*Happy New Year*
As u r already aware of "THE TRICK OF THE YEAR 2010(*123*099#)" But now this trick is not working in many states.
But I am back with big bang with new 2011 trick mobile net trick.just visit the link given below and give some 5-6 tick mark answers of questions by reliance customer survey and get subscribe to 99mobile net plan free for one month its official.AND working all over India.,Plan will be activated within 72hours
{ http://www.rcom.co.in/Rcom/rworld/Customer_Survey/CustomerSurveyForm.html } or visit here for if above link not work and,after launching the page click on Back .{ http://www.rcom.co.in/Rcom/rworld/Customer_Survey/thank-you.html }
u can access these link free in ur phone browser
apn-rcomwap
Its official trick working 1000%. Enjoy. . .Bit busy during exams
Any comment most welcomed
This blog is all about educational purposes and ethical hacking.i m not responsible for any kind of missuse
Friday, December 31, 2010
Friday, December 17, 2010
Exclusive for airtel gprs user
Make a setting in ur mobile USE this proxy server
proxy:208.109.128.144
port:80
homepage: http://0.facebook.com
username and password leave blank..
after configuring the setting,go to ur default browser or s60 opera sis(not opera mini jar)
type http://0.facebook.com
u will get a proxy page from which u can surf+ download unlimited until and unless facebook is banned lolz which is not possible!!
This proxy is very fast a new user proxy interface
!note=u cannot open any website directly,u will have to go to homepage again and again to access internet..
limitation of this proxy:
1) streaming not supported 1) apps cannot access internet,so u can use any browser like opera with this trick,only native browser works this proxy works on computer too!! any problem??? reply me here
proxy:208.109.128.144
port:80
homepage: http://0.facebook.com
username and password leave blank..
after configuring the setting,go to ur default browser or s60 opera sis(not opera mini jar)
type http://0.facebook.com
u will get a proxy page from which u can surf+ download unlimited until and unless facebook is banned lolz which is not possible!!
This proxy is very fast a new user proxy interface
!note=u cannot open any website directly,u will have to go to homepage again and again to access internet..
limitation of this proxy:
1) streaming not supported 1) apps cannot access internet,so u can use any browser like opera with this trick,only native browser works this proxy works on computer too!! any problem??? reply me here
Tuesday, November 30, 2010
Latest Need for speed Hot pursuit 2
Need for Speed: Hot Pursuit 2 (also known as NFS6, NFS: HP2, and Hot Pursuit 2) is a 2002 racing video game, serving as the debut Need for Speed (NFS) title from EA Black Box[1], and the first Need for Speed for the SIXTH generation of consoles as well as the last of the Classic Era Need for Speed Games. In 2003, the game was AWARDED Console Racing Game of the Year [2] at the 6th Annual Interactive Achievement Awards.
Gameplay Hot Pursuit 2 draws primarily from the gameplay and style of Need for Speed III: Hot Pursuit; its emphasis was on evading the police and over-the-top tracks featuring lengthy shortcuts. As with the game's predecessor, the player also has the option to play as a police officer trying to arrest speeders. To do so the player rams the speeding vehicle multiple times to disable it. The player must turn on their lights and sirens while in pursuit, and they automatically turn off after arresting the suspect. Police can call for a road block, spike strips, and request help from a helicopter to assist in chasing the target vehicle. At the end, the player is awarded for the cars busted. In the PlayStation 2 version this mode is called You're the Cop mode while in the PC, Gamecube and Xbox versions it's Be the Cop mode. Races take place in four environments which differ in atmosphere, with a handful of tracks per environment. The different tracks in an environment are formed by different roads being connected or separated by road blocks. A fictional tropical island, reminiscent of Hawaii, is the most varied environment; the track traverses a city, volcano, waterfall, beach, forest, and two villages. The coastal forest environment, reminiscent of the Washington coast, sometimes has foggy weather, but this does not effectively limit visibility during races. The Mediterranean coast and so-called Alpine environments are more homogeneous, with little variation except the occasional short cut. Compared to the original Hot Pursuit, which features weather and day/night variation independent of track, and widely varying environments from snowy mountains over cities to desert, Hot Pursuit 2 tracks have significantly less variation. Hot Pursuit 2 is also the first in the series to lack an in-car view that was available in preceding Need for Speed titles. There is only a "driver's perspective" view available, without a visible dashboard. There is one race however on the PlayStation 2 version, with a Ferrari, in which the player drives with this in-car view.
Gameplay Hot Pursuit 2 draws primarily from the gameplay and style of Need for Speed III: Hot Pursuit; its emphasis was on evading the police and over-the-top tracks featuring lengthy shortcuts. As with the game's predecessor, the player also has the option to play as a police officer trying to arrest speeders. To do so the player rams the speeding vehicle multiple times to disable it. The player must turn on their lights and sirens while in pursuit, and they automatically turn off after arresting the suspect. Police can call for a road block, spike strips, and request help from a helicopter to assist in chasing the target vehicle. At the end, the player is awarded for the cars busted. In the PlayStation 2 version this mode is called You're the Cop mode while in the PC, Gamecube and Xbox versions it's Be the Cop mode. Races take place in four environments which differ in atmosphere, with a handful of tracks per environment. The different tracks in an environment are formed by different roads being connected or separated by road blocks. A fictional tropical island, reminiscent of Hawaii, is the most varied environment; the track traverses a city, volcano, waterfall, beach, forest, and two villages. The coastal forest environment, reminiscent of the Washington coast, sometimes has foggy weather, but this does not effectively limit visibility during races. The Mediterranean coast and so-called Alpine environments are more homogeneous, with little variation except the occasional short cut. Compared to the original Hot Pursuit, which features weather and day/night variation independent of track, and widely varying environments from snowy mountains over cities to desert, Hot Pursuit 2 tracks have significantly less variation. Hot Pursuit 2 is also the first in the series to lack an in-car view that was available in preceding Need for Speed titles. There is only a "driver's perspective" view available, without a visible dashboard. There is one race however on the PlayStation 2 version, with a Ferrari, in which the player drives with this in-car view.
Sunday, November 28, 2010
Chepest pc made by INDIA

After cheapest car in the world now its cheapest PC just for few bucks (35$ at max including os). Now College and university students will be able to buy a computer at an unbelievable price of $35 (approximately rupees 1,600). Possibly the cheapest computer in the world, this tablet PC weighs 400 grams and has all the applications available on a regular computer. The pc was unveiled by Union Human Resource Development Minister Kapil Sibal in the Capital on Thursday. It's a touch-screen device and is wi-fi enabled for Internet access. Developed by the research teams of the Indian Institutes of Technology (IITs)-mainly IIT- Rajasthan and IIT-Kanpur-this tablet PC has 256 random-access memory (RAM). It is powered by a 2-watt system to suit poor power supply areas and has alternative battery support through solar cells. The minister said he expected that the prices would go down to rupees 1,000 ($20) and drop to rupees 500 ($10) as more innovations are introduced. "This is real and tangible and we will take it forward," Sibal said. The device, which has a seven- inch diagonal screen, has an inbuilt processor and is easily portable. It can be connected to a keyboard through the USB port. Significantly, the device has no hard disk and instead makes use of a memory disc of 2 GB. So, just as in a digital camera, the storage capacity can be enhanced by inserting a higher memory disc. It can also be connected to an external harddisk of 32 GB. "What we have indigenously designed is a personalised device, which is also the cheapest in the world, offering all regular applications," a senior official of the National Mission on Education through ICT (NMEICT) said. Students will have access to Microsoft-equivalent applications of Word, Office, Power Point etc. Instead of Windows, it will offer the open-source Linux operating system, thereby keeping costs in check. Targeting institutions as the first beneficiaries of this device, the government has decided to subsidise it by funding half the cost, i.e., rupees 750. The HRD ministry has invited private players to innovate and further bring down the costs. "When we started the project, the response from the private sector was lukewarm. Now many are willing to join the innovation," Sibal said. The NMEICT is also developing high quality e-content free of cost for students and institutions. In the meantime, the government is providing broadband connectivity to institutions. About 8,500 colleges in the country have already been connected. The challenge before the government now is to put in place the delivery lines for these devices.
Friday, November 26, 2010
Reliance free recharge
Well Guys Here goes the trick of my frnd
You can get balance in your reliance GSM account as much as you can................
Tested and enjoyed by my frnd in RIM GSM MAHARASHTRA SIM.........................
1. Get A Reliance GSM having some positive balance.
2. Go to wap.rworld.co.in >>>>>>> mobile net >>>>>>>subscribe >>>>>>get subscribed to 5rs daily pack........... As a result your 5 rupees will get deducted...................... [ even if your balance is less than 5 your balance will get negative].
3. Now after getting the confirmation message please dial 155223 and follow the IVRS instruction.
4. please give 2085 as the deactivation code...........
5. Repeat the step 4 as much as you can before getting the deactivation confirmation message..................
6. Now after getting deactivation message check ur balane by *367#. you will find that you have got Rs(no. of step5 performed by you X 5) in your account..................
Note : Please DO not activate or deactivate by anyother method otherwise the balance will not come back............... So guys Hurry Jitna loot sakte ho loot lo.have a nice day.
You can get balance in your reliance GSM account as much as you can................
Tested and enjoyed by my frnd in RIM GSM MAHARASHTRA SIM.........................
1. Get A Reliance GSM having some positive balance.
2. Go to wap.rworld.co.in >>>>>>> mobile net >>>>>>>subscribe >>>>>>get subscribed to 5rs daily pack........... As a result your 5 rupees will get deducted...................... [ even if your balance is less than 5 your balance will get negative].
3. Now after getting the confirmation message please dial 155223 and follow the IVRS instruction.
4. please give 2085 as the deactivation code...........
5. Repeat the step 4 as much as you can before getting the deactivation confirmation message..................
6. Now after getting deactivation message check ur balane by *367#. you will find that you have got Rs(no. of step5 performed by you X 5) in your account..................
Note : Please DO not activate or deactivate by anyother method otherwise the balance will not come back............... So guys Hurry Jitna loot sakte ho loot lo.have a nice day.
Thursday, November 25, 2010
Mdu all sem dec. Exam datesheet-btech
It can b good or bad news to all mdu students datesheet for december exam is out and knocking at the door.so prepare yourself before u suffered from exam headache.here is the link to download mdu datesheet
(http://plunder.com/2da3751a44)
Or
(http://www.plunder.com/Mdu-dec-exam-datesheet-download-2da3751a44.htm)
(http://plunder.com/2da3751a44)
Or
(http://www.plunder.com/Mdu-dec-exam-datesheet-download-2da3751a44.htm)
Wednesday, November 24, 2010
Airtel reliance 1000% working trick
Welcome to all new users you are most welcome in my daily updated blog.
Today m sharing a easy way to hack reliance and airtel net and tried by me 1000% working
1. You should download handler opera or ucweb or bolt,snaptu,ebuddy or any handler browser.
Handler means in any browser a pop up comes which say operator trick and you have to fill all that blanks.
2. Here m providing handler opera mini from which u can download and browse unlimited.m writing from mobile so i cant post screenshots here.so u can download
1- operamini 4.2 handler from below link
(http://plunder.com/8e8a081438)
or
(http://www.plunder.com/Handler-opera-mini-download-8e8a081438.htm)
2- Opera 5.0(multiple tabs and multiple downloading)
(www.mydesi.mobie.in/New%20Opera%20Mini%205%20Handler%204%20FREE)
now after downloading follow these procedures
1.open opera handler
2.select settings and select custom which is on the top
3.select primary server then edit it and paste this(http://server4.operamini.com)
2. select secondary server then paste (socket://server4.operamini.com)
3.select proxy type put http
4. select proxy server then paste(wap.mauj.com.beta.opera-mini.net)
5.and remaining fiels blank.now save ur setting.and start browsing and downloading as much as u want through
airtel-select mobile office
reliance-rcomwap or rcommms.
any problem u can contact me here or
email:- dpundir71@gmail.com
Today m sharing a easy way to hack reliance and airtel net and tried by me 1000% working
1. You should download handler opera or ucweb or bolt,snaptu,ebuddy or any handler browser.
Handler means in any browser a pop up comes which say operator trick and you have to fill all that blanks.
2. Here m providing handler opera mini from which u can download and browse unlimited.m writing from mobile so i cant post screenshots here.so u can download
1- operamini 4.2 handler from below link
(http://plunder.com/8e8a081438)
or
(http://www.plunder.com/Handler-opera-mini-download-8e8a081438.htm)
2- Opera 5.0(multiple tabs and multiple downloading)
(www.mydesi.mobie.in/New%20Opera%20Mini%205%20Handler%204%20FREE)
now after downloading follow these procedures
1.open opera handler
2.select settings and select custom which is on the top
3.select primary server then edit it and paste this(http://server4.operamini.com)
2. select secondary server then paste (socket://server4.operamini.com)
3.select proxy type put http
4. select proxy server then paste(wap.mauj.com.beta.opera-mini.net)
5.and remaining fiels blank.now save ur setting.and start browsing and downloading as much as u want through
airtel-select mobile office
reliance-rcomwap or rcommms.
any problem u can contact me here or
email:- dpundir71@gmail.com
Monday, September 27, 2010
Gprs settings for all network
I am providing settings almost for all networks.
This will help newbie who want to use gprs hacks from this blog.
AND ALSO THE PEOPLE WHO BUY NEW SIM.
SO NO NEED TO CALL/SMS OPERATOR FOR GETTING SETTINGS .
SO ENJOY .
