Showing posts sorted by date for query Virtual Box. Sort by relevance Show all posts
Showing posts sorted by date for query Virtual Box. Sort by relevance Show all posts

Red Hat Enterprise Linux 7 Beta Arrives! Download Now And You Can Win $500

Red Hat Enterprise Linux (RHEL) 7 Arrived With Expanded Container Support, Performance Profiles, XFS As the Default Filesystem & Many More. 
We have just spent a less than a month time after the release of Red Hat Enterprise Linux 6.5 made available globally, yet again the American multinational software company, leading the world for open-source software has announced the availability of a first public beta release of Red Hat Enterprise Linux (RHEL) version 7. Based on Fedora 19 and the upstream Linux 3.10 kernel, Red Hat Enterprise Linux 7 will provide users with powerful new capabilities that streamline and automate installation and deployment, simplify management, and enhance ease-of-use, all while delivering the stability that enterprises have come to expect from Red Hat. This further solidifies Red Hat Enterprise Linux's place as the world's leading Linux platform and a standard for the enterprise of the future. Whether rolling out new applications, virtualizing environments or scaling the business with cloud, Red Hat Enterprise Linux 7 delivers the keystone to IT success. The beta release of Red Hat Enterprise Linux 7 adds value to new and existing IT projects across industries by adding key capabilities to improve critical but often cumbersome IT tasks like virtualization and storage while offering a clear pathway to the open hybrid cloudIn their official Red Hat Enterprise Linux YouTube channel, Red Hat posted a short video where you can hear what the team at Red Hat has to say about the next-generation of the world’s leading Linux platform.

Red Hat Enterprise Linux 7 Beta showcases hundreds of new features and enhancements, including: 
  • Linux Containers - Enabling applications to be created and deployed in isolated environments with allocated resources and permissions.
  • Performance Management – Using built in tools, you can optimize performance out-of-the-box.
  • Physical and Hosted In-place Upgrades - In-place upgrades for common server deployment types are now supported. Additionally, virtual machine migration from a Red Hat Enterprise Linux 6 host to a Red Hat Enterprise Linux 7 host is possible, without virtual machine modification or downtime.
  • File Systems – File systems continue to be a major focus of development and innovation.
    • XFS is now the default file system, supporting file systems up to 500TB
    • ext4 file systems are now supported to 50TB and include block sizes up to 1MB
    • btrfs file systems are now available to test
  • Networking – Enhanced networking configuration and operation. Added support for some of the latest networking standards, including:
    • 40Gb Ethernet support
    • Improved channel bonding
    • TCP performance improvements
    • Low latency socket poll support
  • Storage – Expanded support for enterprise level storage arrays. Improved scalable storage stack for deployments that are less disk intensive. Improved storage management for heterogeneous storage environments.
  • Windows Interoperability – Bridge Windows™ and Linux infrastructure by integrating SAMBA 4.1 with existing Microsoft Active Directory domains. Or, deploy Red Hat Enterprise Linux Identity Management in a parallel trust zone with Active Directory.
  • Subsystem Management – Simplified configuration and administration with uniform management tools for networking, storage, file systems, performance, identities and security. Leveraging the OpenLMI framework, enables use of scripts and APIs to automate management.
To know deeply about the hot features and enhancement of RHEL 7 beta 1, click hereI am quite sure that, after going through with the above description, all of you are very much excited to grab this brand new beta of RHEL 7. Like the previous beta release, this time also The Red Hat Enterprise Linux 7 beta has been made available to Red Hat customers, partners, and members of the public. For further information and to access the beta click here. Last but not least, with this release Red Hat also calls for an very interesting competition, where you can participate & win $500 while telling Red Hat, what interests you most in RHEL 7 beta. So what are you waiting for, lets download RHEL 7 and explore it. 



