new airtel gprs trick

new airtel gprs trick

Airtel Free GPRS .:

APN - airtelfun.com

Proxy - 100.1.200.99 or 10.2.45.155

Port - 8080

Homepage

http://y2khacks.blogspot.com

keep bal low

work in some state
Google No Country Redirection Trick

Google No Country Redirection Trick

Google No Country Redirection Trick:

If you want no redirection in Google Website than just add NCR

just type

www.google.com/ncr

that's it.

It not show which country
Track Anyone Just By Sending Mail

Track Anyone Just By Sending Mail

Track Anyone Just By Sending Mail

Well u wanna track ur victim or want to get his ip, location, browser settings, language or timings.... all u have to do is get his e-mail id...

Once u have it.

Go to http://www.readnotify.com

register there...

Once registered . . . send a mail to ur victim by the email id u registered at readnotify.com

But before sending the mail just add ".readnotify.com" with the victims id.. for example

xxxxx@yahoo.com.readnotify.com

install android 2.2 froyo on samsung galaxy

Update: Android 2.3.3 Gingerbread is now available for the Samsung Galaxy S. Check out the installation guide below.
Guide Updated: Install Android 2.3.3 Gingerbread on Samsung Galaxy S
Updated: How to Install Android 2.3 Gingerbread on Samsung Galaxy S
Samsung has started rolling out the official Android 2.2 Froyo upgrade for the Galaxy S. You can install it using Samsung Kies.
Installing Android 2.2 on Samsung Galaxy S using Samsung Kies – Official Update

1. Download Samsung Kies and install it on your PC.
2. Connect your Galaxy S to your PC.
3. Select your phone and upgrade your firmware to Android 2.2 Froyo.
If the update is not available for your region, then use this tutorial.
How To Install Android 2.2 Froyo on your Samsung Galaxy S
How to Upgrade Samsung Galaxy S to Android 2.2 Froyo
The latest Android 2.2 Froyo ROM for the Samsung Galaxy S is I9000XXJP2.
Also check out this guide: How to Root Samsung Galaxy S
To upgrade your Samsung Galaxy S to Android 2.2 Froyo, you need to download these files
Odin 3 v1.0
S1_ODIN_20100512.pit
i9000XXJP2 Firmware (password: samsung-firmwares.com)
How to Install/Upgrade To Android 2.2 Froyo on Samsung Galaxy S: Instructions
1. Remove the battery, SIM card and MicroSD card from your phone and reinsert the battery.
2. Hold down the Home + Volume Down buttons and press the Power On button.
3. You should now see a download screen
4. Open Odin 3 v1.0
5. Click on the PIT button and load the “s1_odin_20100512.pit” file
6. Click on the PDA button and load the “I9000XXJP2-REV03-PDA-CL464213.tar” inside the I9000XXJP2 RAR file.
7. Click on the PHONE button and load the “MODEM_I9000XXJP2.tar”inside the I9000XXJP2 RAR file.
8. Click on the CSC button and load the “GT-I9000-CSC-MULTI-OXAJP2.tar”inside the I9000XXJP2 RAR file.
9. Click on the “Re-Partition” checkbox
10. Connect your Galaxy S to your PC with the USB cable and set USB Debugging On (System > Applications > Development > USB Debugging.)
11. Click on the Start button in Odin and your Galaxy S will be upgraded to Android 2.2 Froyo.

Note: If you have any problem with the method detailed above, you can try out this new guide – Install Android 2.2 Froyo on Samsung Galaxy S.
use mobile camera as a web camera

use mobile camera as a web camera

Many of us don’t have Webcams and might want to use your mobile as a Webcam to save on some cash and also to put your mobile camera to better use.
You will need to install your Bluetooth stack / drivers – Microsoft, Bluesoliel, Widcomm etc if you plan to use Bluetooth to connect your phone and PC. You will also need to install Nokia PC Suite in case you are using a Nokia phone.
There are two applications to use your mobile as a Webcam:
1. Mobiola Webcam
Download Mobiola Webcam

Mobiola Webcam is the most popular Webcam software for mobiles, it is compatible with many phones – Symbian S60, S60 V3, UIQ, Windows Mobile, Blackberry etc. In case it isn’t compatible with your phone, but your phone supports J2ME, you can use the Mobiola Webcam Lite version. It runs on almost all J2ME phones. In case, you have some prehistoric phone with no J2ME support, then it’s time to dump it and get a new phone.
hacking games

hacking games

hi frnd

if you want to learn hacking so download this game and install it and learn hacking

this is based on commands   and  this cmd are use in hacking


download it Here
Make Windows XP Genuine Crack

Make Windows XP Genuine Crack

You can easily make your Windows XP Genuine if you have parited version of XP.There are two way to get rid of this, either you buy original Xp windows or follow some tricks and tips which can help you to crack your windows Xp.This is very simple method all you have do is to mess with your windows registry.You don’t need to used any software or any crack and patch to make you windows XP Genuine.
Just go to following simple method to make Xp geneuine forever

Method
1. Open your Notepad.
2. Copy the following code and paste it in notepad.
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion]
“CurrentBuild”=”1.511.1 () (Obsolete data – do not use)”
“ProductId”=”55274-640-1011873-23081?
“DigitalProductId”=hex:a4,00,00,00,03,00,00,00,35,35,32,37,34,2d,36,34,30,2d,\
31,30,31,31,38,37,33,2d,32,33,30,38,31,00,2e,00,00,00,41,32,32,2d,30,30,30,\
30,31,00,00,00,00,00,00,00,86,56,4e,4c,21,1b,2b,6a,a3,78,8e,8f,98,5c,00,00,\
00,00,00,00,dd,da,47,41,cc,6b,06,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,38,31,30,32,36,00,00,00,00,00,00,00,b5,16,\
00,00,83,83,1f,38,f8,01,00,00,f5,1c,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,66,e5,70,f3
“LicenseInfo”=hex:33,b7,21,c1,e5,e7,cd,4b,fd,7c,c6,35,51,fd,52,57,17,86,3e,18,\
d3,f4,8c,8e,35,32,7b,d1,43,8d,61,38,60,a4,ca,55,c9,9a,35,17,46,7a,4f,91,fc,\
4a,d9,db,64,5c,c4,e2,0f,34,f3,ea
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WPAEvents]
“OOBETimer”=hex:ff,d5,71,d6,8b,6a,8d,6f,d5,33,93,fd



3. Then save it with .reg extension. For example, save it as xplicense.reg
4. Double click the saved file and click Yes if prompted.
5. DONE, Your Windows XP is genuine now.
Enjoy your Genuine XP

How to Disable Autorun of Usb & Cd drives

This is a very commom problem sometime.Some time we need to disable autorun of usb and cd drives.To disable autorun of usb and cd drives follow following steps:
Go to run and type gpedit.msc command
You will see the Group Policy window. Then  select Administrative Templates \ System in the tree
You will see an item in the right side pane called “Turn off Autoplay”
Double click on that  item, and set the radio button to Enabled, and change the “Turn off Autoplay on” to All Drives.

disable windows logo key

disable windows logo key

When I was recently playing games and this nasty windos logo key keep annoying me , cause I often accidently clicked it , and I start to search a solution to solve my problem, and found the following article in microsfot website, and it did work, hope this helps, thanks!
CODE
http://support.microsoft.com/?kbid=181348
or in other articles, u can copy the following messages into ur notepad and save as *.reg, and use it..
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout]
“Scancode Map”=hex:00,00,00,00,00,00,00,00,03,00,00,00,00,00,5b,e0,00,00,5c,e0,\
00,00,00,00
Search Engine Optimization SEO Blogspot

Search Engine Optimization SEO Blogspot

Here is a basic  Search Engine Optimization SEO for Blogspot blogs.It is just the title  optimization for blgspot blogs.I know most of people know but there are many who don’t know about this optimization.
Go to google and write site: your blog name here and press enter .You will see list of pages index in google.If you have not optimize then your post page titles will shown  after the blog headings.This is not good for seo and google ranking.You can optimize title in following way.
Go to edit HTML section .
Now press Ctrl+F and search for
.
Replace that code with  the following code and save your template.
Now your blogspot blog is optimize for google search engine.After  optimization go and create a new post for your blog then go to google  and again search for this
 site:your site name


You will see the difference between the search you done before and now.
How to Change Windows 7 Logon Screen Background?

