Oct 5, 2008

How to convert a cd rom to dvd rom

There are two types of CD-ROM drives we can mod:
24x to 40x
40x or higher
Drives slower than 24x are too old to be modded.
24x to 40x CD ROMs
Laser Head Adjustments:
The track pitch of CDs is 1.6 microns, and the track pitch of DVDs is only 0.8 microns. The minimum length of track pits of CDs is 0.843mm, and the minimum length of track pits of DVDs is 0.293mm. That's why DVD discs can store much more data in the size of a CD.
Pinpointing this situation, we need to adjust the laser head so it can read discs with smaller track pitchs and shorter track pits. Open up the CD-ROM drive, do you see a lens on the rail? That's the laser head. On the side of the laser head, there's a screw you can adjust.
This is the key of this mod.
This screw can adjust the size of the laser beam that lands on the disc. Referring to the above, after adjusting, the laser beam should be less than 0.293mm, to suit the needs of DVD discs. So turn that screw 2-3 times. I got this number through trial and error. Mark with a pencil, in case you forget how many times you turned that screw.
Speed adjustments:
DVD-ROM drives can play DVD movies smoothly at 4x speed. If we're modding a 32x CD-ROM drive, the rotation speed is obviously too high, increasing heat, and shortening the life of the drive.
So we need to decrease the speed of it.
Most people know that power supplies can provide 5V (red wire) and 12V (yellow wire) electricity output for Molex connectors. Find the Molex connector you'll plug into the modded CD-ROM drive, cut the yellow wire or insulate it with tape, so only 5V of electricity is transferred to the CD-ROM drive. The speed of the drive is now 32 * 5/17 = 9.41x and can now fulfill our requirements.
40x or higher CD ROMs
When 40x CD-ROM drives are released, most manufacturers are already producing DVD-ROM drives. To lower cost, they use the same core as DVD-ROM drives with DVD functions disabled. What we need to do here is to re-enable the DVD function.
Open up the CD-ROM, behind the circuit board, look for a jumper that says DVD JUMP. Find a jumper to connect this jumper. Thin metal wire also works fine.
OK, so the DVD function is unlocked, but we still need to decrease the speed. Use the instructions above on how to decrase the speed of the drive.
Notes:
Modded drives cannot be detected in POST, that means you cannot use it in DOS. But once you get into Windows, the drive works fine.
Modded drives have no region code problems.
Modded drives MIGHT NOT read DVD9 discs, that's why I said you can watch most retail DVDs in the beginning
Stumble Upon Toolbar Read more on this article... Read more on this article...

How to make windows genuine

We are very much aware of the fact that how much important is the genuinity of microsoft windows.If your windows are not genuine then it really becomes a pain in the a** while downloading updates from the microsoft site.There are many patches and cracks available in the net but most of them do not work.today i am going to tell u a simple way by which u can make your windows genuine and can avail all the advantages of a genuine windows by simply a click.this method is applicable for all versions of microsoft.windows xp

CODE::
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WPAEvents]
"OOBETimer"=hex:ff,d5,71,d6,8b,6a,8d,6f,d5,33,93,fd
"LastWPAEventLogged"=hex:d5,07,05,00,06,00,07,00,0f,00,38,00,24,00,fd,02

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion]
"CurrentBuild"="1.511.1 () (Obsolete data - do not use)"
"InstallDate"=dword:427cdd95
"ProductId"="69831-640-1780577-45389"
"DigitalProductId"=hex:a4,00,00,00,03,00,00,00,36,39,38,33,31,2d,36,34,30,2d,\
31,37,38,30,35,37,37,2d,34,35,33,38,39,00,5a,00,00,00,41,32,32,2d,30,30,30,\
30,31,00,00,00,00,00,00,00,00,0d,04,89,b2,15,1b,c4,ee,62,4f,e6,64,6f,01,00,\
00,00,00,00,27,ed,85,43,a2,20,01,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,31,34,35,30,34,00,00,00,00,00,00,00,ce,0e,\
00,00,12,42,15,a0,00,08,00,00,87,01,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,94,a2,b3,ac
"LicenseInfo"=hex:9e,bf,09,d0,3a,76,a5,27,bb,f2,da,88,58,ce,58,e9,05,6b,0b,82,\
c3,74,ab,42,0d,fb,ee,c3,ea,57,d0,9d,67,a5,3d,6e,42,0d,60,c0,1a,70,24,46,16,\
0a,0a,ce,0d,b8,27,4a,46,53,f3,17

COPY THIS WHOLE DATA TO NOTEPAD AND SAVE AS ( WINDOWS GENUINE KEY.reg )

AFTER SAVE THE FILE U CAN CLICK THIS FILE AND HIT TO YES

YOUR WINDOWS IS NOW GENUINE FOREVER
Stumble Upon Toolbar Read more on this article... Read more on this article...

