Make ur Windows Xp Genuine : All Hacks here

Make ur Windows Xp Genuine : All Hacks here

Legal Disclaimer :

Any actions and or activities related to thematerial contained within this Website is solely your responsibility.Do not Missuse the Information given out here. Theauthors will not be held responsible in the event any criminalcharges be brought against any individuals misusing theinformation in this Website to break the law.
This site contains materials that can be potentially damaging or dangerous. If you do not fully understand something on this site, then GO OUT OF HERE! Refer to the laws in your province/country before accessing, using,or in any other way utilizing these materials. These materials are for educational and research purposes only. Do not attempt to violate the law with anything contained here. If this is your intention, then LEAVE NOW! Neither administration of this server, the authors of this material, or anyone else affiliated in any way, is going to accept responsibility for your actions.
These are just a collection of what is available on world wide web,
It has no connection in any kind of developement with the author.
Do Not Distribute in Any Form :


This activates ur "Windows Xp Home" if not activated and completely validates it.

When you Install Windows Xp Home Edition it asks "60 days lest for the activation" please Activate it Now .. This Hack will take your Way out like a piece of Cake.


**This is ment for educational purpose only.


To Download this Crack right click on the link below and Open it in a new Window.

Vodaphone free gprs trick

Vodaphone free gprs trick

Vodaphone india network has emerged as a another biggest mobile network within a short period.but a free vodaphone gprs trick for what we all were searching for until now,i have tracked down certain settings that will make us use free vodaphone gprs pack unlimited.we have given two manual vodaphone free gprs settings to access unlimited vodaphone gprs.configure the vodaphone mobile gprs settings in your mobile as follows,
Setting1:
Proxy = yes /enabled
Proxy IP add = 196.006.128.012
Authentic = Normal
Bearer = packed data
Home page = www.live.vodafone.com
Setting2:
Proxy = yes OR Enabled
Proxy IP ADD. = 010.010.001.100
Bearer = Packed data
Port = 9401
INF Mode = HTTP
Connection name / Profile Name = HUTCH_GPRS
Homepage = http://www.hutchworld.co.in
Use the access point for gprs as portalnmms.
post your comments if any,dont forget to subscribe to my feed to receive the tricks in email as soon as i post.
tags: vodaphone hacks,vodaphone free gprs tricks,free calls,gprs in vodaphone.
Text to Voice trick

Text to Voice trick

Make your computer to speak whatever you type

This trick is working on all microsoft operating system and does not require any programming skills.You have to follow just simple steps and your own Text to Voice software will be ready.. Ok,the trick is fairly simple and requires only 3 simple steps from your side.Let’s Begin the tutorial with screenshots to Make Your Computer Speak Whatever You Type
1.Open Notepad and copy and paste the following code into it

Dim message, sapi
message=InputBox("You type i speak?","Speak to Me")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak message

Text to Voice trick - The Ethical Hacking Guide

2.Now save the notepad file with the name speak.vbs at your desktop.
3.Now double click on speak.vbs type in the box whatever you want your computer to speak for you
. Its a really awesome trick to impress everybody with your computer skills
Top Tricks n Cheats

Top Tricks n Cheats

This Is crazy!!

Set Processes Priority


Follow this tip to increase the priority of active processes, this will result in prioritisation of processes using the CPU.

CTRL-SHIFT-ESC
1.Go to the second tab called Processes, right click on one of the active processes, you will see the Set Priority option

2.For example, your Run your CDwriter program , set the priority higher, and guess what, no crashed CD’s

Shutdown Trick !


Imidiate rapid shut down window
while shutting down window. open task manager(Ctr+Alt+Del),
Select shut down tab. and press ' Ctrl ' key while select Turn Off from dis tab.
Count 5 4 3 2 1 Voila!!! U r window will rapidly shut down.


Speed Up Ur Shut down !!

Start Regedit.
Navigate to HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control.
Click on the "Control" Folder.
Select "WaitToKillServiceTimeout"
Right click on it and select Modify.
Set it a value lower than 2000 (Mine is set to 200)
.

and !

Like previous versions of windows, it takes long time to restart or shutdown windows xp when the "Exit Windows" sound is enabled. to solve this problem you
must disable this useless sound. click start button then go to settings -> control panel -> Sound,Speech and Audio devices -> Sounds and Audio Devices -> Sounds, then under program events and windows menu click on "Exit Windows" sub-menu and highlight it.now from sounds you can select,choose "none" and then click apply and ok. now you can see some improvements when shutting down your system.



**new **

Crazy !!

Hide ur folders.. never known trick !!!!!!!!!! Disguise them to "Recycle Bin"



Rename any folder with extension {645FF040-5081-101B-9F08-00AA002F954E}
eg,
if u've a folder games
press F2,
then type, "games.{645FF040-5081-101B-9F08-00AA002F954E}"
c the magic....
then 2 get to original form,
remove the extension using
"ren games.{645FF040-5081-101B-9F08-00AA002F954E} games" in dos or as a bat file


n u are done..

~cheers~


System information


system up time only for xp professional edition
It boasts how long it can stay up. Whereas previous
Facebook Tips and Tools

Facebook Tips and Tools

Tag Friends in Your Status and Posts
One of the most popular features on Facebook is tagging, which gives you the ability to identify and reference people in photos, videos and notes. Today, we are adding a new way to tag people and other things you're connected to on Facebook — in status updates and other posts from the Publisher. It's another way to let people know who and what you're talking about.

People often update their status to reflect their thoughts and feelings, or to mention things they feel like sharing. Sometimes that includes referencing friends, groups or even events they are attending — for instance, posting "Grabbing lunch with Meredith Chin" or "I'm heading to Starbucks Coffee Company — anyone want some coffee?".

Now, when you are writing a status update and want to add a friend's name to something you are posting, just include the "@" symbol beforehand. As you type the name of what you would like to reference, a drop-down menu will appear that allows you to choose from your list of friends and other connections, including groups, events, applications and Pages. Soon, you'll be able to tag friends from applications as well. The "@" symbol will not be displayed in the published status update or post after you've added your tags.


Facebook Tips and Tools - The Ethical Hacking Guide

Friends you tag in your status updates will receive a notification and a Wall post linking them to your post. They also will have the option to remove tags of themselves from your posts. We hope that tagging your status updates and others posts from the Publisher will enable you to share in a more meaningful and engaging way, and connect with even more people. We're rolling this feature out over the course of the next few weeks, so you may not see the new feature just yet.
ALL Nokia Secret Codes

ALL Nokia Secret Codes

Scroll Down to view Specific Model Numbers!!!!


