Flipkart Deals

Hacker"s Search Box

Google

Thursday, December 27, 2007

Top 3 Sniffers !!!

In common industry usage, a sniffer (with lower case "s") is a program that monitors and analyzes network traffic, detecting bottlenecks and problems. Using this information, a network manager can keep traffic flowing efficiently. They can used to sniff passwords being typed on an intranet ....

Here are top 3 sniffers :-

Wireshark : Sniffing the glue that holds the Internet together ,Wireshark (known as Ethereal until a trademark dispute in Summer 2006) is a fantastic open source network protocol analyzer for Unix and Windows. It allows you to examine data from a live network or from a capture file on disk. You can interactively browse the capture data, delving down into just the level of packet detail you need.

Kismet : A powerful wireless sniffer
Kismet is an console (ncurses) based 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. It identifies networks by passively sniffing (as opposed to more active tools such as NetStumbler), and can even decloak hidden (non-beaconing) networks if they are in use.


Cain and Abel : The top password recovery tool for Windows
UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols.

Key Loggers - Latest And Free !!!!

KeyLoggers, like the name suggests, are programs that record keystrokes from the computer keyboard and either logs it to the computer or sends it to its maker through a built in e-mail engine. Key logging allows a prospective hacker to gain access to the user name, passwords, and even id numbersentered into sensitive online bank accounts or passwords to remote control programs. Listed below are the top 9 key loggers :


  • Family Keylogger - 995kb
  • Golden Keylogger - 976kb
  • Personal Inspector - 970kb
  • Give Me Too - 1MB
  • AIM Logger - 1.65MB
  • ICQ Logger - 1.65 MB
  • Yahoo Logger - 1.65 MB
  • IRC Logger - 1.70 MB
  • Desktop-Spy - 700kb

  • Wednesday, December 26, 2007

    Break Into Email Accounts!

    Expertise Level: Intermediate

    Warning:We are not to teach hacking with this post,it is just for knowledge purpose and we do not take any responsibility for any ill you end up with.We don't encourage you to do the following,It is up to you.
    BEWARE!



    Introduction

    I have written this tutorial to address a question that is all too commonly asked in any channel/chat room with "hack" in the title (asked in frequency to the point of harrassment really). So since this is a question that so many people ask, then I believe that there should at least be an answer available (regardless of the morality or "lameness" of such a question). So you as the reader are most likely reading this because you want to break into somebody's email account.


    Well, you must understand that there is no 1-2-3 process to anything. I will give you options to consider when persuing such a task, but it will ultimately be up to you to do this. This is what you want to do, and no matter what sort of offers you throw up at anybody, nobody is going to do this for you. There is no program that is going to do all this for you. Also don't forget that nobody is going to hold your hand and lead you through this. I'm offering you as the reader suggestions for ways you can address this task, and that is about all the help you are going to get from anybody. So now that I've made all that clear, let's begin...

    Things You Should Know

    As I mentioned in the previous section, there is no program that will do all this for you. Almost all the crackers you see out there will not work, because services like Hotmail, Yahoo!, etc. have it set so that it will lock you from that account after a certain number of login attempts. There are some rare exceptions, like some crackers for Yahoo! that are made for cracking "illegal" accounts, but the thing you must understand about those types of crackers is that they are built to crack SPECIFICALLY "illegal" names. They can not be used to target a specific account on Yahoo!, so don't try to use them for this purpose. Another thing you must know if you ask this question in any "hacker" chat room/channel (which I highly discourage), or if you read something on this topic, and you hear that you have to email some address and in any way have to give up your password in the process, do NOT believe this. This is a con used to trick gullible people into handing over their passwords. So don't fall for this. Well that concludes this section, now lets get to what you want to know.


    If You Have Physical Access

    I will start off with options you have if you have physical access to the computer of the user that you are targeting, because it is a lot easier if you do. One option you have, that you will hear a lot if you ask this question, and anybody bothers to answer is to use a keylogger. A keylogger is an excellent option, and probably the easiest.
    There are a lot of keyloggers out there, ranging from hardware keyloggers, to software keyloggers. For this task, you won't need to buy a hardware keylogger, since the only advantage to a hardware one is that you can grab passwords that are given to access a certain local user on the operating system used.
    There are a lot of software keyloggers out there, and you can feel free to check out www.google.com to look at your options. I will go ahead and toss a couple of keyloggers out to try for those of you who seem allergic to search engines.


