Sunday, December 13, 2009

Game Wallpapers Pack (must have)























Download Here

Make your desktop Marvelous with these wallpapers 3















Download Here

Make your desktop Marvelous with these wallpapers 2















Download Here

Make your desktop Marvelous with these wallpapers 1















Download Here

New Year Wallpaper of 2010



















Download Here

Walppapers of Most Famous World Cities in the world




















Download Here

pass :- speed

Saturday, November 14, 2009

Facebook Friend Bomber 2.0.1

Facebook Friend Bomber 2.0.1

1. Mass Facebook Amber Alerts (New)
2. Mass Facebook Friend Requests
3. Mass Facebook Friend Messages
4. Mass Facebook Friend Pokes
5. Mass Facebook Wall Poster
6. 100% CAPTCHA Bypass*
7. Single & Unlimited Licenses


download

Pass - surferstar

Fake Blue Screen of Death on your system


















Who does not love the blue screen of death
wouldn't you want to scare any of your friends or people you might hate
you might want to say you tried doing your homework!!!!!


Blue screen runs on Windows NT 4.0, Windows 2000, Windows XP,Windows  Vista,Windows 7, Windows Server 2003 and Windows 9x (it requires Direct X).


Note: before you can run Bluescreen on Windows 9x, you must copy \winnt\system32\ntoskrnl.exe from a Windows 2000 system to your \Windows directory. Simply copy Sysinternals BLUESCRN.SCR to your \system32 directory if on Windows NT/2K, or \Windows\System directory if on Windows 9x. Right click on the desktop to bring up the Display settings dialog and then select the "Screen Saver" tab. Use the pull down list to find "Sysinternals Bluescreen" and apply it as your new screen saver. Select the "Settings" button to enable fake disk activity, which adds an extra touch of realism!

Download

Wednesday, November 11, 2009

Sony Ericsson Satio Released in india

The Sony Ericsson Satio,(idou), is announced to be the manufacturer’s first all-in-one device, packing a 12-megapixel camera with Xenon Powered  flash, a Symbian S60 5th Edition OS, 3.5-inch touch-sensitive display with 16:9 widescreen format and a resolution of 360x640 pixels.


















       Sony Ericsson Satio a specifications
  • Network
  • Size
  • Battery
  • Main Display
  • Camera
  • Multimedia
  • Memory
  • Smartphone
  • Input
  • Connectivity
  • Other Features

Saturday, November 7, 2009

Megaupload – Download Without Waiting Time & Unlimited


 This very simple trick shows you how to download from Megaupload
as a premium user without having to buy it.
Skip the authentication and wait time and download faster.


TESTED! WORKING 100 %


DOWNLOAD

Thursday, October 29, 2009

Wanna increase your system Speed by configuring your hardware



1). Start any application, say Word. and Open some large documents.

2). Press CTRL+SHIFT+ESC to open Windows Task Manager and click Processes tab and sort 
   the list in   descending order on Memory Usage. You will notice that WINWORD.EXE will 
  be somewhere at the top, using multiple MBs of memory.

3). Now switch to Word and simply minimize it. (Don't use the Minimize All Windows
     option of the task bar).

4). Now go back to the Windows Task Manager and see where WINWORD.EXE is listed.
    Most probably you will not find it at the top. You will typically have to scroll to the 
    bottom of the list to find Word. Now check out the amount of RAM it is using. 
    Surprised?   The memory utilization has reduced by a huge amount.



5). Minimize each application that you are currently not working on by clicking on the
   Minimize button & you  can increase
   the amount of available RAM by a substantial margin. Depending upon the number and 
   type of applications you use together,
   the difference can be as much as 50 percent of extra RAM.

   In any multitasking system, minimizing an application means that it won't be utilized by  
    the user right now. Therefore the OS automatically makes the application use virtual  
    memory & keeps bare minimum amounts of the code in physical RAM.

  So, my personal advice would be that,if you are going to upgrade your RAM to next level 
  try to upgrage it minimum up of 3GB ram, and also add some good graphic card of NVIDIA
  or ATI , whichever Supported.

Hidden Emotion icon in yahoo to use








               
     This is something that Every New Yahoo messenger user should Know about the previous historical
     emotion icons.,they can really spice up your conversation. :)

 

Create Multiple G talk for multiple chat id



Just follow the simple steps Below:

1)Just Right click on the Google Talk shortcut.
2)click on Properties.
3)Go to Shortcut tab on Google Talk Properties window.
4)On the Target textbox, add in the /nomutex to the end of the line so that it looks like below (or you can simply copy and paste the below syntax and replace the original).
  “c:\program files\google\google talk\googletalk.exe” /nomutex
5)Click on OK.

  And this will provide you a new G talk for you.

Alternate method:-
To create a new shortcut for Google Talk:

1)Right-click on the desktop or anywhere you want to place the GTalk shortcut.
2)Select New on the right click context menu.
3)Then select Shortcut.
4)Copy and paste the following line to the text box when prompted to type the location of the item:
“c:\program files\google\google talk\googletalk.exe” /nomutex

5)Click on Next.
6)Give the shortcut a proper name such as Google Talk or Google
Talk Multiple or Google Talk Polygamy.
8)Click OK until you are done.
9)Don't forgot to say thanks

Cool trick for every computer Greek/nerd people

Copy and paste the java script code to the address bar of your browser

javascript:function Shw(n) {if (self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} Shw(6)

2: Press enter and watch your window's "shaking it".  You can change the value of i if you wish :-)
3. It's just for Fun, go & make your friends Oh my god...

