Wednesday, 9 October 2013

Android Secrete Codes

Android Secrete codes
------------------------------------
1. Phone Information, Usage and Battery – *#*#4636#*#*
2. IMEI Number – *#06#
4. Detailed Camera Information – *#*#34971539#*#*
5. Backup All Media Files – *#*#273282*255*663282*#*#*
6. Wireless LAN Test – *#*#232339#*#*
7. Enable Test Mode for Service – *#*#197328640#*#*
8. Back-light Test – *#*#0842#*#*
9. Test the Touchscreen – *#*#2664#*#*
10. Vibration Test – *#*#0842#*#*
11. FTA Software Version – *#*#1111#*#*
12. Complete Software and Hardware Info – *#12580*369#
13. Diagnostic Configuration – *#9090#
14. USB Logging Control – *#872564#
15. System Dump Mode – *#9900#
16. HSDPA/HSUPA Control Menu – *#301279#
17. View Phone Lock Status – *#7465625#
18. Reset the Data Partition to Factory State – *#*#7780#*#*
19. Format Your Device To Factory State(will delete
everything on your phone) – *2767*3855#

HOW TO TURN ON P.C IN 10 SECOND

Wanna to know how to turn the pc on in 10 seconds
(may vary)
Sart ->Run
type Regedit
press enter
this will open Registery Editor
now look for the key
HKEY_LOACAL_MECHINE\SYSTEM\CurrentControlSet
\Control\ContentIndex
now there find the Key Called
"Startup Delay"
Double Click On It
Now where its Base
Click Decimal
Now its Default Value Is 4800000 (75300:hexadecimal)
Change The Value To 40000
here u go u have done it
now close the Registery Editor and Restart Your
Computer

Computer Devices & their Inventors Key board—

Herman Hollerith first keypunch devices in
1930’s
Transistor— John Bardeen, Walter Brattain & Wiliam
Shockley ( 1947-48)
Integrated Circuit— Jack Kilby & Robert Noyce( 1958)
Trackball— Tom Cranston and Fred Longstaff (1952)
Computer Mouse — Douglas Engelbart (1964)
Microprocessor – Intel 4004 Computer Microprocessor—
Faggin, Hoff & Mazor(1971)
Floppy Disk— Alan Shugart &IBM
RAM— An Wang at Harvard University’s Computation Lab
and Jay Forrester at MIT.1951
Laser printer— Gary Starkweather at XEROX in 1969.
Hard Disk— The IBM Model 350 Disk File by IBM in 1956
(was the first hard disk drive and was part of the IBM 305
RAMAC computer that IBM started delivering in)
First PC— the IBM 5100 Portable Computer by IBM
First laptop— Grid Compass 1100 (called the GRiD) and
was designed in 1979 by a British industrial designer, Bill
Moggridge.

Password Protect Any Folder Without Any Software

1. Open Notepad and Copy code given below into it.
cls
@ECHO OFF
title
if EXIST "Control Panel.{21EC2020-3AEA-1069-
A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST MyFolder goto MDMyFolder
:CONFIRM
echo Are you sure to lock this folder? (Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren MyFolder "Control Panel.{21EC2020-3AEA-1069-
A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-
A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock Your Secure Folder
set/p "pass=>"
if NOT %pass%== coolhacks goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-
A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-
A2DD-08002B30309D}" MyFolder
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDMyFolder
md MyFolder
echo MyFolder created successfully
goto End
:End
2. Save the notepad file as lock.bat (.bat is must)
3. Now double click on lock.bat and a new folder will
be created with name MyFolder
4. Copy all your data you want to protect in that New
folder
5. Now double click on lock.bat and when command
promp appears Type Y and press enter.
6. Now MyFolder will be hidden from you view, to
access that folde double click on lock.bat
7. It will ask for password enter your password and
done. (Default password is coolhacks )
To change the password
replace coolhacks with new password in
the above code
You might be thinking that anyone can access the
password by opening that lock.bat file in Notepad or
any other text editor. To make it more secure hide
lock.bat in some secure location after following the
above tutorial To access the secured file double click on
lock.bat. I would suggest copying lock.bat file into
Pendrive and copying it into your computer whenever
you required to access to your protected files.

Interesting facts of Internet

HTTP:-Hyper Text Transfer Protocol
HTTPS:-Hyper Text Transfer Protocol Secure
IP:-Internet Protocol
URL:-Uniform Resource Locator
USB:-Universal Serial Bus
VIRUS:-Vital Information
ResourceUnder Sezied
3G:-3rd Generation
GSM:-Global System for Mobile
Communication
CDMA:-Code Division Multiple
Access
UMTS:-UniversalMobile
Telecommunication System
SIM:-SubscriberIdentity Module
AVI:-Audio Video Interleave
RTS:-Real time Streaming
SIS:-Symbian OS Installer File
AMR:-Adaptive Multi-Rate Codec
JAD:-Java Application Descriptor
JAR:-Java Archive
3GPP:-3rd Generation Partnership
Project
3GP:-3rd Generation Project
MP3:-MPEG Player 3
MP4:-MPEG -4 video Files
AAC:-Advanced Audio Coding
GIF:-Grapjic InterchangeableFormat
BMP:-Bitmap
SWF:-Shock Wave Flash
WMV:-Windows media Audio
WMA:-Window Media Audio
PNG:-Portable Network Graphic
DOC:-Document (Microsoft
Corporation)
PDF:-Portable Document Format
M3G:-Mobile 3D Graphics
M4A:-MPEG-4 Audio File
NTH:-Nokia Themes
THM:-Themes(Sony Ericsson)
MMF:-Synthetic Music Mobile
Application File
NRT:-Nokia Ringones
XMF:-ExtensibleMusic Files
WBMP:-Wireless Bitmap Image
DVX:-DivX Video
HTML:-Hyper Text Markup Language
WML:-Wireless Markup Language
CD:-Compact Disk
DVD:-Digital Versatile Disk
CRT:- Cathode Ray Tube
DAT:-Digital Audio Tape
DOS:-Disk Operating System
GUI:-Graphical User Interface
TCP:-Transsmission Control Protocol
UPS:-Uninterruptible Power Supply
HSDPA:- High Speed Downlink Packet Access
EDGE:-Enhanced Data Rate for GSM Evolution
VHF:-Very High Frequency
UHF:-Ultra High Frequency
GPRS:-General Packet Radio Services
WAP:-Wireless Application Protocol
ARPANET:-Advanced Research Project Agency Network
IBM:-International Bussiness Machines
HP:-Hewlett Packard
AM/FM:-Amplitute/Frequency Modulation
LAN:- Local Area Network
WLAN:-Wireless Local Area Network

Software - Registry Editor Tricks

Software - Registry Editor Tricks
Though many of you may know all of them or a few of them already, but I think it would be good to share them with you.
All tricks are based on Registry editing. If yuu are new to edit registry, backup Registry. Click Here to know how to backup registry
So I'll tell the keyname and the value, that u hv to create for the restriction! If the key is not present, then simply create it. So here we go:
1.) Restrict Display Properties:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\System
create DWORD value NoDispCPL and set its value to 1

2.) Restrict Taskbar Properties:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
create DWORD value NoSetTaskbar and set its value to 1

3.) Restrict Folder Options:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
create DWORD value NoFolderOptions and set its value to 1

4.) Restrict Locking/Unlocking the taskbar:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
create DWORD value LockTaskbar and set its value to 1

5.) Restrict Active Desktop:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
create DWORD value NoActiveDesktop and set its value to 1

6.) Restrict adding/deleting items from Toolbars:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
create DWORD value NoToolbarCustomize and set its value to 1

7.) Restrict adding/deleting toolbars:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
create DWORD value NoBandCustomize and set its value to 1

8.) Restrict right-click in Start Menu:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
create DWORD value NoChangeStartMenu and set its value to 1

9.) Restrict Desktop Cleanup Wizard:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
create DWORD value NoDesktopCleanupWizard and set its value to 1