Airtel gprs setting
send "PLIVE" to 121 for instant airtel live and mms setting
and MO to 52567 for instant mobile office setting
AIRTEL MANUAL GPRS SETTINGS
AIRTEL LIVE
Account Name – Airtel live
Homepage – http://live.airtelworld.com
Username – Blank
Password – Blank
Proxy – Enabled/yes
Proxy and Server Adress – 100.1.200.99
Accespoint Name – airtelfun.com
Proxy and Server Port – 8080
Data bearer – GPRS/ Packet Data
Authentication Type – Normal
*********************************
MOBILE OFFICE
Account Name – MO
Homepage – www.google.com
Username – Blank
Password – Blank
Proxy – disabled/no
Accespoint Name – airtelgprs.com
Proxy and Server Port – 8080
Data bearer – GPRS/ Packet Data
Authentication Type – Normal
****************************
AIRTEL NOP
Account Name – NOP
Homepage – www.google.com
Username – Blank
Password – Blank
Proxy – Enabled/yes
Proxy and Server Adress – 100.1.200.99
Accespoint Name – airtelwap.com
Proxy and Server Port – 8080
Data bearer – GPRS/ Packet Data
Authentication Type – Normal
Airtel mms settings
AccountName:- AIRTELMMS
ServerAddress:- http://100.1.201.171:10021/mmsc
ProxyAddress:- 100.1.201.172
ProxyPort:- 8799
***********************************************
Idea Manual Gprs Settings
IDEA GPRS
Account Name – idea GPRS
Username – Blank
Password – Blank
Homepage – http://wap.ideafresh.com
Proxy and Server Port – 8080
Proxy and Server adress – 10.4.42.45
Databearer – GPRS / Packetdata
Acces Point Name – imis
Proxy – Enabled/yes
Authentication Type – Normal
****************************************
Vodafone Gprs Settings
VODAFONE GPRS
Account Name: Vodafone_gprs
Homepage: http://live.vodafone.in
User Name: (no need)
Pass: (no need)
Proxy: Enabled
Proxy Address: 10.10.1.100
Proxy Port: 9401 or 9201
Data Bearer: Packet Data
Packet Data Access Point: portalnmms
Network type: IPV4
Authentication: normal
****************************************************
TATA DOCOMO MANUAL GPRS SETTINGS
TATA DOCOMO DIVE IN
Account Name – DocomDive
Username – Blank
Password – Blank
Homepage – http://divein.tatadocomo.com
Proxy and Server Port – 8080
Proxy and Server adress – 10.124.94.7
Databearer – GPRS / Packetdata
Acces Point Name – tata.docomo.dive.in
Proxy – Enabled/yes
Authentication Type – Normal
*************************
DOCOMO INTERNATE
Account Name – DocomNet
Username – Blank
Password – Blank
Homepage – www.google.com
Proxy - Disabled / No
Databearer – GPRS / Packetdata
Acces Point Name – tata.docomo.internet
Proxy – Enabled/yes
Authentication Type – Normal
*****************************
DOCOMO MMS
Account Name – DocomoMMS
Username – Blank
Password – Blank
Access point- tata.docomo.mms
home page- http://mmsc/
Proxy - Enabled / Yes
proxy server- 10.124.26.94
port- 8799
Databearer – GPRS / Packetdata
Proxy – Enabled/yes
Authentication Type – Normal
************************************************
Reliance GSM GPRS SETTINGS
send "ALL" TO 55100
Reliance GSM WAP Setting manual
APN: rcomwap
Login Request Required : off
Authentication : PAP
Data Compression : off
Header Compression : off
Settings Name: Mobile World
Home Page / WAP Page: http://wap.rworld.co.in
Proxy: Yes
Proxy Server Address : 010.239.221.005
Port : 8080
Full Address in case of Windows Phone : 010.239.221.005:8080
User Name = leave it blank
Pass word = leave it blank
*********************************************************
Reliance GSM RCOMNET Setting
ACCOUNT NAME-RCOMNET
APN-rcomnet
(leave other field like proxy ,dns,username password blank)
Reliance mms settings
APN: rcommms
Login Request Required : off
Authentication : PAP
Data Compression : off
Header Compression : off
Settings Name: Reliance MMS
Home Page / WAP Page: http://wap.rworld.co.in
Proxy: Yes
Proxy Server Address : 010.239.221.005
Port : 8080
User Name = leave it blank
Pass word = leave it blank
MMS Server Settings
Server URL: http://10.239.221.47/mms/
Ip Address: 10.239.221.5
Apn: rcommms
********************************************************
aircel gprs setting{delhi region}
aircel gprs
accont name-AIRCEL-GPRS
APN:aircelgprs
homepage-www.google.com
(leave other field like proxy ,dns,username password blank)
POCKET INTERNET (WAP)
accont name-AIRCEL-WAP
APN:aircelwap
homepage-www.google.com
(leave other field like proxy ,dns,username password blank)
************************************************************
BSNL GPRS SETTINGS
TO ACT 3G SEND SMS AS ACT 3G TO 53733[TOLLFREE]
SETTINGS R AS FOLLOWS
1] bsnllive
APN = bsnllive
IP = 10.220.67.131
PORT = 8080
HOMEPAGE = http://bsnllive.in [nofollow]
********************************
2] bsnlmms
APN = bsnlmms
IP = 10.210.10.11
PORT = 8080
HOMEPAGE = http://bsnlmmsc.in
***********************************
3] bsnlnet
APN = bsnlnet
IP = NONE
PORT = NONE
HOMEPAGE = http://www.google.co.in
*************************************
4] bsnlstream
APN = bsnlstream
IP = NONE
PORT = NONE
HOMEPAGE = NONE
***************************************
This will help newbie who want to use gprs hacks from this blog.
AND ALSO THE PEOPLE WHO BUY NEW SIM.
SO NO NEED TO CALL/SMS OPERATOR FOR GETTING SETTINGS .
SO ENJOY .
Airtel gprs setting
send "PLIVE" to 121 for instant airtel live and mms setting
and MO to 52567 for instant mobile office setting
AIRTEL MANUAL GPRS SETTINGS
AIRTEL LIVE
Account Name – Airtel live
Homepage – http://live.airtelworld.com
Username – Blank
Password – Blank
Proxy – Enabled/yes
Proxy and Server Adress – 100.1.200.99
Accespoint Name – airtelfun.com
Proxy and Server Port – 8080
Data bearer – GPRS/ Packet Data
Authentication Type – Normal
*********************************
MOBILE OFFICE
Account Name – MO
Homepage – www.google.com
Username – Blank
Password – Blank
Proxy – disabled/no
Accespoint Name – airtelgprs.com
Proxy and Server Port – 8080
Data bearer – GPRS/ Packet Data
Authentication Type – Normal
****************************
AIRTEL NOP
Account Name – NOP
Homepage – www.google.com
Username – Blank
Password – Blank
Proxy – Enabled/yes
Proxy and Server Adress – 100.1.200.99
Accespoint Name – airtelwap.com
Proxy and Server Port – 8080
Data bearer – GPRS/ Packet Data
Authentication Type – Normal
Airtel mms settings
AccountName:- AIRTELMMS
ServerAddress:- http://100.1.201.171:10021/mmsc
ProxyAddress:- 100.1.201.172
ProxyPort:- 8799
***********************************************
Idea Manual Gprs Settings
IDEA GPRS
Account Name – idea GPRS
Username – Blank
Password – Blank
Homepage – http://wap.ideafresh.com
Proxy and Server Port – 8080
Proxy and Server adress – 10.4.42.45
Databearer – GPRS / Packetdata
Acces Point Name – imis
Proxy – Enabled/yes
Authentication Type – Normal
****************************************
Vodafone Gprs Settings
VODAFONE GPRS
Account Name: Vodafone_gprs
Homepage: http://live.vodafone.in
User Name: (no need)
Pass: (no need)
Proxy: Enabled
Proxy Address: 10.10.1.100
Proxy Port: 9401 or 9201
Data Bearer: Packet Data
Packet Data Access Point: portalnmms
Network type: IPV4
Authentication: normal
****************************************************
TATA DOCOMO MANUAL GPRS SETTINGS
TATA DOCOMO DIVE IN
Account Name – DocomDive
Username – Blank
Password – Blank
Homepage – http://divein.tatadocomo.com
Proxy and Server Port – 8080
Proxy and Server adress – 10.124.94.7
Databearer – GPRS / Packetdata
Acces Point Name – tata.docomo.dive.in
Proxy – Enabled/yes
Authentication Type – Normal
*************************
DOCOMO INTERNATE
Account Name – DocomNet
Username – Blank
Password – Blank
Homepage – www.google.com
Proxy - Disabled / No
Databearer – GPRS / Packetdata
Acces Point Name – tata.docomo.internet
Proxy – Enabled/yes
Authentication Type – Normal
*****************************
DOCOMO MMS
Account Name – DocomoMMS
Username – Blank
Password – Blank
Access point- tata.docomo.mms
home page- http://mmsc/
Proxy - Enabled / Yes
proxy server- 10.124.26.94
port- 8799
Databearer – GPRS / Packetdata
Proxy – Enabled/yes
Authentication Type – Normal
************************************************
Reliance GSM GPRS SETTINGS
send "ALL" TO 55100
Reliance GSM WAP Setting manual
APN: rcomwap
Login Request Required : off
Authentication : PAP
Data Compression : off
Header Compression : off
Settings Name: Mobile World
Home Page / WAP Page: http://wap.rworld.co.in
Proxy: Yes
Proxy Server Address : 010.239.221.005
Port : 8080
Full Address in case of Windows Phone : 010.239.221.005:8080
User Name = leave it blank
Pass word = leave it blank
*********************************************************
Reliance GSM RCOMNET Setting
ACCOUNT NAME-RCOMNET
APN-rcomnet
(leave other field like proxy ,dns,username password blank)
Reliance mms settings
APN: rcommms
Login Request Required : off
Authentication : PAP
Data Compression : off
Header Compression : off
Settings Name: Reliance MMS
Home Page / WAP Page: http://wap.rworld.co.in
Proxy: Yes
Proxy Server Address : 010.239.221.005
Port : 8080
User Name = leave it blank
Pass word = leave it blank
MMS Server Settings
Server URL: http://10.239.221.47/mms/
Ip Address: 10.239.221.5
Apn: rcommms
********************************************************
aircel gprs setting{delhi region}
aircel gprs
accont name-AIRCEL-GPRS
APN:aircelgprs
homepage-www.google.com
(leave other field like proxy ,dns,username password blank)
POCKET INTERNET (WAP)
accont name-AIRCEL-WAP
APN:aircelwap
homepage-www.google.com
(leave other field like proxy ,dns,username password blank)
************************************************************
BSNL GPRS SETTINGS
TO ACT 3G SEND SMS AS ACT 3G TO 53733[TOLLFREE]
SETTINGS R AS FOLLOWS
1] bsnllive
APN = bsnllive
IP = 10.220.67.131
PORT = 8080
HOMEPAGE = http://bsnllive.in [nofollow]
********************************
2] bsnlmms
APN = bsnlmms
IP = 10.210.10.11
PORT = 8080
HOMEPAGE = http://bsnlmmsc.in
***********************************
3] bsnlnet
APN = bsnlnet
IP = NONE
PORT = NONE
HOMEPAGE = http://www.google.co.in
*************************************
4] bsnlstream
APN = bsnlstream
IP = NONE
PORT = NONE
HOMEPAGE = NONE
***************************************
Gprs setting for all network
UNINOR Manual Gprs Settings
Account Name – UNINOR
Username – Blank
Password – Blank
Homepage – www.google.com
Proxy and Server Port – 8080
Proxy and Server adress –10.58.10.58
Databearer – GPRS / Packetdata
Acces Point Name – uninor
Proxy – Enabled/yes
Authentication Type – Normal
*******************************************8
Videocon gprs settings
Connection Name : Videocon Internet
Data Bearer : Packet Data
APN : vinternet.com
Username & Password: Blank
Homepage : www.google.com
Proxy server : Blank
Proxy port : Blank
********************************
Videocon WAP
Connection Name : Videocon GPRS
Data Bearer : Packet Data
APN : vgprs.com
Username & Password: Blank
Homepage : http://wap.live.in
Proxy server : 10.202.5.145
Proxy port : 8799
**************************************
Videocon MMS
Connection Name : Videocon MMS
Data Bearer : Packet Data
APN : vgprs.com
Username & Password: Blank
Homepage : http://10.202.4.119:10021/mmsc/
Proxy server : 10.202.5.145
Proxy port : 8799
**********************************************************
SO THIS IS ALL. I WILL LIKE TO THANK MY FRIENDS FOR HELPING ME IN COMPILING THIS INFO.
Account Name – UNINOR
Username – Blank
Password – Blank
Homepage – www.google.com
Proxy and Server Port – 8080
Proxy and Server adress –10.58.10.58
Databearer – GPRS / Packetdata
Acces Point Name – uninor
Proxy – Enabled/yes
Authentication Type – Normal
*******************************************8
Videocon gprs settings
Connection Name : Videocon Internet
Data Bearer : Packet Data
APN : vinternet.com
Username & Password: Blank
Homepage : www.google.com
Proxy server : Blank
Proxy port : Blank
********************************
Videocon WAP
Connection Name : Videocon GPRS
Data Bearer : Packet Data
APN : vgprs.com
Username & Password: Blank
Homepage : http://wap.live.in
Proxy server : 10.202.5.145
Proxy port : 8799
**************************************
Videocon MMS
Connection Name : Videocon MMS
Data Bearer : Packet Data
APN : vgprs.com
Username & Password: Blank
Homepage : http://10.202.4.119:10021/mmsc/
Proxy server : 10.202.5.145
Proxy port : 8799
**********************************************************
SO THIS IS ALL. I WILL LIKE TO THANK MY FRIENDS FOR HELPING ME IN COMPILING THIS INFO.
