Wednesday, 9 October 2013

Android Secrete Codes

Android Secrete codes
------------------------------------
1. Phone Information, Usage and Battery – *#*#4636#*#*
2. IMEI Number – *#06#
4. Detailed Camera Information – *#*#34971539#*#*
5. Backup All Media Files – *#*#273282*255*663282*#*#*
6. Wireless LAN Test – *#*#232339#*#*
7. Enable Test Mode for Service – *#*#197328640#*#*
8. Back-light Test – *#*#0842#*#*
9. Test the Touchscreen – *#*#2664#*#*
10. Vibration Test – *#*#0842#*#*
11. FTA Software Version – *#*#1111#*#*
12. Complete Software and Hardware Info – *#12580*369#
13. Diagnostic Configuration – *#9090#
14. USB Logging Control – *#872564#
15. System Dump Mode – *#9900#
16. HSDPA/HSUPA Control Menu – *#301279#
17. View Phone Lock Status – *#7465625#
18. Reset the Data Partition to Factory State – *#*#7780#*#*
19. Format Your Device To Factory State(will delete
everything on your phone) – *2767*3855#

HOW TO TURN ON P.C IN 10 SECOND

Wanna to know how to turn the pc on in 10 seconds
(may vary)
Sart ->Run
type Regedit
press enter
this will open Registery Editor
now look for the key
HKEY_LOACAL_MECHINE\SYSTEM\CurrentControlSet
\Control\ContentIndex
now there find the Key Called
"Startup Delay"
Double Click On It
Now where its Base
Click Decimal
Now its Default Value Is 4800000 (75300:hexadecimal)
Change The Value To 40000
here u go u have done it
now close the Registery Editor and Restart Your
Computer

Computer Devices & their Inventors Key board—

Herman Hollerith first keypunch devices in
1930’s
Transistor— John Bardeen, Walter Brattain & Wiliam
Shockley ( 1947-48)
Integrated Circuit— Jack Kilby & Robert Noyce( 1958)
Trackball— Tom Cranston and Fred Longstaff (1952)
Computer Mouse — Douglas Engelbart (1964)
Microprocessor – Intel 4004 Computer Microprocessor—
Faggin, Hoff & Mazor(1971)
Floppy Disk— Alan Shugart &IBM
RAM— An Wang at Harvard University’s Computation Lab
and Jay Forrester at MIT.1951
Laser printer— Gary Starkweather at XEROX in 1969.
Hard Disk— The IBM Model 350 Disk File by IBM in 1956
(was the first hard disk drive and was part of the IBM 305
RAMAC computer that IBM started delivering in)
First PC— the IBM 5100 Portable Computer by IBM
First laptop— Grid Compass 1100 (called the GRiD) and
was designed in 1979 by a British industrial designer, Bill
Moggridge.

Password Protect Any Folder Without Any Software

1. Open Notepad and Copy code given below into it.
cls
@ECHO OFF
title
if EXIST "Control Panel.{21EC2020-3AEA-1069-
A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST MyFolder goto MDMyFolder
:CONFIRM
echo Are you sure to lock this folder? (Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren MyFolder "Control Panel.{21EC2020-3AEA-1069-
A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-
A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock Your Secure Folder
set/p "pass=>"
if NOT %pass%== coolhacks goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-
A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-
A2DD-08002B30309D}" MyFolder
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDMyFolder
md MyFolder
echo MyFolder created successfully
goto End
:End
2. Save the notepad file as lock.bat (.bat is must)
3. Now double click on lock.bat and a new folder will
be created with name MyFolder
4. Copy all your data you want to protect in that New
folder
5. Now double click on lock.bat and when command
promp appears Type Y and press enter.
6. Now MyFolder will be hidden from you view, to
access that folde double click on lock.bat
7. It will ask for password enter your password and
done. (Default password is coolhacks )
To change the password
replace coolhacks with new password in
the above code
You might be thinking that anyone can access the
password by opening that lock.bat file in Notepad or
any other text editor. To make it more secure hide
lock.bat in some secure location after following the
above tutorial To access the secured file double click on
lock.bat. I would suggest copying lock.bat file into
Pendrive and copying it into your computer whenever
you required to access to your protected files.