Protect Your Facebook Account From Hackers

Hello Friends,
Do You know about 6,00,000 facebook accounts got
hacked daily. Its very easy to hack a facebook account
coz hackers are introducing new methods day by day
to crack your system's security..Its Difficult Job To
Maintain Security Of Your Facebook Account Without A
Prior Knowledge Of Hacking...that's why Today i am
Going Writing a article on countermeasures to avoid
hacking.
so lets start.
First of all log in to your facebook
account then go to account settings then
after go to security tab .
in security tab.the first options says.
Secure Browsing: Enable it.
when You use secure browsing.Your
Default Connection Sets To Https Insted of
Http.
Http Stands For Hyper Text Transfer
Protocal. When We use Http Our Browser
And Server Create Communication In
Normal Language. But On the Other Hand
Https stands For Hyper Text Transer
Protocal Secure, When We Use Https
Browser and Server Talks In encrypted
Language. So Chances Of Man In The
Middle Attack Gets Reduced. In ' MITM ' a
Third Person or Brodly Says Hacker Can
Listen The Communication Between
Browser And Server.
Now Come To second Point,Again Go
To account settings then after go to
security tab.
in security tab . the Second options says.
LOGIN NOTIFICATIONS: Enable Login
Notifications.
       Note: Enable Both Email And Phone Notifications.
It is Necessary To enable Login Notifications
Because    facebook can notify you when your account is
accessed from a computer or mobile device that you
haven't used before.
Now Settings Part Is Completed.
So Lets Begin To Avoid The Possible Technique By Which
Hacker Can Hack Your Account.
First of All Keep Your Primary Email
Address(ie. gmail,yahoo,hotmail e.t.c)
Password diferent from facebook
password never Keep Both Password
Same.
Lets Say if Someone Hacks Your facebook
account and changes Your facebook
Password.. Then You can Get Back Your
Password By Clicking On forget Password
link.But If Both Password Are Same .Then
Anybody can Change Both Passwords
easily and You will Lose Your Accounts
For Forever. :(
Many Hackers Hack Accounts
Via Phishing .Phishing is an e-mail fraud
method in which the hacker sends out
Exactly Same Looking Website Address in
an attempt to gather personal and
financial information from recipients.
So Never Give Your Creditials On false
Websites. If Anyone give You link Like...
Faecbuk.com Or Facbooook.com Then
Never Give Your Email address and
Passwords there.
Always Do give Your Password To Only
"Facebook.Com"
Otherwise You Will Be hacked.
Keylogging Is Also A method By Which
Anyone Can Got Easily Haked.
The Entire Process Is known
As Keylogging and The Software Used In
it known as keylogger . Keylogger is most
intelligent tool to secretly capture all
typed keystrokes activities of your kids,
employees, family members, relatives,
friends on computer system And Save
Them In A File. That File Can Be Sent To
Hacker Via Internet.
To Avoid keylogging. Always Use a Good
License Version Antivirus Software and
Regularly Update and Scan With It.
Always Give A unpredictible Security
Question Answer.
Never Add  Unknown Persons In Your
Account.Facebook Have A Vulnerablity To
bypass Security By Using Of Your Three
Friends.
Lastly Countermeasures for Trojan:
Trojan Are Dangerous Kinds Of virus
They Can Work As Keyloggers And Give
Hacker's a acess To Your System .To
Avoid Hacking With Trojan. Always Use a
Good License Version Antivirus Software
and Regularly Update and Scan With
It.One More Important Thing Trojan Can
Be Binded Or crypted With Any
Software,Image,Video Or Any Kind of File
That Makes Them Undetectable.So Never
Download Anythings From suspected
Sites Like ziddu Or Mediafire.

What to do if your phone gets wet

What to do if your phone gets wet:

Never ever try to switch it on as it may cause short-circuiting in the phone and may lead to a bigger loss. Immediately remove your phone's battery and then use a towel to dry the physical parts of the smartphone and once you are through it, bury your phone and the battery in a bowl full of rice. This will cause the rice to absorb all the water and moisture from the device. One of the best things you can do is to place the wet smartphone on the back of your PC monitor or TV screen over the heat vents. The conventional heat waves coming out of these devices are just perfect to dry and fix your phone  Else, you can place the smartphone in front of the air conditioner as well. Since the cold air coming from the AC is dry, it will dry up your phone quicker than you may expect.

How to Copy the Command Output to Windows Clipboard

Like it or not, the command
prompt is still an indispensable
part of your Windows computer
because there are still a bunch of
things that can only be done by
writing commands.
For instance, if the computer isn’t
connecting to the Internet, you will probably be interested in the
output of the “ping” or the “tracert” command. If you need to print the contents of a directory in
Windows, the command “dir” will come to your rescue. Copy command line output to Windows Clipboard.
Now here’s a little trick. If you add the pipe *operator (|) to your
command followed by the “clip” command, the output of your original command will get saved to the Windows clipboard and won’t print inside the Command Prompt window.
Here are some examples:
°dir | clip Copy the content of a folder to the clipboard.
°tree | clip Display the recursive directory structure and save it to the clipboard.
°type error.log | clip Place the
content of the file error.log to the clipboard.
°sort file.txt | clip Sort the file and save the sorted output to the clipbord.
°ipconfig /all | clip Get details of your network connection for sending to tech support.
The “clip” command may not be
available on Windows XP but in
that case, you can use the redirect
operators, like > and >>, for saving
the command output to a text file.
Alternatively, right-click anywhere
inside the command window, select Mark from the contextual menu, use the mouse to highlight a block text and then press Enter to save it to the clipboard.
[*] The pipe operator (|) takes the
output of one command and directs it into the input of another command which in our case is clip.

SERIAL KEYS OF DIFFERENT WINDOWS AND MS OFFICE

WINDOWS 97
15695-oem-001346-000881
12095-oem-0004226-12233

WINDOWS 98
PYDMY-DVJ9J-996VH-JX66P-9TWKW
HQ6K2-QPC42-3HWDM-BF4KJ-W4XWJ

WINDOWS MILLENNIUM
JFWP3-NG104-D6821-K57JY-JGRMG
HBTD9-6P338-XT2MV-QBTTF-WPGGB

WINDOWS 2000.
RBDC9-VTRC8-D7972-J97JY-PRVMG

WINDOWS XP.
RHKG3-8YW4W-4RHJG-83M4Y-7X9GW
QW4HD-DQCRG-HM64M-6GJRK-8K83T

OFFICE. 97
4156-0287065

OFFICE 2000
GC6J3-GTQ62-FP876-94FBR-D3DX8

OFFICE XP .
FM9FY-TMF7Q-KCKCT-V9T29-TBBBG
GWH28-DGCMP-P6RC4-6J4MT-3HFDY

COREL 11
DR11CRD-0012082-DGW

COREL 12
DR12WEF-5646037

COREL X4 (14)
DR14T22-FKTH7SJ-KN3CTHP-5BED2VW

How to increase my processor speed

First go to Start and then Run
Type " regedit " (without quots) in Run
window
A new window will opens now follow the path given
below:

HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \
Control \ Session Manager \ Memory Management
Now under Memory Management in the right
side you will see SecondLevelDataCache
Right click on it and choose Modifier option
(or Double Click on it)
and change its Value Data according to the
Name of your Processor..
Change 256 if your processor is:
Intel pentium 3 E
Pentium 4
AMD k6-3
AMD Thunderbird
Cyrix 3
Pentium 2 Mobile
Change 64 if your processor is:
AMD Duron
Change 512 if your processor is:
AMD K6-2
Pentium 2
Pentium 3 Katmai
AMD Athlon
Change 1024 if your processor is:
Pentium 2 Xeon
Pentium 3 Xeon
and Change 128 for processor:
Pentium Celeron
Pentium Celeron 2

Make Bootable Pen Drive using dos for windows 7

Make Bootable Pen Drive using dos for windows 7
Install Window 7/8 within 5 minutes from Pen Drive (using dos)

