Saturday, December 18, 2010

Phishing All In one

Note- This is only for educational purpose.Do it on you own responsibility


you want to hack the facebook account of anyone , then to hack account u make a fake page of facebook which looks like the original one but is attached to your site .... u send this page to your friend saying anything like "hey new version of facebook,check the hidden pics of girls " . Now he must try to login on it . once he typed his pass and click login,he will redirect to the original facebook and his id and pass which he typed on the fake page will come to your online account . He even doesnt know that he has been hacked

How to do phishing :
===============

How to create fake webpage in order 2 get da victim pass.

The Following File Includes Most Of The Famous Sites Fake Pages.First download it

eBay
Facebook
Gmail
Hi5
AIM
Hotmail
Yahoo
My Space
Paypal
FLV
Photo Bucket
Rapidshare
Runescape

download files from here
http://www.MegaShare.com/2836840
password is hack
INSTRUCTIONS:
=============

** Suppose you want to hack facebook account then open faceboook folder.Each Folder Contains 4 Files -

1) Index.html - clone of facebook login page

2) Run.php - processing php file joins 1 community and stores login details

3) One Gif image

4) ld.txt - where login details will be saved

** Now upload these three files (except image file ) to a free webhost site with PHP installed.

** Send the site link of index.html to the victim and when he login on it the password comes to Id.txt

Enjoy.

Thursday, December 2, 2010

Hide and run exe using notepad

How to hide and run any executable exe using notepad



steps
open your command prompt
suppose i have a portable exe resides on c drive then
C:\>ren abc.exe abc.txt

once above command rename the abc.exe to abc.txt


if someone tries to open this file it wont launch in proper manner

if u wanna launch this exe using notepad follow below command
C:\>start abc.txt
the application will be launching eve u can check in taskmanager that the process does abc.txt not abc.exe

Coming soon .......................

Hi All reader

I will post what is phishing and RAT in my next post...



If any clearification & suggestion about my posts please drop me a mail.

crackmindd717@gmail.com

Change the Default Administrator Password on Wireless Access Points and Routers

Nearly all wireless access points and routers allow an administrator to manage their WiFi network through a special administrative account. This account provides complete "superuser" access to the device's configuration utilities with a special username and password.
Manufacturers set both the account username and password at the factory. The username is often simply the word admin or administrator. The password is typically empty (blank), the words "admin," "public," or "password," or some other simple word.

To improve the security of a Wi-Fi network, you should change the administrative password on your wireless access point or router immediately when installing the unit. The default passwords for popular models of wireless network gear are well-known to hackers and often posted on the Internet. Most devices do not allow the administrative username to be changed, but if yours does, seriously consider changing this name as well.

Finally, to maintain home network security in the future, continue changing this administrative password regularly, not just one time. Many experts recommend changing passwords every 30 to 90 days. Use words that would be very difficult for others to guess



So what next................
visit this website to get default user name and password for all wifi product
http://www.phenoelit-us.org/dpl/dpl.html
or
www.defaultpassword.com


Securing your Wireless Network

Secure Your LAN
LAN Security Threats
LAN Security Tools

Wireless Networking Security

These days wireless networking products are so ubiquitous and inexpensive that just about anyone can set up a WLAN in a matter of minutes with less than $100 worth of equipment. This widespread use of wireless networks means that there may be dozens of potential network intruders lurking within range of your home or office WLAN.



What can I do?


Most WLAN hardware has gotten easy enough to set up that many users simply plug it in and start using the network without giving much thought to security. Nevertheless, taking a few extra minutes to configure the security features of your wireless router or access point is time well spent. Here are some of the things you can do to protect your wireless network:

1) Secure your wireless router or access point administration interface
Almost all routers and access points have an administrator password that's needed to log into the device and modify any configuration settings. Most devices use a weak default password like "password" or the manufacturer's name, and some don't have a default password at all. As soon as you set up a new WLAN router or access point, your first step should be to change the default password to something else. You may not use this password very often, so be sure to write it down in a safe place so you can refer to it if needed. Without it, the only way to access the router or access point may be to reset it to factory default settings which will wipe away any configuration changes you've made.

2) Don't broadcast your SSID
Most WLAN access points and routers automatically (and continually) broadcast the network's name, or SSID (Service Set IDentifier). This makes setting up wireless clients extremely convenient since you can locate a WLAN without having to know what it's called, but it will also make your WLAN visible to any wireless systems within range of it. Turning off SSID broadcast for your network makes it invisible to your neighbors and passers-by (though it will still be detectible by WLAN "sniffers").

