This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

Friday, December 31, 2010

WinAVI Video Converter 10.0 Final download free!!!!




WinAVI Video Converter is software for video conversion. By using this product, users are released from the limitations and difficulties of video formats.


It can support almost all formats of video including AVI, MPEG1/2/4, VCD/SVCD/DVD, DivX, XVid, ASF, WMV, RM, QuickTime MOV, Flash SWF. Also, it allows you to burn to VCD/SVCD/DVD. A powerful AV compress engine can complete a whole AVI movie conversion and burn it to DVD just in 1 hour. You can enjoy the film with your home & PC DVD Player.

WinAVI Video Converter 10.0 features:

• Improved DVD navigation menu creator. Now creating a DVD menu only takes 10 seconds!
• Customisable DVD navigation menus.
• Supports multiple video/audio and subtitle streams from MKV files.
• Brand new professional advanced settings user interface.
• Supports multi-core processors. Convertion 200-400% faster. (Depending on your computer)
• Brand new more stable video decoder.
• Brand new SWF file decoder.
• Brand new AVI encoder, faster and more stable; supports H.264 codec.
• Automatic updates available.
• Brand new command line version, now more stable.
• Supports Vista & Win7, including 64-bit versions.
DOWNLOAD HERE:

http://rapidshare.com/#!download737l35343763446WinAVI.Video.Converter.10.0.rar10172
THANK YOU...

Thursday, December 30, 2010

Nero Burning ROM 9.4.26.200 free!!!!!!!


Nero Burning ROM is probably the best all-in-one CDR / DVDR / Blu-ray application on the market.Nero combines huge amounts of features in a compact and easy to use package.

Nero Burning ROM 56.6MB
It handles disc duplicating and pre-mastering with ease, supported by a cover designer and even an audio file editor. If you have to settle with just one CDR / DVDR / Blu-ray burning software, then Nero would be it.

DOWNLOAD FROM HERE:
http://www.fileserve.com/file/28aYJzm/NeroROM9.4.26e.rar
http://www.filesonic.com/file/20159911/NeroROM9.4.26e.rar

give me a valuable suggestions
zuberkhan2050@gmail.com
THANK YOU.....

Download WinRAR 4.00 beta Full version free


WinRAR is a powerful archive manager. RAR files can usually compress content by 8 percent to 15 percent more than ZIP files can. WinRAR is a powerful compression tool with many integrated additional functions to help you organize your compressed archives.

WinRAR 4.00 Beta 1 (x86/x64) 3.13 MB


It can backup your data and reduce size of email attachments, decompress RAR, ZIP and other files downloaded from Internet and create new archives in RAR and ZIP file format.
WinRAR puts you ahead of the crowd when it comes to compression. By consistently creating smaller archives, WinRAR is often faster than the competition. This will save you disc space, transmission costs AND valuable working time as well. WinRAR is ideal for multimedia files. WinRAR automatically recognizes and selects the best compression method. The special compression algorithm compresses multimedia files, executables and object libraries

Features of WinRAR:
1)Using WinRAR
puts you ahead of the crowd when it comes to compression by consistently making smaller archives than the competition, saving disk space and transmission costs.
2) WinRAR provides complete support for RAR and ZIP archives and is able to unpack CAB, ARJ, LZH, TAR, GZ, ACE, UUE, BZ2, JAR, ISO, 7Z, Z archives.
3) WinRAR offers a graphic interactive interface utilizing mouse and menus as well as the command line interface.
4) WinRAR is easier to use than many other archivers with the inclusion of a special “Wizard” mode which allows instant access to the basic archiving functions through a simple question and answer procedure. This avoids confusion in the early stages of use.
5)WinRAR offers you the benefit of industry strength archive encryption using AES (Advanced Encryption Standard) with a key of 128 bits.
6) WinRAR supports files and archives up to 8,589 billion gigabytes in size. The number of archived files is, for all practical purposes, unlimited.
7) WinRAR offers the ability to create selfextracting and multivolume archives.
9)Recovery record and recovery volumes allow to reconstruct even physically damaged archives.
10)WinRAR features are constantly being developed to keep WinRAR ahead of the pack.

DOWNLOAD HERE:

http://letitbit.net/download/66209.64742bb91945964c439d45ebeb5e/WinRAR.4.00.b1.rar.html

IF YOUR ANY QUIRE'S CONTACT ME.......

THANK YOU...........

Surf Online Anonymously With Platinam Hide IP !!!

Hi friends...
To day i am going to show you a important tool .So read carefully..

Platinum Hide IP - Give You Platinum Online Privacy Protection! Everyday we read more and more stories about hackers breaking into big businesses, stealing their identities . It’s no wonder that we’ve become wary of the Internet and concerned about the Internet privacy.

How can you stay safe online?
Now, a good solution for you comes out, if you are concerned about you online security. Use Platinum Hide IP to keep your real IP address hidden, surf anonymously, secure all the protocols on your PC, provide full encryption of your activity while working in Internet, and much more.

