What Is a MAC Address

2 comments
EXPLAIN




The Media Access Control address (MAC address) is a unique identifier assigned to most network adapters or network interface cards (NICs) by the manufacturer for identification, and used in the Media Access Control protocol sublayer. If assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification number. It may also be known as an Ethernet Hardware Address (EHA), hardware address, adapter address, or physical address.
They uniquely identify an adapter on a LAN. MAC addresses are 12-digit hexadecimal numbers (48 bits in length). By convention, MAC addresses are usually written in one of the following two formats:
MM:MM:MM:SS:SS:SS
MM-MM-MM-SS-SS-SS
The first half of a MAC address contains the ID number of the adapter manufacturer. These IDs are regulated by an Internet standards body (see sidebar). The second half of a MAC address represents the serial number assigned to the adapter by the manufacturer. In the example,
00:A0:C9:14:C8:29
The prefix 00A0C9 indicates the manufacturer is Intel Corporation.


Why MAC Addresses?
Recall that TCP/IP and other mainstream networking architectures generally adopt the OSI model. In this model, network functionality is subdivided into layers. MAC addresses function at the data link layer (layer 2 in the OSI model). They allow computers to uniquely identify themselves on a network at this relatively low level.
Continue reading →

How to Make Invisible Password Protected Folder

0 comments
Password-protected-folder
Do you want to password protect your folder? Do you want to make it invisible so that it remains unnoticed by the normal users? Well here is a way to do that. In this post I will show you how to make a password protected folder in Windows without using any additional software. Here is is step by step procedure to create a password protected folder.

How to create a Password Protected Folder
Step-1: Create a new folder (Right-click -> New -> Folder) and give it any name of your choice. For instance I name it as ABC.
Step-2: Now in this folder place all the important files, documents or any folders that you want to password protect.
Step-3: Now Right-click on this folder (ABC) and select the option Send To -> Compressed (zipped) Folder.
Step-4: Now a new compressed zipped folder gets created next this folder (ABC) with the same name.
Step-5: Double-click on this compressed zipped folder and you should see your original folder (ABC) here.
Step-6: Now goto the File menu and select the option Add a password.
ie: File -> Add a password
Now a small window will pop up and here you can set your desired password. Once the password is set, the folder will ask for the password every time it is opened. Thus you have now created the password protected folder.

How to make it Invisible
Step-1: Now Right-click on this password protected folder and select Properties.
Step-2: At the bottom select the option Hidden and press OK. Now your folder gets invisible (hidden).
Step-3: In order to unhide this folder go to My Computer – >Tools -> Folder options. Switch to View tab, scroll down and under Hidden files and folders you’ll see the following two options
  • Do not show hidden files and folders
  • Show hidden files and folders
Now select the second option and press OK. Now the invisible folder becomes visible in it’s location. To access it you need the password. To make it invisible again repeat step -1 through step-3 and select the first option and click OK. Now the folder becomes invisible once again.
Continue reading →

Folder Lock Console Edition v6.1.2

0 comments
 Folder Lock Console Edition v6.1.2

The program is designed to password protect folders, files, removable media and USB CD / DVD drives. Files and folders are put in a safe, password-protected and can not be deleted or changed. The program is very easy to use. Once the vehicle is connected to a computer (even if it is not installed Folder Lock), a window with which you will need to enter your password.Encrypt can even entire hard drives, CD / DVD-ROMs and USB-storage. Install the program and the master password file is moved to the window and there also will be zaparoleny and encrypted.

The program is designed to password protect folders, files, removable media and USB CD / DVD drives. Files and folders are put in a safe, password-protected and can not be deleted or changed. The program is very easy to use. Once the vehicle is connected to a computer (even if it is not installed Folder Lock), a window with which you will need to enter your password.
Encrypt can even entire hard drives, CD / DVD-ROMs and USB-storage. Install the program and the master password file is moved to the window and there also will be zaparoleny and encrypted.
Folder Lock allows you to protect certain files and folders in Windows Vista/2003/XP/2000/NT/Me/98/98S, concealing them, and thus makes inaccessible to prying eyes.

The file or folder that can be anything - even if, for example, 50 Gb. To access the hidden data is to start Folder Lock and enter the correct password.
Management of the program is very simple - is supported by the method of drag & drop.



Download from Uploading
or
Download from Hotfile
Continue reading →

How to protect your internet bank account from hacker thieves

0 comments
How to protect your internet bank account from hacker thieves

 http://media.cnbc.com/i/CNBC/Sections/News_And_Analysis/__Story_Inserts/graphics/__MARKET_CONCEPTS/chained_bank.jpg
 
Home PCs which are used for internet surfing and e-mail need to be protected against computer viruses and spy software, experts say. Anti-virus packages are available from computer stores. Anti-spy packages are available off the internet - do a search for "anti-spy software".
Both anti-virus and anti-spyware packages need to be updated weekly, or each time you use e-mail or internet.
Many of the anti-spyware packages will update themselves automatically when you log on to the web. But users of anti-virus software will have to update their package weekly via the software manufacturer's internet website.
Continue reading →

hacking into bank account [only for knowledge]

