy, familiar to all fans of the series, will once again be at the center of the plot. But this time it will not withstand a zombie, a corporation created by Umbrella, and the terrible sacrifices of the unknown parasite Las Plagas.

In the PC version is dashing twirled detective story would be embellished with new details. Players are waiting for 5 additional chapters with an unexpected plot twist, because the main character will be Ada Wong, who mysteriously disappeared six years ago. Also among the many bonuses new weapons and unique costumes for the characters in the game.

Features:
It started ... a long time. Rakunsky hell is left behind. Six years have passed since the destruction of the city and all its inhabitants, has long ceased to be human. Leon S. Kennedy, formerly served in the Raccoon City Police and the last from the beginning to the end of the nightmare of the second part of Resident Evil, found a quiet operation. At the very least, the service in a secret compartment under the president of the country no big deal as long as the head of state is not kidnapped daughter. The investigation led by Leon in the European godforsaken village. Well, it could be worse than the bearded types of guns, stolen presidential child* It seems nothing, but the village was not only forgotten, but the damned ...
Resident Evil years spent. The fourth part the apogee of creativity Capcom. Slow, dull witted zombies are gone, the new enemy is strong, aggressive, cunning, but ... who is he* Decrepit village vigilantly guarded answers. You will be able to penetrate its mysteries?
In the new world with fresh graphics! Resident Evil 4 on the head walked predecessors, once again proving that the Sony PlayStation 2 is really powerful gaming system. The fourth episode of chilling saga incredibly beautiful and believable, and therefore even more frightening.
The camera is now moving. One of the controversial practices of developers in the earlier parts of the show was a static camera, tightly bonded to one or another corner of the room. In Resident Evil 4 operator glavgeroem follows on the heels, while it does not interfere.
They not a zombie, but who are they* Mysterious creatures roaming around. You have not seen these. They definitely do not zombies, but violate the laws of nature with the same ease. Be alert, cunning enemies. Local Undead unlike the familiar zombie. Conscious creatures get in packs and pressed mass.
Who stole the presidents daughter* The mystery of crime permeates through all the episodes of the game. Writers for a moment do not forget about the plot, generously diluting the terrible events interesting dialogue.
Fire for effect! Finally, you can beat the evil aimed fire. If the characters had fired at random, but now the screen is floating scope. However, the mad gunman out of the game does not have. Resident Evil 4 its still a chilling horror.
Capcom in its repertoire. The game can go not only for Leon, but for Ada, a hired killer, who ordered The Good Man. Who and why* Play and learn.


Change
Now all but the subtitles in the video in English and so now, and the font was in HD
HUD Ashley is also in HD
The laser has become more transparent, and the finer point of making a real laser
Improvement of the characters and environments
And many other minor changes
Changes compared to version 2.0:
Lots of small changes
How to play on the controller
Remove from file folder with the game DInput8.dll, then set up a SetopTool.exe manage and play!

System requirements:
recommended:
Operating System: Microsoft Windows XP / Vista / Seven
Processor with a clock speed of at least 2 GHz
Memory: 512 MB (for installation 16 MB)
Video: 256 MB
Hard Drive: 8 GB
Sound: The sound device compatible with DirectX 9.0.

DOWNLOAD HERE:
ftp://85.118.116.71/zoneD/express/berta2_2/game/Resident%20Evil%204/Resident_Evil_4.iso 
PATCH FOR GAME:
http://adlock.in/1/http://www.tusfiles.net/fsq9w21ew9e2 

Monday 21 January 2013

0 My Online Betting Software - Screenshots Released !

Here is the first screenshots of my online betting software.

