Instagram Auto Liking program

Instagram Auto Liking program.

instagram

Nowadays people are searching for program that auto likes others people’s pictures because when you like other people’s pictures, they will also like your picture as will.By doing this, it allows you to become popular. People are ready to pay for programs that auto likes others pictures.

Instagram Auto Liking program

Image

Most people today are uploading their picture through Instagram where they can share it with others. You can sign up for free and start uploading your pictures. You can also press the follow bottom if you liked that’s person pictures and you would like to receive messages whenever that’s person updates his profile.

Image

Nowadays people are searching for program that auto likes others people’s pictures because when you like other people’s pictures, they will also like your picture as will.By doing this, it allows you to become popular. People are ready to pay for programs that auto likes others pictures. So I started searching for ways to do that, and I found an easy way to do that and it’s free. All what you have to do is to go to add-ons in Firefox and search for “Imacros” or click the following link:

https://addons.mozilla.org/en-US/firefox/addon/imacros-for-firefox/

and then press “Add to Firefox”

Image

Introduction about Imacros:

I macros is a program that will automatically repeats action that you have done. All what you have to do is to press record, and then do your action that you want the program to record. Then this will appear “#current.iim” hear is where your action are save. It will take time tell you be comfortable with the program. If you are stuck with anything, you can find tutorial by clicking on “demo Firefox” and then choose what you want.

After you add it to your firefox go to http://web.stagram.com. Webstagram is the most popular Instagram web viewer. Log in as your account in instagram.

Image

Then search for any pictures that its tag is popular. I will search with the word “Dubai”

Image

Here are some results, but I want the result to be a lot, such as 10,000 results or more. mine found more than 3 million photos

Image

Then click on this Icon, you will find it on the top-right corner.

Image

This tab will appear, right click on “#current.iim”

Image

This form will appear copy and paste the following code”

Image

————————————–

SET !ERRORIGNORE YES

‘This piece of code will let the program continue in case any error occur, otherwise everything will stop working

TAG POS=1 TYPE=IMG ATTR=SRC:http://cdn.stagram.com/img/like.png

‘This code will search for the like icon and press it

WAIT SECONDS=2

‘This will delay the pressing by 2 seconds

TAG POS=2 TYPE=IMG ATTR=SRC:http://cdn.stagram.com/img/like.png

‘This will let the program to jump to the next like icon and press it

WAIT SECONDS=2

TAG POS=3 TYPE=IMG ATTR=SRC:http://cdn.stagram.com/img/like.png

WAIT SECONDS=2

TAG POS=4 TYPE=IMG ATTR=SRC:http://cdn.stagram.com/img/like.png

WAIT SECONDS=2

TAG POS=5 TYPE=IMG ATTR=SRC:http://cdn.stagram.com/img/like.png

WAIT SECONDS=2

TAG POS=6 TYPE=IMG ATTR=SRC:http://cdn.stagram.com/img/like.png

WAIT SECONDS=2

TAG POS=7 TYPE=IMG ATTR=SRC:http://cdn.stagram.com/img/like.png

WAIT SECONDS=2

TAG POS=8 TYPE=IMG ATTR=SRC:http://cdn.stagram.com/img/like.png

WAIT SECONDS=2

TAG POS=9 TYPE=IMG ATTR=SRC:http://cdn.stagram.com/img/like.png

WAIT SECONDS=2

TAG POS=10 TYPE=IMG ATTR=SRC:http://cdn.stagram.com/img/like.png

WAIT SECONDS=2

TAG POS=11 TYPE=IMG ATTR=SRC:http://cdn.stagram.com/img/like.png

WAIT SECONDS=2

TAG POS=12 TYPE=IMG ATTR=SRC:http://cdn.stagram.com/img/like.png

WAIT SECONDS=2

TAG POS=13 TYPE=IMG ATTR=SRC:http://cdn.stagram.com/img/like.png

WAIT SECONDS=2

TAG POS=14 TYPE=IMG ATTR=SRC:http://cdn.stagram.com/img/like.png

WAIT SECONDS=2

TAG POS=15 TYPE=IMG ATTR=SRC:http://cdn.stagram.com/img/like.png

WAIT SECONDS=2

TAG POS=16 TYPE=IMG ATTR=SRC:http://cdn.stagram.com/img/like.png

WAIT SECONDS=2

TAG POS=17 TYPE=IMG ATTR=SRC:http://cdn.stagram.com/img/like.png

WAIT SECONDS=2

TAG POS=18 TYPE=IMG ATTR=SRC:http://cdn.stagram.com/img/like.png

WAIT SECONDS=2

TAG POS=1 TYPE=A ATTR=TXT:Earlier

‘This will search for the earlier pictures

—————————

Then click save and exit

Image

Then put a high number on the MAX: text such as 1000, this means that it will click like on 1000 picture. Then Click on Play(LOOP)

 Image

Finally, leave the Program to work by it self

Image

For any further questions, don’t hesitate to leave a comment

Graduation Project

Image

In IAT, we were required to complete our graduation project, which was a software that can be helpful in libraries that can let students search the database for book using Book name, ISBN, or Category. We were as a group of four with 6 more groups in IT cluster. I know that we are few as an IT cluster because they just decided to have an IT cluster, so we were the first group to be in IT cluster. We worked so hard on our project, that was about to be done, but as an IT professional, there is nothing called finish, because a software will not finish. In other words, there are different ways that you can update your software.

