Friday, December 25, 2009
Tuesday, October 27, 2009
How to Push to Talk Blackberry Curve 8350i from Sprint ?
Our friends at Sprint are trying everything they can think of to hold on to what customers that they have. If you remember Sprint bought Nextel and the main feature that kept people coming back to Nextel were the ruggedized cell phones and the push to talk walkie talkie features that were offered on many of the phones. Now we have Sprint trying to incorporate those same features into the Blackberry Curve 8350i. But is a construction worker looking for a push to talk blackberry? Hard to say. {.......}
How to Unblock Websites Where these are Blocked?
Monday, October 26, 2009
How to Revenue Sharing Hack To Display Different Authers Ads ?
How to show different ads on different author posts in Blogger? Unlike Wordpress, Blogger does not support any plugins and as a result you can’t share the revenue with your fellow authors using third party plugins. But do note that Blogger is highly customizable and certainly you can do anything if you have got some basic PHP and HTML knowledge. If you are a group of authors working on a blogger blog, posting separately and want to show individual ads on your posts, you can do so by applying blogger revenue sharing hack.
You can provide different ad codes for different authors and this hack will automatically display the ad linked with those authors. This hack can be implemented on any part of the blog, below the post title, below the post contents, navbar, footer area etc. But here is the tutorial to show revenue sharing ads below post title, which is known to be the best ad placement for blogger blogs. {.......}
You can provide different ad codes for different authors and this hack will automatically display the ad linked with those authors. This hack can be implemented on any part of the blog, below the post title, below the post contents, navbar, footer area etc. But here is the tutorial to show revenue sharing ads below post title, which is known to be the best ad placement for blogger blogs. {.......}
Hackings Tricks to Hack Computers Emails and Websites
From the very beginning I want to mention that this is not for those people who want to use it illegally, but for those people who wear a white cap and want to know the ethics of hacking just to keep the things safe and better.The Secrets of Hacking, has been published by an Indian Government certified security company which covers all latest tips and tricks on hacking. You can find a lots of valuable security measures that every computer user, website owner or email address owner should follow. {.......}
Tuesday, October 20, 2009
How to Increase the speed of your internet connection ?
As more and more people get quick connections to the internet, such as cable or ADSL, it becomes apparent to the user of a simple dial-up modem that the World Wide Web can quickly turn into the World Wide Wait. Here a trick that can help speed up your current modem without shelling out the big bucks.
There is a setting located in your windows registry called the Maximum Transfer Unit (MTU). This determines the size of the packets of data sent between your and your server. In Windows 95, this setting is has a value of 1,500 bytes when the actual size of internet packets is 1,000 bytes. This can sometimes slow things down. To remedy the situation, simply follow these steps:
{.......}
{.......}
Saturday, October 17, 2009
How to Get Back Folder Missing Options
Open Run and then type "gpedit.msc".
Now goto User Configuration > Administrative templates > Windows Component > Windows Explorer.
Click on Windows Explorer you will find the 3rd option on the right side of screen "Removes the Folder Option menu item from the Tools menu"
Just check it, if it is not configured then change it to enable by double clicking on it and after applying again set it to not configured.
I hopes that you will find the option after restarting windows.
Now goto User Configuration > Administrative templates > Windows Component > Windows Explorer.
Click on Windows Explorer you will find the 3rd option on the right side of screen "Removes the Folder Option menu item from the Tools menu"
Just check it, if it is not configured then change it to enable by double clicking on it and after applying again set it to not configured.
I hopes that you will find the option after restarting windows.
How to Unlock iphone on version
Friday, October 16, 2009
How to Hack window Genuine?
Windows Genuine Hack :-
1) Download “Windows.Genuine.Advantage.Validation..rar”
2) Extract It.
3) Run “installer.bat” file.
4) Reboot.
5) Enjoy Your Validated Windows.
2) Extract It.
3) Run “installer.bat” file.
4) Reboot.
5) Enjoy Your Validated Windows.
How to get free GPRS on Vodafone
This method has been tested on different mobiles and has been confirmed to be working.
Followng are the Settings you require to configure on your Mobile:
Followng are the Settings you require to configure on your Mobile:
Account Name: Vodafone_gprs
Homepage: http://live.vodafone.in
User Name: (no need)
Pass: (no need)
Homepage: http://live.vodafone.in
User Name: (no need)
Pass: (no need)
Access Point Settings :-
Proxy: Enabled {.......}
Proxy: Enabled {.......}
How to chat through ms dos command prompt
1) All you need is your friend's IP Address and your Command Prompt.