*** WARNING: Using secret codes may be harmful to your phone and result in disabling or worse. Use these codes at your own discretion, we accept no responsiblility for blocked pones while using these codes!!!
IMEI Number
*#06# Cells Identity Code (IMEI = International Mobile Equipment Identity)
XXXXXX XX XXXXXX X
TAC FAC SNR SP

TAC = Type Approval Code (first 2 digits = country code of the approval-country )
FAC = Final Assembly Code: (01,02 = AEG)
(10,20 Nokia)
(40,41,44 Siemens)
(30 Ericsson)
(50 Bosch)
(51 Sony,Siemens,Ericsson)
(60 Alcatel)
(65 AEG)
(70 Sagem)
(75 Dancall)
(80 Philips)
(85 Panasonic)

SNR = Serial Nr.
SP = Spare (always "0")

Software Version
*#0000# shows the software version
Signal Processing
*3370# - Enchanced full Rate Codec (EFR) activation. It will automatically restart.
#3370# - Enchanced full Rate Codec (EFR) deactivation
*4720# - Half Rate Codec activation. It will automatically restart.
#4720# - Half Rate Codec deactivation
Enchanced Full Rate will give you much better sound quality when you enable it. The new Enhanced Full Rate CODEC adopted by GSM uses the ASELP (AlgebraicCode Excitation Linear Prediction) compression technology. This technology allows for much great voice quality in the same number of bits as the older Full Rate CODEC. The older technology was called LPC-RPE (Linear Prediction Coding with Regular Pulse Excitation). Both operate at 13 kilobits.(but you take up more space on the network, so they can charge you more) - Talk-time is reduced with about 5%

Nokia E-Series Secret Codes

Check software version and the release number of your device:
*#0000#

See WLAN MAC address:
*#62209526#

See Bluetooth MAC address:
*#2820#

To hard reset and restore to factory settings:
*#7370# (default lock code is 12345)

See IMEI (International Mobile Equipment Identity) number:
*#06#

Check number where calls are diverted:
*#61#

To display your phone's life timer, type: #92702689#


Please use the following two codes with extreme care:
  • To soft reset the phone and reset phone settings type: *#7780#
  • To hard reset and completely erase all data on the phone and restore it to factory settings, type *#7370#. You'll be asked for a lock code. The default Nokia lock code is 12345.
Unlock your Cell Phone

Unlock your Cell Phone

Phone unlocking

If you own a GSM type cellphone that you purchased at a discounted price when you signed up for service, the chances are that the cell phone company has 'locked' your phone so it will only work with their service.

If unlocked, you're free to use your choice of SIM and service with the phone, potentially saving you substantial money and adding to the flexibility of your phone.
you can use it with any GSM service provider and SIM, anywhere in the world.Phones are naturally unlocked, but a service provider might lock them

When originally manufactured, all GSM cell phones are unlocked. That is, they can be used with any SIM from any cellphone service provider - always assuming, of course, that the cellphone service provider has compatible GSM service on the same frequency bands that the phone can operate on. Most cell phone service providers
electronically 'lock' the phone so that it can only be used with their service. There are obvious reasons why they choose to do this - in particular, to force you to pay what are usually very high roaming charges when you take your phone out of their network and use it elsewhere in the world.

Fortunately, this locking is reversible. With some phones, it is possible to simply enter an unlocking password code into the phone and it is immediately then unlocked. Other phones need to be connected up to a special unlocking data terminal
Google Hacking

Google Hacking

Google HackingThis is a featured page

google hacking: Rahul 
Dutt Avasthy



These methods will be easily understood by the Hackers

Any help for the Novice Hackers Please drop in your Comments : Rahul


u can also drop in ur E - Mail Id's to be mailed a detailed Presentation on Google HACKING



Using Google, and some finely crafted searches we can find a lot of interesting information.


For Example we can find:


Credit Card Numbers


Passwords


Software / MP3's

HACK Net protector 2010Reported

HACK Net protector 2010Reported

HACK Net protector 2010
Nov 2 2009, 9:01 AM EST | Post edited: Aug 27 2010, 10:48 AM EDT
hi guys want to know how to get free license of net protector of 6 months
and free crack ssend msg on this site or start thread .
1step download net protector 2009 or 2010 i will sen d u lot of working keys license keys .



com13

E-3F24303831

RVPE-ENQH-EKTK-PQKK-KPJR-KTWB

newww !! date:- 23-8-2010
reveal net protector hack

just go to this site and download the patch of this antivirus
www.abdulrauf.hpage.com
www.technotatva.hpage.com

new keys

E-73A3A26313
HR-D952-C91D-F1F1-B7A7-90D3
RJKE-EEQZ-PRHH-PGWK-LPJR-WLWB
06 Jan 2011

enjoy
BSNL Broadband Hack

BSNL Broadband Hack

BSNL Broadband Hack for Speed


Fed up of frequent network down on BSNL Broadband. The solution? There is small hack on BSNL for this. Use third party DNS servers instead of BSNL DNS serversor run your own one like djbdns. The easiest options is to use OpenDNS. Just reconfigure your network to use the following DNS servers:
208.67.222.222
208.67.220.220
Detailed instructions specific to operating system or your BSNLmodem are available in the OpenDNS website itself. After I reconfigured my BSNL modem to use the above 2 IP addresses, my DNS problems just vanished! Other ‘freebies’ that come with OpenDNS are phishing filters and automatic URL correction. Even if your service provider’s DNS servers are working fine, you can still use OpenDNS just for these two special features. After you hack BSNL DNS servers, you will see a noticeable improvement in your broadband speed.
CRACK ID/EMAIL AND PASSWORD ALONG WITH IP ADDRESS + ISP NAME

CRACK ID/EMAIL AND PASSWORD ALONG WITH IP ADDRESS + ISP NAME

NEW UPDATED VERSION OF OUR TEAm

ALL IN ONE SUPER HACKWARe....

What it can hack:

1.ALL mail ids: gmail,yahoo,rediff,aol,msn,hotmail etc.
2. Social networkinng sites: orkut,facebook,myspace,twitter some more
3. SOme premium accounts like Paypals, liberty reserves ( ONLY PRIVATE VERSION)
4. SOme php and html sites admin logins by online bruteforce etc..


I hopt this would be enough..

DOWNLOAD LINK:

http://hotfile.com/dl/55669181/c8a50bd/AIO_hackwarev5.exe.html

ENJOY GUYs,

This is Trial Version..ONLY>.. EXPIRES IN 3 Days from ur install... TO buy Full version Contact at virus71414@gmail.com

IP Address Hack, n all bt it

IP Address Hack, n all bt it

IP Hack contd..


In here I have figure out some very easy but cool ways to trace out the geographical location and various other infos like ISP details etc of a remote computer using its IP.

Well I guess its one of the most important must learn manul for boys out there if you want to impress your friends particularly gals whom you’ll meet online in a chat room and tell them their geographical locations and ISP details and make them surprised and impressed .

In the practical execution of this manual you don’t have to work much as it is very simple only you have to use your brain to understand some symbols and some format of expressions and use your IQ to execute things the right way.



What is IP and how to get the IP of a remote system::




Getting the IP or Internet Protocol of a remote system is the most important and the first step of hacking into it. Probably it is the first thing a hacker do to get info for researching on a system. Well IP is a unique number assigned to each computer on a network. It is this unique address which represents the system on the network. Generally the IP of a particular system changes each time you log on to the network by dialing to your ISP and it is assigned to you by your ISP. IP of a system which is always on the network remains generally the same. Generally those kind of systems are most likely to suffer a hacking attack because of its stable IP. Using IP you can even execute system commands on the victim’s computer.

