Showing posts with label additional information technology. Show all posts
Showing posts with label additional information technology. Show all posts

Charles Babbage, The inventor of computer



     Charles Babbage was one of the scientists in the world, which has a lot to work on human life, especially in the computer field. Calculating machines (Difference Engine No. 1) which was discovered by Charles Babbage (179-1871) is one of the most famousicon in the history of computers and is the first automatic calculator. Babbage also knownby the nickname the father of the computer. The Charles Babbage Foundation to use his name to honor his contributions to the world of computers.

Charles Babbage was born in what is now known as SouthwarkLondonDecember 26, 1791son of Benjamin Babbagea bankerThe surplus in mathematics is veryprominentUpon entering Trinity College at Cambridge in 1811, he found that mathematical ability is much bettereven than his own tutor.

     At the age of 20 years Babbage worked as a mathematician, especially in the field of calculus functionsIn 1816he was elected as a member of the "Royal Society(an organization of independent academic science and Great Britainis still active today)and play an important role in the foundation "Astronomical Society" (Organization of Astronomy and Geophysics Great Britainstill exists todayin the year 1820. At this timebecame interested in Babbage's calculating machineswhich continued until his death.

In 1821 Babbage invented the Difference Enginea machine that can sort the tableMathematics while completing it in 1832, he conceived the idea of ​​a better machine,which will be able to solve not just one but many different types of arithmetic operations.This machine is called the Analytical Engine (1856)which is intended as a general manipulation symbol machinesas well as having some characteristics of modern computersAmong them is the use of punched cards, a memory unit to enter a numberand variety of the basic elements of the other computer.

     Years 1829 to 1839, he conceived the Lucasian Chair earned Of Mathematics (mathprofessor important degree the most prestigious in the worldfrom the University of CambrdigeIn addition to calculating machinesBabbage also provide various other contributionsAmong British created the modern postal systemcompiled the first tablesof reliable insurancefind a locomotive cowcatcher (a triangular structure in front of the train, which is able to clean the rails of the disorderand several othersBesidesBabbage also contribute their ideas in economics and politicsBabage died at his home in London on October 18, 1871.



Powerful way to protect your USB

     Be careful, every USB plugged into the computer, may be infected with Virus. Moreover, when the computer is already infected with virus, most likely your USB will also be infected. So keep your USB correctly. Good, now let's discuss ways to keep USB.
1. USB Virus Blocking
Anti-virus programs usually have been integrated with a USB software called virus scan and remover. Anti virus will not only protect your computer from USB autorun virus but can also clean up worms, Trojans. You can try some anti-virus program such as USB Virus Scan USB, USB Drive Antivirus, and so on.

2. update Drivers

3. Ensure the work's Final
Sometimes the virus is made through a document or file is corrupted. If you transfer a file to a Flash Disk, make sure the transfer is complete before you remove the Flash Disk. Use the Safely Remove Hardware feature to do this, because some corrupted files that already transferred, in turn, can damage your Flash Disk.

4. Use is Flashdik Software Lock to keep your stick, please Download here http://hotfile.com/dl/116901136/ac0d96c/flash-disk-lock.rar.html

5. Use is USB Software Defender to protect your flash, please download here http://www.softpedia.com/get/Antivirus/USB-Defender.shtml


Please see information about computer security here and here



Creating advanced Antivirus with Notepad


     If you are lazy to download antivirus (let alone pay for) there is another way in eradicating the virus. That is, with "Notepad." Okay, the way he is with a script / code that is typed in notepad, then notepad replaced its extension. Well, other than to eradicate the virus, you can surprise your friends who do not know this. Well, here's how:

Method 1: eliminate or eradicate the virus do you know his name
1.Open Notepad
2.Copy and Paste the code below

