Saturday 2 June 2012

Facebook smileys



[[f9.laugh]]
[[f9.sad]]
[[f9.angry]]
[[f9.sleepy]]
[[f9.shock]]
[[f9.kiss]]
[[f9.inlove]]
[[f9.pizza]]
[[f9.coffee]]
[[f9.rain]]
[[f9.bomb]]
[[f9.sun]]
[[f9.heart]]
[[f9.heartbreak]]
[[f9.doctor]]
[[f9.ghost]]
[[f9.brb]]
[[f9.wine]]
[[f9.gift]]
[[f9.adore]]
[[f9.angel]]
[[f9.baloons]]
[[f9.bowl]]
[[f9.cake]]
[[f9.callme]]
[[f9.clap]]
[[f9.confused]]
[[f9.curllip]]
[[f9.devilface]]
[[f9.lying]]
[[f9.rofl]]
[[f9.billiard]]
[[f9.cakepiece]]
[[f9.rosedown]]
[[f9.shutmouth]]

[[f9.shy]]
[[f9.silly]]
[[f9.tongue1]]
[[f9.fastfood]]
[[f9.ring]]
[[f9.plate]]
[[f9.candle]]
[[f9.party]]

Downloading bolg post in pdf format


Many may be interested in downloading all your blog post in a pdf file and storing it ofline.
So i am telling you a eazy way to do so.






Enter Blog Address and select platform
Click Get The Post Button












Select & Order the posts you want to convert
Click Continue
Customise ur eBook(Pdf)
Click Create My Book
You can save or download your eBook

How to put your picture on facebook chat


Earlier I have disussed about how to add pre defined photos to facebook chat
ie Mr Bean, Heart ect. Now I am telling you how to put your picture on facebook chat








If you have not read my earlier post on How To Put Images On Facebook Chat Box Click Here To read it


Go to the bellow website:

  • Visit Website
  • Click the “Choose File” Button and choose an image from your computer
  • Enter The Captcha
  • Click the “ Upload Now” button

  • Copy the code you gets after uploading
  • Paste the code to Facebook Chat Box

    Get Your images in Facebook chat as seen bellow!





Get money by liking facebook page


Today I am disussing about a way to get money just by liking Facebook Pages.
If you are a Facebook Addict this is the perfect way to earn real cas from ur Facebook Account








Let’s Begin

Go to the site bellow and Sign Up

Confirm your Email
Login to ur facebook account and site I provided
Click on Earn tab and select Facebook

Like the Pages provided



How To Redeem Ur Points:

Click on Sell Coins from left menu

Enter your Paypal address and redeem

Point System:
1000 coins -> $2
2000 coins -> $4
5000 coins -> $7
10000 coins ->$15

Hacking IDM by new method


Internet Download Manager is one of the popular DownloadManager available today and cost something big!.
So I have found out a trick to use Idm Free.Here I am not using  
Cracks And Serials.
I use my own methord which I found out after researching 
for hours with Internet Download Manager and 
I am sure this Trick cant be seen in any other sites except 
copied from me.
I just used a Vulnerability on Internet Download Manager’s
 Registry Key’s

 





Lets start

Open Registry (Go to run and type regedit)

Press Ctrl+F enter DownloadManager

Check the CheckBox Keys as bellow


Click Find Next

You will get a Window as bellow


Right Click on the Right side

New->String Value

Right Click on New Value #1(Default name of string u created earlier) and select Rename

Enter the name as Serial

Double Click on it(Serial) and enter the Value data as

XXXXX-XXXXX-XXXXX-XXXXX” without quotes as bellow


Click Ok and Close Registry editor


Done now enjoy a full Internet Download Manager


You can Update Download and do whatever you want

Correct adobe photoshop crash


You may have faced a situation that when you open adobe photosohp it crashs after Reading Preferences
I ill tech you how to fix it with eaze















Go to My Computer
Click Organise


Click Folder And Search Option
Click View Tab
Select Option Show Hidden Files & Folders
Click Apply

Then go to the bellow location

Windows-7

C:\Users\Username\AppData\Roaming\Adobe\Photoshop\Version\Adobe Photoshop CS Settings

*Replace Username with your username Version with your Version, C:\ with your Root Drive

Delete all files found in the folder Adobe Photoshop CS Settings



Now open Photoshop and it will not crash again

Hack admin page


To hack a website in most cases admin page is more important.I will show you a simple trick to find admin pages
I will use a simple loop hole in robots.txt












Do you know about robots.txt file ?