Lets take the example of the following IP address: 202.144.49.110 Now the first part, the numbers before the first decimal i.e. 209 is the Network number or the Network Prefix.. This means that it identifies the number of the network in which the host is. The second part i.e. 144 is the Host Number that is it identifies the number of the host within the Network. This means that in the same Network, the network number is same. In order to provide flexibility in the size of the Network, here are different classes of IP addresses:



Address Class Dotted Decimal Notation Ranges

Class A ( /8 Prefixes) 1.xxx.xxx.xxx through 126.xxx.xxx.xxx

Class B ( /16 Prefixes) 128.0.xxx.xxx through 191.255.xxx.xxx

Class C ( /24 Prefixes) 192.0.0.xxx through 223.255.255.xxx



The various classes will be clearer after reading the next few lines.



Each Class A Network Address contains a 8 bit Network Prefix followed by a 24-bit host number. They are considered to be primitive. They are referred to as "/8''s" or just "8's" as they have an 8-bit Network prefix.

In a Class B Network Address there is a 16 bit Network Prefix followed by a 16-bit Host number. It is referred to as "16's".



A class C Network address contains a 24-bit Network Prefix and a 8 bit Host number. It is referred to as

"24's" and is commonly used by most ISP's.

Linux-based Anti-virus rescue CDs - and the alternatives!

Linux-based Anti-virus rescue CDs - and the alternatives!

Let me begin with a big fat disclaimer: You do not need anti-virus software. You do not need it in Windows, nor Linux. Blacklisting is an obsolete method of maintaining security of your operating system. BUT ...
Some people just have to have anti-virus programs running and wasting their system resources. Well, you can't change the world overnight. My mission is not to convert every single frightened computer user out there to the blissful doctrine of don't click and the strategic use of whitelisting tools for computer-related protection. I am merely trying to make life easier for my readers. And some just happen to use anti-virus programs.
All right, so you are a Windows user and you need anti-virus programs. How about a compromise? Rather than running them in real-time, why not download a handful of bootable live CD images and keep them in store for a rainy day? 



On the agenda ...

So today, we will do the following:
Learn about a handful of Linux-based anti-virus live CD. You can call them ultra-specialized system rescue distributions, if you will. They are very similar to what BartPE and Ultimate Boot CD for Windows offer. Links to extra reading material further below.
Second, we will talk about alternative, superior security approaches that should make your Windows smarter, leaner, meaner, and more secure. We will refer to a number of highly effective whitelisting tools that you should consider as a permanent replacement to your blacklisting, signature-based scanners.
Finally, since we're talking Linux, we will mention once again why anti-virus software is unnecessary in Linux and why pretty much any Linux distribution is automatically a system rescue image. OK, let's see what we've got.
Note: I won't be testing the quality and efficiency of these tools against any real-life scenarios. I will merely be showing you that they exist and let you choose whatever you want to do with them.
Some Cool Hidden Firefox Tricks

Some Cool Hidden Firefox Tricks

1. Make Firefox Dance.
chrome://global/content/alerts/alert.xul
It makes the Firefox window auto collapse and expand in the corner of your monitor screen.

2. Open Firefox inside Firefox.
chrome://browser/content/browser.xul
This opens another Firefox inside a tab in the the existing Firefox window.

3. Options inside a Tab
chrome://browser/content/preferences/preferences.xul
This opens the Options dialog box inside the Firefox tab. See the screenshot above.
Top 10 Best upcoming cell phones

Top 10 Best upcoming cell phones

Top 10 Best Upcoming Cell Phones
Sure, you want a new phone right now, but carriers and manufacturers have promised some truly spectacular, knock-your-socks-off phones coming to U.S. shelves between now and June. With 4G right around the corner and mobile hardware and software getting better and better, you should take a look at what’s coming down the pike in the next couple of months before you buy.
The first three weeks of the year have seen more than a dozen announcements from top U.S. carriers, and we’re sure to see more at the Mobile World Congress trade show in mid-February. Whether you’re with AT&T, Sprint, T-Mobile, or Verizon Wireless, there’s something exciting on the horizon.
It wasn’t easy keeping it to just 10, but we’ve come up with this list of the most exciting phones that you’ll be able to buy in the coming months. To check out pictures of these handsets,


1. Apple iPhone 5
apple thumb Top 10 Best Upcoming Cell Phones 2011 Sorry folks, we couldn’t ignore the next-gen Jesus phone. Nobody knows anything reliable about the upcoming iPhone, although noisy blog speculation is already in full force. We don’t know if it will be called iPhone 5, iPhone 4G, or something else. But we’re pretty sure it’s coming in June or July—iPhones always do. Surely Apple will have plenty of surprises for us, and it’s likely that a new iPhone will come with industry-leading features. The real question is, with a Verizon iPhone 4 coming in early February—can you wait that long?

2. Motorola Atrix (AT&T)
atrix thumb Top 10 Best Upcoming Cell Phones 2011
How to create your first java program

How to create your first java program

Downloading the Java SDK  
Note: If you are using Ubuntu, skip this part and go directly to the Ubuntu installation instructions.

  1. Go to the official Java SE download page
  2. Download the latest Java Platform, Standard Edition. You do not need to download the JRE. Download the JDK, which includes the JRE. If you're interested to know the difference between the JDK and the JRE, check our JavaBeginnersFaq.
  3. At the download page, select your target platform, which includes Windows, Linux and others. Save the file in a directory of your choice.
Installing the Java SDK  
These instructions will assume that you are installing the JDK1.6.0_21. It is recommended to leave the version number in the install directory (e.g. 1.6.0_21). This will allow you to install several versions of the jdk under the same root directory (e.g. C:\java), and to easily recognize which version of the JDK lies in which directory.
Windows
  1. Double-click the file you have downloaded.
  2. Follow the installer instructions. You don't need to change the default options. You may just change the directory where you want to install the JDK. After the installation is over, make sure that the directory you have chosen has been created.
Linux
You have to choose whether you want to use a self extracting binary file or use an RPM package. If your system is RPM-based, you may wish to use the RPM package isntead of the binary file.