2) Open Notepad and write this code as it is.....!
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A
3) Now save this as "Messenger.Bat".
4) Open Command Prompt.
5) Drag this file (.bat file) over to Command Prompt and press Enter.
6) You would then see something like this:
{.......}
Thursday, October 15, 2009
Get Free Download Windows XP Pro SP3 Full Untouched Unanttended GENUINE
Today's post is Windows XP Pro SP3 Full Untouched Unanttended GENUINE.This copy of the window is m using from last 6 months there is no problem no error no crash.That's why i think to upload this window for mine visitor's.Download and enjoy it.
Windows XP Service Pack 3 (SP3) build 5512 was released to manufacturing on April 21, 2008, and Microsoft planned to make it available to the general public on April 29, 2008 via Windows Update and the Microsoft Download Center. However, due to a compatibility issue with Microsoft Dynamics Retail Management System, the release of Windows XP Service Pack 3 was delayed. A feature set overview has been posted by Microsoft and details new features available separately as standalone updates to Windows XP, as well as features backported from Windows Vista, {.......}
Windows XP Service Pack 3 (SP3) build 5512 was released to manufacturing on April 21, 2008, and Microsoft planned to make it available to the general public on April 29, 2008 via Windows Update and the Microsoft Download Center. However, due to a compatibility issue with Microsoft Dynamics Retail Management System, the release of Windows XP Service Pack 3 was delayed. A feature set overview has been posted by Microsoft and details new features available separately as standalone updates to Windows XP, as well as features backported from Windows Vista, {.......}
Sunday, October 11, 2009
Why we meet with a lot of viruses?
Get Installed VMware Server 2 On An Ubuntu 8.04 Desktop
Version 1.0
Author: Falko Timme
This tutorial provides step-by-step instructions on how to install VMware Server 2 on an Ubuntu 8.04 desktop system. With VMware Server you can create and run guest operating systems ("virtual machines") such as Linux, Windows, FreeBSD, etc. under a host operating system. This has the benefit that you can run multiple operating systems on the same hardware which saves a lot of money, and you can move virtual machines from one VMware Server to the next one (or to a system that has the VMware Player which is also free).
Also, with VMware Server you can let your old Windows desktop (that you previously converted into a VMware virtual machine with VMware Converter, as described in this tutorial: http://www.howtoforge.com/vmware_converter_windows_linux) run under your Ubuntu desktop. This can be useful if you depend on some applications that exist for Windows only, or if you want to switch to Linux slowly.
I want to say first that this is not the only way of setting up such a system. There are many ways of achieving this goal but this is the way I take. I do not issue any guarantee that this will work for you! {.......}
Author: Falko Timme
Also, with VMware Server you can let your old Windows desktop (that you previously converted into a VMware virtual machine with VMware Converter, as described in this tutorial: http://www.howtoforge.com/vmware_converter_windows_linux) run under your Ubuntu desktop. This can be useful if you depend on some applications that exist for Windows only, or if you want to switch to Linux slowly.
I want to say first that this is not the only way of setting up such a system. There are many ways of achieving this goal but this is the way I take. I do not issue any guarantee that this will work for you! {.......}
What are the Best Tools for Virus Removal
As a network administrator, helpdesk tech, or other computer professional, you don't remove that many viruses. Most company networks are secure enough that viruses are not really an issue. The issue is when friends, family and people from work get viruses in their home computers. There are so many request for virus removal that it is easy to be desensitized. I am as guilty as anyone when someone asks for help and I tell them they should take their computer to the Geek Squad, or Nerd Herd. There are literary thousands of viruses, and unless you are a professional virus expert it is impossible to keep up with all the removals. So, listed below are some popular virus removal tools and programs.
Some viruses are so specialized that you must first discover the virus you have before you can remove it. There are many no-cost online virus checkers. Listed here are but a few to help isolated the infection: {.......}
Get a Free Flash Application Security Scanner - SWFScan
HP SWFScan is a free tool developed by HP Web Security Research Group, which will automatically find security vulnerabilities in applications built on the Flash platform
HP is offering SWFScan because:
- Their research shows that developers and increasingly implementing applications built on the Adobe Flash platform without the required security expertise.
