Translate

my tweets not appear in search,my tweets is not searched ,Your Tweets Not Appearing in Twitter Search,tweets missing from search

my tweets not appear in search,my tweets is not searched ,Your Tweets Not Appearing in Twitter Search,tweets missing from search

My Tweets or Hashtags Are Missing from Search! 

Are you not seeing some of your Tweets in Twitter Search? This page will help you figure out why!

Are Any of your Tweets in search?

First, please check to see if any of your Tweets are in search. Here's how:
  1. Go to Twitter Search and
  2. Type "from:username" into the search box, whereas 'username' is our username.
  3. Search for your Tweets.
For example, here's how @palstu searched for her Tweets:
 Twitter Search for palstu account


If your Tweets are showing up here, then your account is in Twitter Search! Yay! If only some of your Tweets appear, or, you're missing a few tweets, don't fret; we're working to get as many Tweets into Twitter Search as possible.
Due to resource constraints, not every tweet can be indexed in Twitter Search. Our engineers are always working to index more updates, but we can't force individual, missing Tweets into search. Rest assured that your followers will still see all your updates and @replies, and we'll update on this page as we improve this issue.

What if none of your tweets appear in search?

There are a few reasons why all your tweets might not be missing from public search:
  1. Your tweets aren't recent: We only index tweets for about 6 days. If your most recent tweet is older than that, please tweet again and check.
  2. Your account is private: Private or "protected" accounts do not appear in search. Learn more about protected accounts here.
  3. Your account is new, or you recently changed your username: It can take a few days for new and updated accounts to be indexed by search.
  4. Your email is bouncing: If you log in and see a big red warning when you're at twitter.com that says your email address is having delivery issues, please take the steps to fix it! We want to show you in search, but we need you to fix your email first (see Screenshot 2 below).
  5. You are being filtered out of search due to a quality issue: In order to provide the best search experience for users, Twitter automatically filters search results for quality. This Search Quality help page has information why accounts are filtered from search
  6. You are missing because of current resource constraints: Right now, some users may not be seeing their Tweets because of resource constraints. This is more likely affecting you if you're a new user (with an account less than a couple of weeks old). Our search engineers are working on this known issue, and your Tweets should start showing up in search soon!

my tweets not appear in search,my tweets is not searched ,Your Tweets Not Appearing in Twitter Search,tweets missing from search

Malwarebytes Anti-Malware | Malwarebytes download |Malwarebytes free download |Malwarebytes free download Key Features| Malwarebytes Usage |




Malwarebytes' Anti-Malware


Have you ever considered what makes an anti-malware application effective? We at Malwarebytes have created an easy-to-use, simple, and effective anti-malware application. Whether you know it or not your computer is always at risk of becoming infected with viruses, worms, trojans, rootkits, dialers, spyware, and malware that are constantly evolving and becoming harder to detect and remove. Only the most sophisticated anti-malware techniques can detect and remove these malicious programs from your computer.
Malwarebytes' Anti-Malware is considered to be the next step in the detection and removal of malware. In our product we have compiled a number of new technologies that are designed to quickly detect, destroy, and prevent malware. Malwarebytes' Anti-Malware can detect and remove malware that even the most well known anti-virus and anti-malware applications fail to detect. Malwarebytes' Anti-Malware monitors every process and stops malicious processes before they even start. The realtime protection module uses our advanced heuristic scanning technology which monitors your system to keep it safe and secure. In addition, we have implemented a threats center which will allow you to keep up to date with the latest malware threats.
Activating the full version unlocks realtime protection, scheduled scanning, and scheduled updating. For consumers and personal use, it is a one time fee of $24.95. For corporate and business customers, annual licenses are required, please see our Corporate Licensing program.

Key Features


  • Support for Windows 2000, XP, Vista, and 7 (32-bit and 64-bit).
  • Light speed quick scanning.
  • Ability to perform full scans for all drives.
  • Malwarebytes' Anti-Malware protection module. (requires registration)
  • Database updates released daily.
  • Quarantine to hold threats and restore them at your convenience.
  • Ignore list for both the scanner and Protection Module.
  • Settings to enhance your Malwarebytes' Anti-Malware performance.
  • A small list of extra utilities to help remove malware manually.
  • Multi-lingual support.
  • Works together with other anti-malware utilities.
  • Command line support for quick scanning.
  • Context menu integration to scan files on demand.

Usage


Simply download Malwarebytes' Anti-Malware from the one of the links below. Double click the downloaded file to install the application on your computer. Once the application is installed, double click on the Malwarebytes' Anti-Malware icon to start the program. When the application is open, select Scan and the application will guide you through the remaining steps.

