Pages

Saturday 8 October 2011

Airtel Free 3g Tricks



This trick will work on both high and low balance and high speed assured.
APN- airtelgprs.com

PROXY- 80.239.242.112

PORT:- 80 


Open any handler

Http server- http://0.facebook.com

SOCKET Server- http://0.facebook.com

PROXY TYPE :- HTTP
PROXY SERVER:- 0.facebook.com

Trick for nimbuzz

1ST DOWNLOAD NIMBUZZ HANDLER

NOW IN NIMBUZZ HANDLER MENU JUST PUT BACK QUERY


?0.facebook.com/?zout

NOW ITS WORKING WITH mo Settings

UPDATED FOR UCWEB HANDLER ON DEMAND GSTEKIES

HERE IS THE LATEST BACK QUERY FOR UCWEB,OPERA & BOLT ALSO WORKING WITH GREAT SPEED

?id=203.145.131.9
Comment Here IF Working For YoU...........

System Intrusion in 15 Seconds


System intrusion in 15 seconds, that’s right it can be done. If you possess certain security flaws your system can be broken into in less that 15 seconds.

To begin this I’d like you to do the following. Connect to the Internet using your dial up account if you are on dial up. If you are on dedicated service like High Speed connections (ie, Cable and DSL) then just proceed with the steps below.

• Click Start

• Go to Run

• Click Run (It’s a step by step manual) :-)

• Type Winipcfg

• Hit the Enter Key

This should bring up a window that looks like the following 





* For editorial reason the above info has been omitted *

What you should see under IP address is a number that looks something like this.
207.175.1.1 (The number will be different.)

If you use Dial Up Internet Access then you will find your IP address under PPP adapter. If you have dedicated access you will find your IP address under another adapter name like (PCI Busmaster, SMC Adapter, etc.) You can see a list by clicking on the down arrow.


Once you have the IP address write it down, then close that window by clicking (OK) and do the following.

• Click Start
• Go to Run (Click on Run)
• Type command then Click OK

At this point you should see a screen that looks like this.


Type the following at the Dos Prompt

• Nbtstat –A IP address
For example: nbtstat –A 207.175.1.1
(Please note that you must type the A in capitol letters.)

This will give you a read out that looks like this NetBIOS Remote Machine Name Table
____________________________________
Name Type Status
-------------------------------------------
J-1                  <00>           UNIQUE Registered
WORK           <00>           GROUP Registered
J-1                  <03>           UNIQUE Registered
J-1                  <20>           UNIQUE Registered
WORK           <1E>           GROUP Registered
WORK           <1D>           UNIQUE Registered
MSBROWSE__.<01>         GROUP Registered
________________________________________

(Again info has been omitted due to privacy reasons)

The numbers in the <> are hex code values. What we are interested in is the “Hex Code” number of <20>. If you do not see a hex code of <20> in the list that’s a good thing. If you do
have a hex code <20> then you may have cause for concern. Now you’re probably confused about this so I’ll explain.

A hex code of <20> means you have file and printer sharing turned on. This is how a “hacker” would check to see if you have “file and printer sharing” turned on. If he/she becomes aware of the fact that you do have “file and printer sharing” turned on then they would proceed to attempt to gain access to your system.

(Note: To exit out of the DOS prompt Window, Type Exit and hit Enter)

I’ll show you now how that information can be used to gain access to your system.
A potential hacker would do a scan on a range of IP address for systems with “File and Printer Sharing” turned on. Once they have encountered a system with sharing turned on the next step
would be to find out what is being shared.

This is how:

Net view \\

Our potential hacker would then get a response that looks something like this.

Shared resources at \\ip_address

Sharename                 Type               Comment
----------------------------------------------------------------------------------------------
MY DOCUMENTS                           Disk
TEMP                                               Disk

The command was completed successfully.

This shows the hacker that his potential victim has their My Documents Folder shared and their Temp directory shared. For the hacker to then get access to those folders his next command
will be.

Net use x: \\\temp

If all goes well for the hacker, he/she will then get a response of

(The command was completed successfully.)

At this point the hacker now has access to the TEMP directory ofhis victim.