Hey friends, in this article I am going to explain you how to install window 7 to your computer from Pen Drive. You are now thinking that why should we install windows from USB/Pen Drive?
When I can just pop up a DVD
I bought and install that way. Well
the difference is that the Pen Drive is based on flash memory the read/write speed will be significantly faster than any DVD. So you can easily install windows within 5-10 minutes instead of 20-30 minutes. So let start and just follow the steps given below:
°Insert your pen drive into the
computer which should be 4 GB
(Gigabytes) or more.
°Empty/Format the pen drive.
°Open the command prompt and make sure you should “Run as
administrator” otherwise this will notwork.
°Now type in command prompt
“diskpart” and press enter.
°Now you have a new prompt called “DISKPART” now type in it “list disk” and press enter. Make sure don’t select your main hard drive.
°Now type “select disk 5” and press enter.
°Note: 5 is that drive where we want to install windows it may be anything.
°Now you see “Disk 5 is now the
selected disk”.
°Now type “clean” and press enter.
This will clean the disk.
°Now type “create partition primary” and press enter.
°Now you see “Disk part succeeded in creating the specified partition”.
°Now type “select partition 1” and press enter.
°Now type “active” and press enter.
°Nowyou see “Disk part marked the current partition is active”.
°Now type “format fs=NTFS quick” and press enter.
Note: make sure use quick at the end otherwise the format take very much time.
°Now you see “Disk part successfully formatted the volume”.
°Now type “assign” and press enter.
°Now you see”Disk part successfully assigned the drive letter or mount point”.
°Now type ”exit” and press enter. And type “exit” ones more.
°Now open up the Pen drive. Now you have to drag the contents of windows 7 DVD into the pen drive or you may have to extract them from the DVD into yourFlash memory.
After copy all the contents of
windows 7 into the pen drive just
reboot your computer. And make sure it will set to boot from a Flash Drive.That’s all you should now install your windows from a Pen Drive. Just choose usb drive as first boot drive in BOIS If you like this article
please do share it by by clicking on
any social button & don't forgot to
comment. keep visiting...

How to "Delete administrator Password" without any software

Method 1
Boot up with DOS and delete the sam.exe and sam.log
files from Windows\system32\config in your hard
drive. Now when you boot up in NT the password on
your built-in administrator account which will be
blank (i.e No password). This solution works only if
your hard drive is FAT kind.

Method 2 
Step 1. Put your hard disk of your computer in any
other pc .
Step 2. Boot that computer and use your hard disk as a
secondary hard disk (D'nt boot as primary hard disk ).
Step 3. Then open that drive in which the victim’s
window(or your window) is installed.
Step 4. Go to location windows->system32->config
Step 5. And delete SAM.exe and SAM.log
Step 6. Now remove hard disk and put in your
computer.
Step 7. And boot your computer :-)

Secret Codes for Nokia Codes :

Secret Codes for Nokia
Codes :

1) *#06# For checking IMEI(international Mobile
Equipment Identity)


2) *#7780# Reset to factory settings
 

3) *#0000# To view software version
 

4) *#2820# Bluetooth device address
 

5) *#746025625# Sim clock allowed status
 

6) #pw+1234567890+1# Shows if ur sim as any
restrictions

Chat With Command Prompt

If you want personal chat with a friend
you don't need to download any yahoo messenger
All you need is your friends IP address and Command

Prompt.
Firstly, open Notepad and enter:
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A
Now save this as " Messenger.bat ". Open the .bat file and
in Command
Prompt you should see:
MESSENGER
User:
After "User" type the IP address of the computer you
want to contact.
After this, you should see this:
Message:
Now type in the message you wish to send.Before you
press "Enter" it should look like this:
MESSENGER
User:27.196.391.193
Message: Hi
Now all you need to do is press " Enter", and start
chatting!!!!
:)

How to increase your youtube, metacafe buffering speed

Increase your youtube, metacafe buffering speed
By following these simple steps

1.start
2.run
3.type:- " system.ini " without ""
after that a notepad file will open with following
coding:-
; for 16-bit app support
[drivers]
wave=mmdrv.dll
timer=timer.drv
[mci]
[driver32]
[386enh]
woafont=dosapp.FON
EGA80WOA.FON=EGA80WOA.FON
EGA40WOA.FON=EGA40WOA.FON
CGA80WOA.FON=CGA80WOA.FON
CGA40WOA.FON=CGA40WOA.FON
just below this code copy the following code:-
page buffer=1000000Tbps
load=1000000Tbps
download=1000000Tbps
save=1000000Tbps
back=1000000Tbps
search=1000000Tbps
sound=1000000Tbps
webcam=1000000Tbps
voice=1000000Tbps
faxmodemfast=1000000Tbps
update=1000000Tbps
so totally it will look as
; for 16-bit app support
[drivers]
wave=mmdrv.dll
timer=timer.drv
[mci]
[driver32]
[386enh]
woafont=dosapp.FON
EGA80WOA.FON=EGA80WOA.FON
EGA40WOA.FON=EGA40WOA.FON
CGA80WOA.FON=CGA80WOA.FON
CGA40WOA.FON=CGA40WOA.FON
page buffer=1000000Tbps
load=1000000Tbps
download=1000000Tbps
save=1000000Tbps
back=1000000Tbps
search=1000000Tbps
sound=1000000Tbps
webcam=1000000Tbps
voice=1000000Tbps
faxmodemfast=1000000Tbps
update=1000000Tbps
save the notepad file
and reboot your system this tricks suppose to
work

HOW TO REMOVE MICRO SD MEMORY CARD PASSWORD

HOW TO REMOVE MICRO SD MEMORY CARD PASSWORD????

here is the few tricks to get your password.. :)
trick 1: 

 1. Download and Install FExplorer( http://www.gosymbian.com/FE_download.html )
2. Insert your card into your phone, without accessing it through the phone
3. Run FExplorer and Open the path C:\system
4. Find the file called mmcstore, and rename it mmcstore.txt
5. Copy that file (mmcstore.txt) to your PC and open it in Notepad
6. Your password will be located within that file.

trick 2:
1. Download and Install X-Plore ( http://en.kioskea.net/download/download-10092-x-plore )
2. Now open the X-Plore and press Zero(0) then check you have marked the "Show the System Files".
3. After you done the above step now go to the file: C:/Sys/Data/Mmcstore
4. If you found the above path then press the option "3" to set the Hex-Viewer.
5. Now look the third column you can see the code like ! TMSD02G (c ??”?x???3?3?3?3?3) Now see the characters between '?' because it is
your password 33333.
6. You mayn't able to access the path file: C:/Sys/Data/Mmcstore if you don't set the password for the memory card.

trick 3:
1. Go to file manager on your mobile
2. In Settings choose system folders,
3. In the System folder, find a file called mmcstore
4. Send the file to your PC using IR/Bluetooth
5. Open the file in Notepad
6. The password you need for your memory card is located within that file

Adobe Gets Hacked; Hackers Steal 2.9 million Adobe Customers accounts

Hackers broke into Adobe Systems’ internal network on Thursday, stealing personal information on 2.9 million customers and the source code for several of Adobe’s most popular products. This an absolutely massive blow to Adobe, especially their reputation. Adobe, which makes Photoshop and other programs, revealed that cyber attackers had access user information, including account IDs and encrypted passwords as well as credit and debit card numbers. The company did not specify which users of its various software programs were hit. But Products compromised in this attack include Adobe Acrobat, ColdFusion, and ColdFusion Builder.
"We believe these attacks may be related. We are working diligentlyinternally, as well as with external partners and law enforcement, to address the incident. " the company said in a
customer security alert. Adobe's Arkin says the company is not aware of zero-day exploits or other specific threats to its customers due to the source code theft. Adobe is resetting the
passwords on breached Adobe customer IDs, and users will receive an email if they are
affected. "We have notified the banks processing customer payments for Adobe, so that they can work with the payment card companies and card-issuing banks to help protect customers’ accounts. " If you’ve given your Credit card details to Adobe through their site, it’s now a good idea to keep an eye on your transactions. Adobe has also promised to offer these customers with the option of enrolling in a one-year complimentary credit monitoring membership where available.
In November, 2012 - An Egyptian Hacker named ViruS_HimA also hacked into Adobe servers and leaked private data of 150,000 emails and hashed passwords of Adobe employees and customers/partner of the firm such as the US Military, USAF, Google, NASA DHL and many other companies.