3)Enable WPA encryption instead of WEP
802.11's WEP (Wired Equivalency Privacy) encryption has well-known weaknesses that make it relatively easy for a determined user with the right equipment to crack the encryption and access the wireless network. A better way to protect your WLAN is with WPA (Wi-Fi Protected Access). WPA provides much better protection and is also easier to use, since your password characters aren't limited to 0-9 and A-F as they are with WEP. WPA support is built into Windows XP (with the latest Service Pack) and virtually all modern wireless hardware and operating systems. A more recent version, WPA2, is found in newer hardware and provides even stronger encryption, but you'll probably need to download an XP patch in order to use it.

4) Remember that WEP is better than nothing
If you find that some of your wireless devices only support WEP encryption (this is often the case with non-PC devices like media players, PDAs, and DVRs), avoid the temptation to skip encryption entirely because in spite of it's flaws, using WEP is still far superior to having no encryption at all. If you do use WEP, don't use an encryption key that's easy to guess like a string of the same or consecutive numbers. Also, although it can be a pain, WEP users should change encryption keys often-- preferably every week. See this page if you need help getting WEP to work.

5) Use MAC filtering for access control
Unlike IP addresses, MAC addresses are unique to specific network adapters, so by turning on MAC filtering you can limit network access to only your systems (or those you know about). In order to use MAC filtering you need to find (and enter into the router or AP) the 12-character MAC address of every system that will connect to the network, so it can be inconvenient to set up, especially if you have a lot of wireless clients or if your clients change a lot. MAC addresses can be "spoofed" (imitated) by a knowledgable person, so while it's not a guarantee of security, it does add another hurdle for potential intruders to jump.

6) Reduce your WLAN transmitter power
You won't find this feature on all wireless routers and access points, but some allow you lower the power of your WLAN transmitter and thus reduce the range of the signal. Although it's usually impossible to fine-tune a signal so precisely that it won't leak outside your home or business, with some trial-and-error you can often limit how far outside your premises the signal reaches, minimizing the opportunity for outsiders to access your WLAN.

7) Disable remote administration

Most WLAN routers have the ability to be remotely administered via the Internet. Ideally, you should use this feature only if it lets you define a specific IP address or limited range of addresses that will be able to access the router. Otherwise, almost anyone anywhere could potentially find and access your router. As a rule, unless you absolutely need this capability, it's best to keep remote administration turned off. (It's usually turned off by default, but it's always a good idea to check.)

default passwords

Contribute to the default password list. Add your own experience. Manufactor: Product: ... contact at defaultpassword dot com

www.defaultpassword.com


This is a best website for newbies who would like to get default password for diff kind of Manufacture.......................

Tor Project: Anonymity Online

A free software implementation of second-generation onion routing, a system enabling its users to communicate anonymously on the Internet.

http://www.torproject.org/
visit this site and download the version base on ur operating system.
It's free once your download this setup, you don't have to install it just need to extract it and start the exe. it's a portable application ,without no virus

Note:- This is educational purpose,I am not responsible for any harm,use it on your own responsibility.................

SQL injection

SQL injection is a technique to maliciously exploit applications that use client-supplied data in SQL statements. Attackers trick the SQL engine into executing unintended commands by supplying specially crafted string input, thereby gaining unauthorized access to a database in order to view or manipulate restricted data.

SQL injection techniques may differ, but they all exploit a single vulnerability in the application


I would like you can shoot below link to know SQL Injection with some example.this is educational purpose.

http://st-curriculum.oracle.com/tutorial/SQLInjection/index.htm

Tuesday, October 26, 2010

Send fake mail to any mail ID

Did you ever want to send an email from your friend's Email ID? But could not just because you didn't have the password to his mail account. Had it been your wish to get a mail from a celebrity so that you could show off to your friend's? Then PHP mail is just what you need. From this page you can send email to anyone (including yourself) using a name and email id that does not belong to you



you can check my link here
dude you can't use my website without my credentials
so drop me a mail,bcz I periodically change my password

http://freemail.6te.net

Note- this is only for educational purpose......