Interesting facts of Internet

HTTP:-Hyper Text Transfer Protocol
HTTPS:-Hyper Text Transfer Protocol Secure
IP:-Internet Protocol
URL:-Uniform Resource Locator
USB:-Universal Serial Bus
VIRUS:-Vital Information
ResourceUnder Sezied
3G:-3rd Generation
GSM:-Global System for Mobile
Communication
CDMA:-Code Division Multiple
Access
UMTS:-UniversalMobile
Telecommunication System
SIM:-SubscriberIdentity Module
AVI:-Audio Video Interleave
RTS:-Real time Streaming
SIS:-Symbian OS Installer File
AMR:-Adaptive Multi-Rate Codec
JAD:-Java Application Descriptor
JAR:-Java Archive
3GPP:-3rd Generation Partnership
Project
3GP:-3rd Generation Project
MP3:-MPEG Player 3
MP4:-MPEG -4 video Files
AAC:-Advanced Audio Coding
GIF:-Grapjic InterchangeableFormat
BMP:-Bitmap
SWF:-Shock Wave Flash
WMV:-Windows media Audio
WMA:-Window Media Audio
PNG:-Portable Network Graphic
DOC:-Document (Microsoft
Corporation)
PDF:-Portable Document Format
M3G:-Mobile 3D Graphics
M4A:-MPEG-4 Audio File
NTH:-Nokia Themes
THM:-Themes(Sony Ericsson)
MMF:-Synthetic Music Mobile
Application File
NRT:-Nokia Ringones
XMF:-ExtensibleMusic Files
WBMP:-Wireless Bitmap Image
DVX:-DivX Video
HTML:-Hyper Text Markup Language
WML:-Wireless Markup Language
CD:-Compact Disk
DVD:-Digital Versatile Disk
CRT:- Cathode Ray Tube
DAT:-Digital Audio Tape
DOS:-Disk Operating System
GUI:-Graphical User Interface
TCP:-Transsmission Control Protocol
UPS:-Uninterruptible Power Supply
HSDPA:- High Speed Downlink Packet Access
EDGE:-Enhanced Data Rate for GSM Evolution
VHF:-Very High Frequency
UHF:-Ultra High Frequency
GPRS:-General Packet Radio Services
WAP:-Wireless Application Protocol
ARPANET:-Advanced Research Project Agency Network
IBM:-International Bussiness Machines
HP:-Hewlett Packard
AM/FM:-Amplitute/Frequency Modulation
LAN:- Local Area Network
WLAN:-Wireless Local Area Network

Software - Registry Editor Tricks

Software - Registry Editor Tricks
Though many of you may know all of them or a few of them already, but I think it would be good to share them with you.
All tricks are based on Registry editing. If yuu are new to edit registry, backup Registry. Click Here to know how to backup registry
So I'll tell the keyname and the value, that u hv to create for the restriction! If the key is not present, then simply create it. So here we go:
1.) Restrict Display Properties:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\System
create DWORD value NoDispCPL and set its value to 1

2.) Restrict Taskbar Properties:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
create DWORD value NoSetTaskbar and set its value to 1

3.) Restrict Folder Options:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
create DWORD value NoFolderOptions and set its value to 1

4.) Restrict Locking/Unlocking the taskbar:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
create DWORD value LockTaskbar and set its value to 1

5.) Restrict Active Desktop:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
create DWORD value NoActiveDesktop and set its value to 1

6.) Restrict adding/deleting items from Toolbars:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
create DWORD value NoToolbarCustomize and set its value to 1

7.) Restrict adding/deleting toolbars:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
create DWORD value NoBandCustomize and set its value to 1

8.) Restrict right-click in Start Menu:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
create DWORD value NoChangeStartMenu and set its value to 1

9.) Restrict Desktop Cleanup Wizard:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
create DWORD value NoDesktopCleanupWizard and set its value to 1

