gdata.io.handleScriptLoaded({"version":"1.0","encoding":"UTF-8","feed":{"xmlns":"http://www.w3.org/2005/Atom","xmlns$openSearch":"http://a9.com/-/spec/opensearchrss/1.0/","xmlns$blogger":"http://schemas.google.com/blogger/2008","xmlns$georss":"http://www.georss.org/georss","xmlns$gd":"http://schemas.google.com/g/2005","xmlns$thr":"http://purl.org/syndication/thread/1.0","id":{"$t":"tag:blogger.com,1999:blog-3756476097612670700"},"updated":{"$t":"2023-12-07T03:28:40.539+01:00"},"category":[{"term":"Tech tips"},{"term":"Apps"},{"term":"Daily tips"},{"term":"Tech Tricks"},{"term":"App"},{"term":"Education"},{"term":"Smartphones"},{"term":"Tech tips and tricks"},{"term":"Android OS"},{"term":"Article"},{"term":"Browsers"},{"term":"Business"},{"term":"Chrome Extensions"},{"term":"Cryptocurrency"},{"term":"Daily Tech tips"},{"term":"Ethereum"},{"term":"Facebook"},{"term":"GTBank"},{"term":"Health"},{"term":"How To"},{"term":"PC"},{"term":"Security"},{"term":"Web"},{"term":"Windows"},{"term":"motivational"}],"title":{"type":"text","$t":"ToBeCandidBlog™"},"subtitle":{"type":"html","$t":"....Candid updates at its best™"},"link":[{"rel":"http://schemas.google.com/g/2005#feed","type":"application/atom+xml","href":"https:\/\/www.tobecandidblog.com\/feeds\/posts\/default"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3756476097612670700\/posts\/default?alt=json-in-script\u0026max-results=4"},{"rel":"alternate","type":"text/html","href":"https:\/\/www.tobecandidblog.com\/"},{"rel":"hub","href":"http://pubsubhubbub.appspot.com/"},{"rel":"next","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3756476097612670700\/posts\/default?alt=json-in-script\u0026start-index=5\u0026max-results=4"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"generator":{"version":"7.00","uri":"http://www.blogger.com","$t":"Blogger"},"openSearch$totalResults":{"$t":"50"},"openSearch$startIndex":{"$t":"1"},"openSearch$itemsPerPage":{"$t":"4"},"entry":[{"id":{"$t":"tag:blogger.com,1999:blog-3756476097612670700.post-7959214792348039547"},"published":{"$t":"2022-09-09T12:37:00.004+01:00"},"updated":{"$t":"2023-02-03T14:43:17.651+01:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"Cryptocurrency"},{"scheme":"http://www.blogger.com/atom/ns#","term":"Ethereum"}],"title":{"type":"text","$t":"Ethereum Classic: What you need to know"},"content":{"type":"html","$t":"\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\u003Ca href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjI_Oomt--wRSa8LEFSglqodW73QP8fgyyRR2BfIZW_aKWiRp4-M1mYjQRbE7a3ePJ8_NRtwczJ4Nhr_kq1uwG_GCPiYFUcha15D1L8XbiFvLLCokVcJH5N7TLo-pY1vS6swUWKAfGBj4964kyMB1DaH5_ypO7rM1o2zW8kJ8DN9umMpBL2kSVWH6At\/s600\/ETC.png\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cimg border=\"0\" data-original-height=\"600\" data-original-width=\"600\" height=\"320\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjI_Oomt--wRSa8LEFSglqodW73QP8fgyyRR2BfIZW_aKWiRp4-M1mYjQRbE7a3ePJ8_NRtwczJ4Nhr_kq1uwG_GCPiYFUcha15D1L8XbiFvLLCokVcJH5N7TLo-pY1vS6swUWKAfGBj4964kyMB1DaH5_ypO7rM1o2zW8kJ8DN9umMpBL2kSVWH6At\/w444-h320\/ETC.png\" width=\"444\" \/\u003E\u003C\/a\u003E\u003C\/div\u003E\u003Cbr \/\u003E\u003Cp\u003E\u003C\/p\u003E\u003Cp\u003EEthereum Classic, with the ticker (ETC), was founded by Vitalik Buterin and Gavin Wood. It was initially released on July 30, 2015, as the original Ethereum and still maintains the unaltered history of the Ethereum network.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003EIt is a decentralized open-source, blockchain-based that supports a modified version of\u0026nbsp; Satoshi Nakomoto's (BTC) consensus(PoW- Proof of Work) via transaction-based state transitions executed on a public Ethereum Virtual Machine (EVM) with just one key difference: the ability to be used as a distributed computer to run self-executing smart contracts.\u0026nbsp;\u003C\/p\u003E\u003Cdiv\u003EThe ability to run self-executing smart contracts made it distinct and a couple of projects and developers made good use of it, until 2016 when a project called The DAO was hacked.\u003C\/div\u003E\u003Cdiv\u003E\u003Cbr \/\u003E\u003C\/div\u003E\u003Cdiv\u003EA german startup named Slock.it launched a project on Ethereum Classic (which was Ethereum then) called The DAO on April 30, 2016, and had raised over $150 million from over 11,000 investors within three weeks of the token sale making it one of the largest crowdfunding campaigns in history at the time.\u0026nbsp; However, this feat was quickly shortlived when an attacker discovered there was a bug that made the smart contract vulnerable and began siphoning funds from The DAO stealing over $50 million.\u0026nbsp;\u003C\/div\u003E\u003Cdiv\u003E\u003Cbr \/\u003E\u003C\/div\u003E\u003Cdiv\u003E\u003Cbr \/\u003E\u003C\/div\u003E\u003Cdiv\u003EWithout further ado, a lot of Ethereum users including the founders supported a soft fork in the blockchain's base protocol or a hard fork. This resulted in the formation of the new Ethereum chain.\u003C\/div\u003E\u003Cdiv\u003E\u003Cbr \/\u003E\u003C\/div\u003E\u003Cdiv\u003EHowever a section of the community remained opposed to the fork and chose instead to stand by the principle of \"Code is Law\", and as such the old chain remained and was renamed Ethereum Classic, while the new one which is an offset of the original chain became the Ethereum (ETH) that now exists.\u003C\/div\u003E\u003Cdiv\u003E\u003Cbr \/\u003E\u003C\/div\u003E\u003Cdiv\u003E\u003Cbr \/\u003E\u003C\/div\u003E\u003Cdiv\u003EEver since the split of the chain happened due to the hack, a lot of crypto analysts and researchers have labeled ETC as a \"dead project\" that will never develop or outgrow Ethereum, however, there has been continuity of updates on the ETC chain over the years, and a couple of projects have found the chain very useful still in building their products.