Accelerate your internet connection speed in no time


As more & more people get quick connections to the internet(WWW), such as cable or ADSL,
it becomes apparent to the user of a simple dial-up modem that the World Wide Web can  quickly turn into the World Wide Wait.  Here a trick that can help speed up your current modem without shelling out the big bucks.

here is a setting located in your windows registry called the Maximum Transfer Unit (MTU).
 This determines the size of the packets of data sent between your and your server. 
In Windows 95, this setting is has a value of 1,500 bytes when the actual size of internet packets is 1,000 bytes.
This can sometimes slow things down.  To remedy the situation, simply follow these steps:


In the registry editor (Start > Run > regedit.exe),
navigate to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Class\NetTrans.
In the NetTrans folder you should find another folder named "000x" in which x represents a fourth digit.
Right-click on the "000x" folder and select New and StringValue. 
Rename the item that appears in the panel on the right side to MaxMTU,
then double-click it to bring up the Edit String box and give it a velue of 1002

Remember to keep playing with the MaxMTU value until you feel that your internet connection has greatly sped up.  Some people report huge speed gains using this tricks, while others hardly notice a difference.

Wednesday, October 28, 2009

Defacing Websites Part I : A Step By Step Process

How do I deface websites? How do I replace someone else’s
web page with my own?


Questions like these had become very common. After procrastinating this manual for some
weeks, I finally have got down to bringing it out.


Before we move on with this manual, it is important to note that this manual explores only one method of defacing
websites and the described process will not necessarily work on all target systems. Also note that we take an
imaginary target system X for the below steps.
Identifying a Vulnerable host A number of system administrators have a tendency to keep even those ports on their system open, which have no useful daemon running on them. One tip given to all system administrators is to close all those ports or disable all those daemons/services, which have no great use. However, many system administrators around the world are both too carefree and ignorant or lack the knowledge required to be able to get a list of running services and disabling the not useful ones. In effect they keep their system vulnerable to outside attacks by keeping even those ports open, which could have been done without.
The first step to be able to deface a website successfully is to identify a vulnerable host, against which you can carry
out attacks. The defacing process described in this manual requires for the Port 21 or the FTP port of the target
system to be open and allowing anonymous logins. In effect, you first step would be to port scan the target system X
and find out whether or not the FTP port is open, and if the FTP port is open, then whether it allows for anonymous
logins or not.
When I port scanned X, I find that Port 21 is open and it indeed has the FTP daemon running. I then use the FTP MSDOS
utility to ftp to port 21 of X.
C:\WINDOWS>ftp X
Connected to X
220 X FTP server (Digital UNIX Version 5.60) ready.
User (X:(none)):
FTP’ing to the port 21 of the target system brings up a prompt which asks for a Username. Now, let us try to login
anonymously:
User (X:(none)): anonymous
331 Guest login ok, send ident as password.
The daemon did not get an error message, thus it does allow anonymous logins. Now, I just enter any fake email
address as my password and login:
Password: fake_email@fake_domain.com
FTP Exploits
230 Guest login ok, access restrictions apply.
ftp>

Actually, one does not need to login anonymously for this method to work. Even if you have a normal account with
the target system, using which you can login to the FTP daemon and if the system is vulnerable, then this method
will still work. If your target system does not allow anonymous logins and if you do not even have an account with
them, then another thing that you could try is: Trying to login using the default password of the FTP daemon running
on the target system. (For more information regarding default passwords, read:

http://hackingtruths.box.sk/

defaultpasswd.htm) However, the fact remains that the method described in this manual works the best with servers,
which have anonymous logins, enabled.

The Vulnerability Itself
In the above paragraphs, I have mentioned the term: ‘the method’, several times. So what exactly is this method and
what vulnerability does it exploit?
Ideally, the FTP port should be disabled unless it is really of some use. If one does have to necessarily keep the FTP daemon running, then typically each user’s file access should be limited to a particular directory. For example, like my ISP gives an FTP account to each subscriber, with each subscriber having file access to the following directory:
/bin/users/username

However, sometimes both anonymous logins and normal logins give the user access to the entire directory structure.

This means that each and every user can login to the Port 21 of the vulnerable system and browse through all
directories and access all files on that particular system. In such cases, the attacker tries to lay his hands on the /etc/
passwd file. But that is not we lay the stress on, in this manual.
On top of all this, many servers have world write-able directories, to which all users have access to, due to the above problem. The directories being world write-able, means that all users can login and upload any files of their choice onto the target system. Or in other words, anyone can write to the target system. Thus, you not only have access to all directories on the target system, but you can save and delete or even replace all files on that system, just as if it were your local hard disk.

********************
HACKING TRUTH: How do I know whether my target system’s FTP port gives me access to world write-able
directories? If you are able to upload any file to the target system, then it probably means that the directory into
which logged in is at least write-able by you.
*******************

This vulnerability can be used by an attacker to access the directory where the pages of the website hosted by the target system are stored. Once the attacker knows which directory stores the web pages of the target system then he can easily edit their pages or even replace their entire site with his own, with the help of a simple command:
ftp> mput filename

Please note that if you FTP to a system and find that you are able to upload files, then it could also mean that your
particular directory is write-able by you, while you do not have privileges to write to other directories. Such a
scenario is quite common in the case of Webspace providers, in which each subscriber is given a particular space to Defacing Websites: A Step By Step Process By Ankit Fadia Hacking Truths. FTP Exploits
store files or in other words each other member is given a write-able directory to which he can upload files. The gist being, having write privileges in one directory does not give you write privileges in all directories.
With this we come to the end of the first in the series of guides to Defacing websites. Thanks for reading and till the next update,

Needs thousands of email for your subscribe list & other work..here it is

Here it is guyz..
20,000,000 Yahoo Maillist + Software
In this rar file you'll find a list of 20million emails.
Also some software to mass send emails


Download Here

windows password reset disk (1000% working) just for you

Is that ever happened that you forgot your windows password & don't know what to to.. so here is the solution for you guyz..


just write it on a disk and boot the system with the disk
and the windows password will be removed.

