How to Push to Talk Blackberry Curve 8350i from Sprint ?

>> Tuesday, October 27, 2009


Our friends at Sprint are trying everything they can think of to hold on to what customers that they have.  If you remember Sprint bought Nextel and the main feature that kept people coming back to Nextel were the ruggedized cell phones and the push to talk walkie talkie features that were offered on many of the phones.  Now we have Sprint trying to incorporate those same features into the Blackberry Curve 8350i.  But is a construction worker looking for a push to talk blackberry? Hard to say.                   {.......}

Read more...

How to Unblock Websites Where these are Blocked?


Unblock Websites at Work or SchoolEveryone is trying to unblock websites like Myspace.com or Facebook.com since so many jobs are blocking those sites. Unfortunately you will find that most jobs and schools will block the latest sites that prevent censorship.  One website has begun to use a new method for unblocking websites by hosting a decentralized network that allows multiple people to host nodes that others can use as proxies from inside of their browsers and then get around the censorship that your school or job might be forcing on you.                        {.......}

Read more...

How to Revenue Sharing Hack To Display Different Authers Ads ?

>> Monday, October 26, 2009

How to show different ads on different author posts in Blogger? Unlike Wordpress, Blogger does not support any plugins and as a result you can’t share the revenue with your fellow authors using third party plugins. But do note that Blogger is highly customizable and certainly you can do anything if you have got some basic PHP and HTML knowledge. If you are a group of authors working on a blogger blog, posting separately and want to show individual ads on your posts, you can do so by applying blogger revenue sharing hack.
You can provide different ad codes for different authors and this hack will automatically display the ad linked with those authors. This hack can be implemented on any part of the blog, below the post title, below the post contents, navbar, footer area etc. But here is the tutorial to show revenue sharing ads below post title, which is known to be the best ad placement for blogger blogs.          {.......}



Read more...

Hackings Tricks to Hack Computers Emails and Websites

hacking bookHacking can be used for both defense and offense, which means that you can use hacking in both constructive and destructive ways. You need to know hacking tricks if you want to protect yourself, your computer, email address or websites from evil eyes. There are many e-books and tutorials available on hacking, but none of them reveal the actual hacking methods. Since many people might have been wanting a hacking toolkit that explains the A ti Z ethics of hacking, I planned to come up with a post on hacking tricks.
         From the very beginning I want to mention that this is not for those people who want to use it illegally, but for those people who wear a white cap and want to know the ethics of hacking just to keep the things safe and better.
The Secrets of Hacking, has been published by an Indian Government certified security company which covers all latest tips and tricks on hacking. You can find a lots of valuable security measures that every computer user, website owner or email address owner should follow.                             {.......}



Read more...

Hack GPRS For Free ! Latest Ideas

>> Tuesday, October 20, 2009

        Here is the free idea gprs trick working as on august 2009, To activate this GPRS hack trick you have to follow these steps, but before that you must assure the following,


{please suscribe to this 
blog to get more cool tricks)

* YOU MUST NOT HAVE ACTIVE DIALLER TONE ! !!!!


* YOU MUST NOT HAVE ANY ACTIVE PLANS OF GPRS/INTERNET !!!!


* YOU MUST HAVE PREPAID CONNECTION !( USING OF THIS TRICK IN POST PAID WILL LEAD TO YOU HIGHER AMOUNT OF BILL )


* YOU MUST HAVE TO USE S60 DEVICES (IF USING NOKIA ) OR HIGHER....NEVER USE THIS TRICK FOR THE S40 DEVICES(FOR CERTAIN S40 DEVICE THIS TRICK WORKS)


* THIS TRICK HAS BEEN TESTED SUCCESSFULLY IN NOKIA AND SONY ERICSSON DEVICES !


The Actual Procedure is as Follows :                               {.......}






Read more...

GET YOUR NEW KASPERSKY ANTIVIRUS 2009 KEYS !