Key Features

1) Anonymize Your Web Surfing
Your real IP is hidden when you surf on the Internet, keeping your online activity from being tracked by others.
2)Protect Your Identity
Anonymous web surfing enables you to prevent identity thieves from stealing your identity or other personal information, and keep your computer safe from hacker attacks or other risks.
3)Choose IP Country and Check IP
Proxy lists of many countries are enabled and you decide to select one country from the Choose IP Country window. You can check the current IP address directly.
4)Send Anonymous Emails
Send anonymous emails through any web based mail system such as Gmail, Hotmail, etc.
5) Get Unbanned from Forums and Blocked Websites
Change your IP address and then you can get yourself unbanned from any forums or other blocked websites that have ever banned you.
DOWNLOAD HERE:File size 1.53 mb

http://depositfiles.com/en/files/7lgk10ypf
http://hotfile.com/dl/41662145/3b64d87/PlatinumHideIP2.0.8.6.rar.html


Secure Your Wireless Network with Elcomsoft Wireless Auditor!!!!


Do you think that your wireless network is secured?

If your answer is yes then you are absolutely wrong as wireless networks are the weakest link for computer security today, everyday more than hundreds of wifi are being hacked by hackers. Today i will introduce a tool that will Check your Wireless Network Security means it will help you to examine that your wireless network is secured or not i.e . Is your wireless network is secured that is not hackable. If its hackable then how to harden its security so that all hacking attempts can be blocked. Wireless Security Auditor is an auditing tool that will check your wireless security from advanced hacking attempts. This tool is provided by very famous security firm Elcomsoft and tools name Wireless Security Auditor.
This is very special...for blog viewers....
What is Elcomsoft Wireless Auditor?
Elcomsoft Wireless Security Auditor allows network administrators to verify how secure a company’s wireless network is by executing an audit of accessible wireless networks. Featuring patent-pending cost-efficient GPU acceleration technologies, Elcomsoft Wireless Security Auditor attempts to recover the original WPA/WPA2 -PSK text passwords in order to test how secure your wireless environment is. It will check your wireless network security against all types of hacking attempts.

Features and Key Benefits of Wireless Security Auditor:
1) Determine how secure your wireless network is
2)Test the strength of WPA/WPA2-PSK passwords protecting your wireless network
3)Save time with patent-pending GPU acceleration technology when one or more compatible NVIDIA or ATI video cards are present
5)Run advanced dictionary attacks with highly configurable variations
6)Perform attacks from inside or outside of your network
7)How Secure Is Your Wireless Network?
How Wireless Security Auditor Works?
Elcomsoft Wireless Security Auditor examines the security of your wireless network by attempting to break into the network from outside or inside. Elcomsoft Wireless Security Auditor works completely in off-line, undetectable by the Wi-Fi network being probed, by analyzing a dump of network communications in order to attempt to retrieve the original WPA/WPA2-PSK passwords in plain text.

Now for Hackers and Experts point of view we can also use Wireless security auditor to hack others wireless networks as Elcomsoft Wireless Security Auditor performs an advanced dictionary search attack in order to expose weak passwords consisting of words and phrases in spoken languages. Allowing highly customizable mutations of ordinary dictionary words, Elcomsoft Wireless Security Auditor performs hundreds of mutations to each word in order to ensure the widest coverage.
So we can use this tool for both hacking and securing purposes. As everything has some pros and cons, its upto user how he see's it and how he utilizes the opportunity.
DOWNLOAD HERE...

Wednesday, December 29, 2010

Recover Your Deleted or Curropted Photos...


Hello Friends,

Today I will provide a software named DiskInternals Flash Recovery 4.2 full download using which you can recover deleted or corrupted photos within few seconds. Isn't that nice, its best that you can recover all your deleted data from the flash memory cards used in cameras.


DiskInternals Flash Recovery is a flash memory file recovery tool that restores all corrupted and deleted photographs or the ones that were lost due to hardware malfunction. This utility works even if a memory card was re-formatted.

Features:
1) Easy Recovery Wizard.
2) Can preview and recover JPEG, JPG, TIFF, BMP, PNG, GIF, TGA and other images.
3) Can preview and recover RAW images:
4)CRW - Canon Digital Camera Raw Image Format.
4)CR2 - Canon Digital Camera Raw Image Format version 2.0.
5 )NEF - Nikon Digital SLR Camera Raw Image File.
6) PEF - Pentax Raw Image Format
7) RAF - Fuji CCD-RAW Graphic File.
8)X3F - Sigma Camera RAW Picture File.
9)BAY - Kodak/Roper Bayer Picture Sequence.
10) ORF - Descent 3 Outrage Room Format.
11)MRW - Minolta Diamage Raw Image File.
12)RAW - Image Alchemy HSI Temporary Raw Bitmap
13) SRF - Sony DSC-F828 Raw Image File.
14) Other RAW images
•Works under Microsoft® Windows® 95, 98, ME, NT, 2000, XP, 2003 Server.
• Supported file systems: FAT12, FAT16, FAT32, NTFS (NT 4), NTFS5 (2000, XP).
• Recovered files can be saved on any (including network) disks visible to the host operating system.
• Creates recovery snapshot files for logical drives. Such files can be processed like regular disks.