\u0026nbsp;\u003C\/div\u003E\u003Cdiv\u003E\u003Cspan style=\"background-color: white; color: #010304; font-family: Inter; font-size: 16px;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv\u003E\u003Cspan style=\"background-color: white; color: #010304; font-family: Inter; font-size: 16px;\"\u003ECredit source(s):\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv\u003E\u003Cspan style=\"background-color: white; color: #010304; font-family: Inter; font-size: 16px;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv\u003E\u003Ca href=\"https:\/\/blog-eu.bitflyer.com\/what-is-ethereum-classic\/\"\u003EWhat is Ethereum Classic? What is different, and what is it used for? (bitflyer.com)\u003C\/a\u003E\u003C\/div\u003E\u003Cdiv\u003E\u003Cspan style=\"background-color: white;\"\u003E\u003Cspan style=\"color: #010304; font-family: Inter;\"\u003Ehttps:\/\/en.wikipedia.org\/wiki\/Ethereum_Classic\u003C\/span\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv\u003E\u003Cspan style=\"background-color: white;\"\u003E\u003Cspan style=\"color: #010304; font-family: Inter;\"\u003Ehttps:\/\/www.gemini.com\/cryptopedia\/the-dao-hack-makerdao\u003C\/span\u003E\u003C\/span\u003E\u003C\/div\u003E\u003Cdiv\u003E\u003Cspan style=\"background-color: white;\"\u003E\u003Cspan style=\"color: #010304; font-family: Inter;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/div\u003E"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/www.tobecandidblog.com\/feeds\/7959214792348039547\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/www.tobecandidblog.com\/2022\/09\/ethereum-classic-what-you-need-to-know.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3756476097612670700\/posts\/default\/7959214792348039547"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3756476097612670700\/posts\/default\/7959214792348039547"},{"rel":"alternate","type":"text/html","href":"https:\/\/www.tobecandidblog.com\/2022\/09\/ethereum-classic-what-you-need-to-know.html","title":"Ethereum Classic: What you need to know"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjI_Oomt--wRSa8LEFSglqodW73QP8fgyyRR2BfIZW_aKWiRp4-M1mYjQRbE7a3ePJ8_NRtwczJ4Nhr_kq1uwG_GCPiYFUcha15D1L8XbiFvLLCokVcJH5N7TLo-pY1vS6swUWKAfGBj4964kyMB1DaH5_ypO7rM1o2zW8kJ8DN9umMpBL2kSVWH6At\/s72-w444-h320-c\/ETC.png","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3756476097612670700.post-8174231992856798716"},"published":{"$t":"2022-06-22T12:12:00.004+01:00"},"updated":{"$t":"2022-08-11T11:31:30.307+01:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"Chrome Extensions"}],"title":{"type":"text","$t":"MeaVana - Customize Your Tab"},"content":{"type":"html","$t":"\u003Cp\u003E\u003Cbr \/\u003E\u003C\/p\u003E\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\u003Ca href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjRmsNM5zAdHszrNXhYQ_tY4ZW9GsNmlB0L9B3SVD-fxTZ4KKGntjujaQ7O_UkiYr6xA11ozFG210t8D7YA_UTwbq2o3hFYkILWhRTLJO9ZupaFEfmKDMrirOp19VzT5tB2eOTgKZ--9oBE8ATBMxHAI6GoQAcy_WWHIa1T5pLFqjqHGBUJhpcTIdeS\/s1916\/image.png\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cimg border=\"0\" data-original-height=\"932\" data-original-width=\"1916\" height=\"208\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjRmsNM5zAdHszrNXhYQ_tY4ZW9GsNmlB0L9B3SVD-fxTZ4KKGntjujaQ7O_UkiYr6xA11ozFG210t8D7YA_UTwbq2o3hFYkILWhRTLJO9ZupaFEfmKDMrirOp19VzT5tB2eOTgKZ--9oBE8ATBMxHAI6GoQAcy_WWHIa1T5pLFqjqHGBUJhpcTIdeS\/w433-h208\/image.png\" title=\"Meavana\" width=\"433\" \/\u003E\u003C\/a\u003E\u003C\/div\u003E\u003Cbr \/\u003E\u003Cp\u003E\u003Ca href=\"https:\/\/meavana.com\/\" target=\"_blank\"\u003EMeavana\u003C\/a\u003E is a productivity tool available on the \u003Ca href=\"https:\/\/chrome.google.com\/webstore\/detail\/meavana-customize-your-ne\/kgbcoelgfffkmkpfnldemdinmcbpjlaa\" target=\"_blank\"\u003Echrome extension\u003C\/a\u003E which helps customize your browser tab, turning it into an all-new beautiful dashboard. It has got an amazing user interface and design. It is convenient, lightweight, clear, user-friendly, and easy to use.\u003C\/p\u003E\u003Cp\u003E\u003Ca href=\"https:\/\/meavana.com\/\" target=\"_blank\"\u003EMeaVana \u003C\/a\u003Eis not just a productivity tool but also an innovative tool. It has got basic productive tools and made them all accessible in a place rather than having to search for some of these tools on your computer. That's way so much easy and cool if you ask me...\u003C\/p\u003E\u003Cp\u003E\u003Cspan\u003E\u003C\/span\u003E\u003C\/p\u003E\u003Ca name='more'\u003E\u003C\/a\u003EIt customizes your tab by beautifying and replacing your tab with a new theme mostly pictures that changes daily, productivity tools like; a google search bar, notes, a to-do list, bookmark list, clock app, a widget for a variety of inbuilt apps, weather access, a share icon, daily photo credit of very beautiful surroundings from around the world. You just have to love an app like this.\u0026nbsp;\u003Cp\u003E\u003C\/p\u003E\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\u003Ca href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhoSlIZNEqt-t_kQUufwATrxur4K16aB1N_-6THMKHGlL9BLsuSdJ7gd6nbb35DAEk3CdP6t-GMVGCjLvKAJUAomImk55msd2GkvOMQcypPXzDUOtldkDyh3CvNa3C5U-0GQQbylNfBvvXcGz39EKf4mhVTvQAMuWM21QymyduLNEVM_BCV4akBYahV\/s1916\/Deep%20Chess.png\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cimg border=\"0\" data-original-height=\"937\" data-original-width=\"1916\" height=\"195\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhoSlIZNEqt-t_kQUufwATrxur4K16aB1N_-6THMKHGlL9BLsuSdJ7gd6nbb35DAEk3CdP6t-GMVGCjLvKAJUAomImk55msd2GkvOMQcypPXzDUOtldkDyh3CvNa3C5U-0GQQbylNfBvvXcGz39EKf4mhVTvQAMuWM21QymyduLNEVM_BCV4akBYahV\/w400-h195\/Deep%20Chess.png\" width=\"400\" \/\u003E\u003C\/a\u003E\u003C\/div\u003E\u003Cp\u003E\u003Cbr \/\u003E\u003C\/p\u003E\u003Cp\u003EAlthough \u003Ca href=\"https:\/\/meavana.com\/\" target=\"_blank\"\u003EMeaVana\u003C\/a\u003E is new, it is fast growing with a number of over 200 users already, and if I have to be honest, even though Meavana which customizes your tab is new, it is one of the best basic utilities and productivity apps I have seen on the chrome extension.