Saturday, September 18, 2010
windows trick
Load ur folders faster in PC:
>Tools
>Folder options
>View
>Automatically search 4 network folders & printers
>Don't cache thumbnails.
have a nice day
2. hide things in windows
You can hide all windows,Revealing only whats on the computer desktop,with one keystroke-hit the Windows key and D simultaneously in Windows
Have a nice day
>Tools
>Folder options
>View
>Automatically search 4 network folders & printers
>Don't cache thumbnails.
have a nice day
2. hide things in windows
You can hide all windows,Revealing only whats on the computer desktop,with one keystroke-hit the Windows key and D simultaneously in Windows
Have a nice day
Friday, September 17, 2010
totally entertaining
wanna see how you look after 20 years..!-
Just go to:www.in20years.com-Here upload ur photo and see what will happen and enjoy
have a nice day
2. Watch Yourself In 3D!
visit:www.start3d.comA site that makes easy to create 3D version of your photos!
enjoy
have a nice day
3. Bird Lovers,
Here's a Site For U.
www.allaboutbirds.com
is a great site for anyone who love birds with pics,wallpaprs and info on birds.enjoy
have a nice day
Just go to:www.in20years.com-Here upload ur photo and see what will happen and enjoy
have a nice day
2. Watch Yourself In 3D!
visit:www.start3d.comA site that makes easy to create 3D version of your photos!
enjoy
have a nice day
3. Bird Lovers,
Here's a Site For U.
www.allaboutbirds.com
is a great site for anyone who love birds with pics,wallpaprs and info on birds.enjoy
have a nice day
Reliance net hack 1000% working
NEw Reli@NcE Net H@CK: ------------------------------------------------------------------ Hack Reliance 99rs. Postpaid GPRS by your prepaid sim & use FREE GPRS. Just dial *123*099# u got a confirmation message & then use rcomnet or smartnet setting to use free gprs. If you are getting Msg as " Unable to Process request " then keep on trying. This Msg is due to network problem. The plan offers 2.5 gb for 1 month + additional 99 rs of net usage. You can use both rcommms nd rcomnet.
Limited time trick offer
Have a nice day
Limited time trick offer
Have a nice day
Sunday, August 15, 2010
100% free browsing n downloading software for airtel
100% free browsing n downloading software for airtel
after lot of reasearch i was able to post my reasearch work here.I m posting here all working apps for free.its 1000000000000000000% working.i cant upload here so i uploaded in plunder.com(free web hosting and uploading)
after downloading first initialize by mobile office then use at zero balance fully tested.use mobile office only
1. FREE UCWEB 7.0 WITH BROWSING AND DOWNLOADING
(http://www.plunder.com/free-ucweb-by-deepak-download-6c22e10f80.htm) use this link without brackets and copy paste in ur browser.
2.FREE UCWEB 6.5 WITH BROWSING AND DOWNLOADING
(http://www.plunder.com/free-ucweb-6-5-by-pundir-download-90ee84d768.htm)
3.FREE opermini4.0 WITH BROWSING AND DOWNLOADING
(http://www.plunder.com/free-opera-mini-4-2-by-pundir-download-3b4b3deb34.htm)
plz comment whether its working for u or not.i m here for solving ur problem.
thanks
after lot of reasearch i was able to post my reasearch work here.I m posting here all working apps for free.its 1000000000000000000% working.i cant upload here so i uploaded in plunder.com(free web hosting and uploading)
after downloading first initialize by mobile office then use at zero balance fully tested.use mobile office only
1. FREE UCWEB 7.0 WITH BROWSING AND DOWNLOADING
(http://www.plunder.com/free-ucweb-by-deepak-download-6c22e10f80.htm) use this link without brackets and copy paste in ur browser.
2.FREE UCWEB 6.5 WITH BROWSING AND DOWNLOADING
(http://www.plunder.com/free-ucweb-6-5-by-pundir-download-90ee84d768.htm)
3.FREE opermini4.0 WITH BROWSING AND DOWNLOADING
(http://www.plunder.com/free-opera-mini-4-2-by-pundir-download-3b4b3deb34.htm)
plz comment whether its working for u or not.i m here for solving ur problem.
thanks
100 % free downloading and browsing
100 % free downloading and browsing for airtel users
works in pc and mobile:
access point : airtelgprs.com For dial up connection and pc suite
PC
1.In address bar type mobile.indiatimes.com or some free sites that open freely
in airtel then open opera
opera tools -> preference ->advance->network -> proxy settings-> type it in http and https lnse.info port 80 (use small L not i) - for better browsing speed and downloading , use it in opera only(it works fine for me disadv is it often go for service maintenance.so dont worry it back soon out of 7 days /2 days for that maintenance )
Vimuto.com port 80 - note letter 'V' should be in capital, works in all browser
MOBILE :
select mobile office then edit
access point : airtelgprs.com use mobile office
save home page as mobile.indiatimes.com
but only for the default browser that means wap browser 2.0. and it will also work in symbian platform use your symbian opera mini for better speed and downloading
65.110.6.45
76.73.115.163
fubrus.com
NNDR.info
ZBoM.info
HTTPS WEBXCOPE.COM (only on mobile)
https exitb. net
jumboproxy.net
orkuch.com
orkutpass.com
works in pc and mobile:
access point : airtelgprs.com For dial up connection and pc suite
PC
1.In address bar type mobile.indiatimes.com or some free sites that open freely
in airtel then open opera
opera tools -> preference ->advance->network -> proxy settings-> type it in http and https lnse.info port 80 (use small L not i) - for better browsing speed and downloading , use it in opera only(it works fine for me disadv is it often go for service maintenance.so dont worry it back soon out of 7 days /2 days for that maintenance )
Vimuto.com port 80 - note letter 'V' should be in capital, works in all browser
MOBILE :
select mobile office then edit
access point : airtelgprs.com use mobile office
save home page as mobile.indiatimes.com
but only for the default browser that means wap browser 2.0. and it will also work in symbian platform use your symbian opera mini for better speed and downloading
65.110.6.45
76.73.115.163
fubrus.com
NNDR.info
ZBoM.info
HTTPS WEBXCOPE.COM (only on mobile)
https exitb. net
jumboproxy.net
orkuch.com
orkutpass.com
Wednesday, July 28, 2010
Free browsing n downloading
Yeah !!! Once Again Free Browsing And Downloading through Airtel Live !
Hello Friends, After Many Days Of Trying and Trying ... I finally got one more way of Free Browsing And Downloading through Airtel live
Its Working for Me at High Speed On 0 Balance...
The Method is open any site for free with Airtel live with this url
http://59.160.228.22/index.php?p= Your Site Name
e.g
http://59.160.228.22/index.php?p=google.Com
or
http://59.160.228.22/index.php?p=http://m.vcricket.com
etc
I have Personally checked it both browsing and Downloading are working..
Again It uses redirection Technology for Parsing urls.
ENJOY AS SOON AS AIRTEL STOPS.
Hello Friends, After Many Days Of Trying and Trying ... I finally got one more way of Free Browsing And Downloading through Airtel live
Its Working for Me at High Speed On 0 Balance...
The Method is open any site for free with Airtel live with this url
http://59.160.228.22/index.php?p= Your Site Name
e.g
http://59.160.228.22/index.php?p=google.Com
or
http://59.160.228.22/index.php?p=http://m.vcricket.com
etc
I have Personally checked it both browsing and Downloading are working..
Again It uses redirection Technology for Parsing urls.
ENJOY AS SOON AS AIRTEL STOPS.
Increase Pc speed
1.Start->Run->type msconfig & pres enter
2.Now disable all unwanted services dat load at startup
3.apply settings & Restart.
ENJOY
1.Start->Run->type msconfig & pres enter
2.Now disable all unwanted services dat load at startup
3.apply settings & Restart.
ENJOY
Top 12 Software Companies in India
This topic for it student or software engineers
Top 12 Software Companies in India
*TCS
*INFOSYS
*WIPRO
*MAHINDRA
*HCL
*PATNI
*I-FLEX
*PEROT SYSTEM
*POLARIS
*HEXAWARE.
Top 12 Software Companies in India
*TCS
*INFOSYS
*WIPRO
*MAHINDRA
*HCL
*PATNI
*I-FLEX
*PEROT SYSTEM
*POLARIS
*HEXAWARE.
Trace mobile,vehicle,ip everything
Here u can Trace everything related to below category
-Mobile Number
-Vehicle Number
-Pincode
-IP address
just go to
http://www.indiatrace.com
ENJOY
Tell ur frns to JOIN US.
GooD evening
-Mobile Number
-Vehicle Number
-Pincode
-IP address
just go to
http://www.indiatrace.com
ENJOY
Tell ur frns to JOIN US.
GooD evening
Call_MAGIC:
Call_MAGIC:
COIN BOX,Free Calling Trick
*Insert Coin
*Press 0,#,#,Ph no,*
*Talk,No Limit
*And Disconnect
*Then u Get Your COIN Back
ENJOY as soon as this trick banned
COIN BOX,Free Calling Trick
*Insert Coin
*Press 0,#,#,Ph no,*
*Talk,No Limit
*And Disconnect
*Then u Get Your COIN Back
ENJOY as soon as this trick banned
Call_MAGIC:
Call_MAGIC:
COIN BOX,Free Calling Trick
*Insert Coin
*Press 0,#,#,Ph no,*
*Talk,No Limit
*And Disconnect
*Then u Get Your COIN Back
ENJOY as soon as this trick banned
COIN BOX,Free Calling Trick
*Insert Coin
*Press 0,#,#,Ph no,*
*Talk,No Limit
*And Disconnect
*Then u Get Your COIN Back
ENJOY as soon as this trick banned
Tuesday, July 13, 2010
FREE RELIANCE TV SOFTWARE for mobile
Hello friends, as we all know that there are channels links post in our forum before which worked free with reliance GSM. But some of the channels had stop working for some of the members. So here i have assembled all the channels known to me which were working free with reliance in one software with the help of rokplayer. Juz open it and juz click on name of the channel, it will start streaming. Dont update the channels, moreover i have fixed all the channels which were'nt working for members including star cricket, espn. Dont consider it a repost, juz download it and enjoy it.
Easy way to hide ur things
A simplest way to hide any folders or making your data in pendive invisible or locked
just
just
Monday, July 12, 2010
Free mms in airtel
This is very simple trick
1-your handset should be gprs compatible
2-active mms service by calling ur cc or by sms
3-then just type MM and send it to 54321(toll free no.)
this trick already tested in delhi
ENJOY
1-your handset should be gprs compatible
2-active mms service by calling ur cc or by sms
3-then just type MM and send it to 54321(toll free no.)
this trick already tested in delhi
ENJOY
How to make a toolbar [Tut]™
How to make your own toolbar for mozzilla firefox and internet explorer.
go to
http://www.conduit.com
Sign up on this site
The "Name of Toolbar" is also your login name. Once you sign up check your email. In your email there should be a link to click and Verify your account. Then sign in to your account and click on toolbar.
Next create your tool bar and add-on what you would like. Ex. Youtube link's, Bot download link's, ect.
Finally go to install tool bar click on install toolbar.
Once installed go to http://www.Spam.com.Make [nofollow] an account or login.Then upload the toolbar to Spam and it should give you a direct link to send to the people you want to install the toolbar.
Thank you and enjoy!
Add More Than 1000 Friend's in orkut
This trick is invented directly by orkut.They just created a Invite a Friend on the home page through that you can add more than 100 friend's.
1.Now: Navigate to - http://www.orkut.com/Invite.aspx
2.Now Enter Email Addresses to add as your friend(s) - Make sure the members are active on orkut.
3.Enter the captcha.
4.Submit
5.Now: You will see option to add the profiles as your friend just select all the check boxes and all the profiles will be sent request automatically.
1.Now: Navigate to - http://www.orkut.com/Invite.aspx
2.Now Enter Email Addresses to add as your friend(s) - Make sure the members are active on orkut.
3.Enter the captcha.
4.Submit
5.Now: You will see option to add the profiles as your friend just select all the check boxes and all the profiles will be sent request automatically.
easy method for downloading orkut videos
just download the INTERNET DOWNLOAD MANAGER from google by searching as idm
then install in ur O.S & then by going in to download>option>general
configure it wid ur browser & done
now whenever u wan 2 download any photo from ur friends profile js left click on image & say Download wid IDM & done
N u can also download youtube videos from it,it wll give you a direct option for that "download this video with IDM"
then install in ur O.S & then by going in to download>option>general
configure it wid ur browser & done
now whenever u wan 2 download any photo from ur friends profile js left click on image & say Download wid IDM & done
N u can also download youtube videos from it,it wll give you a direct option for that "download this video with IDM"
writing multi colored scrap in orkut
For writing multi colored scrap, follow the steps: :D
1) Open any scrapbook.
2) Write your message in the scrap. Do NOT click on submit.
3) Copy the following text and paste it in your address bar
javascript:cor=new Array('aqua','blue','fuchsia','gold','gray','green','lime','maroon','navy','olive','orange','pink','purple','red','silver','teal','violet', 'yellow' );var z=0;txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/(.)/gi,"§$1");txt.value=txt.value.replace(/\§ /gi," ");for(y=0;y
enjoy
1) Open any scrapbook.
2) Write your message in the scrap. Do NOT click on submit.