How to Change Windows 7 Logon Screen Background?

How would you like to change the logon screen background in Windows 7 so as to give your Windows a customized look and feel? With a small tweak it is possible to customize the Windows 7 logon screen and set your own picture/wallpaper as the background. Changing logon screen background in Windows 7 is as simple as changing your desktop wallpaper. Well here is a step by step instruction to customize the
logon screen background.
1. The image you need to set as the background should be a .jpg file and it’s size should not exceed 245KB.
2. The image resolution can be anything of your choice. However I prefer 1440 x 900 or1024 x 768. You can use any of the photo editing software such as Photoshop to compress and set the resolution for your
image. Once you’re done, save this image as backgroundDefault.jpg.
3. You will need to copy this image to
C:\Windows\system32\oobe\info\backgrounds
You will need to create that path if it does not already exist on your computer. 4. Now open the Registry Editor (Start -> Run -> Type regedit) and
navigate to the following key
HKLM\Software\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background
If Background does not exist rightclick LogonUI, select New and then Key, and then name it Background. Now locate OEMBackground (listed on the right side). If it does not exist, right-click Background and
select New and then DWORD and name it OEMBackground.

smallest os in the world

Kolibri is a small x86 assembler hobby operating system. It forked off MenuetOS in 2004 and has mostly been developed by ex-USSR community since. API and ABI is being enreached with developer-frendly features. User interface is not that good as we used with other os.


Counter Strike 1.6 Aimbot  CS 1.6 Wallhack Cheats Download

Counter Strike 1.6 Aimbot CS 1.6 Wallhack Cheats Download

Here is very cool hack for counter strike 1.6  players.This is cca privte hook v2 0 by softwind.This is one of the best cs 1.6 hack I have used so far.It is all in one cs1.6 hack.This counter strike hack contains following hacks
  • Aimbot hack
  • Wall hack
  • Speed hack

how to copy movie or data from scratched cd or dvd

how to copy movie or data from scratched cd or dvd

his is the most common problem, people encounter. They get a CD/DVD on rent and try to copy the movie. But alas, the CD is scratched, so after sometime, you get a cyclic redundency check error.

Well, things are not as hopeless as it seems. Here are few methods: 1.
Use Nero to create an image of the media. In most of the ways, this happens, so that you can later use Nero Image Drive to mount the CD and then view it.

2.
Create a new Briefcase, by right clicking and choosing a new BriefCase, in the folder that you want to copy the file. Then synchronize the briefcase with the MPEG/AVI file of the video. At any instant of time, if you feel that the system hangs up, just close the synchronization. This method will copy the file, to the scratched extent. This method isparticularly useful, if the scratch is at the end of the movie.
write your name in task bar

write your name in task bar

Go to control panel and click on regional and language option.
click on customize

go to time tab
and edit d AM,PM symbol
and write your name there
Your name will appear with the clock

Change or Add Image to Google Background

Google has come up with new update.Now you can add your own background image to google homepage.We have seen background image on bing home page but now it turn of google.This update of google is very cool.

 You need to go to
http://www.google.com/

  1. Sign in to your Google Account in the top right corner of the Google homepage. Don’t have one? It’s easy to create a Google Account.
  2. Click Change background image in the bottom left corner of the Google homepage.
  3. Choose where to select your background image:
    • From my computer: Select an image saved on your computer.
    • My Picasa Web photos: Select an image from your Picasa Web Albums.
    • Public gallery: Select from public photos featured in Picasa Web Albums.
    • Editor’s picks: Select from a set of Google recommended images.
  4. Once you’ve chosen your image, click Select at the bottom of the window. It may take a moment before your new Google homepage background appears.
How to change Google logo text?

How to change Google logo text?

There are are lots of website which allow you to change the default logo text in Google search.Just go to those website and just
Enter your name
Select the style you want to use.
And here is your google search engine with your own name.
Bookmark it and make it you default home page.
Now every time you open your brower your own search engine will open.
You can also visit gmail,yahoo,msn,aol from same page from drop down
List of websites
1.http://www.blingmysearch.com/


2.http://buzzisearch.com/


3.http://googlemyway.com/
If you have other website please reply here I will update the list
enjoy…
Command Prompt Tricks Tips & Hacks

Command Prompt Tricks Tips & Hacks

There are lot of command prompt tricks and tips which many of us don’t know about.Command prompt can be very useful if you know how to use.Just go to cmd and check the following cool commands
 1. systeminfo
With this command, you can retrieve the following information:
Host Name
OS Name
OS Version
OS Manufacturer
OS Configuration
OS Build Type
Registered Owner etc
2. driverquery
Get Installed Driver Information
3. ipconfig /all
information about your network connection and IP address


4. subst W: C:\windows
 Map A Drive Letter to a Folder
5. tasklist 
List All Tasks Running On The Computer
6.taskkill /im programnames.exe /f
to Kill A Program
There are many other also will update soon

How To Protact Web Server From Hackers

Creating your own website is not simply about putting some pages and information online. Ensuring the security of your website is a bigger and highly crucial task. Most websites these days have a dedicated web server that gives them the leverage to grow and develop further. Basically the websites with a high volume of web traffic, a heavy database and complex application specifications require an exclusive web server. It is extremely important to hack proof your web server in order to protect your website and business.
There are a great number of hackers out there in the web world who are looking for opportunities to exploit your web server and cause serious damage. These hackers look to deface the websites with malicious content, use the scripts on the server to send out spam or phish out the personal sensitive information of the website users. Such attacks also attempt to tamper with parameters and gain access to confidential files or cross-site scripting or cookie poisoning to alter the customer data. These kinds of invasions can prove to be fatal for e-commerce and finance based websites. To prevent your web server from falling prey to such web attacks, here are some important recommendations and anti hacking tips.You need to follow a two-pronged approach to safeguard your web server from any hackers.
The first layer is a firewall that exists to block any unwarranted unused Internet ports. A good firewall will use a rule based access system to allow only the legitimate users to enter and filter out as well as obstruct any malicious traffic from accessing the server. Also create strong passwords that use a combination of characters, numbers and special characters in order to keep the password hackers at bay.
The second element is to put in place an intrusion protection service. This is a more sophisticated approach to deal with hackers wherein you stop the illegitimate entry of users at the source itself. If a firewall works on the front line, an intrusion protection system works on the back end to deal with the enemies. This involves putting all the compromised hosts in the quarantine section and letting the genuine users move through efficiently. But setting up such an anti-hacking arrangement is only the first step. The hackers are moving fast and ahead with newer techniques to break into and sabotage the web servers. So, you need to continually update and monitor the filters, blacklists and all other aspects.
Cool JavaScript Tricks and Codes

Cool JavaScript Tricks and Codes

Here is list of some cool java script Codes.To run these scripts you have to copy and paste these codes in your web browser and then hit enter.The java script will get executed.Javascript is a very cool language if you how to play with it.Check out some best example of this language.
1.This script code will pulls off all the images from your web page and rotates them in a circle. The best place to test is a website with many images. (Google Images for an example).you can try it on google .com also.