5 Free Download Total Training – Adobe Photoshop CS5 Extended: Essentials

Total Training – Adobe Photoshop CS5 Extended: Essentials (2010) (Repost)
English | Duration: 6h | WVC1 | 960×540 | 282 kbps 10 fps | WMA 44.1 kHz 2 ch 50.5 kbps
Total Training for Adobe Photoshop CS5 Extended: Essentials is learning the way it needs to be; informative and engaging with fast results. Follow along with real-world techniques, and time-saving tips presented in a clear, concise manner that put the power of the world’s leading image editing software in your hands.
Chapter 1: THE BIG PICTURE
1. Pixels & Resolution
2. Color
3. Exploring the Interface
4. Choosing File Formats
5. Viewing & Navigating Images
Chapter 2: SETTING UP LIKE A PRO
1. Setting User Preferences
2. Choosing Color Settings
3. Customizing the Workspace
4. Essential Keyboard Shortcuts
5. Using Rulers & Guides
Chapter 3: GLOBAL EDITING
1. Understanding the Histogram & Levels
2. Learning the Curves Tool
3. Exploring Hue & Saturation
4. Cropping & Straightening
5. Adjusting Color Balance
6. Creating a Black & White Image
Chapter 4: MAKING SELECTIONS
1. Manual Selection Tools
2. Using the Quick Selection Tool
3. Creating Color-Based Selections & Saving Selections
Chapter 5: NON-DESTRUCTIVE EDITING
1. Using Adjustment Layers
2. Understanding Layer Masks
3. Creating Gradient Masks
4. Applying Layer Blend Modes
5. Snapshots & the History Brush
Chapter 6: THE FIXER-UPPER
1. The Retouching Tools, including Content-Aware Fill
2. Removing Noise from an Image
3. Cloning with Perspective with the Vanishing Point Filter
4. Adjusting Perspective with the Lens Correction Filter
5. Content-Aware Scaling
Chapter 7: TYPE DESIGN
1. Working with Type
2. Paragraph & Character Formatting Options
3. Typing on a Path
4. Applying Layer Styles to Type
Chapter 8: VECTORS, SHAPES & PATHS
1. Vectors & the Shape Tools
2. Creating Paths
3. Saving & Loading Paths as Selections
4. Subtracting, Adding Intersecting, & Excluding
Chapter 9: SMART OBJECTS
1. Vector Graphics as Smart Objects
2. Creating & Replacing Smart Objects
3. Creating Multiple Instances of a Smart Object
4. Smart Objects Deserve Smart Filters
Chapter 10: ADOBE BRIDGE
1. Exploring the Workspace
2. Searching & Organizing Files
3. Leveraging Metadata
4. Outputting
5. Using Mini Bridge
Chapter 11: PHOTOSHOP CAMERA RAW
1. Using the Basic Panel
2. Applying Selective Edits
3. Converting to Black & White
4. Repairing an Image
Chapter 12: IMAGE LAYERS & ALPHA CHANNELS
1. Manipulating Image Layers
2. Mastering the Layers Panel
3. Creating Layer Groups & Comps
Chapter 13: COMPOSITING IMAGES
1. Combining Images & Merging the Best Elements
2. Creating Panoramas
3. Auto-Aligning Layers
4. Refine Edges
Chapter 14: WORKING WITH BRUSHES
1. Exploring the Brush Panel
2. Creating a Custom Brush
3. Changing Brush Dynamics
4. Painting with the Mixer Brush
Chapter 15: PRINT & WEB OUTPUT
1. Sharpening Images with Smart Sharpen
2. Setting Up the Print Dialog Box
3. Saving for the Web
4. Credits

DOWNLOAD HERE: 

Saturday 19 January 2013

2 Power .ISO 5.2 Serial key

Power .ISO working serial key :
User : Dracul   
Serial : 65NC4-6L14G-VLS9E-VBLIB-NR38C

Wednesday 16 January 2013

0 We are going to start new online Gambling website

Good news for people who love gambling and bating. Now "OnlineMahatma" going to start new gambling website for online bating.
The top benefits of our group are there is no chance to arrest.
We are going to hire Some CORE programmer and engineer for our group.We not want to share our gambling site name here but any one interested in gambling and bating than simply send a mail on "Cloudhosttk@yahoo.in". Thanks for your awesome Support Guys.

0 Love Animals and Adventure Visit Awesome Animals

Love Animals Visit awesomeanimals001.blogspot.com 
I highly highly recommended this blog. Please guys take a look of this blog.
Thank you for your awesome support. 