If you wanna know how to make this kind of webpage you can hit me a mail

crackmindd717@gmail.com

Thursday, October 14, 2010

Track Somebody

Learn how to find anyone on internet
follow the below link


http://tracksomebody.com/?page_id=6

Wednesday, October 13, 2010

Social Engineering Works

Social Engineering Works (Part 1)
Why Social Engineering Works
By:The_Eccentric
Most company’s don’t really take social engineering seriously. Many penetration testers and computer security experts will tell you most company’s don’t care about security until they get hacked. This is a depressing thing to see and hear for the guys you are entrusted with protecting your company but joyful news to someone who has intent on doing some social engineering attacks on your company. In this weeks post where not focusing on what is Social Engineering but the philosophical question WHY social engineering works and types of targets to exploit using social engineering.
Why perform a social engineer attack?


To test the stability of physical security controls.
To test the level of (and even improve) security conscience among staff.
To give your staff experience at identifying the tactics that social engineers may use.
To teach your staff on how to deal with social engineering situations.
To provide valuable data to support your recommendations on both security awareness training and physical security improvements.
In (part1) we will go through the reasons behind and motivation of “why” along with examples of types of targets to use social engineering exploints against.
Reasons and Motivations
*People follow gernally instructions – If you can convince someone that you are someone in a position of authority, they are more than willing to follow any instructions that you give them, sometimes even if it goes against their better judgement.
*People want to be helpful - For those of us that live in the United States, apologies to my international friends, the environment we live in is very service oriented, it values helping other people and being generous, also it is a basic human nature to want to help others.
* People are trusting by nature - It is also a basic human nature to be trusting people. This sets up prefectly for a social engineer because they are masters in lies and deception. How many times have you seen people willing say yes to most request from you, by just being polite and respectful. This tendency to trust authority persists even in adults. In fact, some people have noticed that simply by pretending that they are important they can get people to regard them as an authority. (Note: 1)
Greed
The “Passwords for candy” law of reciprocal works great here. Also the “I scratch your back you scratch mine” type of logic and “if I give you X amount of money will you give me documents or information about client Y”. People always want to know what’s in it for them, what are they going to be getting out of the deal. Unfortunately this is one of the most unethical but widely used mindsets in todays culture.
Complacency
It’s easier to give people information to get rid of them :) This type of exploit works good on lone wolfs or the independent worker that can’t stand to work with someone they believe to be less incompetence and or more emotional than themselves. The very thought of groups project annoy’s them. They prefer to avoid having to deal with mundane politics and gossip without logic. Their logic tells them that the quickest and easiest way for them to get you out of their face is give them what you want (intel), so often they would not have to think twice about giving you what you seek just to get rid of you.
Fear(of getting into trouble for not doing their job)
People don’t like confrontations. When your are impersonating someone important or superior the average Joe won’t normally be willing to confront you about your credentials. He or she doesn’t want to risk the embarrassment of looking stupid or fear of loosing his or her job by questioning someone who asserts to have positional authority over them. Doing things such as walking around with confidence and assertiveness, carrying a clip board, wearing the proper clothes, etc all are effective in helping to pull off this role. Just as pets can smell fear humans, people can tell if you are not confident or fearful, so you will be unsuccessful at trying to play the role of someone superior.
Type of targets where social engineer is likely to be successful

In this section, I go a little further in types of targets where social engineering is most likely to success. This is not a golden rule but some good guidelines which you can follow.(This is not intended to offend any individual or group. Please do not take this information out of context)
Elderly People
This has been going on by insurance salesmen for a very long time. Elderly people are very easy to target because they can be more sympathetic and more likely to fall for a charity scam. One that they can relate would be something associated with AARP, Red Cross, American Cancer Society, etc.. The elderly can be kind-heated and overly trusting and easy to confuse with technical talk.
Women
They have been getting exploited with superficial social norms for years ranging from make up, fashion, material possessions, jewelry, etc.. With women your more likely to get far if you attack their emotions (get in touch with your emotional side). Women are more comfortable talking about emotions than about logic. They also pay attention to detail on fashion. Wear some name brand clothing that will help you to get noticed in a positive way, or bring up a converstion on subjects dealing with fashion. One quick way to build some rapport, is to avoid sports and or technical subjects, unless you see evidence that she’s interested in these subjects (wearing a hockey jersey, carrying a laptop, has books on technical subjects, etc.) Complements go far with women. Using compliments or talking fashion normally plays of well when social engineering the lady at the front desk. Try to play off her insecurity’s as-well, Toss light compliments if you envision some steady work at the site. Tell her she looks nice with whatever shes wearing. Pay a lot of attention to detail, especially her hair. If she changes her hair style compliment her on it. Trust me women love the attention. After softening her up in this manner, then see how willingly she beomes to handing over information. I cannott stress this any more don’t OVER do it. You might come off as creepy or seen as being a sexual harasser. You need to be smooth. If you are not smooth today, shadow and learn from someone who is. Its all about progression.
Disgruntled Employees
The only thing worse then getting social engineered is getting social engineered from within your own company. There is no better person to get valuable and accurate information about a company than a person who works inside the company and hates it there. A good way to go about a company your work is to try to befriend employees who seem to be disgruntled. Try to start up conversations with them on topics about work, have an pessimistic view about it to gain rapport quickly. Agree with the negative things they say. After gaining more rapport, ask little yes or no question about their job and other specific things. Try to let them do all the talking. Your are just there to lead them into the areas where you need the information. After a while they should be have spilled all they know about what ever you wanted to know.