Change your ip in 1 min

Change your ip in 1 min

1. Click on “Start” in the bottom left hand corner of screen
2. Click on “Run”
3. Type in “command” and hit ok
You should now be at an MSDOS prompt screen.
4. Type “ipconfig /release” just like that, and hit “enter”
5. Type “exit” and leave the prompt
6. Right-click on “Network Places” or “My Network Places” on your desktop.
7. Click on “properties”
You should now be on a screen with something titled “Local Area Connection”, or something close to that, and, if you have a network hooked up, all of your other networks.
8. Right click on “Local Area Connection” and click “properties”
9. Double-click on the “Internet Protocol (TCP/IP)” from the list under the “General” tab
NO wating in rapidshare

NO wating in rapidshare

THIS “cheat” for RAPIDSHARE DOWNLOADS eliminates the “WAITING” for the file. No more COUNTDOWNS. So heres what you do:
1. First, Find a rapidshare download.
2. Hit the FREE BUTTON, like always.
3. While your waiting for it to countdown, change the URL in the bar to: Code:
java script:c(countdown = 0);
and hit ENTER or the GO button over and over. Eachtime you do so, it decreases 10-20 seconds. Few times and the link appears.
Cool Google talk Bots

Cool Google talk Bots

Here is some cool list of google talk bots.Which you must add as your friend.These google talk bots are of really great use .You can enjoy these bots when you are getting bore on gtalk.
Some of them are……




1. calc@askme.im – Basic calculator


2.  jokes@askme.im –Some cool Jokes


3. quotes@askme.im – For nice quotes


4. movies@askme.im – Bollywood Movie Reviews


5. games@gtalkbots.com – Play a game in your gtalk


6.  fx@askme.im – Currency Conversion


7.  cricket@ibnalerts.com – Instant cricket and sport alerts from IBN Live


8. astro@askme.im - For your daily horoscope


9.  weather@askme.im -For your weather update.


10. stocks@askme.im – Live Stock Quotes




How to add them Copy the word written in bold and add then to your gtalk contact that done.
enjoy..

How to Control move Mouse Pointer from Keyboard

How to Control move Mouse Pointer from Keyboard
You can try this method if you are bore of using your mouse in normal way.You can control your mouse pointer with keyboard keys in all windows . When your mouse stops working, you can enable this keyboard feature to complete your important work. This keyboard mouse can perform all tasks which are same as of normal mouse.

Follow the given steps to activate the keyboard mouse:

1.  log into your computer with administrative rights.
2. To activate this feature, press left Alt+left Shift+NumLock keys at once and you will receive a small
Make ur Windows Xp Genuine : All Hacks here

Make ur Windows Xp Genuine : All Hacks here

Legal Disclaimer :

Any actions and or activities related to thematerial contained within this Website is solely your responsibility.Do not Missuse the Information given out here. Theauthors will not be held responsible in the event any criminalcharges be brought against any individuals misusing theinformation in this Website to break the law.
This site contains materials that can be potentially damaging or dangerous. If you do not fully understand something on this site, then GO OUT OF HERE! Refer to the laws in your province/country before accessing, using,or in any other way utilizing these materials. These materials are for educational and research purposes only. Do not attempt to violate the law with anything contained here. If this is your intention, then LEAVE NOW! Neither administration of this server, the authors of this material, or anyone else affiliated in any way, is going to accept responsibility for your actions.
These are just a collection of what is available on world wide web,
It has no connection in any kind of developement with the author.
Do Not Distribute in Any Form :


This activates ur "Windows Xp Home" if not activated and completely validates it.

When you Install Windows Xp Home Edition it asks "60 days lest for the activation" please Activate it Now .. This Hack will take your Way out like a piece of Cake.


**This is ment for educational purpose only.


To Download this Crack right click on the link below and Open it in a new Window.

Vodaphone free gprs trick

Vodaphone free gprs trick

Vodaphone india network has emerged as a another biggest mobile network within a short period.but a free vodaphone gprs trick for what we all were searching for until now,i have tracked down certain settings that will make us use free vodaphone gprs pack unlimited.we have given two manual vodaphone free gprs settings to access unlimited vodaphone gprs.configure the vodaphone mobile gprs settings in your mobile as follows,
Setting1:
Proxy = yes /enabled
Proxy IP add = 196.006.128.012
Authentic = Normal
Bearer = packed data
Home page = www.live.vodafone.com
Setting2:
Proxy = yes OR Enabled
Proxy IP ADD. = 010.010.001.100
Bearer = Packed data
Port = 9401
INF Mode = HTTP
Connection name / Profile Name = HUTCH_GPRS
Homepage = http://www.hutchworld.co.in
Use the access point for gprs as portalnmms.
post your comments if any,dont forget to subscribe to my feed to receive the tricks in email as soon as i post.
tags: vodaphone hacks,vodaphone free gprs tricks,free calls,gprs in vodaphone.
Text to Voice trick

Text to Voice trick

Make your computer to speak whatever you type

This trick is working on all microsoft operating system and does not require any programming skills.You have to follow just simple steps and your own Text to Voice software will be ready.. Ok,the trick is fairly simple and requires only 3 simple steps from your side.Let’s Begin the tutorial with screenshots to Make Your Computer Speak Whatever You Type
1.Open Notepad and copy and paste the following code into it

Dim message, sapi
message=InputBox("You type i speak?","Speak to Me")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak message

Text to Voice trick - The Ethical Hacking Guide

2.Now save the notepad file with the name speak.vbs at your desktop.
3.Now double click on speak.vbs type in the box whatever you want your computer to speak for you
. Its a really awesome trick to impress everybody with your computer skills
Top Tricks n Cheats

Top Tricks n Cheats

This Is crazy!!

Set Processes Priority


Follow this tip to increase the priority of active processes, this will result in prioritisation of processes using the CPU.

CTRL-SHIFT-ESC
1.Go to the second tab called Processes, right click on one of the active processes, you will see the Set Priority option

2.For example, your Run your CDwriter program , set the priority higher, and guess what, no crashed CD’s

Shutdown Trick !


Imidiate rapid shut down window
while shutting down window. open task manager(Ctr+Alt+Del),
Select shut down tab. and press ' Ctrl ' key while select Turn Off from dis tab.
Count 5 4 3 2 1 Voila!!! U r window will rapidly shut down.


Speed Up Ur Shut down !!

Start Regedit.
Navigate to HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control.
Click on the "Control" Folder.
Select "WaitToKillServiceTimeout"
Right click on it and select Modify.
Set it a value lower than 2000 (Mine is set to 200)
.

and !