\u003C\/p\u003E\u003Cp\u003EAwesome visualization, beautiful variety of pictures, options for customization, easy accessibility and so much more. It got really good reviews on its page on chrome and you would not and shouldn't miss out. I'd be writing some amazing features about MeaVana in my upcoming posts, so endeavor to check back so you don't miss out, and do not forget to share guys.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003ENavigate to the \u003Ca href=\"https:\/\/chrome.google.com\/webstore\/detail\/meavana-customize-your-ne\/kgbcoelgfffkmkpfnldemdinmcbpjlaa\" target=\"_blank\"\u003Echrome web store\u003C\/a\u003E right away and have a good feel of the amazing features MeaVana offers, and do not forget to give your reviews about the app.\u0026nbsp;\u003C\/p\u003E\u003Cp\u003ERemember like I said, you'd love it... Share your thoughts and suggestions\u0026nbsp;\u003C\/p\u003E\u003Cp\u003E\u003Cbr \/\u003E\u003C\/p\u003E"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/www.tobecandidblog.com\/feeds\/8174231992856798716\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/www.tobecandidblog.com\/2022\/06\/meavana-customize-your-tab.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3756476097612670700\/posts\/default\/8174231992856798716"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3756476097612670700\/posts\/default\/8174231992856798716"},{"rel":"alternate","type":"text/html","href":"https:\/\/www.tobecandidblog.com\/2022\/06\/meavana-customize-your-tab.html","title":"MeaVana - Customize Your Tab"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjRmsNM5zAdHszrNXhYQ_tY4ZW9GsNmlB0L9B3SVD-fxTZ4KKGntjujaQ7O_UkiYr6xA11ozFG210t8D7YA_UTwbq2o3hFYkILWhRTLJO9ZupaFEfmKDMrirOp19VzT5tB2eOTgKZ--9oBE8ATBMxHAI6GoQAcy_WWHIa1T5pLFqjqHGBUJhpcTIdeS\/s72-w433-h208-c\/image.png","height":"72","width":"72"},"thr$total":{"$t":"0"}},{"id":{"$t":"tag:blogger.com,1999:blog-3756476097612670700.post-7030075939552076871"},"published":{"$t":"2020-04-16T19:33:00.003+01:00"},"updated":{"$t":"2020-04-23T23:59:59.310+01:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"How To"},{"scheme":"http://www.blogger.com/atom/ns#","term":"Windows"}],"title":{"type":"text","$t":"How To Fix No Bootable Image Found, Notebook Will be Shut Down Error (Microsoft Windows)"},"content":{"type":"html","$t":"\u003Cdiv dir=\"ltr\" style=\"text-align: left;\" trbidi=\"on\"\u003E\n\u003Cbr \/\u003E\n\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\n\u003Ca href=\"http:\/\/tobecandidblog.com\/\" target=\"_blank\"\u003E\u003Cimg alt=\"tobecandidblog\" border=\"0\" data-original-height=\"450\" data-original-width=\"800\" src=\"https:\/\/1.bp.blogspot.com\/-ASIV8NHB8aI\/XpiNCZaD_xI\/AAAAAAAADqY\/EXcRztG5lXoifunLVsAQpxw6taU0pL5EQCLcBGAsYHQ\/s1600\/6a0148c7f4076d970c01bb08505357970d-800wi.jpg\" title=\"tobecandidblog\" \/\u003E\u003C\/a\u003E\u003C\/div\u003E\n\u003Cspan style=\"background-color: white; box-sizing: border-box; font-family: sans-serif; font-size: 12.8px; font-weight: 700;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\n\u003Cspan style=\"background-color: white; box-sizing: border-box; font-family: sans-serif; font-size: 12.8px; font-weight: 700;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\n\u003Cspan style=\"background-color: white; box-sizing: border-box; font-family: sans-serif; font-size: 12.8px; font-weight: 700;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\n\u003Cspan style=\"background-color: white; box-sizing: border-box;\"\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cb\u003ENo bootable image found, notebook will be shut down\u0026nbsp;\u003C\/b\u003Eis commonly caused by irregular entries in the Windows registry or incorrectly configured system settings. Some other reasons include corrupted and damaged system partition or even missing files in the system partition.\u003C\/span\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003ESeeing that windows fail to boot can be stressful and provoking especially when you in the middle of something that needs be done urgently, but there are several ways on how boot errors can be fixed.\u0026nbsp;\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003EThere are different types of boot errors asides the above mentioned depending on its cause which are;\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Cul style=\"text-align: left;\"\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003EReboot and select proper boot device\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003EMissing operating system\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003EFATAL: No bootable medium found! System halted\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003EInvalid partition table and even no \u003Cb\u003Ebootable disk found\u003C\/b\u003E\u003C\/span\u003E\u003C\/li\u003E\n\u003C\/ul\u003E\n\u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Cb\u003E\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003EPlease take note that no bootable image found is not the same as no bootable disk found.\u003C\/span\u003E\u003C\/b\u003E\u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003EDepending on the type of error and how severe it is, some version of windows can recover from these problems by automatically running a startup repair. Other ways include the use of physical disc (this happens if some computers do not have a recovery partition).\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003EBootable image not found is not much of a serious problem as I will be showing you how to fix the error and make your computer work properly again.\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cb\u003EHow to fix no bootable image found, notebook will be shut down\u003C\/b\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cb\u003E\u003Cbr \/\u003E\u003C\/b\u003E\u003C\/span\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003EOnce you see this on your startup screen, repeatedly press the f10 key (BIOS Setup). This might not work at first as your PC might shut down really fast but don't worry, turn it back on and press the f10 repeatedly until the BIOS setup screen shows.