Issues Fixed


  1. Fixed issue with the scheduler not performing realtime updates.
  2. Fixed multiple issues with product crashing during a scan.
  3. Fixed issue with log not saving on certain command line scans.
  4. Fixed various issues with Finnish, Italian, and Norwegian languages.
  5. Fixed formatting and misspelling issues in product help file.

    Download


    • Version: 1.50.1
    • File Size: 7.35 MB
    • Operating Systems: Microsoft ® Windows 2000, XP, Vista, 7.
    • Languages Available: English, Arabic, Belarusian, Bosnian, Bulgarian, Catalan, Chinese Simplified, Chinese Traditional, Croatian, Czech, Danish, Dutch, Estonian, Finnish, French, German, Greek, Hebrew, Hungarian, Italian, Korean, Latvian, Lithuanian, Macedonian, Norwegian, Polish, Portuguese, Romanian, Russian, Serbian, Slovak, Slovenian, Spanish, Swedish, Turkish.
     Click Here to Download  Malwarebytes Anti-Malware Free



    1. Please download this official version of Malwarebytes' Anti-Malware.

      

    2. Install Malwarebytes' Anti-Malware by double clicking on mbam-setup.

    3. Follow the prompts. Make sure that Update Malwarebytes' Anti-Malware and Launch Malwarebytes' Anti-Malware are checked. Then click finish.


    4. Malwarebytes' Anti-Malware will automatically update itself after the installation, click the OK button to close that box and you will now be at the main program Window as shown below.

    If you are having problems with the updater, you can use this link to manually update Malwarebytes' Anti-Malware with the latest database. Make sure that Malwarebytes' Anti-Malware is closed before installing the update.


    5. Close All opened Windows, Programs, File or Folders.


    6. Make sure you are on the Scanner tab. Select Perform quick scan then click the Scan button as shown below.




    7. Malwarebytes' Anti-Malware will now start scanning your computer for infected files as shown below.



    8. When the scan is finished a message box will appear, click OK to continue.


    9. Click Show Results.


    10. You will now be presented with a screen showing you the malware infections like shown below. Yours may look different depending on the infection you have.


    11. Click on Remove selected.


    12. When removing the files, Malwarebytes' Anti-Malware may require you to restart the computer in order to do a complete removal. If it displays a message stating that it needs to restart, click Yes.


    13. After that you can close the Malwarebytes' Anti-Malware window, your computer is now cleaned from the malware infection.


    To protect and prevent your computer from experiencing future threats like this, we highly recommend purchasing the FULL version of Malwarebytes' Anti-Malware with real-time (live) protection .


      ie9,ie9download,internet explorer 9,explorer 9,Download Ie9 with your language







      After two years since Internet Explorer 8 was launched,has released the final version of its latest web browser, Internet Explorer 9, available for download. Thanks to powerful competitors (Google Chrome and Mozilla Firefox) and the declining usage of Internet Explorer in general, Microsoft was forced to rebuild Internet Explorer not only to run faster (and to be more responsive), simpler and more secure, but also to be redeem itself in the eyes of web developers and standards-savvy designers against the bad reputation of being a non standards compliant browser.

      The first thing you'll notice when you run Internet Explorer 9 for the first time is its new, simplified and minimalist interface. There is a single location bar for searches and URLs (similar to Google Chrome) and the browser tabs opens on the same row as the location bar in a single strip alongside. There are of course, pros and cons associated with this. The benefit is clear - more browsing room. Although, if you open several tabs at the same time, it becomes difficult to distinguish the tabs. Among other news, the Stop and Refresh buttons live now inside the location bar along with the search drop-down menu icon. Also, all items associated with print, safety and other controls have gone now into the Tools menu.

      As Internet Explorer 8, the browser has tab sand-boxing. This feature prevents the crashing of your entire browser in case something goes wrong with a tab (i.e. freezes) and it will offer you the possibly to resurrect that tab. Moreover, when you open a 'New Tab' page, you'll be able to open closed tabs and previous browsing sessions among with the most frequently visited Web sites. As Google Chrome, IE9 allows you to drag a tab to create a new browser window. Additionally, the browser integrates with the Aero Snap feature in Windows 7 in order to drag a tab to a side (right or left) on your monitor, which makes it easy when you want to look at two sites simultaneously. Another interesting feature of IE9 is that you can pin specific sites to your Windows 7 desktop taskbar. To do so, click and hold on a tab and drag it to the taskbar to pin. This is quite useful, especially for sites we visit on a frequent basis. 