Download Here

Tried and tested it works

Tuesday, October 20, 2009

Now see your orkut friend location using orkut maps feature



Now you can check the location of all your orkut friends by using the orkut friends map feature. It features  google maps to let you see where all of your friends are living around the whole world. Orkut friends map combines the power of google maps with orkut profiles. You need to follow these simple steps to use this cool feature in orkut:

1. Click the view friends link in the my friends box on your right on the orkut home page.

2. Now click on the friends map tab at the top of the page.

You can now click on a friend’s profile picture to see their location on the map shown. Please know that if we don’t have map data for a particular region or if your friend chose not to put their location in their orkut profile, you’ll see a message “(not on map)” below their profile name.
Please know that if we don’t have map data for a particular region or if your friend chose not to put their location in their orkut profile, you’ll see a message “(not on map)” below their profile name. You can also click on the “tiny little blue men” to see your friends’ locations. By clicking on one of these figures, a bubble will pop open to let you know which friend lives in that location.
When you are signed in to orkut account, you can use this cool feature directly by using this link. http://www.orkut.com/Map.aspx

Thursday, October 15, 2009

Hundred (100) + tools and resources to make money online

Always wanted to make money online? Here are some 100+ tools and resources of making money online from various resources.

Do you Blog? Get Paid then…:

Weblogs, Inc. – Apply to blog for one of their ninety plus blogs or submit your own topic idea. They will pay you per post that you write and you must meet their minimum post requirements.

PayPerPost – Get paid as much as $500 or more a month writing articles and reviews of their sponsors on your blog.

Blogsvertise – Their advertisers pay you to mention and talk about their websites, products and services in your own blog.

Review Me – After your blog has been accepted in their network, they will pay you $20 to $200 per post that you write.

Smorty – Earn $6 to $100 dollars per post you write on your blog. Amount paid for each post depends on the overall popularity and page rank of your blog.

SponsoredReviews – Write reviews for their advertisers’ products and services on your own blog. They charge a 35% transaction fee for their services.

LoudLaunch – Blog about the advertisers campaign releases that meet your interests. They pay once a month.

Blogitive – Get paid weekly via PayPal for posting stories that interest you.

BloggerWave – Select the advertiser opportunities that best suit your blog and write reviews on their products and services.

InBlogAds – Write about websites, products, services and companies on your blog and get paid for it.

BlogToProfit – Make $250 dollars or more by writing new posts on your blog.

Creative Weblogging – Write 7 to 10 posts per week for their network and they will pay you $225 per month.

WordFirm – Make money publishing books as a freelance writer from home.

451 Press – Write for a blog within their network and receive forty percent of all generated revenue.

Digital Journal – Network of bloggers that get paid to report on newsworthy articles through their blogs.

BlogBurner – Sign up for a free blog and get paid for writing new posts. Your commissions are generated through Adsense clicks.

Squidoo – Earn money by writing your new blog, or choose to donate your earnings to charity.

About.com – Become a paid guide writing articles for About.com. Compensation depends on the growth of your page views.

DayTipper – Earn $3 for every short tip you write and get published.

Helium – Earn a share of their advertising revenue by writing articles in their channels.

Dewitts Media – Get paid to write your own blog. This site requires you have a minimum page rank of 3 to sign up.

BOTW Media – Make money writing a blog for their blogging network.

CreamAid – Get paid to submit blog posts in their directory.

BlogFeast – Generate revenue from pre-installed Google Adsense ads when you blog in their network.

Mashable – Mashable hires freelancers and new staff, offering one of the largest platforms for tech bloggers.

Advertising Networks

Google Adsense – Most popular pay-per-click advertising provider. Make anywhere from $0.01 to $5.00 plus per click on site relevant ads.

Nuffnang-Malaysia’s first blog advertising network

Text-Link-Ads – Approve or deny the advertiser links that appear on your site. They pay you 50% of the sale price for each text link sold on your website.

BlogAds – The average blogger makes anywhere from $50 to $5000 dollars a month selling blog ads. To participate in this program you will need to get sponsored by someone in their network.

LinkWorth – Here you will find eleven different options to fit your advertising needs. Choose from text based advertisements, sponsored ads and paid blog reviews to name a few.

CrispAds – Access to over six thousand advertisers in their pay-per-click program. You choose the advertisers that suit you best.

Chitika – Offers six types of advertising to fit your needs.

AzoogleAds – Delivers targeted advertisers to their network of publishers to bring you the most profitable solutions.

Vibrant Media – Offers in-text contextual based advertisements.

MediaFed – Place advertisements in your blog’s RSS feed to generate additional revenue.

Qumana – Embeds ads directly into your posts. Ads are generated from keywords that you select. Not particularly popular with readers.

PeakClick – Austria based pay-per-click provider. Provides automatic insertion of site targeted ads.