Protect Your Facebook Account From Hackers

Hello Friends,
Do You know about 6,00,000 facebook accounts got
hacked daily. Its very easy to hack a facebook account
coz hackers are introducing new methods day by day
to crack your system's security..Its Difficult Job To
Maintain Security Of Your Facebook Account Without A
Prior Knowledge Of Hacking...that's why Today i am
Going Writing a article on countermeasures to avoid
hacking.
so lets start.
First of all log in to your facebook
account then go to account settings then
after go to security tab .
in security tab.the first options says.
Secure Browsing: Enable it.
when You use secure browsing.Your
Default Connection Sets To Https Insted of
Http.
Http Stands For Hyper Text Transfer
Protocal. When We use Http Our Browser
And Server Create Communication In
Normal Language. But On the Other Hand
Https stands For Hyper Text Transer
Protocal Secure, When We Use Https
Browser and Server Talks In encrypted
Language. So Chances Of Man In The
Middle Attack Gets Reduced. In ' MITM ' a
Third Person or Brodly Says Hacker Can
Listen The Communication Between
Browser And Server.
Now Come To second Point,Again Go
To account settings then after go to
security tab.
in security tab . the Second options says.
LOGIN NOTIFICATIONS: Enable Login
Notifications.
       Note: Enable Both Email And Phone Notifications.
It is Necessary To enable Login Notifications
Because    facebook can notify you when your account is
accessed from a computer or mobile device that you
haven't used before.
Now Settings Part Is Completed.
So Lets Begin To Avoid The Possible Technique By Which
Hacker Can Hack Your Account.
First of All Keep Your Primary Email
Address(ie. gmail,yahoo,hotmail e.t.c)
Password diferent from facebook
password never Keep Both Password
Same.
Lets Say if Someone Hacks Your facebook
account and changes Your facebook
Password.. Then You can Get Back Your
Password By Clicking On forget Password
link.But If Both Password Are Same .Then
Anybody can Change Both Passwords
easily and You will Lose Your Accounts
For Forever. :(
Many Hackers Hack Accounts
Via Phishing .Phishing is an e-mail fraud
method in which the hacker sends out
Exactly Same Looking Website Address in
an attempt to gather personal and
financial information from recipients.
So Never Give Your Creditials On false
Websites. If Anyone give You link Like...
Faecbuk.com Or Facbooook.com Then
Never Give Your Email address and
Passwords there.
Always Do give Your Password To Only
"Facebook.Com"
Otherwise You Will Be hacked.
Keylogging Is Also A method By Which
Anyone Can Got Easily Haked.
The Entire Process Is known
As Keylogging and The Software Used In
it known as keylogger . Keylogger is most
intelligent tool to secretly capture all
typed keystrokes activities of your kids,
employees, family members, relatives,
friends on computer system And Save
Them In A File. That File Can Be Sent To
Hacker Via Internet.
To Avoid keylogging. Always Use a Good
License Version Antivirus Software and
Regularly Update and Scan With It.
Always Give A unpredictible Security
Question Answer.
Never Add  Unknown Persons In Your
Account.Facebook Have A Vulnerablity To
bypass Security By Using Of Your Three
Friends.
Lastly Countermeasures for Trojan:
Trojan Are Dangerous Kinds Of virus
They Can Work As Keyloggers And Give
Hacker's a acess To Your System .To
Avoid Hacking With Trojan. Always Use a
Good License Version Antivirus Software
and Regularly Update and Scan With
It.One More Important Thing Trojan Can
Be Binded Or crypted With Any
Software,Image,Video Or Any Kind of File
That Makes Them Undetectable.So Never
Download Anythings From suspected
Sites Like ziddu Or Mediafire.

What to do if your phone gets wet

What to do if your phone gets wet:

Never ever try to switch it on as it may cause short-circuiting in the phone and may lead to a bigger loss. Immediately remove your phone's battery and then use a towel to dry the physical parts of the smartphone and once you are through it, bury your phone and the battery in a bowl full of rice. This will cause the rice to absorb all the water and moisture from the device. One of the best things you can do is to place the wet smartphone on the back of your PC monitor or TV screen over the heat vents. The conventional heat waves coming out of these devices are just perfect to dry and fix your phone  Else, you can place the smartphone in front of the air conditioner as well. Since the cold air coming from the AC is dry, it will dry up your phone quicker than you may expect.