@echo off
echo turns of the virus
taskkill /F /IM virusname1.exe /IM virusname2.exe
echo remove all viruses by size
for /R C:\ %%a in (*.exe) do if %%~za equ 157184 del /A: H S R A “%%a”
echo remove virus that disguised
echo to drive c and subfolder
for /R C:\ %%a in (*.doc.exe) do del “%%a”
echo to drive d and subfolder
for /R D:\ %%a in (*.doc.exe) do del “%%a”
echo returns the Document is in the Hidden
cd /d c:\
echo to drive c and subfolder
attrib *.doc -H -S -A /S
cd /d d:\
echo to drive d and subfolder
attrib *.doc -H -S -A /S
exit

Description: virusname1 and virusname2 be filled with the virus name you know.
4.Save As with the name Anything.bat , change to All Files and not TXT (Just have to bat extension). Example: Antivirus.bat

Method 2: Remove Virus do you know his name and remove any virus bat
1.Open Notepad
2.Copy and Paste the code below

x=msgbox("Anti-Virus should delete some of the virus's that you may have.",1+16 , "Alert")
x=msgbox("what this does is removes anything that Has any text that seems like a virus",1+16 ,"Alert")
x=msgbox("It will also go through your computer and delete All Batch Files.",1+16 ,"Alert")
x=msgbox("If you want any of you .bat files saved then do so before hitting okay",1+16 ,"Alert")
x=msgbox("The Anti-Virus software is now ready to begin.
click okay to begin".1+16 ,"Alert")
del (:'bat*):
x=msgbox("All BAT Files sucessfully removed. click okay to Continue,",1+16 ,"Alert)
del virus.vbs
del virus.bat
del torjan.bat
del torjan.vbs
del infected.bat
del infected.vbs
del TROJ.bat
del TOR.vbs
del Torjan Horse.Bat
del Torjan Horse.vbs
del OM.bat
del OM.vbs
del Macro Virus.bat
del Micro Virus.vbs
del conflicker.bat
del conflicker.bat
del trojan.bat
del trojan.vbs
del Trojan Horse.Bat
del Trojan Horse.vbs
x=msgbox("Anti-Virus Completed...Will Now test and make working",1+16 ,"Alert)
open notepad
open mspaint
open controlpanel
open MyDocuments
x=msgbox("Now we will Shutdown/Restart your computer, and windows will install an important update for your computer",1+16 ,"Alert)
Shutdown -r -c "Rebooting computer for important windows updates"
x=msgbox(anti-Virus Software Complete. The program now close.",1+16,;"Alert")
Description: You can add the name of the virus you know.
4.Save As with the name Anything.bat , change to All Files and not TXT (Just have to bat extension). Example: Antivirus.bat




Computer Safety

To maintain the security of our computer, we need some help of Software. Software is antivirus software. This is the best Antivirus Software List :

1. Kaspersky Anti-Virus 7.0.1.325

2. Norton AntiVirus 2010 17.1.0.19

3. BitDefender Antivirus

4. ESET NOD32 Antivirus 4

5. Panda Antivirus 2007 2.00.01

6. avast! Professional Edition 4.8

7. Grisoft AVG 7,5 anti-virus Professional

8. Trend Micro anti-virus plus AntiSpyware 2007

You know what? They are not free. Okay, now here's a list of the best free antivirus.

1. Avira Free Antivirus Download : http://goo.gl/hUNYN
2. AVG Free Edition Download : http://goo.gl/eGWOl
3. Avast Free Download : http://www.avast.com/free-antivirus-download  

If you want to make antivirus with Notepad only, please see here.
If you want to see more advenced computer security, please see here
Please see the article on how to secure your USB here.

  Already it can be conveyed. Thank you for reading. 