DOWNLOAD HERE:
http://hotfile.com/dl/88563290/d084662/DiskInternals_Flash_Recovery_v4.2.rar.html DiskInternals_Flash_Recovery_v4.2.rar 6.6 MB

Tuesday, December 28, 2010

Protect Your PC from Key Loggers!!!!

Hi friends,,,,,

To day I am going to show you a Important article about"KEY LOGGERS".

1)Key Loggers, like the name suggests, are programs that record keystrokes from the computer keyboard and either logs it to the computer or sends it to its maker through a built in e-mail engine.


2)Key logging allows a prospective hacker to gain access to the user name, passwords, and even id numbers entered into sensitive online bank accounts or passwords to remote control programs.


You can find the list of latest keyloggers here
http://www.keylogger.org

Use This to check if your computer has any keyloggers installed, you can get it here

http://www.psmantikeyloger.sourceforge.net/prod03.htm
Here are a few other ways to be safe from harmful effects of key loggers

Monitoring what programs are running

3)A user should constantly
observe the programs which are installed on his or her machine. Also, devices connected to PS/2 and USB ports (which have both been hacked) can be used to secretly install a keylogger and then remove it (along with the user’s data) by the perpetrator.

Anti-spyware

4)Anti-spyware applications are able to detect many keyloggers and cleanse them. Responsible vendors of monitoring software support detection by anti-spyware programs, thus preventing abuse of the software.

* Firewall

5)Enabling a firewall does not stop keyloggers per second, but can possibly prevent transmission of the logged material over the net if properly configured.

* Network monitors

6)Network monitors (also known as reverse-firewalls) can be used to alert the user whenever an application attempts to make a network connection. This gives the user the chance to prevent the keylogger from “phoning home” with his or her typed information.

* Anti-keylogging software

7)Keylogger detection software is also available. Some of this type of software use “signatures” from a list of all known keyloggers. The PC’s legitimate users can then periodically run a scan from this list, and the software looks for the items from the list on the hard-drive. One drawback of this approach is that it only protects from keyloggers on the signature-based list, with the PC remaining vulnerable to other keyloggers.

Other detection software doesn’t use a signature list, but instead analyzes the working methods of many modules in the PC, allowing it to block the work of many different types of keylogger. One drawback of this approach is that it can also block legitimate, non-keylogging software. Some heuristics-based anti-keyloggers have the option to unblock known good software, but this can cause difficulties for inexperienced users.

* One-time passwords (OTP)

8)Using one-time passwords is completely keylogger-safe because the recorded password is always invalidated right after it’s used. This solution is useful if you are often using public computers where you can’t verify what is running on them. One-time passwords also prevents replay attacks where an attacker uses the old information to impersonate. One example is online banking where one-time passwords are implemented and prevents the account from keylogging attacks as well as replay attacks.

* Automatic form filler programs

9)Automatic form-filling programs can prevent keylogging entirely by not using the keyboard at all. Form fillers are primarily designed for web browsers to fill in checkout pages and log users into their accounts. Once the user’s account and credit card information has been entered into the program, it will be automatically entered into forms without ever using the keyboard or clipboard, thereby reducing the possibility that private data is being recorded. (Someone with access to browser internals and/or memory can often still get to this information; if SSL is not used, network sniffers and proxy tools can easily be used to obtain private information too.)

It is important to generate passwords in a fashion that is invisible to keyloggers and screenshot utilities. Using a browser integrated form filler and password generator that does not just pop up a password on the screen is therefore key. Programs that do this can generate and fill passwords without ever using the keyboard or clipboard.

* Drag & Drop

10)Most keyloggers cannot intercept texts which are drag & dropped from one window to another[citation needed][dubious – discuss]. With the help of this technique, sensitive data could be transferred, for example, from a password manager to the target application[citation needed].

* Non-technological methods

Most key loggers can be fooled by alternating between typing the login credentials and typing characters somewhere else in the focus window. Similarly, one can move their cursor using the mouse during typing, causing the logged keystrokes to be in the wrong order. One can also use context menus to remove, copy, cut and paste parts of the typed text without using the keyboard.

IF YOU ARE ANY QUIRE'S PLEASE CONTACT ME....
THANK YOU

Top Ten Tips To Improve System Speed!!!!!!!

1)Let your PC boot up completely before opening any applications.

2)Refresh the desktop after closing any application. This will remove any unused files from the RAM.