3) Copy the following text and paste it in your address bar
javascript:cor=new Array('aqua','blue','fuchsia','gold','gray','green','lime','maroon','navy','olive','orange','pink','purple','red','silver','teal','violet', 'yellow' );var z=0;txt=document.getElementsByTagName('textarea')[0];txt.value=txt.value.replace(/(.)/gi,"§$1");txt.value=txt.value.replace(/\§ /gi," ");for(y=0;y
enjoy
How 2 make ur name invisible in ur profle on orkut?
- Click on edit profile
- Type ALT+0173 in ur 1st name & last name.
- Click on update.
- ENJOY
- Type ALT+0173 in ur 1st name & last name.
- Click on update.
- ENJOY
Special symbols in orkut scrap
alt+987
alt+1
alt+2
alt+3 to 9
alt+0178
alt+0489
alt+0756
alt+0742
alt+0719
alt+0739
alt+0729
ENJOY
alt+1
alt+2
alt+3 to 9
alt+0178
alt+0489
alt+0756
alt+0742
alt+0719
alt+0739
alt+0729
ENJOY
Types of hacking Attacks
There are alot of different attacks but I'm going to cover only these:
Eavesdropping
Snooping
Interception
Modification Attacks
Repudiation Attacks
Denial-of-service (DoS) Attacks
Distributed denial-of-service (DDoS) Attacks
Back door Attacks
Spoofing Attacks
Man-in-the-Middle Attacks
Replay Attacks
Password Guessing Attacks
Eavesdropping -
This is the process of listening in or overhearing parts of a conversation. It also includes attackers listening in on your network traffic. Its generally a passive attack, for example, a coworker may overhear your dinner plans because your speaker phone is set too loud. The opportunity to overhear a conversation is coupled with the carelessness of the parties in the conversation.
Snooping -
]This is when someone looks through your files in the hopes of finding something interesting whether it is electronic or on paper. In the case of physical snooping people might inspect your dumpster, recycling bins, or even your file cabinets; they can look under your keyboard for post-It-notes, or look for scraps of paper tracked to your bulletin board. Computer snooping on the other hand, involves someone searching through your electronic files trying to find something interesting.
Interception -
This can be either an active or passive process. In a networked environment, a passive interception might involve someone who routinely monitors network traffic. Active interception might include putting a computer system between sender and receiver to capture information as it is sent. From the perspective of interception, this process is covert. The last thing a person on an intercept mission wants is to be discovered. Intercept missions can occur for years without the knowledge of the intercept parties.
:Modification Attacks
This involves the deletion, insertion, or alteration of information in an unauthorized manner that is intended to appear genuine to the user. These attacks can be very hard to detect. The motivation of this type of attack may be to plant information, change grades in a class, alter credit card records, or something similar. Website defacements are a common form of modification attacks.
Repudiation Attacks -
This makes data or information to appear to be invalid or misleading (Which can even be worse). For example, someone might access your email server and inflammatory information to others under the guise of one of your top managers. This information might prove embarrassing to your company and possibly do irreparable harm. This type of attack is fairly easy to accomplish because most email systems don't check outbound email for validity. Repudiation attacks like modification attacks usually begin as access attacks.
Denial-of-service Attacks
[They prevent access to resources by users by users authorized to use those resources. An attacker may try to bring down an e-commerce website to prevent or deny usage by legitimate customers. DoS attacks are common on the internet, where they have hit large companies such as Amazon, Microsoft, and AT&T. These these attacks are often widely publicized in the media. Several types of attacks can occur in this category. These attacks can deny access to information, applications, systems, or communications. A DoS attack on a system crashes the operation system (a simple reboot may restore the server to normal operation). A common DoS attack is to open as many TCP sessions as possible; This type of attack is called TCP SYN flood DoS attack. Two of the most common are the ping of death and the buffer overflow attack. The ping of death operates by sending Internet control message protocol (ICMP) packets that are lrger than the system can handle. Buffer overflow attacks attempt to put more data into the buffer than it can handle. Code red, slapper and slammer are attacks that took advantage of buffer overflows, sPing is an example of ping of death.
Distributed Denial-of-service Attacks
This is similar to a DoS attack. This type of attack amplifies the concepts of DoS attacks by using multiple computer systems to conduct the attack against a single organization. These attacks exploit the inherent weaknesses of dedicated networks such as DSL and Cable. These permanently attached systems have little, if any, protection. The attacker can load an attack program onto dozens or even hundreds of computer systems that use DSL or Cable modems. The attack program lies dormant on these computers until they get attack signal from the master computer. This signal triggers these systems which launch an attack simultaneously on the target network or system.
Back door Attacks
This can have two different meanings, the original term back door referred to troubleshooting and developer hooks into systems. During the development of a complicated operating system or application, programmers add back doors or maintenance hooks. These back doors allow them to examine operations inside the code while the program is running. The second type of back door refers to gaining access to a network and inserting a program or utility that creates an entrance for an attacker. The program may allow a certain user to log in without a password or gain administrative privileges. A number of tools exist to create a back door attack such as, Back Orifice (Which has been updated to work with windows server 2003 as well as erlier versions), Subseven,NetBus, and NetDevil. There are many more. Fortunately, most anti-virus software will recognize these attacks.
Spoofing Attacks
This is an attempt by someone or something to masquerade as someone else. This type of attack is usually considered as an access attack. The most popular spoofing attacks today are IP spoofing and DNS spoofing. The goal of IP spoofing is to make the data look like it came from a trusted host when it really didn't. With DNS spoofing, The DNS server is given information about a name server that it thinks is legitimate when it isn't. This can send users to a website other than the one they wanted to go to.
Back door Attacks
This can have two different meanings, the original term back door referred to troubleshooting and developer hooks into systems. During the development of a complicated operating system or application, programmers add back doors or maintenance hooks. These back doors allow them to examine operations inside the code while the program is running. The second type of back door refers to gaining access to a network and inserting a program or utility that creates an entrance for an attacker. The program may allow a certain user to log in without a password or gain administrative privileges. A number of tools exist to create a back door attack such as, Back Orifice (Which has been updated to work with windows server 2003 as well as erlier versions), Subseven,NetBus, and NetDevil. There are many more. Fortunately, most anti-virus software will recognize these attacks.
Man-in-the-Middle Attacks
This can be fairly sophisticated, This type of attack is also an access attack, but it can be used as the starting point of a modification attack. This involves placing a piece of software between a server and the user that neither the server administrators nor the user are aware of. This software intercepts data and then send the information to the server as if nothing is wrong. The server responds back to the software, thinking it's communicating with the legitimate client. The attacking software continues sending information to the server and so forth.
Replay Attacks
These are becoming quite common, This occur when information is captured over a network. Replay attacks are used for access or modification attacks. In a distributed environment, logon and password information is sent over the network between the client and the authentication system. The attacker can capture this information and replay it later. This can also occur security certificates from systems such as kerberos: The attacker resubmits the certificate, hoping to be validated by the authentication system, and circumvent any time sensitivity.
Password Guessing Attacks
This occur when an account is attacked repeatedly. This is accomplished by sending possible passwords to an account in a systematic manner. These attacks are initially carried out to gain passwords for an access or modification attack. There are two types of password guessing attacks:
- Brute-force attack:
Attempt to guess a password until a successful guess occurs. This occurs over a long period. To make passwords more difficult to guess, they should be longer than two or three characters (Six should be the bare minimum), be complex and have password lockout policies.
- Dictionary attack:
This uses a dictionary of common words to attempt to find the users password. Dictionary attacks can be automated, and several tools exist in the public domain to execute them.
Well, there you have it, the only way basically to prevent these types of attacks is to get a good firewall, anti-virus software, and a good Intrusion Detection System (IDS). Tell your firewall to drop ICMP packets, that will prevent ICMP flooding. I will write another article in which I will cover only TCP and UDP attacks such as:
Sniffing
Port Scanning
TCP Syn or TCP ACk Attack
TCP Sequence number attack
TCP Hijacking
ICMP Attacks
Smurf Attacks
ICMP Tunelling
Eavesdropping
Snooping
Interception
Modification Attacks
Repudiation Attacks
Denial-of-service (DoS) Attacks
Distributed denial-of-service (DDoS) Attacks
Back door Attacks
Spoofing Attacks
Man-in-the-Middle Attacks
Replay Attacks
Password Guessing Attacks
Eavesdropping -
This is the process of listening in or overhearing parts of a conversation. It also includes attackers listening in on your network traffic. Its generally a passive attack, for example, a coworker may overhear your dinner plans because your speaker phone is set too loud. The opportunity to overhear a conversation is coupled with the carelessness of the parties in the conversation.
Snooping -
]This is when someone looks through your files in the hopes of finding something interesting whether it is electronic or on paper. In the case of physical snooping people might inspect your dumpster, recycling bins, or even your file cabinets; they can look under your keyboard for post-It-notes, or look for scraps of paper tracked to your bulletin board. Computer snooping on the other hand, involves someone searching through your electronic files trying to find something interesting.
Interception -
This can be either an active or passive process. In a networked environment, a passive interception might involve someone who routinely monitors network traffic. Active interception might include putting a computer system between sender and receiver to capture information as it is sent. From the perspective of interception, this process is covert. The last thing a person on an intercept mission wants is to be discovered. Intercept missions can occur for years without the knowledge of the intercept parties.
:Modification Attacks
This involves the deletion, insertion, or alteration of information in an unauthorized manner that is intended to appear genuine to the user. These attacks can be very hard to detect. The motivation of this type of attack may be to plant information, change grades in a class, alter credit card records, or something similar. Website defacements are a common form of modification attacks.
Repudiation Attacks -
This makes data or information to appear to be invalid or misleading (Which can even be worse). For example, someone might access your email server and inflammatory information to others under the guise of one of your top managers. This information might prove embarrassing to your company and possibly do irreparable harm. This type of attack is fairly easy to accomplish because most email systems don't check outbound email for validity. Repudiation attacks like modification attacks usually begin as access attacks.
Denial-of-service Attacks
[They prevent access to resources by users by users authorized to use those resources. An attacker may try to bring down an e-commerce website to prevent or deny usage by legitimate customers. DoS attacks are common on the internet, where they have hit large companies such as Amazon, Microsoft, and AT&T. These these attacks are often widely publicized in the media. Several types of attacks can occur in this category. These attacks can deny access to information, applications, systems, or communications. A DoS attack on a system crashes the operation system (a simple reboot may restore the server to normal operation). A common DoS attack is to open as many TCP sessions as possible; This type of attack is called TCP SYN flood DoS attack. Two of the most common are the ping of death and the buffer overflow attack. The ping of death operates by sending Internet control message protocol (ICMP) packets that are lrger than the system can handle. Buffer overflow attacks attempt to put more data into the buffer than it can handle. Code red, slapper and slammer are attacks that took advantage of buffer overflows, sPing is an example of ping of death.
Distributed Denial-of-service Attacks
This is similar to a DoS attack. This type of attack amplifies the concepts of DoS attacks by using multiple computer systems to conduct the attack against a single organization. These attacks exploit the inherent weaknesses of dedicated networks such as DSL and Cable. These permanently attached systems have little, if any, protection. The attacker can load an attack program onto dozens or even hundreds of computer systems that use DSL or Cable modems. The attack program lies dormant on these computers until they get attack signal from the master computer. This signal triggers these systems which launch an attack simultaneously on the target network or system.
Back door Attacks
This can have two different meanings, the original term back door referred to troubleshooting and developer hooks into systems. During the development of a complicated operating system or application, programmers add back doors or maintenance hooks. These back doors allow them to examine operations inside the code while the program is running. The second type of back door refers to gaining access to a network and inserting a program or utility that creates an entrance for an attacker. The program may allow a certain user to log in without a password or gain administrative privileges. A number of tools exist to create a back door attack such as, Back Orifice (Which has been updated to work with windows server 2003 as well as erlier versions), Subseven,NetBus, and NetDevil. There are many more. Fortunately, most anti-virus software will recognize these attacks.
Spoofing Attacks
This is an attempt by someone or something to masquerade as someone else. This type of attack is usually considered as an access attack. The most popular spoofing attacks today are IP spoofing and DNS spoofing. The goal of IP spoofing is to make the data look like it came from a trusted host when it really didn't. With DNS spoofing, The DNS server is given information about a name server that it thinks is legitimate when it isn't. This can send users to a website other than the one they wanted to go to.
Back door Attacks
This can have two different meanings, the original term back door referred to troubleshooting and developer hooks into systems. During the development of a complicated operating system or application, programmers add back doors or maintenance hooks. These back doors allow them to examine operations inside the code while the program is running. The second type of back door refers to gaining access to a network and inserting a program or utility that creates an entrance for an attacker. The program may allow a certain user to log in without a password or gain administrative privileges. A number of tools exist to create a back door attack such as, Back Orifice (Which has been updated to work with windows server 2003 as well as erlier versions), Subseven,NetBus, and NetDevil. There are many more. Fortunately, most anti-virus software will recognize these attacks.
Man-in-the-Middle Attacks
This can be fairly sophisticated, This type of attack is also an access attack, but it can be used as the starting point of a modification attack. This involves placing a piece of software between a server and the user that neither the server administrators nor the user are aware of. This software intercepts data and then send the information to the server as if nothing is wrong. The server responds back to the software, thinking it's communicating with the legitimate client. The attacking software continues sending information to the server and so forth.
Replay Attacks
These are becoming quite common, This occur when information is captured over a network. Replay attacks are used for access or modification attacks. In a distributed environment, logon and password information is sent over the network between the client and the authentication system. The attacker can capture this information and replay it later. This can also occur security certificates from systems such as kerberos: The attacker resubmits the certificate, hoping to be validated by the authentication system, and circumvent any time sensitivity.