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Whonix -Anonymous Operating System Based on Debian/GNU Linux & Tor

Whonix -Anonymous Operating System Based on Debian/GNU Linux & Tor 

Whonix, which is earlier called TorBOX or aos; now been reintroduced with a new style. This time we got a complete anonymous general purpose Operating System based on Virtual Box, Debian GNU/Linux and Tor.  According to the project wiki page - in Whonix IP and DNS leaks are impossible. Not even malware with root rights can find out the user's real IP/location. This is because Whonix consists of two virtual machines. One machine solely runs Tor and acts as a gateway, which we call Whonix-Gateway. The other machine, which we call Whonix-Workstation, is on a completely isolated network. Only connections through Tor are possible. 

We request our reader to See Security for a more comprehensive description, security features and threat model. You can even go through with full change log and also download the source code from github

Key Features:- 

  • Adobe Flash anonymously
  • browse the web anonymously
  • Anonymous IRC
  • Anonymous Publishing
  • Anonymous E-Mail with Mozilla Thunderbird and TorBirdy
  • Add a proxy behind Tor (Tor -> proxy)
  • Based on Debian GNU/Linux.
  • Based on the Tor anonymity network.
  • Based on Virtual Box.
  • Can torify almost any application.
  • Can torify any operating system
  • Can torify Windows.
  • Chat anonymously.
  • Circumvent Censorship.
  • DNSSEC over Tor
  • Encrypted DNS
  • Full IP/DNS protocol leak protection.
  • Hide the fact that you are using Tor/Whonix
  • Isolating Proxy
  • Java anonymously
  • Javascript anonymously
  • Location/IP hidden servers
  • Prevents anyone from learning your IP.
  • Prevents anyone from learning your physical location.
  • Private obfuscated bridges supported.
  • Protects your privacy.
  • Protocol-Leak-Protection and Fingerprinting-Protection
  • Secure And Distributed Time Synchronization Mechanism
  • Security by Isolation
  • Stream isolation to prevent identity correlation through circuit sharing
  • Virtual Machine Images
  • VPN/Tunnel Support
  • Whonix is produced independently from the Tor (r) anonymity software and carries no guarantee from  The Tor Project about quality, suitability or anything else.
  • Transparent Proxy
  • Tunnel Freenet through Tor
  • Tunnel i2p through Tor
  • Tunnel JonDonym through Tor
  • Tunnel Proxy through Tor
  • Tunnel Retroshare through Tor
  • Tunnel SSH through Tor
  • Tunnel UDP over Tor
  • Tunnel VPN through Tor
To Download Whonix-0.4.5 Click Here. Before download please note that Whonix is produced independently from the Tor anonymity software and carries no guarantee from The Tor Project about quality, suitability or anything else. 








SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Windows 8 Consumer Preview & Windows Server 8 Beta By Microsoft (Freely Downloadable)