      Another important improvement is the overall browser performance thanks to a new Javascript engine as well as hardware acceleration. As a comparative, the rendering speed of the web pages and the performance executing Javascript is as fast as in Google Chrome, Faster than Mozilla Firefox and miles away over IE8. About the browser start times, its been also improved and to be honest, the whole thing feels fast and smooth. Moreover, its much-touted hardware acceleration, which uses the graphics processor to render web videos improves the performance a lot.

      The most important focus of IE9 it to be a safe, secure and private browser. In this manner, there are two main features. One is called ActiveX Filtering which once turned on, it will block all ActiveX controls from being loaded on websites, unless you choice to allow them on a particular website. In short explanation, ActiveX controls (e.g. Adobe's Flash Player which is safe, of course) are like small plugins you can install on your computer to enable your web browser to run small programs to display content. But, there are a lot of unsafe ActiveX controls out there and also a lot of unsafe websites which will add exploit holes in your system.

      Another addition to 'safe and secure' is the Tracking Protection which enables you to keep sites from tracking your activity across browsing sessions. Moreover, the tracking protection feature a Tracking Protection Lists. These are lists of websites that IE9 will block from loading on your computer, therefore they will be unable to track you since they cannot load the image or animation required to track you or run the tracking code.

      Finally, the SmartScreen Filter will warn you if you're downloading a known virus, before you run the file and also if you're downloading a file that hasn't been verified as safe. As expected, the other security feature built into the browser, called Protected Mode, which stops Internet Explorer 9 or ActiveX controls running in the browser from accessing the system to make malicious changes.

      Pluses: HTML 5 compatibility, address bar search function, ability to pin Web site shortcuts to taskbar in Windows 7, hardware acceleration, fast.

      Drawbacks / flaws: Slow install, forces a reboot, does not work in Windows XP, requires SP2 to work under Windows Vista, there are a number of features that only work on Windows 7.

      In conclusion: With all this being said, IE9 is fast and highly usable, actually, even enjoyable to use. Looks like Microsoft has put together all their focus to give Web users good reasons to at least give IE 9 a try.

      [warn] (2)No such file or directory: Failed to enable the ‘httpready’ Accept Filter | FreeBSD Apache HTTP Accept Filter Error



      When Apache web server is starting up in FreeBSD system, Apache loads succcessfully and web server functioning properly, but the following warning error occurs:

      [warn] (2)No such file or directory: Failed to enable the ‘httpready’ Accept Filter


      The resolution to the above problem is to a accf_http module, which function is to buffer incoming connections until a certain complete HTTP requests arrive, into FreeBSD kernel by using kernel linker:

      kldload accf_http

      To permanently load enable HTTP Accept Filter FreeBSD kernel module (accf_http), add the following line
       into /boot/loader.conf:

      accf_http_load="YES"

      Note: The default settings is located in /boot/defaults/loader.cnf. To see the related settings about accf, use:
      grep accf /boot/defaults/loader.conf

      which will returns:

      accf_data_load=”NO” # Wait for data accept filter
      accf_http_load=”NO” # Wait for full HTTP request accept filter


      ipv6 address MIKROTIK Routers | Configuring IPv6 Addresses on MIKROTIK Routers






      Most IPv6 implementation plans make use of both static IPv6 address configuration and dynamic configuration options. As is the case with IPv4, the plan assigns infrastructure devices with static addresses, with client hosts using one of the two dynamic methods for address assignment. IPv6 addressing includes many more options than IPv4, and as a result, many more config-uration options exist. A router interface can be configured with a static global unicast IPv6 address, either with or without using the EUI-64 option. Although less likely, a router could be configured to dynamically learn its IPv6 address with either stateful DHCP or stateless autoconfig. The router interface could be configured to either not use a global unicast address, instead relying solely on its link local address, or to borrow another interface’s address using the IPv6 unnumbered feature. Following Table  summarizes the IPv6 configuration commands and their meanings.
      Configuring IPv6 Addresses on MIKROTIK Routers : 

      >ipv6 address add address=2404:1b8:0:3::abcd/64
      interface=ether2 advertise=no
      > ipv6 address print    // To See Your IPV6 Address configuration
      > ipv6 route add dst-address=::/0 gateway=2404:1b8:0:3::1   // To add Default Route



      IPv6 Addresses on Juniper | Configuring IPv6 Addresses on Juniper Routers




      Most IPv6 implementation plans make use of both static IPv6 address configuration and dynamic configuration options. As is the case with IPv4, the plan assigns infrastructure devices with static addresses, with client hosts using one of the two dynamic methods for address assignment. IPv6 addressing includes many more options than IPv4, and as a result, many more config-uration options exist. A router interface can be configured with a static global unicast IPv6 address, either with or without using the EUI-64 option. Although less likely, a router could be configured to dynamically learn its IPv6 address with either stateful DHCP or stateless autoconfig. The router interface could be configured to either not use a global unicast address, instead relying solely on its link local address, or to borrow another interface’s address using the IPv6 unnumbered feature. Following Table  summarizes the IPv6 configuration commands and their meanings.



