What is Piggybacking ?

1 comments

Piggybacking refers to gaining access to a wireless Internet connection by bringing your laptop computer within the range of another’s wireless connection, and using that service without the subscriber’s explicit permission.

Check below scenario – you live in a multi storied building and your apartment is in the 3rd floor. Someone from the 2nd floor always connects to your wireless network and browses the web, downloads files and you have to pay for the extra usage bills.





Basic mechanism of Piggybacking

More Info Abt Piggybacking_IA [ Internet Access]

http://en.wikipedia.org/wiki/Piggybacking_%28Internet_access%29

GMAIL DOT TRICK

0 comments

Suppose your gmail id is mymail@gmail.com
and password is password


Then you can login in your gmail account .If you use
email as:m.ymail@gmail.com
password:password
email:my.mail@gmail.com
password:password
email:mym.ail@gmail.com
password:password
email:myma.il@gmail.com
password:password
email:mymai.l@gmail.com
password:password
So my point is that gmail does

not count periods(.)
Then what is the use of it
So you can use this trick for using the same email for various GPT, PTC, Twitter accounts as they interpret all the above emails as different but gmail considers it the same.
So guys i think you got my point..!!!!


enjoy..!!!!

RECORD YOUR VOICE WITHOUT ANY SOFWARE...!!

0 comments

now record your voice with out any software , go to run and type "sndrec32" hit enter

enjoy.!

Burn a CD on Windows XP without using software

0 comments

Windows XP comes with a builtin CD-copy feature that not many people are aware of. Although almost everyone has his/her favorite CD-copy software to stick with, it is still good to know about this CDR feature from Windows XP. You will find it very useful when you come to another PC that doesn't have a CD-copy software, and you can't just install your favorite software to it. With this feature, you can write some data or MP3 files to a CD/DVD, or erase a re-writable CD/DVD.
If you're using a Re-Writable CD (CD-RW), make sure the disc is blank. You might need to erase (or "format") it before use.

Requirements: You need to enable the CD-R feature on Windows XP.

  1. Insert a Formated-ReWritable CD or a Recordable (CD-R) disc into the CD drive.
  2. From Desktop, double-click on "My Computer".
  3. Navigate to the files/folders you want to copy to CD. Select them and press "Ctrl-c" to copy.
  4. Browse back to the CD-ROM, and press "Ctrl-V" to paste. The files/folders will show up as temporary files/folders at this time.


  5. On the left panel, select "Write these files to CD".


  6. The window "CD Writing Wizard" appears with the default CD name. Change the CD name if you wish, then click "Next".


  7. The "CD Writing Wizard" starts to write files/folders to the CD:


  8. Once the writing process is complete, the wizard will disappear and the CD-Rom will be

GAMES SECRETS...!!!

0 comments

Solitaire: Instant Win
  1. Press Alt + Shift + 2 to instantly win
Solitaire: Draw only 1 card (instead of 3)
  1. Hold down Ctrl + Alt + Shift then click on unopen cards to draw.
FreeCell: Instant Win
  1. Hold down Ctrl + Shift + F10 while playing, then click Abort.
  2. Now move one card.
FreeCell: Hidden Game Modes
  1. Go to "Game" menu choose "Select Game"
  2. Here you can choose from game mode 1 to 1,000,000. But -1 and -2 will also work (hidden modes)
Hearts: Show All Card
    Warning! this requires a modification on your registry. Be sure you follow the steps carefully. Damage your registry might damage your Windows.
  1. Open the "Registry Editor" by: "Start" >> "Run" then type "regedit" and press Enter
  2. Expand to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Applets\Hearts
  3. Right-click on the right panel and create a new String value with the name "ZB"
  4. Double-click to open this key "ZB" to edit its value. Then enter "42" and close the Registry Editor.
  5. Start Hearts and Press Ctrl + Alt + Shift + F12 to show all the cards

Hard Drive Cleanup

0 comments

Wonder why your computer is getting so slow lately? Most often, it's just your hard drive is getting full or carying too many junk files. Most of these files are temporary files and perfectly safe to be deleted. Cleaning up your hard drive every once in awhile will improve your PC performance.
You might wonder: Why Windows keeps those files if they're not necessary? "Temporary Internet Files", for example, everytime you browse to a webpage, your web browser requests the contents from the host, saves them locally as cache, then displays the contents to your browser window. Now, to speed up the access time when you come back to the same page, your web browser might re-use those cache files if they're not changed from the webpage.
"Temporary Internet Files" are just one example of the temporary files you can clean up. Follow the steps below to clean up other temporary sources as well.
Most likely, temporary files are stored in the Operating System drive ("C Drive"), but it doesn't hurt to do a cleanup all of your hard drives every once in awhile.
Use this trick at your own risks
  1. Launch the Disk Cleanup utility by either:
    - "Start" >> "Programs" >> "Accessories" >> "System Tools" >> "Disk Cleanup", or:
    - "Start" >> "Run", enter "cleanmgr" then press Enter.
  2. Select the disk you want to clean up from the drop-down box (i.e. "Local Disk C") and click "OK":


  3. Windows will calculate the space on your selected hard drive. This might take a few minutes depending on the size of your hard drive:


  4. Once Windows is done with the calculation, Disk Cleanup Utility displays. Here you can select which temporary sources you want to clean up (under "Files to delete"). It doesn't hurt if you select them all when you really need some spaces on your hard drive. Notice the usage size on some of these sources may be very big


  5. Click "OK" after your selections, then click "Yes" on the prompt.
  6. Disk Cleanup Utility starts to clean up your hard drive. This might take a long time depending on the current usage level of your hard drive. During the cleanup process, your computer might be very slow, so go watch a TV show or something. After cleaning up your hard disks, perform a disk defragmentation could really help your pc run faster.