0 comments
 http://www.usfst.com/media/media-news/news-thumb/090827/hacker.jpg
Hacking into a bank account is frighteningly easy. All one needs is a rudimentary know-ledge of computers, spy software easily downloaded from the internet and a vulnerable PC.
Computer programs that can spy on websites and e-mails are readily available - free of charge - via the worldwide web.
Experts say the hackers who allegedly stole R530 000 by hacking 10 Absa clients' bank accounts could easily have downloaded everything they needed off the internet.
The hackers would have sent e-mails to clients who used Absa's internet banking.
The e-mails would have contained a type of computer virus called a Trojan horse, which downloads automatically as soon as the e-mail is opened or previewed.
Absa forensic investigators have learnt that this Trojan horse contained spy software that was programmed to report back to the hacker, giving away security codes such as passwords, account numbers and PINs.
The hackers then use the passwords and the account holders' home PCs - which are more vulnerable than most banks' computer systems - to access the money.
Johan Reynders, director of software designers ADS, said the hackers could have obtained the e-mail addresses by simply doing an internet search using the last part of the address - @freemail.absa.co.za.
They could even have used spy software which could give them the e-mail addresses of everyone who accessed a bank website.
They could then have sent out a mass mailing which included the Trojan horse, to get the required information.
According to computer network specialist Malcolm Schwegmann, at the last count there were 1 285 spy software servers on the worldwide web.
They might be illegal, but are difficult to police, Schwegmann said. The potential for havoc by spy software hidden in e-mails was enormous.
Spy software was also often transmitted during internet surfing without the computer user noticing it.
The Banking Council said yesterday that the "industry should seek a solution to the problem".
Sapa reports that Absa was to hold talks with its competitors today to discuss internet banking fraud.
The meeting was to take place at Absa's headquarters in Johannesburg at 8am and would last about an hour, Absa group information security officer Richard Peasy said.
Meanwhile, Banking Council spokeswoman Claire Gerbhardt-Mann advised bank customers to install the latest anti-virus applications on their computers, exercise control over shared folders, keep their PIN secret and to never disclose their PIN to anyone, including bank staff.
Schwegmann said that, in addition to anti-virus applications, home PC users should also download anti-spy software programs off the internet.
Both he and Reynders said that anti-virus packages alone were not enough to provide protection.
Absa spokesman Errol Smith said yesterday that there appeared to have been no new internet frauds on their bank accounts overnight, which is when most of the hacking appears to take place.
Bellville police spokesman Superintendent Riaan Pool said the investigation could take a while to complete.
"It's a very difficult and long investigation," he said.
"And we'll just have to wait."
Continue reading →

full version internet download manager (idm)

0 comments




2zjau6v.jpg image by downarchive2 

after installing click on patch file and restart your browser..


DOWNLOAD FROM HERE....
Continue reading →

Vista/XP Virtual Desktops

0 comments
Here are some key features of "Vista XP Virtual Desktops":
· An infinite number of desktops only limited by the amount of memory in your computer
· A full screen desktop/window manager/switcher
· Live Vista thumbnails of all of your windows
· An alpha-blended indicator window to provide a visual indicator when you switch between desktops
· Hotkeys for up to 9 desktops using your numpad keys along with "send window to desktop" hotkeys
· A system tray icon to access a menu containing items for every desktop, no matter how many
· Multiple-monitor support
· Arrow key hotkeys
· One system tray icon per desktop (optional)
· Window-specific menus
· Sticky windows to exclude windows from the virtual desktop manager
· Per-desktop backgrounds
· XP support
· Thumbnail window tool
· Show all windows hotkey
· Show mini-preview at cursor hotkey
source softpedia




Continue reading →

GOOGLE WAVE INVITATIONS

0 comments

google_wave_logo.jpg (300ร—300)
Google Wave is one of the most exciting technology product of this year that is expected to create ripples over the internet. Google Wave is basically a communication tool that allows collaboration in real time to combine the experiences of email, web, chat, blog, wikis and social networking.
Google today announced that they are sending invitation to 1,00,000 early adopters who are interested in the riding the Wave. If you want to be the one among those to have your hands on with Google, here is what you have to do

1. Sign up for Google Wave Account: Send a request to Google Wave team to get invitation by filling this form. Majority of the invitations sent by Google are from this list, so straight away fill the form to get invitation.
2. Ask Google Wave users to Invite you: Google Wave is following GMail style invitation model to allow new users. So if you know any of your friends who have access to Google Wave access, then ask them to invite you.


LEAVE YOUR EMAILS FOR INVITATIONS...
Continue reading →

INSTALLING XP IN 10 MINUTES

0 comments
INSTALLING XP IN 10 MINUTES!
STEP1 : After the Copy Part is Over ... System is Rebooted as we all know In general Foramatting Procedure...
Now After Reboot The Below Image Will Appear....


http://www.winsupersite.com/images/reviews/winxp_rc1_rev_01.gif
STEP 2: Now As This Image APPEARS You Have to Press  "Shift + F10 "  . This Will Open The command Prompt...  Now type  taskmgr  in it. This will open the Task manager .

STEP 3 : After The task Manager Opens Goto Processes ... And Find "Setup.exe"  process and Right CLICK on It.... and set the Priority to Highest....


STEP 4: Now Just Watch the Set It will take around 9 minutes and 2 minutes for Tolerance(depends System to system)....

Thats the Overall Tutorial...Hope You all Have LIKED IT...

So When you Format your PC Next Time It will Really Save Your TIME i.e around 20 to 25 minutes...
Continue reading →

Top Viruses of 2009 : Based on Ranking

0 comments

Top Viruses of 2009 : Based on Ranking

http://computerrepairmaintenance.com/images/computer-virus-picturejpg.jpg
Rank 1: Win32/Conficker
This virus is a network worm and exploits the RPC sub-system vulnerability present in the Microsoft Windows operating system, allowing an attacker to remotely attack a computer without valid user credentials. Win32/Conficker infects the computer using unsecured folders, removable medium or by making use of Autorun facility enabled by default in windows. This threat contacts other domain names to download additional malicious code.
To avoid this threat, end users must update their system with the patch already available since October.
Rank 2: INF/Autorun
This is the most common threat that infects a PC by creating an autorun.inf file. The file contains information about programs meant to run automatically when removable devices are connected to the computer. End users must disable the Autorun feature enabled by default in windows. Since, use of removable devices is very popular, you can clearly see the reason why this threat has a rank of 2.
Rank 3: Win32/PSW.OnLineGames
This threat belongs to a family of Trojans that is meant to cause harm to game players by stealing their user credentials and other personal or financial information. This information is then sent to the intruder’s PC. Game players must remain alert as this threat has been found in large volumes.
Rank 4: Win32/Agent
Win32/Agent is a major threat to several end users as it copies itself into the temporary locations and steals information from the infected PC. This malicious code adds entries into the registry, creating several files at different places in the system folder, allowing it to run on every startup. This way complete information is gathered about the infected PC and then transferred to the intruder’s PC. As a protection measure, use a good anti-malware, disable Autorun facility in windows and do not click or open any unknown files.
Rank 5: Win32/FlyStudio
This threat is designed to modify the settings of victim’s internet browser by modifying the search queries and directing the user to advertisements. This threat seems to target the people of China. However, its presence has been reported in other regions like North America. It seems that the malicious code has been deployed by another family of malwares.