    One option you have that is good for a free keylogger is Perfect Keylogger (which you can find at www.blazingtools.com/bpk.html). It works just fine, and has some nice options to keep it hidden from your average end user (computer user).


    Another option you have, which is probably the best one you can get is Ghost Keylogger. It has a lot of options that will allow you to get the results of this program remotely (it will email you the results). However, this is not a free keylogger, so if you are wanting to get a copy you can look on the file sharing networks for a copy of the program, and the serial number for it (look on www.zeropaid.com for different file sharing clients you can try).


    Once you have whatever keylogger you are going to use downloaded, just install it onto the computer you are wanting to monitor, and wait till next time they login to their email account. You will then have the password for the account. Another option you have if they use Outlook to access their email account, is to copy the *.dbx files for their Outlook account onto a floppy, and extract the emails at home (the dbx file stores the files stored in each Outlook folder on a given account, meaning the received and sent emails). When you are on the computer of the user you are targeting, look in

    C:\Windows\ApplicationData\Identities\{ACblahblahblah}\Microsoft\ OutlookExpress\ and copy all the .dbx files onto a floppy. Then when you take the .dbx files back to your house, use DBXtract to extract the messages from these files. Check out the link below to download this program....

    www.download-freeware-shareware.com/Freeware-Internet.php?Type=4171


    Another option you have if you have physical access is to execute a RAT (Remote Administration Tool, you may know these programs as trojans) server on the computer. Of course, you do not have to have physical access to go this route, but it helps. What you must understand is that these tools are known threats, and the popular ones are quickly detected by antivirus software, and thusly taken care of. Even ISPs block incoming/outgoing traffic from the most popular ports used by these programs.


    One newcomer in the RAT market that you should know about is Project Leviathan. This program uses already existing services to host it's service, instead of opening up an entirely new port. This allows it to hide itself from any port detection tool/software firewall that may be in place. This of course will not guarantee that it's server program will not be detected by any antivirus software used (actually, if the user has kept up with his/her signature tables, then it WILL be detected), but it will give you more of a chance of holding access. Search the engines to download Project Leviathan...


    Once you have downloaded this tool, follow the instructions listed to install and use this program. However, since this RAT is a command line tool, you will still need another program set up on the user's computer in order to catch the desired password. For this, you can use Password Logger.. Google it!


    Once you have this downloaded, set it up on the targeted computer. The program will remain hidden, while logging any types of passwords into a .lst file in the same directory that you executed it on. Therefore, you can access this *.lst file through Project Leviathan remotely in order to retrieve the user's email password remotely. Well that pretty much concludes it for this section. At this very moment I can practically hear a lot of you thinking to yourselves "But, but I don't HAVE physical access!". No reason to worry, that's what the next section is for...

    If You Don't Have Physical Access


    Well of course most of you out there will say that you don't have physical access to your target's computer. That's fine, there still are ways you can gain access into the desired email account without having to have any sort of physical access. For this we are going to go back onto the RAT topic, to explain methods that can be used to fool the user into running the server portion of the RAT (again, a RAT is a trojan) of your choice. Well first we will discuss the basic "send file" technique. This is simply convincing the user of the account you want to access to execute the server portion of your RAT.


    To make this convincing, what you will want to do is bind the server.exe to another *.exe file in order to not raise any doubt when the program appears to do nothing when it is executed. For this you can use the tool like any exe file to bind it into another program (make it something like a small game)...

    On a side note, make sure the RAT of your choice is a good choice. The program mentioned in the previous section would not be good in this case, since you do need physical access in order to set it up. You will have to find the program of your choice yourself (meaning please don't ask around for any, people consider that annoying behavior).


    If you don't like any of those, I'm afraid you are going to have to go to www.google.com, and look for some yourself. Search for something like "optix pro download", or any specific trojan. If you look long enough, among all the virus notification/help pages, you should come across a site with a list of RATs for you to use (you are going to eventually have to learn how to navigate a search engine, you can't depend on handouts forever). Now back to the topic at hand, you will want to send this file to the specified user through an instant messaging service.


    The reason why is that you need the ip address of the user in order to connect with the newly established server. Yahoo! Messenger, AOL Instant Messenger, it really doesn't matter. What you will do is send the file to the user. Now while this transfer is going on you will go to Start, then Run, type in "command", and press Enter. Once the msdos prompt is open, type in "netstat -n", and again, press enter. You will see a list of ip addresses from left to right. The address you will be looking for will be on the right, and the port it's established on will depend on the instant messaging service you are using. With MSN Messenger it will be remote port 6891, with AOL Instant Messenger it will be remote port 2153, with ICQ it will be remote port 1102, 2431, 2439, 2440, or 2476, and with Yahoo! Messenger it will be remote port 1614.