Hard Drive Defragmentation

0 comments

Windows Disk Defragmenter Utility let you "re-organize" the used spaces of your hard drives. You can think of your hard drive as a drawer with full of stuffs that you just dump in again and again. The problem is, when you need to find something from that drawer, you might need to spend a good amount of time to search through the mess. Same for the Windows operating system, your hard drive is the messy drawer, and Windows just has to search through it to execute your command. So it's time to re-organize it to make your PC run faster.
The defragmentation process might take a very long time, depending on the usage size of your hard drive. To clean up your PC and to speed up the defragmentation process, it is recommended to do a drive cleanup prior to the defragmentation.

Most likely, operating and application files are stored in your "C drive", but it doesn't hurt to do a cleanup + defragmentation on all of your hard drives every once in awhile.
Use this trick at your own risks
  1. Launch the Disk Defragmenter utility by either:
    - "Start" >> "Programs" >> "Accessories" >> "System Tools" >> "Disk Defragmenter", or:
    - "Start" >> "Run", enter "dfrg.msc" then press Enter.
  2. Select the disk you want to perform defragmentation (i.e. "Local Disk C") and click "Defragment":


  3. Windows starts to defragment your selected hard drive as follow:


  4. This process might take awhile depending on the size and usage of your hard drive. During this process, your computer might be running slow. Fortunately, you can always pause and resume the process if you want to use other applications on your PC at a normal speed.

GOOGLE OPERATING SYSTEM.

1 comments




Google OPERATING SYSTEM| (184 MB)
Features

* OpenDNS added
* Audio support
o VirtualBox - Intel 8x0 AC97
o VMware - Ensoniq AudioPCI 1371/1373
* SD card support (512M)
* Ethernet (DHCP)
* Mouse wheel support
* High-resolution support (800*600, 1024*768)
* Apps added
o Software Directory
o AndroidVNC
o PilotLines, Craigs Races, Super Mario
* more net card driver added

DOWNLOAD : http://live-android.googlecode.com/files/liveandroidv0.3.iso.001

http://live-android.googlecode.com/files/liveandroidv0.3.iso.002

how to see infrared rays of ur tv via camera phone?

0 comments

here is a nice trick to watch infrared rays.
You have to place your tv remote bulb which producers infrared rays, in the direction of your mobile phone camera.
Now press the buttons on the remote.
Watch what is happening on your phone display.
You can see the infrared rays on your phone.
It is bluish in colour.

HOW TO FIND YOUR GMAIL CREATION DATE:IMPORTANT

0 comments

Today I am going to tell you how to find your gmail creation date.some of you think that its is not important for me to find my account creation date,but stikk it important if you lost your password and unable to recover by using recovery methods.If you are failed with the recovery methods,you have to submit a form to gmail team to recover your email.so it is little bit important regarding your account protection.
Here I am going to explain two methods to find your gmail creation date.

1.By Using Gmail Welcome Mail:
Whenever you create a gmail account you will get an welcome mail from gmail team. So,here is the tip ,this “Welcome Mail” has the same date as your Gmail account creation date.To get this mail and there by the date,Go to Gmail inbox and hit on Oldest
button to get the last message. This message will be welcome mail from Gmail Team.You can note this mail date and this will be your gmail creation date.
But,the problem arises when if you are deleted the welcome mail from you inbox.If you done so the above method will not help you to find the gmail creation date.so read the below method.

2.By Using POP:
This method will work only for accounts created after 2007.
Go to Settings -> Forwarding and POP/IMAP and
under POP Download, look for:
Status: POP is enabled for all mail that has arrived
since "Your Account Creation Date"

Your account creation can note and it will be your gmail creation date.

HOW WE CAN LOCK DESKTOP ICON?

0 comments

ITS VERY SIMPLE TRICK TO LOCK THE DESKTOP ICON.

JUST FOLLOW THESE STEP

Have you arranged your desktop to with your wallpaper. Presently comes someone and mess up the nice arrangement. To lock your desktop icons into place, first arrange it carefully the way you want it to be, then open up the registry editor.
Go to HKEY_CURRENT_USER\Software\Microsoft\Windows\ CurrentVersion\Policies\Explorer. Right-click in the right pane and select New, DWORD Value name NoSaveSettings and press the Enter key. Right-click on the new NoSaveSettings item and select Modify. Enter 1 in the Value data box. After this, whenever you restart Windows, your settings will return to their current state.

thats it.

Windows 8 gets a new task manager and USB booting

0 comments



Advanced Task Manager

Microsoft is working on a new task manager interface for Windows 8



This screenshot is of the Advanced Task Manager, which shows the CPU usage, running processes, and other detailed information for users who can understand it. In the lower right of the picture, you can see another part of the new task manager that indicates how much memory and power an application or process is using up.




The screenshot above, which was posted by a user in the Mydigitallife forum, shows a larger, more touch-friendly interface for the basic task manager. Applications can be killed by simply pressing the X button on the right,while categories can be minimized or maximized by clicking on them with a mouse or, presumably, a touch of the finger.