3)Do not set very large file size images as your wallpaper. Do not keep a wallpaper at all if your PC is low on RAM (less than 64 MB).

4)Do not clutter your Desktop with a lot of shortcuts. Each shortcut on the desktop uses up to 500 bytes of RAM

5)Empty the recycle bin regularly. The files are not really deleted from your hard drive until you empty the recycle bin.

6)Delete the temporary internet files regularly.

7)Defragment your hard drive once every two months. This will free up a lot of space on your hard drive and rearrange the files so that your applications run faster.

8)Always make two partitions in your hard drive. Install all large Softwares (like PSP, Photoshop, 3DS Max etc) in the second partition. Windows uses all the available empty space in C drive as virtual memory when your Computer RAM is full. Keep the C Drive as empty as possible.


9)When installing new Softwares disable the option of having a tray icon. The tray icons use up available RAM, and also slow down the booting of your PC. Also disable the option of starting the application automatically when the PC boots. You can disable these options later on also from the Tools or preferences menu in your application.

10) Protect your PC from dust. Dust causes the CPU cooling fan to jam and slow down thereby gradually heating your CPU and affecting the processing speed. Use compressed air to blow out any dust from the CPU. Never use vacuum.

Monday, December 27, 2010

ACCESS YOUR GMAIL IN OFFLINE!!!!!!!!

HI FRIENDS.....

Today I am going to show how to access GMAIL in offline.

GMail introduced a new feature recently, that is browsing mails offline.
First you need to install Google Gears, you can download the online installer from here
http://gears.google.com/
Run the online installer and it will install Google Gears on your system.
Now open your GMail and navigate to the settings and then to the Labs tab, there you will find a feature called offline, Enable that.
It will ask your permission to install offline access for GMail, click next.
Then you get a Google Gears security warning, allow it.
Click ok in the next window and you are done.It will download all your mails to your hard drive for offline browsing. You can see the status in the status window.
SO enjoy GMAIL....
THANK YOU......

Sunday, December 26, 2010

Enable or Disable Windows Task Manager!!!!

Task maneger is a powerful windows tool for managing System service, Starting and closing
applications,process and moniting system activity. It is basically extended version of run box and it comes very handy to operate within Windows system. That’s way many system administrators prefer to disable task manager on public computers to restrict access to major critical system resources which could lead to system compromise.Here I will show you how to modify registry to disable and re-enable Windows task manager.

1)Go to the START->RUN and type 'regedit'(without quotes)
2)And find input named as
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System.
And here enabled or disable your taskmaneger

3)If you do not see “System” folder under Policies you can create it by right mouse click on Policies > Key > and name it System. Than point your mouse pointer to an empty area, right click it and choose create new DWORD (32 bit) value.
4)Name it DisableTaskMgr and press enter. Than double click it and set Hexadecimal value to1. Press enter and reboot computer.
5)After than task manager will be disabled on your machine and inaccessible.
6)If you later decide to enable task manager again, navigate once against to dword 32 value we just created and simply delete it or change value to 0. Navigate to
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
THANK YOU....

Types Of Viruses!!!!

According to the perfect pc maintainers must know about viruses And clasess.
viruses are mostly divided into 6 types.so Let'see.
The different types of viruses are as follows-

1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.
Examples of boot- sector viruses are Michelangelo and Stoned.

2) File or Program Viruses :- Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .
Some common file viruses are Sunday, Cascade.

3) Multipartite Viruses :- A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector.This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.
Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.Other examples are Invader, Flip, etc.

4) Stealth Viruses :- These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.

5) Polymorphic Viruses :- Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presence.

6) Macro Viruses :- A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa Worm.

IF YOUR ANY DOUBTS
PLEASE CONTACT ME.

THANK YOU.

Saturday, December 25, 2010

Download DAP Full version with serial key!!!!

Hi friends,
This post especially dedicated to My friend "Avinash".
Download accelerator Plus(DAP) is the most popular download accelerator .
Here I am giving a brief information about Dap.Using the DAP you can get
fastest download speeds,with privacy and security.It can resume supports
and error recovery.DAP automatically recovers from shutdowns,lost
connections,and other errors.It is fully integrated into Net speed,Opera
Internet explorer,Mozilla/FireFox and offers a toolbar for Internet Explorer
with link catcher and highlighter,providing the best performance from
Any Internet connection (cable,DSL/ADsL,T1,dail-up etc) .
FEATURES:-
1.Download speed-Download files as possible speed.
2.Trusted-Over 165 million Users for DAp
3.Recognized-World economic Forum 2008 Technology .
4.Proven-advanced patented technology.
5.Pause&Resume:-Continue option for broken or paused downloads(Use in power loss)
6.Zip preview-Preview and extract Zip files as they download.
7.Private folder-lock ,hide,and protect your downloads.
8.Broadband Optimization-Get more speed form your Internet connections
9.Download security-Downloading files safer&secure about your Files.
Some more Features:
1.Preview pane-Preview downloads of music and video files
2.Download list-Advanced management of downloads queues.
Video Expansions:
1.Speed Bit video downloader-Download YouTube and web videos .
2.SpeedBiit video Accelerator-Watch YouTube and web videos Without
pauses and buffering.
Only with Dap Premium:-
1.Extremely faster - x10 connections per download!•
2.Absolutely no advertisements!•
3.Totally customized download experience!•
4.Shredder to totally eliminate files you don't need!•
5.Trace Cleaner -keep your privacy after browsing!•
6.Preview & extract zip files while downloading!•
7.Cool new look, more comfortable management features!.
DOWNLOADHERE:
http://hotfile.com/dl/26176220/68e1fbf/Download_Accelerator_Plus_PRO_v9.4.0.0b.rar.html