How To Use This Guide:

1)Install "Kaspersky Internet Security 2009 or any other "


2)Choose A Key From KIS_7,KIS_8,KIS_9[KIS2010],KAV_7,KAV_8,KAV_9[KIS2010](Choose KIS_8 for Kaspersky Internet Security 2009, for example).


3)Copy The Key And Paste It On Your Desktop or (Or Where Ever You Want)




4)Open Kaspersky And Click: License > Merge/delete > "Delete Key" [If You Already


Have A Key Installed] > Activate Using The Key File u downloaded> Browse [Browse For Your]




Read more...

How to Increase the speed of your internet connection ?


As more and more people get quick connections to the internet, such as cable or ADSL, it becomes apparent to the user of a simple dial-up modem that the World Wide Web can quickly turn into the World Wide Wait.  Here a trick that can help speed up your current modem without shelling out the big bucks.







             There is a setting located in your windows registry called the Maximum Transfer Unit (MTU).  This determines the size of the packets of data sent between your and your server.  In Windows 95, this setting is has a value of 1,500 bytes when the actual size of internet packets is 1,000 bytes.  This can sometimes slow things down.  To remedy the situation, simply follow these steps:
                                                                                              {.......}       

Read more...

How to Get Back Folder Missing Options

>> Saturday, October 17, 2009

Open Run and then type "gpedit.msc".
Now goto User Configuration > Administrative templates > Windows Component > Windows Explorer.
Click on Windows Explorer you will find the 3rd option on the right side of screen "Removes the Folder Option menu item from the Tools menu"
Just check it, if it is not configured then change it to enable by double clicking on it and after applying again set it to not configured.

I hopes that you will find the option after restarting windows.     






Read more...

How to Unlock iphone on version







iphone-verizon-logoApple’s iPhone is the latest craze in town due to its sophisticated features and Internet connectivity.  It’s an all-in-one package that  includes voice, text, wireless Internet, and iPod features.  Who wouldn’t want to own a gadget like that?  I certainly would love to have it!  The catch though is that you’ll need to get it bundled with AT&T’s mobile plans.  That means even if your phone provider is another company, you’ll need to have it connected to AT&T if you want to maximize the product’s features.  The AT&T mobile plans are not bad because the user gets to have all phone services while having free Internet access for a certain amount of monthly subscription.  The only thing with AT&T is that its services are quite expensive and some people have complained about bad customer service.                     {.......}

Read more...

How to Hack window Genuine?

>> Friday, October 16, 2009


Windows Genuine Hack :-
1) Download “Windows.Genuine.Advantage.Validation..rar”
2) Extract It.
3) Run “installer.bat” file.
4) Reboot.
5) Enjoy Your Validated Windows.
windows genuine{.......}

Read more...

How to get free GPRS on Vodafone


This method has been tested on different mobiles and has been confirmed to be working.
Followng are the Settings you require to configure on your Mobile:
Account Name: Vodafone_gprs
Homepage: http://live.vodafone.in
User Name: (no need)
Pass: (no need)
Access Point Settings :-
Proxy: Enabled                           {.......}

Read more...

How to chat through ms dos command prompt


1) All you need is your friend's IP Address and your Command Prompt.

2) Open Notepad and write this code as it is.....!


@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A

3) Now save this as "Messenger.Bat".

4) Open Command Prompt.

5) Drag this file (.bat file) over to Command Prompt and press Enter.

6) You would then see something like this:
{.......}

Read more...

Get Free Download Windows XP Pro SP3 Full Untouched Unanttended GENUINE

>> Thursday, October 15, 2009


Today's post is Windows XP Pro SP3 Full Untouched Unanttended GENUINE.This copy of the window is m using from last 6 months there is no problem no error no crash.That's why i think to upload this window for mine visitor's.Download and enjoy it.