DoubleClick – Offers a full suite of products for publishers that enable you to forecast, sell inventory, serve ads and analyze campaigns online and through other digital channels.

Tribal Fusion – They offer reliable payments, free ad-serving technology, a dedicated account manager and up-to-date, real-time reporting, with a 55% payout. Must go through an approval process.

Advertlets- Malaysia’s second blog advertising network

AdBrite – Approve or reject any ads purchased for your sites. Also gives you the ability to sell ads direct with “Your Ad Here” links.

ThankYouPages – Shows ads based on demographics and relevancy. Majority of traffic must originate from U.S.

Clicksor – Inline text link advertising, underlines words directly in your posts making them clickable advertisements. Once more, we’d say that inline ads are not popular with regular blog readers.

TargetPoint – Contextually and search targeted pay-per-click ads.

IndustryBrains – Place relevant contextual text listings and graphical ads on your site.

BloggingAds – Post one-time ads on your site. Pays via PayPal.

BulletAds – Performance based online advertising network.

AdsMarket – Match your traffic to handpicked advertisers with top-converting products and services.

ROIRocket – Targeted campaigns specific to your marketing needs.

AdKnowledge – Offers complete outsourcing of your advertising management. Runs ads in websites, email and search engine inventory.

Yes Advertising – Payouts for running ads from their sponsors. Also offers a referral program that pays 20% of the referred webmasters earnings.

RevenuePilot – Offers pay-for-performance and pay-per-click advertising for your sites.

SearchFeed – Integrates paid advertisements into your site’s search feature.

Bidvertiser – Display text ads on your site and advertisers bid for placement.

Pheedo – Monetize your RSS feeds with this program.

ValueClick media – Generate revenue by displaying ads through banners, pop-unders and rich media. Be warned that pop-unders are unpopular these days.

OneMonkey – Another text based advertising program.

Yahoo Publisher Network – Use the internet giant, Yahoo, to display targeted ads on your site.

Q Ads – Monetize your site by placing ads anywhere you can add a picture.

Affiliates and Paid progams

Amazon Associates – Link to Amazon’s products and services and earn up to 10% of the sale price. Converts well for product-focused sites.

ClickBank – Over 10,000 products to promote with commissions as high as 75%.

Commission Junction – Promote the advertiser’s products and services in exchange for a commission on leads or sales.

LinkShare – Pay-for-performance affiliate marketing network. Gives you the ability to use individual product links on your site and generate revenue from sales.

Affiliate Fuel – Serves as a middle man to bring publishers and advertisers together to promote products and services.

LinkConnector – Affiliate marketing network that offers a zero tolerance fraud policy to keep you safe while conducting business.

LeadPile – Affiliate network that allows you to generate and sell trade leads to the highest bidder.

Forex-Affiliate – Affiliate program that allows you to earn commissions from trading Forex (currency exchange) online.

incentAclick – CPA (cost-per-action) affiliate program that guarantees the fastest ROI in the industry.

AdPlosion – Earn revenue by selling leads, clicks and products from their advertisers. Also runs an incentive points program in addition to your commissions.

AffiliateFuture – Another affiliate program that pays you for generating leads, sales and clicks.

ClixGalore – Affiliate network consisting of 7500+ advertisers for you to choose from.

ThinkAction – Affiliate network that claims to have the top payouts and the possibility of earning over $100,000 dollars per month.

RocketProfit – Affiliate network, pays via check after your commissions reach $25 dollars.

CafePress – Earn affiliate commissions by selling your personally branded merchandise.

Avangate – Make money selling popular computer software titles through your site.

Dada.net – Social site with a revenue sharing program that pays you for referring friends and driving traffic.

Jyve – Pays you to provide answers, advice and peer support to people in need of some help.

Cruxy – Specializes in social video, but serves as a venue to sell your digital media.

BitWine – Get paid to give advice and answer questions for people, on subjects of your interests and choice.

Ether – Make money answering questions for your peers over the phone. You set your rates and call availability.

UpBlogger – Social network site that pays you based on the amount of visits you receive to your uploaded content.

JustAnswer – Help others solve their problems and earn money for your knowledge.

MetaCafe – Upload your videos and earn money based on the number of views you receive.

ChaCha – Get paid to offer support to members of their community.

AssociatedContent – Earn money by uploading your videos, text, audio and images to their site. Earnings are determined by the exposure you receive from your content.

myLot – Pays you for posting, commenting and using their social network.

KnowBrainers – Another site that pays you to get involved with the community and answer questions. Optionally you can answer questions through the RSS feeds on your own blog.

Others

Google User Research – Google Pays you money to participate in their user research studies online.

Microsoft Research Panel – Get paid from Microsoft for providing feedback on their products.

Amazon Mechanical Turk – Amazon pays you to complete simple tasks that their computers can’t understand. Payments are a matter of cents.

eJury – Earn $5 to $10 dollars per verdict rendered as a mock juror for practice trials.

WorkingSOL – This company pays you to handle technical support for many large companies. You can work from home on the computer or by phone and decide what times you are available.

Appingo – Always looking for experienced copy editors and proof readers. Must submit a resume.

IntelliShop – Pays you to shop at stores in your area and write a review of your experience.

Mahalo Greenhouse – They pay $10 to $15 dollars per site you submit to their directory.

Focus Pointe Global – Get paid to join their focus groups and voice your opinion. Available to teens and adults.

Agloco – Sign up, download their toolbar and get paid to surf the internet. This site has been criticized as a “pyramid scheme”, although the founders deny the allegation.