    So once you spot the established connection with the file transfer remote port, then you will take note of the ip address associated with that port. So once the transfer is complete, and the user has executed the server portion of the RAT, then you can use the client portion to sniff out his/her password the next time he/she logs on to his/her account.


    Don't think you can get him/her to accept a file from you? Can you at least get him/her to access a certain web page? Then maybe this next technique is something you should look into.


    Currently Internet Explorer is quite vulnerable to an exploit that allows you to drop and execute .exe files via malicious scripting within an html document. For this what you will want to do is set up a web page, make sure to actually put something within this page so that the visitor doesn't get too entirely suspicious, and then imbed the below script into your web page so that the server portion of the RAT of your choice is dropped and executed onto the victim's computer...

    While you are at it, you will also want to set up an ip logger on the web page so that you can grab the ip address of the user so that you can connect to the newly established server. Here is the source for a php ip logger you can use on your page...

    http://www.planet-source-code.com/vb/scripts/ShowCode.asp?txtCodeId=539&lngWId=8

    Just insert this source into your page along with the exedrop script, and you are set. Just convince the user to go to this page, and wait till the next time they type in their email password. However, what do you do if you can not contact this user in any way to do any of the above tricks. Well, then you definately have your work cut out for you. It doesn't make the task impossible, but it makes it pretty damn close to it. For this we will want to try info cracking. Info cracking is the process of trying to gather enough information on the user to go through the "Forgot my Password" page, to gain access into the email account.

    If you happen to know the user personally, then it helps out a lot. You would then be able to get through the birthday/ zipcode questions with ease, and with a little mental backtracking, or social engineering (talking) out the information from the user be able to get past the secret question. However, what do you do if you do not have this luxury? Well in this case you will have to do a little detective work to fish out the information you need.

    First off, if a profile is available for the user, look at the profile to see if you can get any information from the profile. Many times users will put information into their profile, that may help you with cracking the account through the "Forgot my Password" page (where they live, their age, their birthday if you are lucky). If no information is provided then what you will want to do is get on an account that the user does not know about, and try to strike conversation with the user. Just talk to him/her for a little while, and inconspicuously get this information out of the user (inconspicuously as in don't act like you are trying to put together a census, just make casual talk with the user and every once in a while ask questions like "When is your birthday?" and "Where do you live?", and then respond with simple, casual answers).


    Once you have enough information to get past the first page, fill those parts out, and go to the next page to find out what the secret question is. Once you have the secret question, you will want to keep making casual conversation with the user and SLOWLY build up to asking a question that would help you answer the secret question. Don't try to get all the information you need in one night or you will look suspicious. Patience is a virtue when info cracking. Just slowly build up to this question. For example, if the secret question is something like "What is my dog's name?", then you would keep talking with the user, and eventually ask him/her "So how many dogs do you have? ...Oh, that's nice. What are their names?". The user will most likely not even remember anything about his/her secret question, so will most likely not find such a question suspicious at all (as long as you keep it inconspicuous). So there you go, with a few choice words and a little given time, you have just gotten the user to tell you everything you need to know to break into his/her email account. The problem with this method is that once you go through the "Forgot my Password" page, the password will be changed, and the new password will be given to you. This will of course deny the original user access to his/her own account. But the point of this task is to get YOU access, so it really shouldn't matter. Anyways, that concludes it for this tutorial. Good luck...

    Happy Hacking!

    The Windows Genuine Advantage Disadvantage

    Windows Genuine Advantage Disadvantage

    Could Windows Genuine Advantage cause problems after I upgrade my hard drive?

    It’s possible. Naming this legal spyware an “Advantage” is a bit like calling the official Soviet newspaper Pravda (“Truth”) — putting a word in the title doesn’t make it so. Windows Genuine Advantage checks your Windows installation to confirm that its license key matches your hardware. If the key turns out to be registered for a different computer, WGA objects and generally makes your life miserable.

    In theory, WGA can distinguish between a new hard drive and a new PC. In reality, though, it sometimes gets confused and asks you to reactivate Windows— usually a painless chore. If reactivation fails, call Microsoft’s Activation hotline at 888-571-2048. To speak with a human being, say “agent” when asked which option you want, and don’t waver when the automated phone system attempts to convince you that you would be better off talking to a machine.