      Configuring IPv6 Addresses on Juniper Routers : 

      This can be enabled on these devices only on the CLI, with the following command:
      saleh->set envar ipv6=yes     Then Reboot The Router
      saleh-> set interface ethernet0/0 ipv6 mode router
      saleh-> set interface ethernet0/0 ipv6 ip "ipv6-address/prefix"





      IPV6 Addressing | IPv6 Addresses | IPV6 general categories | IPv6 main types | Understand IPv6 Addresses

      IPV6 Addressing | IPv6 Addresses | IPV6 general categories | IPv6 main types | Understand IPv6 Addresses

      IPv6 addressing, however, includes several other types of unicast IPv6 addresses beside the global unicast address. Additionally, IPv6 defines other general categories of ad- dresses, as summarized in this list.

      ■ Unicast: Like IPv4, hosts and routers assign these IP addresses to a single interface for the purpose of allowing that one host or interface to send and receive IP packets.
      ■ Multicast: Like IPv4, these addresses represent a dynamic group of hosts, allowing a host to send one packet that is then delivered to every host in the multicast group. IPv6 defines some special-purpose multicast addresses for overhead functions (such as NDP). IPv6 also defines ranges of multicast addresses for application use.
      ■ Anycast: This address type allows the implementation of a nearest server among du- plicate servers concept. This design choice allows servers that support the exact same function to use the exact same unicast IP address. The routers then forward a packet destined for such an address to the nearest server that is using the address.

      Unicast IPv6 Addresses
      IPv6 supports three main types of unicast addresses: link local, global unicast, and unique local. This section takes a brief look at link local and unique local addresses.Unique local unicast IPv6 addresses have the same function as IPv4 RFC 1918 private ad-dresses. RFC 4193 states that these addresses should be used inside a private organiza-tion, and should not be advertised into the Internet. Unique local unicast addresses begin with hex FD (FD00::/8) .

      Link Local Unicast Addresses
      IPv6 uses link local addresses for sending and receiving IPv6 packets on a single subnet. Many such uses exist; here’s just a small sample:
      ■ Used as the source address for RS and RA messages for router discovery (as previ-ously shown in Figure 16-7)
      ■ Used by Neighbor discovery (the equivalent of ARP for IPv6)
      ■ As the next-hop IPv6 address for IP routes By definition, routers use a link local scope for packets sent to a link local IPv6 address. The term link local scope means exactly that–the packet should not leave the local link, or local subnet if you will. When a router receives a packet destined for such a destination address, the router does not forward the packet.
      The link local IPv6 addresses also help solve some chicken-and-egg problems because each host, router interface, or other device can calculate its own link local IPv6 address without needing to communicate with any other device. So, before sending the first pack- ets, the host can calculate its own link local address, so the host has an IPv6 address to use when doing its first overhead messages. For example, before a host sends an NDP RS (router solicitation) message, the host will have already calculated its link local address, which can be used as the source IPv6 address on the RS message.
      Link local addresses come from the FE80::/10 range, meaning the first 10 bits must be 1111 1110 10. An easier range to remember is that all hex link local addresses begin FE8,FE9, FEA, or FEB. However, practically speaking, for link local addresses formed auto-matically by a host (rather than through static configuration), the address always starts FE80, because the automatic process sets bits 11-64 to binary 0s. Figure 16-10 shows theformat of the link local address format under the assumption that the host or router is de-riving its own link local address, therefore using 54 binary 0s after the FE80::/10 prefix.