Arise – Make money providing phone, web and email support and sales for 40 plus companies in their network.

CraZoo – Earn money for starting new threads and posting in online forums.

Tutor.com – Get paid to tutor people online.

ForumBoosting.com – Make money posting in forums across the internet.

Share-A-Pic – Earn money by uploading and sharing your pictures on their website.

Opuzz Voice – Earn money by doing voice overs for their clients online.

SlashMySearch – Get paid to search the internet with their search engine.

Five(5) FaceBook Source Code Secrets

I glanced over the Facebook source code for both index and search pages. As an enterprise developer of some experience, source code is always interesting to me as it provides an insight into the health of a company. The interesting highlights of the Facebook code are:

1. Facebook writes pretty clean code & maintains coding standards. The code is readable.

2. To Facebook coder: Calling a function to do the magic isn't an example of clean code; in response to Facebook coders comment - "Holy shit, is this the cleanest fucking frontend file you've ever seen"

3. Facebook doesn't do MVC. There isn't any separation of concerns as far as I could see. It is also not a designer's job. It is created by developers with tons of procedural PHP code.

4. Facebook also doesn't do much object oriented coding either, at least it wasn't apparent from these source files. It is plain and simple procedural code.

5. Facebook uses templates which is nice.

It does some interesting stuff with advertising, specifically estimates the length of page and attributes to determine advertisements to show. There are few interesting ideas here.

Did you expect more? There isn't much more really, take a look yourself. I wonder if MySpace's code is as clean.

Nine(9) Fcebook useful Hacks for everyday use

We have always had a close look at Facebook right from the start. As you probably know by now that we have discussed 10 ways to connect facebook to other social networking media and Top 30 Newest Facebook Apps to Brighten Up 2009 and people liked it. So today, why don't I tell you about hacks and tricks with which you can cross the restrictive line that Facebook has imposed upon you? So here are 9 facebook hacks to make you feel free.

1.How to View the Album of Any User Even if it is Private

You can use this script to view a photo in the original album, even if you’re not friends with the person. You can also read our article on this particular Facebook hack and try it yourself without using the script.

Get it here

2. How to Remove Annoying Facebook Advertisement

Get rid of some of the Facebook advertising and sponsored by sections with this tool.

Get it here

3. How to see Real Profiles from Public Pages

This script redirects to real profiles from the Facebook people pages (public profiles). Be logged in our the code may encounter some error.

Get it here

4. How to Undo Facebook Changes

If you hate some or all of the new Facebook changes, undo them with these scripts and use what you liked previously.

Get it here

5. How to View All the Photos from a Person

You can search for pictures of a Facebook member who has tight privacy settings and view all his/ her pictures without his/ her consent.

Get it here

6. How to Find More Friends at Facebook

Suppose some of your friends have newly joined Facebook and you didn't even knew. Use this script and it will help you go through your friends' friends list and find them out.

Get it here

7. How to Share Files from Facebook

With this box widget, you can share files from your computer through Facebook. Isn't it great?

Get it here

8. How to Get a Job from Facebook

Looking for a job? This application gives Facebook users unique access to job information, networking opportunities and other career resources.

Get it here

9. How to Tighten up the Privacy and still Maintain Communication Convenience

The Private Wall combines the best of both worlds of Facebook: online convenience and communication with more serious privacy settings


Get it here

Note: we don't encourage you to use these scripts because we do not practise them ourselves. But if you do, don't forget to leave a feedback.

Facebook Hack: How to See the Album of Any of the Private User

Facebook has grown stupendously popular over the years. As you probably know by now that we have discussed 10 ways to connect facebook to other social networking media and Top 30 Newest Facebook Apps to Brighten Up 2009 and people liked it. Today we are here with a different intention.

While privacy is a thing of assurance for some, it is annoyance for most. So here is a trick that will help you to see any locked profile. This trick will let you see anyone’s tagged photos even if they are private for you.
Trick

Step1:- Log into facebook and don't worry about making another account. They will not be able to trace you down and ban you.

Step2:-

* Find the person's unique profile ID.
* Search for them and click view friends or send message.
* Write the unique ID from the address bar (only the numbers) or copy it somewhere else.

Step3:- Now that you have your unique profile ID you can use the next two links to view a total of 40 tagged photos:

If you wish to see tagged photos added by others use this link:

http://www.facebook.com/photo.php?pid=12345678&op=1&view=all&subj=[Unique ID]&id=[Unique ID]

If you wish to see tagged photos added by themselves use this link:

http://www.facebook.com/photo.php?pid=13245678&op=1&view=user&subj=[Unique ID]&id=[Unique ID]

Each link contains two places for [Unique ID] you simply replace this with the person’s unique ID that you have copied at the first step.

REMOVE THE BRACKETS IN [UNIQUE ID] .. replace that whole thing with the profile ID you copied.

Step4: You can now see up to 40 photos of someone on a private profile. Enjoy.

[Note: Information via brettz, we haven't tested it ourselves. It is for informational purposes only and not intended to be used.]

Tuesday, September 15, 2009

Download Youtube videos by N number of methods

Hey people are you looking for the steps to download the VIDEO or AUDIO(mp3) from Youtube.
As there are n no. of method but i will like to describe two of most instant one.Here is the method:-

1) Download it online by Vixy.net

2) If you are using Mozilla Firefox Browser ,Click on the on the Tool>add on>get add on.
Then there search Easy You tube video down loader ,install it and you are ready to go, Now
next time you watch any video,audio on youtube all you just have to do is just click on a micro
tab in a shape of media type in the status bar of browser.Thatch it Ye pee...