Finally, Windows 8 will have a Portable Workspace feature,which lets you install a fully bootable, usable version of Windows onto a 16+ GB USB drive. This feature could help IT folk diagnose problems with PC installations.

SIMPLE TRICK TO ENABLE RIGHT CLICK ON DISABLE WEBSITES

0 comments

Whenever you are surfing the web, you may come across certain websites that does not allow you to perform right click to copy text or any images. This is mostly done to prevent other users from copying or stealing their work.

Enable Right Click in Firefox Using RightToClick:

1.Download and install RightToClick. Once the add-on is installed you will see a golden pointer at the lower right corner of Firefox and also right next to the address bar.

2. When you visit any website which has disabled right click options, click on the mouse pointer and it will enable the right click options on that page. The pointer will turn green as shown below.

3. You can access advanced option either by right clicking on the mouse icon or by going to Tools > Addons and then going to options of RightToClick.

DOWNLOAD HERE

How To Rotate Your Nokia Mobile Phone Screen From Landscape View to Portrait

0 comments

i m gonna give you the nokia cellphones codes for

Rotate Your Nokia Mobile Phones Screen From Landscape View to Portrait.

its so nice trick to trap your friends.

do fun with using these codes.

so here is the code:

Codes:
*#5512# will turn towards Right
*#5513# will turn upside down
*#5514# will turn towards left
*#5511# will turn Your screen back to normal.
thats it.try it.its works.

How To Block Your Stolen or Lost Mobile

0 comments

International Mobile Equipment Identity i.e IMEI number popular known as mobile phone’s serial number is a 15 digit code that will appear Disable Stolen or Lost Mobile(Cell) phone Using IMEI Number on the mobile screen when you press * # 0 6 # Copy the number down and keep it for future reference.

This number is unique to your handset and helps you disabling and blocking yours stolen or lost phone in future . Motoralla Users can also try press #,* to retrive IEMI Number of your phones
How To Use IMEI Number to Block Phones

If ur mobile phone is lost or stolen you can inform your network provider with yours IMEI number who can then put the serial number on a shared database. This list stops this particular phone from registering on any network and will be useless for anyone even if the mobile phone’s SIM card is changed!
Get Mobile Information Using IMEI Number.

You can also get all urs mobile phone information using yours Mobile IMEI number all you need is to try the IMEI Number Analysis .

SPEED UP YOUR INTERNET SPEED

0 comments

1.Start-->Run-->type "gpedit.msc" , This opens the group policy editor.

2. Then go to:
Local Computer Policy-->Computer Configuration-->Administrative Templates-->Network-->QOS Packet Scheduler-->Limit Reservable Bandwidth


3. Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab :
"By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."

4. So the trick is to ENABLE reservable bandwidth, then set it to ZERO.

This will allow the system to reserve nothing, rather than the default 20%.

FILESONIC LATEST PREMIUM ACCOUNT

0 comments

Filesonic/hotfile Premium Accounts
april 25 new

Username: Drizzt3117@Aol.com
Password: brain31

Username: crispianc@gmail.com
Password: trustno1

Username: dausl2@t-online.de
Password: musi0411

Username: Dirkborg@yahoo.de
Password: 27446633

Username: jangar59@gmail.com
Password: drummer1

Username: coffee@nsworld.com
Password: yFnbO2KLz

Username: hellosmruti@gmail.com
Password: IwillburnU2

GOOGLE MAGICAL TRICK !!!!!

0 comments

1st magic Check this want to dance the google then
open google.com in ur browser
in the search bar type"google loco"
and n hit i'm feeling lucky
and u will c google is dancing
2.

2nd magic Check this
Go to google.com
Type 'Google Gravity'
Click on I
’m feeling Lucky,

Intex launches projector on a mobile phone!

0 comments

When we thought we are done with embedding extra features into a phone like a torch light or a ultraviolet light, Intex has embedded a projector into a phone. Intex V.Show or Intex IN 8810 costs Rs. 16000 on launch. Intext V.Show uses tiny Pico which is the latest in the LED technology to project on to a 36 inch screen size for 3 hours. 20,000 hours of play time on the projector is possible. After which it will cease to be a projector and starts to be a phone-only.


In addition to the capability of projecting, Intex V.8810 packs a lot of other features which are not available in the current crop of phones. It is a touch screen phone with 3.2 inch screen size. Capacitive or resistive is not known. It is a dual SIM phone (GSM+GSM). As per mainstream media this is a 3G enabled phone (but you by now know how reliable mainstream is). As per blogosphere this is a dual SIM phone. Would it accommodate a 3G SIM and a 2G SIM is not known.


3G or not this would be the first touch screen phone with dual SIM capability. V8810 comes with other doubles too. It has a dual camera – one in the front, one in the back and it has dual memory card slots which can read up to 8 GB each.

3 crore rupees are spent to bring the product to the market and Intex is hoping to sell 75000 units.

If TGF readers recall, there is a Zen M25 which has a 72 hour standby time for which Amitabh Bachan has an interesting ad. In the ad, the regular projector fails and Mr. Bachan dupes the people to watch the same movie on a 2.4 inch screen. May be that ad should be re-shot with Amitabh using Intex V.Show when the projector fails. Just a thought.

Divert call and DEactivATE call by just dialling numbers

0 comments

Divert call and dactive
call by just dialling
numbers
Divert Call and Deactive Divert
cALL by just dialing numbers
hey frendz...!!
Sometimes we face difficulties
where we are not willing to take
the call, but have to take the
call..
Also going out of range,
switching
off or being unavailable becomes
impossible...
In such situations just dial
*21*9829003204#..
This is the best call diverting tricks.