Yes it is file to spiders of search engines to decide what to crawl and what not to crawl. The Robot Exclusion Standard, also known as the Robots Exclusion Protocol or robots.txt protocol, is a convention to prevent cooperating web crawlers and other web robots from accessing all or part of a website

Yes lets start:

First select a website eg:www.google.com
Then after the address add /robots.txt to website adress
Now ur Url will be www.google.com/robots.txt
Now you will get a txt file showing all pages which is disallowed by admin to search engine
If the site admin is a good Administrator he will not allow admin page to be crawled by search engine
Now seach for admin you will find admin page
See bellow

Forgot to log out from public network


Yeah there may be situations like you forgot to logout from a Cyber cafรฉ and Colleges.
If so there is a chance that someone misuses your FaceBook Account.So lets see what to do in these situations






Steps:
Log in to Facebook from Home Computer

Click Account Settings -> Security


Click Edit button near to Active Sessions



You can see the Active Sessions


End all Sessions by clicking End Activity




Hola Your Account Is Safe






Info about hacking


Hacking study

Study Guide

What are hackers?

  • Hackers are people who try to gain unauthorised access to your computer. This is normally done through the use of a 'backdoor' program installed on your machine. You can protect yourself from these by using a firewalland a good up-to-date anti-virus program. You would normally get such a backdoor program by opening an E-mail attachment containing the backdoor program. It is normal for such a backdoor program to send out more copies of itself to everyone in your address book, so it is possible for someone you know to unintentionally send you a malicious program. A few backdoor programs can work with any e-mail program by sitting in memory and watching for a connection to a mail server, rather than actually running from within a specific mail program. These programs automatically attach themselves to any e-mail you send, causing you to unintentionally send out malicious programs to your friends and associates.

Why do hackers hack?

  • To a hacker, breaking into someone’s computer is simply a challenge. They may not specifically intend to do damage to the computer. The thrill of simply gaining access is often enough. Hackers often try to show off their skills to the world by hacking into government computers, or as revenge against another user or agency. Hackers are indeed as the stereotype depicts them as; young males with a thirst for knowledge. Despite rumours, all hackers do not wear nerdy glasses.

What damage can a hacker do?

  • This depends upon what backdoor program(s) are hiding on your PC. Different programs can do different amounts of damage. However, most allow a hacker to smuggle another program onto your PC. This means that if a hacker can't do something using the backdoor program, he can easily put something else onto your computer that can. Hackers can see everything you are doing, and can access any file on your disk. Hackers can write new files, delete files, edit files, and do practically anything to a file that could be done to a file. A hacker could install several programs on to your system without your knowledge. Such programs could also be used to steal personal information such as passwords and credit card information. Some backdoor programs even allow a hacker to listen in on your conversations using your computer's microphone if one is attached!

Types of hackers

Hackers often can be characterized by their motives. The following are the more common types of hackers and the motives they cite:
  • Pranksters: These hackers are the mischief-makers of the bunch whose intention is merely to be a nuisance. They are the equivalent of individuals who pull fire alarms or make phony bomb threats. Copycat hackers would also fall into this category.
  • Fame seekers: This group hacks seeking attention or notoriety. Using a code name, these individuals target high-profile sites such as Yahoo!, eBay, or NASA to achieve bragging rights among their peers.
  • Educational: Students justify hacking into systems by saying that they are honing their programming skills.
  • Criminals: When bank robber Willie Sutton was asked why he robbed banks, he replied: "That’s where the money is." Stored data or "data at rest" is more profitable to steal than data moving over the Internet. Why steal one credit card number at a time when you can steal tens of thousands to millions with one break-in? This happened to CDUniverse and RealNames. Pacific Bell had to have more than 60,000 customers change their passwords after hackers stole them.

What constitutes hacking?

  • Computer fraud is the legal term for a large part ofwhat most consider hacking. Another form of hacking is the illegal seizure and unathorized use of credit card numbers.

Cases that have helped to shape the law

  • Kevin Mitnick was arrested for stealing credit card numbers and for gaining illegal entry into numerous systems via the internet.
    • Arrested at 1:30 a.m., February 15, 1995, in Raleigh, N.C.
    • Eluded the F.B.I. for three years.
    • He was charged with everything from the theft of more than 20,000 credit card numbers to the illegal entry into numerous computer networks. Oddly enough, the court could not prove that Mitnick ever actually used any of the stolen credit card numbers.
    • He was caught by Tsutomu Shimomura , a computer security expert and senior research fellow at the San Diego Supercomputer Center.
    • Lots of ethical questions are raised by the financial fallout of Mitnick's demise.
      • Mitnick undoubtedly violated the law by illegally acquiring those credit card numbers.
      • Was the method of his capture legal, though? They captured Mitnick using wiretaps, and by "hunting" him down on the internet. Tsutomu even admits to "baiting" Mitnick with tempting software in a few instances to draw h im out into the open.
      • Could this be considered entrapment? Mistrials have been called for less.