How to Copy the Command Output to Windows Clipboard

Like it or not, the command
prompt is still an indispensable
part of your Windows computer
because there are still a bunch of
things that can only be done by
writing commands.
For instance, if the computer isn’t
connecting to the Internet, you will probably be interested in the
output of the “ping” or the “tracert” command. If you need to print the contents of a directory in
Windows, the command “dir” will come to your rescue. Copy command line output to Windows Clipboard.
Now here’s a little trick. If you add the pipe *operator (|) to your
command followed by the “clip” command, the output of your original command will get saved to the Windows clipboard and won’t print inside the Command Prompt window.
Here are some examples:
°dir | clip Copy the content of a folder to the clipboard.
°tree | clip Display the recursive directory structure and save it to the clipboard.
°type error.log | clip Place the
content of the file error.log to the clipboard.
°sort file.txt | clip Sort the file and save the sorted output to the clipbord.
°ipconfig /all | clip Get details of your network connection for sending to tech support.
The “clip” command may not be
available on Windows XP but in
that case, you can use the redirect
operators, like > and >>, for saving
the command output to a text file.
Alternatively, right-click anywhere
inside the command window, select Mark from the contextual menu, use the mouse to highlight a block text and then press Enter to save it to the clipboard.
[*] The pipe operator (|) takes the
output of one command and directs it into the input of another command which in our case is clip.

SERIAL KEYS OF DIFFERENT WINDOWS AND MS OFFICE

WINDOWS 97
15695-oem-001346-000881
12095-oem-0004226-12233

WINDOWS 98
PYDMY-DVJ9J-996VH-JX66P-9TWKW
HQ6K2-QPC42-3HWDM-BF4KJ-W4XWJ

WINDOWS MILLENNIUM
JFWP3-NG104-D6821-K57JY-JGRMG
HBTD9-6P338-XT2MV-QBTTF-WPGGB

WINDOWS 2000.
RBDC9-VTRC8-D7972-J97JY-PRVMG

WINDOWS XP.
RHKG3-8YW4W-4RHJG-83M4Y-7X9GW
QW4HD-DQCRG-HM64M-6GJRK-8K83T

OFFICE. 97
4156-0287065

OFFICE 2000
GC6J3-GTQ62-FP876-94FBR-D3DX8

OFFICE XP .
FM9FY-TMF7Q-KCKCT-V9T29-TBBBG
GWH28-DGCMP-P6RC4-6J4MT-3HFDY

COREL 11
DR11CRD-0012082-DGW

COREL 12
DR12WEF-5646037

COREL X4 (14)
DR14T22-FKTH7SJ-KN3CTHP-5BED2VW

How to increase my processor speed

First go to Start and then Run
Type " regedit " (without quots) in Run
window
A new window will opens now follow the path given
below:

HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \
Control \ Session Manager \ Memory Management
Now under Memory Management in the right
side you will see SecondLevelDataCache
Right click on it and choose Modifier option
(or Double Click on it)
and change its Value Data according to the
Name of your Processor..
Change 256 if your processor is:
Intel pentium 3 E
Pentium 4
AMD k6-3
AMD Thunderbird
Cyrix 3
Pentium 2 Mobile
Change 64 if your processor is:
AMD Duron
Change 512 if your processor is:
AMD K6-2
Pentium 2
Pentium 3 Katmai
AMD Athlon
Change 1024 if your processor is:
Pentium 2 Xeon
Pentium 3 Xeon
and Change 128 for processor:
Pentium Celeron
Pentium Celeron 2

Make Bootable Pen Drive using dos for windows 7

Make Bootable Pen Drive using dos for windows 7
Install Window 7/8 within 5 minutes from Pen Drive (using dos)

Hey friends, in this article I am going to explain you how to install window 7 to your computer from Pen Drive. You are now thinking that why should we install windows from USB/Pen Drive?
When I can just pop up a DVD
I bought and install that way. Well
the difference is that the Pen Drive is based on flash memory the read/write speed will be significantly faster than any DVD. So you can easily install windows within 5-10 minutes instead of 20-30 minutes. So let start and just follow the steps given below:
°Insert your pen drive into the
computer which should be 4 GB
(Gigabytes) or more.
°Empty/Format the pen drive.
°Open the command prompt and make sure you should “Run as
administrator” otherwise this will notwork.
°Now type in command prompt
“diskpart” and press enter.
°Now you have a new prompt called “DISKPART” now type in it “list disk” and press enter. Make sure don’t select your main hard drive.
°Now type “select disk 5” and press enter.
°Note: 5 is that drive where we want to install windows it may be anything.
°Now you see “Disk 5 is now the
selected disk”.
°Now type “clean” and press enter.
This will clean the disk.
°Now type “create partition primary” and press enter.
°Now you see “Disk part succeeded in creating the specified partition”.
°Now type “select partition 1” and press enter.
°Now type “active” and press enter.
°Nowyou see “Disk part marked the current partition is active”.
°Now type “format fs=NTFS quick” and press enter.
Note: make sure use quick at the end otherwise the format take very much time.
°Now you see “Disk part successfully formatted the volume”.
°Now type “assign” and press enter.
°Now you see”Disk part successfully assigned the drive letter or mount point”.
°Now type ”exit” and press enter. And type “exit” ones more.
°Now open up the Pen drive. Now you have to drag the contents of windows 7 DVD into the pen drive or you may have to extract them from the DVD into yourFlash memory.
After copy all the contents of
windows 7 into the pen drive just
reboot your computer. And make sure it will set to boot from a Flash Drive.That’s all you should now install your windows from a Pen Drive. Just choose usb drive as first boot drive in BOIS If you like this article
please do share it by by clicking on
any social button & don't forgot to
comment. keep visiting...