So Enjoy downloads and keep smile.
Thank you.....

Chek Your china mobile IMEI Number Valid??


Mobile number Without Or wrong IMEI number are banned
across India now.So we must know our IMEI number valid or
not.
1)Press *#06# on your mobile handset and note down 15 digit
IMEI number
2)Compose a new message from your mobile and type 15 digit
IMEI number and send it to 53232.
3)If you get "success" as the reply,then your mobile IMEI
number is valid.
4)if you get "Invalid IMEI" as reply,that means your IMEI
number is not valid
5)So let's try.

Friday, December 24, 2010

My best Master Code Collection!!!!

BOSCH

IMEI Number: * # 0 6 #
Dafault Language: * # 0 0 0 0 #
Net Monitor: * # 3 2 6 2 2 5 5 * 8 3 7 8
#DANCALL
IMEI number: * # 0 6 #
Software version: * # 9 9 9 9 #
ENOL
Service menu: *#987*00#
Full reset: *#987*99#
SW version: *#900#
ERICSSON 6xx/7xx/8xx
IMEI number: * # 0 6 #
Software version: > * < < * < *
ERICSSON A1018S/T10S/T18S/T28S
IMEI number: * # 0 6 #
Software version: > * < < * < *
Default language: <>

FLY BIRD
S688: #*301#02# send - with SIm
Menu: 7 - 10 - ok
Reboot repair: #*8000#, #*3676#
Service menu: V09, S1180 - *, 3 times down, 3 times up
LG
Service menu (code reset)(W510 W3000 G5300 L1100 C1200 G7100...):
2945#*#
Hold (LG 500,600): 2945#*
Service Menu B1200: *+pwr, 6,6,8
Service Menu B1300: *+pwr, 1,5,9
Security removing code for LG 8110,8120: 47328545454# or 277634#*#
MAXON
IMEI number: * # 0 6 #
Software Version: *#9900#
Batch: *#9901#
Developer Team names: *#9908#
L1 Debug on/off (NetMonitor): *#9911#
Forbidden List: *#9912#
bDAC: *#9913#
Service Active: *#9916#
Lock Status: *#9917#
Names Maxxon , Audioloop , GCS .. : *#9919..9922#
Forced Location Update: *#9924#
Backlight off when charging: *#9931#
Discharging battery: *#9937#
Watch stop: *#9958#
Watch start: *#9959#
Contrast set: *#9960#
Menu, reset (without SIM): *#9922#
Software Version: *#9900#
Software Version (PBatch): *#9901# ">
S60 Siries (SX1, 6600, N-Gage..) ">
Factory default: *#7780#
Full factory defaults (all user data reset): *#7370#
SX1 formating: * + # + power on
6600 formating: 3 + * + send + power on
Sendo X1 formating: 5 + power on
MOTOROLA
Master code (T190, T191, T205): 19980722, 20010903
P2K test menu: *#06#, menu, menu, 048263*
Test comands:
Read phone code: 32*116*1*0*0
Read security code: 32*118*1*0*0
Factory reset, phone code off: 18*0
Master reset: 18*1
Full phone reset: 54*18*1
Select 900/1800: 10*0*6
Model: 32*279*1*0*8
Flex version: 32*383*1*0*0
Hard reset MPx200 - blue button + power on
NOKIA
Code reset (6230): *#7370925538#
Sim clock: *#746025625# [*#sim0clock#]
Waranty: *#92702689# [*#war0anty#]
NOKIA 5110/5120/5130/5190
IMEI number: * # 0 6 #
Software version: * # 0 0 0 0 #
Simlock info: * # 9 2 7 0 2 6 8 9 # ">
Enhanced Full Rate: * 3 3 7 0 # [ # 3 3 7 0 # off]
Half Rate: * 4 7 2 0 # ">
Provider lock status: #pw+1234567890+1
Network lock status #pw+1234567890+2
Provider lock status: #pw+1234567890+3
SimCard lock status: #pw+1234567890+4
NOKIA 6110/6120/6130/6150/6190
IMEI number: * # 0 6 #
Software version: * # 0 0 0 0 #
Simlock info: * # 9 2 7 0 2 6 8 9 # ">
Enhanced Full Rate: * 3 3 7 0 # [ # 3 3 7 0 # off]
Half Rate: * 4 7 2 0 #
NOKIA 3110
IMEI number: * # 0 6 #
Software version: * # 0 0 0 0 # or * # 9 9 9 9 # or * # 3 1 1 0 #
Simlock info: * # 9 2 7 0 2 6 8 9 #
PANASONIC
Master reset (user data, user code) A100, A101, A102, G50, G51, G70, GD55, ...: *01763*737381#
Menu: *369#(*)
Lock menu: 746 menu, menu
5 sec after power on - SW version (GD75, GD67, GD87..): *#9999#
PHILIPS
IMEI number: * # 0 6 #
Simlock info: * # 8 3 7 7 #
Security code: * # 1 2 3 4 # (Fizz) or * # 7 4 8 9 #
630 without SIM (erase flash): #20021208#
RSAV DONE: *#7728*#
Reboot: *#3849*#
Reboot: *#3851*#
Philips 568 reset: *01763*737381#
SAMSUNG
Full E2P reset: *2767*3855#
Custom E2P reset: *2767*2878#
Unlock: #*7337#
Unlock: *2767*688#
Contrast: *#0523#
Service Menu (X100): *#8999*8378#
SAMSUNG SGH600/2100DB
IMEI number: * # 0 6 #
Software version: * # 9 9 9 9 # albo * # 0 8 3 7 #
Net Monitor: * # 0 3 2 4 #
Chaning LCD contrast: * # 0 5 2 3 # ">
Memory info: * # 0 3 7 7 # albo * # 0 2 4 6 # : none">
Reset pamieci (SIMLOCK`a removing!!!): *2767*3855#
Reset pamieci CUSTOM: *2767*2878#
Battery state: * # 9 9 9 8 * 2 2 8 #
Alarm beeper: *#9998*289#
Vibra test: *#9998*842#
SONY ERICSSON
Service menu: > * < < * < *
Lock menu: < * * <
VK MOBILE
SW version: *#79#
Hold menu: *#85*364# (*)
Without SIM (VG107): 855855#
Hold: 85558555#(*)
Hold (VG207): 4268#(*)