Thursday, August 27, 2009

How to Bypass the BIOS password

The BIOS passwords can add an extra layer of security for desktop and laptop computers. They are used to either prevent a user from changing the BIOS settings or to prevent the PC from booting without a password. Unfortunately, BIOS passwords can also be a liability if a user forgets their password, or changes the password to intentionally lock out the corporate IT department. Sending the unit back to the manufacturer to have the BIOS reset can be expensive and is usually not covered in the warranty. Never fear, all is not lost. There are a few known backdoors and other tricks of the trade that can be used to bypass or reset the BIOS.

||:-  DISCLAIMER   -:||

This article is intended only for IT Professionals and systems administrators with experience servicing computer hardware. It is not intended for home users, hackers, or computer thieves attempting to Cr*ck the password on a stolen PC. Please do not attempt any of these procedures if you are unfamiliar with computer hardware, and please use this information responsibly. LabMice.net is not responsible for the use or misuse of this material, including loss of data, damage to hardware, or personal injury.



Before attempting to bypass the BIOS password on a computer, please take a minute to contact the hardware manufacturer support staff directly and ask for their recommended methods of bypassing the BIOS security. In the event the manufacturer cannot (or will not) help you, there are a number of methods that can be used to bypass or reset the BIOS password yourself. They include:

Using a manufacturers backdoor password to access the BIOS

Use password cracking software

Reset the CMOS using the jumpers or solder beads.

Removing the CMOS battery for at least 10 minutes

Overloading the keyboard buffer

Using a professional service

Please remember that most BIOS passwords do not protect the hard drive, so if you need to recover the data, simply remove the hard drive and install it in an identical system, or configure it as a slave drive in an existing system. The exception to this are laptops, especially IBM Thinkpads, which silently lock the hard drive if the supervisor password is enabled. If the supervisor password is reset without resetting the and hard drive as well, you will be unable to access the data on the drive.


||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||

Backdoor passwords

Many BIOS manufacturers have provided backdoor passwords that can be used to access the BIOS setup in the event you have lost your password. These passwords are case sensitive, so you may wish to try a variety of combinations. Keep in mind that the key associated to "_" in the US keyboard corresponds to "?" in some European keyboards. Laptops typically have better BIOS security than desktop systems, and we are not aware of any backdoor passwords that will work with name brand laptops.

WARNING: Some BIOS configurations will lock you out of the system completely if you type in an incorrect password more than 3 times. Read your manufacturers documentation for the BIOS setting before you begin typing in passwords

Award BIOS backdoor passwords:

ALFAROME ALLy aLLy aLLY ALLY aPAf _award AWARD_SW AWARD?SW AWARD SW AWARD PW AWKWARD awkward BIOSTAR CONCAT CONDO Condo d8on djonet HLT J64 J256 J262 j332 j322 KDD Lkwpeter LKWPETER PINT pint SER SKY_FOX SYXZ syxz shift + syxz TTPTHA ZAAADA ZBAAACA ZJAAADC 01322222
589589 589721 595595 598598

AMI BIOS backdoor passwords:

AMI AAAMMMIII BIOS PASSWORD HEWITT RAND AMI?SW AMI_SW LKWPETER A.M.I. CONDO

PHOENIX BIOS backdoor passwords:

phoenix, PHOENIX, CMOS, BIOS

MISC. COMMON PASSWORDS

ALFAROME BIOSTAR biostar biosstar CMOS cmos LKWPETER lkwpeter setup SETUP Syxz Wodj

OTHER BIOS PASSWORDS BY MANUFACTURER

Manufacturer Password
VOBIS & IBM merlin
Dell Dell
Biostar Biostar
Compaq Compaq
Enox xo11nE
Epox central
Freetech Posterie
IWill iwill
Jetway spooml
Packard Bell bell9
QDI QDI
Siemens SKY_FOX
TMC BIGO
Toshiba Toshiba

TOSHIBA BIOS

Most Toshiba laptops and some desktop systems will bypass the BIOS password if the left shift key is held down during boot

IBM APTIVA BIOS

Press both mouse buttons repeatedly during the boot


|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||

Password cracking software

The following software can be used to either Cr*ck or reset the BIOS on many chipsets. If your PC is locked with a BIOS administrator password that will not allow access to the floppy drive, these utilities may not work. Also, since these utilities do not come from the manufacturer, use them cautiously and at your own risk.

Cmos password recovery tools 3.1
!BIOS (get the how-to article)
RemPass
KILLCMOS

||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||

Using the Motherboard "Clear CMOS" Jumper or Dipswitch settings

Many motherboards feature a set of jumpers or dipswitches that will clear the CMOS and wipe all of the custom settings including BIOS passwords. The locations of these jumpers / dipswitches will vary depending on the motherboard manufacturer and ideally you should always refer to the motherboard or computer manufacturers documentation. If the documentation is unavailable, the jumpers/dipswitches can sometimes be found along the edge of the motherboard, next to the CMOS battery, or near the processor. Some manufacturers may label the jumper / dipswitch CLEAR - CLEAR CMOS - CLR - CLRPWD - PASSWD - PASSWORD - PWD. On laptop computers, the dipswitches are usually found under the keyboard or within a compartment at the bottom of the laptop.
Please remember to unplug your PC and use a grounding strip before reaching into your PC and touching the motherboard. Once you locate and rest the jumper switches, turn the computer on and check if the password has been cleared. If it has, turn the computer off and return the jumpers or dipswitches to its original position.