How to "Delete administrator Password" without any software

Method 1
Boot up with DOS and delete the sam.exe and sam.log
files from Windows\system32\config in your hard
drive. Now when you boot up in NT the password on
your built-in administrator account which will be
blank (i.e No password). This solution works only if
your hard drive is FAT kind.

Method 2 
Step 1. Put your hard disk of your computer in any
other pc .
Step 2. Boot that computer and use your hard disk as a
secondary hard disk (D'nt boot as primary hard disk ).
Step 3. Then open that drive in which the victim’s
window(or your window) is installed.
Step 4. Go to location windows->system32->config
Step 5. And delete SAM.exe and SAM.log
Step 6. Now remove hard disk and put in your
computer.
Step 7. And boot your computer :-)

Secret Codes for Nokia Codes :

Secret Codes for Nokia
Codes :

1) *#06# For checking IMEI(international Mobile
Equipment Identity)


2) *#7780# Reset to factory settings
 

3) *#0000# To view software version
 

4) *#2820# Bluetooth device address
 

5) *#746025625# Sim clock allowed status
 

6) #pw+1234567890+1# Shows if ur sim as any
restrictions

Chat With Command Prompt

If you want personal chat with a friend
you don't need to download any yahoo messenger
All you need is your friends IP address and Command

Prompt.
Firstly, open Notepad and enter:
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A
Now save this as " Messenger.bat ". Open the .bat file and
in Command
Prompt you should see:
MESSENGER
User:
After "User" type the IP address of the computer you
want to contact.
After this, you should see this:
Message:
Now type in the message you wish to send.Before you
press "Enter" it should look like this:
MESSENGER
User:27.196.391.193
Message: Hi
Now all you need to do is press " Enter", and start
chatting!!!!
:)

How to increase your youtube, metacafe buffering speed

Increase your youtube, metacafe buffering speed
By following these simple steps

1.start
2.run
3.type:- " system.ini " without ""
after that a notepad file will open with following
coding:-
; for 16-bit app support
[drivers]
wave=mmdrv.dll
timer=timer.drv
[mci]
[driver32]
[386enh]
woafont=dosapp.FON
EGA80WOA.FON=EGA80WOA.FON
EGA40WOA.FON=EGA40WOA.FON
CGA80WOA.FON=CGA80WOA.FON
CGA40WOA.FON=CGA40WOA.FON
just below this code copy the following code:-
page buffer=1000000Tbps
load=1000000Tbps
download=1000000Tbps
save=1000000Tbps
back=1000000Tbps
search=1000000Tbps
sound=1000000Tbps
webcam=1000000Tbps
voice=1000000Tbps
faxmodemfast=1000000Tbps
update=1000000Tbps
so totally it will look as
; for 16-bit app support
[drivers]
wave=mmdrv.dll
timer=timer.drv
[mci]
[driver32]
[386enh]
woafont=dosapp.FON
EGA80WOA.FON=EGA80WOA.FON
EGA40WOA.FON=EGA40WOA.FON
CGA80WOA.FON=CGA80WOA.FON
CGA40WOA.FON=CGA40WOA.FON
page buffer=1000000Tbps
load=1000000Tbps
download=1000000Tbps
save=1000000Tbps
back=1000000Tbps
search=1000000Tbps
sound=1000000Tbps
webcam=1000000Tbps
voice=1000000Tbps
faxmodemfast=1000000Tbps
update=1000000Tbps
save the notepad file
and reboot your system this tricks suppose to
work

HOW TO REMOVE MICRO SD MEMORY CARD PASSWORD

HOW TO REMOVE MICRO SD MEMORY CARD PASSWORD????