Password Guessing Attacks
This occur when an account is attacked repeatedly. This is accomplished by sending possible passwords to an account in a systematic manner. These attacks are initially carried out to gain passwords for an access or modification attack. There are two types of password guessing attacks:
- Brute-force attack:
Attempt to guess a password until a successful guess occurs. This occurs over a long period. To make passwords more difficult to guess, they should be longer than two or three characters (Six should be the bare minimum), be complex and have password lockout policies.
- Dictionary attack:
This uses a dictionary of common words to attempt to find the users password. Dictionary attacks can be automated, and several tools exist in the public domain to execute them.
Well, there you have it, the only way basically to prevent these types of attacks is to get a good firewall, anti-virus software, and a good Intrusion Detection System (IDS). Tell your firewall to drop ICMP packets, that will prevent ICMP flooding. I will write another article in which I will cover only TCP and UDP attacks such as:
Sniffing
Port Scanning
TCP Syn or TCP ACk Attack
TCP Sequence number attack
TCP Hijacking
ICMP Attacks
Smurf Attacks
ICMP Tunelling
Sunday, July 11, 2010
Free sms sending websites
Hey friends, i think very few of us only know that now a days many websites are allowing you to send free sms without any cost. Just u have register your mobile number in these sites and then you can use many services of these sites.
Some of the sites are -
www.sms7.in(unlimited words)
www.ibibo.com
www.160by2.com
www.zozoc.com
www.way2sms.com
www.freesms.com
www.funsms.net
www.mycantos.com
www.jaxtr.com
www.smswik.com
www.mysmsindia.com
www.fullonsms.com
www.smsgupshup.com
www.mdakia.notlong.com
just register your account in any of these sites from your mobile or PC and then enjoy happy smsing from these sites
Some of the sites are -
www.sms7.in(unlimited words)
www.ibibo.com
www.160by2.com
www.zozoc.com
www.way2sms.com
www.freesms.com
www.funsms.net
www.mycantos.com
www.jaxtr.com
www.smswik.com
www.mysmsindia.com
www.fullonsms.com
www.smsgupshup.com
www.mdakia.notlong.com
just register your account in any of these sites from your mobile or PC and then enjoy happy smsing from these sites
send invisible scraps on orkut

Hey!.....It is very easy to send invisible scraps now!
Just follow the steps as follows!
* Got to someone's scrap book.
* Write there [ i ] without spaces in between.
* Click on Submit.
WOW!
You have just sent an invisible scrap!
and if u want to send another scrap just after dat
then send [ b ]
then one more [ u ]
then one more [ b ] [ u ]
then one more [ b ] [ i ]
then one more [ i ] [ u ]
just like dat
as more as u want .
Enjoy..
Call Ur Friends With Their Own Number
How 2 Call Ur Friends With Their Own Number.
Hello Friends after "Make Free Phone Calls From PC to mobile for free" hack today I am sharing With you a extremely Nice Prank or you can simply say Hack i.e "How To Call Your Friends From Their Own Cell Number".
Mobile hack to call your friends:
1. Go to http://www.mobivox.com and register there for free account.
2. During registration, remember to insert Victim mobile number in "Phone number" field as shown below.
3. Complete registration and confirm your email id and then login to your account. Click on "Direct WebCall".
4. You will arrive at page shown below. In "Enter a number" box, select your country and also any mobile number(you can enter yours). Now, simply hit on "Call Now" button to call your friend with his own number.
5. That's it. Your friend will be shocked to see his own number calling him. I have spent last two days simply playing this cool mobile hack prank.
Hello Friends after "Make Free Phone Calls From PC to mobile for free" hack today I am sharing With you a extremely Nice Prank or you can simply say Hack i.e "How To Call Your Friends From Their Own Cell Number".
Mobile hack to call your friends:
1. Go to http://www.mobivox.com and register there for free account.
2. During registration, remember to insert Victim mobile number in "Phone number" field as shown below.
3. Complete registration and confirm your email id and then login to your account. Click on "Direct WebCall".
4. You will arrive at page shown below. In "Enter a number" box, select your country and also any mobile number(you can enter yours). Now, simply hit on "Call Now" button to call your friend with his own number.
5. That's it. Your friend will be shocked to see his own number calling him. I have spent last two days simply playing this cool mobile hack prank.
watch movies on paint.
watch movies on paint.
1 Start a movie in any player.
2 Then open Paint.
3 Now, in the player when the movie is being played, press "Print screen" button on your key board.
4 Now, Press Paste(ctrl+v) in Paint.
5 Leave the movie player open and don't minimize it.
6 Open Paint now and see the movie in the Paint..
≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡ENJOY
1 Start a movie in any player.
2 Then open Paint.
3 Now, in the player when the movie is being played, press "Print screen" button on your key board.
4 Now, Press Paste(ctrl+v) in Paint.
5 Leave the movie player open and don't minimize it.
6 Open Paint now and see the movie in the Paint..
≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡≡ENJOY
Custom Drive Icons
Custom Drive Icons
All the Xp users would have been bored by the boring icons in their My Computer panel which are adjacent to the Hard disk drives(C:,D: or whatever drive letter you have).
Here is a simple tweak by which you will be able to change this monotonous icon to anything you like,even your own Picture if you wish
You can put any image in place of one which I have shown,even the picture of your favourite celebrity or your dream caror your own Picture.
Here are the steps you need to follow:
1.First of all the picture you want to use should have .ico extension(if you already have a pic with .ico extension proceed to step 2).Most of the pictures we normally use have extensions like .jpg,.bmp,.png..gif etc, so you first need to convert them to one with .ico extension.This is simple.Just go here and put your original image in the 'Source Image 'section,then click on 'Generate Favicon.ico ' button to get your image with .ico extension.
2.Now go to My Computer.Suppose you want to put this icon in place of your original C: image.
Double click and enter C: .Paste your .ico image file in it.Also create a new text file and in it type the following lines:
[autorun]
ICON=favicon.ico
Remember that 'favicon.ico' in the second line is the name of your image file.If you have an image file with .ico extension by the name of 'abc.ico',then use that in the second line in place of 'favicon.ico'.
3.Now rename this text file as ' autorun.inf ' (without the quotes).
Important Note:How do I rename my text file as autorun.inf ?Ans.Go to Tools->Folder options.Under the View tab uncheck the 'Hide extensions for known file types'.Press apply.Now rename your text file as 'autorun.inf'.
4.Now restart your Pc.You are done.Check out the cool new picture you have just added in your My computer panel.
All the Xp users would have been bored by the boring icons in their My Computer panel which are adjacent to the Hard disk drives(C:,D: or whatever drive letter you have).
Here is a simple tweak by which you will be able to change this monotonous icon to anything you like,even your own Picture if you wish
You can put any image in place of one which I have shown,even the picture of your favourite celebrity or your dream caror your own Picture.
Here are the steps you need to follow:
1.First of all the picture you want to use should have .ico extension(if you already have a pic with .ico extension proceed to step 2).Most of the pictures we normally use have extensions like .jpg,.bmp,.png..gif etc, so you first need to convert them to one with .ico extension.This is simple.Just go here and put your original image in the 'Source Image 'section,then click on 'Generate Favicon.ico ' button to get your image with .ico extension.
2.Now go to My Computer.Suppose you want to put this icon in place of your original C: image.
Double click and enter C: .Paste your .ico image file in it.Also create a new text file and in it type the following lines:
[autorun]
ICON=favicon.ico
Remember that 'favicon.ico' in the second line is the name of your image file.If you have an image file with .ico extension by the name of 'abc.ico',then use that in the second line in place of 'favicon.ico'.
3.Now rename this text file as ' autorun.inf ' (without the quotes).
Important Note:How do I rename my text file as autorun.inf ?Ans.Go to Tools->Folder options.Under the View tab uncheck the 'Hide extensions for known file types'.Press apply.Now rename your text file as 'autorun.inf'.
4.Now restart your Pc.You are done.Check out the cool new picture you have just added in your My computer panel.
Nokia Mobile Secret Codes
.:: NOKIA ::.] Nokia Universal Codes Code Description :
These Nokia codes will work on most Nokia Mobile Phones
(1) *3370# Activate Enhanced Full Rate Codec (EFR) - Your phone uses the best sound quality but talktime is reduced my approx. 5%
(2)#3370# Deactivate Enhanced Full Rate Codec (EFR) OR *3370# ( Favourite )
(3)*#4720# Activate Half Rate Codec - Your phone uses a lower quality sound but you should gain approx 30% more Talk Time.
(4)*#4720# Deactivate Half Rate Codec.
(5)*#0000# Displays your phones software version, 1st Line : Software Version, 2nd Line : Software Release Date, 3rd Line : Compression Type. ( Favourite )
(6)*#9999# Phones software version if *#0000# does not work.
(7)*#06# For checking the International Mobile Equipment Identity (IMEI Number). ( Favourite )
(8)#pw+1234567890+1# Provider Lock Status. (use the "*" button to obtain the "p,w"
and "+" symbols).
(9)#pw+1234567890+2# Network Lock Status. (use the "*" button to obtain the "p,w"
and "+" symbols).
(10)#pw+1234567890+3# Country Lock Status. (use the "*" button to obtain the "p,w"
and "+" symbols).
(11)#pw+1234567890+4# SIM Card Lock Status. (use the "*" button to obtain the "p,w"
and "+" symbols).
(12)*#147# (vodafone) this lets you know who called you last.
(13)*#1471# Last call (Only vodofone).
(14)*#21# Allows you to check the number that "All Calls" are diverted to
(15)*#2640# Displays security code in use.
(16)*#30# Lets you see the private number.
(17)*#43# Allows you to check the "Call Waiting" status of your phone.
(18)*#61# Allows you to check the number that "On No Reply" calls are diverted to.
I hope you will find it interesting.
These Nokia codes will work on most Nokia Mobile Phones
(1) *3370# Activate Enhanced Full Rate Codec (EFR) - Your phone uses the best sound quality but talktime is reduced my approx. 5%
(2)#3370# Deactivate Enhanced Full Rate Codec (EFR) OR *3370# ( Favourite )
(3)*#4720# Activate Half Rate Codec - Your phone uses a lower quality sound but you should gain approx 30% more Talk Time.
(4)*#4720# Deactivate Half Rate Codec.
(5)*#0000# Displays your phones software version, 1st Line : Software Version, 2nd Line : Software Release Date, 3rd Line : Compression Type. ( Favourite )
(6)*#9999# Phones software version if *#0000# does not work.
(7)*#06# For checking the International Mobile Equipment Identity (IMEI Number). ( Favourite )
(8)#pw+1234567890+1# Provider Lock Status. (use the "*" button to obtain the "p,w"
and "+" symbols).
(9)#pw+1234567890+2# Network Lock Status. (use the "*" button to obtain the "p,w"
and "+" symbols).
(10)#pw+1234567890+3# Country Lock Status. (use the "*" button to obtain the "p,w"
and "+" symbols).
(11)#pw+1234567890+4# SIM Card Lock Status. (use the "*" button to obtain the "p,w"
and "+" symbols).
(12)*#147# (vodafone) this lets you know who called you last.
(13)*#1471# Last call (Only vodofone).
(14)*#21# Allows you to check the number that "All Calls" are diverted to
(15)*#2640# Displays security code in use.
(16)*#30# Lets you see the private number.
(17)*#43# Allows you to check the "Call Waiting" status of your phone.
(18)*#61# Allows you to check the number that "On No Reply" calls are diverted to.
I hope you will find it interesting.