\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003EDepending on the PC the BIOS Setup could come up as \u003Cb\u003EMAIN, SECURITY, ADVANCED,\u0026nbsp;\u003C\/b\u003Ewhile in most PC's its always as\u003Cb\u003E FILE, SECURITY, SYSTEM CONFIGURATION(mostly for windows 10 users).\u003C\/b\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cb\u003E\u003Cbr \/\u003E\u003C\/b\u003E\u003C\/span\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003ENavigate to System Configuration, untick the \u003Cb\u003ESecure Boot, \u003C\/b\u003Eand then select \u003Cb\u003ELegacy \u003C\/b\u003Eas boot option.\u003Cb\u003E \u003C\/b\u003EPlease do be careful at this point and make sure you select \u003Cb\u003ELegacy \u003C\/b\u003Ebecause failure to select the right option could lead to your PC developing a severe fault or even crashing completely.\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003EThen save and exit and that's it, your windows 10 automatically shuts down and is restored and comes back online.\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003EI personally had this challenge on my PC and this was the same method i used to resolve the issue. It wasn't easy as I never had encountered that before. I had difficulty with understanding how to go about due to different solutions published on different sites but fortunately, a friend helped out and such I have decided to share.\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\n\u003Cspan style=\"font-family: \u0026quot;verdana\u0026quot; , sans-serif;\"\u003E\u003Cb\u003ENOTE: The above solution would work if the reason for the boot error is a minor and not a severe cause.\u003C\/b\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"background-color: white; box-sizing: border-box; font-family: sans-serif; font-size: 12.8px; font-weight: 700;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\n\u003Cspan style=\"background-color: white; box-sizing: border-box; font-family: sans-serif; font-size: 12.8px; font-weight: 700;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\n\u003Cspan style=\"background-color: white; box-sizing: border-box; font-family: sans-serif; font-size: 12.8px; font-weight: 700;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\n\u003Cspan style=\"background-color: white; box-sizing: border-box; font-family: sans-serif; font-size: 12.8px; font-weight: 700;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\nSource(s):\u003Ca href=\"https:\/\/h30434.www3.hp.com\/t5\/Notebook-Boot-and-Lockup\/quot-No-bootable-image-found-notebook-will-be-shutdown-quot\/td-p\/4606172\" target=\"_blank\"\u003E hp.com\u003C\/a\u003E\u0026nbsp; \u003Ca href=\"http:\/\/www.fileerrors.com\/no-bootable-image-found-notebook-will-be-shut-down.html\" target=\"_blank\"\u003E\u0026nbsp; fileerrors.com\u003C\/a\u003E\u003Cbr \/\u003E\n\u003Cbr \/\u003E\u003C\/div\u003E\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/www.tobecandidblog.com\/feeds\/7030075939552076871\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/www.tobecandidblog.com\/2020\/04\/how-to-fix-no-bootable-image-found.html#comment-form","title":"1 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3756476097612670700\/posts\/default\/7030075939552076871"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3756476097612670700\/posts\/default\/7030075939552076871"},{"rel":"alternate","type":"text/html","href":"https:\/\/www.tobecandidblog.com\/2020\/04\/how-to-fix-no-bootable-image-found.html","title":"How To Fix No Bootable Image Found, Notebook Will be Shut Down Error (Microsoft Windows)"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/1.bp.blogspot.com\/-ASIV8NHB8aI\/XpiNCZaD_xI\/AAAAAAAADqY\/EXcRztG5lXoifunLVsAQpxw6taU0pL5EQCLcBGAsYHQ\/s72-c\/6a0148c7f4076d970c01bb08505357970d-800wi.jpg","height":"72","width":"72"},"thr$total":{"$t":"1"}},{"id":{"$t":"tag:blogger.com,1999:blog-3756476097612670700.post-2624282393524839471"},"published":{"$t":"2020-04-09T16:35:00.002+01:00"},"updated":{"$t":"2020-11-04T19:48:22.694+01:00"},"category":[{"scheme":"http://www.blogger.com/atom/ns#","term":"Security"},{"scheme":"http://www.blogger.com/atom/ns#","term":"Web"}],"title":{"type":"text","$t":"Virtual Private Network (VPN for starters)"},"content":{"type":"html","$t":"\u003Cdiv dir=\"ltr\" style=\"text-align: left;\" trbidi=\"on\"\u003E\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\u003Cbr \/\u003E\u003C\/div\u003E\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\u003Cbr \/\u003E\u003C\/div\u003E\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\n\u003Ca href=\"https:\/\/1.bp.blogspot.com\/-ptBe9YocNLo\/XpxaURXfSFI\/AAAAAAAADqs\/kMzKry3oFWsSxDs5HXt-8yellOUcjHZowCLcBGAsYHQ\/s1600\/images.jpg\" style=\"margin-left: 1em; margin-right: 1em;\"\u003E\u003Cimg border=\"0\" data-original-height=\"168\" data-original-width=\"300\" height=\"222\" src=\"https:\/\/1.bp.blogspot.com\/-ptBe9YocNLo\/XpxaURXfSFI\/AAAAAAAADqs\/kMzKry3oFWsSxDs5HXt-8yellOUcjHZowCLcBGAsYHQ\/s400\/images.jpg\" width=\"400\" \/\u003E\u003C\/a\u003E\u003C\/div\u003E\n\n\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\n\u003C\/div\u003E\n\u003Cdiv dir=\"ltr\" style=\"text-align: left;\" trbidi=\"on\"\u003E\u003Cbr \/\u003E\u003C\/div\u003E\u003Cdiv dir=\"ltr\" style=\"text-align: left;\" trbidi=\"on\"\u003E\u003Cbr \/\u003E\u003C\/div\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003EThere are practically a lot you as an internet user needs to know about Virtual Private Network on the web but without the need to bore you with so much all at once, I have decided to split the topics and take them one after the other and also explain in the simplest term anyone would understand. \u003C\/span\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Ch2 style=\"text-align: left;\"\u003E\n\u003Cb\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003EWhat is a VPN?