How many browsers are out there and do all these browsers show you the same exact site that you had created down to the very pixel?? ..!!

Not everyone in the world uses the same browser you use.Your website may not compatible with all the browsers in this webworld and Your site may contains which are unknown to you!! .. then dont worry!!

Fortunately there are a few websites that are on the web that can help you determine if your website is truly compatible with every browser and showing the errors in your site ... !!

“Browser Shots” is the site which runs on nearly 50 servers with each running a different browser of your site and sending you a snapshot of it.It shows you if there are any quirks in your coding or CSS that you can improve on.

"Markup Validation" service is the site that takes the website URL you submit to it and it will return to you with the specific tag and line that is causing the error.This will definitely save time for you and find the errors not visible to your mind.

In order to enable this feature,you have to navigate the hidden firefox settings..!!
In address bar type:

You will see a textbox and a long list of options and settings. In the "filter" textbox type:


Change the default value to "false". Then type:


The default value is "1". Increase this number to have faster scroll speed in firefox. I prefer "6".

You don't even need to restart firefox to see the changes. They take effect on immediatly.

These are some of the top headline-worthy highlights in the world of unsolved computing crime—cases in which the only information available is the ruin left in their wake.

The WANK Worm (October 1989)

Possibly the first "hacktivist" (hacking activist) attack, the WANK worm hit NASA offices in Greenbelt, Maryland. WANK (Worms Against Nuclear Killers) ran a banner (pictured) across system computers as part of a protest to stop the launch of the plutonium-fueled, Jupiter-bound Galileo probe. Cleaning up after the crack has been said to have cost NASA up to a half of a million dollars in time and resources. To this day, no one is quite sure where the attack originated, though many fingers have pointed to Melbourne, Australia-based hackers.

Ministry of Defense Satellite Hacked (February 1999)

A small group of hackers traced to southern England gained control of a MoD Skynet military satellite and signaled a security intrusion characterized by officials as "information warfare," in which an enemy attacks by disrupting military communications. In the end, the hackers managed to reprogram the control system before being discovered. Though Scotland Yard's Computer Crimes Unit and the U.S. Air Force worked together to investigate the case, no arrests have been made.

CD Universe Credit Card Breach (January 2000)

A blackmail scheme gone wrong, the posting of over 300,000 credit card numbers by hacker Maxim on a Web site entitled "The Maxus Credit Card Pipeline" has remained unsolved since early 2000. Maxim stole the credit card information by breaching; he or she then demanded $100,000 from the Web site in exchange for destroying the data. While Maxim is believed to be from Eastern Europe, the case remains as of yet unsolved.

- Military Source Code Stolen (December 2000)

If there's one thing you don't want in the wrong hands, it's the source code that can control missile-guidance systems. In winter of 2000, a hacker broke into government-contracted Exigent Software Technology and nabbed two-thirds of the code for Exigent's OS/COMET software, which is responsible for both missile and satellite guidance, from the Naval Research Lab in Washington, D.C. Officials were able to follow the trail of the intruder "Leaf" to the University of Kaiserslautern in Germany, but that's where the trail appears to end.

- Anti-DRM Hack (October 2001)

In our eyes, not all hackers are bad guys, often they're just trying to right a wrong or make life generally easier for the tech-consuming public. Such is the case of the hacker known as Beale Screamer, whose FreeMe program allowed Windows Media users to strip digital-rights-management security from music and video files. While Microsoft tried to hunt down Beale, other anti-DRM activists heralded him as a crusader.

- Dennis Kucinich on (October 2003)

As Representative Kucinich's presidential campaign struggled in the fall of 2003, a hacker did what he could to give it a boost. Early one Friday morning the homepage was replaced by the campaign's logo. The page then automatically redirected to a 30-minute video called "This is the Moment," in which the candidate laid out his political philosophy. The Kucinich campaign denied any involvement with the hack, and whoever was responsible was not identified.

- Hacking Your MBA App (March 2006)

Waiting on a college or graduate school decision is a nail-biting experience, so when one hacker found out how to break into the automated ApplyYourself application system in 2006, it was only natural that he wanted to share the wealth. Dozens of top business schools, including Harvard and Stanford, saw applicants exploiting the hack in order to track their application statuses. The still-unknown hacker posted the ApplyYourself login process on Business Week's online forums; the information was promptly removed and those who used it were warned by schools that they should expect rejection letters in the mail.

- The 26,000 Site Hack Attack (Winter 2008) was among the largest of the thousands of sites used by a group of unknown hackers earlier this year to redirect traffic to their own JavaScript code hosted by servers known for malware. The malicious code was embedded in areas of the sites where users could not see it, but where hackers could activate it.

- Supermarket Security Breach (February 2008)

Overshadowed only by a T.J Maxx breach in 2005, the theft of at least 1,800 credit and debit card numbers (and the exposure of about 4.2 million others) at supermarket chains Hannaford and Sweetbay (both owned by the Belgium-based Delhaize Group) in the Northeast United States and Florida remains unsolved more than six months later. Chain reps and security experts are still unclear as to how the criminals gained access to the system; the 2005 T.J.Maxx breach took advantage of a vulnerability in the chain's wireless credit transfer system, but Hannaford and Sweetbay do not use wireless transfers of any sort. Without more information, the difficulty in tracking down those responsible grows exponentially.