Windows XP Service Pack 3 (SP3) build 5512 was released to manufacturing on April 21, 2008, and Microsoft planned to make it available to the general public on April 29, 2008 via Windows Update and the Microsoft Download Center. However, due to a compatibility issue with Microsoft Dynamics Retail Management System, the release of Windows XP Service Pack 3 was delayed. A feature set overview has been posted by Microsoft and details new features available separately as standalone updates to Windows XP, as well as features backported from Windows Vista,                {.......}


Read more...

Learn About Google Hacking!

>> Sunday, October 11, 2009




Google is a powerful search engine that hackers often use it to find passwords, and confidential or sensitive documents that companies do not realize are even available to the public. Most computer people use Google, but do not know how to use all of its search parameters. The term "google hacking" is a method used by unscrupulous people to not only uncovers sensitive data, but also to expose web server vulnerabilities. Here I list several Google search parameters and examples.       {.......}

Read more...

Why we meet with a lot of viruses?




VirusesIt is interesting, with all the training and knowledge necessary in becoming an IT professional, the number one question I receive is; "Why do people make viruses?" This always makes me wonder if FBI profilers are ever asked; "Why does my computer have so many pop-up ads?" And of course, computer people often ask each other: "Why do people think they need more memory with their hard drive is full? And why do they call their computer case a modem?" These are all important questions, but only one of them I am qualified to answer. I still try to answer the other to the best of my knowledge. Unfortunately, the best of my knowledge is very, very, unpleasant.               {.......}

Read more...

Get Installed VMware Server 2 On An Ubuntu 8.04 Desktop

Version 1.0
Author: Falko Timme
VMwareThis tutorial provides step-by-step instructions on how to install VMware Server 2 on an Ubuntu 8.04 desktop system. With VMware Server you can create and run guest operating systems ("virtual machines") such as Linux, Windows, FreeBSD, etc. under a host operating system. This has the benefit that you can run multiple operating systems on the same hardware which saves a lot of money, and you can move virtual machines from one VMware Server to the next one (or to a system that has the VMware Player which is also free).
Also, with VMware Server you can let your old Windows desktop (that you previously converted into a VMware virtual machine with VMware Converter, as described in this tutorial: http://www.howtoforge.com/vmware_converter_windows_linux) run under your Ubuntu desktop. This can be useful if you depend on some applications that exist for Windows only, or if you want to switch to Linux slowly.
I want to say first that this is not the only way of setting up such a system. There are many ways of achieving this goal but this is the way I take. I do not issue any guarantee that this will work for you!        {.......}

Read more...

What are the Best Tools for Virus Removal


Virus Removal Tools
As a network administrator, helpdesk tech, or other computer professional, you don't remove that many viruses. Most company networks are secure enough that viruses are not really an issue. The issue is when friends, family and people from work get viruses in their home computers. There are so many request for virus removal that it is easy to be desensitized. I am as guilty as anyone when someone asks for help and I tell them they should take their computer to the Geek Squad, or Nerd Herd. There are literary thousands of viruses, and unless you are a professional virus expert it is impossible to keep up with all the removals. So, listed below are some popular virus removal tools and programs.
Some viruses are so specialized that you must first discover the virus you have before you can remove it. There are many no-cost online virus checkers. Listed here are but a few to help isolated the infection:  {.......}

Read more...

Get a Free Flash Application Security Scanner - SWFScan

HP SWFScan is a free tool developed by HP Web Security Research Group, which will automatically find security vulnerabilities in applications built on the Flash platform




HP is offering SWFScan because:
  • Their research shows that developers and increasingly implementing applications built on the Adobe Flash platform without the required security expertise.
  • As a result, they are seeing a proliferation of insecure applications being deployed on the web.
  • A vulnerable application built on the Flash platform widens your website’s attack surface creating more opportunity for malicious hackers.



How SWFScan works and what vulnerabilities it finds:
  • Decompiles applications built on the Adobe Flash platform to extract the ActionScript code and statically analyzes it to identify security issues such as information disclosure.
  • Identifies and reports insecure programming and deployment practices and suggests solutions.                      {.......}


Read more...