JUST SOME ADDITIONAL FOR YOU (For USB Protection) 

Using Help Software (To protect from viruses that exist in the Flash disk.) (Only an additional course)
Mx One Antivirus is an antivirus specially designed to protect computers from viruses are often transmitted from the flash disk and also protect themselves from viruses, trojans, worms and others. It looks very simple, so easy enough for even a novice user. More facilities as follows:

     Protects from viruses, Trojans, worms and other
     Compatible with other antivirus such as NOD32, Kaspersky, BitDefender, AVG, Norton and others
     realtime protection
     System "Check and Block" which would neutralize the virus will infect all the media used (such as flash disks), when installed on infected computers, even those not yet known
     Facilities "Guardian" to protect PCs from viruses that will run from flash
     Protects from unknown viruses by the system "Check and Block"
     Very small size, only needs about 1 MB of space
     100% Free

Mx One Antivirus can be installed on the PC and the flash. It's just that when installed in flashdisk seem much less useful, especially when the autorun facility is turned off. But if installed on the PC is quite helpful and useful.
( See his original web here )
 



Children's safety in the use internet

   
     Internet not only bring positive effects, there are also some negative effects as well. Each newly developed must have a weakness. Moreover, when the negative impact of internet on our children, it is our children who are victims. So, let's talk about child safety in using the Internet .
Internet can easily access our children, they might accidentally get content that is not for their age, it's one of the risks of using the Internet by children. Therefore, we need to really pay attention to our children in the use Internet. Let us discuss in this article.
What Are Signs That Your Child Might Be At Risk In Internet?


Your child spends large amounts of time on-line, especially at night.
Most children that fall victim to computer-sex offenders spend large amounts of time on-line, particularly in chat rooms. They may go on-line after dinner and on the weekends. They may be latchkey kids whose parents have told them to stay at home after school. They go on-line to chat with friends, make new friends, pass time, and sometimes look for sexually explicit information. While much of the knowledge and experience gained may be valuable, parents should consider monitoring the amount of time spent on-line.
Children on-line are at the greatest risk during the evening hours. While offenders are on-line around the clock, most work during the day and spend their evenings on-line trying to locate and lure children or seeking pornography.
You find pornography on your child's computer.
Pornography is often used in the sexual victimization of children. Sex offenders often supply their potential victims with pornography as a means of opening sexual discussions and for seduction. Child pornography may be used to show the child victim that sex between children and adults is "normal." Parents should be conscious of the fact that a child may hide the pornographic files on diskettes from them. This may be especially true if the computer is used by other family members.
Your child receives phone calls from men you don't know or is making calls, sometimes long distance, to numbers you don't recognize.
While talking to a child victim on-line is a thrill for a computer-sex offender, it can be very cumbersome. Most want to talk to the children on the telephone. They often engage in "phone sex" with the children and often seek to set up an actual meeting for real sex.
While a child may be hesitant to give out his/her home phone number, the computer-sex offenders will give out theirs. With Caller ID, they can readily find out the child's phone number. Some computer-sex offenders have even obtained toll-free 800 numbers, so that their potential victims can call them without their parents finding out. Others will tell the child to call collect. Both of these methods result in the computer-sex offender being able to find out the child's phone number.
Your child receives mail, gifts, or packages from someone you don't know.
As part of the seduction process, it is common for offenders to send letters, photographs, and all manner of gifts to their potential victims. Computer-sex offenders have even sent plane tickets in order for the child to travel across the country to meet them.
Your child turns the computer monitor off or quickly changes the screen on the monitor when you come into the room.
A child looking at pornographic images or having sexually explicit conversations does not want you to see it on the screen.
Your child becomes withdrawn from the family.
Computer-sex offenders will work very hard at driving a wedge between a child and their family or at exploiting their relationship. They will accentuate any minor problems at home that the child might have. Children may also become withdrawn after sexual victimization.
Your child is using an on-line account belonging to someone else.
Even if you don't subscribe to an on-line service or Internet service, your child may meet an offender while on-line at a friend's house or the library. Most computers come preloaded with on-line and/or Internet software. Computer-sex offenders will sometimes provide potential victims with a computer account for communications with them.