|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||

Removing the CMOS Battery


The CMOS settings on most systems are buffered by a small battery that is attached to the motherboard. (It looks like a small watch battery). If you unplug the PC and remove the battery for 10-15 minutes, the CMOS may reset itself and the password should be blank. (Along with any other machine specific settings, so be sure you are familiar with manually reconfiguring the BIOS settings before you do this.) Some manufacturers backup the power to the CMOS chipset by using a capacitor, so if your first attempt fails, leave the battery out (with the system unplugged) for at least 24 hours. Some batteries are actually soldered onto the motherboard making this task more difficult. Unsoldering the battery incorrectly may damage your motherboard and other components, so please don't attempt this if you are inexperienced. Another option may be to remove the CMOS chip from the motherboard for a period of time.
Note: Removing the battery to reset the CMOS will not work for all PC's, and almost all of the newer laptops store their BIOS passwords in a manner which does not require continuous power, so removing the CMOS battery may not work at all. IBM Thinkpad laptops lock the hard drive as well as the BIOS when the supervisor password is set. If you reset the BIOS password, but cannot reset the hard drive password, you may not be able to access the drive and it will remain locked, even if you place it in a new laptop. IBM Thinkpads have special jumper switches on the motherboard, and these should be used to reset the system.


||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||

Overloading the KeyBoard Buffer

On some older computer systems, you can force the CMOS to enter its setup screen on boot by overloading the keyboard buffer. This can be done by booting with the keyboard or mouse unattached to the systems, or on some systems by hitting the ESC key over 100 times in rapid succession.


|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||

Jumping the Solder Beads on the CMOS

It is also possible to reset the CMOS by connecting or "jumping" specific solder beads on the chipset. There are too many chipsets to do a breakdown of which points to jump on individual chipsets, and the location of these solder beads can vary by manufacturer, so please check your computer and motherboard documentation for details. This technique is not recommended for the inexperienced and should be only be used as a "last ditch" effort.

How to turn your USB into password recovering tool

Hello ppl this is a simple PDF that has a tutorial on how to turn your USB drive into a password recovering hacking weapon. I have just set it up by myself, and it works perfectly.So Enjoy !!*_*

Download

(For Education Purpose Only)

Sunday, August 23, 2009

What is the meaning of Trojans

Introduction to Trojans for Newbees
Written by Voxelite

I was thinking about trojans on the other day, I realized that most people do not know how they work, or even how to use them. So I decided to make this quick intro.
                    Trojans work by using a client-server structure. This structure has two components, yes, you guessed it, they're called the client and the server. the client is usually the one that works as a control panel for your victims. The server is the little .exe file that you try to get people to download and execute. Back in the day, trojans were pretty simple. Someone downloaded the server, and you connected to their computer via the client. Then you messed around, keylogged them, made them into a proxy, etc. This method worked because back then, most people did not have routers, and did not have firewalls. These days, practically everyone has both. This really upset the trojan people, because routers can screw up communication between the client and server, and firewalls will reject any incoming connections. Because of this, you couldn't connect to your victims! All hope was lost, or so it seemed...

One day, some bright programmer came up with the idea of having the victim connect to you! This solved all of the problems (except hte routers, which I'll get to in a second), and made it easier to see how many people you had infected. This method has a name. It's called reverse-connect. Reverse connect makes your computer act like a hub, and all the victims send a connection out from their computers, and to yours. You can't just automatically get a trojan and start going though. That's because of hte routers, and how networks and IP's usually work these days. Routers often have a firewall inside them, and will also turn away any incoming connections. That's why you have to open a port on the router, to let the connection through. But it doesn't end there. You also have to have a static LAN IP. These days, LAN's work via DHCP. DHCP makes it so there's a pool of LAN IP addresses, and whenever your computer comes on, it just grabs a random address and starts going. This is a problem, because you may shut down, and then the previously working connection has no idea where to go! It gets lost, and your hard-earned victims are lost too. Therefore, you have to configure your router so that it reserves one LAN IP address just for you, whether your computer is off or on. This is called a static IP, btw. But we're not done yet, because the same dynamic IP problem applies to your WAN IP! It changes sometimes monthly, weekly, or even daily! Then your bots would be truly lost... But there is a way to fix this! It's called No-IP. No-IP is a type of service (almost always free, and there's many providers) that lets you register a domain name that you tell victims to connect to when you build the server. the victims connect to the domain name, and No-IP forwards that connection to your current WAN IP. You use software that comes with the No-IP account to constantly update your WAN IP. So everything works fine.

There are a few problems with trojans though. First of all, you're hosting the victims off your own computer and your own connection, which can get you easily screwed, and second of all, most No-IP type services have caught onto this practice, and disable your account the moment they see trojan-like connections. I used to use trojans a long time ago, and back then we were always on the hunt for No-IP sites that didn't disable your account. I looked into some of my old files, and found two sites that are worth mentioning:

Code: Select All

opendns.be

yi.org


From what I remember, the second one usuallly worked well, and didn't disable your account. If neither of these work, you'll have to go on the hunt, and find a new one. Trojans are a bit skiddie-ish, and can be tough to get going, but once you do, the fun never ends. 