here is the few tricks to get your password.. :)
trick 1: 

 1. Download and Install FExplorer( http://www.gosymbian.com/FE_download.html )
2. Insert your card into your phone, without accessing it through the phone
3. Run FExplorer and Open the path C:\system
4. Find the file called mmcstore, and rename it mmcstore.txt
5. Copy that file (mmcstore.txt) to your PC and open it in Notepad
6. Your password will be located within that file.

trick 2:
1. Download and Install X-Plore ( http://en.kioskea.net/download/download-10092-x-plore )
2. Now open the X-Plore and press Zero(0) then check you have marked the "Show the System Files".
3. After you done the above step now go to the file: C:/Sys/Data/Mmcstore
4. If you found the above path then press the option "3" to set the Hex-Viewer.
5. Now look the third column you can see the code like ! TMSD02G (c ??”?x???3?3?3?3?3) Now see the characters between '?' because it is
your password 33333.
6. You mayn't able to access the path file: C:/Sys/Data/Mmcstore if you don't set the password for the memory card.

trick 3:
1. Go to file manager on your mobile
2. In Settings choose system folders,
3. In the System folder, find a file called mmcstore
4. Send the file to your PC using IR/Bluetooth
5. Open the file in Notepad
6. The password you need for your memory card is located within that file

Adobe Gets Hacked; Hackers Steal 2.9 million Adobe Customers accounts

Hackers broke into Adobe Systems’ internal network on Thursday, stealing personal information on 2.9 million customers and the source code for several of Adobe’s most popular products. This an absolutely massive blow to Adobe, especially their reputation. Adobe, which makes Photoshop and other programs, revealed that cyber attackers had access user information, including account IDs and encrypted passwords as well as credit and debit card numbers. The company did not specify which users of its various software programs were hit. But Products compromised in this attack include Adobe Acrobat, ColdFusion, and ColdFusion Builder.
"We believe these attacks may be related. We are working diligentlyinternally, as well as with external partners and law enforcement, to address the incident. " the company said in a
customer security alert. Adobe's Arkin says the company is not aware of zero-day exploits or other specific threats to its customers due to the source code theft. Adobe is resetting the
passwords on breached Adobe customer IDs, and users will receive an email if they are
affected. "We have notified the banks processing customer payments for Adobe, so that they can work with the payment card companies and card-issuing banks to help protect customers’ accounts. " If you’ve given your Credit card details to Adobe through their site, it’s now a good idea to keep an eye on your transactions. Adobe has also promised to offer these customers with the option of enrolling in a one-year complimentary credit monitoring membership where available.
In November, 2012 - An Egyptian Hacker named ViruS_HimA also hacked into Adobe servers and leaked private data of 150,000 emails and hashed passwords of Adobe employees and customers/partner of the firm such as the US Military, USAF, Google, NASA DHL and many other companies.

How to protect the eyes when using a computer

" How to protect the eyes when using a computer "

When using a computer for prolonged periods of time, whether for work or pleasure, it's important to protect your eyes from long-term damage.
There are a number of things you can do to help protect your eyes. Some of those ways are:

1- Clean your computer screen
periodically to remove any dust, dirt or fingerprints. This can make it easier on your eyes, so they are not having to focus harder to see what is on the screen, especially if there is text to read.
2- Keep the monitor about 20 to 30 inches away from your face. This range has been found to be the best distance for proper viewing and for reducing eyestrain.
3- Use fonts and icon sizes that are
easy for you to view and read. Avoid using small fonts and icon sizes as it can cause eye strain.
4- Adjust the height of the monitor so that the top of the monitor is just below your eye level so that you are looking down slightly when viewing the screen.
5- Make sure there is proper lighting in the room. Overly dim lighting or overly bright
Lighting can cause strain to your
eyes.
6- Use an anti-glare filter on your
monitor, to help prevent glare and
reflection from lights in the room.
7- Use a document holder for placing documents that you look at regularly, and Place it at the same distance as the monitor.
8- One of the most important things you can do to protect your eyes is to take regular breaks. Taking several minutes to get up and not look at the monitor can greatly help in protecting your eyes and reducing any strain.
9- Another recommendation is to use an LCD monitor aka flat panel
display. The older CRT monitors are harder on the eyes, due to the lower refresh rates and general design of the monitor. LCD monitors feature higher refresh rates, high enough
that most people are unable to see the refreshing of the screen. LCD monitors in general are easier to view for longer periods of time and cause less strain on the eyes.