- Gets a Redirect (May 2008)

A devious hack doesn't always mean finding a back door or particularly crafty way into a secure network or server; sometimes it just means that account information was compromised. Such was the case earlier this year when a member of the hacker group Kryogeniks gained unauthorized access to's registrar, Network Solutions. The domain name system (DNS) hack altered's homepage to redirect those attempting to access webmail to the hackers' own page (pictured). Spokespeople for Comcast and Network Solutions are still unclear as to how the hackers got the username and password.

1976 - (Apple I)

1977 - (Apple II)
1980 - (Apple III)
1983 - (Apple IIe)
1983 - (Lisa)
1984 - (Macintosh)
1984 - (Apple //c)
1985 - (Apple IIe enhanced)
1986 - (Macintosh Plus)
1987 - (Macintosh SE)
1989 - (Macintosh portable)
1990 - (Macintosh Classic)
1990 - (Macintosh IIsi)
1993 - (color classic)
1993 - (Macintosh Centris)
1994 - (Powerbook 150)
1996 - (Power macintosh)

1997 - (eMate)

1998 - (IMac)

1999 - (IBook G3)

2001 - (Powerbook titanium g4)
2002 - (IMac G4)

2003 - (IBook G4)

2004 - (IMac G5)
2006 - (MacBook)

You may feel sometimes to know how the competitors are excel are doing and what they are doing!! ..

The following are some of the online tools that can help you figure out why some of your competitors are ranking better than you.

You can use these services to benchmark your site performance versus your competitors, where you can study your competitor’s in-links, and assess your goals before starting any campaign.
Statistics include Alexa Taffic Rank, Age of the domains, Yahoo WebRank, Dmoz listings, Feed Count, count of backlinks and number of pages indexed in Search Engines like Google, Yahoo, Msn etc.

1) SeoDigger

You can use this tool to analyze your competitor keywords and know which can be used to find a given domain in Google or MSN.

2)Xinu Returns

Find out how well your site is doing in popular search engines, social bookmarking and other site statistics. Checks PageRank, Backlinks, Indexed Pages, Rankings and more.

3)Check Your IndexRank

IndexRank is a 0-10 metric (higher is better) that uses an algorithm based on Google’s indexing data to determine the indexing rate of a website. It measures the rate at which your site is being indexed, which also translates into the rate at which it is growing.

4)Touch Graph

TouchGraph graphic tools reveals the network of connectivity between websites, as reported by Google’s database of related sites. It gives an interesting view of your site and your competitor’s site relationships.


Compete Site Analytics provide free information to analyze the difference in growth of two or more web sites, including site traffic history and competitive analytics; a list of available promotional codes across thousands of online retailers; and site-specific trust scores based on up-to-the-minute data from Compete and third-party security services.

6)SEO Tool - Rank Checker

To use this tool you enter a URL, Keyword, and what search engine you’d like to search and it will automatically check your rankings and report back. You can use it to check the ranking for your competitors and report back to you.


Website Grader is a free seo tool that measures the marketing effectiveness of a website. It provides a score that incorporates things like website traffic, SEO, social popularity and other technical factors. The software will provide a competitive analysis for websites of your competitors.


Backtags allows users to assess, analyze and rank the popularity of any website on leading social bookmarking sites, identify tags used to describe websites, rank websites according to tag/user popularity and compare and rank competitors.

9)Domain Stats Tool

This tool helps you get all kind of statistics of your competitor’s domains. The statistics include Alexa Taffic Rank, Age of the domains, Yahoo WebRank, Dmoz listings, count of backlinks and number of pages indexed in Search Engines like Google, Yahoo, Msn etc.


Help you find which keywors your competitrs are using. Increase your Ad Campaign revenue by finding the most profitable keywords.

11)SEO for Firefox

SEO for Firefox pulls in many useful marketing data points to make it easy get a more holistic view of the competitive landscape of a market right from the search results. In addition to pulling in useful marketing data this tool also provides links to the data sources so you can dig deeper into the data.

12)Blog Juice Calculator

It’s a fun tool that allows you to compare your blog to other’s based on: rss subscribers, Alexa, and Technorati rank and links.

13)Feed Compare

A free web application that you can use for comparing FeedBurner feeds. You can use Feed Compare to compare your feeds against up to three other feeds. All you have to do is input the name of your feed, and then the name of your competitors feeds.


An open internet ratings service.

15)Spider Test

Shows the source code of a page, all outbound links, and common words and phrases.

16)Joost Link Analysis

This Firefox extension gives you a bit more information when opening pages, it gathers the PageRank for the linking page, the anchor text used on the link, and checks whether the link is nofollowed or not.

17)Myriad Search

A nice tools that search all 4 major search engines at the same time: Google, yahoo, Ask Jeeves and MSN.

18)Keyword Difficulty

You can use this tool for multiple domain check-ups for Google Page Rank and the Alexa Ranking.

Add this topic to :