0 Basic of Linux System

Welcome to the Red Hat Enterprise Linux System Administration Guide. The Red Hat Enterprise Linux System Administration Guide contains information on how to customize your Red Hat Enterprise Linux system to t your needs. If you are looking for a step-by-step, task-oriented guide for con during and customizing your system, this is the manual for you. This manual discusses many intermediate topics such as the following:

    • Setting up a network interface card (NIC)
    • Performing a Kick start installation
    • Configuring Samba shares
    • Managing your software with RPM
    • Determining information about your system
    • Upgrading your kernel
    This manual is divided into the following main categories:
    • Installation-Related Reference
    • File Systems Reference
    • Package Management
    • Network Configuration
    • System Configuration
    • System Monitoring

This guide assumes you have a basic understanding of your Red Hat Enterprise Linux system. If you need help installing Red Hat Enterprise Linux, refer to the Red Hat Enterprise Linux Installation Guide. For more general information about system administration, refer to the Red Hat Enterprise Linux Introduction to System Administration. If you need more advanced documentation such as an overview of the systems, refer to the Red Hat Enterprise Linux Reference
e-Book Download Link :  www.centos.org/docs/4/pdf/rhel-sag-en.pdf

Sunday 13 January 2013

2 Make money online in just 2 minutes !

Want to earn money online but you don't know how ?
Now It's so easy Just click the below  link and submit your e-mail id. You receive top selling "make money online" books free of cost. Download link sent in your e-mail.
Click here to Submit
or simply visit here : http://www.empowernetwork.com/homelessman.php?id=sergenet1  

Saturday 12 January 2013

0 How to protect your PC from malware ?

In general, protection is provided after a new virus has been spawned. The following are some suggestions to make your computing safer.
•Don't open an attached file if you do not know what it is, who sent it to you, or you were not expecting it (even if it is from somebody that you know.) This is especially true if the file has any of the following extensions: .pif, .vbs, .scr, .exe
•Don't use the preview pane in Outlook. Some viruses can infect a computer just from the preview pane.
•When in doubt, contact the sender. Write back to them and ask what the attachment is. If the attachment is valid, they will tell you what it is and what it does.
•To permanently delete a suspect message, hold down the SHIFT key and hit DELETE.

0 Best Linux OS Distributions


Tuesday 8 January 2013

0 Goosebumps - The ultimate horrors by R.L.STINE

Recently I read a horror novel Goosebumps(R.L.STINE). It's a great novel. If you like suspense and thrillers then surely read this book. after read that book I'm big fan of R.L.STINE.
Thanks STINE Sir to write this novel.

0 Download Ultramixer - best DJ operating software

Download UltraMixer best DJ operating software. You have not worry about pay because UltraMixer is freeware.
Download Link : http://www.mix-software.com/_releases/UltraMixer/UltraMixer-2.4.6-win.exe

Saturday 5 January 2013

1 Afghan Cyber Army continuously attack on pakistani and american website

Recently two website is shutting down by AFGHAN CYBER ARMY.




Mirror -              Hacked By Afghan Cyber Army


We are ~ Afghan haxor ~ Ahmad sahel ~ Root Afghan ~ Afghan Hex ~ Afg_Error404 ~ Dark night ~ Princess Haxor ~ Shams Haxor ~ Pakhtoon Haxor ~ M!As!f Haxor ~ V!rus Afghan ~ Afg_Malware ~ Afghan Destroyer ~ Afghan Terminitor  
 
 #Message:Muslims Are Not Terrorists#

When American Killed innocents Afghans in Night Op:Not Terrorism
When American Takes 1 Million Lives In Iraq For oil:Not Terrorism
When Serbs Rape Muslim Women In Kosovo/Bosnia -----:Not Terrorism
When Russians Killeds 200,000 Chechens In Bombings:Not Terrorism
When Jews Kick out Palestinians And Take Their Land:Not Terrorism
When Muslims retaliate and show you how you Treat us:Terrorism
It seems like the world "Terrorism" in only Reserved For Muslims
-----------------------------------------------------------------------------------------
We are The Muslim hacker , we not hack for fun ! Or to kill time or looking for fame, We carry A message to Every Christian and Jew, That your war against Islam, ,Will end now, or later ! But Our revenge will not end until the Day of Resurrection What was taken by force it's wll Back by force {no surrender Fight until grave } the day is coming