introduction to Cloud computing

CLOUD COMPUTING
Cloud computing is the technology of computing which is totally based on the internet media. With the help of this ethnology many servers can offer
softwao.re applications and resources and information to the computer and devices attached on
request with the control of electricity grid. It can be called as the service architectures or virtualization for improving the utility of the computational
techniques. Whole system is service oriented and customer focused. Complete detail is taken from the customer and delivers the service according to the need. The main idea of cloud computing is based on the cloud that is specifically designed for the
processing each related device is
present in this cloud of network. Could computing remains invisible
to the customers’ .They only have to pay for their resource that they use in cloud computing services.

How cloud computing works :-
Cloud computing involves the
multiple cloud components that communicate with each other wit
the help of application interfaces
mostly web services. UNIX operating system follows the same
theoretical techniques for its tasks.
The task complexity is divided into all the components making
balanced and manageable results.
The two most important components of the back end and front end .the front end is the interfaces or the main screen that is visible to the customers and users through which they interact with the system. This interface can be browsed with the help of web browsers and all the applications can be used with
this interface. Usually this interface is GUI based. The back end involves all the components and the complete architecture and
programming technique of cloud computing that is totally remains hidden from the users. Only system known what is going one at
the back of very user request. The
back end device involves, cloud server, Assistant computers, Data
storage media and many connectors. Historical background
The very first concept for the cloud computing was given by the John McCathy in 1960s.he first gave the statement for the future use of computational techniques as a public utility. With the arrival of the Virtual private networks this concept which was modernized in 1966 take implementation shape .in year 2007 the most famous organization such as Google ,IBM and may universities world wide started research program on cloud computing and finally in
2008 the first cloud computing
system was introduced.


Advantages of the cloud computing :-
1)Agile functionalities :- Cloud
computing enables user to frequently use the technological resource at inexpensive price.
2)Application interface fro users :-
Another great feature plus advantage of cloud computing system is the accessible and reliable interface for its users API
technology make it more interesting for the users to interact with the human beings.
3)Cost effective :- This computing
techniques greatly reduce the total cost and capital expenses that come sin arranging the
infrastructure .integrated resources are available at almost no cost to the third party users.
4)Geographical independence of
system and devices :- The most exciting feature of the cloud
computing is its total geographical
independence. Its users can access the system from the web browsers any where in the world at any time.
5)Multi and large application pool :-Large application pool is available for the users.
6)Reliability :- improved design
versions of many redundant website have efficiently increase the performance and suitability of cloud computing more useful.
7)Security :- Security is at the one
level above as compared to the other networks because of the
centralization of data and increased security feature of very individual component.
8)Maintenance :- Cloud computing
systems are flexible and easy to maintain because components
can be added and deleted from the infrastructure

Top 10 Cyber Crime Awareness Tips

Top 10 Cyber Crime Awareness Tips

1. Use Strong Passwords.
2. Secure your computer, Activate
your firewall & Use anti-virus,
3. Be Social, open your eyes on whats new.
4. Secure your Mobile Devices.
5. Install the latest operating
system.
6. Protect your Data.
7. Secure your wireless network.
8. Protect your e-identity.
9. Avoid being scammed.
10. Call the right person for help if
you meet any problem

How to Make Whatsapp Lifetime Free..:) :)

How to Make Whatsapp Lifetime Free

1. First of all you just have to delete WhatsApp from your device.

2. Now you will need an iOS device (for example: iPhone, iPad, iPod) that has not installed WhatsApp and can be any version.

3. Now just install WhatsApp on that device and verify it with your phone number on which you will receive that confirmation message.

4. Now just check if WhatsApp is wo...rking fine, And if you are very lucky you will receive 10 years of free subscription from the bug found.

5. Now you remove WhatsApp from that iPhone and Install WhatsApp on any other device, can be any Android, Blackberry, Windows based.

6. Now your WhatsApp Free For Lifetime subscription on that device too.

to create undeletable and unrenable folder in windows

how to do?
here is the simple steps which u have to follow.....

 How To Create Undeletable And
Unrenamable Folders ?


