This is default featured slide 1 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.
This is default featured slide 2 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.
This is default featured slide 3 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.
This is default featured slide 4 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.
This is default featured slide 5 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.
Sunday, February 20, 2011
Download youtube videos directly
Sunday, February 6, 2011
Friday, January 28, 2011
Usefull Computer Tips!!
Hi,Guys..
Here Is Small Tips But Very Use Full..Let's Read.
One Screen KeyBoard:
On screen keyboard is one of the coolest windows features that displays a virtual keyboard on the computer screen that allows people with mobility impairments to type data by using a pointing device or joystick..
Use Keyboard As Mouse:-
When mouse isn’t working properly , this trick can be very helpful. To activate mouse keys all you do is press Alt+Left shift key + NumLock and click OK or press enter
Use the Numerical pad for controlling the mouse pointer.
5 is for click.
+ is for double click
- for right click.
Top 4 Websites for Free EBOOKS!!!
Hi Guys,
Here Is Some Useful Websites To Download Free E-books.so Look At This..
1. EBOOKS-IT
Download Lovely Folders 4.0 For Free!!!
Allow more than 2 simultaneous downloads in Internet explorer!!!
1. Start Registry Editor (Regedt32.exe).
2. Locate the following key in the registry:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
3. On the Edit menu, click Add Value (a dword) , and then add the following registry values:
“MaxConnectionsPer1_0Server”=Dword:0000000a
“MaxConnectionsPerServer”=Dword:0000000a
4. Quit Registry Editor.
Monday, January 17, 2011
Best Tested PROXY Websites!!!
Here Is my Another Blog Check It out
http://southsongs4u.blogspot.com/
And Here The List Below The Best And 100% Tested Proxy Sites
www.kproxy.com
http://www.shadow.com/
http://miss.info/
http://4proxy.com/
http://conqueror.info/
https://proxify.com/
http://www.morepress.info/
http://nyclife.org/
http://www.pagewash.com/
Wednesday, January 12, 2011
Turning off System Beeps!!!
To day iam coming back With small tip...
Turning off System Beeps
If you want to turn off all system beeps (like the ones that go through your computers’ internal speaker):
Start RegeditGo to HKEY_CURRENT_USER\Control Panel\SoundEdit the key Beep and give it a value of No
Download reg file.....
Desktop Shortcut For One Click Shutdown Your PC!!
Steps In sequence:
Navigate to your desktop.
On the desktop, right-click and go to New, then to Shortcut (in other words, create a new shortcut).
You should now see a pop-up window instructing you to enter a command line path.
Use this path in “Type Location of the Item”
SHUTDOWN -s -t 01
If the C: drive is not your local hard drive, then replace “C” with the correct letter of the hard drive. Click the “Next” button. Name the shortcut and click the “Finish” button. Now whenever you want to shut down, just click on this shortcut and you’re done.
Remove shared documents folder from My Computer window
Tuesday, January 11, 2011
Complete Information About TROJON HORSE!!!
"A Trojan horse is an apparently useful program containing hidden functions that can exploit the privileges of the user [running the program], with a resulting security threat.". - CERT Advisory
Types of Trojan :- The different types of Trojan Horses are as follows-
2) Data Sending Trojans :- A type of a Trojan horse that is designed to provide the attacker with sensitive data such as passwords, credit card information, log files, e-mail address or IM contact lists. They could install a keylogger and send all recorded keystrokes back to the attacker.
3) Destructive Trojans :- Once this Trojan is installed on your computer, it will begin to systematically or completely randomly delete information from your computer. This can include files, folders, registry entries, and important system files, which likely to cause the failure of your operating system.
4) Proxy Trojans :- A type of Trojan horse designed to use the victim's computer as a proxy server. This gives the attacker the opportunity to conduct illegal activities, or even to use your system to launch malicious attacks against other networks.
5) FTP Trojans :- A type of Trojan horse designed to open port 21 (FTP) and acts like an FTP server. Once installed, the attacker not only could download/upload files/programs to victim's computer but also install further malware on your computer.
6) Security Software Disabler Trojan :- A type of Trojan horse designed stop or kill security programs such as an antivirus program or firewall without the user knowing. This Trojan type is normally combined with another type of Trojan as a payload.
7) DoS Attack Trojans :- These trojans are used by the attacker to launch a DoS/DDoS attack against some website or network or any individual. In this case they are well known as "Zombies".
How Trojan Works ?
It is necessary for the attacker to know the victim’s IP address to connect to his/her machine. Many Trojans include the ability to mail the victim’s IP and/or message the attacker via ICQ or IRC. This system is used when the victim has a dynamic IP, that is, every time he connects to the Internet, he is assigned a different IP (most dial-up users have this). ADSL users have static IPs, meaning that in this case, the infected IP is always known to the attacker; this makes it considerably easier for an attacker to connect to your machine.
Most Trojans use an auto-starting method that allows them to restart and grant an attacker access to your machine even when you shut down your computer.
How Trojan Horses Are Installed ? Infection from Trojans is alarmingly simple. Following are very common ways to become infected that most computer users perform on a very regular basis.
- Software Downloads
- Websites containing executable content (ActiveX control)
- Email Attachments
- Application Exploits (Flaws in a web applications)
- Social Engineering Attacks
The Removal :- Antivirus software is designed to detect and delete Trojan horses ideally preventing them from ever being install
Monday, January 10, 2011
Danger of ”ctrl+c” in web!!!!
This copied data is stored in clipboard and is accessible from the net by a combination of Javascripts and ASP.
Just try this:
1) Copy any text by ‘ctrl+c’
2) Click the Link: http://www.sourcecodesworld.com/special/clipboard.asp
You will see the text you copied on the Screen which was accessed by this web page. (Check it out !!)