Oct 1, 2008

CRACK

Most of them are unaware of types of cracks. They just need cracks to run any s/w but should have atleast the knowledge of what are these cracks, i am writing the definitions of cracks for those ones.

There are several basic types of cracks:


1. Serial codes (serials) : This is the simplest type of crack. Very often it has nothing to do with cracking or crackers. Serial is a special text code given by software manufacturer to anyone who buys software license to remove trial / demo limitations, usually by simply pasting that code into appropriate registration field of the program.

Crackers get those codes by the means of reverse engineering, by understanding how the registration algorithm works and generating serial code that would "register" the software.

It is generally very easy for software manufacturers to counter the distribution of serials. Normally, all they have to do is "blacklist" stolen / widely available serial in the next version of their software or their online database (if software is registered online).


2. Registration files (regfiles or keyfiles) : This type of crack works in the same way as Serial, except that user is given a special file (generated by an algorithm known only to the software maker), instead of a simple text code, to register the program.

Regfiles are usually either special (and often encrypted) files, or simple Windows Registry (.reg) files. It is much harder for a cracker, though, to crack this type of protection, as he must understand the keyfile generation algorithm.

As its equally easy for software manufacturers to counter regfiles' distribution, as it happens with serials – a simple blacklisting will work.
3. Serial generators (keygenerators, keymakers, keygens) : This type of cracks are much harder to create than previous ones, as the cracker must not only fully understand the serial code generation algorithm, but also be able to recreate it.

Keygens often take days and even weeks to write; however, a working keygen is a demonstration of a total and clean "victory" of the cracker over the protection creator.

Countering keygen distribution is much harder for the software manufacturer; in most of cases they will have to totally change the serial generation algorithm (a simple change will result in subsequent simple and fast cracking by the same cracker).


4. Patches : This is the most widespread type of cracks. A patch is a small program that alters the target software files to remove or modify the part of code that is responsible for protection limitations or registration process. As a result, the patch either makes software "think" it is registered, or simply removes limitations like time limit, nag screens, enables non-working features etc.

A simple protection patch is usually easy to create by comparing binary code of registered version and "trial" version and then creating a "difference patch" using certain software. Most of patches are hard to create though and require a thorough knowledge of Assembler programming language and good reverse engineering skills.

Countering patches is usually not a very hard task for software manufacturers; in most cases, a simple software version update renders the patch useless, because patches modify the binary code and are usually created to modify specific parts in that code, which won't work if code differs (even slightly) from the original.
5. Loaders : Technically, loaders are a variation of patches, except that they modify binary code after the program is ran, i.e. loaded into computer memory. Usually, loaders are used to crack software with encrypted binary files, which make it very hard to write a normal patch.

6. Pre-cracked files ("cracked EXE") : This type of cracks includes parts of software itself, already altered by cracker. Cracked EXEs are extremely hard or even impossible to counter by software manufacturers, and are considered by some as "unfair play".

Ok, now we know about types of cracks and what they do. How to correctly use them?

First of all, scan the downloaded file with a GOOD antivirus. We recommend doing this with any executable file .exe downloaded from the Internet. Remember, crackers never infect their cracks with viruses; ALWAYS, scan cracks with antiviruses before running.


Second, READ THE NFO! Most of crack packages include brief instruction on how to use that specific crack, which is usually located in NFO or TXT files supplied with the package. ALWAYS read NFO before running the crack. It may contain very important instructions; reading NFO will save you from many problems later.
Stumble Upon Toolbar Read more on this article... Read more on this article...
::SITES LINKING ME::

SetEnvIfNoCase Referer "^http://(www.)?securecomputing\.com" ref=1 "(.*)" Order Allow,Deny Allow from all Deny from 206.169.110.66 Deny from env=ref