Continue reading →

find who is invisible on gmail or gtalk

0 comments
gmail hack

Step 1.

Set the target user as off the record while he/she is online. This can be done by simply clicking on the option in the chat window.





Step 2.

Try sending an IM when he/she is invisible or offline.
If he/she is invisible he/she will receive message. If he/she is offline you will receive an error “did not receive your chat”.
This hack will only work if you mark the target user as off record when he/she is online. It is a limitation.

How does it work?
When the chat is off the record, it will no longer stored in the gmail account.
When you send IM to an invisible / offline user it will be delivered by default. At the receiving end the IM will receive as a pop in form of chat window if the user is invisible. If the user is offline it will receive as an email in the inbox.
The main problem with this hack is if the target user is using another email client or desktop version.
Continue reading →

some computer tricks

0 comments

This is a complimation of computer tricks, mainly security and privacy related.

Getting Ip’s:–

To see the ip all computers you are connected to (web servers, people attempting to hack into your computer). Go to dos (start>run>type command) and run the netstat command. Type netstat /? for details.

Type netstat -r at the command prompt to see the ip of all computers you are connected to

In MSN (and other programs) when you are chatting to someone everything you type goes through the MSN servers first (they act as a proxy) so you see their ip rather than who you are chatting to. You can get round this by sending them a file as MSN doesn’t send file through its proxy.When you type the netstat -r (or -a for a different view) the ip’s are under the foreign address table. The ports are seperated by a : . Different programs use different ports, so you can work out which ip’s are from which program.

Connecting to other computers and what ports are:–

Servers send information. Clients retrieve. Simple. Windows comes with a built in program to connect to other computers called telnet. To start Windows telnet Start menu> Run> type Telnet. Click connect> remote system Ports are doors into computers. Hosts are computer names (ip number or a name that is translated into the ip automatically) Different programs open different ports, but they always open the same ports so other computers know which port to connect to. You can get a port list listing all the different ports, but a basic one is: 11 :- Sends info on the computer 21 :- FTP (File transfer program) 23 :- Telnet (Login to the computers command line) 25 :- Smtp (Sends mail) 80 :- Http (Web pages) There are thousands of different programs using different ports. You can get programs called portscanners which check a computer for all ports up to a certain number, looking for ways in. You can portscan a computer looking for ways-in. Anyway, back to telnet. Type www.yahoo.com as the host and port as 80 the click connect. If nothing happens, you’re in. Wow. You are connected to Yahoo’s server. You can now type http commands (you are connected to an http server, so it supports http commands). Ie. on an ftp server you can type open and it will do something. On an http server it will just wonder what the hell you are on about. Type get / http/1.0 then press enter twice to get the file on the server at / (try /index.html) etc.)

Making undeletable, unreadable folders

Tested on Windows 95/98 By holding down alt, then typing numbers on the number pad (right of the keyboard) you can create special characters. If you hold down alt, then press 1, then let go, you got the ascii character 1. You try some randomn numbers. This goes all the way up to 255. Open a dos prompt, and type md (alt+1+9+4)someword. md is the dos command to make a directoy, now try and open the directory in Windows, you can’t. To open it, type ren (alt+1+9+4)someword someword (ren is the dos command to rename)

Proxies

Proxies are computers that you connect through, hiding your computer. Most aren’t anonymous, they give away your ip. Some are. Good anonymous proxies: mail.uraltelecom.ru:8080 and 194.247.87.4:8080.Different programs require different ways of using proxies. To do it in internet explorer 5 go to tools, internet options, connections, settings. In the above proxies they are in the format host:port

Password files

If you lock yourself out of Windows stuff, all passwords are stored in files called *.pwl in C:windows. In Unix, passwords are normally stored at etc/passwd. This can be viewed using the cat command (prints a file to screen): cat etc/passwd. Make sure you’re passwords are shadowed (not actually in etc/passwd). Also make sure they aren’t in a file called shadow, especically not in a file called etc/shadow.Unix passwords are encrypted far better than Windows one’s (to be fair, Windows 95 isn’t designed for users), but can still be cracked through a program called jon.
Continue reading →

how internet works?

0 comments

Visualization of the various routes through portion of the Internet
The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private and public, academic, business, and government networks of local to global scope that are linked by copper wires, fiber-optic cables, wireless connections, and other technologies. The Internet carries a vast array of information resources and services, most notably the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support electronic mail. In addition it supports popular services such as online chat, file transfer and file sharing, gaming, commerce, social networking, publishing, video on demand, and teleconferencing and telecommunications. Voice over Internet Protocol (VoIP) applications allow person-to-person communication via voice and video.
The origins of the Internet reach back to the 1960s when the United States funded research projects of its military agencies to build robust, fault-tolerant and distributed computer networks. This research and a period of civilian funding of a new U.S. backbone by the National Science Foundation spawned worldwide participation in the development of new networking technologies and led to the commercialization of an international network in the mid 1990s, and resulted in the following popularization of countless applications in virtually every aspect of modern human life. As of 2009, an estimated quarter of Earth's population uses the services of the Internet.
source(wikipedia)
Continue reading →

LEAVE YOUR REQUEST FOR SOFTWARES

0 comments




LEAVE YOUR SOFTWARE REQUEST IN COMMENT BOX WITH YOUR EMAIL ADDRESS I WILL EMAIL YOU THE LINK OF THE SOFTWARE
Continue reading →

Cannot Access Regedit, How to Fix It?