THANK YOU...


A Challenge to you!!!

An Indian discovered that nobody can create a FOLDER anywhere on
the computer which can be named as"CON".This is very cool...
and Unbelievable ...at Microsoft the whole team,couldn't answer
why this happened!!!
So salute Indians!!!
Try to create a folders in windows with either of these names.....
"con"&"Aux","Lpt1","nul".

Windows didn't recognize the above names a folder name..
con means to the console..
Lpt1 means to the printer ......
try these....
CON,PRN,AUX,COM7,COM8,COM9,LPT1,LPT2,LPT3,LPT4,LPT5
LPT6,LPT7.LPT8,LPT9,NUL,COM1 ....TO...COM9....

Clean your Non Useful Files In Windows!!!!

Hi to every one.


To day i am going to show to make a notepad Ccleaner.we can make
amazing tricks with notepad.
As well as the better speed of windows we need to clean the Non
useful files like some extensions of files which are Not useful in windows....*.tmp,*.log,*.chk,*old,*bak,*._mp,*.gid and Temporary Internet
Files etc.....

The basic program that most of the cleaners uses...I just describing


with you that How it works....
Making Of Cleaner...In steps:

Step1:Open the Notepad.
Step2:Paste this code in the notepad:
Code:
Select all
@echo off
echo Webhog Cleaner
echo waiting
del /f /s /q %systemdrive%\*.tmp
del /f /s /q %systemdrive%\*._mp
del /f /s /q %systemdrive%\*.log
del /f /s /q %systemdrive%\*.gid
del /f /s /q %systemdrive%\*.chk
del /f /s /q %systemdrive%\*.old
del /f /s /q %systemdrive%\recycled\*. *
del /f /s /q %windir%\*.bak
del /f /s /q %windir%\prefetch\*.*
rd /s /q %windir%\temp & md %windir%\temp
del /f /q %userprofile%\cookies\*.*
del /f /q %userprofile%\recent\*.*
del /f /s /q ?%userprofile%\Local Settings\Temporary Internet Files\*.*?
del /f /s /q ?%userprofile%\Local Settings\Temp\*.*?
del /f /s /q ?%userprofile%\recent\*.* ?
echo complete!
echo. & pause

3)now notepad "save as" cleaner.bat(don't forget)
and see what happens.

Speed Up your internet By 20% manually!!!

This is a nice little tweak to get 20% band width back.Microsoft reserve
20% of your bradbandwidth for their own purposes(supports for
updates and interrogating your machine etc..)..
1).Click Starts->Run->type "gpedit.msc"(without quotes).
This opens the group policy editor. Then go to
Local computer policy->Computer configuration->Administative
Templates->Network->Qos packet scheduler->Limit reservable Bandwidth.