NOW SEND 320 CHARACTER MESSAGE WITHOUT ANY ADS.

0 comments

NOW FORGET YOUR MESSAGE CARD PLAN.
SEND 320 CHARACTER MESSAGE WITHOUT ANY ADS.

just go to www.smsze.com there register as a new user and they send a password in ur mobile,now login and enjoy buddy,its great to forget message plan,and it is fast also.

Batch FIle Animation!

0 comments

1.put this code in notepad
2.save file named AH.bat
3.Run the file and see the animation
-----------------------------------------------

@ echo off
cls
echo A
ping localhost -n 2 >nul
cls
echo AS
ping localhost -n 2 >nul
cls
echo ASI
ping localhost -n 2 >nul
cls
echo ASIAN
ping localhost -n 2 >nul
cls
echo ASIAN H
ping localhost -n 2 >nul
cls
echo ASIAN HA
ping localhost -n 2 >nul
cls
echo ASIAN HAC
ping localhost -n 2 >nul
cls
echo ASIAN HAC
ping localhost -n 2 >nul
cls
echo ASIAN HACK
ping localhost -n 2 >nul
cls
echo ASIAN HACKY
ping localhost -n 2 >nul
cls
echo ASIAN HACKYA
ping localhost -n 2 >nul
cls
echo ASIAN HACKYAR
ping localhost -n 2 >nul
cls
echo ASIAN HACKYARD
ping localhost -n 2 >nul
cls
echo ASIAN HACKYARD..
ping localhost -n 2 >nul
cls
echo ASIAN HACKYARD....
ping localhost -n 2 >nul
cls
echo ASIAN HACKYARD...R
ping localhost -n 2 >nul
cls
echo ASIAN HACKYARD...R
ping localhost -n 2 >nul
cls
echo ASIAN HACKYARD...RU
ping localhost -n 2 >nul
cls
echo ASIAN HACKYARD...RUL
ping localhost -n 2 >nul
cls
echo ASIAN HACKYARD...RULE
ping localhost -n 2 >nul
cls
echo ASIAN HACKYARD...RULES
ping localhost -n 2 >nul
cls
echo .:ASIAN HACKYARD...RULES:.
ping localhost -n 2 >nul
cls

Hack Windows Vista Administrator Account password

0 comments

Please take note that this handy tip is intended to recover/regain a forgotten Vista Administrator password. It is not intended to illegally hacking into a Vista system that's not owning by users who refer this guide!!

It is also intended to inform Vista users about the method by which anyone can access their private accounts by cracking passwords....Thus anyone can hack into administrator account and bypass guest user restrictions....

Lets start...

Steps to hack Windows Vista Administrator account password:

1. Reboot the Windows Vista and boot up with Windows Vista installation DVD.
Crack Windows Vista logon account password in minute with the Windows Vista installation DVD. Click on the Repair Your Computer option, bring up Command Prompt to open Local Users and Groups management in MMC.


2. While the Windows Vista installation interface pops up, click the Repair You Computer link at the bottom-left corner.


3. Next, the System Recovery Options dialog box appears. There are few options that related to repairing Windows Vista, looks like Recovery Console in Windows XP:

Startup Repair options is used to automatically fix problems that are preventing Windows Vista from starting.

System Restore to restore Windows Vista setting to an earlier point in time.

Windows Complete PC Restore to restore Windows Vista from a full system backup.

Windows Memory Diagnostic Tool could be the first Microsoft memory tester toolkit that bundled with Windows setup media.

Command Prompt is the target option of this Vista hacking guide. Click on this option now.


4. In the Windows Vista Command Prompt, type mmc.exe and press ENTER key to bring up the Microsoft Management Console.


5. Click on the File menu, select Add / Remove Snap-in option, locate and select the Local Users and Groups on the left panel, and click Add button to add it to the right panel

6. Now, the Choose Target Machine dialog box pop up. Keep the default setting by clicking the Finish button – that means using the Local Users and Groups snap-in to manage this local computer, and not another computer in network.


7. Click OK button and return to MMC windows. Under the Root Console in left panel, double-click Local Users and Group that was added earlier. Click on User folder, locate and right-click the target Vista logon account that found in the right panel.


Select the Set Password from the right-click menu to set a new password / reset old password.

Note this does not work on all versions of Vista. But, it can be used to hack administrator account password of Windows Vista...

how to hack friend facebook wall 100% working

0 comments



click the pic to see it clearly

........nd then zoom in

What Is Hibernate In Computers ?

0 comments

What Is Hibernate In Computers ? How Can I enable Hibernate Feature In My Laptop / Computer

‘Hibernate’ feature in a computer is something like a temporary shut down, however it is different from shut down in the sense, once a computer is resumed to normal state from Hibernate, the same processes that were running before the system was ‘hibernate’d will be resumed.

Internally when a system is put to hibernate, an image of current working state is written on to a file on the hard drive and when the computer resumes from hibernation, it reads the saved state data from the file on the disk and restores the system to the same state. ie.. programs that were opened are resumed and network connections are restarted without losing any kind of data that were previously opened.

Hibernate in comparison to Standby takes a bit longer time, as it needs to write to a special file on the hard drive. Hibernate also takes bit longer to resume, since it must go through essentially normal boot process and read from the file on the hard disk. Hibernate is different from Standby as it is almost like temporary shut down.