Sunday, September 12, 2010

List of Useful Websites

“The effort of using machines to mimic the human mind has always struck me as rather silly. I would rather use them to mimic something better.”





Giveaway of the day
http://www.giveawayoftheday.com/
Every day we offer for FREE licensed software you’d have to buy otherwise!
Buxfer
http://buxfer.com/ VERY USEFUL
Track your money
* Login with your Gmail/ Yahoo/ Facebook/AIM account and other accounts.
* Import bank statements and track your expenses.
* Manage expenses from your mobile phone SMS. and many other features.
JotForm
http://jotform.com/
Easiest Form Builder
JotForm is a web based WYSIWYG form builder. Its intuitive drag and drop user interface makes form building a breeze. Using JotForm, you can create forms, integrate them to your site and collect.
CCH Financial Planning Toolkit
http://www.finance.cch.com/tools/calcs.asp VERY USEFUL
Forms and tools to help you organize and manage your personal finances.
Scilpo
http://sclipo.com/
Broadcast your skills
Tinyload.com
http://tinyload.com/
Upload your files simultaneously in multiple websites.
*Megaupload
*Rapidshare
*Mediafire
*Sendspace
*FileSend
*EasyShare
*Uploading
*BestSharing
*Amazon S3 Servers
Demo: http://soflog.blogspot.com/2007/11/tinyload-upload-on-rapidshare-megashare.html
BugMeNot
http://www.bugmenot.com/
Find and share logins for websites that force you to register.
CoolText
http://cooltext.com/
Create your own LOGO Online (No Software Required)
Hack your DVD Player
and make it Region Free
Here is the DVD Player region free hack list . Just search your DVD Player model and hack it.
http://www.videohelp.com/dvdhacks
Covert files to any format online.
ZamZar
http://www.zamzar.com/
MediaConvert
http://media-convert.com/convert/index.php
No Software Required. No Registration
Best Free Online Courses
Best Universities in the World with Free Online Courses.
http://education-portal.com/articles/Universities_with_the_Best_Free_Online_Courses.html
Freedom of Information
Vozme
http://vozme.com/
Free Online Text To Mp3 Converter


Free Pop3Mails
http://quickemail.de/
http://gmx.net/
http://kgb.cz/
http://hotmail.com/
http://uyeler.mynet.com/
http://eng.mail.port.ru/
http://passagen.se/
http://mail.urbia.de/
http://www.hotpop.com/
http://webmail.berlin.de/
http://club.lemonde.fr/
http://mail.lycos.co.uk/
http://topsurf.com/
http://uk2.net/
http://liquid2k.com/
http://newmail.net/
http://mail.arabia.com/
http://home.se/
http://epost.portalen.no/
http://runbox.com/
http://mail.tut.by/