How To Read IPv6 Addresses

How To Read IPv6 Addresses

A common complaint about IPv6 is that addresses are “hard to read”. If you’ve been in the networking world any length of time IPv4′s dotted quad is most likely seared into your brain and clumps of hexadecimal digits of varying lengths can can be hard to wrap your head around. However, those clumps can provide useful information.
Below I’ll go over some of the address types I’ve seen and show you what information they provide.
NOTE: I’m not going to explain the basics of IPv6 address formats. Plenty of others have done that elsewhere. Wikipedia and RFC 4291 are good places to start.
Many of Wireshark’s web sites have been available over IPv6 for a while and as I’ve looked through various capture files and server logs patterns have emerged. Most of the addresses in this post are from IPv6 traffic captured in late January 2011. In Wireshark you can view IPv6 addresses via Statistics→Endpoint List→IPv6 or Statistics→Conversation List→IPv6 or by using the display filter “ipv6″.
First let’s look at the network prefixes that were captured. In my sample capture I see the following /16s (which we’ll call chunks for now):
2001::
2002::
2607::
2620::
2a01::
fe80::
ff02::
Most of the traffic in the capture starts with “2″. The prefix 2000::/3 has been assigned for global unicast traffic — that is, traffic you should see on the public internet. Right now you should only see prefixes between 2001::/16 and 2c00::/16 since IANA has only assigned prefixes in that range.
This alone is incredibly useful. A simple regular expression “[23]…:” (a “2″ or “3″ followed by three characters followed by a “:”) can be used to match public IPv6 traffic. I use this to find IPv6 addresses in Apache access logs.
6 Important PC Tools Most People Never Use

6 Important PC Tools Most People Never Use

Virtually everyone who owns a computer and is connected to the Internet knows about the security implications. Most people do worry about malware and I would like to think that only a few run a computer without an antivirus program or other security-related software. However, there are many more important PC tools that most people never use, even though they are essential for running a stable and secure system.If you’re not sure what I’m talking about, you might be well advised to glance over this article. I will show you 6 critical tools that will make your work with a computer easier, your data safer, your system more stable, and your overall computer experience much smoother.

Backup Program

Are you feeling guilty already? It’s not like backup programs are secret tools that nobody knows of; yet a lot of people either don’t worry about their data or they just never get around to running backups. It’s time to quit that!

Reasons To Use A Backup Program:

  1. You will always have a second copy of your data in case the other copy gets compromised or is lost.
  2. Your data is valuable! A backup will save you money or time trying to recover damaged or lost files.
  3. Murphy’s Law: Anything that can go wrong, will go wrong.

Which Backup Program To Use:

MakeUseOf recommends FBackup for local backups and Mozy for online backups (2GB free).
pc tools

Also Check Out The Following Articles:

Password Manager

Unless your name is Data, you probably have a hard time remembering things now and then. If you’re human that’s normal. Nevertheless, you should 1. have a different password for every account and 2. change it often to protect yourself from hackers and identity theft.

Reasons To Use A Password Manager:

  1. Never again forget a password.
  2. Use complicated secure passwords and thus protect your accounts from getting hacked.
  3. Murphy’s Law: Anything that can go wrong, will go wrong.
And you’d better back up your Password Manager!

Which Password Manager To Use:

MakeUseOf recommends LastPass, a cross-platform browser plugin that stores and syncs your passwords wherever you go. For local storage I recommend KeePass.
free pc tools

Also Check Out The Following Articles:

How to shutdown or restart PC remotely from any computer or mobile phone

How to shutdown or restart PC remotely from any computer or mobile phone

Sometimes you want to urgently shutdown or restart your computer when you are away. There are a lot of remote control utilities that allows you to manipulate your computer remotely. Some of them require installation on client computer, some has web interface but runs as ActiveX controls that usually disabled by security policy in many organizations and also could not be used on most mobile phones. Airytec Switch Off allows you to shutdown or restart your PC remotely from any computer of mobile phone with just web browser installed.

Follow this steps to enable remote shutdown or restart on your PC:
  • Start Airytec Switch Off (if not already running)
  • Enable web interface
    • Right click Airytec Switch Off icon in notification area
    • Click Options
    • Click Remote tab
    • Check Enable web interface
    • Change port number (optional)
    • Enter password (optional but highly recommended)
    • Click OK
  • Ensure that web interface is accessible by starting web browser and entering address: http://localhost:8000. If you have changed the port number when enabling web interface you should replace 8000 with yours.
  • Now if your PC is connected to the internet you can shutdown it from any other computer or mobile
Top 10 unknown Google tricks

Top 10 unknown Google tricks

Below is a list of our top ten Google tricks many users don't know about.
  1. Definitions - Pull up the definition of the word by typing define followed by the word you want the definition for. For example, typing: define bravura would display the definition of that word.
  2. Local search - Visit Google Local enter the area you want to search and the keyword of the place you want to find. For example, typing: restaurant at the above link would display local restaurants.
  3. Phone number lookup - Enter a full phone number with area code to display the name and address associated with that phone number.
  4. Find weather - Type weather followed by a zip code or city and state to display current weather conditions and forecasts for upcoming days.
  5. Track airline flight - Enter the airline and flight number to display the status of an airline flight and it's
Facebook keyboard shortcuts

Facebook keyboard shortcuts

Before using Facebook keyboard shortcuts, determine the modifier keys for your computer, which is based off what browser and operating system you are using.
Win & Chrome Win & Firefox Win & IE OSX & Firefox OSX & Other
Alt Alt + Shift Alt Function + Ctrl Option + Ctrl
Once you have determined the modifier for your operating system and browser use the above key combination with any of the below 10 keys to perform the desired shortcut. For example, if you were using Firefox in Windows and wanted to go to the Facebook Home you could press Alt + Shift + 1.
Tip If you are using Internet Explorer, after pressing Alt + # let go of both keys and press Enter for the shortcut to work. For example, press Alt + 1 (let go) and then press Enter to open the Facebook home page
How do I clear a laptop CMOS password?

How do I clear a laptop CMOS password?

Tip The below steps are for a laptop computer and do not include steps on how to clear a desktop BIOS or CMOS password.
A laptop BIOS password is more secure than a traditional desktop to help protect the data if it was stolen. If you are the original owner of the laptop, we highly recommend contacting the manufacturer of the laptop. Companies such as Dell, Lenovo, and Toshiba can reset the password if you are the original owner using the Service Tag, disk, or give you exact steps for your laptop.
If you are not the original owner of the laptop, there are some ways to bypass the password depending on the manufacture and model of the laptop.
Laptop password system disabled code5 to 8 character code on System Disabled screen
  1. As the computer is booting press F1, F2, or Del to enter CMOS setup.
  2. In CMOS setup when prompted for a password, guess three times until you're giving the code. If after entering the wrong password three times the computer is displaying a 5 to 8 code, as shown in the picture, continue to the next step.
  3. Write down the code and visit Dogbert's BIOS Password Backdoors scripts page to download Python and the free Python scripts to clear many of these types of passwords.
Clear by dipswitches, jumpers, jumping BIOS, or replacing BIOS
Finally, if the above suggestions do not apply to your laptop you will need to open the laptop and clear the password using dipswitches, jumpers, jumping the BIOS using a paperclip or soldering a wire to pins on the
Top 10 computer mouse tips everyone should know