Like previous versions of windows, it takes long time to restart or shutdown windows xp when the "Exit Windows" sound is enabled. to solve this problem you
must disable this useless sound. click start button then go to settings -> control panel -> Sound,Speech and Audio devices -> Sounds and Audio Devices -> Sounds, then under program events and windows menu click on "Exit Windows" sub-menu and highlight it.now from sounds you can select,choose "none" and then click apply and ok. now you can see some improvements when shutting down your system.



**new **

Crazy !!

Hide ur folders.. never known trick !!!!!!!!!! Disguise them to "Recycle Bin"



Rename any folder with extension {645FF040-5081-101B-9F08-00AA002F954E}
eg,
if u've a folder games
press F2,
then type, "games.{645FF040-5081-101B-9F08-00AA002F954E}"
c the magic....
then 2 get to original form,
remove the extension using
"ren games.{645FF040-5081-101B-9F08-00AA002F954E} games" in dos or as a bat file


n u are done..

~cheers~


System information


system up time only for xp professional edition
It boasts how long it can stay up. Whereas previous
Facebook Tips and Tools

Facebook Tips and Tools

Tag Friends in Your Status and Posts
One of the most popular features on Facebook is tagging, which gives you the ability to identify and reference people in photos, videos and notes. Today, we are adding a new way to tag people and other things you're connected to on Facebook — in status updates and other posts from the Publisher. It's another way to let people know who and what you're talking about.

People often update their status to reflect their thoughts and feelings, or to mention things they feel like sharing. Sometimes that includes referencing friends, groups or even events they are attending — for instance, posting "Grabbing lunch with Meredith Chin" or "I'm heading to Starbucks Coffee Company — anyone want some coffee?".

Now, when you are writing a status update and want to add a friend's name to something you are posting, just include the "@" symbol beforehand. As you type the name of what you would like to reference, a drop-down menu will appear that allows you to choose from your list of friends and other connections, including groups, events, applications and Pages. Soon, you'll be able to tag friends from applications as well. The "@" symbol will not be displayed in the published status update or post after you've added your tags.


Facebook Tips and Tools - The Ethical Hacking Guide

Friends you tag in your status updates will receive a notification and a Wall post linking them to your post. They also will have the option to remove tags of themselves from your posts. We hope that tagging your status updates and others posts from the Publisher will enable you to share in a more meaningful and engaging way, and connect with even more people. We're rolling this feature out over the course of the next few weeks, so you may not see the new feature just yet.
ALL Nokia Secret Codes

ALL Nokia Secret Codes

Scroll Down to view Specific Model Numbers!!!!


*** WARNING: Using secret codes may be harmful to your phone and result in disabling or worse. Use these codes at your own discretion, we accept no responsiblility for blocked pones while using these codes!!!
IMEI Number
*#06# Cells Identity Code (IMEI = International Mobile Equipment Identity)
XXXXXX XX XXXXXX X
TAC FAC SNR SP

TAC = Type Approval Code (first 2 digits = country code of the approval-country )
FAC = Final Assembly Code: (01,02 = AEG)
(10,20 Nokia)
(40,41,44 Siemens)
(30 Ericsson)
(50 Bosch)
(51 Sony,Siemens,Ericsson)
(60 Alcatel)
(65 AEG)
(70 Sagem)
(75 Dancall)
(80 Philips)
(85 Panasonic)

SNR = Serial Nr.
SP = Spare (always "0")

Software Version
*#0000# shows the software version
Signal Processing
*3370# - Enchanced full Rate Codec (EFR) activation. It will automatically restart.
#3370# - Enchanced full Rate Codec (EFR) deactivation
*4720# - Half Rate Codec activation. It will automatically restart.
#4720# - Half Rate Codec deactivation
Enchanced Full Rate will give you much better sound quality when you enable it. The new Enhanced Full Rate CODEC adopted by GSM uses the ASELP (AlgebraicCode Excitation Linear Prediction) compression technology. This technology allows for much great voice quality in the same number of bits as the older Full Rate CODEC. The older technology was called LPC-RPE (Linear Prediction Coding with Regular Pulse Excitation). Both operate at 13 kilobits.(but you take up more space on the network, so they can charge you more) - Talk-time is reduced with about 5%

Nokia E-Series Secret Codes

Check software version and the release number of your device:
*#0000#

See WLAN MAC address:
*#62209526#

See Bluetooth MAC address:
*#2820#

To hard reset and restore to factory settings:
*#7370# (default lock code is 12345)

See IMEI (International Mobile Equipment Identity) number:
*#06#

Check number where calls are diverted:
*#61#

To display your phone's life timer, type: #92702689#


Please use the following two codes with extreme care:
  • To soft reset the phone and reset phone settings type: *#7780#
  • To hard reset and completely erase all data on the phone and restore it to factory settings, type *#7370#. You'll be asked for a lock code. The default Nokia lock code is 12345.
Unlock your Cell Phone

Unlock your Cell Phone

Phone unlocking

If you own a GSM type cellphone that you purchased at a discounted price when you signed up for service, the chances are that the cell phone company has 'locked' your phone so it will only work with their service.

If unlocked, you're free to use your choice of SIM and service with the phone, potentially saving you substantial money and adding to the flexibility of your phone.
you can use it with any GSM service provider and SIM, anywhere in the world.Phones are naturally unlocked, but a service provider might lock them

When originally manufactured, all GSM cell phones are unlocked. That is, they can be used with any SIM from any cellphone service provider - always assuming, of course, that the cellphone service provider has compatible GSM service on the same frequency bands that the phone can operate on. Most cell phone service providers
electronically 'lock' the phone so that it can only be used with their service. There are obvious reasons why they choose to do this - in particular, to force you to pay what are usually very high roaming charges when you take your phone out of their network and use it elsewhere in the world.

Fortunately, this locking is reversible. With some phones, it is possible to simply enter an unlocking password code into the phone and it is immediately then unlocked. Other phones need to be connected up to a special unlocking data terminal
Google Hacking

Google Hacking

Google HackingThis is a featured page

google hacking: Rahul 
Dutt Avasthy



These methods will be easily understood by the Hackers

Any help for the Novice Hackers Please drop in your Comments : Rahul


u can also drop in ur E - Mail Id's to be mailed a detailed Presentation on Google HACKING



Using Google, and some finely crafted searches we can find a lot of interesting information.


For Example we can find:


Credit Card Numbers


Passwords


Software / MP3's

HACK Net protector 2010Reported

HACK Net protector 2010Reported

HACK Net protector 2010
Nov 2 2009, 9:01 AM EST | Post edited: Aug 27 2010, 10:48 AM EDT
hi guys want to know how to get free license of net protector of 6 months
and free crack ssend msg on this site or start thread .
1step download net protector 2009 or 2010 i will sen d u lot of working keys license keys .



com13

E-3F24303831

RVPE-ENQH-EKTK-PQKK-KPJR-KTWB

newww !! date:- 23-8-2010
reveal net protector hack

just go to this site and download the patch of this antivirus
www.abdulrauf.hpage.com
www.technotatva.hpage.com

new keys

E-73A3A26313
HR-D952-C91D-F1F1-B7A7-90D3
RJKE-EEQZ-PRHH-PGWK-LPJR-WLWB
06 Jan 2011

enjoy
BSNL Broadband Hack

BSNL Broadband Hack

BSNL Broadband Hack for Speed


Fed up of frequent network down on BSNL Broadband. The solution? There is small hack on BSNL for this. Use third party DNS servers instead of BSNL DNS serversor run your own one like djbdns. The easiest options is to use OpenDNS. Just reconfigure your network to use the following DNS servers:
208.67.222.222
208.67.220.220
Detailed instructions specific to operating system or your BSNLmodem are available in the OpenDNS website itself. After I reconfigured my BSNL modem to use the above 2 IP addresses, my DNS problems just vanished! Other ‘freebies’ that come with OpenDNS are phishing filters and automatic URL correction. Even if your service provider’s DNS servers are working fine, you can still use OpenDNS just for these two special features. After you hack BSNL DNS servers, you will see a noticeable improvement in your broadband speed.
CRACK ID/EMAIL AND PASSWORD ALONG WITH IP ADDRESS + ISP NAME

CRACK ID/EMAIL AND PASSWORD ALONG WITH IP ADDRESS + ISP NAME

NEW UPDATED VERSION OF OUR TEAm

ALL IN ONE SUPER HACKWARe....