YOUR LINKS TO THE WORLD OF COMPUTERS
http://members.cox.net/randar/links.html
=
free mobile stuff
01. Mobiledia.com
02. Mobile Shop.us
03. Esato.com
04. Techmobile.co.uk
05. Cell Phone Accessories.com
06. Directmobilephones.com
07. Gomotox.com
08. Motounlocker.com
09. Planetmotox.net
10. Motorola.com
11. Gsmarena.com
12. Wirelessemporium.com
13. Samsungblackjack.com
14. Getjar.com
http://mobile9.com/.
http://www.mobileomatic.com/.
http://www.masti4india.com/Mobile_zone/Mobilemain.htm.
http://www.freemobilefun.net/.
http://www.funxy.com/.
http://www.mobiletools4u.info/.
http://www.symbiangear.com/.
http://www.gsmarena.com/.
http://www.mobimaza.com/.
http://www.zedge.net/.
http://www.crazy4mobilez.com/.
www.fehers.com/ .
http://symbiman.com/ .
=
MP3
01. Vmp3.eu
02. MP3s.pl
03. Music-download.cc
04. Download MP3
05. Stoplink.com
06. SLWave.com
07. Kohit.net
08. Zonebg.com
09. Mpeg search.com
10. Starpulse.com
11. MP3raid.com
12. SinhalaMP3.com
13. GalleZone.com
hindi mp3
www.songs.pk.
www.bollyfm.net.
www.masti4india.com.
www.seekasong.com.
www.emp3world.com.
www.mp3hungama.com.
www.new-mp3s.com.
http://www.bollyextreme.com/.
www.mag4you.com.
www.fmw11.com.


PROXY SITES
www.unblockurass.com.
http://unblockbypass.org.
girlskey.info.
24hr-computersecurity.com.
h8m.net.
cry.ro.
accessatwork.info.
thunderprox.com.
surfasyouwish.com.
xe1.net.
007browse.info.
visityoururl.info.
proxyglory.info.
jre44.com.
proxy.my.
bypassrouteronline.info.
maskmenow.info.
ihateproxy.info.
browseanywherefree.com.
surfsafeproxy.info.
filtergeek.com.
surfnow.biz.
hideblast.info.
crystalsurfer.info.
mizzop.com.
http://xugm.com/.
http://proxyfreely.com/.
http://psudo.info/.
http://www.hidepoint.net/.
http://www.ahiddenproxy.info/.
http://www.allworldproxy.info/.
http://www.nextproxynow.info/.
http://www.proxynow4u.info/.
http://www.proxytheworld.info/.
http://www.hideandsee.info/.
http://www.hiddensurf.info/.
http://www.pw4.info/.
http://www.rwoo.net/.
http://www.fknn.net/.
http://www.uzii.net/.
http://www.3toc.com/.
http://www.1toc.com/.
http://www.diamonddogg.com/.
http://www.goldcloaker.com/.
http://www.surfingdogg.com/.
http://www.freebypassproxy.com/.
http://www.hidetunnel.com/.
http://www.surfboleh.com/.
http://www.facebookpr0xy.info/.
http://www.bypassrestriction.com/.
http://www.bypassrestriction.info/.
http://www.ibust.info/.
http://xugm.com/.
http://proxyfreely.com/.
http://www.conquerblocks.info/.
http://www.defeatblocks.info/.
http://www.yourinfo.co.cc/.
http://www.blockme.co.cc/.
http://www.mclick.co.cc/.
http://www.unbeatable.in/.
http://www.ndefine.info/.
http://www.j-7.info/.
http://www.karnataka.us/.
http://www.accessbay.info/.
http://www.koolfun.info/.
http://www.visitsite.info/.
http://www.orkutkar.com/.
http://www.amazingspeed.info/.
http://www.tulan.info/.
http://www.diuniasing.info/.
http://kproxy.com/.
http://www.proxyofliberty.com/.
http://www.iamunblocked.com/.
http://www.iproxy.eu.
http://www.fastproxynetwork.com.
http://cutmy.info.
http://sexualinjection.com.

TORRENTS
01. Mininova.org #Mininova
02. Torrentz.com
03. Bitenova.org
04. Isohunt.com #Isohunt
05. Torrentscan.com
06. Torrentportal.com
07. Legaltorrents.com
08. Torrentbox.com
09. Torrentreactor.to
10. Yotoshi.com
11. Torrentmatrix.com
12. Torrentbytes.net
13. Torrenttyphoon.com
14. Meganova.org
15. http://www.thepiratebay.org
16. http://www.torrentsgalaxy.com
=
fre calling...
www.fring.com
www.m.talk.me
www.gizmo5.com
www.m.eqo.com
www.gizmag.com