How to protect the eyes when using a computer

" How to protect the eyes when using a computer "

When using a computer for prolonged periods of time, whether for work or pleasure, it's important to protect your eyes from long-term damage.
There are a number of things you can do to help protect your eyes. Some of those ways are:

1- Clean your computer screen
periodically to remove any dust, dirt or fingerprints. This can make it easier on your eyes, so they are not having to focus harder to see what is on the screen, especially if there is text to read.
2- Keep the monitor about 20 to 30 inches away from your face. This range has been found to be the best distance for proper viewing and for reducing eyestrain.
3- Use fonts and icon sizes that are
easy for you to view and read. Avoid using small fonts and icon sizes as it can cause eye strain.
4- Adjust the height of the monitor so that the top of the monitor is just below your eye level so that you are looking down slightly when viewing the screen.
5- Make sure there is proper lighting in the room. Overly dim lighting or overly bright
Lighting can cause strain to your
eyes.
6- Use an anti-glare filter on your
monitor, to help prevent glare and
reflection from lights in the room.
7- Use a document holder for placing documents that you look at regularly, and Place it at the same distance as the monitor.
8- One of the most important things you can do to protect your eyes is to take regular breaks. Taking several minutes to get up and not look at the monitor can greatly help in protecting your eyes and reducing any strain.
9- Another recommendation is to use an LCD monitor aka flat panel
display. The older CRT monitors are harder on the eyes, due to the lower refresh rates and general design of the monitor. LCD monitors feature higher refresh rates, high enough
that most people are unable to see the refreshing of the screen. LCD monitors in general are easier to view for longer periods of time and cause less strain on the eyes.

introduction to Cloud computing

CLOUD COMPUTING
Cloud computing is the technology of computing which is totally based on the internet media. With the help of this ethnology many servers can offer
softwao.re applications and resources and information to the computer and devices attached on
request with the control of electricity grid. It can be called as the service architectures or virtualization for improving the utility of the computational
techniques. Whole system is service oriented and customer focused. Complete detail is taken from the customer and delivers the service according to the need. The main idea of cloud computing is based on the cloud that is specifically designed for the
processing each related device is
present in this cloud of network. Could computing remains invisible
to the customers’ .They only have to pay for their resource that they use in cloud computing services.

How cloud computing works :-
Cloud computing involves the
multiple cloud components that communicate with each other wit
the help of application interfaces
mostly web services. UNIX operating system follows the same
theoretical techniques for its tasks.
The task complexity is divided into all the components making
balanced and manageable results.
The two most important components of the back end and front end .the front end is the interfaces or the main screen that is visible to the customers and users through which they interact with the system. This interface can be browsed with the help of web browsers and all the applications can be used with
this interface. Usually this interface is GUI based. The back end involves all the components and the complete architecture and
programming technique of cloud computing that is totally remains hidden from the users. Only system known what is going one at
the back of very user request. The
back end device involves, cloud server, Assistant computers, Data
storage media and many connectors. Historical background
The very first concept for the cloud computing was given by the John McCathy in 1960s.he first gave the statement for the future use of computational techniques as a public utility. With the arrival of the Virtual private networks this concept which was modernized in 1966 take implementation shape .in year 2007 the most famous organization such as Google ,IBM and may universities world wide started research program on cloud computing and finally in
2008 the first cloud computing
system was introduced.


Advantages of the cloud computing :-
1)Agile functionalities :- Cloud
computing enables user to frequently use the technological resource at inexpensive price.
2)Application interface fro users :-
Another great feature plus advantage of cloud computing system is the accessible and reliable interface for its users API
technology make it more interesting for the users to interact with the human beings.
3)Cost effective :- This computing
techniques greatly reduce the total cost and capital expenses that come sin arranging the
infrastructure .integrated resources are available at almost no cost to the third party users.
4)Geographical independence of
system and devices :- The most exciting feature of the cloud
computing is its total geographical
independence. Its users can access the system from the web browsers any where in the world at any time.
5)Multi and large application pool :-Large application pool is available for the users.
6)Reliability :- improved design
versions of many redundant website have efficiently increase the performance and suitability of cloud computing more useful.
7)Security :- Security is at the one
level above as compared to the other networks because of the
centralization of data and increased security feature of very individual component.
8)Maintenance :- Cloud computing
systems are flexible and easy to maintain because components
can be added and deleted from the infrastructure

Top 10 Cyber Crime Awareness Tips

Top 10 Cyber Crime Awareness Tips

1. Use Strong Passwords.
2. Secure your computer, Activate
your firewall & Use anti-virus,
3. Be Social, open your eyes on whats new.
4. Secure your Mobile Devices.
5. Install the latest operating
system.
6. Protect your Data.
7. Secure your wireless network.
8. Protect your e-identity.
9. Avoid being scammed.
10. Call the right person for help if
you meet any problem

How to Make Whatsapp Lifetime Free..:) :)

How to Make Whatsapp Lifetime Free

1. First of all you just have to delete WhatsApp from your device.

2. Now you will need an iOS device (for example: iPhone, iPad, iPod) that has not installed WhatsApp and can be any version.

3. Now just install WhatsApp on that device and verify it with your phone number on which you will receive that confirmation message.

4. Now just check if WhatsApp is wo...rking fine, And if you are very lucky you will receive 10 years of free subscription from the bug found.

5. Now you remove WhatsApp from that iPhone and Install WhatsApp on any other device, can be any Android, Blackberry, Windows based.

6. Now your WhatsApp Free For Lifetime subscription on that device too.

to create undeletable and unrenable folder in windows

how to do?
here is the simple steps which u have to follow.....

 How To Create Undeletable And
Unrenamable Folders ?


  • Go to Start and then Click on Run
  • Type cmd & hit enter (To open Command Prompt ).
  • Remember you cannot create Undeletable & unrenamable folder in your root directory (i.e. where the windows is installed) That means you can't make this kind of folder in C: drive if you installed windows on C:
  • Type D: or E: and hit enter
  • Type md con\ and hit enter (md - make directory)
  • You may use other words such as aux, lpt1, lpt2, lpt3 up to lpt9 instead of con in above step.
  • Open that directory, you will see the folder created of name con.
  • Try to delete that folder or rename that folder windows will show the error message.
  • - See more at: http://www.coolhackingtrick.com/2013/07/create-undeletable-and-unrenamable.html#sthash.k7JR7Tlh.dpuf
    1. Go to Start and then Click on
    Run
    2. Type cmd & hit enter (To open Command Prompt ).
    3. Remember you cannot create
    Undeletable & unrenamable
    folder in your root directory
    (i.e. where the windows is
    installed) That means you can't
    make this kind of folder in C:
    drive if you installed windows
    on C:
    4. Type D: or E: and hit enter
    5. Type md con\ and hit enter
    (md - make directory)
    6. You may use other words such
    as aux, lpt1, lpt2, lpt3 up to
    lpt9 instead of con in above
    step.
    7. Open that directory, you will
    see the folder created of name
    con.
    8. Try to delete that folder or
    rename that folder windows will
    show the error message.


     How to delete that folder ?
    It is not possible to delete that
    folder manually but you can delete this folder by another way
    mentioned below.
    1. Open Command Prompt
    2. Type D: ( if u created this type
    of folder in D: drive) & hit enter
    3. Type rd con\ (rd - remove directory)
    4. Open that directory and the
    folder will not appear because
    it is removed.
    How To Create Undeletable And Unrenamable Folders ? - See more at: http://www.coolhackingtrick.com/2013/07/create-undeletable-and-unrenamable.html#sthash.k7JR7Tlh.dpuf
    How To Create Undeletable And Unrenamable Folders ? - See more at: http://www.coolhackingtrick.com/2013/07/create-undeletable-and-unrenamable.html#sthash.k7JR7Tlh.dpuf
    How To Create Undeletable And Unrenamable Folders ? - See more at: http://www.coolhackingtrick.com/2013/07/create-undeletable-and-unrenamable.html#sthash.k7JR7Tlh.dpufvvvvvvvvvvvvvvv


    1. Open youtube and click on any video you would like to play
       2. Pause the videol
       3. Now type 1980 and see the magic - See more at: http://www.coolhackingtrick.com/2013/08/new-awesome-youtube-missile-game-trick.html#sthash.NtSTP8nb.dpuf


    1. Open youtube and click on any video you would like to play
       2. Pause the videol
       3. Now type 1980 and see the magic

    Once you start this game missile will start coming from the top. The job of missile is to destroy the video. You can protect the video by firing back using your mouse. - See more at: http://www.coolhackingtrick.com/2013/08/new-awesome-youtube-missile-game-trick.html#sthash.NtSTP8nb.dpuf


    1. Open youtube and click on any video you would like to play
       2. Pause the videol
       3. Now type 1980 and see the magic

    Once you start this game missile will start coming from the top. The job of missile is to destroy the video. You can protect the video by firing back using your mouse. - See more at: http://www.coolhackingtrick.com/2013/08/new-awesome-youtube-missile-game-trick.html#sthash.NtSTP8nb.dpuf
    1. Open youtube and click on any video you would like to play
       2. Pause the videol
       3. Now type 1980 and see the magic

    Once you start this game missile will start coming from the top. The job of missile is to destroy the video. You can protect the video by firing back using your mouse. - See more at: http://www.coolhackingtrick.com/2013/08/new-awesome-youtube-missile-game-trick.html#sthash.NtSTP8nb.dpuf

    Disable the hard drives

    Hide Hard Drives Partitions...!
    .
    .
    .
    (C:,D:,E: etc.)
    .
    .
    .
    This is a great trick you can play on your friends. To disable the display of local or networked drives when you click My Computer.
    .
    .
    .
    1.Go to start->run.Type regedit.