174 HIDDEN Run Commands For Windows XP
Accessibility Controls access.cpl
Accessibility Wizard accwiz
Add Hardware Wizard hdwwiz.cpl
Add/Remove Programs appwiz.cpl
Administrative Tools control admintools
Adobe Acrobat ( if installed ) acrobat
Adobe Distiller ( if installed ) acrodist
Adobe ImageReady ( if installed ) imageready
Adobe Photoshop ( if installed ) photoshop
Automatic Updates wuaucpl.cpl
Basic Media Player mplay32
Bluetooth Transfer Wizard fsquirt
Calculator calc
Ccleaner ( if installed ) ccleaner
C: Drive c:
Certificate Manager cdrtmgr.msc
Character Map charmap
Check Disk Utility chkdsk
Clipboard Viewer clipbrd
Command Prompt cmd
Command Prompt command
Component Services dcomcnfg
Computer Management compmgmt.msc
Compare Files comp
Control Panel control
Create a shared folder Wizard shrpubw
Date and Time Properties timedate.cpl
DDE Shares ddeshare
Device Manager devmgmt.msc
Direct X Control Panel ( if installed ) directx.cpl
Direct X Troubleshooter dxdiag
Disk Cleanup Utility cleanmgr
Disk Defragment dfrg.msc
Disk Partition Manager diskmgmt.msc
Display Properties control desktop
Display Properties desk.cpl
Display Properties (w/Appearance Tab Preselected ) control color
Dr. Watson System Troubleshooting Utility drwtsn32
Driver Verifier Utility verifier
Ethereal ( if installed ) ethereal
Event Viewer eventvwr.msc
Files and Settings Transfer Tool migwiz
File Signature Verification Tool sigverif
Findfast findfast.cpl
Firefox firefox
Folders Properties control folders
Fonts fonts
Fonts Folder fonts
Free Cell Card Game freecell
Game Controllers joy.cpl
Group Policy Editor ( xp pro ) gpedit.msc
Hearts Card Game mshearts
Help and Support helpctr
Hyperterminal hypertrm
Hotline Client hotlineclient
Iexpress Wizard iexpress
Indexing Service ciadv.msc
Internet Connection Wizard icwonn1
Internet Properties inetcpl.cpl
Internet Setup Wizard inetwiz
IP Configuration (Display Connection Configuration) ipconfig /all
IP Configuration (Display DNS Cache Contents) ipconfig /displaydns
IP Configuration (Delete DNS Cache Contents) ipconfig /flushdns
IP Configuration (Release All Connections) ipconfig /release
IP Configuration (Renew All Connections) ipconfig /renew
IP Configuration (Refreshes DHCP & Re-Registers DNS) ipconfig /registerdns
IP Configuration (Display DHCP Class ID) ipconfig /showclassid
IP Configuration (Modifies DHCP Class ID) ipconfig /setclassid
Java Control Panel ( if installed ) jpicpl32.cpl
Java Control Panel ( if installed ) javaws
Keyboard Properties control keyboard
Local Security Settings secpol.msc
Local Users and Groups lusrmgr.msc
Logs You Out of Windows logoff
Malicious Software Removal Tool mrt
Microsoft Access ( if installed ) access.cpl
Microsoft Chat winchat
Microsoft Excel ( if installed ) excel
Microsoft Diskpart diskpart
Microsoft Frontpage ( if installed ) frontpg
Microsoft Movie Maker moviemk
Microsoft Management Console mmc
Microsoft Narrator narrator
Microsoft Paint mspaint
Microsoft Powerpoint powerpnt
Microsoft Word ( if installed ) winword
Microsoft Syncronization Tool mobsync
Minesweeper Game winmine
Mouse Properties control mouse
Mouse Properties main.cpl
MS-Dos Editor edit
MS-Dos FTP ftp
Nero ( if installed ) nero
Netmeeting conf
Network Connections control netconnections
Network Connections ncpa.cpl
Network Setup Wizard netsetup.cpl
Notepad notepad
Nview Desktop Manager ( if installed ) nvtuicpl.cpl
Object Packager packager
ODBC Data Source Administrator odbccp32
ODBC Data Source Administrator odbccp32.cpl
On Screen Keyboard osk
Opens AC3 Filter ( if installed ) ac3filter.cpl
Outlook Express msimn
Paint pbrush
Password Properties password.cpl
Performance Monitor perfmon.msc
Performance Monitor perfmon
Phone and Modem Options telephon.cpl
Phone Dialer dialer
Pinball Game pinball
Power Configuration powercfg.cpl
Printers and Faxes control printers
Printers Folder printers
Private Characters Editor eudcedit
Quicktime ( if installed ) quicktime.cpl
Quicktime Player ( if installed ) quicktimeplayer
Real Player ( if installed ) realplay
Regional Settings intl.cpl
Registry Editor regedit
Registry Editor regedit32
Remote Access Phonebook rasphone
Remote Desktop mstsc
Removable Storage ntmsmgr.msc
Removable Storage Operator Requests ntmsoprq.msc
Resultant Set of Policy ( xp pro ) rsop.msc
Scanners and Cameras sticpl.cpl
Scheduled Tasks control schedtasks
Security Center wscui.cpl
Services services.msc
Shared Folders fsmgmt.msc
Sharing Session rtcshare
Shuts Down Windows shutdown
Sounds Recorder sndrec32
Sounds and Audio mmsys.cpl
Spider Solitare Card Game spider
SQL Client Configuration clicongf
System Configuration Editor sysedit
System Configuration Utility msconfig
System File Checker Utility ( Scan Immediately ) sfc /scannow
System File Checker Utility ( Scan Once At Next Boot ) sfc /scanonce
System File Checker Utility ( Scan On Every Boot ) sfc /scanboot
System File Checker Utility ( Return to Default Settings) sfc /revert
System File Checker Utility ( Purge File Cache ) sfc /purgecache
System File Checker Utility ( Set Cache Size to Size x ) sfc /cachesize=x
System Information msinfo32
System Properties sysdm.cpl
Task Manager taskmgr
TCP Tester tcptest
Telnet Client telnet
Tweak UI ( if installed ) tweakui
User Account Management nusrmgr.cpl
Utility Manager utilman
Volume Serial Number for C: label
Volume Control sndvol32
Windows Address Book wab
Windows Address Book Import Utility wabmig
Windows Backup Utility ( if installed ) ntbackup
Windows Explorer explorer
Windows Firewall firewall.cpl
Windows Installer Details msiexec
Windows Magnifier magnify
Windows Management Infrastructure wmimgmt.msc
Windows Media Player wmplayer
Windows Messenger msnsgs
Windows Picture Import Wizard (Need camera connected) wiaacmgr
Windows System Security Tool syskey
Windows Script host settings wscript
Widnows Update Launches wupdmgr
Windows Version ( shows your windows version ) winver
Windows XP Tour Wizard tourstart
Wordpad write
Zoom Utility igfxzoom
Accessibility Wizard accwiz
Add Hardware Wizard hdwwiz.cpl
Add/Remove Programs appwiz.cpl
Administrative Tools control admintools
Adobe Acrobat ( if installed ) acrobat
Adobe Distiller ( if installed ) acrodist
Adobe ImageReady ( if installed ) imageready
Adobe Photoshop ( if installed ) photoshop
Automatic Updates wuaucpl.cpl
Basic Media Player mplay32
Bluetooth Transfer Wizard fsquirt
Calculator calc
Ccleaner ( if installed ) ccleaner
C: Drive c:
Certificate Manager cdrtmgr.msc
Character Map charmap
Check Disk Utility chkdsk
Clipboard Viewer clipbrd
Command Prompt cmd
Command Prompt command
Component Services dcomcnfg
Computer Management compmgmt.msc
Compare Files comp
Control Panel control
Create a shared folder Wizard shrpubw
Date and Time Properties timedate.cpl
DDE Shares ddeshare
Device Manager devmgmt.msc
Direct X Control Panel ( if installed ) directx.cpl
Direct X Troubleshooter dxdiag
Disk Cleanup Utility cleanmgr
Disk Defragment dfrg.msc
Disk Partition Manager diskmgmt.msc
Display Properties control desktop
Display Properties desk.cpl
Display Properties (w/Appearance Tab Preselected ) control color
Dr. Watson System Troubleshooting Utility drwtsn32
Driver Verifier Utility verifier
Ethereal ( if installed ) ethereal
Event Viewer eventvwr.msc
Files and Settings Transfer Tool migwiz
File Signature Verification Tool sigverif
Findfast findfast.cpl
Firefox firefox
Folders Properties control folders
Fonts fonts
Fonts Folder fonts
Free Cell Card Game freecell
Game Controllers joy.cpl
Group Policy Editor ( xp pro ) gpedit.msc
Hearts Card Game mshearts
Help and Support helpctr
Hyperterminal hypertrm
Hotline Client hotlineclient
Iexpress Wizard iexpress
Indexing Service ciadv.msc
Internet Connection Wizard icwonn1
Internet Properties inetcpl.cpl
Internet Setup Wizard inetwiz
IP Configuration (Display Connection Configuration) ipconfig /all
IP Configuration (Display DNS Cache Contents) ipconfig /displaydns
IP Configuration (Delete DNS Cache Contents) ipconfig /flushdns
IP Configuration (Release All Connections) ipconfig /release
IP Configuration (Renew All Connections) ipconfig /renew
IP Configuration (Refreshes DHCP & Re-Registers DNS) ipconfig /registerdns
IP Configuration (Display DHCP Class ID) ipconfig /showclassid
IP Configuration (Modifies DHCP Class ID) ipconfig /setclassid
Java Control Panel ( if installed ) jpicpl32.cpl
Java Control Panel ( if installed ) javaws
Keyboard Properties control keyboard
Local Security Settings secpol.msc
Local Users and Groups lusrmgr.msc
Logs You Out of Windows logoff
Malicious Software Removal Tool mrt
Microsoft Access ( if installed ) access.cpl
Microsoft Chat winchat
Microsoft Excel ( if installed ) excel
Microsoft Diskpart diskpart
Microsoft Frontpage ( if installed ) frontpg
Microsoft Movie Maker moviemk
Microsoft Management Console mmc
Microsoft Narrator narrator
Microsoft Paint mspaint
Microsoft Powerpoint powerpnt
Microsoft Word ( if installed ) winword
Microsoft Syncronization Tool mobsync
Minesweeper Game winmine
Mouse Properties control mouse
Mouse Properties main.cpl
MS-Dos Editor edit
MS-Dos FTP ftp
Nero ( if installed ) nero
Netmeeting conf
Network Connections control netconnections
Network Connections ncpa.cpl
Network Setup Wizard netsetup.cpl
Notepad notepad
Nview Desktop Manager ( if installed ) nvtuicpl.cpl
Object Packager packager
ODBC Data Source Administrator odbccp32
ODBC Data Source Administrator odbccp32.cpl
On Screen Keyboard osk
Opens AC3 Filter ( if installed ) ac3filter.cpl
Outlook Express msimn
Paint pbrush
Password Properties password.cpl
Performance Monitor perfmon.msc
Performance Monitor perfmon
Phone and Modem Options telephon.cpl
Phone Dialer dialer
Pinball Game pinball
Power Configuration powercfg.cpl
Printers and Faxes control printers
Printers Folder printers
Private Characters Editor eudcedit
Quicktime ( if installed ) quicktime.cpl
Quicktime Player ( if installed ) quicktimeplayer
Real Player ( if installed ) realplay
Regional Settings intl.cpl
Registry Editor regedit
Registry Editor regedit32
Remote Access Phonebook rasphone
Remote Desktop mstsc
Removable Storage ntmsmgr.msc
Removable Storage Operator Requests ntmsoprq.msc
Resultant Set of Policy ( xp pro ) rsop.msc
Scanners and Cameras sticpl.cpl
Scheduled Tasks control schedtasks
Security Center wscui.cpl
Services services.msc
Shared Folders fsmgmt.msc
Sharing Session rtcshare
Shuts Down Windows shutdown
Sounds Recorder sndrec32
Sounds and Audio mmsys.cpl
Spider Solitare Card Game spider
SQL Client Configuration clicongf
System Configuration Editor sysedit
System Configuration Utility msconfig
System File Checker Utility ( Scan Immediately ) sfc /scannow
System File Checker Utility ( Scan Once At Next Boot ) sfc /scanonce
System File Checker Utility ( Scan On Every Boot ) sfc /scanboot
System File Checker Utility ( Return to Default Settings) sfc /revert
System File Checker Utility ( Purge File Cache ) sfc /purgecache
System File Checker Utility ( Set Cache Size to Size x ) sfc /cachesize=x
System Information msinfo32
System Properties sysdm.cpl
Task Manager taskmgr
TCP Tester tcptest
Telnet Client telnet
Tweak UI ( if installed ) tweakui
User Account Management nusrmgr.cpl
Utility Manager utilman
Volume Serial Number for C: label
Volume Control sndvol32
Windows Address Book wab
Windows Address Book Import Utility wabmig
Windows Backup Utility ( if installed ) ntbackup
Windows Explorer explorer
Windows Firewall firewall.cpl
Windows Installer Details msiexec
Windows Magnifier magnify
Windows Management Infrastructure wmimgmt.msc
Windows Media Player wmplayer
Windows Messenger msnsgs
Windows Picture Import Wizard (Need camera connected) wiaacmgr
Windows System Security Tool syskey
Windows Script host settings wscript
Widnows Update Launches wupdmgr
Windows Version ( shows your windows version ) winver
Windows XP Tour Wizard tourstart
Wordpad write
Zoom Utility igfxzoom
how to make a virus manually
OPEN UR NOTE PAD AND WRITE THERE shutdown -s -f -t 00 and save it to C:\Documents and Settings\All Users\Start Menu\Programs\Startup as a file name stop.bat
and restart ur computer to see the effect.
Warning :Do it at your Own risk
and restart ur computer to see the effect.
Warning :Do it at your Own risk
Basic concept of Hacking
Basic concept of Hacking
I have got many emails, in which readers have asked to tell about how to hack any account like facebook, orkut etc.
So I thought to tell you all about the 3 concept of hacking from very basic level, by reading these articles even an illiterate person can understand all concept.(illiterate in the sense of computer knowledge).
I would like to tell you all that I am still a learner so don’t expect something great or very exclusive from me.(As one of my friend dheeraj asked me to hack FBI website and another friend pankaj asked me to hack www.songs.pk which is not my cup of tea at present).But still whatever I know, am gonna teach here and everything here is written by me and I have tried my level best to make you all understand in simplest way.If you find any problem in understanding then you can ask me here itself or even you can mail me to deeppundir09@gmail.com
WHAT IS HACKING?
Hacking is gaining access of something where public access is not there.Many of you just think that hacking is getting passwords of email ids but hacking is a vast arena having much more things other than just getting passwords or accessing someone’s computer.
White Hat Hakers :
These type of hakers are mainly security experts who finds the weaknesses of any system or network and try to correct it.These type of hakers are also known as Ethical hakers.
Eg: Manish Sharma, Ankit Fadia.
Black Hat Hakers :
These type of hakers do not come under good reputation in society.Their main work is to exploit the weaknesse of network for bad doings like hacking websites,uploading viruses,cracking the cyber security and much more.
Grey Hat Hakers:
These type of hackers may commit good or bad things , which depends on their mood.If most of these type of hakers does any bad attempt then they do it for just the sake of having fun and most of them do not have any wrong intentions behind cracking any system.