Microsoft Released Windows 8 Consumer Preview & Windows Server 8 Beta (Freely Downloadable)
A double boom for Windows lovers. Software giant Microsoft has officially released the Consumer Preview Windows 8 & Windows Server 8 Beta.
Windows 8 Consumer Preview :-
The Windows 8 Consumer Preview offers a more robust experience for testing the world's most popular operating system and is available to the widest range of people yet following the initial release of the Windows 8 Developer Preview late last year. The Developer Preview received more than 3 million downloads.
"With Windows 8, we reimagined the different ways people interact with their PC and how to make everything feel like a natural extension of the device, whether using a Windows 8 tablet, laptop or all-in-one," said Steven Sinofsky, president of the Windows and Windows Live Division at Microsoft. "The Windows 8 Consumer Preview brings a no-compromises approach to using your PC."
The test "beta" version of the revamped system was introduced at the Mobile World Congress in Barcelona, the planet's largest cell phone trade show, and borrows some of the look of Microsoft's Windows Phone 7 software for Windows 8. Windows 8 doesn't have the traditional "Start" menu, and applications are spread across a mosaic of tiles in a design Microsoft calls "Metro" -- seen as an attempt by the company as a scramble to preserve its market share. And executives said it powers up on PCs in eight seconds, much faster than the previous version.
What is New In Windows 8 Consumer Preview :-
  • Broad range of product changes and improvements. Since the Developer Preview in September, designed to preview the programming platform, Windows 8 has progressed across every dimension. From completing the user experience for touch, keyboard and mouse to refining the development platform, the Consumer Preview improves performance, quality and reliability across all subsystems.
  • With the added features, it represents a more complete view of the capabilities of Windows 8. Windows Store with new apps. The Windows 8 Consumer Preview marks the beta opening of the Windows Store, which is filled with a variety of new Metro style apps from both third-party developers and Microsoft. During the Consumer Preview, these apps are available to try and experience at no cost to users. The Windows Store will offer personalised recommendations, and Windows 8 gives users the ability to take their apps and settings with them across multiple PCs, making it easy to discover and try new apps while offering developers the greatest opportunity of any platform.
  • Connecting to the cloud across Windows-based PCs and Windows Phone 7. The Windows 8 Consumer Preview offers seamless integration with the content people care about across their Web services. An optional additional sign-on with a Microsoft account provides access to a host of features, including the ability to roam all settings, use cloud storage, communicate with email, calendar and contacts, and connect to a broad range of services. Your connection to the cloud works across your Windows-based PCs and your Windows 7 phones.
  • Internet Explorer 10 Platform Preview 5. The best way to experience the Web on Windows is with Internet Explorer 10. The browser has been re-imagined to create a new experience designed specifically for Windows 8 devices. It provides an edge-to-edge user interface that is all about less browser and more Web. Fast and fluid, Internet Explorer is hardware-accelerated to enable Web performance.
  • Preview of new hardware capabilities. At the event, Microsoft also showcased Windows 8 running on a wide range of new x86- and ARM-based reference hardware. This hardware will be available to select developers for trial and testing as previously announced.
Additional details can be found on the official website of Microsoft Windows. Also Microsoft makes Windows 8 Consumer Preview is made available for free Download

Windows Server 8 Beta :- 
The beta of Windows Server 8 is now available for IT professionals and software developers around the world to download. In the Windows Server official Blog Bill Laing, Corporate Vice President of Microsoft Corporation Said - In September we introduced Windows Server “8” with a preview to help developers and hardware partners prepare new and existing applications, systems and devices. The response from that community, along with hundreds of customers in our early adopters program, has been incredibly positive. A common theme of feedback has been how broad and deep the new capabilities are. Now is the time for you, IT professionals in organizations of all sizes, to get your hands on this new release, discover the new capabilities and contribute to the development of what we call the cloud-optimized OS.
I’ll highlight in this post just a few examples of new capabilities that you’ll want to explore. With the new Hyper-V we are taking virtualization above and beyond to provide a multi-tenant platform for cloud computing. For example, with Hyper-V Network Virtualization you can create virtual networks so different business units, or even multiple customers, can seamlessly share network infrastructure.  You will be able to move virtual machines and servers around without losing their network assignments. In Windows Server “8” we are delivering high availability and disaster recovery through software technology on much more cost effective hardware. For example, with File Server Transparent Failover you can now more easily perform hardware or software maintenance of nodes in a File Server cluster by moving file shares between nodes with little interruption to server applications that are storing data on those file shares. We’re also delivering a tremendous amount of new capabilities for multi-machine management and automation. You will want to explore the dramatic new improvements to Server Manager, as well as the new Windows PowerShell. With 2,300 commandlets provided out of the box, Windows PowerShell allows you to automate everything you can do manually with the user interface. And, with technologies like Intellisense, we’ve made it very easy for you to master all of that power. Additionally, Windows Server “8” provides a powerful server application platform that enables you to develop and host the most demanding of application workloads. For example, with .NET Framework 4.5 you can take advantage of new asynch language and library support to build server and web applications that scale far beyond what other platforms provide. Our new IIS 8 web server provides better security isolation and resource sand-boxing between applications, native support for web sockets, and the ability to host significantly more sites on a server.

For Additional Information & To Download Windows Server 8 Beta Click Here


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

John the Ripper 1.7.9 Released



John the Ripper version 1.7.9 released & available for download. John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes.