- As a result, they are seeing a proliferation of insecure applications being deployed on the web.
- A vulnerable application built on the Flash platform widens your website’s attack surface creating more opportunity for malicious hackers.
How SWFScan works and what vulnerabilities it finds:
- Decompiles applications built on the Adobe Flash platform to extract the ActionScript code and statically analyzes it to identify security issues such as information disclosure.
- Identifies and reports insecure programming and deployment practices and suggests solutions. {.......}
How to Secure Website Using Web Security Testing Framework
Websecurify is a web and web2.0 security initiative specializing in researching security issues and building the next generation of tools to defeat and protect web technologies.
Key Features
Key Features
- JavaScript – Websecurify Security Testing Framework is the first tool of its kind to be written entirely in JavaScript using only standard technologies adopted by the leading browsers.
- Multiple Environments – The core technology can run in normal browsers, xulrunner, xpcshell (command line), inside Java or as part of a custom V8 (Chrome’s JavaScript Engine) build. The core is written with extensibility in mind so that more environments can be supported without changing even a single line of code.
- Multi-platform – The tool is available and successfully runs on Windows, Mac OS, Linux and other operating systems.
- Automatic Updates – Every single piece of the tool is subjected to automatic updates. This means that newer and more advanced versions of the tool can be shipped to your front door without you lifting your finger. This however is completely optional. The automatic update can be turned off if needed. {.......}
What Hackers Want?
A Brief Descriptoin about Scapy
Scapy is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more. It can easily handle most classical tasks like scanning, tracerouting, probing, unit tests, attacks or network discovery (it can replace hping, 85% of nmap, arpspoof, arp-sk, arping, tcpdump, tethereal, p0f, etc.). It also performs very well at a lot of other specific tasks that most other tools can’t handle, like sending invalid frames, injecting your own 802.11 frames, combining technics (VLAN hopping+ARP cache poisoning, VOIP decoding on WEP encrypted channel, …), etc.
What makes Scapy different from most other networking tools
First, with most other tools, you won’t build someting the author did not imagine. These tools have been built for a specific goal and can’t deviate much from it. For example, an ARP cache poisoning program won’t let you use double 802.1q encapsulation. Or try to find a program that can send, say, an ICMP packet with padding (I said padding, not payload, see?). In fact, each time you have a new need, you have to build a new tool. {......}
First, with most other tools, you won’t build someting the author did not imagine. These tools have been built for a specific goal and can’t deviate much from it. For example, an ARP cache poisoning program won’t let you use double 802.1q encapsulation. Or try to find a program that can send, say, an ICMP packet with padding (I said padding, not payload, see?). In fact, each time you have a new need, you have to build a new tool. {......}
How to steal Cookie using Surf Jack
A tool which allows one to hijack HTTP connections to steal cookies – even ones on HTTPS sites! Works on both Wifi (monitor mode) and Ethernet.
Features:
- Does Wireless injection when the NIC is in monitor mode
- Supports Ethernet
- Support for WEP (when the NIC is in monitor mode)
Known issues:
- Sometimes the victim is not redirected correctly (particularly seen when targeting Gmail)
- Cannot stop the tool via a simple Control^C. This is a problem with the proxy
Requires:
- Python 2.4
- Scapy
You can download Surf Jack here:
Saturday, October 10, 2009
Introducing To iPhone 3G
Meet the fastest, most powerful iPhone yet. iPhone 3GS features video recording, Voice Control, up to 32GB of storage, and more.
New to iPhone? Find out why you’ll love it
Watch the
Guided Tour
The Fastest iPhone Ever
The first thing you’ll notice about iPhone 3GS is how quickly you can launch applications. Web pages render in a fraction of the time, and you can view email attachments faster. Improved performance and updated 3D graphics deliver an incredible gaming experience, too. In fact, everything you do on iPhone 3GS is up to 2x faster and more responsive than iPhone 3G. {.......}
New to iPhone? Find out why you’ll love it
Watch the
Guided Tour
The Fastest iPhone Ever
The first thing you’ll notice about iPhone 3GS is how quickly you can launch applications. Web pages render in a fraction of the time, and you can view email attachments faster. Improved performance and updated 3D graphics deliver an incredible gaming experience, too. In fact, everything you do on iPhone 3GS is up to 2x faster and more responsive than iPhone 3G. {.......}
Friday, October 09, 2009
How to Activate Microsoft Office 2007 Trial version
Most suites or programs of Microsoft Office 2007 allows user to evaluate the product. The trial version of 2007 Microsoft Office system can be installed by using a 25-character trial product key available from Microsoft while you download the free Office software, and you can use the Microsoft Office 2007 suite or program with full functionality for 60 days.