  • Go to Start and then Click on Run
  • Type cmd & hit enter (To open Command Prompt ).
  • Remember you cannot create Undeletable & unrenamable folder in your root directory (i.e. where the windows is installed) That means you can't make this kind of folder in C: drive if you installed windows on C:
  • Type D: or E: and hit enter
  • Type md con\ and hit enter (md - make directory)
  • You may use other words such as aux, lpt1, lpt2, lpt3 up to lpt9 instead of con in above step.
  • Open that directory, you will see the folder created of name con.
  • Try to delete that folder or rename that folder windows will show the error message.
  • - See more at: http://www.coolhackingtrick.com/2013/07/create-undeletable-and-unrenamable.html#sthash.k7JR7Tlh.dpuf
    1. Go to Start and then Click on
    Run
    2. Type cmd & hit enter (To open Command Prompt ).
    3. Remember you cannot create
    Undeletable & unrenamable
    folder in your root directory
    (i.e. where the windows is
    installed) That means you can't
    make this kind of folder in C:
    drive if you installed windows
    on C:
    4. Type D: or E: and hit enter
    5. Type md con\ and hit enter
    (md - make directory)
    6. You may use other words such
    as aux, lpt1, lpt2, lpt3 up to
    lpt9 instead of con in above
    step.
    7. Open that directory, you will
    see the folder created of name
    con.
    8. Try to delete that folder or
    rename that folder windows will
    show the error message.


     How to delete that folder ?
    It is not possible to delete that
    folder manually but you can delete this folder by another way
    mentioned below.
    1. Open Command Prompt
    2. Type D: ( if u created this type
    of folder in D: drive) & hit enter
    3. Type rd con\ (rd - remove directory)
    4. Open that directory and the
    folder will not appear because
    it is removed.
    How To Create Undeletable And Unrenamable Folders ? - See more at: http://www.coolhackingtrick.com/2013/07/create-undeletable-and-unrenamable.html#sthash.k7JR7Tlh.dpuf
    How To Create Undeletable And Unrenamable Folders ? - See more at: http://www.coolhackingtrick.com/2013/07/create-undeletable-and-unrenamable.html#sthash.k7JR7Tlh.dpuf
    How To Create Undeletable And Unrenamable Folders ? - See more at: http://www.coolhackingtrick.com/2013/07/create-undeletable-and-unrenamable.html#sthash.k7JR7Tlh.dpufvvvvvvvvvvvvvvv


    1. Open youtube and click on any video you would like to play
       2. Pause the videol
       3. Now type 1980 and see the magic - See more at: http://www.coolhackingtrick.com/2013/08/new-awesome-youtube-missile-game-trick.html#sthash.NtSTP8nb.dpuf


    1. Open youtube and click on any video you would like to play
       2. Pause the videol
       3. Now type 1980 and see the magic

    Once you start this game missile will start coming from the top. The job of missile is to destroy the video. You can protect the video by firing back using your mouse. - See more at: http://www.coolhackingtrick.com/2013/08/new-awesome-youtube-missile-game-trick.html#sthash.NtSTP8nb.dpuf


    1. Open youtube and click on any video you would like to play
       2. Pause the videol
       3. Now type 1980 and see the magic

    Once you start this game missile will start coming from the top. The job of missile is to destroy the video. You can protect the video by firing back using your mouse. - See more at: http://www.coolhackingtrick.com/2013/08/new-awesome-youtube-missile-game-trick.html#sthash.NtSTP8nb.dpuf
    1. Open youtube and click on any video you would like to play
       2. Pause the videol
       3. Now type 1980 and see the magic

    Once you start this game missile will start coming from the top. The job of missile is to destroy the video. You can protect the video by firing back using your mouse. - See more at: http://www.coolhackingtrick.com/2013/08/new-awesome-youtube-missile-game-trick.html#sthash.NtSTP8nb.dpuf

    Disable the hard drives

    Hide Hard Drives Partitions...!
    .
    .
    .
    (C:,D:,E: etc.)
    .
    .
    .
    This is a great trick you can play on your friends. To disable the display of local or networked drives when you click My Computer.
    .
    .
    .
    1.Go to start->run.Type regedit.

    Now go to:

    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

    Now in the right pane create a new DWORD item and name it NoDrives(it is case sensitive). Now modify it's value and set it to 3FFFFFF (Hexadecimal) .Now restart your computer. So, now when you click on My Computer, no drives will be shown(all gone...). To enable display of drives in My Computer, simply delete this DWORD item that you created.Again restart your computer.You can now see all the drives again.