    The hotline is open around the clock. Matters grow complicated if your copy of Windows came with your PC and if WGA thinks your new hard drive is a new computer. An “OEM” copy of Windows isn’t supposed to be transferred to a new PC. If you had multiple partitions on your old drive, create the same partitions, in the same order, on the new one. If that doesn’t work, call the vendor’s technical support. And don’t blame WGA if your computer won’t boot after a hard-drive up grade; your BIOS probably can’t recognize the new drive. See Techlog on page 15 for more on WGA.

    CONNECTION MENACE

    I recently tried to connect to the Internet by using Smart Link 56K Voice modem. The connection attempt failed and is showing errors. I’ve even tried to replace the modem but was unsuccessful. What should I do?

    First, check to make sure that you are using the correct dial-up number. This error can also occur if you have installed your modem with an incorrect driver. Identify your modem chipset, PCI ID, manufacturer, and make sure you are using the correct driver. To do this, you can take out the modem and look at it. Somewhere on the largest chip, you’ll Do you hear the modem dial, connect and try to handshake? This is a pretty common issue with the onboard modems that come with most computers. Double check to make sure you have the correct drivers installed. Try using an external modem, if you can find one.

    VIDEO WOES

    I recently installed a new graphics card and I am able to play all high graphics game but not able to play any of my video files. My system hangs whenever I try to open any of the video files?

    Try using the VLC Player. This is included in this month’s DVD, as part of the PC World SuperSuite. If your computer still hangs, you may need to uninstall all video codecs and video players, and try installing VLC after a restart.

    SPEED IT UP!

    How many times can Vista and XP be re installed and how can I speed up Vista which is slower in comparison with XP?

    As long as your keep the hardware constant, Vista and XP can be installed any number of times. In case you have an OEM copy of the OS, you may run into an error with activation after 10 times, but all you need to do is call up Microsoft and explain the situation. They do not, in most cases, have a problem. Of course, all this assumes that you are using licensed copies of the OS. In case you are using a pirated version, this advice may not be valid.

    On a powerful system, and as long as you have all the latest drivers and updates installed, Vista should run quite well. It is a fact that many people feel that Vista is slower than XP on the same hardware, so if it really bothers you, you can try turning off the Aero effects. But do remember that Vista is a much larger, and more complex OS than XP, and some amount of slowdown will be inevitable. The situation ought to improve as hardware manufacturers release updated drivers, and Microsoft releases updates, but as of now, there’s really nothing much you can do.

    Sunday, December 23, 2007

    The Cool Tech DOOR -- Even cooler Than Star Trek



    Grease Monkey -- Firefox Extension


    ~~ Grease Monkey ~~

    Allows you to customize the way a webpage displays using small bits of JavaScript. ...

    Allows you to customize the way a webpage displays using small bits of JavaScript.

    Hundreds of scripts, for a wide variety of popular sites, are already available at http://userscripts.org .

    You can write your own scripts, too. Mark Pilgrim's definitive Greasemonkey guide, diveintogreasemonkey.org will show you how.

    To Install Grease Monkey Click HERE

    Note :- You Need Firefox To Install This Extension ... You Can Download Mozilla Firefox Located At The Top-right Of My Blog

    Saturday, December 22, 2007



    Speeed Up UR Internet Explorer 4/5/6 !!!

    This tip will work on any Win 95/98/2000/ME and NT4 systems with MS Internet Explorer 4/5/6 installed.

    This Registry hack tip speeds up internet/remote (using Windows Explorer and/or Internet Explorer) browsing processes considerably on most MS Windows 32-bit machines connected to a network and/or remote computer(s).

    This actually fixes a BUG in MS Windows O/S's that scan shared or remote
    folders and files across a network for Scheduled Tasks. This can add a delay as long as 30 seconds
    in some machines(!) This is because I.E. uses extra time to search the remote computer(s)
    for the tasks.

    Steps:




    To stop this feature of I.E., open Regedit.

    Go To:

    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\

    RemoteComputer\NameSpace


    Click the + sign beside NameSpace


    Below NameSpace you will see a sub key named: {D6277990-4C6A-11CF-8D87-00AA0060F5BF}

    Right click on {D6277990-4C6A-11CF-8D87-00AA0060F5BF}
    and delete it.


    Note:Editing The Registry Is Dangerous And May Cause system Instabability .....

    To Speed up UR Browsing Experience Download

    Mozilla Firefox Located At The Top- right Of My Blog

    And Increase Speed By 200% ...

    Thursday, December 20, 2007



    Do You Really Need Vista ??