You may have the Office 2007 CD and are able to install Office 2007 without entering product key. However, Office 2007 will work in reduced functionality mode, where it’s effectively just a viewer for office documents. Beside, if you forget the trial product key, or don’t wish to register a Windows Live ID to get the trial key, here’s the trick to activate Office 2007, or more correctly, bypass the activation of Office 2007 60 days trial, and making the “trial” word disappear from the Office title at the top and suppress activation and trial expiry prompt.
You may have the Office 2007 CD and are able to install Office 2007 without entering product key. However, Office 2007 will work in reduced functionality mode, where it’s effectively just a viewer for office documents. Beside, if you forget the trial product key, or don’t wish to register a Windows Live ID to get the trial key, here’s the trick to activate Office 2007, or more correctly, bypass the activation of Office 2007 60 days trial, and making the “trial” word disappear from the Office title at the top and suppress activation and trial expiry prompt.
Monday, October 05, 2009
New features of Blackberry! Recover deleted messages
We sometimes find ourselves doing things automatically only to find out later that what we have done is a mistake! At the very least, this is an inconvenience. This could apply to almost anything, especially when a person is multi-tasking. An instance where this could happen is when you’re talking to someone while checking your Blackberry for messages. If you’re deleting a previous message, you could accidentally do the same to a new one thinking that it is old. It wouldn’t matter if the email or text is unimportant. But what if it is a message from your boss or business associate? What will you do? Can you recover the message from somewhere just like in Yahoo or Google mail?
The big and sad answer is that no, the message is forever lost if your phone has not been set up to store deleted messages in a designated location. That means, once these messages are purged from your smart phone and you have not been able to setup some sort of a backup plan, it will be very unlikely that you could recover them or even from the network provider.
The big and sad answer is that no, the message is forever lost if your phone has not been set up to store deleted messages in a designated location. That means, once these messages are purged from your smart phone and you have not been able to setup some sort of a backup plan, it will be very unlikely that you could recover them or even from the network provider.
Friday, October 02, 2009
Amazing software! Download BearShare Pro 5.3.0.0
* 100% clean install, no bundled software.
* Brand new interface.
* Fastest downloads, ever.
* Instant "search suggest" technology.
* Parental controls block access to offensive files.
* Automatic Virus protection.
* Full featured media player with smart organization feature.
* The easiest BearShare ever, with all new bubbles that hint at cool things you can do.
* Instant searches across the entire BearShare network.
File Sharing just got a whole new meaning:
* Share, Discover and Download music and videos.
* View other users' profiles, photos and music library.
* Make new friends and connect with old ones.
* Leave comments about your friends and favorite artists. {......}
* Brand new interface.
* Fastest downloads, ever.
* Instant "search suggest" technology.
* Parental controls block access to offensive files.
* Automatic Virus protection.
* Full featured media player with smart organization feature.
* The easiest BearShare ever, with all new bubbles that hint at cool things you can do.
* Instant searches across the entire BearShare network.
File Sharing just got a whole new meaning:
* Share, Discover and Download music and videos.
* View other users' profiles, photos and music library.
* Make new friends and connect with old ones.
* Leave comments about your friends and favorite artists. {......}
Secure your computer with Sophos Anti Virus 7.6.1 R2
This is just the client installer, which requires no serial, crack
or authorisation to download or run. It downloads updates
hourly when you are connected to the net or you can right
click on the icon and update manually
Installing Sophos Anti-Virus for Windows
Minimum Requirements
Operating Systems:
Windows 2000 Professional or Server
Windows XP Professional
Windows XP Home
Windows 2003
Windows Vista
Disk space: 120 MB
Memory: Minimum 256MB.
Considerations: If you use any Anti-Virus software
other than Sophos
this installer should uninstall it prior to installing Sophos Anti-Virus. Older versions of Sophos should be uninstalled automatically by this installation. {......}
Easy way to Hack msn passwords!
Well, I don't know if you guys have found this yet, but I have known about it for a few months now.
