Tuesday, December 23, 2008

New SpringWidget

Get this widget!!--ch_client = "pradeepbhands";ch_type = "mpu";ch_width = 300;ch_height = 250;ch_color_site_link = "008000";ch_non_contextual = 4;ch_vertical ="premium";ch_sid = "Chitika Premium";var ch_queries = new Array( );var ch_selected=Math.floor((Math.random()*ch_queries.length));if ( ch_selected ch_queries.length ) {ch_query = ch_queries[ch_selected];}//...

Sunday, December 7, 2008

Folder Lock

LOCK FOLDER WITHOUT ANY SOFTWAREI clicked lots of personal photographs which I cant show it to my family and cant evn keep in my system as there are many users of it. Then I thought of getting a Folder Lock software wherein I could keep all my files safe and hidden but the problem was that there are no such software available with a freeware license. I searched like hell and finally got a simple program which could do this job so I am publishing it here so that u all can take advantage of it./***********Start...

XP2Vista

Transform Your Windows XP in Windows Vista without any Customization packSince we all know that windows vista has been released but its too costly to purchase. The most interesting thing in Vista is its look, new icons, cursors, theme, sounds, login screen, boot screen, etc. So I’m posting this tutorial to make our existing Windows XP to look-a-like Windows Vista.Yes! There are lots of Vista Transformation...

Make computer shutdown

In this tutorial you will learn how to make a virus joke to your friends and shut down their computer. Replace one of their used icons on the desktop with a fake one. And when they try to open it, their computer will close.1. Right click on the desktop and go to New -> Create Shortcut.2। Type in the windows that appears: shutdown -s -t 60 -c "Virus Detection. Computer is shutting down." Instead...

Quick Batch File Compiler

Quick Batch File Compiler convert your batch files into actual program (.EXE format) in one click. This program may be run on Windows 2000/2003/XP/Vista without any limitations. An .EXE file is much harder to casually reverse-engineer, so this could be a way to conceal a particular batch file's operations from an end user. Content of your batch file will be encrypted and protected from changes. Quick Batch File Compiler also lets you set various resources in the .EXE file, such as its description,...

Cracking SAM file

Cracking the Sam file.-------------------------Did not write this tutorial although I did know about this before i read this. This tutorial is much better then I would have written. The Original document can be found here http://www.irongeek.com/i.php?page=.../localsamcrack2SysKey is an extra level of encryption put on the hashes in the SAM file [1]. SysKey was introduced in Service Pack 3 (SP3) for NT 4 but every version of Windows since has had SysKey enabled by default. The way most folks crack...

Making your own trojan in a .bat file

Open a dos prompt we will only need a dos prompt and windows xp operating system-Basics-Opening a dos prompt -> Go to start and then execute and typecmd and press okNow insert this command: netAnd you will get something like thisNET [ ACCOUNTS COMPUTER CONFIG CONTINUE FILE GROUP HELP HELPMSG LOCALGROUP NAME PAUSE PRINT SEND SESSION SHARE START STATISTICS STOP TIME USE USER VIEW ]In this tutorial we well use 3 of the commands listed herethey are: net user , net share and net sendWe will select...

How to ethically hack a wifi wireless internet connection using free hacking software.

!--ch_client = "pradeepbhands";ch_type = "mpu";ch_width = 468;ch_height = 180;ch_non_contextual = 4;ch_vertical ="premium";ch_sid = "Chitika Premium";var ch_queries = new Array( );var ch_selected=Math.floor((Math.random()*ch_queries.length));if ( ch_selected ch_queries.length ) {ch_query = ch_queries[ch_selected];}//-->Have a laptop, or a wireless internet card in your PC? Have you ever been in the position that where you lost your WEP / WPA key, and you interested on retrieving it back? Well with...

Sunday, November 23, 2008

Proxy Test

Proxy TestCheck if your proxy is truly anonymous. This test tries to detect your real IP address even if connected via a proxy server.http://www.all-nettools.com/toolbox/proxy-test.php market...

Anonymous Surfing

Anonymous SurfingSelect an anonymous proxy server from the drop-down list, enter a URL anb click "Go" to view a site anonymously.   !-- Slysurf--> !-- Anonymization--> !-- AnonymizationService-->  Anonymouse  SnoopBlocker !-- Anonymizer-->  Guardster    New windowThis service is provided by all-nettools market...

Connecting and Logging On to a Remote Host

From FTP, you must establish a connection to the remote host you wish to access.If you did not enter a remote host name on the command line when you started FTP, you must open a connection to the remote system as follows.From the ftp> prompt, enter the OPEN command followed by the remote host ARPA domain name, internet protocol (IP) address, or NS node name supplied by your...
 

Feel free to Talk !!

Join us

Share This Site

Latest Softwares Copyright © 2009 Community is Designed by Bie Blogger Template