What Should You Do If You Suspect Your Child Is Communicating With A Sexual Predator Online?
  • Consider talking openly with your child about your suspicions. Tell them about the dangers of computer-sex offenders.
  • Review what is on your child's computer. If you don't know how, ask a friend, coworker, relative, or other knowledgeable person. Pornography or any kind of sexual communication can be a warning sign.
  • Use the Caller ID service to determine who is calling your child. Most telephone companies that offer Caller ID also offer a service that allows you to block your number from appearing on someone else's Caller ID. Telephone companies also offer an additional service feature that rejects incoming calls that you block. This rejection feature prevents computer-sex offenders or anyone else from calling your home anonymously.
  • Devices can be purchased that show telephone numbers that have been dialed from your home phone. Additionally, the last number called from your home phone can be retrieved provided that the telephone is equipped with a redial feature. You will also need a telephone pager to complete this retrieval.
  • This is done using a numeric-display pager and another phone that is on the same line as the first phone with the redial feature. Using the two phones and the pager, a call is placed from the second phone to the pager. When the paging terminal beeps for you to enter a telephone number, you press the redial button on the first (or suspect) phone. The last number called from that phone will then be displayed on the pager.
  • Monitor your child's access to all types of live electronic communications (i.e., chat rooms, instant messages, Internet Relay Chat, etc.), and monitor your child's e-mail. Computer-sex offenders almost always meet potential victims via chat rooms. After meeting a child on-line, they will continue to communicate electronically often via e-mail. 
  • What Can You Do To Minimize The Chances Of An On-line Exploiter Victimizing Your  Child? 
    • Communicate, and talk to your child about sexual victimization and potential on-line danger.
    • Spend time with your children on-line. Have them teach you about their favorite on-line destinations.
    • Keep the computer in a common room in the house, not in your child's bedroom. It is much more difficult for a computer-sex offender to communicate with a child when the computer screen is visible to a parent or another member of the household.
    • Utilize parental controls provided by your service provider and/or blocking software. While electronic chat can be a great place for children to make new friends and discuss various topics of interest, it is also prowled by computer-sex offenders. Use of chat rooms, in particular, should be heavily monitored. While parents should utilize these mechanisms, they should not totally rely on them.
    • Always maintain access to your child's on-line account and randomly check his/her e-mail.
    • Teach your child the responsible use of the resources on-line. There is much more to the on-line experience than chat rooms.
    • Find out what computer safeguards are utilized by your child's school, the public library, and at the homes of your child's friends. These are all places, outside your normal supervision, where your child could encounter an on-line predator.
    • Understand, even if your child was a willing participant in any form of sexual exploitation, that he/she is not at fault and is the victim. The offender always bears the complete responsibility for his or her actions.
    • Instruct your children:
        • to never arrange a face-to-face meeting with someone they met on- line;
        • to never upload (post) pictures of themselves onto the Internet or on-line service to people they do not personally know;
        • to never give out identifying information such as their name, home address, school name, or telephone number;
        • to never download pictures from an unknown source, as there is a good chance there could be sexually explicit images;
        • to never respond to messages or bulletin board postings that are suggestive, obscene, belligerent, or harassing;
        • that whatever they are told on-line may or may not be true. 



Script Anti Copy Paste

     Well! This is the solution for anti Copy Paste.
 