What it can hack:

1.ALL mail ids: gmail,yahoo,rediff,aol,msn,hotmail etc.
2. Social networkinng sites: orkut,facebook,myspace,twitter some more
3. SOme premium accounts like Paypals, liberty reserves ( ONLY PRIVATE VERSION)
4. SOme php and html sites admin logins by online bruteforce etc..


I hopt this would be enough..

DOWNLOAD LINK:

http://hotfile.com/dl/55669181/c8a50bd/AIO_hackwarev5.exe.html

ENJOY GUYs,

This is Trial Version..ONLY>.. EXPIRES IN 3 Days from ur install... TO buy Full version Contact at virus71414@gmail.com

IP Address Hack, n all bt it

IP Address Hack, n all bt it

IP Hack contd..


In here I have figure out some very easy but cool ways to trace out the geographical location and various other infos like ISP details etc of a remote computer using its IP.

Well I guess its one of the most important must learn manul for boys out there if you want to impress your friends particularly gals whom you’ll meet online in a chat room and tell them their geographical locations and ISP details and make them surprised and impressed .

In the practical execution of this manual you don’t have to work much as it is very simple only you have to use your brain to understand some symbols and some format of expressions and use your IQ to execute things the right way.



What is IP and how to get the IP of a remote system::




Getting the IP or Internet Protocol of a remote system is the most important and the first step of hacking into it. Probably it is the first thing a hacker do to get info for researching on a system. Well IP is a unique number assigned to each computer on a network. It is this unique address which represents the system on the network. Generally the IP of a particular system changes each time you log on to the network by dialing to your ISP and it is assigned to you by your ISP. IP of a system which is always on the network remains generally the same. Generally those kind of systems are most likely to suffer a hacking attack because of its stable IP. Using IP you can even execute system commands on the victim’s computer.

Lets take the example of the following IP address: 202.144.49.110 Now the first part, the numbers before the first decimal i.e. 209 is the Network number or the Network Prefix.. This means that it identifies the number of the network in which the host is. The second part i.e. 144 is the Host Number that is it identifies the number of the host within the Network. This means that in the same Network, the network number is same. In order to provide flexibility in the size of the Network, here are different classes of IP addresses:



Address Class Dotted Decimal Notation Ranges

Class A ( /8 Prefixes) 1.xxx.xxx.xxx through 126.xxx.xxx.xxx

Class B ( /16 Prefixes) 128.0.xxx.xxx through 191.255.xxx.xxx

Class C ( /24 Prefixes) 192.0.0.xxx through 223.255.255.xxx



The various classes will be clearer after reading the next few lines.



Each Class A Network Address contains a 8 bit Network Prefix followed by a 24-bit host number. They are considered to be primitive. They are referred to as "/8''s" or just "8's" as they have an 8-bit Network prefix.

In a Class B Network Address there is a 16 bit Network Prefix followed by a 16-bit Host number. It is referred to as "16's".



A class C Network address contains a 24-bit Network Prefix and a 8 bit Host number. It is referred to as

"24's" and is commonly used by most ISP's.

Linux-based Anti-virus rescue CDs - and the alternatives!

Linux-based Anti-virus rescue CDs - and the alternatives!

Let me begin with a big fat disclaimer: You do not need anti-virus software. You do not need it in Windows, nor Linux. Blacklisting is an obsolete method of maintaining security of your operating system. BUT ...
Some people just have to have anti-virus programs running and wasting their system resources. Well, you can't change the world overnight. My mission is not to convert every single frightened computer user out there to the blissful doctrine of don't click and the strategic use of whitelisting tools for computer-related protection. I am merely trying to make life easier for my readers. And some just happen to use anti-virus programs.
All right, so you are a Windows user and you need anti-virus programs. How about a compromise? Rather than running them in real-time, why not download a handful of bootable live CD images and keep them in store for a rainy day? 



On the agenda ...

So today, we will do the following:
Learn about a handful of Linux-based anti-virus live CD. You can call them ultra-specialized system rescue distributions, if you will. They are very similar to what BartPE and Ultimate Boot CD for Windows offer. Links to extra reading material further below.
Second, we will talk about alternative, superior security approaches that should make your Windows smarter, leaner, meaner, and more secure. We will refer to a number of highly effective whitelisting tools that you should consider as a permanent replacement to your blacklisting, signature-based scanners.
Finally, since we're talking Linux, we will mention once again why anti-virus software is unnecessary in Linux and why pretty much any Linux distribution is automatically a system rescue image. OK, let's see what we've got.
Note: I won't be testing the quality and efficiency of these tools against any real-life scenarios. I will merely be showing you that they exist and let you choose whatever you want to do with them.
Some Cool Hidden Firefox Tricks

Some Cool Hidden Firefox Tricks

1. Make Firefox Dance.
chrome://global/content/alerts/alert.xul
It makes the Firefox window auto collapse and expand in the corner of your monitor screen.

2. Open Firefox inside Firefox.
chrome://browser/content/browser.xul
This opens another Firefox inside a tab in the the existing Firefox window.

3. Options inside a Tab
chrome://browser/content/preferences/preferences.xul
This opens the Options dialog box inside the Firefox tab. See the screenshot above.
Top 10 Best upcoming cell phones

Top 10 Best upcoming cell phones

Top 10 Best Upcoming Cell Phones
Sure, you want a new phone right now, but carriers and manufacturers have promised some truly spectacular, knock-your-socks-off phones coming to U.S. shelves between now and June. With 4G right around the corner and mobile hardware and software getting better and better, you should take a look at what’s coming down the pike in the next couple of months before you buy.
The first three weeks of the year have seen more than a dozen announcements from top U.S. carriers, and we’re sure to see more at the Mobile World Congress trade show in mid-February. Whether you’re with AT&T, Sprint, T-Mobile, or Verizon Wireless, there’s something exciting on the horizon.
It wasn’t easy keeping it to just 10, but we’ve come up with this list of the most exciting phones that you’ll be able to buy in the coming months. To check out pictures of these handsets,


1. Apple iPhone 5
apple thumb Top 10 Best Upcoming Cell Phones 2011 Sorry folks, we couldn’t ignore the next-gen Jesus phone. Nobody knows anything reliable about the upcoming iPhone, although noisy blog speculation is already in full force. We don’t know if it will be called iPhone 5, iPhone 4G, or something else. But we’re pretty sure it’s coming in June or July—iPhones always do. Surely Apple will have plenty of surprises for us, and it’s likely that a new iPhone will come with industry-leading features. The real question is, with a Verizon iPhone 4 coming in early February—can you wait that long?