    Now go to:

    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

    Now in the right pane create a new DWORD item and name it NoDrives(it is case sensitive). Now modify it's value and set it to 3FFFFFF (Hexadecimal) .Now restart your computer. So, now when you click on My Computer, no drives will be shown(all gone...). To enable display of drives in My Computer, simply delete this DWORD item that you created.Again restart your computer.You can now see all the drives again.

    Saturday, 3 August 2013

    How to Download Torrent Files With IDM for free?

    Steps::

    1)First Download Internet Download Manager from this link>>>
                    
             http://hackthehacker.webs.com/hackingtoolsfree.htm

    2)Now copy any Torrent link Address or Download The Torrent File.


    3)Now visit site: zbigz.com

    4)Paste the Link address or Upload the Torrent File.

    5)Now click on Go Free

                     Thats it!

    Facebook ShortCut Keys

    For Facebook Help Center - Shift+Alt+0

    For Facebook Home Page - Shift+Alt+1

    For Your Facebook Profile Page - Shift+Alt+2

    For Friend Request - Shift+Alt+3

    For Messages - Shift+Alt+4

    For Notification - Shift+Alt+5

    For Account Settings - Shift+Alt+6

    For Privacy Settings - Shift+Alt+7

    For Facebook Pages - Shift+Alt+8

    For Facebook Terms of Use - Shift+Alt+9

    For enable Search - Shift+Alt+?

    For Compose a New message - Shift+Alt+m

    Enjoy::

    Awesome Youtube Tricks


    Awesome Youtube Tricks..:-)
    1.Go to you tube
    2.select any video
    3.Pause the video at 0:00.
    4.Go full screen
    5.Press the LEFT arrow key, while also pressing the UP arrow key [So you're pressing them both at the same time]
    6. Let it go
    7.Then tap both of them at the same time.
    8. Enjoy your game of SNAKE...

    Microsoft ShortCut Keys Keyboard Shortcuts

    Ctrl + A      Select all (including text, graphics).

    Ctrl + B      Bold.

    Ctrl + I      Italic.

    Ctrl + U      Underline.

    Ctrl + C      Copy.

    Ctrl + V      Paste.

    Ctrl + X      Cut.

    Ctrl + F      Find.

    Ctrl + Z      Undo.

    Ctrl + K      Insert link.

    Ctrl + L      Left align.

    Ctrl + E      Center align.

    Ctrl + R      Right align.

    Ctrl + M      Indent.

    Ctrl + (left arrow)     Moves one word to the left.

    Ctrl + (right arrow)     Moves one word to the right.

    Ctrl + (up arrow)     Moves cursor to the beginning of the paragraph.

    Ctrl + (down arrow)     Moves cursor to the end of the paragraph.

    Ctrl + Shift + F     Change font.

    Ctrl + Shift + *     View/hide non-printing characters.

    Ctrl + Del     Deletes word to the right of cursor.

    Ctrl + Backspace     Deletes word to the left of cursor.

    Ctrl + End     Moves cursor to the end of document.

    Ctrl + Home     Moves cursor to the beginning of document.

    Ctrl + Spacebar     Reset highlighted text to the default font.

    Ctrl + 1     Single-space.

    Ctrl + 2     Double-space.

    Ctrl + 5     1.5-line.

    Ctrl + Alt + 1     Format text: heading 1.

    Ctrl + Alt + 2     Format text: heading 2.

    Ctrl + Alt + 3     Format text: heading 3.

    F1     Help.

    F4     Repeat the last action

    F5     Go to .

    F7     Spelling and grammar.

    F12     Save as.

    F8 then (left arrow)     Increase selection to the left by one character

    F8 then (right arrow)     Increase selection to the right by one character

    Ctrl + F1     Task Pane.

    Ctrl + F2     Print preview.

    Alt + Ctrl + F2     New document.

    Shift + F3     Cycle between capitalized formats

    Ctrl + Insert     Copy.

    Shift + Insert     Paste.

    Shift + End     Select from current position to the end of the line.

    Shift + Home     Select from current position to the beginning of the line.

    Ctrl + Shift + (left arrow)     Select from current position to the beginning of the word.

    Ctrl + Shift + (right arrow)     Select from current position to the end of the word.

    Ctrl + Shift + (up arrow)     Select from current position to the beginning of the document.

    Ctrl + Shift + (down arrow)     Select from current position to the end of the document.

    Ctrl + Shift + Page Up     Select from current position to the beginning of the window.

    Ctrl + Shift + Page Down     Select from current position to the end of the window.

    Shift + Page Up     One screen page up.

    Shift + Page Down     One screen page down.

    Shift + F7     Thesaurus check selected text.

    Shift + F12     Save.

    Ctrl + Shift + F12     Print.

    Alt + Shift + D     Insert the current date.

    Alt + Shift + T     Insert the current time.


    Enjoy guys!!!!1111

    Top 25 Application Secrets in Windows XP

    There are some hidden secrets inside the application
    window XP and sometimes we do not know ...
    the following list is a list of confidential applications are:


    To run the applications below:[/color]
    Open a command prompt and Type the name of the program (example:
    cleanmgr.exe)
    or click Start -> Run and Type in the name of the program (example: cleanmgr.exe).


    1. Disk Cleanup = cleanmgr.exe
    Used to cleanup disk

    2. Character Map = charmap.exe
    Used to search for unusual characters

    3. Dr Watson = drwtsn32.exe
    Used for troubleshooting on the PC.

    4. DirectX diagnosis = dxdiag.exe
    Used for diagnosis audio video card

    5. Private character editor = eudcedit.exe
    Used to create a new character in your windows

    6. IExpress Wizard = iexpress.exe
    Used to create self-extracting / self-installing package. such as a Zip file

    7. MICR * Synchronization Manager = mobsync.exe soft
    Used to make sincronisasi.

    8. Clipboard Viewer = clipbrd.exe
    Used to view the content of the Windows clipboard

    9. Windows Media Player 5.1 = mplay32.exe
    Used to open Windows Media Player version 5.1

    10. ODBC Data Source Administrator = odbcad32.exe
    Used for database

    11. Object Packager = packager.exe
    Used to insert an object into a file.

    12. System Configuration Editor = sysedit.exe
    Used to change the system.ini and win.ini

    13. Syskey = syskey.exe
    Used to configure an account on the windows.

    14. MICR * soft Telnet Client = telnet.exe
    Used to connect to the Internet before there was a browser.

    15. Driver Verifier Manager = verifier.exe
    Used for monitoring drivers in your windows

    16. Windows for Workgroups Chat = winchat.exe
    Used to chat sec

    17. System configuration = msconfig.exe
    Used to control startup programs

    18. System Monitor = perfmon.exe
    Used to monitor your PC.

    19. Program Manager = progman.exe
    Is inherited from Windows 3.x desktop shell

    20. gpedit.msc
    Used to set the group policy and authorization, if you use Active Directory.