Q. The approximate time it takes for the average hacker to do this attack?
R. 15 seconds or less.

Not a lot of time to gain access to your machine is it? How many of you had “File and Printer Sharing” turned on?

Ladies and Gentlemen: This is called a Netbios attack. If you are running a home network then the chances are you have file and printer sharing turned on. This may not be the case for all of you
but I’m sure there is quite a number of you who probably do. If you are sharing resources please password protect the directories.

Any shared directory you have on your system within your network will have a hand holding the folder. Which looks like this.


You can check to find which folders are shared through Windows Explorer.

• Click On Start
• Scroll Up to Programs

At this point you will see a listing of all the different programs on your system

Find Windows Explorer and look for any folders that look like the above picture.

Once you have found those folders password protect them. Don’t worry I’ll show you how to accomplish this in Chapter 8 in a visual step by step instruction format.

Netbios is one of the older forms of system attacks that occur. It is usually overlooked because most systems are protected against it. Recently there has been an increase of Netbios Attacks.

Further on in this manual we shall cover some prevention methods. For now I wish only to show you the potential security flaws.
Friday 7 October 2011

Steve Jobs dies: Apple chief created personal computer, iPad, iPod, iPhone



igital Driver who made computing personal is no more...





Mr. Steve Jobs, 56 iconic co-founder of apple passes away.

Technology alone is not enough ,its technology married with liberal arts, married with humanities,that yields the results that make our hearts sing.

Steve Jobs launched apple with his friend Steve Wozniak in 1976.

Died Peacefully surrounded by his family.

Apple in tribute said - Lost a creative and visionary genius and the world had lost an amazing human being.

Barack Obama statement- Steve Jobs as among the greatest of american innovators - brave enough to think differently,bold enough to believe he could change the world and talented enough to do it.

Bill Gates , co -founder of Microsoft said in a statement - " FOR THOSE OF US LUCKY ENOUGH TO GET TO WORK WITH STEVE"
Its been an insanely great honor and will miss steve immensely.

WE ALL MISS YOU SIR...

Thursday 6 October 2011

How To Clear Recent Documents in the XP Start Menu



Nobody is asking why you want to clear the recent documents from your XP start menu, but we’ll show you how to do it anyway.
Right click the start menu icon and select Properties. Click the Start Menu tab and click on Customize.
In the Customize Start Menu window click on the Advanced tab.
Now you have two options:
1) Click the Clear List button to just clear the recent documents.
2) Uncheck the “List my most recently opened documents” box to make the entire feature go away.
Keep Visiting frendsss

    How to download all files of a website



    Hello Friends! Sometimes, we wish to download all file of any website like Audio, Video, Images, CSS etc. This is very helpful for web developers. This trick extract all the links of website and give option to download every file. 

     There are many files options that you can download from it.

    • All Files
    •  Music
    •  Movies
    •  Links
    • Applications
    • Objects
    • Style Sheets
    • Images

    How to Download 


    • Enter the victim website Url like in the image below .:

    file2hd

    • Now simply Choose the Category as mentioned like this

    • Remember to choose I accept Terms and Now simply Click get Files.

    I hope this is useful for you.
    Keep Visiting. 

    Free Download Windows 8 First On net !!!


    Hi! Friends as we know that Microsoft Windows 8 Home Premium is yet to release, we all know that Microsoft already launched its developer version and people are already in search for its beta and Windows 8 Home Premium Version.As promised earlier today at the Build Conference,The developer preview is up for grabs now on the newly launched Developer site.There are two kinds of builds available over the Developer site.First is with Developer tools and a 64 Bit version while the other version is Without the Developer tools in 32 bit as well as 64 bit version.


    Some features of it:-

    • New Home Screen
    windows 8 home premium
    • Latest onscreen keyboard
    • Talking Applications 
    • Instant Search
    • Best Multitasking
    • New Task manager

    Windows Developer Preview English, 64-bit (x64)


    Includes a disk image file (.iso) to install the Windows Developer Preview and Metro style apps on a 64-bit PC.

    Windows Developer Preview English, 32-bit (x86)

    Includes a disk image file (.iso) to install the Windows Developer Preview and Metro style apps on a 32-bit PC.
    Download Now


    So,friends don't forget to express your views on Windows 8 by posting comments below.
    Open Cbox