Official change log for John the Ripper 1.7.9 :-

  •  Added optional parallelization of the MD5-based crypt(3) code with OpenMP.
  •  Added optional parallelization of the bitslice DES code with OpenMP.
  •  Replaced the bitslice DES key setup algorithm with a faster one, which significantly improves performance at LM hashes, as well as at DES-based crypt(3) hashes when there’s just one salt (or very few salts).
  • Optimized the DES S-box x86-64 (16-register SSE2) assembly code.
  • Added support for 10-character DES-based tripcodes (not optimized yet).
  • Added support for the “$2y$” prefix of bcrypt hashes.
  • Added two more hash table sizes (16M and 128M entries) for faster processing of very large numbers of hashes per salt (over 1M).
  •  Added two pre-defined external mode variables: “abort” and “status”, which let an external mode request the current cracking session to be aborted or the status line to be displayed, respectively.
  •  Made some minor optimizations to external mode function calls and virtual machine implementation of John the Ripper.
  • The “–make-charset” option now uses floating-point rather than 64-bit integer operations, which allows for larger CHARSET_settings in params.h.
  • Added runtime detection of Intel AVX and AMD XOP instruction set extensions, with optional fallback to an alternate program binary.
  • In OpenMP-enabled builds, added support for fallback to a non-OpenMP build when the requested thread count is 1.
  • Added relbench, a Perl script to compare two “john –test” benchmark runs, such as for different machines, “make” targets, C compilers, optimization options, or/and versions of John the Ripper.
  • Additional public lists of “top N passwords” have been merged into the bundled common passwords list, and some insufficiently common passwords were removed from the list.
  •     Many minor enhancements and a few bug fixes were made.



To Download John the Ripper 1.7.9 Click Here


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Symantec Web Gateway 5.0 (Malware Protector)


Symantec Web Gateway protects organizations against multiple types of Web-borne malware, prevents data loss over Web and gives organizations the flexibility of deploying it as either a virtual appliance or on physical hardware. Powered by Insight, Symantec’s innovative reputation technology, Web Gateway relies on a global network of over 175 million of users to identify new threats before they cause disruption in organizations.

Key Features:-

  • Backed by Symantec Global Intelligence Network
  • Powered by Symantec Insight Technology
  • Integrates Award-winning Symantec AntiVirus engine
  • Seamless integration with Symantec Data Loss Prevention
  • Application control capabilities
  • URL filtering with flexible policy setting
  • Virtual or physical appliance deployment option
  • SSL Decryption capabilities
  • Multiple layers of malware protection

Key Benefits:-

1. Protection

  • Backed by Symantec’s Global Intelligence Network with real time updates to bolster protection
  • Integrates Symantec’s Award-winning AntiVirus engine
  • Powered by Symantec Insight providing proactive protection against new, targeted, or mutating threats

2. Control

  • Integration with Symantec Data Loss Prevention Network Prevent for Web allows for a robust Web and Data Loss prevention solution from a single vendor
  • Application controls provides administrators with multiple policy settings ensuring users are given access to applications which adhere to company guidelines
  • URL filtering list gives administrators ability to monitor, block, or allow access to over 100+ million sites organized within 62 different categories

3. Management

  • Multiple deployment options give customers ability to deploy Web Gateway as a physical appliance, virtual appliance, or a combination of both
  • Powerful reporting capabilities with out of the box reports and administration through a secure browser with a simple dashboard view
  • Proxy and caching capability meeting unique needs of customer network requirements

To Download the the Trail Version Click Here

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

John the Ripper 1.7.8



John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types commonly found on Unix systems, as well as Windows LM hashes.



What is new in John the Ripper 1.7.8 :-


The bitslice DES S-box expressions have been replaced with those generated by Roman Rusakov specifically for John the Ripper.  The corresponding assembly
code for x86 with MMX, SSE2, and for x86-64 with SSE2 has been re-generated. For other CPUs and for AVX/XOP, C compilers do a reasonably good job of generating the code from the supplied C source files (with intrinsics where relevant).  The S-box expressions that we were using before had a 21% larger gate count, so theoretically this could provide a 21% speedup.  In practice, though, a 12% to 14% speedup at DES-based crypt(3) hashes is typical. This effort has been sponsored by Rapid7
Corrected support for bcrypt (OpenBSD Blowfish) hashes of passwords containing non-ASCII characters (that is, characters with the 8th bit set). Added support for such hashes produced by crypt_blowfish up to 1.0.4, which contained a sign extension bug (inherited from older versions of John). The old buggy behavior may be enabled per-hash, using the “$2x$” prefix.
The external mode virtual machine’s performance has been improved through additional multi-op instructions matching common instruction sequences
(assign-pop and some triple- and quad-push VM instructions were added).
A few minor bug fixes and enhancements were made.