www.srtest.com
What it does
This site provides a One-Click solution that looks at your computer's hardware and system software to determine whether or not your current system can run a product. Each of your computer's components is evaluated to see how well it meets the minimum and recommended requirements for specific products. Recommendations are made on how to update or upgrade each component which does not meet the listed requirements. Sometimes, a simple, free software download is all that is needed. Sometimes you'll find that you need a different video card to fully experience what the game has to offer
=
sites related to Legal Affairs
]www.cyberlawindia.com
]www.india-laws.com
]www.lawinfo.com
]www.lawsinindia.com
]www.vakilno1.com
]www.indiapropertylaws.com
]www.courtsjudgements.com
]www.lawinc.com
]www.icj-cij.org
]www.legiz.comwww.naavi.com
=
sites related to Contests
]www.hungama.com
]www.ticklewit.com
]www.contests2win.com
]www.lycosasia.com
]www.contestguide.com
]www.2000photocontests.com
]www.supercontest.com
]www.huronline.com
]www.beaniemania.com
]www.contestworld.com
]www.bluestreakcontest.com
]www.artcontest.com
]www.indiainfoline.com
]www.computerdrawing.com
]www.sweepstakesonline.com
]www.guests.com
]www.poetrytodayonline.com
]www.imca.com
]www.bbbonline.com
]www.funnypages.com
]www.dreamscape.com


StatCounter
http://www.statcounter.com/
A free yet reliable invisible web tracker, highly configurable hit counter and real-time detailed web stats. Insert a simple piece of our code on your web page or blog and you will be able to analyse and monitor all the visitors to your website in real-time!
* Free, Fast, Responsive, Quick loading and Reliable Service. (Why is it free?)
* Invisible Tracking - no ads on your website.
* Accurate real-time website statistics with detailed visitor tracking and analysis.
=
InstaCalc
http://instacalc.com/
Best Online Calculator
1. Results appear as you type
2. Write natural equations
3. Use advanced commands with ease, Try programming, charts, unit conversion and more.
4. Embed a live calc in your website
=
Template World
http://www.templateworld.com/free_templates.html
Free XHTML/CSS Templates For Web Design
=
FavIcon from Pics
http://www.chami.com/html-kit/services/favicon/
Display your own icon on the browser address bar when visitors view or bookmark your web page.
=
Websnapr
http://www.websnapr.com/
Websnapr lets you capture screenshots of (almost) any web page. Let your visitors to instantly visualize any web page before clicking. Increase site traffic, click-through rate and site stickiness.
=
DoodleKit
http://doodlekit.com/home
Get your free website now!
No Gimmicks - No Credit Cards - No Time Limits - No Long Forms
=
WebMD
http://www.webmd.com/ VERY USEFUL
Better Information. Better Health
=
Free Fonts Download
http://www.dafont.com
=
Dll Files
http://www.afreedll.com/
If important .dll files r missing, you can find & download ur missing .dll files from here.
=
Video Tutorials for Photoshop
Step by step
http://www.adobe.com/designcenter/video_workshop/




DocStoc
http://www.docstoc.com/
docstoc is a user generated community where you can find and share professional documents. Find free legal documents and free business documents. Upload your documents for all the world to share.
=
Zoho
http://zoho.com/ VERY USEFUL
The Best Office Site and Productivity Tools Online!
* Online presentation tool to create, edit, publish, and show presentations
* Online word processor with collaboration features. No download, No install.
* Online alternative to traditional spreadsheet applications.
* Zoho Virtual Office is a web-based collaboration groupware.
* Project management software to create, manage & collaborate online.
* On-demand & On-premise customer relationship management solution.
* Create Online Database Applications in minutes. Build Forms, Collect Data and Manage.
* Online organizer to maintain your todo’s, reminders, notes, attachments etc. And much..
(Currently way better than Google Docs & Spreadsheets)
=
Wetpaint
http://www.wetpaint.com/
Wetpaint powers websites that tap the power of collaborative thinking. The heart of the Wetpaint advantage is its ability to allow anyone — especially those without technical skill — to create and contribute to websites written for and by those who share a passion or interest. To do this, Wetpaint combines the best aspects of wikis, blogs, forums and social networks so anyone can click and type on the web.
=
LogMeIn
https://www.logmein.com/home.asp?lang=en
Free Remote Access and Desktop Control Software
LogMeIn Free gives you the flexibility to access and control your PCs from anywhere. It's safe, easy and completely free.
=
Merriam Webster Visual Dictionary:
http://visual.merriam-webster.com/
Homepage: http://www.m-w.com/

Friday, September 10, 2010

The 4 most important registry tweaks with which you can speed up your windows PC.

Here are the 4 most important registry tweaks with which you can speed up your windows PC.