2)Click Enable and Double click on Limit reservable band width and set
it "ZERO"





Hide your IP Proxy Server!!!!

Hi to every one,to day i am going how to hide a IP address proxy server.
First of all we know what is Ip.
IP:"Internet protocol" is the short form of IP.It is te set of techniques
used by many hosts for transmitting data over the Internet.the
current version of the Internet protocol is IPv4,which provides
32-bit address system.
Every device connected to network,be it a local area network(LAN)
or the Internet,is given as Internet protocol number.This address
is used to identify the device uniquely among all other devices
connected to the extended network.
1.Go to
http://www.anonymouse.org/
2.type the website address which you want see after selecting the
language.Then press Enter.
4.Now your viewing the website anonymously.
5.the website admin does not know your IP address.he sees ip address some
port of the world.

Increase your net speed manually!!!


First of all go to start then run.
now type regedit in the box.
select the folder named
HKEY_LOCAL_MACHINE_system\currentcontrolSet\services\VxD\MS
TCP
Now,find the string Default Rcv window.
Now,edit the number to 64240(was 65535).
Reboot your PC and you have done your job.

Thursday, December 23, 2010

Dot Trick for GMAIL!!!!


Hi Friends,

To day i going to show a amazing trick for you that is GMAIL DoT TRICK.

really amazing.. check it.
Suppose there is a gmail account:abcd@gmail.com
with password:123456
we can login above user account as :a.bcd@gmail.com
password:123456
email as:ab.cd@gamil.com
password:123456
email as:abc.d@gmail.com
password:123456
so that means gmail does not count periods(.).so isn't its Greate....
Thank you....

Wednesday, December 22, 2010

Folder Lock Full software hotfile Download!!



Folder lock software is a fast file-security software that can lock,hide or encrypt of any number of files,folders,pictures and documents in seconds.It is fast ,reliable,portable and convenient.


folder lock is a computer protect software application that password protects and locks your


personal files and folders.
What is folderLOck?
folder lock is a faster file locking and file encryption software that can password protect
folder,encrypt or lock files ,protect USB Drives and lock CDs/DVDs.
SUPPORTING OS:-
Windows7
Vista
Xp all to 2000 including their 64-bit variants.
How does work:-Folder lock creates encrypted storage's called "Lockers'.You can keep as many as your private files,folders in locker and password protected with single click.lockers
are portable, so you can transfer,secure and backup these Lockers or keep them in Drives,
Cds/DVDs, &notebook or transfer them over email.these Lockers are undeletable on the computer where Folder Lock in installed.
You create as many Lockers are you want.you can lock different folders with different passwords as well.Each locker can contain your encrypted files as well as your personal
list of your locked items.
Folderlock is the most download File Encryption software in the market with more
than 15million downloads to date.
Features and benefits:-
1)256-bit AES encryption:The fastest file encryption software that uses on the-fly
encryption(military standard)for file protection.
2)Filelock,folderlock,drivelock,file encryption,folder encryption.All in one complete package.
3)Full portability: password protected USB drives,lock CDs&DVDs and shere password
with trusted friends.
4)Backup or transfer your password protected Lockers any where.All data sits in place for
easy backup.
5)Undeletable Lockers (on the Pc where folder lock is installed).deletion requires you to login
into the Folder Lock
6)Hack attempt Monitoring option can monitor fake password attempts and can Shutdown Pc automatically.
7)Complete Privacy!Whether your connected with privacy,data theft,data loss,
data leakes or virus attacks.you need folder lock!

Thank you..

Download Here:-

http://hotfile.com/dl/87553715/9df0778/Folder.Lock.6.5.2.rar.html

http://letitbit.net/download/41469.432d8dd0b009117766abaa07c447/Folder.Lock.6.5.2.rar.html

http://vip-file.com/downloadlib/896739939710728535638184-41469.432d8dd0b009117766abaa07c447/Folder.Lock.6.5.2.rar.html

Some cool note pad tricKs..


Hey friends welcome back to day i am going to shere a few notepad tricks.They are really

cool and crazy one's.So please atleast three or foure times use them on your PC.

1)UNLIMITED NOTEPAD WINDOWS TRICK!!

This will pop up endless notepad until the computer freezes and crashes.copy the

below code in notepad and save as ".vbs" extension.

code:

@ECHO off

:top

START%systemRoot%\system32\notepad.exe

GOTO top
CAPS LOCK CRAZY TRICK
2)This constantly turns caps lock on and off really fast continuously.
CODE:-
set wshshell=wscript.CreateObject("WScript.shell")
do
wscript.sleep100
wshshell.sendkeys "{CAPSLOCK}"
loop
UNLIMITED BACKSPACE HACK
This makes it so the backspace key is constantly being passed.
code:-
MsgBox "Let's go back a few steps"
Set wshShell=wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wsshell.sendkeys "{bs}"
loop
Hack your friends keyboard and make him type "You are a fool" Simultaneously:
code:
set wshShell=wscript.createObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "Yor are a fool".
loop

Hack admin password when you forget.

