Sunday, December 19, 2010

How to make your Desktop Icons Transparent

Go to ontrol Panel > System, > Advanced > Performance area > Settings button Visual Effects tab "Use drop shadows for icon labels on the Desktop"

How To Change windows xp boot screen[EASY WAY]

BootSkin

Stardock BootSkin is a program that allows users to change their Windows XP boot screens.

Unlike other programs that can change the Windows XP boot screens, BootSkin does so in a safe manner. It doesn’t patch the Windows XP kernel. Nor does it require the user to download replacement Windows XP kernels to do so.

Boot screens that use BootSkin are typically under 20K compared to other boot screen programs whose files are over 2 MEGABYTES.

See dis for more details

http://www.stardock.com/products/bootskin/

HOW TO SPEED UP FIREFOX

First downlad- firefox 3.0
*Open Firefox, and type about:config in the address bar. Don’t worry about the warning that comes out.
*Use the filter above to find network.http.pipelining and set it to True by double clicking on it.
*Create a new boolean value named network.http.pipelining.firstrequest and set that to True, as we
*Find network.http.pipelining.maxrequests, double click on it, and change its value to 8.
*Now look for network.http.proxy.pipelining and again set it to True.
*Create two new integers named nglayout.initialpaint.delay and content.notify.interval, setting them to 0.
*Now restart your browser and check a few heavy-loading websites to see if those changes worked or not...
IT WORKED GR8 for me

Send SMS Text Messages from Your Computer to Any Mobile Phone !

With Microsoft Outlook 2007, you can easily send (or receive) SMS text messages from computer to any mobile phone – just write a new SMS text message (like the way you compose emails in Outlook) and hit Send.

Similarly, you can also forward emails, pending tasks and calendar items from Outlook to your mobile phone via SMS.

How to send SMS text messages from computer using Outlook 2007 ?

To SMS enable your copy of Microsoft Outlook 2007, first register your mobile phone number at SMSOfficer. This new service from Microsoft supports almost all cellular operators in US and other international countries including India

.

You will soon get an SMS verification code on your mobile phone, confirm and the SMS feature is activated in your Outlook without you having to download any additional software – you will need to click on a configuration link which sets the entire configuration for you.

Forward Emails as SMS Text Messages
sms via email forward

To compose an SMS message in Outlook, select New -> Text Message. Outlook is automatically set up to use the standard text message limit of 160 characters. If your message exceeds the 160 character limit, the extra characters are truncated and delivered as a separate text message.

There are no registration charges and you also get 10 SMS credits for free at the time of joining SMS Officer. Once you exhaust the free limit, you need to pay for using the Outlook SMS service – payment can be made via PayPal.

When the other person replies to your SMS message, it will arrive in your mobile phone. Am not sure if you can use Outlook 2007 to send bulk SMS messages – i.e., one SMS message addressed to multiple recipeints.

How to Format Your PC

(Formatting a PC is to delete all the data that currently is on your Computer and upgrade it to a newer version of an operating system or install the same operating system once again on the same computer.)

A virus has intruded in your PC or you want to upgrade from your older versions of Windows, you will have to format your PC. Formatting your PC can sometimes be a very tough process if you do not have the proper knowledge.

There are many benefits of formatting such as: Faster Computer No Virus etc.

But there are some disadvantages too: You lose all your data You have to install all your favourite software once again.

Now, lets start the process of formatting a PC.

First of all, you will need a bootable disk of WINDOWS XP to boot your computer from the disk. Warning -- Please backup all your data before you format your PC.

The process of formatting is as follows:

1. Insert the WINDOWS XP bootable disk in the CD drive.

2. Restart your PC (if it was already running).

3. Press enter when the monitor reads PRESS ANY KEY.

4. Now comes the time to partition your drives.

5. If you want to delete any partition, press D or L(whichever is displayed on the screen).

6. Afterwards format the drive you want to install the operating system (XP) in.

7. Press ENTER.

8. The formatting will start.

9. Follow the procedures. 10.It should take around 40 minutes for the installation to finish. 11.Use windows(HAVE A GOOD TIME).