    Do You Need Vista? Vista is unquestionably the future of Microsoft’s operating system.But even PC users who like Windows have been complaining about Vista’s performance.Vista running under Parallels Desktop for Mac is no speed demon and is occasionally unpredictable. It’s better under Boot Camp but still far from perfect.Windows XP, on the other hand, isn’t half bad, no matter how you run it on your Mac.It’s a more mature version of Windows and therefore less buggy. It’s also less laden with eye candy, so it’s faster than Vista.XP is also much better than Vista when it comes to virtualization. Because virtualization wasn’t a threat when XP was released many years ago, there’s no provision in the EULA that forbids you to run it under Parallels, Fusion, or whatever else you want to use. And even under virtualization,XP Home, XP Professional, and most Windows applications (save 3-D games and other 3-D–intensive applications,which perform poorly) run at nearnative speeds on a modern Intel Mac. People running Boot Camp will fi nd that XP is blazingly fast.


    — CHRISTOPHER BREEN

    Download Firefox From Right Side OF Our Blog
    click to enlarge the image



    Get notified About UR mails without logging in:


    Google’snifty Gmail Notifier utility (mail.google.com/mail/help/notifier) sits in your system tray and checks for new mail at regular intervals. But if your system tray runneth over, and you are using Firefox , you can receive notifications right in the browser’s status bar, through Doron Rosenberg’s identically named Gmail Notifier add-on software.


    To Download Gmail Notifier Click Here


    And IF You Dont Have FIREFOX Get IT On The Right Side Of Our Blog HERE

    Wednesday, December 19, 2007



    Increase Internet Speed simply using Notepad

    Increase Internet Speed using Notepad:
    1. Open Notepad.

    2. Copy the following code to the Notepad.
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters]
    "SackOpts"=dword:00000001
    "TcpWindowSize"=dword:0005ae4c
    "Tcp1323Opts"=dword:00000003
    "DefaultTTL"=dword:00000040
    "EnablePMTUBHDetect"=dword:00000000
    "EnablePMTUDiscovery"=dword:00000001
    "GlobalMaxTcpWindowSize"=dword:0005ae4c

    3. Save the file as NetSpeed.reg or what ever name you want but the extension should be .reg.
    4. If you run the file means it asks for "Do you want to add the following entry to the registry"
    5. Press Yes
    6. Reboot your PC.
    7. Feel the difference...

    Note:Editing the Registry will cause the System unstable. Please take a Proper Back-Up before editing with Registries. Author will not be responsible for any liabilities.

    Or safer way is to download a new version of Mozilla Firefox that is provided on my blog on right side.



    You can't but you CAN change the name of Recycle Bin!


    1. Open Regedit (select Run in the Start menu and enter regedit in the text box).
    2. Left click the + sign beside "HKEY_CLASSES_ROOT" and locate CLSID (the Class ID option). Scroll down to the {645FF040-5081-101B-9F08-00AA002F954E} key and click the folder.
    3. In the right-hand window, double-click (Default), and change the name from Recycle Bin to whatever you prefer.
    4. Click OK
    5. You can also change the Tip Info as well if you like. Double click on tip info in the right hand window and change the text to anything you would like. Tip Info is brought up when you hover on the Recycle Bin icon on your desktop and it gives you a brief description of what the recycle bin is about (Make it something entertaining)
    6. Click OK.
    7. Exit Regedit.
    8. To make the new name take effect, click once anywhere on the desktop, then press the F5 key.



    Disable Notification Area Balloon Tips : Windows XP

    To Disable The Notification Area Balloon Tips
    Warning: If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that you can solve problems that result from using Registry Editor incorrectly. Use Registry Editor at your own risk.
    1. Click Start, click Run, type regedit, and then press ENTER.
    2. Navigate to the following subkey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
    3. Right-click the right pane, create a new DWORD value, and then name it EnableBalloonTips.
    4. Double-click this new entry, and then give it a hexadecimal value of 0.5. Quit Registry Editor. Log off Windows, and then log back on.

    Warning:We are not responsible for any ill you end up with your PC!



    USB Port Management

    USBInfo

    Every now and then, when you install a new USB gadget, another USB device cries foul and stops working. To find out why, run this utility, which identifies and tests every USB port on your system and each device plugged into it.