This release comes with an 17% improvement in gate count for the Data Encryption Standard (DES) algorithm by generating different S-box expressions targeting both typical CPUs with only basic instructions and CPUs/GPUs that have “bit select” instructions.


Download John the Ripper v1.7.8  HERE

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

GNOME 3.0 giving desktop Linux a new look


With its new GNOME Shell interface, the GNOME Foundation - which has overseen the development of the default graphical environments for Linux- and Unix-based operating systems from Red Hat, Novell, Canonical, Sun Microsystems, Oracle and others - has diverged from the consistent look and feel that marked its namesake desktop environment for years. GNOME Shell represents a new desktop approach intended to make applications easier to access, limit workspace distractions, and make better use of modem desktop and notebook hardware. Canonical, for its part, has broken ranks with GNOME by opting to not participate in GNOME Shell, instead developing for Ubuntu a separate interface, Unity. Unity is rooted in many of the same components and is designed with many of the same goals as GNOME, albeit with different implementation details. I've been testing both interfaces throughout their development and in their finished versions: I tested GNOME Shell in the beta release of Red Haf s Fedora 15, and Unity in the shipping version of Ubuntu 11.04. 1 found each interface promising.
Each does a solid job of streamlining notification messages and staying out of the way of active applications. With that said, both will require users to spend some time adapting, and the enhanced hardware requirements of each will prove troublesome in certain scenarios.
In particular, in virtualized or thin-client style deployments, where hardware acceleration for graphics isn't available, these desktop environments must fall back to their earlier incarnations. However, there's time for users and implementers to adjust to GNOME Shell and Unity, as the operating systems shipping these environments are aimed at Linux enthusiasts and early adopters.  The next Long Term Support version of Canonical's Ubuntu is set to ship a year from now, with an October release of the OS inbetween to address usability and hardware fallback issues. A 2D version of Unity is already available in the Ubuntu repositories.  As for GNOME Shell, it's not clear when the new interface will make its way into the enterprise operzting systems from Red Hat, Novell or Oracle. GNOME Shell The new GNOME environment starts users off with a blank desktop that seems to serve only as a sort of wallpaper for one's computer: There are icons to interact with, and if you store files in the "Desktop" folder, they don't show up on the desktop. Across the top of the screen, there's a panel with date and time, volume control, network status, power manager, and a small settings and log-in button. Moving the cursor to the upper left side of the screen brings the environment to life, pulling up a desktop overlay, with a panel containing application links to the left and a virtual desktops panel to the right. Also on the right is a search box that I could use to locate applications on my test system. Moving the cursor to the bottom right of the screen pulls up a second panel, where applications that typically stay running in the system tray live. For instance, once opened, Fedora's chat application lives in this bottom panel. When new instant messages come in, a notification window pops up from the panel with the message text. On my test system, I could respond to instant messages from this notification window. After opening an application, I noticed that application windows lack "maximize" or "minimize" buttons, but I could access these commands by right-clicking on the title portion of the window. For applications such as the instant messenger client, clicking the "dose" button serves the same purpose as minimizing; the bottom panel provides a place to reopen the minimized application. Ubuntu Unity Ubuntu's new Unity interface departs a bit less dramatically from the GNOME 2.x look and feel. For instance, files saved to the desktop still show up there, and the typical assortment of panels, menus and window buttons remains, although they have been shifted around somewhat. Where the previous Ubuntu interface sported panels at the top and bottom of the display, Unity ships with an application launcher panel at the left. A combination application menu and status indicator panel appears across the top of the display. By default, Ubuntu application menus follow the Apple OS X global menu convention: The menu of the active, foreground application appears across the top of the display. I'm not a fan of this menu configuration, so I was pleased to find that if s possible to revert to the previous menu behavior.
As with GNOME Shell, Unity taps search for locating and launching applications installed on one's system. However, Unity also suggests applications that are available for installation from Ubuntu's software repositories. Top: Ubuntu Unity, like GNOME Shell, relies on search for locating desktop applications and data. Bottom: In GNOME Shell, the bottom panel hosts system notifications, such as incoming instant messages. 

