What Is a MAC Address

2 comments
EXPLAIN The Media Access Control address (MAC address) is a unique identifier assigned to most network adapters or network interface cards (NICs) by the manufacturer for identification, and used in the Media Access Control protocol sublayer. If assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification number. It may also be known as an Ethernet Hardware Address (EHA), hardware address, adapter ...
Continue reading →

How to Make Invisible Password Protected Folder

0 comments
Do you want to password protect your folder? Do you want to make it invisible so that it remains unnoticed by the normal users? Well here is a way to do that. In this post I will show you how to make a password protected folder in Windows without using any additional software. Here is is step by step procedure to create a password protected folder. How to create a Password Protected Folder Step-1: Create a new folder (Right-click -> ...
Continue reading →

Folder Lock Console Edition v6.1.2

0 comments
The program is designed to password protect folders, files, removable media and USB CD / DVD drives. Files and folders are put in a safe, password-protected and can not be deleted or changed. The program is very easy to use. Once the vehicle is connected to a computer (even if it is not installed Folder Lock), a window with which you will need to enter your password.Encrypt can even entire hard drives, CD / DVD-ROMs and USB-storage. Install ...
Continue reading →

How to protect your internet bank account from hacker thieves

0 comments
How to protect your internet bank account from hacker thieves     Home PCs which are used for internet surfing and e-mail need to be protected against computer viruses and spy software, experts say. Anti-virus packages are available from computer stores. Anti-spy packages are available off the internet - do a search for "anti-spy software". Both anti-virus and anti-spyware packages need to be updated weekly, or each time you use e-mail ...
Continue reading →

hacking into bank account [only for knowledge]

0 comments
  Hacking into a bank account is frighteningly easy. All one needs is a rudimentary know-ledge of computers, spy software easily downloaded from the internet and a vulnerable PC. Computer programs that can spy on websites and e-mails are readily available - free of charge - via the worldwide web. Experts say the hackers who allegedly stole R530 000 by hacking 10 Absa clients' bank accounts could easily have downloaded everything they needed ...
Continue reading →

full version internet download manager (idm)

0 comments
  after installing click on patch file and restart your browser.. DOWNLOAD FROM HERE... ...
Continue reading →

Vista/XP Virtual Desktops

0 comments
Here are some key features of "Vista XP Virtual Desktops": · An infinite number of desktops only limited by the amount of memory in your computer · A full screen desktop/window manager/switcher · Live Vista thumbnails of all of your windows · An alpha-blended indicator window to provide a visual indicator when you switch between desktops · Hotkeys for up to 9 desktops using your numpad keys along with "send window to desktop" hotkeys · A system ...
Continue reading →

GOOGLE WAVE INVITATIONS

0 comments
Google Wave is one of the most exciting technology product of this year that is expected to create ripples over the internet. Google Wave is basically a communication tool that allows collaboration in real time to combine the experiences of email, web, chat, blog, wikis and social networking. Google today announced that they are sending invitation to 1,00,000 early adopters who are interested in the riding the Wave. If you want to be the ...
Continue reading →

INSTALLING XP IN 10 MINUTES

0 comments
INSTALLING XP IN 10 MINUTES! STEP1 : After the Copy Part is Over ... System is Rebooted as we all know In general Foramatting Procedure... Now After Reboot The Below Image Will Appear.... STEP 2: Now As This Image APPEARS You Have to Press  "Shift + F10 "  . This Will Open The command Prompt...  Now type  taskmgr  in it. This will open the Task manager . STEP 3 : After The task Manager Opens Goto Processes ... And Find ...
Continue reading →

Top Viruses of 2009 : Based on Ranking

0 comments
Top Viruses of 2009 : Based on Ranking Rank 1: Win32/Conficker This virus is a network worm and exploits the RPC sub-system vulnerability present in the Microsoft Windows operating system, allowing an attacker to remotely attack a computer without valid user credentials. Win32/Conficker infects the computer using unsecured folders, removable medium or by making use of Autorun facility enabled by default in windows. This threat contacts other domain ...
Continue reading →

find who is invisible on gmail or gtalk

0 comments
Step 1. Set the target user as off the record while he/she is online. This can be done by simply clicking on the option in the chat window. Step 2. Try sending an IM when he/she is invisible or offline. If he/she is invisible he/she will receive message. If he/she is offline you will receive an error “did not receive your chat”. This hack will only work if you mark the target user as off record when he/she is online. It is a limitation. How ...
Continue reading →

some computer tricks

0 comments
This is a complimation of computer tricks, mainly security and privacy related.Getting Ip’s:–To see the ip all computers you are connected to (web servers, people attempting to hack into your computer). Go to dos (start>run>type command) and run the netstat command. Type netstat /? for details. Type netstat -r at the command prompt to see the ip of all computers you are connected toIn MSN (and other programs) when you are chatting to someone everything you type goes through the MSN servers first (they act as a proxy) so you see their ip rather than who you are chatting to. You can ...
Continue reading →

how internet works?

0 comments
click on image This article is about the public worldwide computer network system. For other uses, see Internet (disambiguation). Visualization of the various routes through portion of the Internet The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private and public, academic, ...
Continue reading →

LEAVE YOUR REQUEST FOR SOFTWARES

0 comments
LEAVE YOUR SOFTWARE REQUEST IN COMMENT BOX WITH YOUR EMAIL ADDRESS I WILL EMAIL YOU THE LINK OF THE SOFTWA ...
Continue reading →

Cannot Access Regedit, How to Fix It?