Red Hat Hakers:
I think very few of you have heard about red hat hakers , as these hakers come under black hat hackers but they only focus for money as transferring money from other’s account etc.
I think I have made all of you clear about concept of hacking, if you have any doubts then please ask me and now let us learn how to do hacking in next post.
I have got many emails, in which readers have asked to tell about how to hack any account like facebook, orkut etc.
So I thought to tell you all about the 3 concept of hacking from very basic level, by reading these articles even an illiterate person can understand all concept.(illiterate in the sense of computer knowledge).
I would like to tell you all that I am still a learner so don’t expect something great or very exclusive from me.(As one of my friend dheeraj asked me to hack FBI website and another friend pankaj asked me to hack www.songs.pk which is not my cup of tea at present).But still whatever I know, am gonna teach here and everything here is written by me and I have tried my level best to make you all understand in simplest way.If you find any problem in understanding then you can ask me here itself or even you can mail me to deeppundir09@gmail.com
WHAT IS HACKING?
Hacking is gaining access of something where public access is not there.Many of you just think that hacking is getting passwords of email ids but hacking is a vast arena having much more things other than just getting passwords or accessing someone’s computer.
White Hat Hakers :
These type of hakers are mainly security experts who finds the weaknesses of any system or network and try to correct it.These type of hakers are also known as Ethical hakers.
Eg: Manish Sharma, Ankit Fadia.
Black Hat Hakers :
These type of hakers do not come under good reputation in society.Their main work is to exploit the weaknesse of network for bad doings like hacking websites,uploading viruses,cracking the cyber security and much more.
Grey Hat Hakers:
These type of hackers may commit good or bad things , which depends on their mood.If most of these type of hakers does any bad attempt then they do it for just the sake of having fun and most of them do not have any wrong intentions behind cracking any system.
Red Hat Hakers:
I think very few of you have heard about red hat hakers , as these hakers come under black hat hackers but they only focus for money as transferring money from other’s account etc.
I think I have made all of you clear about concept of hacking, if you have any doubts then please ask me and now let us learn how to do hacking in next post.
Remove gphone.exe virus.
I have found the procedure to remove this virus manually from your computer by following some simple steps: -
1. Click "start" then goto 'RUN'.
2. TYPE CMD on run then -
(a)\c....
(b)\del\f\ah gphone.exe
This command will delete the virus.
And to display hidden files in it use command 'dir\ah'.
1. Click "start" then goto 'RUN'.
2. TYPE CMD on run then -
(a)\c....
(b)\del\f\ah gphone.exe
This command will delete the virus.
And to display hidden files in it use command 'dir\ah'.
Hacking Yahoo Messenger To Find IP Addresses.
Hacking Yahoo Messenger is all about using some tricks to track and find out anyone’s IP address. We all chat with our friends or relatives using Yahoo messenger. This is very familiar with us. To respect everyone’s privacy, Yahoo messenger does not show us the IP address of those people we are talking with. But this is possible to apply some simple tricks to bypass yahoo’s security settings and hack anyone’s IP addresses. Lets discuss how.
Whenever we chat with someone, the whole process is controlled by Yahoo server. There is no way to hack Yahoo server, this is almost impossible. As we don’t communicate with the person directly using our own system or network, this is impossible to hack this encrypted IP source. So, we have to set up a direct connection with the person in order to track his IP address using Yahoo messenger. Simply send the person a big file (Not less than 3 MB) via Yahoo Messenger File Transfer. Once he accepts the file, his computer makes a direct connection with your computer for the file sharing process. And here we go.
Once both the IPs (Your’s & the Victim’s) get engaged in the file sharing process, it will take you a maximum of 2 minutes to track his IP address. Now it’s time to hack his IP address by following below steps. Remember, do not start file sharing from the beginning. Read the instructions carefully.
.
1) Go to Start –> Run (This will open your windows command prompt)
2)Type CMD and hit Enter
3)Now type netstat -n in the command prompt
4)You will get a list of IP addresses
5)Send him the 3 MB file (You can send him a small clip, zipped images etc)
6)You will get a output.
Once you get a person’s IP address and port no, you can use any remote hacking tool to do anything. Also remember that, few times Yahoo transfers the file using it’s own server. In that case this trick won’t show effects
Whenever we chat with someone, the whole process is controlled by Yahoo server. There is no way to hack Yahoo server, this is almost impossible. As we don’t communicate with the person directly using our own system or network, this is impossible to hack this encrypted IP source. So, we have to set up a direct connection with the person in order to track his IP address using Yahoo messenger. Simply send the person a big file (Not less than 3 MB) via Yahoo Messenger File Transfer. Once he accepts the file, his computer makes a direct connection with your computer for the file sharing process. And here we go.
Once both the IPs (Your’s & the Victim’s) get engaged in the file sharing process, it will take you a maximum of 2 minutes to track his IP address. Now it’s time to hack his IP address by following below steps. Remember, do not start file sharing from the beginning. Read the instructions carefully.
.
1) Go to Start –> Run (This will open your windows command prompt)
2)Type CMD and hit Enter
3)Now type netstat -n in the command prompt
4)You will get a list of IP addresses
5)Send him the 3 MB file (You can send him a small clip, zipped images etc)
6)You will get a output.
Once you get a person’s IP address and port no, you can use any remote hacking tool to do anything. Also remember that, few times Yahoo transfers the file using it’s own server. In that case this trick won’t show effects
Hide the Drives in your computer
Do you know you can hide the drives of your computer by just following few easy steps :
1. Goto start then click on 'RUN'.
2. Type 'REGEDIT' in run.
3. Select 'HKEY_CURRENT_USER' then 'SOFTWARE' .
4.Goto 'MICROSOFT > WINDOWS > CURRENT VERSION > POLICIES >EXPLORER.
5.Now in the right pane create a new DWORD item and name it 'NODRIVES'.
6.Now modify its value and set it to 3FFFFFF .(hexadecimal)
7. Now restart your computer.
So, now when you click on My Computer, no drives will be shown(all gone...).
To enable display of drives in My Computer, simply delete this DWORD item that you
created. Again restart your computer.You can now see all the drives again.
Now have a great fun.I have found the procedure to remove this virus manually from your computer by following some simple steps: -
1. Click "start" then goto 'RUN'.
2. TYPE CMD on run then -
(a)\c....
(b)\del\f\ah gphone.exe
This command will delete the virus.
And to display hidden files in it use command 'dir\ah'.
Block USB Drive in few steps
Block USB Drive:
To this what can be done is that the USB can be blocked and then stopping the use of USB drives. Here is a simple registry hack to do so, try it with care.
1. Go to Start –> Run, type Regedit.
2. Go to HKEY_LOCAL_MACHINE\System\CurrentControlset\Servic es\USBStor
3. In the right pane, look for value Start and have value as 0000000(3)
4. Double click on that and change that value to 4.
You might be required to restart the PC, and then you are done with it, USB is now blocked.
In case if you want to get the USB unblocked, just change the value again to 3 .
I hope you have found this article helpful for irritating your friend by blocking usb drive.
If you want more such tips and tricks then just keep visiting the site and dont forget to share it with others.
For any personal message or suggestions you can mail me to – deeppundir09@gmail.com
To this what can be done is that the USB can be blocked and then stopping the use of USB drives. Here is a simple registry hack to do so, try it with care.
1. Go to Start –> Run, type Regedit.
2. Go to HKEY_LOCAL_MACHINE\System\CurrentControlset\Servic es\USBStor
3. In the right pane, look for value Start and have value as 0000000(3)
4. Double click on that and change that value to 4.
You might be required to restart the PC, and then you are done with it, USB is now blocked.
In case if you want to get the USB unblocked, just change the value again to 3 .
I hope you have found this article helpful for irritating your friend by blocking usb drive.
If you want more such tips and tricks then just keep visiting the site and dont forget to share it with others.
For any personal message or suggestions you can mail me to – deeppundir09@gmail.com
Convert FAT partition to NTFS.
Convert FAT partition to NTFS.
Do you want to convert ur partition from FAT to NTFS then just follow few simple steps:
1. Goto command prompt from programs or click on RUN then type 'cmd'.
2.At command prompt window just type this code-
'CONVERT[drive letter]:/FS:NTFS'
3.Convert.exe will attempt to convert FAT partition to NTFS.
NOTE: Type the name of drive in code in place of 'drive letter'.
I hope you would like this small but effective tutorial and comments are welcomed.
Do you want to convert ur partition from FAT to NTFS then just follow few simple steps:
1. Goto command prompt from programs or click on RUN then type 'cmd'.
2.At command prompt window just type this code-
'CONVERT[drive letter]:/FS:NTFS'
3.Convert.exe will attempt to convert FAT partition to NTFS.
NOTE: Type the name of drive in code in place of 'drive letter'.
I hope you would like this small but effective tutorial and comments are welcomed.
Get ipl score on your mobile free of cost
You dont have time to see the match,but you are crazy for cricket then you can get free score updates on your mobile phone, free of cost.Just follow these steps: 1.Send 'CRI' to 9773300000. 2.After few seconds, send 'ON' to 9773300000.
Now you can enjoy the fun of cricket by getting latest scoce,just free of cost.
100% working all over India.
Now you can enjoy the fun of cricket by getting latest scoce,just free of cost.
100% working all over India.
How to format copyright pen drive?
To format copyrite pendrive:
1.Go to Run->regedit
2.MyComputer->HKEY_LOCAL_MACHINE->SYSTEM->CurrentControlSet->Control -> StorageDevicePolicies
3.Delete the StorageDevicePolicies in Your Registry.
Now You can format the Pendrive .
Motorola secret codes
MOTOROLA SECRET CODES
IMEI number:
*#06#
Code to lock keys. Press together *7
Note: [] (pause) means the * key held in until box appears.
Select phone line - (use this to write things below the provider name):
[] [] [] 0 0 8 [] 1 []
Add phonebook to main menu:
[] [] [] 1 0 5 [] 1 []
Add messages to main menu:
[] [] [] 1 0 7 [] 1 []
Copy SIM memory (phonebook menu):
[] [] [] 1 0 8 [] 1 []
Eng Field options (main menu):
[] [] [] 1 1 3 [] 1 []
Slow (Frequency of search menu):
[] [] [] 1 0 1 [] 1 []
Medium (Frequency of search menu):
[] [] [] 1 0 2 [] 1 []
Fast (Frequency of search menu):
[] [] [] 1 0 3 [] 1 []
Enable EFR:
[] [] [] 1 1 9 [] 1 []
Function :
[] [] [] # # # [] 1 []
Change pin:
[] [] [] 0 0 4 [] 1 []
Unblocking using the "puk" number:
[] [] [] 0 0 5 [] 1 []
There are lots of similar codes exist. If you change the last number to 0 you can deactive that code. The 3 digit number at the middle are from 0 to 999. I put the most interesting codes. (EFR):Enhanced Full Rate Codec.
You can change GSM frequencies to 900/1800 by entering the enginnering model. Following the below steps:
enter menu and press 048263* quickly, then you will enter the secret engineering menu
under "Opcode"
input 10*0*3 for GSM 900
10*0*4 for GSM 1800
10*0*5 for GSM 1900
10*0*6 for dual band GSM 900/1800
10*0*7 for dual band GSM 850/1900
To add extra message space 4 your Motorola C350 C450 C550 or C650, press menu button, press 048263* quickly, then on the popup menu enter 47 press ok.press 50 and ok.press 1 ok.press 64 ok.press 1 ok.press 186 and ok.You will receive an extra 50 msgs memory space.Switch phone off and back on.(not tested,but it worked on ESSAR network that was bought by Hutch,and then it stopped working in hutch.)
These codes are applicable to those handsets only in which pressing and holiding * key forms a [] on screen...but other codes without [] work with most of the cells...
Try to make square [] by pressing and holding * key... if it not works then try to make "p" by pressing and holding * key.
IMEI number:
*#06#
Code to lock keys. Press together *7
Note: [] (pause) means the * key held in until box appears.
Select phone line - (use this to write things below the provider name):
[] [] [] 0 0 8 [] 1 []
Add phonebook to main menu:
[] [] [] 1 0 5 [] 1 []
Add messages to main menu:
[] [] [] 1 0 7 [] 1 []
Copy SIM memory (phonebook menu):
[] [] [] 1 0 8 [] 1 []
Eng Field options (main menu):
[] [] [] 1 1 3 [] 1 []
Slow (Frequency of search menu):
[] [] [] 1 0 1 [] 1 []
Medium (Frequency of search menu):
[] [] [] 1 0 2 [] 1 []
Fast (Frequency of search menu):
[] [] [] 1 0 3 [] 1 []
Enable EFR:
[] [] [] 1 1 9 [] 1 []
Function :
[] [] [] # # # [] 1 []
Change pin:
[] [] [] 0 0 4 [] 1 []
Unblocking using the "puk" number:
[] [] [] 0 0 5 [] 1 []
There are lots of similar codes exist. If you change the last number to 0 you can deactive that code. The 3 digit number at the middle are from 0 to 999. I put the most interesting codes. (EFR):Enhanced Full Rate Codec.
You can change GSM frequencies to 900/1800 by entering the enginnering model. Following the below steps:
enter menu and press 048263* quickly, then you will enter the secret engineering menu
under "Opcode"
input 10*0*3 for GSM 900
10*0*4 for GSM 1800
10*0*5 for GSM 1900
10*0*6 for dual band GSM 900/1800
10*0*7 for dual band GSM 850/1900
To add extra message space 4 your Motorola C350 C450 C550 or C650, press menu button, press 048263* quickly, then on the popup menu enter 47 press ok.press 50 and ok.press 1 ok.press 64 ok.press 1 ok.press 186 and ok.You will receive an extra 50 msgs memory space.Switch phone off and back on.(not tested,but it worked on ESSAR network that was bought by Hutch,and then it stopped working in hutch.)