How to find IP address from Yahoo Messenger chat

Sharp IP Getter is an application that has a purpose to find Internet Protocol of Yahoo Messenger through Instant Message Service. Whenever you chat with people in Yahoo Messenger Private Message or Instant Message, Sharp IP Getter will help you to find the real IP address of the current people or user that being chat with you. Sharp IP (Internet Protocol) Getter was developed and created by Www.Sharp-Soft.Net

How to find IP address from Yahoo Messenger chat? How to find ip address of a person in yahoo messenger? how to get ip in yahoo messenger? how to find ip address from instant message in yahoo messenger?. Those all questions might be ask from people who wanna know how to get ip address from yahoo messenger.

Actually there is a simple steps using command prompt windows to find ip address from chat in yahoo messenger, but this is not the good time We give you that such ways, to get ip of Y!M, because without that steps, with Sharp IP Getter you already knew how to look for the IP address of a user or people in yahoo messenger.

How to use Sharp IP Getter

Just run the software and instantly you will see a list of IP address in the software. That IP address should be the one / people who chat with you. If you are unable to see the IP, make sure you send a file or image aka photo to the target and the IP address of the target will rise at Sharp IP Getter.

Download Sharp IP Getter


How to bypass the Rapidshare time limit

Well well well the rapidshare time limit is a annoying thing. It is a little bitch I must admit. Here is a quick tutorial on how to bypass the limit.

1. Find your rapidshare file
2. Click "Free User"
3. Once you see Rapidshare Counter counting down, Go to your browser bar and enter 
Code: Select All
javascript:alert(c=0)
4. Your done

Troubleshooting

Q: Why do I keep getting "Javascript must be enabled"

A: Just refresh the page

so,just in case if your Internet provider gives you a static ip,that remain same all the time then what? 

The answer is use Rapidshare Leeacher,it actually gives you the premium link of that file eg:-

rapid8.com

Reverse MD4 Hashes to crack servers

Are you sick of these cracking servers,hunn

Today i bring you a script (Pearl one ) to reverse the MD4 Hashes.

use Digest::MD4 'md4_hex';
 
my $goal = '00000000000000000000000000000000'; # hash to find
my @chars = ( a..z, 0..9 ); # characters to use
my $minlen = 1; # minimum length of string
my $maxlen = 8; # maximum length of string
 
for ( $minlen..$maxlen ) {
 print 'Length: ', $_, "\n";
 &checkStrings($_);
}
 
sub checkStrings {
 my ( $n, $s ) = ( (shift) - 1, shift );
 for ( @chars ) {
  if ( $n ) {
  checkStrings($n, $s . $_ );
  } else {
  print $s, $_, "\n" if md4_hex( $s . $_ ) eq $goal;

 

You change the 0's with your hash and launch it !!!
And to get this script to work you'll need perl + this library installed .

Download Library here

STRICTLY WARNING - Use it at ur own Risk.(Educational purpose only)

Counter strike source hacks latest and 100% working tested

So you’d like to know which Aimbots are working for Counter-Strike right now? Right, they even work when going through Steam. Check out this list:

■     Aimbot
■    Aimdraw
■    Aimheight
■    Aimrange
■    Aimkey
■    TeamESP
■    VisibleESP
■    NameESP
■    DistanceESP
■    WeaponESP
■    Wallhack
■    Noflash
■    Nightmode
■    Whitewalls
■    ColorSmoke
■    Lambert
■    Speedhack
■    Speedvalue
■    Speedkey
■    Weaponglow
■    Crosshair
■    Thirdperson
■    CleanScreenshot
  

Wireless Hacking application at High Speed guranteed


1) Unzip and install Commview, then paste the included "cv.exe" to the directory you installed it to (c:\program files\commviewwifi)

2) Open commview and install the commview drivers to a card. It should prompt you about your card and than automatically install the driver. It is important that you have 1 card that works with commview or else the rest of the tutorial will not work

3)now go to the "rules" tab and check "enable advanced rules"

4)type in the box labled formula "tods=1 and dmac=FF:FF:FF:FF:FF:FF" then type a name for your formula in the box labled name and than click add/edit.

5)it should now appear in the upper box. if it is not checked, check it.

6)now click settings>options>memory usage and turn maximum packets in buffer to 20000 (max). If it prompts you to restart it, do so. There are three funnel looking things on the main menu bar of commview. uncheck all but the first one (one labled "capture data packets")

7) now click the play button and scan for the network you want to crack.

8)once you have found it, drag the channel menu down to the desired channel and click capture.

9) now using your other adapter thats not capturing, connect to the password protected network. when it asks you for key, type in something random, i used 1234567890.

10) it should now say connected with limited connectivity. (same as being associated!!)

11)go back to your commview menu and click on the packets tab. you should see a couple of packets.

12) looking at the protocol column, you should see a couple labled IP/UDP, ARP REQ, and a couple of others. Right click on any packet labled "ARP REQ" and than click send packet, and selected. A mini menu should now appear.

13) on the mini menu, change packets per second to 2000, and rather than 1 time(s), click continuously, and Then click send.

14) now go back to the main commview window and go to the rules tab, and uncheck the rule you made.

15) You are now injecting and you should see the number of packets rising really fast

16)to save the packets, you have to save every 20000 packets, click file, save and than in the save dialogue, remember where you saved it, and instead of saving it as an ncf file, save it as a "dump" .cap file.

17) Extract the Aircrack-NG folder.

18)open aircrack-ng-GUI that can be found in the map "bin" and select the files you saved, and than click launch.

19)Look at the list of IV's you have, and select the network you want to crack , there should be a list of alot of them, chose the one with the most ivs.

Download Link 

Password

Warning:- For Education purpose & self use only.Do it @ ur own risk.