How to Secure Website Using Web Security Testing Framework

Websecurify is a web and web2.0 security initiative specializing in researching security issues and building the next generation of tools to defeat and protect web technologies.
Key Features

  1. JavaScript – Websecurify Security Testing Framework is the first tool of its kind to be written entirely in JavaScript using only standard technologies adopted by the leading browsers.
  2. Multiple Environments – The core technology can run in normal browsers, xulrunner, xpcshell (command line), inside Java or as part of a custom V8 (Chrome’s JavaScript Engine) build. The core is written with extensibility in mind so that more environments can be supported without changing even a single line of code.
  3. Multi-platform – The tool is available and successfully runs on Windows, Mac OS, Linux and other operating systems.
  4. Automatic Updates – Every single piece of the tool is subjected to automatic updates. This means that newer and more advanced versions of the tool can be shipped to your front door without you lifting your finger. This however is completely optional. The automatic update can be turned off if needed.                     {.......}

Read more...

What Hackers Want?




Hacker Want AdsWith so much unemployment, especially in the IT  community it is no wonder you can find, Hired Hackers   online. Panda Security highlights just an example;  Facebook hacking. For $100 you can hack into any  account you wish. These hackers do not guarantee 100% success, but my guess is they are pretty accurate. I haven’t test this hacker group’s claim, and it is very possible that they are a $100 rip-off, but my instincts tell me they can, and they do. This type of hacking makes me wonder if these are unemployed IT people, or foreign criminals. Although, I’m sure unemployment creates opportunist in any country. And frankly speaking, if I were a talented, out of work computer professional with a family to feed, computer ethics would be something for the employed. Of course I’m not condoning illegal acts of computer hacking, I’m just saying.            {.......}


Read more...

A Brief Descriptoin about Scapy

Scapy is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more. It can easily handle most classical tasks like scanning, tracerouting, probing, unit tests, attacks or network discovery (it can replace hping, 85% of nmap, arpspoof, arp-sk, arping, tcpdump, tethereal, p0f, etc.). It also performs very well at a lot of other specific tasks that most other tools can’t handle, like sending invalid frames, injecting your own 802.11 frames, combining technics (VLAN hopping+ARP cache poisoning, VOIP decoding on WEP encrypted channel, …), etc.

What makes Scapy different from most other networking tools
First, with most other tools, you won’t build someting the author did not imagine. These tools have been built for a specific goal and can’t deviate much from it. For example, an ARP cache poisoning program won’t let you use double 802.1q encapsulation. Or try to find a program that can send, say, an ICMP packet with padding (I said padding, not payload, see?). In fact, each time you have a new need, you have to build a new tool.             {......}



Read more...

How to steal Cookie using Surf Jack


A tool which allows one to hijack HTTP connections to steal cookies – even ones on HTTPS sites! Works on both Wifi (monitor mode) and Ethernet.
Features:
  • Does Wireless injection when the NIC is in monitor mode
  • Supports Ethernet
  • Support for WEP (when the NIC is in monitor mode)
Known issues:
  • Sometimes the victim is not redirected correctly (particularly seen when targeting Gmail)
  • Cannot stop the tool via a simple Control^C. This is a problem with the proxy
Requires:
  • Python 2.4
  • Scapy
You can download Surf Jack here:
Or read more here.

Read more...

Introducing To iPhone 3G

>> Saturday, October 10, 2009

Meet the fastest, most powerful iPhone yet. iPhone 3GS features video recording, Voice Control, up to 32GB of storage, and more.
New to iPhone? Find out why you’ll love it

Watch the

Guided Tour




The Fastest iPhone Ever

The first thing you’ll notice about iPhone 3GS is how quickly you can launch applications. Web pages render in a fraction of the time, and you can view email attachments faster. Improved performance and updated 3D graphics deliver an incredible gaming experience, too. In fact, everything you do on iPhone 3GS is up to 2x faster and more responsive than iPhone 3G.        {.......}

Read more...