Image

 

When we reached their, we saw more than hundreds of projects from deferent fields such as electronics, websites, and software. They informed us that three judges will come to us, each alone, and each will give us points. Then, they will add the points, and choose the best six groups. So, we went to our palace where we will present our project. The first judge came to us, but he just saw 30% of our project. Then, the second judge game, and the same happened, just 30 % of our software. Finally, the last judge came, but he said just tell me what your software can do, without running it because he ran out of time. We were very angry, because how it is going to be fair if he did not see our software. We informed our teacher about that, but he said just ignore it for the mean time. Now, is the time when they will add points and decide who will be the first six groups. This time, all the judges will go through the six groups and decide who will be in the first three places.

 

Image

 

At that moment, we were pretty sure that they will choose our group as one of the 6 groups, but they didn’t. We were very angry, and we spoke to the one who is higher than those judges. He said that he received complains, that the last judge was not fair, so they deleted his points. But we insisted him personally to come and see our project. We presented the project in details. Here comes the good news, he was happy with our project, and inform the other judges to see our project, so there are now seven groups to choose from.

Image

 

It is time, now they will choose who will be in first 3 places, they started with the third places, and  I and my friends said that they will give us the third place because we were very angry, but the winner was from Liwa International School – Al Ain. We decided that we will be in second place, but they were from Shakboot Bin Sultan High School – Al Ain. We lost our hope and we definitely agreed that we are not in the first place. When they mention the first place, they said “The first place is IAT – Dubai” I couldn’t believe that. How can they give us the first place, where we were not even among the six. places, but that does not matter, what matter is that we are in first place. Soon later, we won as the first group in our school.

Image

 

Image

On my previous post, I talked about “Malware” and its different type such as viruses, worms, Trojan horses, and spyware. But in this post I will concentrate on “Spamware”. According to Wikipedia “is software designed by or for spammers. Spamware varies widely, but may include the ability to import thousands of addresses, to generate random addresses, to insert fraudulent headers into messages, to use dozens or hundreds of mail servers simultaneously, and to make use of open relays. The sale of spamware is illegal in eight U.S. states.” In other words, it is a software used by either hackers or dealers to send packages to random email addresses.

Image

 

One day, when I opened my email, I found an email from anonymous saying” buy from this website and get 50% discount” that was where I got the idea of my new software. It is about a software that sends endless email to any email that you put on the box. Think about a professor who usually gets more than 100 emails from students, dean, or coworker. So what will happen if I typed his email in the box and the software automatically send about 1000 email to his account? I know that that professor will get angry about those emails. But don’t worry, the professor can never find you because I added to extra boxes, where you can put the email that you want to send “from” and a box where you can put your “password”. All what I had to do, is to create an email with random ID, so that teacher will not find who sent all of those emails.

 

Image

I made this program to send emails people who annoyed me or did not give me what I wanted. For example, a teacher who gave me low grades, or someone who said bad thing about me. So be careful not to do something that will eventually make me use the program against you. Don’t worry I am” just kidding”.

Image

When I went deep into the coding, I found different ways that any hacker can hack your PC. For example, he can send it through files, documents, or software, so be careful not to open any email from anyone you don’t know.  

Image

 

Spamware definition:

http://en.wikipedia.org/wiki/Spamware

Malware

Image

Few who knows the meaning of “Malware”. As TechTerms.com defines it” malware refers to software programs designed to damage or do other unwanted actions on a computer system. In Spanish, “mal” is a prefix that means “bad,” making the term “badware,” which is a good way to remember it (even if you’re not Spanish).”Malware have different types such as viruses, worms, trojan horses, and spyware. In this post I will concentrate on Trojan Horse. According to TechTerms.com “Trojan horses are software programs that masquerade as regular programs, such as games, disk utilities, and even antivirus programs. But if they are run, these programs can do malicious things to your computer.” In other words, the interface shows something; while the real purpose of the software is create damages.

Image

While I was surfing the internet, I saw an ads that says “Complete the survey and win Ipad 2″ I know that this ads is fake and its some type of Trojan horse. But I got an idea, I want to create a Trojan horse to collect others data, but I had to think of a program that is popular and at the same time I can get valuable information from this program. When I was in IAT, almost every student was using Hotmail ID to check their emails. As a result, the idea was to create software similar to Outlook.