    To Download Click Here

    Tuesday, December 18, 2007

    Make Windows Formatting CD in 5 steps

    Really Cool And Unique Method Just 5 Steps

    Create Your Own Windows Bootable CD From Your Computer With Just 2 Softwares

    All The Advanced Steps Have Been Removed

    Enjoy The Simple Proccess Of Making A Bootable Windows Formatting Cd

    Step 1:-
    If your PC lacks a Windows CD, a folder named 'i386' containing the Windows installation files is probably in the root directory of drive C: or in your C:\Windows folder. Your system may have several i386 folders, but the one you want has a lot of files with extensions ending in underscores (_), along with the executable files expand.exe, regedit.exe, and winnt32.exe. Copy this folder onto a CD for safekeeping, though you'll use the version on the hard drive to actually reinstall Windows.

    Step 2:-
    Keep your 25-character Windows Product Key handy--you'll need it to reinstall the OS. The number is on the back of your PC, on the bottom of your notebook, or in some other hard-to-read spot; it may be listed in the documentation as well.To Find Your Windows Key download Keyfinder from here

    Step 3:-
    You'll also need a bootable CD for starting the install process. Bart Lagerweij's free PE Builder creates a CD-bootable version of XP called Bart's Pre-install Environment, or BartPE, from either a Windows CD or the i386 folder. Click here to download PE Builder.

    Step 4:-
    Open PE Builder's main dialog box and select the folder or drive containing your i386 folder, but not the folder itself. Check Create ISO image, click Burn to CD, and select your CD-RW drive from the Device drop-down menu. If PE Builder doesn't support your burner, double-click the PE Builder--created .iso file to launch your CD authoring program and burn the CD.

    step 5:-
    To reinstall Windows, boot from the BartPE CD you just created and select Go, Programs, A43 File Management Utility. Navigate to the hard drive's i386 folder (do not use the i386 folder on the CD). Double-click winnt32.exe to start the installation process. When the installation program closes, reboot your PC, remove the CD, and select Microsoft Windows XP Setup from the resulting boot menu. The installation will pick up where it left off.

    Free!!!! SMS FRom Yahoo Mail

    Yahoo mail is now out of beta phase and users can send free SMS to mobile phones (selected countries only).







    Incidently, Yahoo Messenger already has this feature available. Along with integration of text messaging feature(upto 145 characters), it let you pick a new color for your email interface too.

    So, what do you think, will Gmail face competition from Yahoo with the inclusion of new features?


    Monday, December 17, 2007

    Windows Games Cheats

    Though these tricks seems to be veru silly but anyways you can challenge your friends from doing such tricks like finishing the Solitare game in 10 seconds and making as may points as you want.

    Minesweeper
    Secret - Reveal Mines
    Instructions - Minimize or close all running applications. Launch Minesweeper, then type xyzzy. Next hold down either shift key for one second. Now when you move the mouse cursor over a Minesweeper square you will see a tiny white pixel in the top left corner of your desktop screen. This pixel will change to black when your mouse moves over a mine. You may need to change you desktop background to a solid color other then white or black to see the pixel.

    Pinball
    Secret - Extra BallsInstructions - Type 1max at the start of a new ball to get extra balls.
    Secret - Gravity WellInstructions - Type gmax at the start of a new game to activate the Gravity Well.
    Secret - Instant PromotionInstructions - Type rmax at the start of a new game to go up in ranks.
    Secret - Skill ShotInstructions - Launch the ball partially up the chute past the third yellow light bar so it falls back down to get 75,000 points. There are six yellow light bars that are worth a varying amount of points:
    First: 15,000 pointsSecond: 30,000 pointsThird: 75,000 pointsFourth: 30,000 pointsFifth: 15,000 pointsSixth: 7,500 points
    Secret - Test ModeInstructions - Type hidden test at the start of a new ball to activate Test Mode. No notification will be given that this is activated but you can now left-click the mouse button and drag the ball around.
    Secret - Unlimited BallsInstructions - Type bmax at the start of a new ball. No notification will be given that this is activated but when a ball is lost a new ball will appear from the yellow wormhole indefinitely. Once this is activated you will be unable to activate other secrets without restarting

    FreeCell
    Secret - Instant WinInstructions - Hold down Ctrl + Shift + F10 during game play. Then you will be asked if you want to Abort, Retry or Ignore. Choose Abort, then move any card to instantly win.
    Secret - Hidden Game ModesInstructions - In the "Game" menu choose "Select Game". Enter -1 or -2 to activate the hidden game modes.