Learn Phishing guide

What are Phisher ?


n the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail or instant messaging,[1] and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Even when using server authentication, it may require tremendous skill to detect that the website is fake. Phishing is an example of social engineering techniques used to fool users,[2] and exploits the poor usability of current web security technologies.[3] Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.

This pack includes:

AnonymousMailer

What does it do ?

Well, you put any email address you want(even fake email addresses) and put the email address of the person you wanna bomb and how many time you wanna send the email.

When I run it the second time, I get an error file saying Run-time '75': Path/file access error. What should I do ?

You just need to press: Alt+Ctrl+Delete and go to the "Processes tab and end the process "lfdda2.exe".

How can I assure that it's virus free and it's working
http://www.viruschief.com/report.html?report_id=a3d849bfa10d8554795a160e6000e00a96bd37f4

But what do we fill in for the SMTP server column ?

When you send the spam using the program it sends it off of a companys server, thats what an SMTP server is. If you were to spam a huge, popular business from your IP directly they would know its you. You use an SMTP server of a big company so you don't get in trouble, sort of like a proxy. That's kinda how it works.

Anyway, here is a list of them, choose any of the servers on the right: http://www.e-eeasy.com/SMTPServerList.aspx

Phisher Maker - Make Phisher for any website !

For more help check out this link Phisher Maker

Jiffy Gmail Account Creator - Create Gmal accounts for setting up hosting accounts etc.

Tarantula - A Powerful software to extract e-mail addresses matching your keyword query

RapidExtract -It is a tool that checks EMAIL:PASSWORD lists, for rapidshare accounts, if the email has a rapidshare account it then sends the login to the email. Then you can login to the email (most people use same pass for everything) and obtain the rapidshare account.

IP Hider Pack - Hide your Ip usiing this software !

It also includes a number of Phishers such as

Steam Phiser
Rapidshare Phiser
Friendster Phiser
Gmail Phisher
Habbo Phisher
Facebook Phisher
Photobucket Phisher
XboxLive Phisher
AIM Phisher
GaiaOnline Phisher
IMVU Phisher
AstaTalk Phisher
Warez-bb Phisher
Hotmail Phisher
Runescape Phisher
Youtube Phisher

and many many more.

Create files with no name

This trick will allow you to create files and folders without any name.

Just follow the steps as given below :-

1) Select any file or folder.

2) Right click on it, select 'Rename' or simply press 'F2'.

3) Press and hold the 'Alt' key. While holding the Alt key, type numbers '0160' from the numpad.

Note :- Type the numbers '0160' from the numpad, that is, the numbers present on the right side of the keyboard.
Don’t type the numbers which are present on top of the character keys.

4) Press Enter and the nameless file or folder will be created.

Reason :- The file or folder that seems nameless is actually named with a single space.

But what if you want to create another nameless file or folder in the same directory ?
For this you will have to rename the file with 2 spaces.
Just follow the steps given below :-

1) Select file, Press 'F2'.

2) Hold 'Alt' key and type '0160' from the numpad.

3) Release the 'Alt' key. Now without doing anything else, again hold 'Alt' key and type '0160'.

4) Press 'Enter' and you will have second nameless file in the same directory.

5) Repeat step 3 to create as many nameless files or folders in the same directory.

(We have a problem with deleting these folders, to do so, start your computer in 'Safe Mode' and delete it from there.)

How to play games without cd.

*GO to http://www.cracks.vg/
*Download no cd crack of your respective game
*copy .exe file from the downloaded file
*Paste it in the game folder

Saturday, December 18, 2010

How to Operate Mouse Pointer Without Mouse (Magic)

You have Mouse Problem ?? No Problem

I will give you suggestion

Press Left Alt + Left Shift + Num Lock Button + Ok

with the help of Numeric Keypad e.g ( Press and Hold the following Keys )

7 8 9

4 6

1 2 3


For Normal Click Press 5

Default
Left Alt + Left Shift + Num Lock

How to Make a Trojan Horse

Most of you may be curious to know about how to make a Trojan or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you how to make a simple Trojan on your own using C programming language. This Trojan when executed will eat up the hard disk space on the root drive (The drive on which Windows is installed, usually C: Drive) of the computer on which it is run. Also this Trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run. So, I’ll call this as Space Eater Trojan. Since this Trojan is written using a high level programming language it is often undetected by antivirus. The source code for this Trojan is available for download at the end of this post. Let’s see how this Trojan works…

Before I move to explain the features of this Trojan you need to know what exactly is a Trojan horse and how it works. As most of us think a Trojan or a Trojan horse is not a virus. In simple words a Trojan horse is a program that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine or create a damage to the computer.

