Kamis, 31 Mei 2012

Add Floating Social Media Sharing Buttons To Blogger

The Floating Social Media Sharing is a very popular widget on all the top blogs and this is one of the ways to increase the number of times your posts get shared on Twitter, Facebook and other social networks.

This floating social bar has the following options: Facebook Like, StumbleUpon, Twitter Share, Digg This, Google+ and each of them comes with a live counter. You can add more sharing buttons or social bookmarking icons later if you want.

Blogger, WordPress, Facebook, Share

How to add the scrolling social bookmarking bar


Step 1. Log in to your Blogger Dashboard, select your blog and go to Layout 

Step 2. Click on Add A Gadget link


Step 3. From the pop-up window, scroll down and select HTML/Javascript 

Step 4. Copy the code below and paste it inside the empty box.

Step 5. Save the gadget.

The code to copy-paste (updated!):
<style type="text/css">
#social-buttons {
position:fixed;
bottom:15%
margin-left:-721px;
float:left;
border-radius:5px;
-moz-border-radius:5px;
-webkit-border-radius:5px;
background-color:#fff;
padding:0 0 2px 0;
z-index:10;
}
#social-buttons .button-share {
float:left;
clear:both;
margin:5px 5px 0 2px;
}
</style>
<div id='social-buttons' title="Get this from helplogger.blogspot.com">
<div class='button-share' id='like' style='margin-left:7px;'>
<div id="fb-root"></div>
<script>(function(d, s, id) {
  var js, fjs = d.getElementsByTagName(s)[0];
  if (d.getElementById(id)) return;
  js = d.createElement(s); js.id = id;
  js.src = "//connect.facebook.net/en_US/all.js#xfbml=1";
  fjs.parentNode.insertBefore(js, fjs);
}(document, 'script', 'facebook-jssdk'));</script>
<div class="fb-like" data-send="false" data-layout="box_count" data-width="40" data-show-faces="false"></div>
</div>
<br /><div class='sbutton' style="margin-left: 2px;" ><a class='twitter-share-button' data-count='vertical' data-via='Helplogger' expr:data-counturl='data:blog.url' href='http://twitter.com/share' rel='nofollow'>Tweet</a><script src='http://platform.twitter.com/widgets.js'; type='text/javascript'></script>
<br />
<div class='button-share' style="margin-left: 3px;" id='su'>
<script src="http://www.stumbleupon.com/hostedbadge.php?s=5"></script>
</div>
<div class='button-share' id='digg' style='margin-left:3px;width:48px'>
<script src='http://widgets.digg.com/buttons.js' type='text/javascript'></script>
<a class="DiggThisButton DiggMedium"></a>
</div>
<div class='button-share' style='margin-left:3px;' id='gplusone'>
<script type="text/javascript" src="https://apis.google.com/js/plusone.js"></script>
<g:plusone size="tall"></g:plusone>
</div>
<div style="clear: both;font-size: 9px;text-align:center;">Get <a style="color: #3399BB;" href="http://helplogger.blogspot.com/">widget</a></div></div></div>
Customization:
  • Vertical alignment - Change the 15% value of bottom. The code positions the social bar relative to the bottom of your browser window. To fix the distance even when window is resized, specify the value in px (pixels) instead of %.
  • Horizontal alignment - Change the -721px value from margin-left. Negative value pushes the button to the left of the main blog column, positive value pushes it to the right. Increase or decrease the value based on your needs.
  • Twitter setting - Replace Helplogger with your Twitter username
  • Replacing and removing buttons - You can replace existing buttons with your own. Each button is represented by this code:
<div class='sbutton'> BUTTON CODE HERE </div>
    Enjoy!!! :)

    Create A Rollover Image Effect (change image on mouseover)

    The Rollover effect is one in which an image web object changes (swaps itself) on mouse over to another web object (called rollovers) and reverts back to the original image on mouse out. Rollover images are preloaded into the page when it is loading, this ensures that the rollovers are displayed quickly. The onMouseOver and onMouseOut attributes of the link tag are used to make this functional.

    Demo:  Place your mouse over the image below to see its rollover effect


    Making Rollover Effect Image

    You have the following code:

    <a href="URL ADDRESS"><img src="URL OF THE FIRST IMAGE GOES HERE" onmouseover="this.src='URL OF THE SECOND IMAGE GOES HERE'" onmouseout="this.src='URL OF THE FIRST IMAGE GOES HERE'" /></a>

    Change the colored texts as it follows:

    1. URL ADDRESS

    This is the address where somebody will be sent when clicks on the image.
    Example, my blog address: http://www.helplogger.blogspot.com

    2. URL OF THE FIRST IMAGE GOES HERE

    Replace the orange text (two times) with the URL address of the image which will appear before you hover over it.

    3. URL OF THE SECOND IMAGE GOES HERE
    Replace the text in blue with the url of  the image that will appear when the cursor hovers over it.

    Now you can paste your image inside a blog gadget, going to Layout > click on Add a Gadget link (right side) > Select HTML/JavaScript from the pop-up window, then add it to your sidebar.

    You can also add it inside your post by going to New Post > Switch to HTML tab and then paste the code in the empty box.

    That's it. Enjoy ;)

    Senin, 28 Mei 2012

    Stuxnet, Duqu and Flame are all examples of cases where we - the antivirus industry - have failed.