\u003C\/span\u003E\u003C\/b\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E \u003C\/span\u003E\u003C\/h2\u003E\n\u003Cdiv style=\"text-align: left;\"\u003E\n\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003EA Virtual Private Network is a connection method used to add security \nand privacy to private and public networks, like WiFi Hotspots and the \nInternet.\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"text-align: left;\"\u003E\n\u003Cbr \/\u003E\u003C\/div\u003E\n\u003Cdiv style=\"text-align: left;\"\u003E\n\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cb\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cspan style=\"font-weight: normal;\"\u003EIt is a technology that allows you to create a \nsecure connection over a less-secure network between your computer and the internet.\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/b\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"text-align: left;\"\u003E\n\u003Cbr \/\u003E\u003C\/div\u003E\n\u003Cdiv style=\"text-align: left;\"\u003E\n\u003Cbr \/\u003E\u003C\/div\u003E\n\u003Ch2 style=\"text-align: left;\"\u003E\n\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cb\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cspan style=\"font-weight: normal;\"\u003E\u003Cspan style=\"font-size: large;\"\u003E\u003Cb\u003EReasons for Virtual Private Network\u003C\/b\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/b\u003E\u003C\/span\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cb\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/b\u003E\u003C\/span\u003E\u003C\/h2\u003E\n\u003Cdiv style=\"text-align: left;\"\u003E\n\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cb\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cspan style=\"font-weight: normal;\"\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/b\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan style=\"font-weight: normal;\"\u003ESecurity is the main reason why corporations have used VPNs for years.\u003C\/span\u003E\u003C\/span\u003E There are increasingly simple methods to intercept data travelling to a \nnetwork.\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"text-align: left;\"\u003E\n\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Ca href=\"https:\/\/www.google.com\/search?client=firefox-b-d\u0026amp;sxsrf=ALeKk00kslgmUA0QEjpLEzbWCs6vk2CC4w%3A1586427861015\u0026amp;ei=1feOXvc02YjV8A_MiYqQDQ\u0026amp;q=wifi+spoofing+means+\u0026amp;oq=wifi+spoofing+means+\u0026amp;gs_lcp=CgZwc3ktYWIQAzIGCAAQFhAeMgUIABDNAjIFCAAQzQI6BAgAEEc6BAgAEEM6AggAOgcIIxDqAhAnOgQIIxAnOgUIABCRAjoFCAAQgwE6CQgAEEMQRhD5AToECAAQCjoICAAQFhAKEB5KNAgXEjAwZzIxM2cyNTVnMjIyZzI4NWcyMzJnMjQ1ZzI2NWc3OGcyMjRnMjMzZzI0OWcyODRKHQgYEhkwZzFnMWcxZzFnMWcxZzJnM2cxZzVnNWcxUO_-UViPsFJg3LNSaAFwAngEgAHlAogB8y2SAQgwLjIuMjIuMZgBAKABAaoBB2d3cy13aXqwAQo\u0026amp;sclient=psy-ab\u0026amp;ved=0ahUKEwi38_eokNvoAhVZRBUIHcyEAtIQ4dUDCAs\u0026amp;uact=5\" target=\"_blank\"\u003EWiFi spoofing \u003C\/a\u003Eand \u003Ca href=\"https:\/\/www.google.com\/search?client=firefox-b-d\u0026amp;q=firesheep+means\" target=\"_blank\"\u003EFiresheep\u003C\/a\u003E are two easy ways to hack information. A useful analogy is that a firewall protects your data while on the computer and a VPN protects your data on the web.\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"text-align: left;\"\u003E\n\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003EMost savvy computer users wouldn't dream of connecting to the Internet without a firewall and up-to-date antivirus. Evolving security threats \nand an ever-increasing dependence on the internet make a Virtual Private \nNetwork an essential part of well-rounded security.\u0026nbsp;\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"text-align: left;\"\u003E\n\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003EIntegrity checks ensure that no data is lost and that the connection has not been hijacked. Since all traffic is protected, VPNs are preferred over \u003Ca href=\"https:\/\/www.google.com\/search?client=firefox-b-d\u0026amp;sxsrf=ALeKk03I7713WbvWjQvWO1hLm6jvOgrPpQ%3A1586429553466\u0026amp;ei=cf6OXoP3G7rT1fAP28io6Ak\u0026amp;q=what+are+internet+proxies\u0026amp;oq=what+are+internet+proxies\u0026amp;gs_lcp=CgZwc3ktYWIQAzICCAAyBQgAEM0COgQIABBHOgYIABAWEB46BwgjEOoCECc6BAgjECc6BQgAEJECOgQIABBDOgUIABCDAToHCAAQFBCHAko1CBcSMTBnMjI2ZzQ0M2cyNjRnMjA3ZzIzM2cyMDdnMjQ5ZzIxMmcyMzVnMjI0ZzE4MmcyMjNKHQgYEhkwZzFnMWcxZzFnMWcxZzFnMWcxZzVnOWc1UM5oWN2rAWDdrAFoAnACeASAAa4DiAGRNJIBCjAuNS4yNC4wLjGYAQCgAQGqAQdnd3Mtd2l6sAEK\u0026amp;sclient=psy-ab\u0026amp;ved=0ahUKEwjD8_rPltvoAhW6aRUIHVskCp0Q4dUDCAs\u0026amp;uact=5\" target=\"_blank\"\u003Eproxies\u003C\/a\u003E. \u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"text-align: left;\"\u003E\n\u003Cbr \/\u003E\u003C\/div\u003E\n\u003Cdiv style=\"text-align: left;\"\u003E\n\u003Cspan style=\"font-size: large;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cb\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cspan style=\"font-weight: normal;\"\u003E\u003Cb\u003EHow a VPN Works\u003C\/b\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/b\u003E\u003C\/span\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cb\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cspan style=\"font-weight: normal;\"\u003E\u0026nbsp;\u003C\/span\u003E\u003C\/span\u003E\u003C\/b\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"text-align: left;\"\u003E\n\u003Cbr \/\u003E\u003C\/div\u003E\n\u003Cdiv style=\"text-align: left;\"\u003E\n\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cb\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cspan style=\"font-weight: normal;\"\u003EVPN protects your privacy by allowing you to anonymously appear to be anywhere you choose which simply means that the\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/b\u003E\u003C\/span\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cb\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cspan style=\"font-weight: normal;\"\u003E user's initial IP(Internet Protocol) address is replaced with one from the Virtual \nPrivate Network provider.