Now lets move to the working of our Trojan

The Trojan horse which I have made appears itself as an antivirus program that scans the computer and removes the threats. But in reality it does nothing but occupy the hard disk space on the root drive by just filling it up with a huge junk file. The rate at which it fills up the hard disk space it too high. As a result the the disk gets filled up to 100% with in minutes of running this Trojan. Once the disk space is full, the Trojan reports that the scan is complete. The victim will not be able to clean up the hard disk space using any cleanup program. This is because the Trojan intelligently creates a huge file in the WindowsSystem32 folder with the .dll extension. Since the junk file has the .dll extention it is often ignored by disk cleanup softwares. So for the victim, there is now way to recover the hard disk space unless reformatting his drive.

The algorithm of the Trojan is as follows

1. Search for the root drive

2. Navigate to WindowsSystem32 on the root drive

3. Create the file named “spceshot.dll

4. Start dumping the junk data onto the above file and keep increasing it’s size until the drive is full

5. Once the drive is full, stop the process.

You can download the Trojan source code HERE. Please note that I have not included the executabe for security reasons. You need to compile it to obtain the executable.

Copy or Move Files Faster

With TeraCopy Pro 1.22 you can--

  • Copy files faster. TeraCopy uses dynamically adjusted buffers to reduce seek times. Asynchronous copy speeds up file transfer between two physical hard drives.
  • Pause and resume file transfers. Pause copy process at any time to free up system resources and continue with a single click.
  • Error recovery. In case of copy error, TeraCopy will try several times and in the worse case just skips the file, not terminating the entire transfer.
  • Interactive file list. TeraCopy shows failed file transfers and lets you fix the problem and recopy only problem files.
  • Shell integration. TeraCopy can completely replace Explorer copy and move functions, allowing you work with files as usual.
  • 64-bit OS support. Shell integration works in both 32-bit and 64-bit versions of XP

Download

Password- www.thewarezworld.com

Spy on Any Cell Phone

Spy Phone GOLD – The #1 Cell Phone Spy Software

Download Spy Phone GOLD software directly onto your mobile phone and receive copies of SMS, Call Logs, Emails, Locations and also listen to live conversations on the target cell phone within minutes. Spy Phone GOLD is the best Cell Phone Spy software of it’s kind. Beware of counterfeit spy softwares on the market, buy original and genuine cell phone spy software from SpyEra.
Spy Phone GOLD Top Features:
  • Call Interception – Listen to the actual calls LIVE on the target cell phone
  • Environment Listening – Make a spy call to the target phone running SPY PHONE and listen in to the phone’s surroundings.
  • SMS Logging – Records both incoming & outgoing SMS
  • SIM Change Notification – Get instant notification via SMS when the target cell phone changes it’s SIM
  • Remote Control – Send secret SMS to the target phone to control all functions
  • Spy from any location accross the world
  • 100% Undetectable
Spy Phone GOLD is the only cell phone spy software to offer a wide range of features which is 100% undetectable.
How it Works?
The working of Spy Phone GOLD is very simple and needs no extra knowledge to install and use.
Step 1- After you purchase Spy Phone GOLD, you can directly download the spy software onto the target cell phone and installation takes only a few minutes (Approx. 10 Min). No More physical access to the cell phone is required after installation!
Step 2- After installation, SPY Phone secretly records events that happen on the target phone and delivers this information to a web account, where you can view these reports 24×7 from any Internet enabled computer or mobile phone.
Compatible Cell Phones
Spy Phone is fully compatible with the following mobile phones
  1. BlackBerry Phones
  2. Android Phones
  3. Apple iPhones
  4. Windows Mobile Phones
  5. Symbian OS 9.x and 8.x phones