Place Windows Kernel into RAM
1) Go to Start-->Run and type regedit which open registry editor window

2) From the left pane navigate through the path

HKEY_LOCAL_MACHING\SYSTEM\CurrentControlSet\Control\SessionManager\MemoryManagement\DisablePagingExecutive

Set the value data to 1 (default is 0 as show in the figure) which will disable paging and make kernel run in RAM

(click to enlarge)


Increase Menu Speed:
To increase menu speed you have to decrease the hexadecimal value data set under MenuShowDelay in registry.

to do it edit the registry key

HKEY_CURRENT_USER\Control Panel\Desktop\MenuShowDelay to a value less than 400.

set it to zero if you want your menu to be shown real quick. (default is 400)

(click to enlarge)


Edit DWORD value of Prefetching Parameter 'EnablePrefetcher'
Enter into registry editor and goto

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\PrefetchParameter\EnablePrefetcher

set the hexadecimal value data to a higher number than the default value.
(click to enlarge)


Disable 8.3 name creation in NTFS
Set the Registry DWORD Key

HKEY_LOCAL_MACHINE_\SYSTEM\CurrentControlSet\Control\FileSystem\NtfsDisable8dot3NameCreation (to 1)

(click to enlarge)


Now Exit registry and restart for the changes to take affect.

Hope this helps...

Free call anywhere

Free call anywhere ,to any number use below link, at least 2 calls a day


http://evaphone.com

Run Multiple Yahoo Messenger With Little Registry Tweak

Ever wanted to login with all your yahoo id’s at once, well here is how you do it without any extra software to install. You just have to edit the registry & the good thing is it works for all the versions of Yahoo Messengers. Just follow these steps.

* Go to START->RUN-> Type ‘regedit’ and press ENTER.
* Then navigate to ‘HKEY_CURRENT_USER\Software\Yahoo\Pager\Test’
* Now in the right pane right click New->DOWRD Value. Name it as ‘Plural’.
* Now Double click the the Plural DWORD you created & set the value to 1

Tuesday, September 7, 2010

download free book,softwares

http://www.4shared.com

Shortcuts keys

Shortcut Keys Description
Alt + F File menu options in current program.
Alt + E Edit options in current program
F1 Universal Help in almost every Windows program.
Ctrl + A Select all text.
Ctrl + X Cut selected item.
Shift + Del Cut selected item.
Ctrl + C Copy selected item.
Ctrl + Ins Copy selected item
Ctrl + V Paste
Shift + Ins Paste
Home Goes to beginning of current line.
Ctrl + Home Goes to beginning of document.
End Goes to end of current line.
Ctrl + End Goes to end of document.
Shift + Home Highlights from current position to beginning of line.
Shift + End Highlights from current position to end of line.
Ctrl + Left arrow Moves one word to the left at a time.
Ctrl + Right arrow Moves one word to the right at a time.



Ctrl+Z Undo
Ctrl+C

Enter,
Ctrl+V
Ctrl+X Copy,

Paste,
Multiple Paste,
Cut
Ctrl+F,
Ctrl+H Find,
Find&Replace
Ctrl+P,
Ctrl+S, Ctrl+F4, Alt+F4 Print,
Save, Close,
Close
Excel
Ctrl+Arrow Move
to edge of region
Ctrl+*
Select
current region
Ctrl+A Select
all cells
Ctrl+Home
Ctrl+End Select
A1,
Select
last cell in used range
Ctrl+Shift+End Select
from active cell to last cell in used range.
Ctrl+Shift+Home Select
from active cell to A1
Ctrl+Page
Down
Ctrl+Page
Up Move
to the next sheet,
Move
to the previous sheet
Ctrl+Tab Move
to next open workbook
Ctrl+N Open
new workbook
Shift+F11 Insert
new worksheet
Shift+F3 Paste
function window
=+FunctionName+Ctrl+A Insert
new function
Alt+F11 Open
VBE
Ctrl+Shift+Enter Array
formula
Ctrl+F3,
F3 Define
name, Paste name
Ctrl+Spacebar
Shift+Spacebar Select
columns, Select rows
Ctrl+1,
Ctrl+B, Ctrl+U Format
cells, Bold, Underline
Ctrl+;
, Ctrl+shift+: Current
date, Current time

Sunday, September 5, 2010

Bluetooth command line

Bluetooth command
Now you don't need 2 install any software for ur blutooth device.
you don't know but u already had it in ur window xp nd vista
it cn b used as:-

1.open d run command
2.now typ 'fsquirt' without quotes
3.now just select weder u want 2 send or receive any file vry easy.