This is default featured slide 1 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.
This is default featured slide 2 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.
This is default featured slide 3 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.
This is default featured slide 4 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.
This is default featured slide 5 title
Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.
Saturday, August 11, 2012
Free Tools for Spyware Removal
Hack/Alter Windows Vista Base Score
How to Hack an Email using Hardware Keylogger
Hardware Keyloggers are used for keystroke logging, a method of capturing and recording computer user keystrokes. They plug in between a computer keyboard and a computer and log all keyboard activity to an internal memory. They are designed to work with PS/2 keyboards, and more recently with USB keyboards. A hardware keylogger appears simply as a USB pendrive (thumb drive) or any other computer peripheral so that the victims can never doubt that it is a keylogger. So by looking at it’s appearence it is not possible to identify it as a keylogger. Here are some of the images of hardware keyloggers for your convenience.
Insatalling a Hardware Keylogger to Hack the Email Password
How to Copy Locked Photos from Orkut
4. Now the photo gets displayed seperately on your browser.
How to Enable Telnet Command in Vista
Telnet Server (optional)
Friday, August 10, 2012
Run Program at Startup Only Once
Value Name: [Enter the Name of Program Executable]
Value Data: [Enter the Path to the Program Executable]
How to Change IE Title Bar Text
Value Data: [Enter The Text Desired In Title Bar]
How to Disable Windows Logo Key
re-enable_winlogo_key.reg - Re-Enable Windows Logo Key
Change IP Address
Disable Task Manager
Data Type: REG_DWORD (DWORD Value)
Value Data: (0 = default, 1 = disable Task Manager)
Data Type: REG_DWORD (DWORD Value)
Value Data: (0 = default, 1 = disable Task Manager)
Hack BSNL Broadband for Speed
208.67.220.220
Run Programs at Startup without using Startup folder
Microsoft \Windows\CurrentVersion\Run
Value Name: [Enter the Name of Program Executable]
Value Data: [Enter the Path to the Program Executable]
How to Create a CON folder in Windows?
What to do when your Orkut Account is Hacked ?
Forgot Windows XP Password ?
How to Hack Orkut Account !!!
Ways to Hack Orkut Account
How to Block a Website ?
C:\WINNT\SYSTEM32\DRIVERS\ETC for Win 2000
C:\WINDOWS for Windows 98 and ME
______________________
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a “#” symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
#
127.0.0.1 localhost
_____________________________
127.0.0.1 www.myspace.com
127.0.0.1 profile.myspace.com
etc etc etc…