Spy on Any Cell Phone

Spy Phone GOLD – The #1 Cell Phone Spy Software

Download Spy Phone GOLD software directly onto your mobile phone and receive copies of SMS, Call Logs, Emails, Locations and also listen to live conversations on the target cell phone within minutes. Spy Phone GOLD is the best Cell Phone Spy software of it’s kind. Beware of counterfeit spy softwares on the market, buy original and genuine cell phone spy software from SpyEra.
Spy Phone GOLD Top Features:
  • Call Interception – Listen to the actual calls LIVE on the target cell phone
  • Environment Listening – Make a spy call to the target phone running SPY PHONE and listen in to the phone’s surroundings.
  • SMS Logging – Records both incoming & outgoing SMS
  • SIM Change Notification – Get instant notification via SMS when the target cell phone changes it’s SIM
  • Remote Control – Send secret SMS to the target phone to control all functions
  • Spy from any location accross the world
  • 100% Undetectable
Spy Phone GOLD is the only cell phone spy software to offer a wide range of features which is 100% undetectable.
How it Works?
The working of Spy Phone GOLD is very simple and needs no extra knowledge to install and use.
Step 1- After you purchase Spy Phone GOLD, you can directly download the spy software onto the target cell phone and installation takes only a few minutes (Approx. 10 Min). No More physical access to the cell phone is required after installation!
Step 2- After installation, SPY Phone secretly records events that happen on the target phone and delivers this information to a web account, where you can view these reports 24×7 from any Internet enabled computer or mobile phone.
Compatible Cell Phones
Spy Phone is fully compatible with the following mobile phones
  1. BlackBerry Phones
  2. Android Phones
  3. Apple iPhones
  4. Windows Mobile Phones
  5. Symbian OS 9.x and 8.x phones

How to Find the IP Address of a Remote Computer

I have created a PHP script to make it easier for you to find the IP address of the remote computer of your choice. Here is a step-by-step process to find out the IP address.
1. Download the IP Finder script(IP_Finder.ZIP) that I have created.
2. Open a new account in X10Hosting (or any free host that supports PHP).
3. Extract the IP_Finder.ZIP file and upload the two files ip.php and ip_log.txt into the root folder of your hosting account using the File Manager.
4. You can rename the ip.php to any name of your choice.
5. Set the permission to 777 on ip_log.txt.
Now you are all set to find the IP address of your friend or any remote computer of your choice. All you have to do is send the link of ip.php to your friend or the person with whom you’re chatting. Once the person click’s on the link, his/her IP address is recorded in the fileip_log.txt.
For your better understanding let’s take up the following example.
Suppose you open a new account in X10hosting.com with the subdomain as abc, then your IP Finder link would be
http://abc.x10hosting.com/ip.php
You have to send the above link to you friend via email or while chatting and ask him to visit that link. Once your friend clicks on the link, his IP address will be recorded along with the Date and Time in the ip_log.txt file. After recording the IP address, the script will redirect the person to google.com so as to avoid any suspicion.
To find the recorded IP address check the logs using the following link.
http://abc.x10hosting.com/ip_log.php
The sample log will be in the following format
79.92.144.237 Thursday 07th of May 2009 05:31:27 PM
59.45.144.237 Thursday 07th of May 2009 05:31:28 PM
123.92.144.237 Thursday 07th of May 2009 05:31:31 PM
NOTE: You have to replace abc with your subdomain name.

Thursday, December 2, 2010

Earn more money

I have something interesting for you - you can easily earn regular income online via PaisaPay.in!

It’s really amazing! You get paid to open & read the contents of PaisaPay mails. You also receive special discount coupons, promotions and free passes to various events in your city.

Join now and get Rs. 99 instantly, just for joining. What more, as a special bonus you get paid for inviting your friends also!

Create your PaisaPay Account & refer your friends to earn launch referral bonus on every new registration.

http://www.paisapay.in/register.asp?179913-8552694