2. Motorola Atrix (AT&T)
atrix thumb Top 10 Best Upcoming Cell Phones 2011
How to create your first java program

How to create your first java program

Downloading the Java SDK  
Note: If you are using Ubuntu, skip this part and go directly to the Ubuntu installation instructions.

  1. Go to the official Java SE download page
  2. Download the latest Java Platform, Standard Edition. You do not need to download the JRE. Download the JDK, which includes the JRE. If you're interested to know the difference between the JDK and the JRE, check our JavaBeginnersFaq.
  3. At the download page, select your target platform, which includes Windows, Linux and others. Save the file in a directory of your choice.
Installing the Java SDK  
These instructions will assume that you are installing the JDK1.6.0_21. It is recommended to leave the version number in the install directory (e.g. 1.6.0_21). This will allow you to install several versions of the jdk under the same root directory (e.g. C:\java), and to easily recognize which version of the JDK lies in which directory.
Windows
  1. Double-click the file you have downloaded.
  2. Follow the installer instructions. You don't need to change the default options. You may just change the directory where you want to install the JDK. After the installation is over, make sure that the directory you have chosen has been created.
Linux
You have to choose whether you want to use a self extracting binary file or use an RPM package. If your system is RPM-based, you may wish to use the RPM package isntead of the binary file.

How To Read IPv6 Addresses

How To Read IPv6 Addresses

A common complaint about IPv6 is that addresses are “hard to read”. If you’ve been in the networking world any length of time IPv4′s dotted quad is most likely seared into your brain and clumps of hexadecimal digits of varying lengths can can be hard to wrap your head around. However, those clumps can provide useful information.
Below I’ll go over some of the address types I’ve seen and show you what information they provide.
NOTE: I’m not going to explain the basics of IPv6 address formats. Plenty of others have done that elsewhere. Wikipedia and RFC 4291 are good places to start.
Many of Wireshark’s web sites have been available over IPv6 for a while and as I’ve looked through various capture files and server logs patterns have emerged. Most of the addresses in this post are from IPv6 traffic captured in late January 2011. In Wireshark you can view IPv6 addresses via Statistics→Endpoint List→IPv6 or Statistics→Conversation List→IPv6 or by using the display filter “ipv6″.
First let’s look at the network prefixes that were captured. In my sample capture I see the following /16s (which we’ll call chunks for now):
2001::
2002::
2607::
2620::
2a01::
fe80::
ff02::
Most of the traffic in the capture starts with “2″. The prefix 2000::/3 has been assigned for global unicast traffic — that is, traffic you should see on the public internet. Right now you should only see prefixes between 2001::/16 and 2c00::/16 since IANA has only assigned prefixes in that range.
This alone is incredibly useful. A simple regular expression “[23]…:” (a “2″ or “3″ followed by three characters followed by a “:”) can be used to match public IPv6 traffic. I use this to find IPv6 addresses in Apache access logs.
6 Important PC Tools Most People Never Use

6 Important PC Tools Most People Never Use

Virtually everyone who owns a computer and is connected to the Internet knows about the security implications. Most people do worry about malware and I would like to think that only a few run a computer without an antivirus program or other security-related software. However, there are many more important PC tools that most people never use, even though they are essential for running a stable and secure system.If you’re not sure what I’m talking about, you might be well advised to glance over this article. I will show you 6 critical tools that will make your work with a computer easier, your data safer, your system more stable, and your overall computer experience much smoother.

Backup Program

Are you feeling guilty already? It’s not like backup programs are secret tools that nobody knows of; yet a lot of people either don’t worry about their data or they just never get around to running backups. It’s time to quit that!

Reasons To Use A Backup Program:

  1. You will always have a second copy of your data in case the other copy gets compromised or is lost.
  2. Your data is valuable! A backup will save you money or time trying to recover damaged or lost files.
  3. Murphy’s Law: Anything that can go wrong, will go wrong.

Which Backup Program To Use:

MakeUseOf recommends FBackup for local backups and Mozy for online backups (2GB free).
pc tools

Also Check Out The Following Articles:

Password Manager

Unless your name is Data, you probably have a hard time remembering things now and then. If you’re human that’s normal. Nevertheless, you should 1. have a different password for every account and 2. change it often to protect yourself from hackers and identity theft.

Reasons To Use A Password Manager:

  1. Never again forget a password.
  2. Use complicated secure passwords and thus protect your accounts from getting hacked.
  3. Murphy’s Law: Anything that can go wrong, will go wrong.
And you’d better back up your Password Manager!

Which Password Manager To Use:

MakeUseOf recommends LastPass, a cross-platform browser plugin that stores and syncs your passwords wherever you go. For local storage I recommend KeePass.
free pc tools

Also Check Out The Following Articles:

How to shutdown or restart PC remotely from any computer or mobile phone

How to shutdown or restart PC remotely from any computer or mobile phone

Sometimes you want to urgently shutdown or restart your computer when you are away. There are a lot of remote control utilities that allows you to manipulate your computer remotely. Some of them require installation on client computer, some has web interface but runs as ActiveX controls that usually disabled by security policy in many organizations and also could not be used on most mobile phones. Airytec Switch Off allows you to shutdown or restart your PC remotely from any computer of mobile phone with just web browser installed.

Follow this steps to enable remote shutdown or restart on your PC:
  • Start Airytec Switch Off (if not already running)
  • Enable web interface
    • Right click Airytec Switch Off icon in notification area
    • Click Options
    • Click Remote tab
    • Check Enable web interface
    • Change port number (optional)
    • Enter password (optional but highly recommended)
    • Click OK
  • Ensure that web interface is accessible by starting web browser and entering address: http://localhost:8000. If you have changed the port number when enabling web interface you should replace 8000 with yours.
  • Now if your PC is connected to the internet you can shutdown it from any other computer or mobile
Top 10 unknown Google tricks

Top 10 unknown Google tricks

Below is a list of our top ten Google tricks many users don't know about.
  1. Definitions - Pull up the definition of the word by typing define followed by the word you want the definition for. For example, typing: define bravura would display the definition of that word.
  2. Local search - Visit Google Local enter the area you want to search and the keyword of the place you want to find. For example, typing: restaurant at the above link would display local restaurants.
  3. Phone number lookup - Enter a full phone number with area code to display the name and address associated with that phone number.
  4. Find weather - Type weather followed by a zip code or city and state to display current weather conditions and forecasts for upcoming days.
  5. Track airline flight - Enter the airline and flight number to display the status of an airline flight and it's
Facebook keyboard shortcuts

Facebook keyboard shortcuts

Before using Facebook keyboard shortcuts, determine the modifier keys for your computer, which is based off what browser and operating system you are using.
Win & Chrome Win & Firefox Win & IE OSX & Firefox OSX & Other
Alt Alt + Shift Alt Function + Ctrl Option + Ctrl
Once you have determined the modifier for your operating system and browser use the above key combination with any of the below 10 keys to perform the desired shortcut. For example, if you were using Firefox in Windows and wanted to go to the Facebook Home you could press Alt + Shift + 1.
Tip If you are using Internet Explorer, after pressing Alt + # let go of both keys and press Enter for the shortcut to work. For example, press Alt + 1 (let go) and then press Enter to open the Facebook home page
How do I clear a laptop CMOS password?