    Flame (aka Flame aka Skywiper) is a massive, complex piece of malware, used for information gathering and espionage. The malware is most likely created by a western intelligence agency or military. It has infected computers in Iran, Lebanon, Syria, Sudan and elsewhere. There seems to be a clear difference in how online espionage is done from China and how it's done from the west. Chinese actors prefer attacks targeted via spoofed emails with boopy-trapped documents attached. Western actors seem to avoid email and instead use USB sticks or targeted break-ins to gain access. Worst part of Flame? It has been spreading for years. Stuxnet, Duqu and Flame are all examples of cases where we - the antivirus industry - have failed. All of these cases were spreading undetected for extended periods of time. More information from: •Budapest University of Technology and Economics's Laboratory of Cryptography and System Security (CrySyS) •Securelist (Kaspersky) •Iran National CERT (MAHER)

    Sabtu, 26 Mei 2012

    Selasa, 22 Mei 2012

    Security Priorities for Banks Gartner's Chuvakin on Mobile, Cloud, Hacktivist Attacks By Tracy Kitten, May 18, 2012. Credit Eligible From mobile and the cloud to DDoS attacks and risks surrounding big data, what should banks and credit unions do now to mitigate exposure? Gartner's Anton Chuvakin offers his top recommendations. Chuvakin, who joined Gartner in 2011, says because most banking institutions have spent far too much time focusing on compliance instead of security, many have missed opportunities to exploit the full potential of the fraud-detection and prevention technologies in which they've investing. "Compliance is meant to drive security, not replace it," Chuvakin says. "Compliance is a motivator, not the end goal." What does Chuvakin recommend? That banking institutions invest in technologies that offer more transactional visibility. Banks and credit unions need systems that can raise red flags when suspicious activity occurs. But for anomalous-behavior detection to be effective, institutions must have adequate data collection, data analysis and skilled people who can filter through all of it. "Having data that flows into the technologies and then having people smart enough to analyze the data is the key," he says. " want to see more people focus on technology and skills in visibility." But it's easy for banking institutions to get ahead of themselves, Chuvakin warns, by trying to master more data than they can handle. "In 90 percent of (breach) cases, the evidence of the intrusion was in the logs or other monitoring technologies," he says. "To me, this means we're not doing enough to get this visibility to collect data ... or nobody is looking at the data." During this interview, Chuvakin discusses: •The dangers of moving too much data to the cloud, and how some organizations may get too comfortable with public cloud environments; •Why the industry must pay more attention to denial of service attacks; •Four steps every banking institution should take now to ensure security. Before Chuvakin joined Gartner, his job responsibilities included security product management, evangelist, research, competitive analysis, PCI-DSS compliance, and SIEM development and implementation. He is the author of "Security Warrior" and "PCI Compliance," and was a contributor to "Know Your Enemy II," "Information Security Management Handbook" and others. He has published dozens of papers on log management, SIEM, correlation, security data analysis, PCI-DSS, and security management. His blog, "Security Warrior," has grown to become one of the most popular in the industry. Chuvakin also has taught classes and presented at security conferences across the world; he recently addressed audiences in the U.S., the U.K., Singapore, Spain, Russia and other countries. He has worked on emerging security standards and served on advisory boards of several security startup companies.

    Kamis, 17 Mei 2012

    EU to impose compulsory cyber defence rules | EurActiv

    EU to impose compulsory cyber defence rules | EurActiv

    sory cyber defence rules

    Published 16 May 2012
    The European Commission is planning to force energy, transport and financial companies to invest more in their cyber security and to report on breaches suffered, two EU officials said.
    “The European Commission will propose by the end of the third quarter of 2012 a new obligation for security breach notifications for the energy, transport, banking and financial sectors,” said an official working at the Commission's digital agenda department.
    The official said that companies have an interest in beefing up their protection against cyber attacks, but that they were not doing enough to defend their infrastructure.
    “When they suffer a security breach, they usually do not report it,” the official explained, saying the Commission was looking at ways of obliging companies to notify those.
    “The obligation to report would worsen the reputational damage suffered by companies which undergo security breaches. This should lead them to invest more in security to lower their vulnerability,” the official said.
    Following the ICT model
    A second official, from the Commission directorate in charge of Justice and Home Affairs, confirmed plans to extend security breach notifications to new industries, other than telecommunication companies and internet firms which in Europe are already subject to reporting obligations.
    The EU directive on e-Privacy states that “in case of a particular risk of a breach of the security of the network, the provider of a publicly available electronic communications service must inform the subscribers concerning such risk.”
    This e-Privacy directive is currently the reference on cyber security, but it is likely to be soon complemented by more stringent rules. At the beginning of the year, the European Commission pushed forward a new legislative proposal to impose reporting obligations on data breaches for ICT firms, on top of the current security breaches.
    Viviane Reding, the EU Justice Ccommissioner who is also in charge of privacy issues, proposed in January a 24-hour reporting obligation for telecoms and Internet companies when they suffer data losses.
    Cooperation needed
    Involving the private sector in the pursuit of stronger cyber security is necessary as it owns 90% of critical infrastructure in the EU, according to Europol, the EU law enforcement agency.
    National and European institutions will also have to increase their cooperation to fight cyber crime. The Commission has recently proposed the establishment of a European cyber crime centre which is expected to become operational in January 2013.
    But cooperation among the myriad of security agencies in the continent is far from guaranteed. “There is enough crime that we do not have to compete for it,” said Troels Ã˜rting of Europol, the designated director of the European cyber crime centre.
    EurActiv.com

    Sabtu, 12 Mei 2012

    Add Facemoods Emoticons To Your Blogger Comments

    Here are some amazingly funny emoticons compatible with your Blogger comments - also with threaded commenting system! If you want to know how to add them, just follow the next steps:

    emoticons, smileys, blogger, tricks

    Step 1. From your Blogger Dashboard, go to Template and click the Edit HTML button


    ...click anywhere inside the code area and press CTRL + F to open the search box:

    Step 2. Type or paste one of the below lines inside the search box, then hit Enter in order to find it:

    • For previous commenting system: 
    <h4 id='comment-post-message'><data:postCommentMsg/></h4>
    • For threaded comments:
    <div class='post-footer-line post-footer-line-3'>