      IPV6 Addressing | IPv6 Addresses | IPV6 general categories | IPv6 main types | Understand IPv6 Addresses

       

      The Following Table Shows Common Link-Local Multicast Addresses :
      Type of Address Purpose Prefix Easily Seen Hex Prefix(es)
      Global unicast Unicast packets sent
      through the public In-
      ternet
      2000::/3 2 or 3
      Unique local Unicast packets inside
      one organization
      FD00::/8 FD
      Link local Packets sent in the
      local subnet
      FE80::/10 FE8
      Site local Deprecated; originally
      meant to be used like
      private IPv4 addresses
      FECO::/10  FEC, FED, FEE, FEF
      Unspecified An address used when
      a host has no usable
      IPv6 address
      ::/128 N/A
      Loopback Used for software
      testing, like IPv4’s
      127.0.0.1
      ::1/128 N/A

      Multicast and Other Special IPv6 Addresses
      IPv6 supports multicasts on behalf of applications and multicasts to support the inner workings of IPv6. To aid this process, IPv6 defines ranges of IPv6 addresses and an associ-ated scope, with the scope defining how far away from the source of the packet that the network should forward a multicast.
      All IPv6 multicast addresses begin with FF::/8 – in other words, with FF as the first two digits. Multicasts with a link local scope, begin with FF02::/16; the 2 in the fourth hex digit identifies the scope as link local. A fourth digit of hex 5 identifies the broadcast as site local scope, with those multicasts beginning with FF05::/16.
      For reference, The Following Table lists some of the more commonly seen IPv6 multicast addresses. Of particular interest are the addresses chosen for use by RIP, OSPF, and EIGRP, which somewhat mirror the multicast addresses each protocol uses for IPv4. Note also that all but the last two entries have link local scope .

      Purpose IPv6 Address IPv4 Equivalent
      All IPv6 nodes on the link  FF02::1 subnet broadcast address
      All IPv6 routers on the link FF02::2  N/A
      OSPF messages FF02::5, FF02::6  224.0.0.5, 224.0.0.6
      RIP-2 messages FF02::9  224.0.0.9
      EIGRP messages FF02::A 224.0.0.10
      DHCP relay agents (routers that
      forward to the DHCP server)
      FF02:1:2  N/A
      DHCP servers (site scope)  FF05::1:3  N/A

       

      IPV6 Addressing | IPv6 Addresses | IPV6 general categories | IPv6 main types | Understand IPv6 Addresses

      Configuring Static IPv6 Addresses on Routers ,Step by Step IPv6 Configuration Cisco Router




      Configuring IPv6 Addresses on Cisco Routers :

      Most IPv6 implementation plans make use of both static IPv6 address configuration and dynamic configuration options. As is the case with IPv4, the plan assigns infrastructure devices with static addresses, with client hosts using one of the two dynamic methods for address assignment. IPv6 addressing includes many more options than IPv4, and as a result, many more config-uration options exist. A router interface can be configured with a static global unicast IPv6 address, either with or without using the EUI-64 option. Although less likely, a router could be configured to dynamically learn its IPv6 address with either stateful DHCP or stateless autoconfig. The router interface could be configured to either not use a global unicast address, instead relying solely on its link local address, or to borrow another interface’s address using the IPv6 unnumbered feature. Following Table  summarizes the IPv6 configuration commands and their meanings.
      Command Description
      ipv6 address address/length Static configuration of the entire IPv6 unicast ad-
      dress.
      ipv6 address prefix/length eui-64 Static configuration of the first 64 address bits; the
      router derives the last 64 bits with EUI-64.
      ipv6 address autoconfig Router uses stateless autoconfig to find address.
      ipv6 address dhcp Router uses stateful DHCP to find address.
      ipv6 unnumbered interface-type num-
      ber
      Uses the same IPv6 unicast address as the refer-
      enced interface.
      ipv6 enable Enables IPv6 on the interface, but results in only a
      link local address.
      ipv6 address address link-local Overrides the automatically created link local ad-
      dress. The configured value must conform to the
      FE80::/10 prefix.
      ipv6 address address/length anycast Designates that the unicast address is an anycast.



      Configuring Static IPv6 Addresses on Routers
       ipv6-config
      R2# show running-config
      ! lines omitted for brevity
      interface FastEthernet0/0
      ipv6 address 2000:0:0:4::/64 eui-64
      !
      interface FastEthernet0/1
      ipv6 address 2000:0:0:2::2/64
      !
      interface Serial0/0/1
      ipv6 address 2000:0:0:1::/64 eui-64
      !
      !
      R2# show ipv6 interface brief
      FastEthernet0/0            [up/up]
      FE80::213:19FF:FE7B:5004
      2000::4:213:19FF:FE7B:5004
      FastEthernet0/1            [up/up]
      FE80::213:19FF:FE7B:5005
      2000:0:0:2::2
      Serial0/0/0                [administratively down/down]
      unassigned
      Serial0/0/1                [up/up]
      FE80::213:19FF:FE7B:5004
      2000::1:213:19FF:FE7B:5004
      Serial0/1/0                [administratively down/down]
      unassigned
      Serial0/1/1                [administratively down/down]
      unassigned