Do not keep sensitive data (like passwords, reditcard numbers, PIN etc.) in the clipboard while surfing the web.
It is extremely easy to extract the text stored in the clipboard to steal your sensitive information.Be cautious …
To avoid Clipboard Hack Problem,
Do the following:
1) In Internet Explorer, Go to Tools -> Internet options -> Security
2) Press Custom level.
3) In the security settings, select disable under Allow paste operations via script and click on ‘OK.
(I think in windows7 allow paste operation renamed as allow programmatic clipboard access)
(Now the contents of your clipboard are safe.)
Happy Surfing……
Thank you....
Sunday, January 9, 2011
KILLING MOSQUITOES WITH YOUR COMPUTER..!!
To day iam going share with you a funny Fact..so read carefully
Did you know we can kill mosquito's with pc.. it could sound little funny but read it completely till end.. and i m damn sure in last u gonna come up with HEY ITS WORKED.......
Have u ever thought about KILLING MOSQUITOES WITH YOUR COMPUTER..!!
here is the way for you..
According to do this we can use sound generator software...
actually how it works.. Dragonflies are deadly enemies of Mosquitoes, cockroaches and those annoying insects..during there flight they generate a sound having frequency (approximately) between 67 Hz and 45 Hz, depending on their sizes.
So what are we going to do here is generating a sound of this frequency from our speakers which will keep them away and sound of this frequency also kills all those insect so it gonna work in this manner..
56 Hz is a good average number in between those frequencies. Your PC sound card and speakers will work well for this purpose. There are many sound and tone generator programs available on the Internet for both the Mac and Windows PC. Setup your computer with the sound/tone generator program running and then play the sound through your computer speakers. The speakers can be aimed directionally for complete room coverage.
The sound level on the speakers should be adjusted so it is barely audible. This arrangement can be setup in a bedroom where you would like to have the window open but are worried about mosquitoes. One speaker should be fairly close to where you are sleeping.
Here are some links to more advanced tone generator software which can actually sweep between the 45 Hz and 67 Hz frequencies:
You can also download this program free for this porpose : http://adf.ly/8m1H open(Click on SKIP ADD after ing the link)
download from here for free: http://adf.ly/8m0q (Click on SKIP AD after opening the link)
So after downloading any of above program all what u have to do is install them .. play and set the sound between 67 Hz to 45 Hz and play.. that's it..
We can also do this with Anti Mosquito software..... Try this
http://hotfile.com/dl/67895832/fe2244e/Anti_Mosquito_Software_v1.0.rar.html
Saturday, January 8, 2011
Send Free Online Fax Without Fax Machine !!!
Hey Guys Good News to all.
If you Don't have fax Machine Don't worry now you can send fax online also via WEB.There are several ways to send fax Online and most of them are free. You can use the Web to send a free fax – and no, you don’t have to have a fax machine or even find some spare change. Isn't Its Interesting...
There are Various Sites that allow us to send free fax all over the world Online.. I am listing the Best one's so Enjoy !
Friday, January 7, 2011
Use your Trail Software for Ever!!!!!!
Time Stopper is the software which can stop the time for try out version software. When you stop the time you can use your try-out versions forever. When you stop the time of a try-out version using this Time Stopper it works via this Time Stopper. Real time and date run normally on your system. You can use any number of try-out version software's with this software.
How it Works:
Steps In Sequence::
1)Open Time Stopper
2)Browse and select .exe of required trial software
3)Choose the new date (Any date which occurs in between your trial software time period before expiration, suggestion: set it to two days before trial software expiration date.)
4)Choose any time
5)Click open software on your selected date
If you wish to create an icon for your modified trial software and do not want to open Time stopper every time then use last button in software to create new icon. open that trial software after that from that newly created icon always otherwise it can expire.
Download Here:
http://hotfile.com/dl/27092605/0713f63/Time.Stopper.rar.html
If you are any quire"s
Please contact me..
THANK YOU>....
Thursday, January 6, 2011
Shotdown pc from dos Prompt!!!
Open your command prompt (Start->run and type cmd )
Type ...shutdown -s(it"ll give you 30 secs to save your work and then it will shutdown)
For restart type shutdown -r
and for logoff type shutdown -l
It works only in Windows XP...
THANK YOU....
Recover Deleted SMS from Phone or SIM
STEPS IN SEQUENCE:
1. First of all download and install FExplorer, excellent file manager and also sends files via Bluetooth.
DOWNLOAD HERE:
http://www.mediafire.com/?wzdzsejfksq
2. Launch FExplorer and navigate to C: if you use Phone Memory to store your messages (default) and D: if you use Storage Card as your SMS storage location.
3. Now navigate to and open "system" folder.
4. Now open the "mail" folder.
5. This folder should contain many folders named similar to 0010001_s etc. with files named similar to 00100000 etc. These files are the actual deleted messages. Simply, use the FExplorer inbuild text viewer to view these files. You will need to browse through every folder and open all files inside them until you get the required SMS.
fetures:
1) Display free space available
2)Check date modified & size
3) Cut, copy, create & paste directories
4)File find. (although this only works within a directory)
5)View file with inbuilt text viewer
6) Cut, copy & paste files
7) Take screenshots
Wednesday, January 5, 2011
USB Drive As RAM and Speed Up Your PC with Eboostr!!!
Highlights:
1)Memory caching (if you have plenty of RAM installed);
PROCESS SCREEN SHOTS:
1)First of all you will need to install (Download link above) eboostr and install with default settings.
After installing,it is necessary to restart your PC.
open eboostr and insert USB Drive.
Click Edit->add new cache device as shown in snap shot...
IF YOUR ANY QUIRES
PLEASE ASK ME........