    Step 3. Add the below code just above it

    (for threaded comments, add the code after):
    <b:if cond='data:blog.pageType == "item"'>
    <div style=' width: 450px; text-align: left; border: 1px dashed #0084ce; background: transparent; padding: 10px; color:#000000; font-weight:bold; '>
    <img border='0' src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHVfOzU4S-_HzsAD_nRL5RvB2eI554dDzQ5F_mZCwA6BNSgQmmUR3IxqV2r9AhdXG6FOIU5G-vY2RyXvDS3X3oZpyLOe6Ixl8t6v-2pds6awVLyEW9izLI4lZLvHHGyxVlvXgQOoeRW-_E/s1600/helplogger.blogspot.com(1).gif'/> :a
    &#160;
    <img border='0' src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7UxryQz28TlOguQ6ZWreB9YrXqCWnEpdBA0Ca4N1GJ6eL1mi6aIRVS4oLWrkmz_G605eo8juzWJBQ9RJvWRIqa_gRKNHg0zo_kui8uuSQBrROyv2MwVFlU4_wxU1A06N-Q2g6NM1AWMsa/s1600/helplogger.blogspot.com+(2).gif'/> :b
    &#160;
    <img border='0' src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-v7gQ-IRlfkvztQC6ALXH1c2IAT9XYMpz6SjBjMEhfDPx-sEkZVZEMJ4bK8IHxR98AADFUajve_7jAolPtRGlPr0qK3ViKUUK1_9uM_EjeLpRsEpfm-KJLuOF_FpLvzXrfV-txt-n47br/s1600/helplogger.blogspot.com(3).gif'/> :c
    &#160;
    <img border='0' src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhME3UmAwy14-L9flOgyMIy7rREEsX9qhjRl_0u0fs48x3m4TKIEv0rM2qQ-rtmZQKgsdvdTuf0UV22S6HvWTEVuEowOXBwTsoy6fVzTKV74wjZ_-Qw34tjW9Bl3YkU7Zu6xXmtjtxiqN8m/s1600/helplogger.blogspot.com(4).gif'/> :d
    &#160;
    <img border='0' src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZB47JW9SJ41BDH6x3tehMkJuidcGjwxy18vNr4zlEwa2wMLqTqq0MwtBUTGmCqRK6u6_Bi0Y70pxKvA2jhPUF5uUeucOmWiYkcDwpm-sCN4R1uBaq1VVO5vbtlxu6flFAUUl6sc4SF-3g/s1600/helplogger.blogspot.com(5).gif'/> :e
    &#160;
    <img border='0' src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg87vPrD6Yh0NiP3SveaM-vDUhmgreTJmnhyIzC67FKEREPhncXGqwhhP_EEvE_ilhU3GlMwqhNJV6akF4kI-YWXhyphenhyphenC36IhZ2Qrp8rcr-fzPkcWbETFE_0SRF7_QRzSywmMlV_eFB0gmerf/s1600/helplogger.blogspot.com(6).gif'/> :f
    &#160;
    <img border='0' src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimosoB_xcx-e8TClNHi7vBByVymquGAhPE6jMjsp6yq2xagnMIhvBoJ8tj2y00XkbvfWu2mCmGva-B-p71Ek39hmL7hbuUxE9TMssv5XF7ja7TTomHI3kTyQkX2KAWw02ATbZ7g47YZ94w/s1600/helplogger.blogspot.com(7).gif'/> :g
    &#160;
    <img border='0' src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRs3XJusnKh5xeqFiVBLOe_vkBLDvvwdi2XJyJYG6v4pMGO_M17XOvpsyhr6tD62QPR9rA-MC9rUV8oYrCaDIARxfSRA5uN3bvNwtIhSKSBe7lkjPXg2v8568a4rYrXiugkUlT-kpUj91H/s1600/helplogger.blogspot.com(8).gif'/> :h
    &#160;
    <img border='0' src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1pIK4zHUkIIRVSWYrGwrRxgA5E5eOVl5dLLg2v8ZVSyhBF5kdrHLbX7R9jrjPFOoF1dupN4YOTE-P0KFROH2uZfcr_uzjaFwfjJEVGhdBQpexmPctX30uWAIZClu_fpr9Mrhe35uNy4B_/s1600/helplogger.blogspot.com(9).gif'/> :i
    &#160;
    <img border='0' src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9UtQVpk7gpbnt9eML6Ug2bXT26zDGOPPnhGZ96DEcBzbgxSYnBcxMfL6SaFetLuVu8mDnfWBMrfHgWZf4aPgzQNcendyT9d-ZRNGxPfr7nJG3eg40doQ0n9w3nz-lD1rLYfQkYGrl3EFp/s1600/helplogger.blogspot.com(10).gif'/> :j
    &#160;
    <img border='0' src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRi5QLW5v0hjaY8IUG9V35T0IqjhrzuLJ4SQyX8rahQKx_Hq8E3m7YM755tRjN90AAwXeZFS3hCkx0hKPXBMo6bfJvGboIBCNEjmmNr8YzYNBJhKiZoQRerdueoZJl8svtBIrFQTawcIgS/s1600/helplogger.blogspot.com(11).gif'/> :k
    &#160;
    <img border='0' src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMlcOGIhfFXaY-8AQnWVO9x67EJML7n9i2uIA-mh-ixGtnV0qd-15-FKDhE1c6d7vM3a6Zcu_YJo6WFsXbfO4pCe4lONmtiiFGXQnj6LwxFYVzPzVEuh29zAp_NAJnl9dmDQ2NIiw_s8Tt/s1600/helplogger.blogspot.com(12).gif'/> :l
    &#160;
    <img border='0' src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrWBa7qZyw1gfNhivf3-IWVSBSbvPDigS8xAuhp_e7qa1U5xztwibNveMBIpTBI0oZ56bwI2Sr7HgJ_YvVoFDnF2kjtlD2qQXB_tRA5Xb0y85lvQYIkR-WwoussX2jAbTDjKWaDwRQUbqQ/s1600/helplogger.blogspot.com(13).gif'/> :m
    &#160;
    <img border='0' src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8vPWASRC47yguiF-FUwVJSCa1mVwhg5B0Cc7Wv3fhRT8Ek4tmPAgpk60ZSb1uQaneYKn9kiIljeimtOCP6Hl_WE4SVKo9koVmOky1ddML-wf-6_JOg4IfppgXDd3UXKqVMGUl2oVYJY6c/s1600/helplogger.blogspot.com(15).gif'/> :n
    &#160;
    <img border='0' src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKidy76tN8kj0_dUvaHH6fRkeECYfEfvghCt-RnZ5IJXzk2vZmrhgUxNTTZ0PHNDqgagB44EaO2bDNRfOG6nqga4bP5NzCrWbqJRngSpgrqewJNtuUgzrF2mTKD_aBJAxx35cr06ckQt-T/s1600/helplogger.blogspot.com(16).gif'/> :o
    &#160;
    <img border='0' src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnaPyOQ7eHiq2txsYLcAkFt1uc7p3qBUFM6vhbcnK7RdxajlebAiVYpXmuLMzVmp3GHQ1z3hwIec1XF1-kVcV8K63xm7jXMtJlGQXG87hgRy5Wo6uwMuykqZlakwGfBUriIaNKQ6sq5dcd/s1600/helplogger.blogspot.com(14).gif'/> :p
    &#160;
    <img border='0' src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3yMNdfqUlnT5YJz37mkp3h7mJHoQoR9EFIPypXnjJzHZc0K2vBJqZUf5b0xlgPtJWvVGZR5PWACeCi60_qatTEI5XSzMoDa5VBiNNxf0rIJbitA4hDem-QKFYhG_iHUbh2O4YURc6_K4K/s1600/helplogger.blogspot.com(17).gif'/> :q
    &#160;
    <img border='0' src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjV50Xjh9icBpesj4uBOzDcKagDNjUhMG5HX0x8B1dqo6iGabnOPxnPDEjKaIG35msVUbt4Heg12sffJEu6tjEU3pkgVGPEmDcdLpkSSWi46E0O__TqKE3oI5Kln5dUJ1Q8wVcoCAYCJizV/s1600/helplogger.blogspot.com(18).gif'/> :r
    &#160;
    <img border='0' src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCqsMo9UVAxtFGQqhHlYkjuvCVKqUFK5FLCJjQTXNzZS373ClWdZ4pOU4-KnHSUtxIbR_fo-7FA_j33Ee0xYnHX_-RM3V-dp0cbxjLRTGL_8MvSFrbU89FrbIgEDuBtQ5GujLMSSn5Zt1y/s1600/helplogger.blogspot.com(19).gif'/> :s
    &#160;
    <img border='0' src='https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivfOl9d4SJE_yU_yYHX9pPaL1vhJdyOSHQBqN_zPQhPTWupzaC0xxGeundo_HRxvnD_Dhtgwnbi1AXh6qRiJqASFml0FNV2WplMjl3p8qNMKN8lEoXPLq0D0aX6UAejtXZ0yRsHo9tLUZy/s1600/helplogger.blogspot.com(20).gif'/> :t   <a href='http://helplogger.blogspot.com/2012/05/add-facemoods-emoticons-to-your-blogger.html' style='color: rgb(30, 122, 183); font-size: x-small;'>Add smileys to Blogger + </a>
    </div></b:if>
    Step 4. Now search for this piece of code:
    </body>
    Step 5. And add the following code immediately above it:

    • For previous commenting system:
    <script type='text/javascript' src="http://helplogger.googlecode.com/svn/trunk/facemood emoticons.js"/>
    • For threaded comments: 
    <script type='text/javascript' src="http://helplogger.googlecode.com/svn/trunk/facemood emoticons threaded.js"/>
    Step 6. Save the Template and hopefully, now you can enjoy commenting by adding these cool emoticons.

    Everyone Has Been Hacked. Now What?

    By Kim Zetter Email Author May 4, 2012 | 7:22 pm | Categories: Breaches, Cybersecurity Oak Ridge National Laboratory was hit by a targeted hacker attack in 2011 that forced the lab to take all its computers offline. Photo: Oak Ridge National Laboratory The attackers chose their moment well. On Apr. 7, 2011, five days before Microsoft patched a critical zero-day vulnerability in Internet Explorer that had been publicly disclosed three months earlier on a security mailing list, unknown attackers launched a spear-phishing attack against workers at the Oak Ridge National Laboratory in Tennessee. The lab, which is funded by the U.S. Department of Energy, conducts classified and unclassified energy and national security work for the federal government. The e-mail, purporting to come from the lab’s human resources department, went to about 530 workers, or 11 percent of the lab’s workforce. The cleverly crafted missive included a link to a malicious webpage, where workers could get information about employee benefits. But instead of getting facts about a health plan or retirement fund, workers who visited the site using Internet Explorer got bit with malicious code that downloaded silently to their machines. Although the lab detected the spear-phishing attack soon after it began, administrators weren’t quick enough to stop 57 workers from clicking on the malicious link. Luckily, only two employee machines were infected with the code. But that was enough for the intruders to get onto the lab’s network and begin siphoning data. Four days after the e-mails arrived, administrators spotted suspicious traffic leaving a server. Only a few megabytes of stolen data got out, but other servers soon lit up with malicious activity. So administrators took the drastic step of severing all the lab’s computers from the internet while they investigated. Oak Ridge had become the newest member of a club to which no one wants to belong – a nonexclusive society that includes Fortune 500 companies protecting invaluable intellectual property, law firms managing sensitive litigation and top security firms that everyone expected should have been shielded from such incursions. Even His Holiness the Dalai Lama has been the victim of an attack. *** Last year, antivirus firm McAfee identified some 70 targets of an espionage hack dubbed Operation Shady RAT that hit defense contractors, government agencies and others in multiple countries. The intruders had source code, national secrets and legal contracts in their sights. Source code and other intellectual property was also the target of hackers who breached Google and 33 other firms in 2010. In a separate attack, online spies siphoned secrets for the Pentagon’s $300 billion Joint Strike Fighter project. Then, last year, the myth of computer security was struck a fatal blow when intruders breached RSA Security, one of the world’s leading security companies that also hosts the annual RSA security conference, an august and massive confab for security vendors. The hackers stole data related to the company’s SecurID two-factor authentication systems, RSA’s flagship product that is used by millions of corporate and government workers to securely log into their computers. Fortunately, the theft proved to be less effective for breaking into other systems than the intruders probably hoped, but the intrusion underscored the fact that even the keepers of the keys cannot keep attackers out. Security researcher Dan Kaminsky in his Seattle apartment. Photo: John Keatley Independent security researcher Dan Kaminsky says he’s glad the security bubble has finally burst and that people are realizing that no network is immune from attack. That, he says, means the security industry and its customers can finally face the uncomfortable fact that what they’ve been doing for years isn’t working. “There’s been a deep conservatism around, ‘Do what everyone else is doing, whether or not it works.’ It’s not about surviving, it’s about claiming you did due diligence,” Kaminsky says. “That’s good if you’re trying to keep a job. It’s bad if you’re trying to solve a technical problem.” In reality, Kaminsky says, “No one knows how to make a secure network right now. There’s no obvious answer that we’re just not doing because we’re lazy.” Simply installing firewalls and intrusion detection systems and keeping anti-virus signatures up to date won’t cut it anymore — especially since most companies never know they’ve been hit until someone outside the firm tells them. “If someone walks up to you on the street and hits you with a lead pipe, you know you were hit in the head with a lead pipe,” Kaminsky says. “Computer security has none of that knowing you were hit in the head with a lead pipe.” According to Richard Bejtlich, chief security officer for computer security firm Mandiant, which has helped Google and many other companies conduct forensics and clean up their networks after an attack, the average cyberespionage attack goes on for 458 days, well over a year, before a company discovers it’s been hacked. That’s actually an improvement over a few years ago, he says, when it was normal to find attackers had been in a network two or three years before being discovered. Bejtlich credits the drop in time not to companies doing better internal monitoring, but to notifications by the FBI, the Naval Criminal Investigative Service and the Air Force Office of Special Investigation, who discover breaches through a range of tactics including hanging out in hacker forums and turning hackers into confidential informants, as well as other tactics they decline to discuss publicly. These government agencies then notify companies that they’ve been hacked before they know it themselves. Shawn Henry, the FBI's former top cyber-cop, is gravely warning that corporate hacking is much worse than people think it is. Photo: DoJ But even the FBI took a defeatist view of the situation recently when Shawn Henry, former executive assistant director of the FBI, told The Wall