    Solitaire
    Secret - Instant Win
    Instructions - Press Alt + Shift + 2 during game play to instantly win.
    Secret - Draw single cards in a Draw Three game
    Instructions - Hold down CTRL + ALT + SHIFT while drawing a new card. Instead of drawing three cards you will only draw one.
    Infinite Points
    In the Windows XP version of solitaire, draw from the deck at least twice. Hold control and drag a card down from the deck. Click the "A" key and then let go of the left mouse key. You will get 10 points for this. Continue doing this for infinite points!
    Infinite points trick II
    To do this trick, finish a game of solitaire with the time bonus option on. The cards will start bouncing. Click on the solitaire screen and the play again box will pop up. Select no, so the solitaire screen is just blank green. Use the instant win cheat (Alt+Shift+2) and you will recieve the time bonus you got last game will be added to your last game's score. For example, if your time bonus was 5000, and your final score was 6000, after using this glitch, you will have a score of 11000. This glitch can be used as many times as you want.

    //-----------------------------------------------------------------// registry hack which will allow you to see your opponents' cards//----------------------------------------------------------------- Launch REGEDIT.EXE and navigate to HKEY_CURRENT_USER Software Microsoft Windows CurrentVersion Applets Hearts. NOTE: You may have to create the Hearts key under Applets In the right-hand pane, create a new String Value. Immediately rename it to "ZB" (without the quotes); give it a value of "42" (again, sans quotes). The next time you're in a game of Hearts, press CTRL + SHIFT + ALT + F12.
    Source:Wehackers

    Make A Shutdown Timer !

    METHOD # 1

    Right click on your desktop and choose "New=>shortcuts".
    In the box that says "Type the location of the shortcut",
    type in "shutdown -s -t 3600" without the quotation marks and click next. Note: 3600 are the amount of seconds before your computer shuts down. So , 60secs*60mins=3600secs.

    Another addition u can do is displaying a message with it then add a bit more...
    shutdown -s -t 3600 -c"This is the message" (use " " with c)

    Make up a name for the shortcut and you're done.
    You can change the icon by right clicking=>properities=>change icon=>browse

    TO ABORT:
    To make an abort key to stop the shutdown timer just create another shortcut and make
    the "location of the shortcut" to " shutdown -a" without the quotes.

    METHOD # 2

    {EASIER THAN THE PREVIOUS ONE}
    Here is another trick to shutdown at a specific time, for example you wish to shutdown at 11:35am. Type this in
    start=>Run
    Type Code: at 11:35 shutdown -s
    TO ABORT:
    Code: shutdown -a

    Try this and think of what pranks you can play with your friends with this,like change its icon to internet Explorer and rename it and whenever one will open IE the windows will be shut down.

    Sunday, December 9, 2007

    Free Flash Based Computer Encyclopedia----Download free!!


    Here is this easy to use 'very useful' and on flash platform[awesome looking] computer encyclopedia containing knowledge of nearly all the important terms on following topicsSoftwareHardwareNetworkingInternetProgrammingMiscellaneous
    Download

    Top 20 most used Nokia Moblie Tips n Tricks

    Code Description :
    These Nokia codes will work on most Nokia Mobile Phones.

    (1) *3370# Activate Enhanced Full Rate Codec (EFR) - Your phone uses the best sound quality but talk time is reduced my approx. 5%

    (2) #3370# Deactivate Enhanced Full Rate Codec (EFR) OR *3370# ( Favourite )

    (3) *#4720# Activate Half Rate Codec - Your phone uses a lower quality sound but you should gain approx 30% more Talk Time.

    (4) *#4720# Deactivate Half Rate Codec.

    (5) *#0000# Displays your phones software version, 1st Line : Software Version, 2nd Line : Software Release Date, 3rd Line : Compression Type. ( Favourite )

    (6) *#9999# Phones software version if *#0000# does not work.

    (7) *#06# For checking the International Mobile Equipment Identity (IMEI Number). ( Favourite )

    (8) #pw+1234567890+1# Provider Lock Status. (use the "*" button to obtain the "p,w"
    and "+" symbols).

    (9) #pw+1234567890+2# Network Lock Status. (use the "*" button to obtain the "p,w"
    and "+" symbols).

    (10) #pw+1234567890+3# Country Lock Status. (use the "*" button to obtain the "p,w"
    and "+" symbols).

    (11) #pw+1234567890+4# SIM Card Lock Status. (use the "*" button to obtain the "p,w"
    and "+" symbols).

    (12) *#147# (vodafone) this lets you know who called you last.

    (13) *#1471# Last call (Only vodofone).

    (14) *#21# Allows you to check the number that "All Calls" are diverted to

    (15) *#2640# Displays security code in use.