Top 10 computer mouse tips everyone should know

Most computer users don't take full advantage of the computer Mouse. Below are computer mouse tips and secrets that help you get the full potential of your computer mouse and increase your overall productivity while on the computer.
Shift key and mouse click
Many text editors and programs allow you to highlight all or portions of text using the Shift key and the mouse. For example, place the cursor at the beginning of a paragraph, hold down the Shift key and click at the end of the paragraph to highlight the full paragraph.
Take full advantage of the scroll wheel
Today, everyone is fully aware of a mouse wheels ability to scroll up and down on a page. However, this wheel can also do so much more, as shown below.
  • The mouse wheel is not just a wheel, it can also be used as a button. Pressing down on the wheel will act like a third mouse button. This can be used to open a web page in a tab by clicking the wheel on any link and can also be used to close a tab by clicking the wheel on any open tab.
  • Quickly Zoom in and Out on a web page, word document, excel spreadsheet, etc. by holding down the Ctrl key and scrolling up to zoom in and down to zoom out.
  • Move forward and backwards while browsing the Internet by holding down the Shift key and scrolling up and down. Scrolling down goes back and scrolling up goes forward.
Select with double and triple click
Any word can be easily selected by double-clicking the word. If you want to highlight the whole paragraph, click the mouse button three times on any text in the paragraph.
Use the right-click
Take full advantage of the right-click any time you highlight text or wish to view the properties of an object. For example, if you highlight a file or text, you can right-click that highlighted item copy it and then right-click anywhere else to paste it.
Tip If you right-click on any file or text and drag it while continuing to hold the right button, when you let go you will be given the option to move or copy that file or text. This saves you the extra step of having to right-click where you want to paste the item.
Tip While in a browser pressing and holding Ctrl while clicking on any link will open that link in a new tab.
Ctrl key and mouse click or highlight
While holding down the Ctrl key you can left-click to select multiple objects or highlight multiple sections of text. For example, in Microsoft Windows you could hold down the Ctrl key and click to select multiple files at once. If you wanted to highlight different parts of a paragraph or web page, you could also hold down the Ctrl key and select each section you wanted to copy.
Tip Mozilla Firefox users can also hold down the Ctrl key and individually click on each cell in a table they wish to copy or drag their mouse down a row to select just that row or text without selecting any of the other text in that table.
Use the mouse side buttons
Many new computer mice have buttons on the side of the mouse. These buttons can be programmed to do anything, however, by default the left-thumb button can be used to go back on a web page. This makes browsing the Internet more enjoyable since you do not need to move the mouse cursor to the browser back arrow button in order to go back a page.
Use the Windows Snap To feature
Take full advantage of the Windows mouse Snap To feature, which will automatically move your mouse to
Connecting Two Computers using usb

Connecting Two Computers using usb

step 1 turn on both of the computers. log in to windows using an account with administrator privileges.
 
step 2insert one end of the usb bridge cable into a usb slot on one computer, and the other end of the bridge into the second computer.
 
step 3install the driver software for the usb bridge cable when the computers prompt you to do so. if you do not have driver software for the usb bridge cable, you may be able to download it from the cable manufacturer.
 
step 4choose to install the usb bridge cable either as a link adapter or a network adapter. if you install it as a link adapter, you will only be able to transfer files back and forth. if you install it as a network adapter, you will have full network functionality.
 
step 5complete the software installation. your two computers should now be connected ... enjoy ....
Vodafone Hack for Free GPRS

Vodafone Hack for Free GPRS

I have been asked by many Vodafone Users to post a Method to get a free GPRS for the Vodafone. Nobody wants to pay for what he/she uses. I am also a Nobody so I was also in trying out all the things to get free GPRS for Vodafone users since I am also a Vodafone User. Finally I have got a Full proof way to get free GPRS for all the Vodafone Users. This method has been tested on different mobiles and has been confirmed to be working. Still if anybody faces any problem please contact me and I will try to solve it as quickly as possible.
Followng are the Settings you require to configure on your Mobile:
Account Name: Vodafone_gprs
Homepage: http://live.vodafone.in
User Name: (no need)
Pass: (no need)
Access Point Settings:
Proxy: Enabled
Proxy Address: 10.10.1.100
Proxy Port: 9401
Data Bearer: Packet Data
Bearer Settings:
Packet Data Access Point: portalnmms
Network type: IPV4
Authentication: normal
User Name: (no need)
Password: (no need)
*IF that happen this settings is not working then change the proxy port number to:-
Proxy Port: 9401
Top 20 Hacking Tools

Top 20 Hacking Tools

These are Top 20 Hacking Tools, the list is exhaustive, this are a few to name.

Nessus
The “Nessus” Project aims to provide to the internet community a free, powerful, up-to-date and easy to use remote security scanner for Linux, BSD, Solaris, and other flavors of Unix.
Ethereal
Ethereal is a free network protocol analyzer for Unix and Windows. Ethereal has several powerful features, including a rich display filter language and the ability to view the reconstructed stream of a TCP session.
Snort
Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks.
Netcat
Netcat has been dubbed the network swiss army knife. It is a simple Unix utility which reads and writes data
Make FREE Calls to Landline and Mobile phones

Make FREE Calls to Landline and Mobile phones

Make FREE calls quickly
Simply type gizmocall.com/18005551212 into your browsers address bar.
(put the number you want to dial in place of 18005551212)
Make FREE calls to landline and mobile phones in over 60 countries by participating in the All Calls Free plan.
Users NEW to the All Calls Free plan get 20 minutes of free calling simply by getting ONE friend to sign up for a new Gizmo account. There are no commitments and no hidden fees.

Get Started Now!
  1. Tell a friend to download Gizmo5 and have them add their phone number to their profile.
    img-calls-1 Free Calls
  2. Add each other to your contact lists and you can call that person for FREE using Gizmo5.
How to enable Two factor Authentication on your Google Account

How to enable Two factor Authentication on your Google Account

Step 1:- Download and install the Google Authenticator app for your smartphone: Android, BlackBerry, iPhone.
*The Android version will also require the Barcode Scanner app from ZXing (which is free, and tremendously useful.)
Step 2:- Visit the SMSAuthConfig page from Google.
Step 3:- Use the smartphone app to scan the provided QR code. Once you open the Google Authenticator app, you can scan the QR code provided and it will instantly generate a verification code.
Step 4:- Print your backup codes.
Step 5:- Enter your phone number. Click “Send Code”  and check phone for verification code.
Step 6:- Type the code you received in the phone message, and click “Verify”.
Step 7:- Set up application-specific passwords. Some Google applications don’t honor the two-factor authentication seamlessly. Anyways, you can still generate application-specific passwords that protect those apps.
However, those who are having neither Android, iPhone, Blackberry, follow the following steps:-
What Are Keystroke Loggers (Keyloggers)?

What Are Keystroke Loggers (Keyloggers)?