Hi frends ..
This hack for educational purpose only!!!!
1)First of all click run->cmd
2)and type "net user"(without quotes") and hit enter.
3)After you see that a user name of that computer(e.g zuber)
4)Now you know the username of the computer .For the password after computer
type in " net user zuber* " (without quotes)
Thank you ....

Tuesday, December 21, 2010

Turn off Autoplay for CD'S!!!!!

1)Click start->run,type GPEDIT.MSC to open Group policy in the microsoft
Management Console.
2)Double-click Computer configuration,double-click Administrative templates,
double-click system,and then click Turn off autoplay.
3)The instruction on your screen describe how to configure this setting.click
Properties to display the settings dialog.
4)Click Enabled,and choose CD-Rom drives,then click Ok,to stop CD autoplay.
this setting does not prevent Autoplay for music CDs.
Thank you.....

Hide your files in a JPEG file

Hide your files in JPEG!!!!!
For this you only need to download Winrar.You just need to have little
knowledge about command prompt and have WinRAR installed.
1)Gather all files that you wish to hide in a folder anywhere in your PC
(make in C:hidden-RECOMMENDED).
2)Now, add those files in a RAR archive(e.g.secret.rar).this file should
also be in the same directory(C:\hidden).
3)Now,look for a simple JPEG picture file(e.g.logo.jpg).Copy/paste that
file also in C:\hidden.
4)Now,open command prompt(Go to run and type'cmd').Make your working
directory C:\hidden.
5)Now type:"COPY/b logo.jpg+secret.rar output.jpg "(without quotes) Now
,logo.jpg is the picture you want to show,secret.rar is the file to be hidden,
and output.jpg is the file which contains both.
6)Now,after you have done this, you will see a file see a file output.jpg in
C:\hidden.Open it(double-click)and it will show the picture you wanted to
to show.Now try opening the same file with WinRAR,it will show the hidden
archive......
Thank you...
Turn-off right mouse click on your desktop !!
1.Click start and choose Run.
2.In run windows type regedit
3.go to
HKEY_CURRENT_USER\software\microsoft\Windows\currentVersion\
policies\explorer
and
HKEY_LOCAL_MACHINE\micrisoft\windows\CurrentVersion\policies\
Explorer
4.In both of them find next time No view context menu and give her
a value o to turn-off right mouse click or 1 to turn-on,if this value don't
exists create new DWORD with same value.

CMD Shortcuts

KEYBORDSHORT CUTS!!!
Start>Run>
1)Certificates-certmgr.msc
2)Indexing Servies-ciadv.msc
3)Computer Management-compmgmt.msc
4)Device manager-devmgmt.msc
5)disk Defragmenter-drg.msc
6)Disk Management-diskmgmt.msc
7)Event viewer-eventvwr.msc
8)SharedFolder-fsmgmt.msc
9)Event viewer-fsmgmt.msc
10)local user and groups-lusrmgr.msc
11)Shared Folders-fsmgmt.msc
12)removable storage-ntmsmgr.msc
13)removeble store Operator Requests-ntmsoprq.msc
14)performence-perfmon.msc
15)Services-services.msc
16)Windows Magement Infrastructure(WMI)-wmimgmt.msc

Download youtube videos easily

Download youtube videos easily

http://www.kissyoutube.com is the most useful site download youtube videos.

we can download videos in 3 steps with no software and no regstraton. so let see.

1)Open the website and paste the youtube url in the URLBOX

2)And click format which you want like(.avi,.flv like that)

3)Click the button "DOWNLOAD"

So enjoy YOUTUBE...

thank you.

Monday, December 20, 2010

Speed up Mozilla firefox about 30 times faster

Speed up mozilla 30 times faster:
HI TO EVERY ONE.
1)first of all TYpe "about:config" in the address bar and hit enter.Scroll down and look
for the following entries:
network.http.pipelining
network.http.proxy.pipelining
network.http.pipelinning.maxrequests
Normally the browser will make one request to web page a time
When you enable pipelining it will make several at once,which really
speeds up page loading.
2)alter the entries as follows:
set "network.http.pipelining" to "true"
Set "network.http.proxy.pipelining" to "true"
Set"network.http.pipelining.maxrequests" to some number like 30.this
means it will make 30 requests at once.
3.)lastly right-click on anywhere and select New->integer
name it "nglayout.initialpaint.delay" and set it's value to "0".
This value is the amount of time the browser waits before it acts on the
information it recieves.
(note:"recomended that always use firefox for safer browsing")
if you're using a brodband connection you"ll load pages 30 times faster now.
thank you.