    21. Remote Access phone book = rasphone.exe
    It is applications like phone book

    22. Registry Editor = Regedt32.exe [also regedit.exe]
    Used for tweaking and editing windows registry

    23. Network shared folder wizard = shrpubw.exe
    Used to create a shared network folder

    24. Siganture file verification tool = sigverif.exe
    Used to verify signatures

    25. Volume Control = sndvol32.exe
    Used to display the sound control in the System Tray

    Partition a Drive Without Losing Data

    Wishes to partition your hard drives? But, partitioning a drive in windows will needed us to format the drive. In this tutorial, I will teach you how to partition a drive without need to backup your data and format your drives. You might wonder if this trick need you  to downloadsome softwares or tools. Do not worry because this trick is 100% download-free. We just gonna use a built in windows tool.

    This trick had been tested on Windows7 and Vista. I'm not sure that this trick will work onwindows XP. This trick allows you to partition any drive including system drives.

    Okay, first of all open Run dialog box ( Start > Run ). Type in "diskmgmt.msc" without the quotes in the text box. Wait until Disk Management window pop up. It may take a few seconds to load. After it’s fully loaded, go to Storage > Disk management at the left sidebar. Now you could see a list of storage devices that are currently connected to your computer. Now choosethe drive that you want to partition. Right Click on it and select "Shrink Volume" option from menu.


    The system will search for available space in your selected disk volume. A window will pop up asking you to wait while it loads. This will not take much longer than few seconds. Next the Shrink dialog box will pop-up. This is where you’ll have to specify the volume for next partition. Look at the total size of available shrink space. Below it, you’ll have to enter the space to shrink.


    To make sure that you not losing any data, shrink size is not below the total size of space taken by files in that drive. You can check the used space by right clicking on the drive you are going to partition and choose "Properties" from the menu.


    After done shrinking your drive. You can see an unallocated space in your shrunk drive. But you’ll still not able to access this new drive. You’ll have to format it and specify the drive letter to access them. Right click on unallocated drive and choose "New Simple Volume" option.


    New Simple Volume Wizard Window will pop up. Click on "Next" button to continue. In next window, you’ll have to specify the size for your new volume. Set full size if you are satisfied with two partitions or you can divide it again for new partition. Next, choose any drive letter from the available list and click on "Next" button. In next window, leave everything as default but make sure it's similar to the screen below ( If you want to change the volume label, feel free to do it ).


    Click on Finish window to complete the wizard. Go to My Computer and you can see your new drive. That is all. Hope this tutorial will help you. Enjoy.

    Easy Way To Send .EXE Files From Gmail


    Easy Way To Send .EXE Files From Gmail
    As we all know that Gmail don't allow to send executable files. When user will try to send it, everything will work fine until sending it, but when user will click on send button it will display message as "hack.exe is an executable file. For security reasons, Gmail does not allow you to send this type of file." So
    that means user can't send .exe files. I'm sharing one trick by which user can easily send any type of attachment through gmail. Follow these steps:

        Select file which you wanna to send. Suppose I selected hack.exe
        Now Go to Folder Option( Type control in run, then look for folder option).
        Go to view tab
        Uncheck, hide extensions for unknown file types. Apply & then Ok.
        Now rename the file hackerlov.exe with hackerlov.ex
        To receiver inform about changing extension & ask them to renamed it with .exe extension.
        That's all.

    You can also send it via winzip or winrar, but some time Gmail scans internally in these files too.

    G mail dot(.) trick fool any site

    Its very useful trick, with that trick u Able create many account in One
    Site,
    read that!
    if u Have only one G mail Id,
    and u want to Reg. on any Site second time, and
    They not Allowed One email two Times, then u
    Use that Trick,
    trick is that!
    u add one or more dots(.) in old email id,
    Suppose your old id is- hackermail@gmail.com On next time u Use!
    hacker.mail@gmail.com,hacker..mail@gmail.com,or just insert many dot(.)in your G mail id
    with that Ur registration Success! and,
    if u think!
    "Which id we get Conformation mail" don't Worry u Get confirmation mail on Ur Real
    id

    Friday, 2 August 2013

    How to Shutdown PC with timer

    Do you know that you can make your PC shutdown at a time u wish to?
    Here is the trick!!
    How To Make A Shutdown Timer!
    ********** METHOD 1 ***************
    1. Right click on your desktop and choose "New=>shortcuts".
    2. In the box that says "Type the location of the shortcut",
    type in "shutdown -s -t 3600" without the quotation marks and click next. Note: 3600 are the amount of seconds before your computer shuts down. So , 60secs*60mins=3600secs.
    3. Make up a name for the shortcut and you're done.
    You can change the icon by right clicking=>properities=>change icon=>browse
    TO ABORT:
    To make an abort key to stop the shutdown timer just create another shortcut and make
    the "location of the shortcut" to " shutdown -a" without the quotes.
    ********* METHOD 2 *************
    Here is another trick to shutdown at a specific time, for example you wish to shutdown at 11:35am. Type this in

    start=>Run
    Type Code: at 11:35 shutdown -s

    TO ABORT:
    Code:shutdown -a

    How to retrieve a website IP



    1) Open CMD
    2) Type this code in:
    ping <website_name_here.xyz>

    3) Replace <website_name_here.xyz> with any website. For example: ping www.Google.com

    4) CMD should return the website's IP
    pinging www.Google.com [74.125.225.114] with 32 bytes of data:

    5) 74.125.225.114 is Google's external IP.

    Saturday, 20 July 2013

    How to make Desktop Icons Transparent

    How to make your Desktop Icons Transparent:-

    So
    today I am going to show you how to make your desktop Icon transparent. So follow the below Steps…

    1)First of all go to Control Panel

    2)In Control Panel open System

    3)Now in that System Properties go to “Advance“ Tab.

    4)In Performance area click on Settings

    5)Now in Performance Option window Check “Use drop shadows for icon labels on the Desktop” from the list below custom; then Click on Apply and then OK.

    DONE!!!

    Wednesday, 17 July 2013

    Rename start button in xp


    To rename the start button, you will need a hex editor.
    My preference is UltraEdit

    Copy the \windows\explore.exe file to a new name (e.g. explorer_1.exe)
    With the hex editor, open that file and go to offset 412b6
    You will see the word start with blanks between each letter
    Edit it be any 5 characters or less
    Save the file
    Boot to DOS
    Copy the existing c:\windows\explorer.exe to explorer.org
    Copy explorer_1.exe to explorer.exe
    You will also need to replace the explorer.exe in the c:\windows\system32\dllcache file as well with the new one.
    Note: If the partition is NTFS and you can't access the files from DOS:

    Start Regedit
    Go to HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon.
    Change the value of Shell from Explorer.exe to explorer_1.exe

    5 important computer tricks

    Don't just maximize your windows—go full screen

    When you need a really big window, don't just maximize it: go full screen! To view a window full screen, hold down the Ctrl key and double-click the window's title bar—or when the window is active, press the F11 key at the top of your keyboard—to get the biggest window possible.Full-screen screenshot

    Add the Links toolbar to My Computer

    You know what would make a great toolbar? One where you could put your favorite applications and documents so that you could open them from any window at any time. Guess what? You can and here's how: click Start, then My Computer. Now right-click the toolbar and then click Links. You now have the Links toolbar on your windows, just like in Internet Explorer. Note: Make sure that Lock the Toolbars is not checked. Click on it to deselect it if it is.The really cool thing about the Links toolbar is that it's completely customizable. Try this: Navigate to your favorite application and drag and drop its icon to the Links toolbar. You just created a shortcut. Do this again and again for as many applications as you want to appear on the toolbar.Links toolbar screenshot

    Arrange windows on your desktop

    You can display any two windows side by side on the desktop by first clicking a window's button on the Taskbar. Next, press and hold the Ctrl key and right-click the second window that you want to open, then click Tile Vertically. This works great when you want to view two Microsoft Word or Microsoft Internet Explorer windows at the same time.Tile Vertically screenshot

    Organize your files into groups

    Organize your files by grouping them. Try this: Open a folder containing several different subfolders and file types. Right-click any empty space on the window's contents pane, click Arrange Icons By, and then click Show in Groups. To arrange the window's contents, right-click again in any empty space on the window's contents pane, point to Arrange Icons By, and click Name, Size, Type, or Modified.Arrange Icons By screenshot

    Make your own icons

    It's shockingly easy to create your own icons in Windows XP. Let's do it: Click Start, click All Programs, click Accessories, and then click Paint. On the Image menu, click Attributes. Type 32 for both the Width and Height of the document, and make sure that Pixels is selected under Units. Click OK to create a new 32x32-pixel document: the size of an icon.Now add type, color, or do whatever you'd like to your image. I like to shrink photos (headshots work best) to 32x32 and simply paste them into my Paint document. When you're finished, open the File menu and click Save As. Use the dialog box to choose where you want to save your file, then give it a name followed by ".ico" (without the quotes), and click Save. (The extension ".ico" tells Windows that it's an icon file.) You just created an icon! Now you can change any shortcut or folder to your own icon—just browse to it on your hard drive.Attributes screenshotThese tips are from the book, Windows XP Killer Tips by Kleber Stephenson, ISBN 073571357X. Published here with the permission of Pearson Education, Inc.