0 comments
Cannot Access Regedit, How to Fix It?


Registry Editing has been disabled by your administrator


First we'll begin with the method that appears to work the best.

Method 1 - Enabling the Registry with VBScript

Doug Knox, a Microsoft Most Valuable Professional, has created a VBScript that enables or disables the Registry Editor based on the following location in the registry. Of course, since the registry editor is disabled, you can't change it manually, so Doug wrote a Visual Basic Script to accomplish the task.

HKey_Current_User\Software\Microsoft\Windows\CurrentVersion\Policies\System\

Visit Doug's page and download Registry Tools VBScript to your desktop, double-click on it to run it, then reboot your computer and try to open the Registry Editor.

If this fix didn't solve your problem, try method two shown below.

Method 2:  Use Symantec's tool to reset shell\open\command registry keys

Sometimes worms and trojans will make changes to the shell\open\command registry entries as part of their infections. This will cause the virus to run each time you try to run an .exe file such as the Registry Editor. In these cases, visit Symantec's website and download the UnHookExec.inf file to your desktop. Right-click on it and choose Install. Restart your computer and then try to open the Registry Editor.


Method 3: Rename Regedit.com to Regedit.exe
Some viruses and other malware will load a regedit.com file that is many times a zero byte dummy file. Because .com files have preference over .exe files when executed if you type REGEDIT in the run line, it will run the regedit.com instead of the real regedit.exe file.

Delete the regedit.com file if its a zero byte file to restore access to REGEDIT. In some cases, such as the W32.Navidad worm, you'll need to rename the REGEDIT file to get it to work.



Method 4: Windows XP Professional and Group Policy Editor

If you have Windows XP Professional
and access to an administrative user account, you could change the registry editor options in the Group Policy Editor.

  1. Click Start, Run
  2. Type GPEDIT.MSC and Press Enter
  3. Go to the following location



    • User Configuration
    • Administrative Templates
    • System


  4. In the Settings Window, find the option for "Prevent Access to Registry Editing Tools" and double-click on it to change.
  5. Select Disabled or Not Configured and choose OK
  6. Close the Group Policy Editor and restart your computer
  7. Try opening REGEDIT again
Although there are a few other ways, the above ways I have used with great success in re-enabling the REGEDIT command. If you are interested in more ways to reactive the REGEDIT command, you may want to visit a site called Killian's Guide, that goes into more detail on a variety of ways to get the registry editor to work again.

Continue reading →

EARN MONEY ONLINE FREE ITS TRUE NOT FAKE

0 comments



Earn money online by just clicking
click on the pic to join this site its good check this pic this amount is earned my me



CLICK HERE
Continue reading →

END OF THE INTERNET IN 2012 ITS TRUE....

0 comments

According to research that's supposed to be published later this year, growing demand for Internet use will soon outstrip the stamina of the infrastructure supporting it, and the Internet will cease to be reliable by 2012. Complete anarchy will ensue, and the world will essentially end along with the Internet we created for it. Perhaps this is what the Mayan prophecies meant?

Reasoning from a Respected 'Think-Tank' Despite tens of billions of dollars spent on upgrades, expansions, and renovations on networks throughout the continents, it seems that this isn't enough to tide the hungry connected world at large. Aside from the high demand for entertainment such as YouTube, the demand for Internet service is growing at a rate of 60% every year. The statistic, which was drawn up by the University of Minnesota, didn't take into account the percentiles of India and China, comprising about a third of the world population.

According to experts at Nemertes Research, "a respected American think-tank," the Internet's existing infrastructure in 2012 will not be able to cope with the exceeding amount of bandwidth. It'll become overloaded and essentially... end. They predict that problems will already begin to show as early as next year, and they blame (specifically) YouTube, BBC's iPlayer, and the amounting crowd of people who are working from home, utilizing the Internet. It'll begin with users' Internet connections becoming nonfunctional for several minutes at a time, but within just a few short years, there're going to be vast brownouts where "PCs and laptops are likely to operate at a much reduced speed, rendering the internet an 'unreliable toy.'"

I thought laptops were PCs? And wait-- how does the speed of the Internet affect the speed of one's computer overall? Hmm, this writing sounds a bit naive to me. Reasoning from a Lowly, Humble Editor In my 'professional' opinion, this is about as worrisome on a worldwide scale as the swine flu is (scary, yes; going to kill tens of thousands or even thousands for that matter? I doubt it). The fact that the author of the original article seems to be under the impression, whether told by the interviewee from Nemertes Research or of his own genius, that personal computers themselves are somehow going to "jitter and freeze" of their own accord and then the Internet brownouts will occur, just triggers some defense in my mind-- a voice whispering the words "fouled up disinformation" perpetually. Perhaps I need to see my doctor about that.

The idea that the Internet is under a great strain is something I believe is true. More and more are people not only relying on the Internet for news, communication, income, and (mostly) entertainment, but they're becoming addicted to it, spending hours upon it every day, and using a high amount of bandwidth month to month. I can see the backbone of the Internet bowed in several years, with some minor outages in areas that haven't yet fully upgraded the infrastructure in lieu of demand, but I find it very unlikely that the Internet will one day permanently snap and become an un-fixable, unreliable mess with a mind of its own, sometimes working, usually not. I especially can't see myself hitting my head on my computer until it's a bloody mess because the mysterious 2012 Bug reduced my processor speed to an irreversible 133MHz, rendering it useless.

That's just me, though. What's your take on it? Is the Internet and civilization as we know it doomed for an ignominious death come 2012, or is this another Conficker Worm (knock on wood)? If you've any Armageddon Preparedness Plans, please list them below for the community to build upon.