Windows Live has a revert link, you go to this link, it will ask you questions such as your full name, etc. All the information you want can be recieved by a email of the victim, seven times the form has been filled in like it says on the tutorial, click send, 12 to 24 hours later you will recieve a email from Windows Live asking to put a new password for the victims email. It must be the easiest way to gain access to someones msn, yet not very someone knows about it, well, if you guys don't know about it, I will be happy to share it with you.
Tutorial:
What you will want?
Monday, September 28, 2009
How Hackers Get Hacked ?
If you are clueless to why such stories would come up… I use Google alerts. Great tool.
Once again, you can sign up by entering your name and email on the right —————–> I’ll be publishing this week’s news shortly.
Secure Your Computer With Norton 2010 Internet Security 17.0.0.136 + Trial Reset

Norton 2010 Internet Security 17.0.0.136 (Eng) + Trial Reset 2010 - 1.4 BE
Norton Internet Security 2010 was designed to be the fastest virus, spyware and internet protection you can buy. The Norton Internet Security main window acts as a security management interface.
Norton Internet Security 2010 will be the fastest and lightest security suite Symantec has ever delivered. It guards your PC, network, online activities and your identity with innovative, intelligent detection technologies optimized to combat today aggressive, rapid-fire attacks. Improved Norton Safe Web technology blocks Internet threats before they can infect your PC.
Norton Internet Security 2010 was designed to be the fastest virus, spyware and internet protection you can buy. The Norton Internet Security main window acts as a security management interface.
Norton Internet Security 2010 will be the fastest and lightest security suite Symantec has ever delivered. It guards your PC, network, online activities and your identity with innovative, intelligent detection technologies optimized to combat today aggressive, rapid-fire attacks. Improved Norton Safe Web technology blocks Internet threats before they can infect your PC.
Create Graphic Applications With Corel Designer Technical Suite X4 14.1.0.235
Corel DESIGNER Technical Suite X4 14.1.0.235Corel DESIGNER Technical Suite X4 is the trusted choice for businesses that need to effectively communicate the strengths of their products and services through clear, informative technical illustrations or diagrams.
How to send a single post to many forum at a time
Auto Poster is a small program that sends a single post to many forums at the same time in one single click. It does this without the need for a browser or any interaction by the user, and utilises multi-threading technology to send to every forum at the same time!

This program is COMPLETELY FREE! Designed by the Extreme Warez Development team, this program, in true Warez spirit does not make any profit through the sale of this program. The auto-poster does NOT add anything to your post such as a "program signature" that is often added by other programs. Your post will appear exactly as it would normally appear if it had been sent on a forum.
Hacking Tool ! Botnet
Botnet, also known as robotic network, is a group of computers that run the same computer robotic application controlled or manipulated by human operators. They are also called as botmasters for the purpose of doing co-related tasks. The system is organized in a simple hierarchical structure comprised of many computers, also called as drones or zombies, and a command center that controls all of the drones or zombies into action. Botnets can be large (composed of ten to twenty thousand drones) or small (composed of five hundred to a thousand drones). It really depends on the sophistication and complexity of its use.
Botnets are very good tools in the hacking world because of their ability to gain other computers that could be used for any purpose. If you are familiar with the security vulnerabilities of a network, its workstations and servers, you can wrest control all of its computers in a matter of days, hours or even minutes with the aid of a very sophisticated botnet application. Once control is obtained, the task can be done remotely or autonomously.
Thursday, September 10, 2009
Download Smart Install Maker 5.01
Smart Install Maker is a powerful and convenient means for creation of installers. Possesses the simple, convenient and understandable interface. Despite of simplicity of work with the given program, she allows to create professional installers with the minimal size, a high ratio of compression of files and usability the interface. Smart Install Maker contains all features for creating full-scale installation packages. The program works with windows system registry and ini files. It can create shortcuts, display license agreement and information texts, register ActiveX controls, and execute commands. There are
also many other features. Installer engine takes only 60 Kb in install packages created by Small Install Maker.
The program disposes of excellent data compression formats such as RAR and Cabinet. And all this will allow you to create really compact installers that will cause no problems while being spread through the Internet. Main features of Smart Install Maker: # Modern Wizard-style look and feel # Customizable graphics: embed your own artwork to emphasize your application’s identity # Support Cabinet and RAR compression # All functionality is built in - no external files required # Import registry keys from .reg files and system registry # Create ‘nightly builds’ using command-line /s switch # Check the presence of the .NET Framework and download it if needed # Install dynamic folders (with content known only at setup time)
Download Fast Folder Access 1.8.3
Download Fast Folder Access 1.8.3
*Fast access to folders in Open/Save dialogs.