    Clear BIOS password


    TRICK TO REMOVE BIOS PASSWORD


    HERE WE STARTS:-

    At command prompt type debug
    you will get a - prompt where you can type the fallowing ( means hit enter, not type enter*)

    A
    MOV AX,0
    MOV AX,CX
    OUT 70,AL
    MOV AX,0
    OUT 71,AL
    INC CX
    CMP CX,100
    JB 103
    INT 20
    just hit enter on this line
    G
    Q


    Basic BIOS password crack -


    This is a password hack but it clears the BIOS such that the next time you start the PC, the CMOS does not ask for any password. Now if you are able to bring the DOS prompt up, then you will be able to change the BIOS setting to the default. To clear the CMOS do the following:
    Get DOS prompt and type:
    DEBUG hit enter
    -o 70 2e hit enter
    -o 71 ff hit enter
    -q hit enter
    exit hit enter
    Restart the computer. It works on most versions of the AWARD BIOS.

    Tricks u don't know about ur pc


    Get Max. download speed from ur Lan n/w here is a simple trick to increase ur download speed 4m Lan Connection … so here is steps to follow: Step 1 :Open ur Device Manager from there locate ur network card & double click on it…. and in advance tab of Network properties locate duplex speed then on right hand side select ½ duplex this is the condition on which Speed depends: so do this and reply whether it works on ur PC on not…!!!
    change start up and shutdown of your win xp
    Have you ever felt bugged-up with the Start-up and Shutdown jingle of your Windows XP or Vista ? If yes, here is the solution, now you use any of your favorite voice or music or dialogue as your PC’s shutdown and start up.It’s a simple 4 step process. Step 1. Choose the track which you want to play at start-up and shutdown jingles,Limitations are* It should be in .WAV format.* The size of file should not be large, prefer keeping them within in 1 Mb, otherwise your startup will take a bit longer.If the file you want to make your start-up or shutdown is not in .WAV format, you can easily convert them using any converter. Step 2. Now rename these files as “Windows XP Startup.WAV” and “Windows XP Shutdown.WAV” respectively. Step 3.Now Go to “C:\WINDOWS\MEDIA”, here you will find files “Windows XP Startup.WAV” and “Windows XP Shutdown.WAV”, move them to some other locations, this step is required for, in case you need to revert back these sounds, else you can ignore this step. Step 4. Now the files you have chosen and renamed, just copy-paste or cut paste them in “C:\WINDOWS\MEDIA”, here you go, now you can enjoy the new Start-up and shutdown.
    restricted pc shutdown
    Both Vista and Windows XP let you take control of preventing a user not to shutdown the machine by editing the group policy. For example if your friend is using your computer and you went somewhere ( and you have still some unsaved document left) and he shutdowns the pc without saving them…you loose a good amount of data. ( Trust me I have lost one whole blog post and project code at same time ). This is what you can doRestrict PC Shutdown* Type gpedit.msc in run dialog box [ WIN KEY + R ]* This will open Group Policy Editor. Now there are two things in it, Computer Configuration and User Configuration* Click on User Configuration > Administrative Templates > Start Menu and Task Bar* Now look for “remove and prevent access to shutdown command”* Double Click and Enable it.* Exit the group policy editor.This setting removes the Shut Down option from the Start menu and disables the Shut Down button on the Windows Security dialog box, which appears when you press CTRL+ALT+DEL. This setting prevents users from using the Windows user interface to shut down the system.Now if you try to shutdown by clicking on start , the shutdown button must have disappeared. Moreover check the task manager and you will find all shutdown,restart and others disabled except switch user.

    screenshotscreen.....
    Screen Shot….Hold down the control key and look in the upper right side above your letter keys for “Print Screen SysRq” or “Prnt Scrn” or something to that effect and hit it.Next, open a new file in “Paint” (Probably Start/Programs/Accessories/Paint).Next under Edit, select Paste.Next, under File, select “save as” give it a name, and be to sure choose JPEG where it says Save as Type.You can now make screenshots of whatever you wish. This is cool.To get the large size of Screen press F11 & then repeat above procedure again……
    safe mode in boot list

    Safe mode is required when you have to fix a problem such as virus infection or uninstalling drivers in your windows XP. generally we need to use F8 Key to get into safe mode and if not timed properly you will need to restart windows xp again. Here is a small trick which lets you add Safe mode by default into your Boot list. You will see it when you restart your windows xp machine.Steps to Add Safe Mode in Boot list* Go to control panel > System.* Click on Advanced Tab.* Then click on settings under the startup and recovery action.* Click on edit under system startup to indirectly edit your boot.ini file.* Add the following entry “multi(0)disk(0)rdisk(0)partition(2)\WINDOWS=”XP - Safe Mode” /fastdetect /safeboot:minimal /sos /bootlog” without quotes .Add safe mode to your boot listThats it, restart your machine and you will see another label as “XP- Safe Mode” added to the list.PS: This option is also used for adding any other windows installation on other partition. Read the rest of this

    some tricks

    This is a complimation of computer tricks, mainly security and privacy related.

    Getting Ip’s:–

    To see the ip all computers you are connected to (web servers, people attempting to **** into your computer).Go to dos (start>run>type command) and run the netstat command. Type netstat /? for details.

    Type netstat -r at the command prompt to see the ip of all computers you are connected to

    In MSN (and other programs) when you are chatting to someone everything you type goes through the MSN servers first (they act as a proxy) so you see their ip rather than who you are chatting to. You can get round this by sending them a file as MSN doesn’t send file through its proxy.When you type the netstat -r (or -a for a different view) the ip’s are under the foreign address table. The ports are seperated by a : . Different programs use different ports, so you can work out which ip’s are from which program.

    Connecting to other computers and what ports are:–

    Servers send information. Clients retrieve. Simple.Windows comes with a built in program to connect to other computers called telnet.To start Windows telnet Start menu> Run> type Telnet. Click connect> remote systemPorts are doors into computers. Hosts are computer names(ip number or a name that is translated into the ip automatically)Different programs open different ports, but they always open the same ports so other computers know which port to connect to. You can get a port list listing all the different ports, but a basic one is:11 :- Sends info on the computer21 :- FTP (File transfer program)23 :- Telnet (Login to the computers command line)25 :- Smtp (Sends mail)80 :- Http (Web pages
    )There are thousands of different programs using different ports. You can get programs called portscanners which check a computer for all ports up to a certain number, looking for ways in. You can portscan a computer looking for ways-in.Anyway, back to telnet.Type www.yahoo.com as the host and port as 80 the click connect.If nothing happens, you’re in. Wow. You are connected to Yahoo’s server.You can now type http commands (you are connected to an http server, so it supports http commands). Ie. on an ftp server you can type open and it will do something. On an http server it will just wonder what the hell you are on about.Type get / http/1.0 then press enter twice to get the file on the server at / (try /index.html) etc.)