A Keystroke logger (also known as a Keylogger) is a program, usually ran secretly in the background that records what users type, then the typed output is usually sent via email or uploaded by the keylogger somewhere in secret. These can be attached to other executable so you never even know you ran them in the first place, once you click it once it often is started at start up from their on.
There are two main types of keystroke loggers:
1. Software based, and
2. Hardware based
Software based keyloggers
These are software programs designed to work on the target computer’s operating system. Once the software is installed on the target’s computer,  it captures every key pressed on the keyboard and stores it down in a file or memory-bank that can be viewed by the person performing the monitoring in real-time, or at a later date.
There is also a type of remote access software keyloggers. This is a process of creating server keylogger and then sending this server.exe file to the victim. Once the keylogger server is installed on the victim’s computer, all text and passwords typed on his computer are sent to you in your email inbox by this server created using keylogger.
Recovering Lost Passwords

Recovering Lost Passwords

Recovering Lost PasswordsIt is now commonplace to use encryption algorithms to prevent unauthorized access to computer data. Even many novice computer users are able to benefit from the use of encryption. If we have something we wish to keep private from others but that we may also need access to in the future, we often use the password protection built into editing or compression programs. More advanced users frequently employ sophisticated dedicated solely to encryption, which can cost tens or even hundreds of dollars. Such applications are becoming increasingly popular as users recognize the need for privacy. It’s no surprise, because just as the number of opportunities provided by the internet has grown, so has the number of potential threats. Ultimately nearly all users will wish to acquire the tools necessary to secure their accumulated data so that nobody except the owner will have access to them.
Are password-encrypted data secure enough? This is one of the questions that occur to nearly every computer user. As time passes and new technologies appear, the answer to this question becomes more difficult. That’s because despite the appearance of newer and more secure methods, no-one can be certain that their current security methods can’t be broken. Just as some people are constantly working on newer and more effective forms of security, others are constantly working to break them. As a result, very few of the encryption methods that human ingenuity has devised will prove to be reliable long-term protection for a broad variety of data.
How to Protect Your PC from Hidden Backdoors and Trojans

How to Protect Your PC from Hidden Backdoors and Trojans

To accomplish his goal, a hacker must install a backdoor that is not easily detectable. This is his primary task. Hackers use a variety of methods for this purpose, placing their tools at the deepest level of compromised systems and renaming files so as not to arouse suspicions. With a backdoor, such hacker can virtually have full and undetected access to your application for long time. It is critical to understand the ways backdoor can be installed and to take required preventive steps.
What is a Backdoor?
A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plain text, and so on, while attempting to remain undetected, the backdoor may take the form of an installed program, or could be a modification to an existing program or hardware device. It hides in the computer, scans existing loopholes, opens corresponding ports, as well as modifies system registration files.
Backdoor will not duplicate or actively spread itself. It will only open a certain port through which a remote computer in the network can control the infected computer. Generally the backdoor will not influence normal communication of the network, so firewalls or IDS can hardly detect its existence.
Is my Network Infected with a Backdoor?
According to statistics, most of the backdoors work under port 31337, 31335, 27444, 27665, 20034, 9704, 6063, 5999, 5910, 5432, 2049, 1433, 444, and 137-139. So whether there is communication
A Beginners Guide to Ethical Hacking

A Beginners Guide to Ethical Hacking

I wish this book was around when I began my journey to learn how to hack. It was made specifically for the beginners who really want to get into hacking and for those of us who began and got lost. The author of this book is Rafay Baloch, an expert into the field of hacking. His book “A Beginners Guide To Ethical Hacking” contains all the interesting hacks, and the best part of this e-book is that he has written it in such a manner that even a 5th grade kid can understand it and become a Hacker.
A Beginner’s Guide to Ethical Hacking
steal any one ip without any software/tool

steal any one ip without any software/tool

How to steal an ip ?


1.the first thing you have to do is go to syntaxmaster.info.

2.there you can create a free account !(the registration is really quick !)

3.once you have registered and confirmed you account,you can log into your "newly created account" !

4.then youll see an option "software/tools" on the tab.then click on "ip stealer"
Ten Tips To Improve System Speed

Ten Tips To Improve System Speed

Ten Tips To Improve System Speed

1.Let your PC boot up completely before opening any applications.

2.Refresh the desktop after closing any application. This will remove any unused files from the RAM.

3.Do not set very large file size images as your wallpaper. Do not keep a wallpaper at all if your PC is low on RAM (less than 64 MB).

4.Do not clutter your Desktop with a lot of shortcuts. Each shortcut on the desktop uses up to 500 bytes of RAM

5.Empty the recycle bin regularly. The files are not really deleted from your hard drive until you empty the recycle bin.

6.Delete the temporary internet files regularly.

7.Defragment your hard drive once every two months. This will free up a lot of space on your hard drive and rearrange the files so that your applications run faster.

8.Always make two partitions in your hard drive. Install all large Softwares (like PSP, Photoshop, 3DS Max etc) in the second partition. Windows uses all the available empty space in C drive as virtual memory when your Computer RAM is full. Keep the C Drive as empty as possible.

9.When installing new Softwares disable the option of having a tray icon. The tray icons use up available RAM, and also slow down the booting of your PC. Also disable the option of starting the application automatically when the PC boots. You can disable these options later on also from the Tools or preferences menu in your application.

10.Protect your PC from dust. Dust causes the CPU cooling fan to jam and slow down thereby gradually heating your CPU and affecting the processing speed. Use compressed air to blow out any dust from the CPU. Never use vacuum.RAM IS THE WORKING AREA (DESKTOP) OF THECPU, KEEP IT AS EMPTY AND UNCLUTTERED AS POSSIBLE!/
FUN WITH NOTEPAD TRICKS

FUN WITH NOTEPAD TRICKS

1)How To Make Matrix With NotePad

I’am going to show you how to make cool Matrix batch file using notepad.
Open notepad and type in
@echo off
color 2
:start
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
goto start

How To Repair Detectable But Corrupt USB Drive

How To Repair Detectable But Corrupt USB Drive

Have you suddenly encountered with the problem that when you plug in your USB drive, the Removable media shows up but when you try to open it, it returns with the message “Please insert a disk in to drive H:”.

If yes then you have been on right tutorial page.
By applying this simple method you’ll have 80 % chance to get back your USB drive hardware.
This works only in the above error condition. If the windows doesn’t detect your USB drive, then there is probably flaw in the USB media.
Please keep in mind that, you’ll have to lose your data when following this tutorial.
Plug in your USB drive.

Hack modem + isp and get high speed

Hack modem + isp and get high speed

Hack modem + isp and get high speed, hack your modem and increase your download speedmost of us will be feeling that the surfing speed which is allocated by our isp is not enough. people with 64kbps will think 128kbps will be cool speed. people with 128kbps will think 256kbps will be cool and so onthistutorialwill teach you how to increase your 64kbps link to 512kbps or what ever speed you like.it is very much possible to do this. with a bit of luck if your cableinternetservice provider are very uneducated on how this verynewtechnology works and leave some key loopholes open for you to grab vital information on how to accomplish this task.but this [tutorial] will no guarantee you 100% success.okay here we go. im going to try to explain you asbestas i can to accomplish re-configuring your sb5100, sb4100 or sb3100 cablemodemtheory of cable modem workingall the cable modems when it boots up it will search for an "imagefile" where in all configuration like your upload speed limit anddownloadspeed limit is defined. this "image file" is stored in isps tftp server. modem will be pre-configured with the isps tftp server ip address and the image file name to be downloaded. when the modem boots up it query tftp server and download image file from[tftp] [server] according to this this our speed limits will be set.our missionget this image file from isps tftp server, reconfigure it according to our need and force our modem to download this file from our computer rather than downloading it from our isps tftp server.
YouTube hacks tricks

YouTube hacks tricks

YouTube is the best video sharing site with millions of users registered. Getting lots of views and subscribers is very important for you popularity on YouTube. In this tutorial I will teach you & show you how to get more then 100, 000 views on YouTube. Its totally free & simple... All you need is little time, good internet connection & proxy list.