When the Internet really does "break," I'll laugh as we slip into worldwide anarchy because we've been so connected for so long, and then you can send me hate mail for it-- assuming you have access to your email. We might have to resort to stamps again.

Continue reading →

USE USB AS A KEY TO START WINDOWS

0 comments
Most of us are concerned about the security and privacy of our data. We put login passwords, encrypt data and do various other tricks to ensure that someone cannot access our system without our authorization. Hardware manufacturers have also started exploiting our desire for data security by offering fingerprint readers, face recognition and other fancy stuff. If you are paranoid about who accesses your system, you can use a simple trick to prevent the system from booting unless you want it to boot.
This can be achieved by using a regular USB/pen/thumb drive (whatever you call it). Basically configure your system to boot windows from USB stick. The hack would be more than enough to keep even your curious geeky computer friends from booting into the system. That said, it is by no means foolproof (which security measure is? ) so you might not want to bet your life on it.
*** DISCLAIMER : the following method requires you to make some changes to your operating system. MakeUseOf cannot accept any legal liability if anything goes wrong with your PC and you should proceed at your own risk. Please read the instructions thoroughly before beginning and if you are still not sure what you are doing, you should seek help from a knowledgeable friend ***
A key requirement for the hack to work is that your system should support booting from a USB device. This can be verified from within the BIOS menu. So if you have an older system that doesn’t support booting from USB devices, this one is not for you. We will cook up something else! Although, now that I think about it, theoretically (because I have not tried) the hack should work with a floppy disk as well. So you guys with older systems can also follow along and let us know if it worked.
What we are going to do is transfer some of the important files (you will see which ones) that Windows needs in order to boot, to the USB drive. Now if someone was to boot up the PC without your USB drive the system won’t find these important files and will thus fail to boot.
So now that you know the concept, let’s get working:
  • Format the USB drive.
  • Within Windows Explorer go to Tools > Folder Options. Within the View tab, choose “Show hidden files” and uncheck “Hide protected operating system files”.
  • usb key lock computer
  • Open up the Windows Partition (usually C:), copy boot.ini, NTLDR and ntdetect.com onto your USB drive.
  • Boot up the system and change the boot order preference to check for a USB device first. You can access the BIOS menu generally by hitting F8 when the computer just starts.
Just in case you are curious, the boot.ini file is required to tell where the operating system resides. NTLDR is the NT loader which actually loads the operating system. ntdetect.com detects basic hardware that is required to boot up the system.
The changes are fully recoverable, although it would require some work for the uninitiated. If something goes wrong or you want to restore back things as they were then use the Recovery Console from your Windows CD.
Continue reading →

mac os on pc

0 comments

Want to use the glamorous Mac OSX?  Don’t have money to buy a Mac?  That’s okay because a new guide has been released that will allow you to install Leopard version 10.5.1 in a single step to your PC.
You will have to meet some very specific hardware requirements, non-Core Intel processors are not supported (meaning anything in the Pentium line), Core Duo or Core 2 Duo processors are required.  AMD processors are not supported at this time though a patch is in the works for that.
After confirming you have the correct processor, you will need a blank DVD-R to burn the ISO image files to.  DailyApps has all the links to the files you will need to complete the installation.
However, some of your hardware may not work, WiFi cards and sound seem to be the most common but since Apple supports Intel, ATi and nvidia graphic cards there shouldn’t be any problems.
The installation files are about a 2.1GB download which will take a while no matter how fast your connection is and it is recommended that you burn the files to DVD at a slower than normal speed.
That’s just the preparation, to actually install Leopard, pop the DVD you just created in your drive, boot from it and let the installation begin.
Since Mac OSX Leopard uses the HFS+ file system, it’s not clear if you will be able to partition your drive and be allowed to dual boot Leopard and Windows XP/Vista.  Try that at your own risk.  If you can live with wiping your whole drive just to try this, it’s probably the safer method.
You didn’t think I’d let you off that easy, did you? This falls on a gray area of the law and violates Apple’s EULA.  It’s only a matter of time before Apple puts an end to this and is it really worth the risk?  That’s just up to you.
Continue reading →

Run Mac OS X on a PCn windows platform

0 comments

Run Mac OS X on a PC

by NISHANT SRIVASTAVA




People have long wanted to run the Mac OS operating system on PC hardware, specifically on Intel and AMD architectures. But despite pleas and prayers, that wish remains unfulfilled.
Although running Mac OS natively on PC hardware is not possible, there is another option--running Mac OS X on an emulator. In this article, I will show you how to install and run Mac OS X Panther on your PC using PearPC, a free, architecture-independent PowerPC platform that runs on PCs. To check out PearPC's features, go to the PearPC-PowerPC Architecture Emulator web site.
Here are the steps you'll take to use PearPC to install Mac OS X:
  1. Download the PearPC PowerPC Architecture Emulator.
  2. Obtain hard disk images for use with PearPC.
  3. Obtain images of your client OS installation disk.
  4. Configure PearPC to use the hard disk image and the OS images.

Downloading PearPC

Download the PearPC PowerPC Architecture Emulator. Once it's downloaded, extract its content to a folder, say, [Desktop]:\PearPC. This is the folder that is going to contain all of the files you'll see in the next couple of sections.
Note: [Desktop] refers to the path of my Windows desktop; that is, C:\Documents and Settings\Wei-Meng Lee\Desktop\.

Hard disk images

To install Mac OS X on the emulator, you need a hard disk image. You can download preformatted hard disk images from http://pearpc.net/downloads.php. Two disk sizes are available: 3GB and 6GB. If you plan to install the full Mac OS X, then use the 6GB image. If you have limited disk space on your hard drive, use the smaller, 3GB image. Be aware that the default install of Mac OS X takes up a little more than 3GB, and so you need to unselect certain components during installation if you use the 3GB image.
The disk images come in two formats: BZ2 and RAR. I used the 6GB RAR disk images. You need to uncompress the disk image before you can use it. To uncompress the RAR image, I used WinRAR from http://www.rarlab.com/download.htm. Uncompress the image and save it in the [Desktop]:\PearPC folder.