Street Journal on the eve of his retirement from the Bureau that intruders were winning the hacker wars, and network defenders were simply outgunned. The current approaches to fending off hackers are “unsustainable,” Henry said, and computer criminals are too wily and skilled to be stopped. So if hackers are everywhere and everyone has been hacked, what’s a company to do? Kaminsky says the advantage of the new state of affairs is that it opens the window for innovation. “The status quo is unacceptable. What do we do now? How do we change things? There really is room for innovation in defensive security. It’s not just the hackers that get to have all the fun.” Companies and researchers are exploring ideas for addressing the problem, but until new solutions are found for defending against attacks, Henry and other experts say that learning to live with the threat, rather than trying to eradicate it, is the new normal. Just detecting attacks and mitigating against them is the best that many companies can hope to do. “I don’t think we can win the battle,” Henry told Wired.com. “I think it’s going to be a constant battle, and it’s something we’re going to be in for a long time…. We have to manage the way we assess the risk and we have to change the way we do business on the network. That’s going to be a fundamental change that we’ve got to make in order for people to be better secure.” In most cases, the hacker will be a pedestrian intruder who is simply looking to harvest usernames and passwords, steal banking credentials or hijack computers for a botnet to send spam. These attackers can be easier to root out than focused adversaries — nation states, economic competitors and others — who are looking to steal intellectual property or maintain a strategic foothold in a network for later use, such as to conduct sabotage in conjunction with a military strike or in some other kind of political operation. Once a company’s networks have been breached, Bejtlich says his company focuses on finding all of the systems and credentials that have been compromised and getting rid of any backdoors the intruders have planted. But once the attackers have been kicked off the network, there is generally a flood of new attempts to get back into the network, often through a huge wave of phishing attacks. “For the most part, once you’ve been targeted by these guys, you’re now living with this for the rest of your security career,” Bejtlich said. Many companies have resolved themselves to the fact that they’re never going to keep spies out entirely of their network and have simply learned to live with the intruders by taking steps to segregate and secure important data and controls. Henry, who is now president of CrowdStrike Services, a newly launched security firm, says that once companies accept that they’re never going to be able to keep intruders out for good, the next step is to determine how they can limit the damage. This comes down, in part, to realizing that “there are certain pieces of information that just don’t need to reside on the network.” “It comes down to balancing the risks, and companies need to assess how important is it for me to secure the data versus how important is it to continue doing my business or to be effective in my business,” he says. “We have to assume that the adversary is on the network and if we assume that they’re on the network, then that should change the way we decide what we put on the network and how we transmit it. Do we transmit it in the clear, do we transmit it encrypted, do we keep it resident on the network, do we move it off the network?” Bejtlich says that in addition to moving data off the network, the companies that have been most successful at dealing with intruders have redefined what’s trustworthy on their network and become vigilant about monitoring. He says there are some organizations who have been plagued by intruders for eight or nine years who have learned to live with them by investing in good detection systems. Other companies burn down their entire infrastructure and start from scratch, going dark for a week or so while they re-build their network, using virtualization tools that allow workers to conduct business while protecting the network core from attackers. Bejtlich, who used to work for General Electric, said one of the first things he did after being hired by GE was to establish a segmented network for his security operations, so that any intruders who might have already been on the corporate network wouldn’t have access to his security plans and other blueprints he developed for defending the network. “The first thing you’ve got to do is to establish something that you trust because nobody else can get access to it, and then you monitor the heck out of it to see if anybody else is trying to poke around,” he said. “So you go from a posture of putting up a bunch of tools and sitting back, to one of being very vigilant and hunting for the bad guys…. The goal is to find them so quickly that before they can really do anything to you to steal your data, you’ve kicked them out again.” Kaminsky advocates shrinking perimeters to limit damage. “Rather than one large server farm, you want to create small islands, as small as is operationally feasible,” he says. “When you shrink your perimeter you need to interact with people outside your perimeter and figure out how to do that securely” using encryption and authentication between systems that once communicated freely. “It changes the rules of the game,” he says. “You can’t trust that your developers’ machines aren’t compromised. You can’t trust that your support machines aren’t compromised.” He acknowledges, however, that this is an expensive solution and one that not everyone will be able to adopt. While all of these solutions are more work than simply making certain that every Windows system on a network has the latest patch, there’s at least some comfort in knowing that having a hacker in your network doesn’t have to mean it’s game over. “There have been organizations that this has been like an eight- or nine-year problem,” Bejtlich says. “They’re still in business. You don’t see their names in the newspaper all the time [for being hacked], and they’ve learned to live with it and to have incident detection and response as a continuous business process.” Update 5.7.12: To reflect number of days on average, rather than median, that companies have been hacked before discovering breach.