    Making undeletable, unreadable folders

    Tested on Windows 95/98By holding down alt, then typing numbers on the number pad (right of the keyboard) you can create special characters. If you hold down alt, then press 1, then let go, you got the ascii character 1. You try some randomn numbers. This goes all the way up to 255. Open a dos prompt, and type md (alt+1+9+4)someword. md is the dos command to make a directoy, now try and open the directory in Windows, you can’t. To open it, type ren (alt+1+9+4)someword someword (ren is the dos command to rename)

    Proxies

    Proxies are computers that you connect through, hiding your computer. Most aren’t anonymous, they give away your ip. Some are. Good anonymous proxies: mail.uraltelecom.ru:8080 and 194.247.87.4:8080.Different programs require different ways of using proxies. To do it in internet explorer 5 go to tools, internet options, connections, settings. In the above proxies they are in the format host:port

    Password files

    If you lock yourself out of Windows stuff, all passwords are stored in files called *.pwl in C:windows.In Unix, passwords are normally stored at etc/passwd. This can be viewed using the cat command (prints a file to screen): cat etc/passwd. Make sure you’re passwords are shadowed (not actually in etc/passwd). Also make sure they aren’t in a file called shadow, especically not in a file called etc/shadow.Unix passwords are encrypted far better than Windows one’s (to be fair, Windows 95 isn’t designed for users), but can still be cracked through a program called jon.

    Faster Computer Tips & Tricks


    Program Run Command
    Accessibility Controls access.cpl
    Accessibility Wizardaccwiz
    Add Hardware Wizardhdwwiz.cpl
    Add/Remove Programsappwiz.cpl
    Administrative Toolscontrol admintools
    Adobe Acrobat ( if installed )acrobat
    Adobe Distiller ( if installed )acrodist
    Adobe ImageReady ( if installed )imageready
    Adobe Photoshop ( if installed )photoshop
    Automatic Updateswuaucpl.cpl

    Basic Media Playermplay32
    Bluetooth Transfer Wizardfsquirt

    Calculatorcalc
    Ccleaner ( if installed )ccleaner
    C: Drivec:
    Certificate Managercdrtmgr.msc
    Character Mapcharmap
    Check Disk Utilitychkdsk
    Clipboard Viewerclipbrd
    Command Promptcmd
    Command Promptcommand
    Component Servicesdcomcnfg
    Computer Managementcompmgmt.msc
    Compare Filescomp
    Control Panelcontrol
    Create a shared folder Wizardshrpubw

    Date and Time Propertiestimedate.cpl
    DDE Sharesddeshare
    Device Managerdevmgmt.msc
    Direct X Control Panel ( if installed )directx.cpl
    Direct X Troubleshooterdxdiag
    Disk Cleanup Utilitycleanmgr
    Disk Defragmentdfrg.msc
    Disk Partition Managerdiskmgmt.msc
    Display Propertiescontrol desktop
    Display Propertiesdesk.cpl
    Display Properties (w/Appearance Tab Preselected )control color
    Dr. Watson System Troubleshooting Utilitydrwtsn32
    Driver Verifier Utilityverifier

    Ethereal ( if installed ) ethereal
    Event Viewereventvwr.msc

    Files and Settings Transfer Toolmigwiz
    File Signature Verification Toolsigverif
    Findfastfindfast.cpl
    Firefoxfirefox
    Folders Propertiescontrol folders
    Fontsfonts
    Fonts Folderfonts
    Free Cell Card Gamefreecell

    Game Controllersjoy.cpl
    Group Policy Editor ( xp pro )gpedit.msc

    Hearts Card Gamemshearts
    Help and Supporthelpctr
    Hyperterminalhypertrm
    Hotline Clienthotlineclient

    Iexpress Wizardiexpress
    Indexing Serviceciadv.msc
    Internet Connection Wizardicwonn1
    Internet Propertiesinetcpl.cpl
    Internet Setup Wizardinetwiz
    IP Configuration (Display Connection Configuration)ipconfig /all
    IP Configuration (Display DNS Cache Contents)ipconfig /displaydns
    IP Configuration (Delete DNS Cache Contents)ipconfig /flushdns
    IP Configuration (Release All Connections)ipconfig /release
    IP Configuration (Renew All Connections)ipconfig /renew
    IP Configuration (Refreshes DHCP & Re-Registers DNS)ipconfig /registerdns
    IP Configuration (Display DHCP Class ID)ipconfig /showclassid
    IP Configuration (Modifies DHCP Class ID)ipconfig /setclassid

    Java Control Panel ( if installed )jpicpl32.cpl
    Java Control Panel ( if installed )javaws

    Keyboard Propertiescontrol keyboard

    Local Security Settingssecpol.msc
    Local Users and Groupslusrmgr.msc
    Logs You Out of Windowslogoff

    Malicious Software Removal Toolmrt
    Microsoft Access ( if installed )access.cpl
    Microsoft Chatwinchat
    Microsoft Excel ( if installed )excel
    Microsoft Diskpartdiskpart
    Microsoft Frontpage ( if installed )frontpg
    Microsoft Movie Makermoviemk
    Microsoft Management Consolemmc
    Microsoft Narratornarrator
    Microsoft Paintmspaint
    Microsoft Powerpointpowerpnt
    Microsoft Word ( if installed )winword
    Microsoft Syncronization Toolmobsync
    Minesweeper Gamewinmine
    Mouse Propertiescontrol mouse
    Mouse Propertiesmain.cpl
    MS-Dos Editoredit
    MS-Dos FTPftp

    Nero ( if installed )nero
    Netmeetingconf
    Network Connectionscontrol netconnections
    Network Connectionsncpa.cpl
    Network Setup Wizardnetsetup.cpl
    Notepadnotepad
    Nview Desktop Manager ( if installed )nvtuicpl.cpl

    Object Packagerpackager
    ODBC Data Source Administratorodbccp32
    ODBC Data Source Administratorodbccp32.cpl
    On Screen Keyboardosk
    Opens AC3 Filter ( if installed )ac3filter.cpl
    Outlook Expressmsimn

    Paintpbrush
    Password Propertiespassword.cpl
    Performance Monitorperfmon.msc
    Performance Monitorperfmon
    Phone and Modem Optionstelephon.cpl
    Phone Dialerdialer
    Pinball Gamepinball
    Power Configurationpowercfg.cpl
    Printers and Faxescontrol printers
    Printers Folderprinters
    Private Characters Editoreudcedit

    Quicktime ( if installed )quicktime.cpl
    Quicktime Player ( if installed )quicktimeplayer

    Real Player ( if installed ) realplay
    Regional Settingsintl.cpl
    Registry Editorregedit
    Registry Editorregedit32
    Remote Access Phonebookrasphone
    Remote Desktopmstsc
    Removable Storagentmsmgr.msc
    Removable Storage Operator Requestsntmsoprq.msc
    Resultant Set of Policy ( xp pro )rsop.msc

    Scanners and Camerassticpl.cpl
    Scheduled Taskscontrol schedtasks
    Security Centerwscui.cpl
    Servicesservices.msc
    Shared Foldersfsmgmt.msc
    Sharing Sessionrtcshare
    Shuts Down Windows shutdown
    Sounds Recordersndrec32
    Sounds and Audiommsys.cpl
    Spider Solitare Card Gamespider
    SQL Client Configurationclicongf
    System Configuration Editorsysedit
    System Configuration Utilitymsconfig
    System File Checker Utility ( Scan Immediately )sfc /scannow
    System File Checker Utility ( Scan Once At Next Boot )sfc /scanonce
    System File Checker Utility ( Scan On Every Boot )sfc /scanboot
    System File Checker Utility ( Return to Default Settings)sfc /revert
    System File Checker Utility ( Purge File Cache )sfc /purgecache
    System File Checker Utility ( Set Cache Size to Size x )sfc /cachesize=x
    System Informationmsinfo32
    System Propertiessysdm.cpl

    Task Managertaskmgr
    TCP Testertcptest
    Telnet Clienttelnet
    Tweak UI ( if installed )tweakui

    User Account Management nusrmgr.cpl
    Utility Managerutilman

    Volume Serial Number for C:label
    Volume Controlsndvol32

    Windows Address Bookwab
    Windows Address Book Import Utilitywabmig
    Windows Backup Utility ( if installed )ntbackup
    Windows Explorerexplorer
    Windows Firewallfirewall.cpl
    Windows Installer Detailsmsiexec
    Windows Magnifiermagnify
    Windows Management Infrastructurewmimgmt.msc
    Windows Media Playerwmplayer
    Windows Messengermsnsgs
    Windows Picture Import Wizard (Need camera connected)wiaacmgr
    Windows System Security Toolsyskey
    Windows Script host settingswscript
    Widnows Update Launcheswupdmgr
    Windows Version ( shows your windows version )winver
    Windows XP Tour Wizardtourstart
    Wordpadwrite

    Zoom Utilityigfxzoom