1. Login Layout-Edit HTML, check Expand widget templates

2. Find the code </ body> (With Ctrl-F for easier)

3. Add the following script in the code

  </ body> earlier.
<script type='text/javascript'><br />
//<![CDATA[</p>
<p>var message = "That functionality is currently disabled";</p>
<p>function click(e) {<br />
 if (document.all) {<br />
     if (event.button==1) {<br />
        return false;<br />
     }<br />
     if (event.button==2) {<br />
        alert(message);<br />
        return false;<br />
     }<br />
 }<br />
 if (document.layers) {<br />
     if (e.which > 1) {<br />
        alert(message);<br />
        return false;<br />
     }<br />
 }<br />
}<br />
if (document.layers) {<br />
 document.captureEvents(Event.MOUSEDOWN);<br />
}<br />
document.onmousedown=click;<br />
document.oncontextmenu=new Function("alert(message);return false")</p>
<p>document.write(unescape("%3C%53%43%52%49%50%54%20%4C%41%4E%47%55%41%47%45%3D%22%4A%61%76%61%53%63%72%69%70%74%22%3E%3C%21%2D%2D%0D%0A%68%70%5F%6F%6B%3D%74%72%75%65%3B%66%75%6E%63%74%69%6F%6E%20%68%70%5F%64%30%30%28%73%29%7B%69%66%28%21%68%70%5F%6F%6B%29%72%65%74%75%72%6E%3B%64%6F%63%75%6D%65%6E%74%2E%77%72%69%74%65%28%73%29%7D%2F%2F%2D%2D%3E%3C%2F%53%43%52%49%50%54%3E"));</p>
<p>hp_d00(unescape("%3C%53%43%52%49%50%54%20%4C%41%4E%47%55%41%47%45%3D%22%4A%61%76%61%53%63%72%69%70%74%22%3E%3C%21%2D%2D%0D%0A%66%75%6E%63%74%69%6F%6E%20%68%70%5F%6E%65%28%29%7B%72%65%74%75%72%6E%20%74%72%75%65%7D%6F%6E%65%72%72%6F%72%3D%68%70%5F%6E%65%3B%66%75%6E%63%74%69%6F%6E%20%68%70%5F%64%6E%28%61%29%7B%72%65%74%75%72%6E%20%66%61%6C%73%65%7D%3B%66%75%6E%63%74%69%6F%6E%20%68%70%5F%64%65%28%65%29%7B%72%65%74%75%72%6E%28%65%2E%74%61%72%67%65%74%2E%74%61%67%4E%61%6D%65%21%3D%6E%75%6C%6C%26%26%65%2E%74%61%72%67%65%74%2E%74%61%67%4E%61%6D%65%2E%73%65%61%72%63%68%28%27%5E%28%49%4E%50%55%54%7C%54%45%58%54%41%52%45%41%7C%42%55%54%54%4F%4E%7C%53%45%4C%45%43%54%29%24%27%29%21%3D%2D%31%29%7D%3B%66%75%6E%63%74%69%6F%6E%20%68%70%5F%6D%64%28%65%29%7B%69%66%28%65%2E%77%68%69%63%68%3D%3D%31%29%7B%77%69%6E%64%6F%77%2E%63%61%70%74%75%72%65%45%76%65%6E%74%73%28%45%76%65%6E%74%2E%4D%4F%55%53%45%4D%4F%56%45%29%3B%77%69%6E%64%6F%77%2E%6F%6E%6D%6F%75%73%65%6D%6F%76%65%3D%68%70%5F%64%6E%7D%7D%66%75%6E%63%74%69%6F%6E%20%68%70%5F%6D%75%28%65%29%7B%69%66%28%65%2E%77%68%69%63%68