    Minggu, 06 Mei 2012

    The history of encryption

    http://visual.ly/history-encryption

    Chain-Link Confidentiality: A HIPAA-Like Approach To Online Privacy

    Frederic Lardinois May 5, 2012 As we put more of our private information online and entrust it to web services, privacy breaches become almost inevitable. One major problem with online privacy is that there is really no enforceable chain of confidentiality. So when a third-party service makes your information available to another party, things can get complicated. A new paper by Samford University law professor Woodrow Harzog argues that traditional privacy laws aren’t the best ways to protect private information online. Instead, he suggests an approach that’s more like the U.S. HIPAA rules that currently govern how private health information can be shared between your health provider and third parties. The system he proposes would be based on established principles in confidentiality and contract law. Confidentiality law, says Harzog, typically only binds the first recipient of information. Online, that obviously isn’t enough to protect a user’s privacy and most scholars have argued that confidentiality law is simply not suited to deal with online privacy issues. Harzog, however, argues that a HIPAA-like “chain-link confidentiality” regime would be more effective in protecting users’ privacy than current regulations. This system would not just ensure confidentiality between the user and the first service where data is stored, but the obligation of confidentiality would also flow downstream. Under this regime, he writes, “Internet users could then pursue a remedy against anyone in the chain who either failed to abide by her obligation of confidentiality or failed to require confidentiality of a third-party recipient.” Harzog argues that our current privacy regulations are “a patchwork of laws and remedies” and often in conflict with other laws and evolving technologies. It’s also often unclear how “privacy” is actually defined and what, for example, constitutes a “reasonable expectations of privacy.” In Harzog’s view, “traditional privacy remedies are inadequate in the digital age.” Here is what chain-link confidentiality on the Internet would look like in practice: a website that collects your personal information (and that explicitly allow to share your information with other services) would also have to establish a confidentiality contract with any other company it discloses your information to – and those companies would be required to establish the same kind of contract with every subsequent recipient as well. These contracts, of course, could also simply prohibit any further dissemination of your personal information or limit it to certain companies or companies that fulfill certain security requirements. Every web service could, of course, also tweak this contract depending on its needs. In a way, this isn’t all that different from the Creative Commons “Share Alike” provision: depending on the Creative Commons license used – artist can allow others to remix their work, for example, as long as it is then shared under the same license terms as the original work. The chain-link confidentiality approach then would allow for the flow of information, says Harzog, ” by continually re-creating an environment for sharing that accommodates the sender, receiver, and the subject of the personal information.” Even though this isn’t a cure-all – your information, after all, could still leak out or be scraped by others – it’s an interesting way of looking at privacy from a more contractual point of view, especially because it sets up a legal framework for sharing information between services. For the more lawyerly and in-depth discussion of this, take a look at Harzog’s paper here.

    How to Change Default Anonymous Avatar in Blogger Comments

    Earlier, you've seen how you can change the size of the avatars in blogger comments and now I will show you how to change or customize the default avatar of anonymous commenters or Blogger users with no picture on their profiles. While Blogger announced the new threaded commenting system, we can still customize it by adding a jQuery plugin to our template and then replace the default anonymous avatar that can be found on this address: http://img1.blogblog.com/img/anon36.png and the one for blogger users: http://img2.blogblog.com/img/b36-rounded.png ...with our own.

    anonymous, default avatar, blogger blogspot

    Replace the Default Anonymous Avatar on Blogger Comments


    Step 1. Go to Dashboard - Template - click on the Edit HTML button


    ...click anywhere inside the code area and open the template search box by pressing the CTRL + F keys

    Step 2. Type or paste this code in the search box, then hit Enter to find it:
    </body>
    Step 3. Just above the </body> tag, add the following code:
    <script src='http://code.jquery.com/jquery-latest.js'/>
    <script>
    $(&quot;img[src=&#39;http://img1.blogblog.com/img/anon36.png&#39;]&quot;)
    .attr(&#39;src&#39;, &#39;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjagSTzc14eIMxfpeFvriRRuzL3dSDk5qc97ltATE47t3NJ84rkMxgIIQyzp_iqeH2kmUWDI0znxR2TkRrgql5AdG6bIGdMJ1ZuYB1YlwdA3oA6FRt5rUKQhFNWIWiOrVdx8qVuxasL134/s1600/default_avatar.gif&#39;)
    .ssyby(&#39;blank&#39;)
    </script>
    <script src='http://code.jquery.com/jquery-latest.js'/>
    <script>
    $(&quot;img[src=&#39;http://img2.blogblog.com/img/b36-rounded.png&#39;]&quot;)
    .attr(&#39;src&#39;, &#39;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieh363w1F9h4PzmBQG0UHRgkS2hANuRk5i1IFw7jnqbdzDxLk1pSqCsCNO60kcKkhUwwWH4IMFtSQ8vYSM03FtWmmgohVp9vjw_WpiL6HnlOmjtn5Toa_gIblQwmH6IT6ipXC_8YULnS8/s1600/blogger-user.png&#39;)
    .ssyby(&#39;blank&#39;)
    </script>
    Step 4. Save the changes by clicking on the Save Template button

    Changing the default avatar

    For Anonymous users: Replace the code in red with your image address
    For Blogger users: Replace the URL in blue with your own.

    You can choose an avatar from here and then copy the url of it:


    https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjagSTzc14eIMxfpeFvriRRuzL3dSDk5qc97ltATE47t3NJ84rkMxgIIQyzp_iqeH2kmUWDI0znxR2TkRrgql5AdG6bIGdMJ1ZuYB1YlwdA3oA6FRt5rUKQhFNWIWiOrVdx8qVuxasL134/s200/default_avatar.gif


    https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaAXZaGdBpMUDCC6fsvXW37_4VnuLjUdAjNZfUo7DVvKlqmeQU_2fni4PJ-DRMJRatL7Kk_xIfmVxEmjLGHKRHkNmnJZUa1iOE3DCIVzAzyUVI9a1xnH8CdWaipH2mEUbAWSr3nKQZEfA/s1600/facebook.gif


    https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjM7uHf4T6XpVT5iETEMnppU4LlGNyxN1tEN5e2UctUICNQiKdeAd4sBKukSCxWSuvITS7fDA65HyuIrYx6ZEJPuRC_VXsC0yIqiyiOBgp6a4ptECtBH706miPHUh69UJht0xI9-52Hx2c/s1600/anonymous3.png



    https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSA4kIdgA2R-v9QbMba_X1cAPWDT-jvF_IzLsXiVX0DuF_9FRPqEF-kd2ydkGc-rtFlceDLeYzMrI9ufGMg5M2f4O02FViDT0K2wY-5ByuYD7PQQPPQmzwPFW4o8qbPyQaHEto5UGaxXw9/s1600/blogger-user.png

    That's it! If you found this trick useful, please consider sharing it.