Making images of your client OS

To install Mac OS X on your hard disk image, you need to make copies of your Mac OS X installation disk in ISO format. You can use Nero or any other disk utility to save CDs or DVDs in ISO format. In my case, I have saved the images in the C:\PearPC folder. I have named the first disk Panther1.iso.
Note: You need to purchase Mac OS X in order to run Mac OS X in PearPC.

Configuring PearPC

Once you've taken the previous steps, you're ready for the final step: configuring PearPC to use the all the relevant disk images. To do it, you need to create a configuration file. You can find the instructions on how to create one manually at http://pearpc.net/guides.php?guides_id=2. Or you can download a Windows application that does all the hard work for you. In my case, I used the PearPC Control Panel to help me manage my Mac OS X emulation.
Launch PearPC Control Panel and click on the Create New Configuration File icon. You will see the first screen as shown in Figure 1. Click on Continue to proceed to the next step.
Figure 1
Figure 1. Using the Create Configuration File wizard
In the next screen, you have to supply a few pieces of information (see Figure 2). First, specify the location of the PearPC emulator. In my case, it is [Desktop]:\PearPC\ppc.exe.
Next, specify the location of the hard disk image; that is, [Desktop]:\PearPC\macosx_6gb.img.
Note: Be sure to replace [Desktop] with your own desktop path.
Also, set the amount of memory you want to set aside for Mac OS X. (I have allocated 255MB.) Click on Continue.
Figure 2
Figure 2. Creating a new configuration file
In the next screen, you have the option to specify the screen resolution and color depth to use. Click on Finish when done (see Figure 3).
Note: I tried to enable networking, but I never got it to work. Also, use G3 and not G4 CPU emulation.
Figure 3
Figure 3. Specifying additional options
Give a name to the configuration file and save the file in the location specified (see Figure 4). Name it Mac OS X Panther and save it in the location [Desktop]:\PearPC\macosxpanther.cfg. Click on Finish.
Figure 4
Figure 4. Completing the wizard
You should now see the icon for your Mac OS X Panther in the PearPC Control Panel (see Figure 5). You need to complete one final step before you start installing Mac OS X on your PC--check the "CD-ROM device is installed" option and specify the location of the Mac OS install disk image. In my case, it is [Desktop]:\Panther1.iso. This is the image that will be used to boot up the emulator.
Figure 5
Figure 5. The completed configuration file
Figure 6 shows the files in my [Desktop]:\PearPC folder. The important files are highlighted.
Figure 6
Figure 6. Files in the PearPC folder
That's it! Double-click on the Mac OS X Panther icon and you should see the PearPC 0.3.0 window pop up (see Figure 7). Your Mac OS X installation should start soon afterward.
Note: It took me quite a while to get my Mac OS X to install. I encountered a number of failed attempts--when I booted into Mac OS X, it prompted me to restart my machine. But after several attempts, it worked.
Figure 7
Figure 7. Installing Mac OS X
Once the OS is installed, you will be asked to restart the machine. For subsequent attempts to run Mac OS X on your emulator, you should uncheck the "CD-ROM device is installed" option so that it can boot directly from the hard disk image. If the installation is performed correctly, you should see something like Figure 8 when Mac OS X boots up.
Figure 8
Figure 8. Mac OS X booting up
Figure 9 shows I am having fun with my newly installed Mac on my PC.
Figure 9
Figure 9. Running Mac OS X on a PC!
And if you still doubt if I am really running Mac OS X on my PC, Figure 10 will prove it to you.
Figure 10
Figure 10. Running Mac OS X in my Windows XP PC

Summary

Before installing PearPC and using Mac OS X, you need to keep several things in mind:
  1. You need a license to run Mac OS X. That is, you need to buy a copy of Mac OS X.
  2. The installation process takes time. Don't install Mac OS X on a slow machine; I tried the steps outlined in this article on three different machines--933MHz, 1.7GHz, and 3.0GHz, all equipped with 512MB of RAM. The 3.0GHz machine installed significantly faster compared with the rest, but it still took me several hours to get all of the installation done. Also, make sure you have lots of free hard disk space. The hard disk image itself takes up 6GB, and the additional installation disk images are going to take up a few more gigabytes.
  3. Even though the installation process is painfully slow, once the system is installed it is actually quite responsive. While you won't be able to fully experience Mac OS X as if you were using a real Mac, the emulation provides a good way for you to try out Mac OS X before you head to the nearest Apple shop to get the latest iMac.
Have fun, and let me know if PearPC works for you.
Continue reading →

legal notice at start up

0 comments
legal_noticesIf your PC has multiple users then you can now display legal notice to every user before they login to your PC. This legal notice will be displayed at every startup just before the Desktop is loaded. Using this you can tell your friends about the do’s and dont’s in your computer when they login in your absence. Well you can do this pretty easily. For this there is one small registry hack. Here is the step-by-step instruction to do this.