1. First of all Download
>YouTube Increaser from the official site. via google

2. Install and run the software to see something like this:






3. Now when you install it and run it you can use it 30 times. Well, now I will show you how to bypass that limit & get free full version of it. Lets start.

Follow these steps:

Click Start -> then click Run -> Type in Regedit and click OK.

Now, we will need to edit registry folder of our Tube Increaser 3.0.

HKEY_CURRENT_USER > Software > TurboTube > choose TubeIncreaser > and delete turbo




4. Now we need proxy, because if we use our own IP we will get around 5 views only per day, because YouTube got some limit.

5. Download Proxy List from here or go to www.tubeincreaser.com/proxylist.txt and save the proxy list in notepad and name it Proxy.txt.

6. When you save it on desktop, go to TubeIncreaser 3.0 and click Load List and choose list. In YouTube URL bar, write your Video URL/link, from Hits box write numbers of views and click button Start.





That's all friends, really easy and simple. You can get around 200k views per day if your net is good.
Add A Photo To My Computer Properties

Add A Photo To My Computer Properties


Here is simple windows tip, which will show you how to add a photo and name to my computer properties.
To do it, open notepad and type the following
[General]
Manufacturer=Your Name Here
[Support Information]
Line1=Your Name Here
Line2=Your Address Here
Line3=Your Email Address Here
Save as OEMINFO.INI in the C:\WINDOWS\system32 folder.

incriease ur downloading speed

incriease ur downloading speed

Put your own icon on the browser address

Put your own icon on the browser address

Have you seen FronTools icon? Would you like to put your own icon on the browser address? It’s easy and we will help you. As Monika says “By having your very own unique favicon you can set yourself apart from millions of other online users. It’s kind of like a signature of your website/blog”. It will make a difference; give your site an identity and a visual improvement.
But how can we do it? There are some cool free tools on the web:
Using one of the tools above you can create your icon. Them you must upload it to the root of your site and insert the following code in your site’s main index page, just before the </head> tag:

<link rel=”shortcut icon” href=”/favicon.ico” mce_href=”/favicon.ico” />
To test it in Internet Explorer, add your site to Favorites and reopen browser. In Firefox or other Mozilla-based browser just open your web page.
Try it and let me know how it worked!
 
Broadband speed test

Broadband speed test

Some time ago i posted about a free online tool that to test your internet speed in a few clicks. A good broadband speed tester will help you to choose the best internet options in the market, take the best decision and sometimes this will make you save some good money.
 I have found another free tool to test your broadband speed test. Nowadays broadband users are increasing taking advantage of convenience and portability, with no need of a land line and more flexibility. However sometimes broadband may have lack of reception, compared to a line access. This tool I’m posting about is specially designed for UK users, but it will work wherever you are in the world.
It will work with the most accurate results available for any type of connection including ADSL, cable and mobile broadband. It easy to use, just choose the details of your internet connection (provider, supposed speed, monthly internet and phone line cost, your postcode and a rate of your provider) then run the speed test and see the results with information on Broadband download speed and Broadband upload speed test.
You can see my test results in the following image:
Try it and let me know how it worked for you :)
FREE VIDOES CHAT ONLINE

FREE VIDOES CHAT ONLINE

TinyChat is a free online simple chat. To use it you only need to go to      TinyChat                                              and create your chatroom.

 CLICK HERE TO CHAT

Tinychat will give you a link you can use with your chat; you anly need a browser. After this you will need to promote it and invite your friends. There is something cool: when you leave the chat room, all the chat data will be gone. You can also get the html to put a buttom in you site or blog. I have done it for Frontools. Try it here:

 It looks that now you have to make a registration to use this service,…
Need For Speed World Free Download

Need For Speed World Free Download

Here you can download Need For Speed World 2011 for free




Installation instructions:
1) Unpack the archive to NFS Wld (OBT). Rar
2) Take GameLauncher.exe and make a shtcut on your desktop
3) register an account
4) Run GameLauncher.exe
5) Who will the err “The installation is crupted”, run NFSWOAK.exe, in the root folder of the game.
6) Play


Minimum system requirements:

Change the Logon Screen Background in Windows 7

Change the Logon Screen Background in Windows 7

How would you like to change the logon screen background in Windows 7 so as to give your Windows a customized look and feel? With a small tweak it is possible to customize the Windows 7 logon screen and set your own picture/wallpaper as the background. Changing logon screen background in Windows 7 is as simple as changing your desktop wallpaper. Well here is a step by step instruction to customize the logon screen background.
 
1. The image you need to set as the background should be a .jpg file and it’s size should not exceed 245KB.
How to Use Windows 7 Without Activation

How to Use Windows 7 Without Activation

Most of you might be aware of the fact that it is possible to use Windows 7 and Vista for 120 days without activation. This is actually possible using the slmgr -rearm command which will extend the grace period from 30 days to 120 days. However in this post I will show you a small trick using which it is possible to use Windows 7 without activation for approximately an year! Here is a way to do that.

1. Goto “Start Menu -> All Programs -> Accessories” . Right click on “Command Prompt” and select “Run as Administrator“.
Netbios Hacking

Netbios Hacking

THIS NETBIOS HACKING GUIDE WILL TELL YOU ABOUT HACKING REMOTE COMPUTER AND GAINING ACCESS TO IT’S HARD-DISK OR PRINTER. NETBIOS HACK IS THE EASIEST WAY TO BREAK INTO A REMOTE COMPUTER.

STEP-BY-STEP NETBIOS HACKING PROCEDURE
1.Open command prompt
2. In the command prompt use the “net view” command
( OR YOU CAN ALSO USE “NB Scanner” OPTION IN “IP TOOLS” SOFTWARE BY ENTERING RANGE OF IP ADDRESSS. BY THIS METHOD YOU CAN SCAN NUMBER OF COMPUTERS AT A TIME).
 
Example: C:\>net view \\219.64.55.112
nside GoOgLe – A Collection of Strange Links on Google

nside GoOgLe – A Collection of Strange Links on Google


Although Google is a search engine, it’s also a website. It has millions of it’s own pages indexed in it. When i was digging deep inside Google i found some strange links inside it. So I decided to compile a list of strange Google links. Enjoy!
1. If you ever wondered all the misspellings of Britney Spears and their volume, you must check this out.
http://www.google.com/jobs/britney.html
2. These two links are to fun Google games
http://www.google.com/Easter/feature_easter.html
http://www.google.com/heart/heart01.html
3. Quench your thirst for knowledge with Google Gulp
www.google.com/googlegulp
4. Check out Google’s latest ideas
http://www.google.com/experimental
5. If you are fond of puzzles
http://www.google.com/puzzles
6. Tribute to Moms
http://www.google.com/moms01
7. Google Mobile maps
http://www.google.com/mobile/gmm/index.html
8. http://www.google.com/tofc
9. Are you scary smart?
http://www.google.com/scarysmart
10. Google press center
http://www.google.com/press
11. Google apps
ONLINE FOR ONLY SOME FREND ON FACEBOOK

ONLINE FOR ONLY SOME FREND ON FACEBOOK

You know how it is: you sign into Facebook Chat for three seconds to see whose online and as if it were magic, you're immediately sent a chat from your least favorite "friend." Well it is entirely possible to hide yourself from those people. You can even pick and choose who sees that you're online or not. Essentially, Facebook allows you to control these settings through the use of a feature called "lists." This guide will walk you through setting up your account so that only people you want to talk to can see that you're online.
First, create a Facebook list. To do this, log on to Facebook, and go to the "Account" menu and select "Edit Friends." Then click "Friends" on the left hand side of the page.
What to Do When Your Email Account is Hacked?