    Sabtu, 05 Mei 2012

    How To Change Avatar Size In Blogger Comments

    This simple trick will help you modify the avatars size in Blogger comments whose default size is of 36px... pretty small considering that a lot of sites these days are using much larger avatars. To change the style and size of avatars is very easy - you just need to add the CSS code in your Blogger template that will make size of avatars to have width and height of 64px.


    Step 1. Go to Dashboard - Template - click on the Edit HTML button


    ...click anywhere inside the code area and press CTRL + F to open the blogger' search box

    Step 2. Type or paste this tag inside the search box and hit Enter to find it:
    ]]></b:skin>
    Note: you may need to click on the arrow next to it and then search this tag again

    Step 3. Depending on which comment system you use (with reply/no reply), copy and paste one of the following codes just above it:

    [Works in Blogger threaded comment system]
    .comments .avatar-image-container{
    background-color: rgb(34, 34, 34);
    border:1px solid #ccc;
    margin: 0px 10px 0px 0px;
    padding: 0px 0px 0px 0px;
    width: 64px;
    max-height: 64px;
    }
    .comments .avatar-image-container img{
    margin: 0px 0px 0px 0px;
    padding: 0px 0px 0px 0px;
    max-width: 64px;
    height: 64px;
    }
    [for old blogger commenting system]
    .avatar-image-container{
    border:1px solid #d6d6d6;
    margin-left: -30px;
    -moz-border-radius: 4px;
    background:#fff;
    height:70px;
    min-height: 70px;
    width:70px;
    min-width:70px;
    }
    .avatar-image-container img {
    background: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIKHEQ2paQgWojEQAstQEBoz69SULZNbjZuHv5ryHgywbLWCjp3547yKnZY6nvupv5k9AXw6c8nKQk-IMuseTMBezlz_RS4ldsG7yrRbtl0LZUIOfGFn-Sxwxga9wnHCCjIAS1gJdBrqo/s200/anonymous.jpg);
    background-repeat: no-repeat;
    background-position: center;
    background-size: 100%;
    width:70px;
    min-width:70px;
    height:70px;
    min-height:70px;
    }
    Note: For bigger/smaller avatars, change the values in red. To change the anonymous avatar, replace the URLs in blue with your own. (works only for the old commenting system i.e. that has no reply option)

    Step 4. Cick on the Save template button to apply the changes.

    That's it. Now the Blogger comments avatars should look bigger.

    How to Hide Blogger Sidebar to Display AdSense For Search Results

    When visitors are searching for content on your blog, you have three options to display the search results: opening the results in the same window, in a new window or within your own site using an iframe.

    The best option would be, however, to display the search results within your own site/blog, mainly because you are not sending people off your blog when they are taken to a new page of search results which could be confusing for many because it doesn't look anything like your site or Google. Therefore, displaying the search results within your site, could make it look much more professional and may also increase the page views and the revenue from the ads on the search page.

    A problem that many bloggers are facing is that the page which displays the AdSense for search results must be at least of 800 px wide, so the posting area must be of minimum 800px and there's nothing like this in most of the blogs.
    So, what we will do in this tutorial is to set up the search results to be displayed in a static page (none of other posts or pages will be affected) in which we'll remove the sidebar so that we'll have enough space to make the post/page section of 800px wide. Moreover, we will create a static page designed only for the search results, then create a new AdSense for search in our AdSense account and finally add a small snippet of code top in your Blogger template to hide the sidebar in that specific page.

    Search results span the width of the page with the sidebar hidden:


    Display AdSense For Search Results Within Blogger Page

    Step 1. Create a new static page on your blog, you can give it the title 'Search Results' but leave the content section empty and then Publish the page.

    Step 2. When you publish the page you have the option to add the page to a menu, choose the third option 'No Gadget Link To Pages Manually' click 'Save and Publish'. In case this screen doesn't show, right click on View Page and select Copy Link Address. We will need this URL of the page later when we will create the AdSense for search.

    Step 3. Go To Your AdSense account, then go to My ads tab, select the Search option and Create a New custom search engine. Follow the steps until you come to the Search results option.

    Step 4. Select the 3rd method "on my website using an iframe", then Enter the URL of the page you created into the URL field and continue.


    Step 5. Follow the rest of the set up process and at the end you will be given two pieces of code. The first piece of code is for the actual search bar which you can paste into a Html/JavaScript gadget on your sidebar or wherever you want it. The second piece of code you need to copy and paste it into a new HTML/JavaScript gadget, click on Save, then drag it above the Blog Posts area


    Now that you have your page set up with the search results code and your search bar code in your sidebar, it is time to add a snippet of code to your template to remove the sidebar.

    Adding The Code In Blogger To Change the Results Page Layout

    Step 1. From Your Blogger Dashboard, go to Template and click on the Edit HTML button


    Step 2. Click anywhere inside the code area and press the CTRL + F keys to open the Blogger' search box

    Step 3. Find (CTRL + F) the following piece of code
    ]]></b:skin>
    Step 4. Just below it, paste this code:
    <b:if cond='data:blog.url == &quot;PAGE-URL-HERE&quot;'>
    <style>
    .main-inner .columns {
    padding-left: 0px !important;
    padding-right: 0px !important;
    }
    .main-inner .fauxcolumn-center-outer {
    left: 0px !important;
    right: 0px !important;
    }
    .main-inner .fauxcolumn-left-outer, .main-inner .fauxcolumn-right-outer, .main-inner .column-left-outer, .main-inner .column-right-outer {
    display: none !important;
    }
    </style>
    </b:if>

    Note: Replace PAGE-URL-HERE with the url of the page where the search results will be displayed (the one you have added at the step 4)

    Step 5. Now Save Template and you're done!