Image

I went to Hotmail.com and I took a screenshot of the website to be as my program interface, where users will inter their data. Then I started coding the software, where it is the hardest part in any software. I spent almost 2 days coding the program. I coded the software in a way that when any user put their ID and Password, then press “sign in” the software will automatically send the ID and Password to my email. After a deep thought, I said what about adding the code that make the PC restarts forever, and I did it. I wanted to email the software to my colleges, so I can try the software, but what will make my colleges run the software. After a deep thought, I wrote in the email the following “This is a program that lets you check your email without installation, and its size is just 2 MB. Just run the software and inter your data.”

Think-Again

The moment when I wanted to press “send”, I remembered that if they pressed sign in, their PC’s will keep in restarting forever, so I didn’t. This is the moment that I stopped using the program, because it can cause me too many problems. This is my advice for today” Don’t do anything without thinking of its consequences”.

Reference

Malware definition:

http://www.techterms.com/definition/malware

Trojan horse definition:

http://www.techterms.com/definition/trojanhorse

Stanford Prison Experiment

Stanford Prison Experiment

The video is about an experiment that was done by Philip Zimbardo, a psychologist who wants to study human’s behavior without their freedom. He called the experiment as “Stanford prison study”. He and other expertise placed and add in a newspaper in which they will pay the volunteer $15 per day. Over 70 applied, but only 24 were selected. The role of guard and prisoner were chosen by a flip of a coin. The experiment was planned for 2 weeks, but it ended in 6 days because volunteers were suffering.

The study main goal was to observe human actions and behaviors without behavior. Although volunteers knew that it was just an experiment, they couldn’t control themselves. Guard, as an example, couldn’t stop using all of their power to take control over the prisoner. It is right that it was their role, but they over reacted, which caused the experiment to end. Prisoners, as another example, start to take it usuriously, but as time moves on, they realize that any action they do might have a negative consequences, so some followed the role and some were controlled by their emotions, which was another reason why the experiment should end.

This experiment is relevant to our daily life. It is a situation in which “power” has something to do, where one limits the freedom of others such as a Teacher and student, husband and wife, parents and children, and doctors and patient. The study showed that the most situations in which a person give up his freedom is shyness. They started to concentrate in shyness. As a result, they setup the first shyness clinic in America, which treats shy behavior in adults and children.

Hackers

Image

Hackers

I think everyone heard of the world “Hacker”, and that people think a hacker is a bad person. When I joined IAT- Institute of applied technology- my major was IT, and I had IT courses such as Adobe Photoshop, Illustrator, and Dreamweaver, but my favorite course was Visual Basic. Visual Basic is used by many programmers to make programs. When I started to take this course, I was impressed with the things that I can do, so I got a little curious to find out what I am capable to do with this program.

Image

I started with a program that when you double click on the icon of the program, a screen shows up saying “click to play the game”. What actually will happen when anyone press the click bottom, is that their computer will automatically restart. I sent the program to my classmate. The next day, one of them told me that he was working on an assignment when he thought of playing my program. When he run the program, his PC automatically restarted and his work was erased.

Image

A few days later, I had an idea about how to improve that program. I started improving it until it became ready. What I added to my program is that when any one double click on the icon, his or her PC will restart, but in a loop. In other words, their PC will automatically run the program after restarting, when it will again keep restarting on and on. Although the program was simple, no one can stop the PC from restarting accept me. I wanted to send it to my classmate, but for the fact that no one can stop it, I didn’t.

Image

When I searched deep in to the program, I realized how can other hackers send viruses through games, documents, programs or even through emails. Here is my advice to you, don’t open anything that was from anonymous or any one you don’t trust because they can steel valuable information without knowing.

Image

Iphone History

Image

Iphone had its major effect in the world when it first became unveiled for the public. The CEO of Apple “Steve Jobs” released Iphone for the first time to the public in 2007. Iphone was unique for the fact that it worked with touch screen. Throughout the years Apple created 6 generations of Iphone. Starting with IPhone 2G in 2007, followed by Iphone 3G in 2008. After that Iphone 3GS showed up in 2009. Then Iphone 4 was released in 2010 with new design, but Iphone 4s witch unveiled in 2011, did not had any change in design. The only change in Iphone 4s was its natural language voice control system which called “Siri”. The latest Iphone version was announced by Apple in September 2012 which called Iphone 5. Iphone 5 does not have major changes, but it have some features, such as a bigger screen, thinner design and 4G LTE. Almost everyone who loves Iphone was not satisfied with Iphone 5 because it did not have major changes and was not as everyone expected. I hope that Apple will come up with new generation of Iphone that will have new creativity and innovation.

Iphone 2G (2007)

Image

———————————————

Iphone 3G (2008)

Image

———————————————

Iphone 3GS (2009)

Image

———————————————

Iphone 4 (2010)

Image

———————————————

Iphone 4s “Siri” (2011)

Image

———————————————

Iphone 5 (2012)Image