\u0026nbsp; \u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/b\u003E\u003C\/span\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cb\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cspan style=\"font-weight: normal;\"\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/b\u003E\u003C\/span\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cb\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cspan style=\"font-weight: normal;\"\u003E Subscribers can obtain an IP address from any gateway city the VPN service provides\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/b\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E.\u003C\/span\u003E \u003Cspan style=\"font-size: small;\"\u003EFor instance, you may live in San Francisco, but with a Virtual Private \nNetwork, you can appear to live in Amsterdam, New York, or any number of gateway cities\u003C\/span\u003E.\u003C\/span\u003E\u003Cb\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cspan style=\"font-weight: normal;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cb\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cspan style=\"font-weight: normal;\"\u003E\u003Cb\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cspan style=\"font-weight: normal;\"\u003EVPN is beneficial because it guarantees a suitable level of security and privacy connected to the systems.\u0026nbsp;\u0026nbsp;\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/b\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/b\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/b\u003E\u003Cspan style=\"background-color: white;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u0026nbsp;\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"text-align: left;\"\u003E\n\u003Cbr \/\u003E\u003C\/div\u003E\n\u003Cdiv style=\"text-align: left;\"\u003E\n\u003Cbr \/\u003E\u003C\/div\u003E\n\u003Cdiv style=\"text-align: left;\"\u003E\n\u003Cspan style=\"background-color: white;\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cu\u003E\u003Cb\u003E\u003Cspan style=\"background-color: white;\"\u003EA simple Analogy\u003C\/span\u003E\u003C\/b\u003E\u003C\/u\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"text-align: left;\"\u003E\n\u003C\/div\u003E\n\u003Cdiv style=\"-webkit-text-stroke-width: 0px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; letter-spacing: normal; line-height: 30px; margin: 0px 0px 20px; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;\"\u003E\n\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan style=\"background-color: white;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003EWhen your computer is connected to a VPN, the computer acts as if it's also on the same network as the VPN. All of your online traffic is transferred over a secure connection to the VPN. The computer will then behave as if it's on that network, allowing you to securely gain access to local network resources. Regardless of your location, you'll be given permission to use the internet as if you were present at the VPN's location. This can be extremely beneficial for individuals using public Wi-Fi.\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"-webkit-text-stroke-width: 0px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; letter-spacing: normal; line-height: 30px; margin: 0px 0px 20px; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;\"\u003E\n\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan style=\"background-color: white;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003ETherefore, when you browse the internet while on a VPN, your computer will contact the website through an encrypted VPN service connection. The VPN will then forward the request for you and forward the response from the website back through a secure connection.\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Ch2 style=\"-webkit-text-stroke-width: 0px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; letter-spacing: normal; line-height: 30px; margin: 0px 0px 20px; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;\"\u003E\n\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan style=\"background-color: white;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003Cb\u003E\u003Cspan style=\"font-size: large;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003EWhy do I need a VPN?\u003C\/span\u003E\u003C\/span\u003E\u003C\/b\u003E\u003C\/h2\u003E\n\u003Cdiv style=\"-webkit-text-stroke-width: 0px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; letter-spacing: normal; line-height: 30px; margin: 0px 0px 20px; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;\"\u003E\n\u003Cb\u003E\u003Cspan style=\"font-size: large;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cspan style=\"font-size: small;\"\u003EHide your IP address\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/b\u003E\u003Cspan style=\"font-size: large;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cb\u003E:\u003C\/b\u003E Connecting to a virtual private network often conceals your real IP address.\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"-webkit-text-stroke-width: 0px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; letter-spacing: normal; line-height: 30px; margin: 0px 0px 20px; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;\"\u003E\n\u003Cspan style=\"font-size: large;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cb\u003EChange your IP address: \u003C\/b\u003EUsing a VPN will almost certainly result in getting a different IP address.\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"-webkit-text-stroke-width: 0px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; letter-spacing: normal; line-height: 30px; margin: 0px 0px 20px; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;\"\u003E\n\u003Cspan style=\"font-size: large;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cb\u003EEncrypt data transfers: \u003C\/b\u003EA Virtual Private Network will protect the data you transfer over public Wi-Fi.