What to Do When Your Email Account is Hacked?

How to Recover Hacked Email Accounts?

It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back your hacked email account.

 

For Gmail:

 
It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.
Step -1: Try resetting your password since it is the easiest way to get your account back in action. In this process Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account. You can reset you password from the following link
If you cannot find success from the Step-1 then proceed to Step-2.
 
Step-2: Many times the hacker will change the secret question and secondary email address right after the account is compromised. This is the reason for the Password Reset process to fail. If this is the case then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like
Hack Facebook Password – Facebook Hacking

Hack Facebook Password – Facebook Hacking

Wondering to know how to hack Facebook password? Well, before you can do that, it is very much necessary to understand the real ways of hacking that actually work and also those that are simply scam and do not work. So in this post, we’ll look at some of the possible ways to hack Facebook password!
Every day I get a lot of emails from people requesting me to hack Facebook passwords of their spouse, girlfriend or boyfriend so as to reveal their secret relationships (if any). Most of them are even willing to pay for the service. However, I strongly deny any such requests since I do not provide any paid hacking service. But anyhow, I have decided to write down this post so that you can learn the tricks for yourself and implement everything at your own risk.
With my experience of over 7 years in the field of ethical hacking and security, all I can tell you is that there are only two ways to successfully hack Facebook password.

Possible Ways to Hack Facebook Password


1. Keylogging – The Easiest Way!

Keylogging refers to simply recording each and every keystroke that is  typed on a specific computer’s keyboard. This is possible with the use of a small computer program called keylogger (also known as spy software). Once installed, this program will automatically load from the start-up, runs in the invisible mode and start capturing each and every keystroke that was typed on the computer. 
Some keyloggers with advanced features can also capture screenshots and monitor every activity of the computer. One doesn’t need to have any special knowledge in order to install and use a keylogger. That means, anyone with a basic knowledge of computer can install and use this software with ease. Hence for a novice computer user this method is the easiest way to hack Facebook password. I recommend the following keylogger as the best for gaining access to Facebook account.

SniperSpy (TESTED) is a revolutionary product that will allow you to easily access *ANY* online account or password protected material such as MySpace, Facebook, Yahoo, Gmail or Hotmail. There are absolutely *NO* limitations to what accounts or websites this software can access!
Why SniperSpy is the best?
Today there exists hundreds of keyloggers on the market but most of them are no more than a crap. However, there are only a few that stand out of the crowd and SniperSpy is the best among them. I personally like SniperSpy for it’s REMOTE INSTALLATION FEATURE. With this, you can install it on a remote computer without the need for having physical access to it. It operates in a complete stealth mode so that it remains undetected.
Here is a summary of benefits that you will receive with Sniperspy software:
1. Access ANY Password
With SniperSpy you can hack any password and gain access to Facebook or any other online account.
2. Monitor Every Activity
You can monitor every activity of the target computer, take screenshots and record chats & IM conversations.
3. Never Get Caught!
SniperSpy operates in a total stealth mode and thus remains undetectable. Therefore you need not have the fear of being traced or getting caught.
4. Remote Installation Feature
With the Remote Install feature, it is possible to install it even on computers for which you do not have physical access. However, it can also be installed on a local computer.
5. Extremely Easy to Use
Installing and using SniperSpy is simple and needs no extra skill to manage.
6. Completely Safe to Use
This software is 100% safe to use since it does not collect any personal information from your computer. SniperSpy is a reputed, trustworthy and reliable company which offers 100% privacy for it’s users.
7. Works on both Windows and Mac
Fully compatible with Windows 2000/XP/Vista/7 and Mac.
Hack BSNL Broadband for Speed

Hack BSNL Broadband for Speed

If you are a BSNL broadband user, chances are that you are facing frequent DNS issues. Their DNS servers are just unresponsive. The look up takes a long duration and many times just time out. The solution? There is small hack on BSNL for this. Use third party DNS servers instead of BSNL DNS servers or run your own one like djbdns. The easiest options is to use OpenDNS. Just reconfigure your network to use the following DNS servers:
208.67.222.222
208.67.220.220
Detailed instructions specific to operating system or your BSNL modem are available in the OpenDNS website itself. After I reconfigured my BSNL modem to use the above 2 IP addresses, my DNS problems just vanished! Other ‘freebies’ that come with OpenDNS are phishing filters and automatic URL correction. Even if your service provider’s DNS servers are working fine, you can still use OpenDNS just for these two
Transform Windows XP into Windows 7 without using Customization Pack

Transform Windows XP into Windows 7 without using Customization Pack

          NOTE 1: If you want to download all BITMAPs, AVIs and other files mentioned in this tutorial in             single pack, you can download it using this link



NOTE 2: Please create a Restore point using "System Restore" before applying anything mentioned in this tutorial so that you can restore your system back to default if you don't like the changes.
Also take a backup of system files before modifying them, so that you can restore them if anything goes wrong or you don't like the new change.

        
NOTE 3: If you are facing problems while saving a file after editing in resource hacker, then make sure you have disabled WFP (Windows File Protection) service using "WFP Patcher" or use "Replacer" to replace the file. Both utilities can be found in our "Download" section.
Also if you are getting error "Can't create file...", that means you have edited and saved the same file in past and there is a backup file which need to be deleted before saving this file again. Go to the folder containing this file and you'll see a similar file having "_original" in its name. Delete it and try to save the file in resource hacker.
Windows 7 provides lots of new features along with a newly designed interface. It looks very similar to Windows Vista but there are many GUI changes like redesigned taskbar, Explorer, new boot screen and login screen, etc.
If you are still using Windows XP but want to enjoy the new Windows 7 look, then this tutorial will definitely help you.
After following this tutorial, you'll get the same Windows 7 look in your Windows XP. Following is a list of things which are going to change after following this tutorial:
  • Windows Theme or Visual Style
  • Icons
  • Boot Screen
  • Login Screen or Welcome Screen
  • Cursors
  • Taskbar
  • Wallpaper
  • Sidebar
  • Progress Dialog Box
  • Shutdown / Log off Dialog Box
  • About Windows Box
  • System Properties Dialog Box
  • Volume Control Window
  • Extras like "Aero Shake", "Aero Snap", "Aero Peek", "Calculator" and "Paint"
  • A Few Other Mods...
So here we start our transformation tour:


1. Windows Theme or Visual Style:
Windows 7 provides a new refreshing look which includes redesigned taskbar and start menu, Windows Explorer and a few other small changes.
You can get the same look in Windows XP by using following theme:
 SevenVG_RTM_Theme_for_XP_by_Vishal_Gupta.zip