*Fast access to folders in Windows Explorer.
*Fast access to folders on the desktop and the Start button.
*Easy to add folder to the list of "Fast Folders".
*Right-click on an image file in Windows Explorer to preview image and image file information.
*Add any file as shortcut to Quick Launch or create new folder to manage.
*Runs automatically as part of the Windows Explorer context menu.
Download Fast Folder Access 1.8.3
*Fast access to folders in Open/Save dialogs.
*Fast access to folders in Windows Explorer.
*Fast access to folders on the desktop and the Start button.
*Easy to add folder to the list of "Fast Folders".
*Right-click on an image file in Windows Explorer to preview image and image file information.
*Add any file as shortcut to Quick Launch or create new folder to manage.
*Runs automatically as part of the Windows Explorer context menu.
Download Fast Folder Access 1.8.3
Tuesday, September 08, 2009
Microsoft confirms IIS zero-day flaw; Exploit code published
Microsoft late Tuesday confirmed the publication of exploit code for a serious code execution vulnerability in the File Transfer Protocol (FTP) Service in Microsoft Internet Information Services (IIS) 5.0, 5.1, and 6.0.
A security advisory from Redmond warned that the vulnerability could allow remote code execution on affected systems running the FTP service and connected to the Internet.
“While we have seen detailed exploit code published on the Internet for this vulnerability, we are not currently aware of active attacks that use this exploit code,” a Microsoft spokesman said in an e-mail.
From Microsoft’s advisory:
An attacker with write access in the FTP service could use this vulnerability to cause a stack-based overrun and execute arbitrary code in the context of the local system.In configurations of IIS where the anonymous user has write access, the attacker need not be authenticated.
The Microsoft Security Research & Defense blog offers more details:
The vulnerability is a stack overflow in the FTP service when listing a long, specially-crafted directory name. To be vulnerable, an FTP server would need to grant untrusted users access to log into and create that long, specially-drafted directory. If an attacker were able to successfully exploit this vulnerability, they could execute code in the context of LocalSystem, the service under which the FTP service runs.
Configurations at risk
The vulnerable code is in IIS 5.0 (Windows 2000), IIS 5.1 (Windows XP) and IIS 6.0 (Windows Server 2003). IIS 7.0 (Windows Vista, Windows Server 2008) is not vulnerable. IIS 6 is at reduced risk because it was built with /GS which help protect the service from exploits by deliberately terminating itself when the overflow is detected before attacker’s code runs. We have not seen exploit code for this vulnerability that is able to bypass the /GS protection.
Also, remember that only servers that allow untrusted users to log on and create arbitrary directories are vulnerable.
In the absence of a patch, Microsoft recommends that administrators prevent untrusted users from having write access to the FTP service. The advisory contains instructions to:
Turn off the FTP service if you do not need it
Prevent creation of new directories using NTFS ACLs
Prevent anonymous users from writing via IIS settings
Sunday, September 06, 2009
Download IP Shifter

IP Shifter 2.2.6 description
If you work dynamically at several locations in the network (due to business), or you need to use your computer in more than one network, you have to switch your IP address parameters (e.g. IP address, Subnet mask, Gateway, DNS) frequently, so IP Shifter is a product for you! It can help you to finish this activity.
Key Feature include:
Save multiple TCP/IP profiles by meaningful names.
View current IP address easily and switch IP address quickly.
Switch TCP/IP profile by one-click without reboot computer.
Support multiple network adapters including fixed and wireless.
Integrate "Ping" command to check connectivity.
Check IP address validity before activating.
Integrate "LAN Scanner" to find out all connected computers.
Download IP Shifter
1337 speak
1337 is a cryptic writing language used to shorten the typed messages or as a form of encryption to hide the nature or meaning of the message sent. The term “leet” refers to those with elite status in message boards in the 1980s. It actually originated from 31330 “eleet,” which is the UDP port that the hacker group Dead Cow Cult used to hack Windows 95. The language really is not owned by any specific group. Anyone can use and write “leet” and anyone can have or use its own ciphers to decode it.