How do I clear a laptop CMOS password?

Tip The below steps are for a laptop computer and do not include steps on how to clear a desktop BIOS or CMOS password.
A laptop BIOS password is more secure than a traditional desktop to help protect the data if it was stolen. If you are the original owner of the laptop, we highly recommend contacting the manufacturer of the laptop. Companies such as Dell, Lenovo, and Toshiba can reset the password if you are the original owner using the Service Tag, disk, or give you exact steps for your laptop.
If you are not the original owner of the laptop, there are some ways to bypass the password depending on the manufacture and model of the laptop.
Laptop password system disabled code5 to 8 character code on System Disabled screen
  1. As the computer is booting press F1, F2, or Del to enter CMOS setup.
  2. In CMOS setup when prompted for a password, guess three times until you're giving the code. If after entering the wrong password three times the computer is displaying a 5 to 8 code, as shown in the picture, continue to the next step.
  3. Write down the code and visit Dogbert's BIOS Password Backdoors scripts page to download Python and the free Python scripts to clear many of these types of passwords.
Clear by dipswitches, jumpers, jumping BIOS, or replacing BIOS
Finally, if the above suggestions do not apply to your laptop you will need to open the laptop and clear the password using dipswitches, jumpers, jumping the BIOS using a paperclip or soldering a wire to pins on the
Top 10 computer mouse tips everyone should know

Top 10 computer mouse tips everyone should know

Most computer users don't take full advantage of the computer Mouse. Below are computer mouse tips and secrets that help you get the full potential of your computer mouse and increase your overall productivity while on the computer.
Shift key and mouse click
Many text editors and programs allow you to highlight all or portions of text using the Shift key and the mouse. For example, place the cursor at the beginning of a paragraph, hold down the Shift key and click at the end of the paragraph to highlight the full paragraph.
Take full advantage of the scroll wheel
Today, everyone is fully aware of a mouse wheels ability to scroll up and down on a page. However, this wheel can also do so much more, as shown below.
  • The mouse wheel is not just a wheel, it can also be used as a button. Pressing down on the wheel will act like a third mouse button. This can be used to open a web page in a tab by clicking the wheel on any link and can also be used to close a tab by clicking the wheel on any open tab.
  • Quickly Zoom in and Out on a web page, word document, excel spreadsheet, etc. by holding down the Ctrl key and scrolling up to zoom in and down to zoom out.
  • Move forward and backwards while browsing the Internet by holding down the Shift key and scrolling up and down. Scrolling down goes back and scrolling up goes forward.
Select with double and triple click
Any word can be easily selected by double-clicking the word. If you want to highlight the whole paragraph, click the mouse button three times on any text in the paragraph.
Use the right-click
Take full advantage of the right-click any time you highlight text or wish to view the properties of an object. For example, if you highlight a file or text, you can right-click that highlighted item copy it and then right-click anywhere else to paste it.
Tip If you right-click on any file or text and drag it while continuing to hold the right button, when you let go you will be given the option to move or copy that file or text. This saves you the extra step of having to right-click where you want to paste the item.
Tip While in a browser pressing and holding Ctrl while clicking on any link will open that link in a new tab.
Ctrl key and mouse click or highlight
While holding down the Ctrl key you can left-click to select multiple objects or highlight multiple sections of text. For example, in Microsoft Windows you could hold down the Ctrl key and click to select multiple files at once. If you wanted to highlight different parts of a paragraph or web page, you could also hold down the Ctrl key and select each section you wanted to copy.
Tip Mozilla Firefox users can also hold down the Ctrl key and individually click on each cell in a table they wish to copy or drag their mouse down a row to select just that row or text without selecting any of the other text in that table.
Use the mouse side buttons
Many new computer mice have buttons on the side of the mouse. These buttons can be programmed to do anything, however, by default the left-thumb button can be used to go back on a web page. This makes browsing the Internet more enjoyable since you do not need to move the mouse cursor to the browser back arrow button in order to go back a page.
Use the Windows Snap To feature
Take full advantage of the Windows mouse Snap To feature, which will automatically move your mouse to
Connecting Two Computers using usb

Connecting Two Computers using usb

step 1 turn on both of the computers. log in to windows using an account with administrator privileges.
 
step 2insert one end of the usb bridge cable into a usb slot on one computer, and the other end of the bridge into the second computer.
 
step 3install the driver software for the usb bridge cable when the computers prompt you to do so. if you do not have driver software for the usb bridge cable, you may be able to download it from the cable manufacturer.
 
step 4choose to install the usb bridge cable either as a link adapter or a network adapter. if you install it as a link adapter, you will only be able to transfer files back and forth. if you install it as a network adapter, you will have full network functionality.
 
step 5complete the software installation. your two computers should now be connected ... enjoy ....
Vodafone Hack for Free GPRS

Vodafone Hack for Free GPRS

I have been asked by many Vodafone Users to post a Method to get a free GPRS for the Vodafone. Nobody wants to pay for what he/she uses. I am also a Nobody so I was also in trying out all the things to get free GPRS for Vodafone users since I am also a Vodafone User. Finally I have got a Full proof way to get free GPRS for all the Vodafone Users. This method has been tested on different mobiles and has been confirmed to be working. Still if anybody faces any problem please contact me and I will try to solve it as quickly as possible.
Followng are the Settings you require to configure on your Mobile:
Account Name: Vodafone_gprs
Homepage: http://live.vodafone.in
User Name: (no need)
Pass: (no need)
Access Point Settings:
Proxy: Enabled
Proxy Address: 10.10.1.100
Proxy Port: 9401
Data Bearer: Packet Data
Bearer Settings:
Packet Data Access Point: portalnmms
Network type: IPV4
Authentication: normal
User Name: (no need)
Password: (no need)
*IF that happen this settings is not working then change the proxy port number to:-
Proxy Port: 9401
Top 20 Hacking Tools

Top 20 Hacking Tools

These are Top 20 Hacking Tools, the list is exhaustive, this are a few to name.

Nessus
The “Nessus” Project aims to provide to the internet community a free, powerful, up-to-date and easy to use remote security scanner for Linux, BSD, Solaris, and other flavors of Unix.
Ethereal
Ethereal is a free network protocol analyzer for Unix and Windows. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session.
Snort
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks.
Netcat
Netcat has been dubbed the network swiss army knife. It is a simple Unix utility which reads and writes data
Make FREE Calls to Landline and Mobile phones

Make FREE Calls to Landline and Mobile phones

Make FREE calls quickly
Simply type gizmocall.com/18005551212 into your browsers address bar.
(put the number you want to dial in place of 18005551212)
Make FREE calls to landline and mobile phones in over 60 countries by participating in the All Calls Free plan.
Users NEW to the All Calls Free plan get 20 minutes of free calling simply by getting ONE friend to sign up for a new Gizmo account. There are no commitments and no hidden fees.