  • Ed Cummings was the first person in the United States to be imprisoned for possession of a red box.
    • The charges
      • The grand jury charged that he "knowingly and with intent to defraud did possess and have custody and control of a telecommunications instrument, that had been modified and altered to obtain unauthorized use of telecommunicatio n services through the use of public telephones" on or about March 13 and 15 of 1995.
      • He was also charged with "being in possession of hardware and software used for altering and modifying telecommunications instruments to obtain unauthorized access to telecommunications service."
    • Is it ethical to sell the components, if someone can be jailed for amassing them into one single object? Welcome to Radio Shack.
    • Where in the world could he have obtained information regarding a tone dialer ?
    • He was sentenced to seven months in federal prison, but was released three days later so that he could attend a hearing on whether or not he violated his probation.
    • The violation in question was his supposed removal of batteries from the tone-dialer when the police arrived.
    • The hearing was postponed many times, but finally took place on a day when the weather was so bad his lawyer could not show up.
      • Was the judge ethically justified in discarding Cummings' right to a fair trial?
    • The judge refused to let Cummings speak and said that he had definitely violated probation, ordering him to be held on $250,000 bail, to be sentenced within 60 days.
    • He was sentenced 6 to 24 months in prison plus a $3,000 fine.

  • Craig Neidorf , an employee of Bellsouth, was arrested for distributing information that was thought to have been illegally obtained from the comp any.
    • A pre-law student at the University of Missouri and the editor of Phrack Magazine, was questioned first at home, then had his house searched, a nd then was called in for questioning by the U.S. Attorney's Office in Chicago in 1990 in which he complied willingly.
    • On February 1, 1990 Neidorf was indicted by a grand jury on six counts including wire fraud, computer fraud, and transportation of stolen property greater than $5,000.
    • The trial began on July 23, 1990 in Chicago's District Court for the Northern District of Illinois, in which the prosecution withheld witnesses, one Secret Service agent, a friend of Neidorf's and alleged co-conspirator, and many of Ne idorf's fellow employees at Bellsouth.
    • He was found in possession of a file detailing an enhanced 911 system belonging to Bellsouth (regarded as hacking instructions), a T rojan Horse program, and an announcement in his magazine regarding "The Phoenix Project" (an elite bulletin board), which included a statement regarding the freedom of knowledge.
    • The articles were proven harmless. The Trojan Horse Login program belonged to him and was never used. Finally, the Phoenix Project was observed and regarded to be insignificant.
    • A mistrial was declared, but Neidorf was left with a $100,000 court bill.
    • Should the court be ethically obligated to compensate Neidorf for his trouble?

  • Steve Jackson Games
    • On the morning of March 1, armed Secret Service agents and Austin police occupied the offices of Steve Jackson Games and began a search for computer equipment. The house of Loyd Blankenship, the writer of GURPS Cyberpunk, was also rai ded.
    • Four computes, two laser printers, some loose hard disks, and a great deal of assorted hardware were seized .
    • The only computers taken were those with GURPS Cyberpunk files. The agents cut locks, forced footlockers, and tore up boxes in their frantic search.
    • It was supposed that GURPS (a soon-to-become famous role-playing game) was to be "a handbook for computer crime." The seized materials were ful l of references to futuristic equipment that didn't exist.
    • The Secret Service kept one company hard disk, all Loyd's personal equipment and files, and the printouts of GURPS Cyberpunk.
    • SJ Games survived the loss only by laying off half its employees.
    • SJ Games received a copy of the Secret Service warrant affidavit on October 21, 1990. The cause for the search was Games' remote association with Neidorf and a few other main-stream computer elitists.
    • The case finally came to trial in early 1993.
    • The Secret Service lost, and S. J. Games was awarded $50,000 in damages, plus over $250,000 in attorney's fees.
    • Be sure to read the article closely. The law states that the Secret Service did not violate any laws by reading any of the mail on the computers, as opposed to anything sent through the United States Postal Service.
    • Should email be given the same status as actual mail? Should the medium make a difference?

In Favor of Hacking

Keep in mind that the ethical debate for hacking stems entirely in the definition of what it is to hack. Everyone realizes it is illegal to take money from a bank via a computer without authorization, but it might not be illegal to "hack" into a system if you do so because you are aware of a security flaw and wish to bring it to the attention of the proper authorities (without malicious intent).The following are sorted by their definitions of hacker:

Advice on Protecting your PC

A skilled hacker will do whatever it takes to break into your computer. Just ask Microsoft. Even a giant software company is not completely safe. The company was hacked by a Trojan-horse program hidden inside an innocent-looking email attachment. The Trojan horse replicated itself throughout Microsoft's internal network and eventually emailed proprietary secrets back to the originator of the Trojan horse. Follow these six steps to protect your computer from being hacked:
  • Don't let other people onto your computer unless you really trust them. A great way to do this is to password-protect your computer.
  • Don't ever open attachments. Avoid Trojan horses and viruses by following this rule. For more information, go here .
  • Turn off file sharing if you don't need it. If a port scan is done on your computer, a hacker may find a back door to your machine and access your files.
  • Use an antivirus program and keep it up to date. For more information, gohere .
  • If you have a constant Internet connection, use a firewall. For more information, go here .
  • Routinely update Windows software. This is extremely important. Updates fix many bugs and known security holes within the Windows operating system