1. Goto Start->Run, type regedit and hit ENTER
2. Navigate to the following key in the registry
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion
\policies\system
On the right side pane look for “legalnoticecaption“, double click on it and enter the desired Legal Notice Caption. Next below this look for “legalnoticetext” and enter the desired Legal Notice Text. The lagal notice text can be upto a page in it’s size so that it can include a set of do’s and dont’s for your computer. After you do this just restart your computer and upon the next startup you can see the legal notice information for your computer. This trick works on both XP and Vista. You can also try it on Windows 7 and should work with no problems.
Hope you like this post. Pass your commments.
Continue reading →

TOP 15 SOFTWARES FOR WINDOWS

0 comments
The hard drive received a full format, Windows XP/Vista/7 has finished installing, and now it’s time to decide what to install next. Whatever you do, don’t allow that PC to touch the Internet before finishing it off with the most important updates and applications.Friends sometimes ask me what software they should install on their PC. So i am posting some important software list here.
For best results, install these freebies before you install any other applications :

1- Keep viruses away with Avira Antivirus. [download ]
First things first. One of the best software to install for a newly bought PC is an antivirus. Avira provides one of the most reliable, popular and free antivirus protection out there.
2- Remove trial software with PC Decrapifier. [download]
Some of the most major computer brands out there are shipped to consumers with annoying, trial based software. If you want to remove them a.s.a.p, this one is essential.
3- Keep spywares at bay with Spyware Terminator. [download]
Virus protection? Check. Spyware protection with removal and real-time scanning capabilities? Let this terminator works its wonders.
4- Remove junk items from your hard disk with CCleaner. [download]
CCleaner removes unused files effectively and keeps your hard disk clean from junk items. As a bonus, it comes with system optimization and privacy protection capabilities.
5- Defragment your hard drive in real time with IOBIT Smart Defrag. [download]
Fed-up with the ineffective default Windows defragmenter? Use this tool to defrag your hard disk in real time without having to stop your work each time you want to optimize your hard drive.
6- Proactively protect your computer with Spyware Blaster. [download]
Double up your computer protection from spyware attacks with this tool. Keep this one constantly updated to keep your system spyware-free.

7- Tweak and optimize your Windows capabilities with Fresh UI. [download]
Looking for an easy way to tweak your system without having to dive into manual registry editing? The ultimate registry tool for dummies (and experts too!)
8- Minimize hacker threats with ZoneAlarm Firewall. [download]
Protect your DSL or cable connected computer from malicious Internet users with this popular, excellent personal free computer firewall.
9- Delete important files and folders securely with File Shredder. [download]
Always remember that files that you remove via the recycle bin can still be recovered, if the disk sections have not been overwritten. To delete (and shred!) sensitive files permanently, this tool is an obvious choice.
10- Encrypt your data with TrueCrypt. [download]
One of the safest ways to secure sensitive files on a hard disk is to encrypt it with a secure password and algorithm. Even a noob can do it with TrueCrypt. Ridiculously useful.
11- Backup important files online with Dropbox. [download]
The Dropbox client allows you to effortlessly save, access and sync 2GB of important files between your computer and a free online backup server. Never lose any essential documents again!
12- Recover accidentally deleted files with Recuva. [download]
Does what it says above. A nice tool to have during difficult times.
13- Easily hide folders with Free Hide Folder. [download]
Looking to hide that important files and folders easily with an easy to use interface? Look no further, Free Hide Folder is here!
14:Firefox: A great alternative browser, and it’s less hacked/attacked than Internet Explorer.[download] 15:Trillian: The ultimate all-in-one instant messenger/IRC client.[download]
Continue reading →

TECHNIQUES BEHIND PHISHING ATTACK

0 comments

Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by appearing as a trustworthy entity in an electronic communication. eBay, PayPal and other online banks are common targets. Phishing is typically carried out by email or instant messaging and often directs users to enter details at a website, although phone contact has also been used. Phishing is an example of social engineering techniques used to fool users. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical measures.
Recent phishing attempts have targeted the customers of banks and online payment services. Social networking sites such as Orkut are also a target of phishing.
Spoofed/Fraudulent e-mails are the most widely used tools to carry out the phishing attack. In most cases we get a fake e-mail that appears to have come from a Trusted Website . Here the hacker may request us to verify username & password by replaying to a given email address.
TECHNIQUES BEHIND PHISHING ATTACK
1.Link Manipulation
Most methods of phishing use some form of technical deception designed to make a link in an email appear to belong to some trusted organization or spoofed organization. Misspelled URLs or the use of subdomains are common tricks used by phishers, such as this example URL
www.micosoft.com
www.mircosoft.com
www.verify-microsoft.com
instead of http://www.microsoft.com/
2.Filter Evasion
Phishers have used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing emails. This is the reason Gmail or Yahoo will disable the images by default for incoming mails.
How does a phishing attack/scam look like?
As scam artists become more sophisticated, so do their phishing e-mail messages and pop-up windows. They often include official-looking logos from real organizations and other identifying information taken directly from legitimate Web sites. Here is an example of how the phishing scam email looks like


Example of a phishing e-mail message, including a deceptive URL address linking to a scam Web site.
To make these phishing e-mail messages look even more legitimate, the scam artists may place a link in them that appears to go to the legitimate Web site (1), but it actually takes you to a phishing site (2) or possibly a pop-up window that looks exactly like the official site.
These copycat sites are also called “spoofed” Web sites. Once you’re at one of these spoofed sites, you may send personal information to the hackers.
How to identify a fraudulent e-mail?
Here are a few phrases to look for if you think an e-mail message is a phishing scam.
“Verify your account.”
Legitimate sites will never ask you to send passwords, login names, Social Security numbers, or any other personal information through e-mail.
“If you don’t respond within 48 hours, your account will be closed.”
These messages convey a sense of urgency so that you’ll respond immediately without thinking.
“Dear Valued Customer.”
Phishing e-mail messages are usually sent out in bulk and often do not contain your first or last name.
“Click the link below to gain access to your account.”
HTML-formatted messages can contain links or forms that you can fill out just as you’d fill out a form on a Web site. The links that you are urged to click may contain all or part of a real company’s name and are usually “masked,” meaning that the link you see does not take you to that address but somewhere different, usually a scam Web site.
Notice in the following example that resting the mouse pointer on the link reveals the real Web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company’s Web address, which is a suspicious sign.