Get Started Now!
  1. Tell a friend to download Gizmo5 and have them add their phone number to their profile.
    img-calls-1 Free Calls
  2. Add each other to your contact lists and you can call that person for FREE using Gizmo5.
How to enable Two factor Authentication on your Google Account

How to enable Two factor Authentication on your Google Account

Step 1:- Download and install the Google Authenticator app for your smartphone: Android, BlackBerry, iPhone.
*The Android version will also require the Barcode Scanner app from ZXing (which is free, and tremendously useful.)
Step 2:- Visit the SMSAuthConfig page from Google.
Step 3:- Use the smartphone app to scan the provided QR code. Once you open the Google Authenticator app, you can scan the QR code provided and it will instantly generate a verification code.
Step 4:- Print your backup codes.
Step 5:- Enter your phone number. Click “Send Code”  and check phone for verification code.
Step 6:- Type the code you received in the phone message, and click “Verify”.
Step 7:- Set up application-specific passwords. Some Google applications don’t honor the two-factor authentication seamlessly. Anyways, you can still generate application-specific passwords that protect those apps.
However, those who are having neither Android, iPhone, Blackberry, follow the following steps:-
What Are Keystroke Loggers (Keyloggers)?

What Are Keystroke Loggers (Keyloggers)?

A Keystroke logger (also known as a Keylogger) is a program, usually ran secretly in the background that records what users type, then the typed output is usually sent via email or uploaded by the keylogger somewhere in secret. These can be attached to other executable so you never even know you ran them in the first place, once you click it once it often is started at start up from their on.
There are two main types of keystroke loggers:
1. Software based, and
2. Hardware based
Software based keyloggers
These are software programs designed to work on the target computer’s operating system. Once the software is installed on the target’s computer,  it captures every key pressed on the keyboard and stores it down in a file or memory-bank that can be viewed by the person performing the monitoring in real-time, or at a later date.
There is also a type of remote access software keyloggers. This is a process of creating server keylogger and then sending this server.exe file to the victim. Once the keylogger server is installed on the victim’s computer, all text and passwords typed on his computer are sent to you in your email inbox by this server created using keylogger.
Recovering Lost Passwords

Recovering Lost Passwords

Recovering Lost PasswordsIt is now commonplace to use encryption algorithms to prevent unauthorized access to computer data. Even many novice computer users are able to benefit from the use of encryption. If we have something we wish to keep private from others but that we may also need access to in the future, we often use the password protection built into editing or compression programs. More advanced users frequently employ sophisticated dedicated solely to encryption, which can cost tens or even hundreds of dollars. Such applications are becoming increasingly popular as users recognize the need for privacy. It’s no surprise, because just as the number of opportunities provided by the internet has grown, so has the number of potential threats. Ultimately nearly all users will wish to acquire the tools necessary to secure their accumulated data so that nobody except the owner will have access to them.
Are password-encrypted data secure enough? This is one of the questions that occur to nearly every computer user. As time passes and new technologies appear, the answer to this question becomes more difficult. That’s because despite the appearance of newer and more secure methods, no-one can be certain that their current security methods can’t be broken. Just as some people are constantly working on newer and more effective forms of security, others are constantly working to break them. As a result, very few of the encryption methods that human ingenuity has devised will prove to be reliable long-term protection for a broad variety of data.
How to Protect Your PC from Hidden Backdoors and Trojans

How to Protect Your PC from Hidden Backdoors and Trojans

To accomplish his goal, a hacker must install a backdoor that is not easily detectable. This is his primary task. Hackers use a variety of methods for this purpose, placing their tools at the deepest level of compromised systems and renaming files so as not to arouse suspicions. With a backdoor, such hacker can virtually have full and undetected access to your application for long time. It is critical to understand the ways backdoor can be installed and to take required preventive steps.
What is a Backdoor?
A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plain text, and so on, while attempting to remain undetected, the backdoor may take the form of an installed program, or could be a modification to an existing program or hardware device. It hides in the computer, scans existing loopholes, opens corresponding ports, as well as modifies system registration files.
Backdoor will not duplicate or actively spread itself. It will only open a certain port through which a remote computer in the network can control the infected computer. Generally the backdoor will not influence normal communication of the network, so firewalls or IDS can hardly detect its existence.
Is my Network Infected with a Backdoor?
According to statistics, most of the backdoors work under port 31337, 31335, 27444, 27665, 20034, 9704, 6063, 5999, 5910, 5432, 2049, 1433, 444, and 137-139. So whether there is communication
A Beginners Guide to Ethical Hacking

A Beginners Guide to Ethical Hacking

I wish this book was around when I began my journey to learn how to hack. It was made specifically for the beginners who really want to get into hacking and for those of us who began and got lost. The author of this book is Rafay Baloch, an expert into the field of hacking. His book “A Beginners Guide To Ethical Hacking” contains all the interesting hacks, and the best part of this e-book is that he has written it in such a manner that even a 5th grade kid can understand it and become a Hacker.
A Beginner’s Guide to Ethical Hacking
steal any one ip without any software/tool

steal any one ip without any software/tool

How to steal an ip ?


1.the first thing you have to do is go to syntaxmaster.info.

2.there you can create a free account !(the registration is really quick !)

3.once you have registered and confirmed you account,you can log into your "newly created account" !

4.then youll see an option "software/tools" on the tab.then click on "ip stealer"
Ten Tips To Improve System Speed

Ten Tips To Improve System Speed

Ten Tips To Improve System Speed

1.Let your PC boot up completely before opening any applications.

2.Refresh the desktop after closing any application. This will remove any unused files from the RAM.

3.Do not set very large file size images as your wallpaper. Do not keep a wallpaper at all if your PC is low on RAM (less than 64 MB).

4.Do not clutter your Desktop with a lot of shortcuts. Each shortcut on the desktop uses up to 500 bytes of RAM

5.Empty the recycle bin regularly. The files are not really deleted from your hard drive until you empty the recycle bin.

6.Delete the temporary internet files regularly.

7.Defragment your hard drive once every two months. This will free up a lot of space on your hard drive and rearrange the files so that your applications run faster.

8.Always make two partitions in your hard drive. Install all large Softwares (like PSP, Photoshop, 3DS Max etc) in the second partition. Windows uses all the available empty space in C drive as virtual memory when your Computer RAM is full. Keep the C Drive as empty as possible.

9.When installing new Softwares disable the option of having a tray icon. The tray icons use up available RAM, and also slow down the booting of your PC. Also disable the option of starting the application automatically when the PC boots. You can disable these options later on also from the Tools or preferences menu in your application.

10.Protect your PC from dust. Dust causes the CPU cooling fan to jam and slow down thereby gradually heating your CPU and affecting the processing speed. Use compressed air to blow out any dust from the CPU. Never use vacuum.RAM IS THE WORKING AREA (DESKTOP) OF THECPU, KEEP IT AS EMPTY AND UNCLUTTERED AS POSSIBLE!/
FUN WITH NOTEPAD TRICKS

FUN WITH NOTEPAD TRICKS

1)How To Make Matrix With NotePad

I’am going to show you how to make cool Matrix batch file using notepad.
Open notepad and type in
@echo off
color 2
:start
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
goto start

How To Repair Detectable But Corrupt USB Drive

How To Repair Detectable But Corrupt USB Drive

Have you suddenly encountered with the problem that when you plug in your USB drive, the Removable media shows up but when you try to open it, it returns with the message “Please insert a disk in to drive H:”.

If yes then you have been on right tutorial page.
By applying this simple method you’ll have 80 % chance to get back your USB drive hardware.
This works only in the above error condition. If the windows doesn’t detect your USB drive, then there is probably flaw in the USB media.
Please keep in mind that, you’ll have to lose your data when following this tutorial.
Plug in your USB drive.