To enable Hibernate feature follow the steps:
1) Go to Control Panel.
2) Double click “Power Options”
3) From the Power Options window select ‘Hibernate’ tab.
4) Select ‘Enable hibernation’ and click Apply.

There is also another procedure to enable Hiberate feature on your computer. Steps are
1) Click on Start and then click Run.
2) Type “powercfg.cpl” and hit Enter.
3) Now from “Power Options” window selct ‘Hibernate’ tab.
4) Select ‘Enable hibernation’ and click Apply.

New way to boot win xp faster

0 comments



New way to boot win xp faster

Hi, all user here is a different way of booting your windows xp faster I definitely sure that this will help those all user who sent us mail for writing a post on booting window xp faster.



1) Open notepad.exe, type "del c:windowsprefetch tosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in c:

2) From the Start menu, select "Run..." & type "gpedit.msc".

3) Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.

4) In the new window, click "add", "Browse", locate your "ntosboot.bat" file & click "Open".

5) Click "OK", "Apply" & "OK" once again to exit.

6) From the Start menu, select "Run..." & type "devmgmt.msc".

7) Double click on "IDE ATA/ATAPI controllers"

8) Right click on "Primary IDE Channel" and select "Properties".

9) Select the "Advanced Settings" tab then on the device 0 or 1 that doesn't have 'device type' greyed out select 'none' instead of 'autodetect' & click "OK".

10) Right click on "Secondary IDE channel", select "Properties" and repeat step 9.

11) Reboot your computer.

Enjoy.......


ADDING NEW OPTIONS TO THE RIGHT CLICK OF MY COMPUTER

0 comments

This technique involves registry editing, so make backup of the registry..

step-1: Copy/Paste the following code in Notepad.

Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOTCLSID{20D04FE0-3AEA-1069-A2D8-08002B30309D}shellRegistry Editor] @="Name of the Application"
[HKEY_CLASSES_ROOTCLSID{20D04FE0-3AEA-1069-A2D8-08002B30309D}shellRegistry Editorcommand] @="Location Of The Application"

Step-2:Now edit the name of application and location of application.

For example for adding firefox option,
[HKEY_CLASSES_ROOTCLSID{20D04FE0-3AEA-1069-A2D8-08002B30309D}shellRegistry Editor] @="Firefox"
[HKEY_CLASSES_ROOTCLSID{20D04FE0-3AEA-1069-A2D8-08002B30309D}shellRegistry Editorcommand] @="C:\Program Files\Mozilla Firefox\firefox.exe"

Nokia 3G Phones Price List In INDIA

0 comments

nokia logo List of all Nokia Phones with 3g

Nokia 3G Phones Price List

Sl. NoMobile ModelPrice
1Nokia 2730Rs. 4000
2Nokia 7230Rs. 5700
3Nokia 3120CRs. 5800
4Nokia 6233Rs. 6900
5Nokia 6280Rs. 7300
6Nokia 6270Rs. 7300
7Nokia 5230Rs. 7400
8Nokia 6600 foldRs. 7500
9Nokia N70Rs. 7700
10Nokia E63Rs. 8300
11Nokia 5235Rs. 8500
12Nokia C5Rs. 9000
13Nokia 6700 SlideRs. 9400
14Nokia N70MRs. 9500
15Nokia 5320Rs. 9800
16Nokia 6212CRs. 9900
17Nokia 5330Rs. 10000
18Nokia 6500CRs. 10100
19Nokia 5610Rs. 11000
20Nokia N73Rs. 11000
21Nokia N91Rs. 11100
22Nokia N93iRs. 11100
23Nokia E51Rs. 11100
24Nokia N73MRs. 11200
25Nokia 6700Rs. 11300
26Nokia E52Rs. 11800
27Nokia 6210SRs. 12500
28Nokia N79Rs. 12600
29Nokia 6110Rs. 12900
30Nokia 6500SRs. 12900
31Nokia N76Rs. 12900
32Nokia 5800Rs. 13100
33Nokia N80Rs. 13100
34Nokia E71Rs. 13700
35Nokia 6600SRs. 13700
36Nokia N81Rs. 13900
37Nokia N85Rs. 13900
38Nokia N77Rs. 14700
39Nokia N78Rs. 14800
40Nokia 5730Rs. 15000
41Nokia N81 8 GBRs. 15400
42Nokia N95 8GBRs. 15400
43Nokia E61Rs. 15500
44Nokia E61iRs. 15500
45Nokia 6220cRs. 17000
46Nokia 7900Rs. 17100
47Nokia E72Rs. 17200
48Nokia E75Rs. 17300
49Nokia E70Rs. 17500
50Nokia E5Rs. 18000
51Nokia N86Rs. 18000
52Nokia N82Rs. 18600
53Nokia N95Rs. 18600
54Nokia E66Rs. 18600
55Nokia N96Rs. 19200
56Nokia N97 MiniRs. 19200
57Nokia N92Rs. 19800
58Nokia X6Rs. 20000
59Nokia N97Rs. 22400
60Nokia E90Rs. 32500


Microsoft's Attack Surface Analyzer (ASA)Tool

0 comments

Microsoft's Attack Surface Analyzer Tool

Attack Surface Analyzer tool is announced by the microsoft regarding the issues of the security changes.It detects all the changes have been done in the security by analyzing the registry entries,ActiveX controls & the added files in the windows system.

The aim of the microsoft developer is very clean that any 3rd party software is installed on the system then this tool is checking that weather the installed tool increased the attack surface on the windows platform or not.To generate a report, the tool needs to scan a system before and after the program in question is installed.