So the Bottom line to defend from phishing attack is
 
1.Never assume that an email is valid based on the sender’s email address.
2.A trusted bank/organization such as paypal will never ask you for your full name and password in a PayPal email.
3.An email from trusted organization will never contain attachments or software.
4.Clicking on a link in an email is the most insecure way to get to your account.
Continue reading →

CD ROM PRANK VERY COOL

0 comments
First of all let me clearify that all these pranks which i m goin to post here are not any hacking or sumwhat like that... so be relax

now what r these..

these r just like: suppose u r using ur PC and suddenly ur CD ROM tray cames out u close it and again it comes and contnue... wont u be scared??

but its nothing to be scared its just a pranky script.. OKies

i will regularly be posting such tpe of scripts and also mentioning there effect..

one more thing. how to stop all these pranks???
just SHIFT + DELETE
or Ctrl + Altr + delete and close the program
or u can restart ur computer..

lets start prank no 1

It will Continually pop out your friend's CD Drive. If he / she has more than one, it pops out all of them!

step1. open note pad and Type the following code (u can copy paste it from here):

Code:





Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop


copy from set to loop


Save this file wid naming "Anything.VBS"(anything means u can name it according to ur wish but in last u must add ''.VBS'' ) and send to ur freind.
when ever he/she will click it his/her CDROM tray start goin crazzy :)
Continue reading →

SET DOUBLE PASSWORD EASY TRICK

0 comments

Strong passwords should have a significant length and cannot contain normal words. Only random digits and letters of different case. Such passwords are extremely hard to remember and it takes time to enter. But, even strong passwords have their weaknesses. When you type a password, it can be intercepted by a spy program that logs all your keystrokes. Others can see what you type (even if the password field on the screen is masked, the password can be read by buttons you hit on your keyboard.)




Until now, the only solution was to buy a secure token. A secure token is a hardware key that is used instead of or in addition to your normal password authentication. There are two main problems with the hardware solution, though. First, it is expensive. And second, you can use them only with software that has built-in support for this method of authentication.


But, from now on, you can turn any USB flash drive into a secure token! No need to purchase an additional expensive device. All you need is about 2 megabytes of free space on your flash drive or other USB gadget, such as an MP3 player, PDA or even a USB-pluggable mobile handset.



Strong Password



How does it work?
 Our software, Double Password, installs onto your flash drive. When you type a password, the program intercepts it and converts it into a super-strong password string on-the-fly. You can use simple, easy-to-remember passwords without the risk of being cracked.

Another benefit of using Double Password is that nobody can steal your passwords. Spy programs are useless. Even if someone gets the "weak" password that you type on the keyboard, it means nothing. This password will only work when your USB flash is inserted.

While typical hardware locks will work only with software that supports secure tokens, Double Password works with any software. 
It simply substitutes your weak password with a strong one.

Double Password can be effectively used to securely lock your Windows account, to protect your laptop and to bring a new level of security to all software that uses password authentication.


Continue reading →

I HACK MANAY PASSWORD

0 comments

I HACK MANAY PASSWORD USING THIS WONDERFUL TOOL ITS VERY EASY TO HACK SOME ONE


Ardamax keylogger is now very old keylogger and usually detected by most antiviruses. Though old, it is still one of most used Keyloggers. We can use Binders and Crypters to make Ardamax keylogger FUD (Fully UnDetectable). So, I will inform you about Ardamax Keylogger install and use in this article. I have provided link for software download.... just read on. ~~Step By Step Guide~~

1.First Of All Download Armadax Keylogger From Here 



2. After downloading, unzip Ardamax keylogger using Winzip Or Winrar



3. Now, after installing, you will get Ardamax log icon in task bar. Right click on it and select "Enter registration key" and make it full version by entering serial key from Serial key.txt file.

4. Go to http://www.drivehq.com and sign up for free FTP account. You need this to direct your keylogger logs and then access these logs. These are the logs that will give you desired passwords. After logging in your FTP account (make sure you are at Online Storage), create a new folder with name "Logs".

5. Now, right click on Ardamax taskbar icon and select "Remote Installation"



6. Click on "Next" to get Appearance screen. Here, click on "Additional components" and untick "Log Viewer" and hit Next.


8. On Web Update screen, simply click Next.

9. Now, you come to Options, and select apt options as you need. eg: It is better to have keylogger run in Stealth mode - so tick "Start in hidden mode" and so on. Click on Next.

10. On "Control" screen, check the box "Send log every" and put time as 30 minutes. Then, in delivery, uncheck "Email" and check "FTP". Leave Include as it is. And uncheck "Send only if log size exceeds". Proceed with "Next".

11. Now, on FTP, enter as below:
FTP Host: http://ftp.drivehq.com
Remote folder: Logs (the one you've created in Step 4)
Username and password: Enter your FTP Username and pass (from Step 4).

12. In "Control" check every box and hit "Next".

13. In Screenshots screen, you can put your own values and hit "Next" to come to Destination. Choose the Keylogger Engine path where you want to put the keylogger on your computer
. Untick "Open the folder containing the keylogger engine" to avoid yourself from being keylogged. Choose the icon you want to use for keylogger. Now, click "Next" and then "Finish".


14. Now, when you have keylogger engine ready. But, this is detected by antivirus as hacktool and so we have to bypass antivirus detection

So U need A Good Crypter For Undetect ur Server.exe File

Open This Website U Get So Many Crypters Get It From 
Here

Note:- Your antivirus may detect the downloaded Ardamax keylogger file as virus. Please deactivate your antivirus while installing this Ardamax keylogger. Don't worry, I never play such cheap pranks of hacking my readers.
So guys, I hope this Ardamax keylogger tutorial will help you in installing Ardamax keylogger for hacking passwords. Remember, ardamax keylogger is detected as hacktool (virus) by most antivirus. So, dont forget to crypt and bind your keylogger file. If you have any problem in using Ardamax keylogger to hack email passwords, please mention it in comments.

HelpFul Vedios


http://www.youtube.com/watch?v=bzbYak3CFGM
http://www.youtube.com/watch?v=AZx_gU7FK5c
Continue reading →
Recommend on Google
 
Copyright 2012 | Design by: Nishant Srivastava
About | Contact | Write For Us | Archive