    (16) *#30# Lets you see the private number.

    (17) *#43# Allows you to check the "Call Waiting" status of your phone.

    (18) *#61# Allows you to check the number that "On No Reply" calls are diverted to.

    (19) *#62# Allows you to check the number that "Divert If Unreachable (no service)" calls
    are diverted to.

    (20) *#67# Allows you to check the number that "On Busy Calls" are diverted to.

    Keywords: Mobile hack,airtel,mobile software,tricks,tips.nokia.
    Source:unclaimed

    Friday, December 7, 2007

    Be Smart:Be Different -- Graphics that represent you!

    Tech Ver.2  
    Now Orkut allows Images and html code on Scrap, many friends asking me to give nice website for collection of animation, images, etc..

    So I decided to suggest some animation sites service providers, try the links below

    Image Generators: imageGenerator.net provides you with an easy way to add text to various images, allowing you to create a funny picture, or to illustrate a joke. You can save these pictures online and send them to your friends, or show them on your favorite message board or website.

    Animation Factory: 500,000 Animations, Animated Clip art, Motion Designs for Video, PowerPoint, Flash, Websites, E-mail and more!. Use our unique animations, Flash designs, video elements, PowerPoint templates, sounds, music, and backgrounds to bring your projects to life! Become a member of Animation Factory and immediately start downloading from our huge library. Hundreds of new items added every week.

    Best Animations: Best Animations is a collection of free animated gifs found on the web. Except where indicated with an asterisk all animated gifs are believed to be free to use. If an asterisk appears next to an animation then you must check the copyright restrictions posted on the site linked at the bottom of the page where the animation appears. Please notify the webmaster if you see a copyrighted animation that is not credited.

    Animation Library: the NEW Animation Library, a site featuring over 13,748 free animations for you to use on your website or send as digital postcards using our powerful Postcard Station. While you are browsing the Animation Library, you can listen to great music by using the Jukebox. To navigate our site, just use the Links in the menu below and on the sidebar to select animation you want to see. Enjoy your visit!

    Gif animations: This is the Internet's original and largest collection of free animated GIFs. Right here, you have access to more than 20,000 animations, clipart and backgrounds. Price tags are not included and no registration is ever necessary. You can put this site on your browser's Favorites menu right now. Just press CTRL + D (works for most browsers). Then come back often to check out the new images that have been added.

    Free animations: All the animations are free to download and use on your websites, emails and desktops. Many of the free animations and graphics have been created by the Webmaster, so you know you are getting original images. The 3D Words and messages are especially interesting. These have been created by the Webmaster using several types of software as listed in the disclaimer.

    Animation Gold: large collection of free animation and clipart that you can download for free. Our archive of animation and clipart includes lots of new animated gifs and clipart you've probably never seen before. We will continue to make new animation and add it to our site. Click the free animation link at the left and it will take you to our animation page where you will find the animation menu listed by category.

    Animation Central: Welcome to animation central where we serve up hundreds of free animations on the best free animated gif archive on the net today.

    fg-a.com: Everything Needed To Build Or Enhance Your Web Site.
    Browse for Animated Gifs, Clipart, Animations, Backgrounds and more

    Animation station: best animations, backgrounds, graphics on net

    Zwani: No Popups... No Spyware... No Spam! Just 1000's of Comments & Graphics To Use Everyday! Zwani.com is THE place to get all of the comments and graphics you could ever need for use on Myspace, friendster, Hi5, Myeeos, your website, friends blog or any other place you want to add a little comment or graphic. From comments and quotes to backgrounds, page codes and glitter graphics we have it all!

    Pimp Hi5: this site provides Hi5 comments, glitters, animation, graphics, layouts, backgrounds, icons, falling hearts and many one

    and you can find more website on Google search. Just click here...
    If you like my work then hope good for this site..thats all this site requires..

    Thursday, December 6, 2007

    Free Mp3 - Parent Directory-1000000000s of songs

    Hey guys I found a great source for free music stuff for all the music buffs...

    I got some parent directory of music site from where you can download 1000s of songs...


    1. Directory1> (quantity music not quality but a must visit)
    2. Directory2

    3. Directory3

    4. Directory4

    5. Big DJ collection(various songs of various DJs

    6. Huge Collection of Songs(songs from a to z)
    7. Themes of various movies and etc..

    The list is still to be updated....

    Monday, December 3, 2007

    Are you ready~!

    We are ready to start a brand new blogsite on today's tech life.We will provide you all the latest information about what you were seeking all time before. We aknowledge all the results.