Overview

Attack Surface Analyzer is developed by the Security Engineering group, building on the work of our Security Science team. It is the same tool used by Microsoft's internal product groups to catalogue changes made to operating system attack surface by the installation of new software.

Attack Surface Analyzer takes a snapshot of your system state before and after the installation of product(s) and displays the changes to a number of key elements of the Windows attack surface.

This allows:

- Developers to view changes in the attack surface resulting from the introduction of their code on to the Windows platform
- IT Professionals to assess the aggregate Attack Surface change by the installation of an organization's line of business applications
- IT Security Auditors evaluate the risk of a particular piece of software installed on the Windows platform during threat risk reviews
- IT Security Incident Responders to gain a better understanding of the state of a systems security during investigations (if a baseline scan was taken of the system during the deployment phase)

Download :- Attack Surface AnalyzerX64


Enjoy.......


HOW TO SECURE YOUR USB FROM GETTING VIRUS ON IT

0 comments

If you desire to protect your USB from getting unwanted files i.e. virus, worm, spy, trojan etc than you are at the exact place.
What I’m gonna tell you is that how to setup your registry to end a computer from saving files to your USB (It’ll block all of them)
If you contain windows XP with SP2, then you can immobilize the writing option to USB drives. This trick is very helpful if you have virus in your computer and desire to copy files from a USB Drive but don’t desire to transfer virus to the USB. Follow the given steps to disable the USB writing option:

TO TURN ON THE DEFENCE

Open notepad and copy and paste the following:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlStorageDevicePolicies]
“WriteProtect”=dword:00000001
Now keep the file with the extension “.reg”.
Click on the file you presently saved. In the pop-up window chose YES and then OK.
That’s it your USB is now sheltered

To TURN DEFENCE OFF:

open notepad and copy and paste the following:
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlStorageDevicePolicies]
“WriteProtect”=dword:00000000
Now put aside the file with the extension “.reg”.
Click on the file you presently saved. In the pop-up window click YES and then OK.
That’s it your defense is now disabled.

OPEN OFFICE 2007 FILES IN OFFICE 2003

0 comments

Today tip will assist you to resolve the compatibility issues between the Office 2003 and Office 2007. Because all programs in office 2003 used the older file extensions for its unlike programs. For example Word 2003 saves files with extension .doc, Excel 2003 saves files with .xls and PowerPoint saves files with .ppt. but on the other office 2007 worn the new file extensions for its different programs. For example Word 2007 saved files with extension .docx, Excel 2007 with .xlsx and PowerPoint saves with .pptx. Now the difficulty is that when you will try to open office 2007 files into office 2003 and you will not able to open the file due to compatibility issues between both office versions. Microsoft provides a free compatibility pack to convert office 2007 papers to the office 2003 format. There are many third party free converter are obtainable but here we are using Microsoft office compatibility pack.
Follow the specified steps to download free Microsoft compatibility pack and install it.
To use this characteristic, you will need to be logged into your computer with administrative rights.
Visit the link as given below to download the Microsoft compatibility pack:
http://www.microsoft.com/downloads/details.aspx?FamilyId=941b3470-3ae9-4aee-8f43-c6bb74cd1466&displaylang=en

backward version of google

0 comments

If you type "elgooG" and then click "I'm feeling lucky" on Google, will take you to a Google website that is completely backwards.

This backwards version of the ultra-popular search engine will come up directly if you click the ‘I’m Feeling Lucky’ button instead of ‘Google Search.’ The site was originally created just for fun, but has actually become quite useful in China after Google was banned there.

WINDOWS 8 M1 [Leaked] [Dwnld]

0 comments

Today goes to be a big leak day, Microsoft’s Windows 8 Build 7850 Milestone 1 got leaked on global village and mostly available on torrents for public download. The leaked build of Windows is 6.1.7850.0.winmain_win8m1.100922-1508_x8
6fre_client-enterprise_en-us.iso, which in short has the meaning that this build was compiled on 22nd September 2010.


According to the sources of Neowin, the leaked build of Windows 8 M1 is legitimate and this build of Windows 8 is currently available on a private FTP server site and just a few minutes away from the torrents to available it for public download.