\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"-webkit-text-stroke-width: 0px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; letter-spacing: normal; line-height: 30px; margin: 0px 0px 20px; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;\"\u003E\n\u003Cspan style=\"font-size: large;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cb\u003EMask your location: \u003C\/b\u003EWith a VPN, users can choose the country of origin for their internet connection.\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"-webkit-text-stroke-width: 0px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; letter-spacing: normal; line-height: 30px; margin: 0px 0px 20px; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;\"\u003E\n\u003Cspan style=\"font-size: large;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cb\u003E\u003Cspan style=\"font-size: small;\"\u003EAccess blocked websites: \u003C\/span\u003E\u003C\/b\u003E\u003Cspan style=\"font-size: small;\"\u003EEasy access to websites blocked by the government with a VPN.\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003Cb\u003E\u003Cspan style=\"font-size: large;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/b\u003E\u003C\/div\u003E\n\u003Cdiv style=\"-webkit-text-stroke-width: 0px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; letter-spacing: normal; line-height: 30px; margin: 0px 0px 20px; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;\"\u003E\n\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan style=\"background-color: white;\"\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Ch2 style=\"-webkit-text-stroke-width: 0px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; letter-spacing: normal; line-height: 30px; margin: 0px 0px 20px; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;\"\u003E\n\u003Cspan style=\"font-size: large;\"\u003E\u003Cspan style=\"background-color: white;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cb\u003ECan you still be tracked when using a VPN?\u003C\/b\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/h2\u003E\n\u003Cdiv style=\"-webkit-text-stroke-width: 0px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; letter-spacing: normal; line-height: 30px; margin: 0px 0px 20px; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;\"\u003E\n\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan style=\"background-color: white;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003C\/span\u003E\u003C\/span\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003EPeople can still trace you with other methods. Just because your IP is \ndifferent and your traffic is encrypted in a tunnel doesn't mean you \ncan't be tracked. There are other ways people can track you. For \nexample:\u003C\/span\u003E\u003C\/span\u003E\u0026nbsp;\u003C\/div\u003E\n\u003Cul style=\"text-align: left;\"\u003E\n\u003Cli\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003EHackers can find who you are by doxing(\u003C\/span\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003Esearch for and publish private or identifying \ninformation about (a particular individual) on the Internet, typically \nwith malicious intent)\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003Eyour IP isn't the only thing that identifies you on the internet\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003Eyour VPN service can see your IP and what you are doing and if hacked or owned by someone who wants to find you they can\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003Ethey can install malware that is hard to detect and can be installed\n without you knowing,  which means your info will be leaked from the \nmalware\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\n\u003Cli\u003E\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003Eyour VPN can leak your real IP at times.\u0026nbsp;\u003C\/span\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003EYou can also be located by allowing visited websites, third-party apps to access your location. For example, if you are currently making use of a VPN app and you visit a site like \u003Ca href=\"https:\/\/www.where-am-i.net\/\"\u003Ehttps:\/\/www.where-am-i.net\u003C\/a\u003E. , a notification pops up requesting you to allow location access, once you do your location becomes visible.\u0026nbsp;\u003C\/span\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003C\/span\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\n\u003C\/div\u003E\n\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\n\u003Cspan style=\"font-size: small;\"\u003E\u003Cimg alt=\"tobecandidblog.com\" border=\"0\" data-original-height=\"217\" data-original-width=\"386\" height=\"223\" src=\"https:\/\/1.bp.blogspot.com\/-nZ15Ok5ANvQ\/Xo8autx-sQI\/AAAAAAAADp4\/eHQH_y3BDoMBhZCnz-uuX5yCMuOcCem-gCLcBGAsYHQ\/s400\/Screenshot%2B%25285%2529.png\" title=\"tobecandidblog.com\" width=\"400\" \/\u003E\u0026nbsp;\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv class=\"separator\" style=\"clear: both; text-align: center;\"\u003E\n\u003Cspan style=\"font-size: small;\"\u003E\u003Cbr \/\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/li\u003E\n\u003C\/ul\u003E\n\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cb\u003ESummary: \u003C\/b\u003E\u003C\/span\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003EThere are MANY more things that people can use to track you that will take too long to explain. \u003C\/span\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cdiv style=\"text-align: left;\"\u003E\n\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\n\n\u003C\/span\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"text-align: left;\"\u003E\n\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003EIf you want to be safe, install anti-virus, anti-malware, and \nfirewall( but right now windows 10 defender seem to be practically strong as Microsoft has really upgraded their security, all you just need to do is to keep up with the updates weekly as such it's strongly recommended.