INSTALLING XP IN 10 MINUTES!
STEP1 : After the Copy Part is Over ... System is Rebooted as we all know In general Foramatting Procedure...
Now After Reboot The Below Image Will Appear....
STEP 2: Now As This Image APPEARS You Have to Press "Shift + F10 " . This Will Open The command Prompt... Now type taskmgr in it. This will open the Task manager .
STEP 3 : After The task Manager Opens Goto Processes ... And Find ...
Top Viruses of 2009 : Based on Ranking
Top Viruses of 2009 : Based on Ranking
Rank 1: Win32/Conficker
This virus is a network worm and exploits the RPC sub-system vulnerability present in the Microsoft Windows operating system, allowing an attacker to remotely attack a computer without valid user credentials. Win32/Conficker infects the computer using unsecured folders, removable medium or by making use of Autorun facility enabled by default in windows. This threat contacts other domain ...
find who is invisible on gmail or gtalk
Step 1.
Set the target user as off the record while he/she is online. This can be done by simply clicking on the option in the chat window.
Step 2.
Try sending an IM when he/she is invisible or offline.
If he/she is invisible he/she will receive message. If he/she is offline you will receive an error “did not receive your chat”.
This hack will only work if you mark the target user as off record when he/she is online. It is a limitation.
How ...
some computer tricks
This is a complimation of computer tricks, mainly security and privacy related.Getting Ip’s:–To see the ip all computers you are connected to (web servers, people attempting to hack into your computer). Go to dos (start>run>type command) and run the netstat command. Type netstat /? for details.
Type netstat -r at the command prompt to see the ip of all computers you are connected toIn MSN (and other programs) when you are chatting to someone everything you type goes through the MSN servers first (they act as a proxy) so you see their ip rather than who you are chatting to. You can ...
how internet works?

click on image
This article is about the public worldwide computer network system. For other uses, see Internet (disambiguation).
Visualization of the various routes through portion of the Internet
The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private and public, academic, ...
LEAVE YOUR REQUEST FOR SOFTWARES

LEAVE YOUR SOFTWARE REQUEST IN COMMENT BOX WITH YOUR EMAIL ADDRESS I WILL EMAIL YOU THE LINK OF THE SOFTWA ...
Cannot Access Regedit, How to Fix It?
Cannot Access Regedit, How to Fix It?
First we'll begin with the method that appears to work the best.
Method 1 - Enabling the Registry with VBScript
Doug Knox, a Microsoft Most Valuable Professional, has created a VBScript that enables or disables the Registry Editor based on the following location in the registry. Of course, since the registry editor is disabled, you can't change it manually, so Doug wrote a Visual Basic Script to accomplish ...
EARN MONEY ONLINE FREE ITS TRUE NOT FAKE
Earn money online by just clicking
click on the pic to join this site its good check this pic this amount is earned my me
CLICK HE ...
END OF THE INTERNET IN 2012 ITS TRUE....
According to research that's supposed to be published later this year, growing demand for Internet use will soon outstrip the stamina of the infrastructure supporting it, and the Internet will cease to be reliable by 2012. Complete anarchy will ensue, and the world will essentially end along with the Internet we created for it. Perhaps this is what the Mayan prophecies meant?
Reasoning from a Respected 'Think-Tank' Despite tens of billions of ...
USE USB AS A KEY TO START WINDOWS
Most of us are concerned about the security and privacy of our data. We put login passwords, encrypt data and do various other tricks to ensure that someone cannot access our system without our authorization. Hardware manufacturers have also started exploiting our desire for data security by offering fingerprint readers, face recognition and other fancy stuff. If you are paranoid about who accesses your system, you can use a simple trick to prevent ...
mac os on pc

Want to use the glamorous Mac OSX? Don’t have money to buy a Mac? That’s okay because a new guide has been released that will allow you to install Leopard version 10.5.1 in a single step to your PC.
You will have to meet some very specific hardware requirements, non-Core Intel processors are not supported (meaning anything in the Pentium line), Core Duo or Core 2 Duo processors are required. AMD processors are not supported ...
Run Mac OS X on a PCn windows platform
Run Mac OS X on a PCby NISHANT SRIVASTAVA
People have long wanted to run the Mac OS operating system on PC hardware, specifically on Intel and AMD architectures. But despite pleas and prayers, that wish remains unfulfilled.
Although running Mac OS natively on PC hardware is not possible, there is another option--running Mac OS X on an emulator. In this article, I will show you how to install and run Mac OS X Panther on your PC using PearPC, ...
legal notice at start up
If your PC has multiple users then you can now display legal notice to every user before they login to your PC. This legal notice will be displayed at every startup just before the Desktop is loaded. Using this you can tell your friends about the do’s and dont’s in your computer when they login in your absence. Well you can do this pretty easily. For this there is one small registry hack. Here is the step-by-step instruction to do ...
Subscribe to:
Posts (Atom)