download

http://torrentz.eu/9b49e220bcc5ddd5cea9ebccb690dd1fbc3269d6

List of free sms sites

0 comments

List of free sms sites
http://www.gsmvault.com/
http://smscity.com/
http://www.sms2india.org/
http://www.freesms.web.tr.tc/
http://www.d1g.com/
http://thesmszone.com/
http://zyb.com/
http://www.vazu.com/
http://www.sms.ac/
http://www.agentsms.com/
http://www.mobizone.com/
http://www.yellowpages.com.eg/
http://www.shortmessage.com/
http://www.worldxs.net/sms.html
http://www.hot.it/sms
http://www.smspress.com/
http://www.freesms.com/
http://www.textmefree.com/
http://www.rosms.home.ro/
http://www.nice-prizes.de/
http://www.uni.de/
http://www.quicksms.de/
http://www.cbfsms.com/
http://www.sms.de/
http://www.send.sms.to/free.asp
http://www.genie.co.uk/
http://www.world-free.com/free-sms
http://www.aircall.ch/sms/sendmsg_main_free.asp
http://www.telefonmarkt.de/sms/sms_info.php
http://www.free-sms-service.de/
http://www.freesms.2way.de/
http://www.bestspider.com/sms
http://www.metacrawler.de/
http://www.jokes.gr/en/sms
http://www.call-magazine.de/free_sms
http://www.vizzavi.it/
http://www.uboot.com/uk
http://www.ournet.md/sms
http://www.freesms.co.za/
http://www.hotsms.com/
http://www.jfax.de/
http://www.smsfree.co.uk/
http://www.mobileedge.co.uk/freesms/freesms.htm
http://www.sms-sprueche.tv/
http://www.sms.mums.it/
http://www.smspup.com/
http://www.jump.to/freesms
http://www.awalsms.com/
http://www.uaesms.com/
http://www.jinny.com.lb/sms
http://www.cellular.co.za/send_sms2.htm
http://www.mobizone.com/
http://www.smspop.com/
http://www.nemra1.com/
http://www.boswtol.com/
http://free-sms-message.com/index.http:/...om/sms.htm
http://www.itsalat.com/
http://www.quios.com/
http://www.clickatell.com/
http://www.ulluminati.ch/Nexus/sms.html
http://www.freesms.net/
http://www.free-sms.com/
http://www.lycos.co.uk/
http://www.sms.at/
http://www.smsyes.com/
http://www.smsuae.com/sms-uae
http://www.edihasms.com/
http://www.worldxs.net/sms.html
http://www.hot.it/sms
http://www.smspress.com/
http://www.freesms.com/
http://www.textmefree.com/
http://www.rosms.home.ro/
http://www.nice-prizes.de/
http://www.uni.de/
http://www.quicksms.de/
http://www.cbfsms.com/
http://www.sms.de/
http://www.send.sms.to/free.asp
http://www.genie.co.uk/
http://www.world-free.com/free-sms
http://www.aircall.ch/sms/
sendmsg_main_free.asp

http://www.telefonmarkt.de/sms/
http://www.bestspider.com/sms
http://www.jokes.gr/en/sms
http://www.call-magazine.de/free_sms
http://www.vizzavi.it/
http://www.uboot.com/uk
http://www.ournet.md/sms
http://www.cellular.co.za/
http://www.freesms.co.za/
http://www.hotsms.com/
http://www.jfax.de/
http://www.smsfree.co.uk/
http://www.mobileedge.co.uk/freesms/freesms.htm
http://www.sms-sprueche.tv/
http://www.sms.mums.it/
http://www.smspup.com/
http://www.jump.to/freesms
http://www.awalsms.com/
http://www.jinny.com.lb/sms
http://www.cellular.co.za/send_sms2.htm
http://www.boswtol.com/
http://www.masrawy.com/sms
http://www.resalh.com/
http://free-sms-message.com/index.htm
http://adleel.com/sms.htm
http://mobile.fares.net/sms/uae
http://www.itsalat.com/
http://www.quios.com/
http://www.clickatell.com/www.ulluminati...s/sms.html
http://www.freesms.net/
http://www.free-sms.com/
http://www.lycos.co.uk/
http://www.sms.at/
http://www.sms.com/
http://www.smsyes.com/
http://www.smsuae.com/sms-uae
http://www.edihasms.com/

Free Virus with Free AntiVirus

0 comments

Rogue AV programs have become increasingly common in last two years. There are couple of things interesting about rogue AV programs. First, the bad guys here do not use (in most cases) any sophisticated attacks on clients. They instead rely on visitors to wittingly install their "AV program". How do they do this? Through social engineering – they create web pages which are very authentic copy of legitimate screens in Windows operating systems. These web pages make visitors believe that their machine is infected with several malicious programs and that the offered "AV program" can help them clean it.
Once the rogue AV program is installed, the victim has to pay money to get it "working" or, in some cases to even uninstall it. So, the money making scheme is simple (some rogue AV versions even steal local data and install keyloggers).

In order to get people to visit their web sites serving rogue AV programs, the attackers use different vectors-
They Spend a huge ammount on Advertisement like Google Adwords, which make them always on a top of google search list. The victims who trust google usually fall in such pranks and download these malwares.
The main reason, however, why rogue AV is so successful is its persistence and amount of details - the web page they use to scare the visitor looks almost exactly like Windows' Security Center. One such page is shown below:
I was, of course, interested to see what else they do so I decided to analyze the code behind. First of all, I must say that the code is very elegant and clean, it's obvious that the bad guys got a real programmer to code the page (and malware?) for them.
The web page uses JQuery, a well known and popular JavaScript library. After setting up the environment, the JavaScript code on the web page shows a fake scan of the machine with seemingly random file names. The file names are actually grabbed from a huge array contained in a separate file (flist.js). The file names in this array (there is 1100 of them) are actually copied from a Windows XP machine (C:WindowsSystem32 directory). This, of course, increases the authenticity of the scan.
After the scan finishes, the user is informed that the machine is infected with viruses. The JavaScript code on the web page initially set up some handlers, so no matter what the user does next he will see a window notifying him that his machine is infected (interesting, the attackers used JavaScript confirm() method to display this message).
Of course, this wasn't generated by Windows – it's actually just an image the attackers created. The "Remove all" and "Cancel" also aren't real buttons, just part of the image which has a handler that will get executed wherever the user clicks. You guess, on a click it will try to download the Rogue AV program. To eliminate any confusion, they also show this nice window where they explain what exactly needs to be done in order to install their rogue AV program.