\u003C\/span\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"text-align: left;\"\u003E\n\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003EIf you don't want to pay there are free versions but remember you get what you pay for, don't mess with anyone (even if you don't suspect them to be a hacker), and don't act tough on the internet.\u0026nbsp;\u003C\/span\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"text-align: left;\"\u003E\n\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003EI \nrecommend you still use a VPN because it is another layer of security, \nbut remember you can be tracked if you are their top priority and if \nthey are smart.\u003C\/span\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"-webkit-text-stroke-width: 0px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; letter-spacing: normal; line-height: 30px; margin: 0px 0px 20px; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;\"\u003E\n\u003Cbr \/\u003E\u003C\/div\u003E\n\u003Cdiv style=\"-webkit-text-stroke-width: 0px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; letter-spacing: normal; line-height: 30px; margin: 0px 0px 20px; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;\"\u003E\n\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cspan style=\"background-color: white;\"\u003EThere are a lot more you need to know on VPN like its legality, pros, cons, VPN apps and the best among them you can find on the internet and all this would be published in my next articles.\u0026nbsp;\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Cbr \/\u003E\n\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cspan style=\"background-color: white;\"\u003ESource(s):\u003Ca href=\"https:\/\/www.tobecandidblog.com\/virtual-private-network-vpn-for-starters\" target=\"_blank\"\u003E tobecandidblog\u0026nbsp; \u003C\/a\u003E\u003Ca href=\"https:\/\/www.whatismyip.com\/what-is-a-vpn\/\" target=\"_blank\"\u003Ewhatismyip\u003C\/a\u003E,\u003Ca href=\"https:\/\/www.vpnmentor.com\/blog\/vpns-101-vpnmentors-vpn-guide-newbies\/\" target=\"_blank\"\u003E vpnmentor\u003C\/a\u003E, \u003Ca href=\"http:\/\/security.stackexchange\/\"\u003Esecurity.stackexchange\u003C\/a\u003E, \u003Ca href=\"https:\/\/www.cnet.com\/news\/enter-for-your-chance-to-win-one-of-10-nordvpn-subscriptions\/?ftag=DSM-16-10aaa1d\" target=\"_blank\"\u003ECnet\u003C\/a\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"-webkit-text-stroke-width: 0px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; letter-spacing: normal; line-height: 30px; margin: 0px 0px 20px; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;\"\u003E\n\u003Cbr \/\u003E\n\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cspan style=\"background-color: white;\"\u003E\u003Cb\u003E#Stay Safe guys\u003C\/b\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"-webkit-text-stroke-width: 0px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; letter-spacing: normal; line-height: 30px; margin: 0px 0px 20px; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;\"\u003E\n\u003Cspan style=\"font-size: small;\"\u003E\u003Cspan face=\"\u0026quot;verdana\u0026quot; , sans-serif\"\u003E\u003Cspan style=\"background-color: white;\"\u003E\u0026nbsp;\u003Cb\u003E\u003Cbr \/\u003E\u003C\/b\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/span\u003E\u003C\/div\u003E\n\u003Cdiv style=\"-webkit-text-stroke-width: 0px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; letter-spacing: normal; line-height: 30px; margin: 0px 0px 20px; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;\"\u003E\n\u003Cbr \/\u003E\u003C\/div\u003E\n\u003Cdiv style=\"-webkit-text-stroke-width: 0px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; letter-spacing: normal; line-height: 30px; margin: 0px 0px 20px; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;\"\u003E\n\u003Cbr \/\u003E\u003C\/div\u003E\n\u003Cdiv style=\"-webkit-text-stroke-width: 0px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; letter-spacing: normal; line-height: 30px; margin: 0px 0px 20px; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;\"\u003E\n\u003Cbr \/\u003E\u003C\/div\u003E\n\u003Cdiv style=\"-webkit-text-stroke-width: 0px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; letter-spacing: normal; line-height: 30px; margin: 0px 0px 20px; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;\"\u003E\n\u003Cbr \/\u003E\u003C\/div\u003E\n\u003Cdiv style=\"-webkit-text-stroke-width: 0px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: 400; letter-spacing: normal; line-height: 30px; margin: 0px 0px 20px; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px;\"\u003E\n\u003C\/div\u003E\n\u003C\/div\u003E\n"},"link":[{"rel":"replies","type":"application/atom+xml","href":"https:\/\/www.tobecandidblog.com\/feeds\/2624282393524839471\/comments\/default","title":"Post Comments"},{"rel":"replies","type":"text/html","href":"https:\/\/www.tobecandidblog.com\/2020\/04\/virtual-private-network-vpn-for-starters.html#comment-form","title":"0 Comments"},{"rel":"edit","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3756476097612670700\/posts\/default\/2624282393524839471"},{"rel":"self","type":"application/atom+xml","href":"https:\/\/www.blogger.com\/feeds\/3756476097612670700\/posts\/default\/2624282393524839471"},{"rel":"alternate","type":"text/html","href":"https:\/\/www.tobecandidblog.com\/2020\/04\/virtual-private-network-vpn-for-starters.html","title":"Virtual Private Network (VPN for starters)"}],"author":[{"name":{"$t":"Unknown"},"email":{"$t":"noreply@blogger.com"},"gd$image":{"rel":"http://schemas.google.com/g/2005#thumbnail","width":"16","height":"16","src":"https:\/\/img1.blogblog.com\/img\/b16-rounded.gif"}}],"media$thumbnail":{"xmlns$media":"http://search.yahoo.com/mrss/","url":"https:\/\/1.bp.blogspot.com\/-ptBe9YocNLo\/XpxaURXfSFI\/AAAAAAAADqs\/kMzKry3oFWsSxDs5HXt-8yellOUcjHZowCLcBGAsYHQ\/s72-c\/images.jpg","height":"72","width":"72"},"thr$total":{"$t":"0"}}]}});