0 comments
Cannot Access Regedit, How to Fix It? First we'll begin with the method that appears to work the best. Method 1 - Enabling the Registry with VBScript Doug Knox, a Microsoft Most Valuable Professional, has created a VBScript that enables or disables the Registry Editor based on the following location in the registry. Of course, since the registry editor is disabled, you can't change it manually, so Doug wrote a Visual Basic Script to accomplish ...
Continue reading →

EARN MONEY ONLINE FREE ITS TRUE NOT FAKE

0 comments
Earn money online by just clicking click on the pic to join this site its good check this pic this amount is earned my me CLICK HE ...
Continue reading →

END OF THE INTERNET IN 2012 ITS TRUE....

0 comments
According to research that's supposed to be published later this year, growing demand for Internet use will soon outstrip the stamina of the infrastructure supporting it, and the Internet will cease to be reliable by 2012. Complete anarchy will ensue, and the world will essentially end along with the Internet we created for it. Perhaps this is what the Mayan prophecies meant? Reasoning from a Respected 'Think-Tank' Despite tens of billions of ...
Continue reading →

USE USB AS A KEY TO START WINDOWS

0 comments
Most of us are concerned about the security and privacy of our data. We put login passwords, encrypt data and do various other tricks to ensure that someone cannot access our system without our authorization. Hardware manufacturers have also started exploiting our desire for data security by offering fingerprint readers, face recognition and other fancy stuff. If you are paranoid about who accesses your system, you can use a simple trick to prevent ...
Continue reading →

mac os on pc

0 comments
Want to use the glamorous Mac OSX?  Don’t have money to buy a Mac?  That’s okay because a new guide has been released that will allow you to install Leopard version 10.5.1 in a single step to your PC. You will have to meet some very specific hardware requirements, non-Core Intel processors are not supported (meaning anything in the Pentium line), Core Duo or Core 2 Duo processors are required.  AMD processors are not supported ...
Continue reading →

Run Mac OS X on a PCn windows platform

0 comments
Run Mac OS X on a PCby NISHANT SRIVASTAVA People have long wanted to run the Mac OS operating system on PC hardware, specifically on Intel and AMD architectures. But despite pleas and prayers, that wish remains unfulfilled. Although running Mac OS natively on PC hardware is not possible, there is another option--running Mac OS X on an emulator. In this article, I will show you how to install and run Mac OS X Panther on your PC using PearPC, ...
Continue reading →

legal notice at start up

0 comments
If your PC has multiple users then you can now display legal notice to every user before they login to your PC. This legal notice will be displayed at every startup just before the Desktop is loaded. Using this you can tell your friends about the do’s and dont’s in your computer when they login in your absence. Well you can do this pretty easily. For this there is one small registry hack. Here is the step-by-step instruction to do ...
Continue reading →

TOP 15 SOFTWARES FOR WINDOWS

0 comments
The hard drive received a full format, Windows XP/Vista/7 has finished installing, and now it’s time to decide what to install next. Whatever you do, don’t allow that PC to touch the Internet before finishing it off with the most important updates and applications.Friends sometimes ask me what software they should install on their PC. So i am posting some important software list here. For best results, install these freebies before you install any other applications : 1- Keep viruses away with Avira Antivirus. [download ] First things first. One of the best software to install for a newly bought ...
Continue reading →

TECHNIQUES BEHIND PHISHING ATTACK

0 comments
!-- Is your Spouse Cheating? Catch a Cheating Spouse Red-Handed! Access Any PC from Anywhere. Spy on Any Email to Find Out the Truth! Award Winning Remote PC Surveillance Software. Want to Learn Hacking? ...But Don't Know Where to Start? Learn Underground Hacker Techniques from the Basics. Become One with the Hackers. Start Your Journey Today! --> !-- internet advertising--> ...
Continue reading →

CD ROM PRANK VERY COOL

0 comments
First of all let me clearify that all these pranks which i m goin to post here are not any hacking or sumwhat like that... so be relax now what r these.. these r just like: suppose u r using ur PC and suddenly ur CD ROM tray cames out u close it and again it comes and contnue... wont u be scared?? but its nothing to be scared its just a pranky script.. OKies i will regularly be posting such tpe of scripts and also mentioning there effect.. one more thing. how to stop all these pranks??? just SHIFT + DELETE or Ctrl + Altr + delete and close the program or u can restart ur computer.. lets ...
Continue reading →

SET DOUBLE PASSWORD EASY TRICK

0 comments
Strong passwords should have a significant length and cannot contain normal words. Only random digits and letters of different case. Such passwords are extremely hard to remember and it takes time to enter. But, even strong passwords have their weaknesses. When you type a password, it can be intercepted by a spy program that logs all your keystrokes. Others can see what you type (even if the password field on the screen is masked, the ...
Continue reading →

I HACK MANAY PASSWORD

0 comments
I HACK MANAY PASSWORD USING THIS WONDERFUL TOOL ITS VERY EASY TO HACK SOME ONE Ardamax keylogger is now very old keylogger and usually detected by most antiviruses. Though old, it is still one of most used Keyloggers. We can use Binders and Crypters to make Ardamax keylogger FUD (Fully UnDetectable). So, I will inform you about Ardamax Keylogger install and use in this article. I have provided link for software download.... just read on. ~~Step ...
Continue reading →
Recommend on Google
 
Copyright 2012 | Design by: Nishant Srivastava
About | Contact | Write For Us | Archive