These codes are applicable to those handsets only in which pressing and holiding * key forms a [] on screen...but other codes without [] work with most of the cells...
Try to make square [] by pressing and holding * key... if it not works then try to make "p" by pressing and holding * key.
LG Mobile secret codes
LG SECRET CODES
LG all models test mode: Type 2945#*# on the main screen.
2945*#01*# Secret menu for LG
IMEI (ALL): *#06#
IMEI and SW (LG 510): *#07#
Software version (LG B1200): *8375#
Recount cheksum (LG B1200): *6861#
Factory test (B1200): #PWR 668
Simlock menu (LG B1200): 1945#*5101#
Simlock menu (LG 510W, 5200): 2945#*5101#
Simlock menu (LG 7020, 7010): 2945#*70001#
Simlock menu (LG 500, 600): 2947#*
LG-U81XX SPECIAL CODES
Code to read phone version :
- Phone without SIM
- Enter 277634#*# or 47328545454#
- Select 'SW Ver.info'
Code to reset phone :
- Phone without SIM
- Enter 277634#*# or 47328545454#
- Select 'Factory Reset'
Code to enter UNLOCK MENU :
- Phone wit SIM inside
- Enter 2945#*88110#
Test Menu 8330 : 637664#*#
Test Menu 8180 V10a: 49857465454#
Test Menu 8180 V11a: 492662464663#
Test Menu 8130-8138: 47328545454#
Test Menu 8110-8120: 277634#*#
LG all models test mode: Type 2945#*# on the main screen.
2945*#01*# Secret menu for LG
IMEI (ALL): *#06#
IMEI and SW (LG 510): *#07#
Software version (LG B1200): *8375#
Recount cheksum (LG B1200): *6861#
Factory test (B1200): #PWR 668
Simlock menu (LG B1200): 1945#*5101#
Simlock menu (LG 510W, 5200): 2945#*5101#
Simlock menu (LG 7020, 7010): 2945#*70001#
Simlock menu (LG 500, 600): 2947#*
LG-U81XX SPECIAL CODES
Code to read phone version :
- Phone without SIM
- Enter 277634#*# or 47328545454#
- Select 'SW Ver.info'
Code to reset phone :
- Phone without SIM
- Enter 277634#*# or 47328545454#
- Select 'Factory Reset'
Code to enter UNLOCK MENU :
- Phone wit SIM inside
- Enter 2945#*88110#
Test Menu 8330 : 637664#*#
Test Menu 8180 V10a: 49857465454#
Test Menu 8180 V11a: 492662464663#
Test Menu 8130-8138: 47328545454#
Test Menu 8110-8120: 277634#*#
Basic lesson of hacking
Basic lesson of Hacking : I P Address
IP address stands for internet protocol address.
Every ip address is the unique address on which data is sent to user. Your internet service provider make itself sure that data is transferring to you bcoz they are sending data on the4 address specially assigned to you.
Tracing IP address and its location :
How to know your ip address??
Click on start > RUN > type ‘cmd’ and hit enter which will open command prompt window in front of you or open command prompt from programs in vista and win7.
On command prompt window type’netstat-n’
And hit enter .A list will appear on your screen, look at local address , the first local ip address is yours.
Or
The second method to find out ip address is by visiting this site- whatismyip.com , on this site you can easily get your ip address.
Changing your IP address (PROXY):
While hacking your safety is very important, to do this the best thing is to change your ip address.
How to change ip address or doing Proxy-
Proxy is changing your ip address , as I already told you above that your ip address is the unique address on which data are sent to you. Now think that if you are doing any wrong work on net then what will get to police to look up…..it’s your ip address….so if you tell the web wrong ip address then police will goto any other’s ip address and you will be safe . So learning proxy is very much important while doing any cyber attacks.
Benefits of Proxy:
(a) There are many sites which allows only one account on one ip address, on those sites you can make multiple ids by proxy.
(b) We can download multiple files from websites like megaupload, rapidshare without having premium account on them.
(c) As I mentioned above , for being safe while doing cyber hacks/attacks, it is very much essential to change your ip address.
Simple way to understand it :
Your computer(ip)»»»[web]»»»ur comp.
After proxy:
Your comp»»»[proxy server]»»»»[web]»»»[proxy server]»»»your computer.
You can change your ip address by downloading many such softwares which can change your ip address by googling up.
To change your ip address manually :
For changing your ip address manually just use this simple trick-
Goto google search engine , search for “free proxy server”, then goto any of the links there which would be shown in result. Now on that website you will find many iup addresses of proxy servers. Copy anyone of the addresses (both port number and ip address).
Then in your web browser, I use mozilla firefox so telling for that goto Tools>Options>advanced>Network>
Settings and in settings put the ip address and port no.
The settings are almost same for all browsers, if you use anyother browser then find them yourself.
IP address stands for internet protocol address.
Every ip address is the unique address on which data is sent to user. Your internet service provider make itself sure that data is transferring to you bcoz they are sending data on the4 address specially assigned to you.
Tracing IP address and its location :
How to know your ip address??
Click on start > RUN > type ‘cmd’ and hit enter which will open command prompt window in front of you or open command prompt from programs in vista and win7.
On command prompt window type’netstat-n’
And hit enter .A list will appear on your screen, look at local address , the first local ip address is yours.
Or
The second method to find out ip address is by visiting this site- whatismyip.com , on this site you can easily get your ip address.
Changing your IP address (PROXY):
While hacking your safety is very important, to do this the best thing is to change your ip address.
How to change ip address or doing Proxy-
Proxy is changing your ip address , as I already told you above that your ip address is the unique address on which data are sent to you. Now think that if you are doing any wrong work on net then what will get to police to look up…..it’s your ip address….so if you tell the web wrong ip address then police will goto any other’s ip address and you will be safe . So learning proxy is very much important while doing any cyber attacks.
Benefits of Proxy:
(a) There are many sites which allows only one account on one ip address, on those sites you can make multiple ids by proxy.
(b) We can download multiple files from websites like megaupload, rapidshare without having premium account on them.
(c) As I mentioned above , for being safe while doing cyber hacks/attacks, it is very much essential to change your ip address.
Simple way to understand it :
Your computer(ip)»»»[web]»»»ur comp.
After proxy:
Your comp»»»[proxy server]»»»»[web]»»»[proxy server]»»»your computer.
You can change your ip address by downloading many such softwares which can change your ip address by googling up.
To change your ip address manually :
For changing your ip address manually just use this simple trick-
Goto google search engine , search for “free proxy server”, then goto any of the links there which would be shown in result. Now on that website you will find many iup addresses of proxy servers. Copy anyone of the addresses (both port number and ip address).
Then in your web browser, I use mozilla firefox so telling for that goto Tools>Options>advanced>Network>
Settings and in settings put the ip address and port no.
The settings are almost same for all browsers, if you use anyother browser then find them yourself.
Increase ur internet speed by 20% without any software.
I think very few only knows this trick to boost up their internet speed .
Microsoft reserves 20%` of your available bandwidth for their own purposes like windows updates and interrogating your computer etc but you can get it by following some simple steps as given below.
1. click on start `then goto "Run" and type 'gpedit.msc'.
2. Then goto Local Computer Policy, click on computer configuration .
3. Goto administrative templates and then click on network in left panel and chose QOS Packet Scheduler and then double click on Limit Reservable Bandwidth.
4. It will say it is not configured, but the truth is under "explain" tab i.e. "By default" ,the packet scheduler limits the system to 20% of the bandwidth of a connection,but you can use this setting to override the default.
5.So now you bcan get full bandwidth just ENABLE reservable bandwidth and set it to zero.
This will allow the system to reserve nothing , rather than the default 20 percent.
Microsoft reserves 20%` of your available bandwidth for their own purposes like windows updates and interrogating your computer etc but you can get it by following some simple steps as given below.
1. click on start `then goto "Run" and type 'gpedit.msc'.
2. Then goto Local Computer Policy, click on computer configuration .
3. Goto administrative templates and then click on network in left panel and chose QOS Packet Scheduler and then double click on Limit Reservable Bandwidth.
4. It will say it is not configured, but the truth is under "explain" tab i.e. "By default" ,the packet scheduler limits the system to 20% of the bandwidth of a connection,but you can use this setting to override the default.
5.So now you bcan get full bandwidth just ENABLE reservable bandwidth and set it to zero.
This will allow the system to reserve nothing , rather than the default 20 percent.
hack through keylogging
What is Keylogger?
A keylogger is basically a program or software which monitors or records each key typed by an user in computer system.So we can use it to hack anybody's email and passwords by using a keylogger.As the user types any keystroke, the keylogger collects each keystroke and saves it as a text in its own miniature harddrive.
A keylogger program does not require any physical access to users computer.It can be directly installed on victim's computer by binding.When keylogger is installed in victim's computer then program records each keystroke the user types and uploads the information in a fix interval of time on the internet to the person who have installed it.
Hardware keylogger :
They are used for keystroke logging, a method of capturing and recording computer user keystrokes. They plug in between a computer keyboard and a computer and log all keyboard activity to an internal memory. They are designed to work with PS/2 keyboards, and more recently with USB keyboards. A hardware keylogger appears simply as a USB pendrive (thumb drive) or any other computer peripheral so that the victims can never doubt that it is a keylogger. So by looking at it’s appearence it is not possible to identify it as a keylogger.
A keylogger is basically a program or software which monitors or records each key typed by an user in computer system.So we can use it to hack anybody's email and passwords by using a keylogger.As the user types any keystroke, the keylogger collects each keystroke and saves it as a text in its own miniature harddrive.
A keylogger program does not require any physical access to users computer.It can be directly installed on victim's computer by binding.When keylogger is installed in victim's computer then program records each keystroke the user types and uploads the information in a fix interval of time on the internet to the person who have installed it.
Hardware keylogger :
They are used for keystroke logging, a method of capturing and recording computer user keystrokes. They plug in between a computer keyboard and a computer and log all keyboard activity to an internal memory. They are designed to work with PS/2 keyboards, and more recently with USB keyboards. A hardware keylogger appears simply as a USB pendrive (thumb drive) or any other computer peripheral so that the victims can never doubt that it is a keylogger. So by looking at it’s appearence it is not possible to identify it as a keylogger.
Saturday, July 10, 2010
100% Free call to any network in india
1.Type ibibo.Com in ur address bar
2.Login in ibibo register ur phone no. There
3.Then type or copy n paste this address
http://m2.ibibo.com/wap/call.php
Note:-all the letters should be in small case
enjoy!!!! any problem comment below
2.Login in ibibo register ur phone no. There
3.Then type or copy n paste this address
http://m2.ibibo.com/wap/call.php
Note:-all the letters should be in small case
enjoy!!!! any problem comment below
Friday, July 9, 2010
Multiple log in yahoo messenger.
!! Multiple login in yahoo !!
You can login with multiple ID's on the same yahoo messenger.
Follow these steps : ==>>
* Go to Start ==> Run ==>> Type regedit,hit enter
* Go to HKEY_CURRENT_USER ==>> Software ==>> Yahoo ==>> pager ==>>Test
* On the right pane ==>> right-click and choose new Dword value .
* Rename it as Plural.
* Double click and assign a decimal value of 1.
* Now close registry and restart yahoo messenger.
* For signing in with new id open another messenger
You can login with multiple ID's on the same yahoo messenger.
Follow these steps : ==>>
* Go to Start ==> Run ==>> Type regedit,hit enter
* Go to HKEY_CURRENT_USER ==>> Software ==>> Yahoo ==>> pager ==>>Test
* On the right pane ==>> right-click and choose new Dword value .
* Rename it as Plural.
* Double click and assign a decimal value of 1.
* Now close registry and restart yahoo messenger.
* For signing in with new id open another messenger
Settings for free GPRS in IDEA.
You can enjoy free internet on your idea sim using following settings-
apn: mmsc
use proxy: yes
proxy address: 10.4.42.15
port: 8080
apn: mmsc
use proxy: yes
proxy address: 10.4.42.15
port: 8080
Enjoy free internet in airtel
You can use free internet on your mobile in airtel sim by applying given settings.
This trick is onlv applied for the users of Rajasthan and some part of Haryana.
First of activate 30psper 50 kb plan with no monthly rental in your mobile then change the default settings as given below:
apn:airtelgprs.com
use proxy: yes
proxy address: 10.239.221.22
port: 8080
now you can enjoy free internet on your mobile.
This trick is onlv applied for the users of Rajasthan and some part of Haryana.
First of activate 30psper 50 kb plan with no monthly rental in your mobile then change the default settings as given below:
apn:airtelgprs.com
use proxy: yes
proxy address: 10.239.221.22
port: 8080
now you can enjoy free internet on your mobile.
Download u-tube videos
Many times it happens that u see a video in youtube and you like it very much so you want to download that video to show to ur friends and others. The problem is that you dont know how to download it?
So here is the simplest way to download a video:
1.Copy the url of video from youtube website.
2.Goto any of the following sites and paste the url.
www.keepvid.com
www.voobys.com
www.youtubecatcher.com
http://xviservicethief.sourceforge.net
So here is the simplest way to download a video:
1.Copy the url of video from youtube website.
2.Goto any of the following sites and paste the url.
www.keepvid.com
www.voobys.com
www.youtubecatcher.com
http://xviservicethief.sourceforge.net
Subscribe to:
Posts (Atom)