%3D%3D%31%29%7B%77%69%6E%64%6F%77%2E%72%65%6C%65%61%73%65%45%76%65%6E%74%73%28%45%76%65%6E%74%2E%4D%4F%55%53%45%4D%4F%56%45%29%3B%77%69%6E%64%6F%77%2E%6F%6E%6D%6F%75%73%65%6D%6F%76%65%3D%6E%75%6C%6C%7D%7D%69%66%28%6E%61%76%69%67%61%74%6F%72%2E%61%70%70%4E%61%6D%65%2E%69%6E%64%65%78%4F%66%28%27%49%6E%74%65%72%6E%65%74%20%45%78%70%6C%6F%72%65%72%27%29%3D%3D%2D%31%7C%7C%28%6E%61%76%69%67%61%74%6F%72%2E%75%73%65%72%41%67%65%6E%74%2E%69%6E%64%65%78%4F%66%28%27%4D%53%49%45%27%29%21%3D%2D%31%26%26%64%6F%63%75%6D%65%6E%74%2E%61%6C%6C%2E%6C%65%6E%67%74%68%21%3D%30%29%29%7B%69%66%28%64%6F%63%75%6D%65%6E%74%2E%61%6C%6C%29%7B%64%6F%63%75%6D%65%6E%74%2E%6F%6E%73%65%6C%65%63%74%73%74%61%72%74%3D%68%70%5F%64%6E%7D%65%6C%73%65%20%69%66%28%64%6F%63%75%6D%65%6E%74%2E%6C%61%79%65%72%73%29%7B%77%69%6E%64%6F%77%2E%63%61%70%74%75%72%65%45%76%65%6E%74%73%28%45%76%65%6E%74%2E%4D%4F%55%53%45%55%50%7C%45%76%65%6E%74%2E%4D%4F%55%53%45%44%4F%57%4E%29%3B%77%69%6E%64%6F%77%2E%6F%6E%6D%6F%75%73%65%64%6F%77%6E%3D%68%70%5F%6D%64%3B%77%69%6E%64%6F%77%2E%6F%6E%6D%6F%75%73%65%75%70%3D%68%70%5F%6D%75%7D%65%6C%73%65%20%69%66%28%64%6F%63%75%6D%65%6E%74%2E%67%65%74%45%6C%65%6D%65%6E%74%42%79%49%64%26%26%21%64%6F%63%75%6D%65%6E%74%2E%61%6C%6C%29%7B%64%6F%63%75%6D%65%6E%74%2E%6F%6E%6D%6F%75%73%65%64%6F%77%6E%3D%68%70%5F%64%65%7D%7D%69%66%28%77%69%6E%64%6F%77%2E%6C%6F%63%61%74%69%6F%6E%2E%68%72%65%66%2E%73%75%62%73%74%72%69%6E%67%28%30%2C%34%29%3D%3D%22%66%69%6C%65%22%29%77%69%6E%64%6F%77%2E%6C%6F%63%61%74%69%6F%6E%3D%22%61%62%6F%75%74%3A%62%6C%61%6E%6B%22%3B%66%75%6E%63%74%69%6F%6E%20%68%70%5F%6E%6C%73%28%29%7B%77%69%6E%64%6F%77%2E%73%74%61%74%75%73%3D%22%22%3B%73%65%74%54%69%6D%65%6F%75%74%28%22%68%70%5F%6E%6C%73%28%29%22%2C%31%30%29%7D%68%70%5F%6E%6C%73%28%29%3B%66%75%6E%63%74%69%6F%6E%20%68%70%5F%64%70%31%28%29%7B%66%6F%72%28%69%3D%30%3B%69%3C%64%6F%63%75%6D%65%6E%74%2E%61%6C%6C%2E%6C%65%6E%67%74%68%3B%69%2B%2B%29%7B%69%66%28%64%6F%63%75%6D%65%6E%74%2E%61%6C%6C%5B%69%5D%2E%73%74%79%6C%65%2E%76%69%73%69%62%69%6C%69%74%79%21%3D%22%68%69%64%64%65%6E%22%29%7B%64%6F%63%75%6D%65%6E%74%2E%61%6C%6C%5B%69%5D%2E%73%74%79%6C%65%2E%76%69%73%69%62%69%6C%69%74%79%3D%22%68%69%64%64%65%6E%22%3B%64%6F%63%75%6D%65%6E%74%2E%61%6C%6C%5B%69%5D%2E%69%64%3D%22%68%70%5F%69%64%22%7D%7D%7D%3B%66%75%6E%63%74%69%6F%6E%20%68%70%5F%64%70%32%28%29%7B%66%6F%