Gretz To:All All Muslims Of The World And Deliver this Message To every One that Muslim is Not A Terrorist
Afgh4nhax4r@live.com


~`We WILL BE BAK i_l_i ~

live For Afghanistan Or Leave Afghanistan

Friday 4 January 2013

0 www.executivewisdom.com - new online store to buy books, cd and dvd

In partnership with OnlineMahatma & Deepak Chaubey, Executive Wisdom Consulting Group and Ric Willmot will offer valuable resources for the use and benefit of OnlineMahatma clients and associates. Bookmark this page and visit regularly to be apprised of updates, forthcoming events and other items of interest by The Global Consultant, Ric Willmot.As an added benefit to you being a friend of OnlineMahatma & Deepak Chaubey, you will receive an additional 10% discount on top of any early-bird specials or discounts already being offered by using the Discount Code: DC-OMDCAP at the checkout when you're completing your transaction. 

Thursday 3 January 2013

0 Snapdeal Coupons - Get Free Discounts

Snapdeal.com is India's leading e-commerce website.
Just use our coupons code and get additional discount when you purchase from Snapdeal.
Coupons Code :
YES2  : use this coupon code in time of payment and get additional 2% discount.
MOB200 : this coupon is valid only for Bsnl Penta IS701 R Tablet. get additional 200 Rupees discounts on Bsnl Penta IS701 R Tablet.

More Coupons is Coming Soon !!!

Wednesday 2 January 2013

0 New Facebook Smiley Try it now !

Make Facebook cool with new Chat Smiley. Try it now !

0 Use Facebook to upload and share files with your friends ! How ?

Hello guys, I know 60% people don't know about this trick. its so simple like A,B,C,D. first go to your "Messages" and then select "SEE ALL".

After click "SEE ALL" you can see your friends list. for share your files choose one friend to share. That's all click on "Add files" option and share unlimited files you want with no restriction.

Tuesday 1 January 2013

0 Bsnl Penta IS701 R Tablet Black Review

Product Description : The Penta TPAD IS701R Black is a powerful tablet solution at an unbelievably affordable price you may never have dreamt of! Its comes with Android OS and high resolution 7 Inches resistive touch screen powered by 1GHz processor and inbuilt DDR II 256M RAM It is best price-performance tablet in their price range. You have all the controls in a single finger touch mode. Browse web on wireless or enjoy media playback on Penta TPAD IS701R. Its support 32GB memory on external memory card slot. Features Browse the web, watch Youtube videos, check e-mail, and much more. Plays popular video, music, and photo formats. Download and Install Google andriod apps. Connect to the Internet wirelessly with high-speed networking support (Wi-Fi 802.11 b,g) . Easy Access to Email, Office and Games. Be connected to your friends and dear ones on facebook and other social networking media, Seamless Digital Media Experience. E-Book Reader , Rechargeable lithium-polymer battery, Penta IS701R comes with a limited warranty of 12 months from the date of purchase..

SPECIFICATIONS :

CPU                    1GHz Processor
OS                       Android 2.3
RAM                   DDR2 256MB
FLASH                2GB
TF card                TF card support to 32G
Wifi                      802.11b/g/n
Display size          7 Inches (17.78cm) LCD Screen
Touch Screen       High Quality Resistive
G-Sensor              Rotator Screen
Camera                0.3MP
USB                    Micro USB
Battery                 Li-ion 3000mah 5V2A
Video                   Max.1280x720 MKV(H.264 HP) AVI RM, RMVB FLV WMV9 MP4
Flash Support       Adode Flash 10.1
Email                   Send/receive email online
Audio                  MP3/WMA/APE/FLAC/AAC/OGG/AC3/WAV
Games                 yes
Warranty             1 year warranty

5 I got my payment from chitika - payment proof here

Recently I got payment from Chitika . here is the payment proof.
Why you try small advertising network like wapdollar.in. they all are scam.
just join Chitika and make huge money from it.
40-60 clicks = 1$
Minimum Payout = 10$
It's mean if you have only 100-200 visitors daily then you can make 0.5 to 1$ per day.
** Adult site not allowed.
Click here to apply for Chitika Program
 

© Copyrights - Droid Guru