    This simple trick allows you not only to hide the sidebar in the search results page, you can as well, hide it on any page you want... just create your page and follow the same steps. It is also recommended to hide the sidebar in Privacy Policy Pages, Contact Pages and on all the non-content-based pages with little content or no content at all.

    Show Blogger Image only in Homepage and Hide it in Post Page


    To hide images/pictures from blogger posts and make them appear only in homepage, we will add just a small piece of CSS code in our template and then use the class "hidepic" each time we want to hide an image.

    Just follow the next steps:

    Step 1. Go to Dashboard - Template - Edit HTML


     Step 2. Click anywhere inside the code area and press the CTRL + F keys to open the search box:

     Step 3. Type or paste this code inside the search box then hit Enter to find it:
    ]]></b:skin>
    Step 4. Paste the following code just below it
    <b:if cond='data:blog.pageType != &quot;index&quot;'>
    <style>
    .hidepic{
    display: none;
    }
    </style>
    </b:if>
    Step 5. Save the Template.

    Now, each time you create a post, first add the picture that you want to hide and then switch to the HTML tab where you'll see the HTML code of the image that you added - it will look something like this:
    <div class="separator" style="clear: both; text-align: center;">
    <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEis6MZ7a0-0k100j7pZGO2kLynmgZo3pcpCF6_ZMD8x29iv9AzLgLWjxVQnuHz5uZXSHSe6sh_moHAM9ncgXt7XglgTmp2Oy6uhFZdv8MyniIfA5o_ZggR6-Sr6A5FS6ZJcI49pyfPdq_o/s1600/fire_bird_by_fhrankee-d32af8v.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEis6MZ7a0-0k100j7pZGO2kLynmgZo3pcpCF6_ZMD8x29iv9AzLgLWjxVQnuHz5uZXSHSe6sh_moHAM9ncgXt7XglgTmp2Oy6uhFZdv8MyniIfA5o_ZggR6-Sr6A5FS6ZJcI49pyfPdq_o/s320/fire_bird_by_fhrankee-d32af8v.png" width="320" /></a></div>

    Note: it should be at the exact location where your image has been added 
    (if the image is at the middle of the text, then the code should be found at the middle)

    Step 6. Replace "separator" with "hidepic" - see the screenshot below:

    If you need more help, please leave a comment below.

    How to Remove Showing Posts With Label in Blogger

    label, blogger, remove, how to

    For any default Blogger layout, the "Showing posts with label" message shows up above the posts each time you click on a label link. As it's a pretty useless and annoying message, many people like to have it removed. If that is your wish, just follow the tutorial below:

    Removing "Showing post with label...show all posts"

    Step 1. Go to Dashboard - Template - Edit HTML (if necessary, click on Proceed button)


    Step 2. Click anywhere inside the template code, then search - using CTRL+F - this code:
    <b:includable id='status-message'>
    After you found it, click on the sideways arrow next to it, to expand the rest of the code.

    Screenshot:

    Step 3. Below is this code that you need to remove - along with the first one, as well:
         <b:includable id='status-message'>
          <b:if cond='data:navMessage'>
          <div class='status-msg-wrap'>
            <div class='status-msg-body'>
              <data:navMessage/>
            </div>
            <div class='status-msg-border'>
              <div class='status-msg-bg'>
                <div class='status-msg-hidden'><data:navMessage/></div>
              </div>
            </div>
          </div>
          <div style='clear: both;'/>
          </b:if>
        </b:includable>

    Screenshot 

     Step 4. Replace it with this one:
    <b:includable id='status-message'>
    <b:if cond='data:navMessage'>
    <div>
    </div>
    <div style='clear: both;'/>
    </b:if>
    </b:includable>

    Step 5. Save the template. Now view your blog and click on some label....there should be no box anymore.

    Jumat, 04 Mei 2012

    Recent Posts Widget with Thumbnails for Blogger/Blogspot

    A few days ago, I posted a tutorial on How to Add a Simple Recent Posts Widget that shows a list with the most recent posts if you would prefer a more minimalist look. In this post, you will see a different way of displaying the Recent Posts on Blogger - this is specially for those who want to show more info like the recent posts excerpt / summary and the posts thumbnails.

    To add this gadget is very easy, just follow these steps below:

    recent posts, blogger widgets

    How to Add the Recent Posts Widget to Blogger

    Step 1. From your Blogger Dashboard, go to Layout > click on Add a Gadget link


    Step 2. From the pop-up window, scroll down and choose HTML/JavaScript


    Step 3. Inside the empty box, add the following code:
    <div class="eggTray">
    <script src="http://helplogger.googlecode.com/svn/trunk/listbadge.js">{"pipe_id":"1a6640e2a78b2c6e736f2220529daae5","_btype":"list",
    "pipe_params":{"URL":"YOUR-BLOG/feeds/posts/default"},
    "hideHeader":"false","height":"500","count": 8 }</script>
    <noscript>Your browser does not support JavaScript!</noscript></div>
    <style type=text/css>
    .eggTray {margin:10px 0px;padding:0px;}
    .ybr li  {border-bottom:0px #cccccc dotted; padding:0px 0px 10px 0px!important;}
    .pipesTitle {padding-top:0px;}
    .pipesDescription {display:true;}
    .ycdr, .ycdr a {color:#999999;}
    .widget .popular-posts ul {padding-left:0;}
    </style>
    Note: 
    - Replace YOUR-BLOG with the url of your site/blog (ex: http://helplogger.blogspot.com) and pay attention to have no forward slash symbol "/" at the end of the url
    - To disable the scroll bar, remove the number 500
    - By default, this widget is set to display a maximum of 8 recent posts. To change this number, replace the number 8 with the number of posts that you want to appear
    - if you want only the posts titles, change true to none and "0" from padding-top:0px with 10

    Step 4. Save your widget. And you're done!

     
    Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Best Web Hosting