How to Activate Microsoft Office 2007 Trial version

>> Friday, October 09, 2009


Most suites or programs of Microsoft Office 2007 allows user to evaluate the product. The trial version of 2007 Microsoft Office system can be installed by using a 25-character trial product key available from Microsoft while you download the free Office software, and you can use the Microsoft Office 2007 suite or program with full functionality for 60 days.

You may have the Office 2007 CD and are able to install Office 2007 without entering product key. However, Office 2007 will work in reduced functionality mode, where it’s effectively just a viewer for office documents. Beside, if you forget the trial product key, or don’t wish to register a Windows Live ID to get the trial key, here’s the trick to activate Office 2007, or more correctly, bypass the activation of Office 2007 60 days trial, and making the “trial” word disappear from the Office title at the top and suppress activation and trial expiry prompt.

Read more...

New features of Blackberry! Recover deleted messages

>> Monday, October 05, 2009



Recover deleted messages from Blackberry

We sometimes find ourselves doing things automatically        only to find out later that what we have done is a mistake! At the very least, this is an inconvenience. This could apply to almost anything, especially when a person is multi-tasking. An instance where this could happen is when you’re talking to someone while checking your Blackberry for messages. If you’re deleting a previous message, you could accidentally do the same to a new one thinking that it is old. It wouldn’t matter if the email or text is unimportant. But what if it is a message from your boss or business associate? What will you do? Can you recover the message from somewhere just like in Yahoo or Google mail?

The big and sad answer is that no, the message is forever lost if your phone has not been set up to store deleted messages in a designated location.  That means, once these messages are purged from your smart phone and you have not been able to setup some sort of a backup plan, it will be very unlikely that you could recover them or even from the network provider.





Read more...

Amazing software! Download BearShare Pro 5.3.0.0

>> Friday, October 02, 2009


With BearShare you get:
* 100% clean install, no bundled software.
* Brand new interface.
* Fastest downloads, ever.
* Instant "search suggest" technology.
* Parental controls block access to offensive files.
* Automatic Virus protection.
* Full featured media player with smart organization feature.
* The easiest BearShare ever, with all new bubbles that hint at cool things you can do.
* Instant searches across the entire BearShare network.
File Sharing just got a whole new meaning:
* Share, Discover and Download music and videos.

* View other users' profiles, photos and music library.
* Make new friends and connect with old ones.
* Leave comments about your friends and favorite artists.       {......}

Read more...

Secure your computer with Sophos Anti Virus 7.6.1 R2



This is just the client installer, which requires no serial, crack
or authorisation to download or run. It downloads updates 
hourly when you are connected to the net or you can right 
click on the icon and update manually
Installing Sophos Anti-Virus for Windows
 Minimum Requirements
Operating Systems:
Windows 2000 Professional or Server
Windows XP Professional
Windows XP Home
Windows 2003
Windows Vista
 Disk space: 120 MB
Memory: Minimum 256MB.
 Considerations: If you use any Anti-Virus software
other than Sophos


this installer should uninstall it prior to installing Sophos Anti-Virus. Older versions of Sophos should be uninstalled automatically by this installation.       {......}



Read more...

Easy way to Hack msn passwords!



Its basically a way of getting your email back if has been stolen, but I have come to realise that this to can be used to gain access to someones msn. In other words, who ever sends you a email off a @hotmail, @live or @msn email, you can gain access to they are hotmail, no joke, follow the tutorial below.

Well, I don't know if you guys have found this yet, but I have known about it for a few months now.    


Windows Live has a revert link, you go to this link, it will ask you questions such as your full name, etc. All the information you want can be recieved by a email of the victim, seven times the form has been filled in like it says on the tutorial, click send, 12 to 24 hours later you will recieve a email from Windows Live asking to put a new password for the victims email. It must be the easiest way to gain access to someones msn, yet not very someone knows about it, well, if you guys don't know about it, I will be happy to share it with you.


Tutorial:
What you will want?

Read more...
Related Posts with Thumbnails

  © Blogger template Webnolia by Ourblogtemplates.com 2009

Back to TOP