It is now not strange that rogue AV programs are infecting so many machines. The devil is in the details, and the attackers made damn sure that all details are here to fool the potential victims

Facebook Stylish Themes - by stylish

0 comments

first download and stylish addon to mozilla,

https://addons.mozilla.org/addon/2108

choose fb collection of layout from here,


http://userstyles.org/styles/browse/facebook.com/all/popularity/desc/1

it may be old but useful and better then chameleontom :)

Clean your RAM by notepad

0 comments

Clean Ur RAM
U may recognize that ur system gets slower and slower when playing and working a lot with ur pc. That's cause ur RAM is full of remaining progress pieces u do not need any more.

So create a new text file on ur desktop and call it .. uhm.. "RAMcleaner" or something...

Type

FreeMem=Space(64000000)
in this file and save it as RAMcleaner.vbs [ You may choose the "All Files" option when u save it ]

Run the file and ur RAM may be cleaned :>
Of course u can edit the code in the file for a greater "cleaning-progress".


FreeMem=Space(1280000000)

It Will Make Speed Your System..

Cyber Laws-- One should know.

0 comments

We all are facing the problem of Hacking in one or the other way. But do we all know about the laws in which that culprit "Cracker" can really be punished?


If not, then, HANS is making an effort to make you aware about your rights so that a right step can be taken at the right time so that this "CYBER TERRORISM" can actually be stopped.


Section 43 - Unauthorised Access means Using someone account without permission and authentication.
Under the IT Act, 2008 no limit on amount of compensation for offences under Section 43.

Under IT Act, 2008 all the acts referred under section 43, are also covered u/Sec. 66 if they are done "dishonestly" or "fraudulently".

Section 66(A) Sending of offensive or false messages , Also known as "Cyber Stalking"

Section 66(B) Dishonestly receiving stolen computer resource or communication device
Also covers use of stolen Computers, mobile phones, SIM Cards, etc
Punishment – imprisonment upto 3 years or fine upto Rs. 1 lakh or both


Section66(C) Identity theft
Fraudulently or dishonestly using someone else's electronic signature, password or any other unique identification feature.
Punishment - Imprisonment upto 3 years and fine upto Rs. 1 lakh


Section 66(D) Cheating by personation
Cheating by pretending to be some other person
Punishment – imprisonment upto 3 years and fine upto Rs. 1 lakh.


Covers sending of menacing, offensive or false messages via SMS/EMAIL/MMS
Punishment – imprisonment upto 3 years and fine.


Section 66(E) Violation of Privacy ,Popularly known as Voyeurism
Pune spy cam incident where a 58-year old man was arrested for installing spy cameras in his house to 'snoop' on his young lady tenants


Covers acts like hiding cameras in changing rooms, hotel rooms, etc
Punishment –Imprisonment upto 3 years or fine upto Rs. 2 lakh or both.


Section 66(F) Cyber terrorism
Whoever uses cyberspace with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people
Punishment - Imprisonment which may extent to life imprisonment


Section 67 - Publishing or transmitting obscene material in electronic form.
Punishment
First instance - imprisonment upto 3 years and fine upto Rs. 5 lakh.
Subsequent - imprisonment upto 5 years and fine upto Rs. 10 lakh.


Section 67(A) Cyber Pornography.
Publishing or transmitting sexually explicit acts in the electronic form
Similarity with Sec. 292 IPC
Punishment
First instance - imprisonment upto 5 years Subsequent - imprisonment upto 7 years Fine upto Rs. 10 lakh.


Section 67(B)
Creating, collecting, browsing, downloading, etc of Child Pornography
Punishment
First instance - imprisonment upto 5 years.
Subsequent - imprisonment upto 7 years
Fine upto Rs. 10 lakh.


Section 69 – Government's power to intercept
Government to intercept, monitor or decrypt any information generated through any computer resource if it thinks to do so in the interest of the sovereignty or integrity of India.

Section 67(C) – Preservation of information by intermediaries
Intermediary shall preserve and retain such information as may be specified for such duration and in such manner and format as the Central Government may prescribe.


Section 72(A) - Liability of Intermediary not to disclose any personal information
Intermediary to act as per the terms of its lawful contract and not beyond it.
Punishment – imprisonment upto 3 years or fine upto 5 lakh or both.


Section 79- Liability of Intermediary
An intermediary not to be liable for any third party information, data, or communication link made available or hosted by him.


Liability of Intermediary:-
Intermediary need to prove that he didn't –

* Initiate the transmission,
* Select the receiver of the transmission, and
* Select or modify the information contained in the transmission and

The intermediary observes due diligence while discharging his duties under the Act.

Section 84(B) – Abetment
Abetting to commit an offence is punishable
Punishment – Same punishment provided for the offence under the Act


Section 84(C) – Abetment
Attempt to commit an offence is punishable.
Punishment – Imprisonment which may extend to one-half of the longest term of imprisonment provided for that offence


Section 78 – Investigation Powers
As per the IT Act, 2008 Cyber crime cases can be investigated by the "Inspector" rank police officers.
Under the IT Act, 2000 such powers were with the "DYSP/ACP".


Section 77 (A) – Compounding of Offences
Compounding – "Out of court settlement"


Offences

* "for which less than three years imprisonment has been provided" can be compounded.
* Such offence should not affect the socio economic conditions of the country or
* has been committed against a child below the age of 18 years or a woman.

These are the"Laws" according to the "IT AMENDMENT ACT 2008" which was passed in 2009. We all should be aware of our CYBER RIGHTS, so that we together can fight with the "CYBER THREATS