72%28%69%3D%30%3B%69%3C%64%6F%63%75%6D%65%6E%74%2E%61%6C%6C%2E%6C%65%6E%67%74%68%3B%69%2B%2B%29%7B%69%66%28%64%6F%63%75%6D%65%6E%74%2E%61%6C%6C%5B%69%5D%2E%69%64%3D%3D%22%68%70%5F%69%64%22%29%64%6F%63%75%6D%65%6E%74%2E%61%6C%6C%5B%69%5D%2E%73%74%79%6C%65%2E%76%69%73%69%62%69%6C%69%74%79%3D%22%22%7D%7D%3B%77%69%6E%64%6F%77%2E%6F%6E%62%65%66%6F%72%65%70%72%69%6E%74%3D%68%70%5F%64%70%31%3B%77%69%6E%64%6F%77%2E%6F%6E%61%66%74%65%72%70%72%69%6E%74%3D%68%70%5F%64%70%32%3B%64%6F%63%75%6D%65%6E%74%2E%77%72%69%74%65%28%27%3C%73%74%79%6C%65%20%74%79%70%65%3D%22%74%65%78%74%2F%63%73%73%22%20%6D%65%64%69%61%3D%22%70%72%69%6E%74%22%3E%3C%21%2D%2D%62%6F%64%79%7B%64%69%73%70%6C%61%79%3A%6E%6F%6E%65%7D%2D%2D%3E%3C%2F%73%74%79%6C%65%3E%27%29%3B%66%75%6E%63%74%69%6F%6E%20%68%70%5F%64%63%28%29%7B%68%70%5F%74%61%2E%63%72%65%61%74%65%54%65%78%74%52%61%6E%67%65%28%29%2E%65%78%65%63%43%6F%6D%6D%61%6E%64%28%22%43%6F%70%79%22%29%3B%73%65%74%54%69%6D%65%6F%75%74%28%22%68%70%5F%64%63%28%29%22%2C%33%30%30%29%7D%69%66%28%6E%61%76%69%67%61%74%6F%72%2E%61%70%70%4E%61%6D%65%2E%69%6E%64%65%78%4F%66%28%27%49%6E%74%65%72%6E%65%74%20%45%78%70%6C%6F%72%65%72%27%29%3D%3D%2D%31%7C%7C%28%6E%61%76%69%67%61%74%6F%72%2E%75%73%65%72%41%67%65%6E%74%2E%69%6E%64%65%78%4F%66%28%27%4D%53%49%45%27%29%21%3D%2D%31%26%26%64%6F%63%75%6D%65%6E%74%2E%61%6C%6C%2E%6C%65%6E%67%74%68%21%3D%30%29%29%7B%69%66%28%64%6F%63%75%6D%65%6E%74%2E%61%6C%6C%26%26%6E%61%76%69%67%61%74%6F%72%2E%75%73%65%72%41%67%65%6E%74%2E%69%6E%64%65%78%4F%66%28%27%4F%70%65%72%61%27%29%3D%3D%2D%31%29%7B%64%6F%63%75%6D%65%6E%74%2E%77%72%69%74%65%28%27%3C%64%69%76%20%73%74%79%6C%65%3D%22%70%6F%73%69%74%69%6F%6E%3A%61%62%73%6F%6C%75%74%65%3B%6C%65%66%74%3A%2D%31%30%30%30%70%78%3B%74%6F%70%3A%2D%31%30%30%30%70%78%22%3E%3C%69%6E%70%75%74%20%74%79%70%65%3D%22%74%65%78%74%61%72%65%61%22%20%6E%61%6D%65%3D%22%68%70%5F%74%61%22%20%76%61%6C%75%65%3D%22%20%22%20%73%74%79%6C%65%3D%22%76%69%73%69%62%69%6C%69%74%79%3A%68%69%64%64%65%6E%22%3E%3C%2F%64%69%76%3E%27%29%3B%68%70%5F%64%63%28%29%7D%7D%66%75%6E%63%74%69%6F%6E%20%68%70%5F%6E%64%64%28%29%7B%72%65%74%75%72%6E%20%66%61%6C%73%65%7D%64%6F%63%75%6D%65%6E%74%2E%6F%6E%64%72%61%67%73%74%61%72%74%3D%68%70%5F%6E%64%64%3B%2F%2F%2D%2D%3E%3C%2F%53%43%52%49%50%54%3E"));</p>
<p>//]]><br />
</script>
4. Store and see the results.
How? Does it work?