The way to use it is by substituting alphanumeric characters or symbols to each character or words from any common communication language such as English. The language can also be developed to include intentional phonetic spelling, new words or even misspellings. Traditionally, the primary strategy is using homoglyphs – symbols that closely resemble the letter for which they stand or an Argot also referred to as a “secret language” for obscurity. It is ever changing but it really has no borders, rules or barriers on what encoding you could use, only that there should be an agreement or a set of protocols for the group to use.
In the past, gamers used leet speak as a communications tool. Currently, anyone could be using leet speak. Chatting teens and young adults who often logon to the Internet are often using this method.
Generally for starters, you could actually use the example below for a quick and simple “leet” letter substitution. It is the most common and traditional cipher used for “leet speak.” You can also find some advanced ones in the Internet, or just make up one for your group.
- A = 4, /-\, @, ^, /\ , //-\\, ci
- B = 8, ]3, ]8, |3, |8, ]]3, 13
- C = (, { , [[, <, €
- D = ), [}, |), |}, |>, [>, ]]), Ð
- E = 3, ii, €
- F = |=,(=, ]]=, ph
- G = 6, 9, (_>, [[6, &
- H = #, |-|, (-), )-(, }{, }-{, {-}, /-/, \-\, |~|, []-[], ]]-[[
- I = 1, !, |, ][, []
- J = _|, u|, ;_[], ;_[[
- K = |<, |{, ][<, ]]<, []<
- L = |,1, |_, []_, ][_, £
- M = /\/\, |\/|, [\/], (\/), /V\, []V[], \\\, (T), ^^, .\\, //., ][\\//][,
- N = /\/, |\|, (\), /|/, [\], {\}, ][\][, []\[], ~
- O = 0, (), [], <>, *, [[]]
- P = |D, |*, |>, []D, ][D
- Q = commas are necessary: (,) or 0, or O, or O\ or []\
- R = |2, |?, |-, ]]2 []2 ][2
- S = 5, $
- T = 7, +, ']‘, 7`, ~|~, -|-, ‘][', "|", †
- U = (_), |_|, \_\, /_/, \_/, []_[], ]_[, µ
- V = \/ , \\//
- W = \/\/, |/\|, [/\], (/\), VV, ///, \^/, \\/\//, 1/\/, \/1/, 1/1/
- X = ><, }{, )(, }[
- Y = ‘/, %, `/, \j , “//, ¥, j, \|/, -/
- Z = 2, z, 7_,`/_
This can explain how “leet” or “elite” came to be written as “1337” (1=L, 3=E and 7=T).
Some simple vocabularies:
n00b – Short for noobie, misspelling of newbie.
0wn3d you ! – Short for I’ve beaten you, probably the most common leet in gaming.
Where did it come from?
In the early 1980’s a group of chatters/gamers devised a way that will not allow their newsgroups from being indexed by the “Bulletin Board System” Chat operators. Others are also using this method to prevent their websites from being picked up by a simple keyword search by replacing certain characters with number on their domain names.
The purpose of leet was to prevent others from discovering coordinated battle strategies or banning or discouraging them from discussing forbidden topics such as cracking, hacking and other forms of pornography.
It became popular as a communications lingo when Id software in 1994 began adding Internet connectivity to a game called Doom 1 and 2.
How does it relate to hacking?
How does it relate to hacking?
It cannot be considered as one of the primary tools for hacking but it can be useful for ciphering your electronic communications, most especially if you are planning a coordinated hack group strike in an area or facility. However, there are traditional ciphering tools in the market that can be used to encrypt and decrypt sent messages to prevent eavesdropping. The leet speaks serves as a second wave of encryption to keep the message from being decoded.
How is it looked upon in the hacking world today?
Real hackers would look at leet as amateurish in nature. When those wannabe-hackers caught on the language, they started using it thinking that they would become real hackers just by doing so. They forgot that hacking requires real knowledge and skills. Right now, hackers openly mock kids who use 1337 just to appear (,00£.
USB flash drive portable browsers
If you use Mozilla Firefox, which I highly recommend, you can download the portable browser hiya: I’m a link.
If you’re an apple fanboy or just like safari, you can download it’s portable version hiya: I’m a link too.
If you use Internet Explorer, you must have some sort of brain blockage and need to fall off a cliff.
Some great features of these portable browsers are:
- you can take your bookmarks with you
- although probably not a good idea, for those of you that happen to always kill the braincells holding your passwords, you can take the saved one’s with you
- take all your extensions with you
- keeps your information stored on the flash drive instead of the computer you are using