 

 

Download ip scanner


Advanced IP Scanner 2.1 (Free Network Scanning Tool)
Advanced IP Scanner is a free, fast and easy-to-use network scanner for Windows. In a matter of seconds, this utility finds all the computers on your network and provides easy access to their various resources, whether HTTP, HTTPS, FTP or shared folders. With Advanced IP Scanner, you can wake up and shut down remote groups of Windows machines. If you use Radmin remote access software, you will also enjoy the improved Radmin Server detection and integration capabilities, which allow you to connect to any scanned machine with Radmin Server.

Advanced IP Scanner 2.1 - Main Windown
English, 7.5 Mb

http://download1.famatech.com/download/files/ipscan21.exe



download it from above link

To increase speed of firefox browser


Hello friends ....
Today i am post this post for Increase Mozilla FireFox Speed. i hope you all are fine . Today i am going to tell you how can you boost Mozilla firefox browsing speed using speedyfox or how to optimizeFirefox . So Just Follow Some Below Given Steps For Do This.

How To Increase Speed


1. First You Need To Download Speedyfox So Click Here For Download Speedyfox.

2. Now Run It

3. Now Firefox Should Be Closed .
Increase Mozilla FireFox Speed
Increase Mozilla FireFox Speed



4. Now it will run it's process will complete within few seconds and give you sucess Message Like Above Images in 3rd step.





5. That's It Now Just Enjoy Faster Firefox Speed :)

And Please Don't Forget To Share This Post With Your Friends On Social Networking Website Like as Facebook , Twitter etc .

Friday 1 June 2012

Download bearshare music player


This music player is useful to find songs play them on your computer.
http://download.cdn.bearshare.com/r/cdn/0/BearShareV10.exe

Download apache open office


a popular open-source suite, is an immensely powerful set of applications considering the fact that you don't have to dish out a single penny. OpenOffice is very similar to MS Office, and advanced techniques like macros and built-in templates will please advanced users.


OpenOffice


download apache open office from following link:
http://ncu.dl.sourceforge.net/project/openofficeorg.mirror/stable/3.4.0/Apache_OpenOffice_incubating_3.4.0_Win_x86_install_en-US.exe

Download 7-zip for windows 7.


Compressing files has many advantages since they take up less space and are therefore quicker to download from the internet. Featuring a host of compression formats, 7-Zip lets you uncompress almost any compressed data, and with the unique 7z format, files can be compressed up to 40% smaller than Zip formats.

7Zip
Download 7-zip by using following link:
http://nchc.dl.sourceforge.net/project/sevenzip/7-Zip/4.65/7z465.exe

Recuva is a freeware app that recovers files that have been accidentally deleted from the Recycle Bin, MP3 Players and memory cards, claiming to recover files that have also been corrupted by viruses or damaged disks. The slick Recuva Wizard at Startup appeals to both amateurs and professionals, and with no price tag, it can be priceless when you find those important photos or documents.

Recuva
download recuva from following link:
http://fs36.filehippo.com/2074/4c939ce84b554a8f9ae70b1ccc1aa228/rcsetup132.exe

Download adobe reader.


Next steps

1.
When File Download dialog box appears, click Run. Security scan will run automatically.


2.
When User Account Control dialog box appears, click Yes.


download adobe reader 10 for your computer.
By using following link:
http://aihdownload.adobe.com/bin/install_reader10_en_gtbd_aih.exe
comment if you like and enjoy.



Download vlc player for windows 7


VLC MEDIA PLAYER - Basic video effects
  • VLC MEDIA PLAYER - Subtitles
  • VLC MEDIA PLAYER - Main interface
  • VLC MEDIA PLAYER - Right-click options
  • VLC MEDIA PLAYER - Interface options
  • VLC MEDIA PLAYER - Video zoom options
  • VLC MEDIA PLAYER - Playback options
  • VLC MEDIA PLAYER - Basic media menu
  • VLC MEDIA PLAYER - Subtitle settings
  • Download rockmelt browser.



    Download rockmelt browser for your computer's fast bowsing.
    http://dl.rockmelt.com/static/dls/installers/win/stable/1.2.189.1/RockMeltSetup.exe




    comment if you like enjoy.


    http://www.youtubedownloadersite.com/installers/YTDSetup.exe
    By using this link you can get you tube downloader to download you tube videos
    20 user reviews