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

VirtualBox 4.0.6 is now Available



VirtualBox is a general-purpose full virtualizer for x86 hardware, targeted at server, desktop and embedded use. Now Oracle Virtual Box 4.0.6 is available to download.




Download VirtualBox 4.0.6

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

The World's Safest Browser: BitBox



There is no such thing as an entirely secure browser. Let's be realistic: You will always need a good portion of common sense and Internet smarts to avoid nasty attacks hijacks.

However, if you are paranoid about security, there is one browser that will reliably protect you from virtually all threats. It's a browser you already know: Firefox 4.0.1. Well, a boxed version of Firefox 4.0.1.
I am not exactly an adventurous Internet user as far as the dark corners of the web are concerned. Just I am not the kind of person to enjoy the silence in a dark alley in Chicago's south suburbs after dawn, I typically avoid websites I don't generally trust. I have had my fair share of spyware, trojans and other malware that caused me quite a bit of headache in the past and I am just more cautious than I was 10 years ago. Yet, that might change. I have just discovered a bulletproof wrapper for Firefox and, at least for now, I don't care that much anymore what is happening below the content the browser shows. There might be lots of malware and I really don't care anymore.
The reason is that I have started using BitBox as my browser for my general work-related tasks. BitBox is essentially a heavily armored version of Firefox 4.0.1 that is encased in Oracle's VirtualBox virtual machine (VM) environment that houses a secured Debian 6 Linux OS. That sounds relatively complicated, but once it is installed, this secure version of Firefox works just like a regular version of the browser. The difference is that it runs in a virtualized environment that is separate from your Windows XP/Vista/7.

The upside clearly is that you are dealing with a self-contained package. If you click on malicious malware, the usual EXE files cannot be executed in your Linux VM. You can download files, but they will not explicitly affect your Windows system and need to be manually moved out of the VM, if you have connected the drives. malware that infects Firefox during your session is automatically deleted the next time you start BitBox, as it always starts with its default configuration in the way it was installed. However, phishing attacks that target your personal data and may trick you in providing critical information will still require some common sense not to do so and will not protect you from the effects of such actions.
There are a few downsides. First, it is a hefty 990 MB download and the installed software will require almost 2 GB of space, as there is a need for Oracle's VirtualBox that is included in the package as well as a Debian 6 installation. Since the software is set back to a default level at every time it starts, it is not the most convenient browser to be used on an every day basis for the consumer. The deal breaker is its language. The software was developed for the German government and while it is available as a free download, it is only available in German. Unless you have basic knowledge of German, the installation will be a hurdle too high to overcome and even then it may be rather uncomfortable to be generally used.
The installation of the entire package is documented via PDF file and is somewhat straight forward, but some knowledge about virtual machines and virtualization in general does help when the individual components of the software are installed. In the end, you really want to know what is happening on your PC and you would want to know what effects a configured virtual drive on your PC has. Other than that, I was able to install BitBox within 15 minutes, once it was downloaded. The only criticism I would have is that developer Sirrix is not using the most recent version of Oracle's Virtual Box software (4.04 vs. 4.06). Custom configuration options include a specific download folder as well as a separate malware scanner as well as random root passwords for the virtual machine and proxy settings. During the installation, the software installs a Linux guest (Firefox) inside Virtual Box. Typically you would run the software form within VirtualBox, but Sirrix has managed to trim down the entire process to a single icon on the desktop.
I briefly mentioned it - this is not a browser to get deeply emotional about and discuss its performance features, but the concept is very compelling as far as browser safety is concerned. Plain browsing tasks make a lot of sense in such a package. In fact, I wonder, why such versions aren't offered by Mozilla and Google as well as Opera and Microsoft by default. 

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...