Spread Firefox Affiliate Button

Ideas Worth Spreading - Must Watch

Posted on 11/29/2009 08:02:00 PM by ket@n and filed under | 0 Comments »

Show Your Name In The SYSTEM CLOCK

This trick will put your name or any text up to 12 characters long in the system clock. There is nothing special in this trick. It is just to show off to your friends that you are elite.

Here is how to do it.

1. Go to Control Panel and double click on Regional and Language Options.

2. Click on Customize and go to Time tab.

3. To put your name, just click on the scroll down text and rename it with anything you want.

4. Finally, click Ok and Ok to accept the changes.

Just incase you want to get back to the original setting, just pick the AM and PM from the drop down list.
Using windows vista? Don’t worry, this trick also works in Windows Vista.
Posted on 10/15/2009 12:24:00 AM by ket@n and filed under , | 0 Comments »

What is RSS?

What is RSS?

RSS stands for "Really Simple Syndication". It is a way to easily distribute a list of headlines, update notices, and sometimes content to a wide number of people. It is used by computer programs that organize those headlines and notices for easy reading.


What problem does RSS solve?

Most people are interested in many websites whose content changes on an unpredictable schedule. Examples of such websites are news sites, community and religious organization information pages, product information pages, medical websites, and weblogs. Repeatedly checking each website to see if there is any new content can be very tedious.
Email notification of changes was an early solution to this problem. Unfortunately, when you receive email notifications from multiple websites they are usually disorganized and can get overwhelming, and are often mistaken for spam.
RSS is a better way to be notified of new and changed content. Notifications of changes to multiple websites are handled easily, and the results are presented to you well organized and distinct from email.



How does RSS work?

RSS works by having the website author maintain a list of notifications on their website in a standard way. This list of notifications is called an "RSS Feed". People who are interested in finding out the latest headlines or changes can check this list. Special computer programs called "RSS aggregators" have been developed that automatically access the RSS feeds of websites you care about on your behalf and organize the results for you. (RSS feeds and aggregators are also sometimes called "RSS Channels" and "RSS Readers".)
Producing an RSS feed is very simple and hundreds of thousands of websites now provide this feature, including major news organizations like the New York Times, the BBC, and Reuters, as well as many weblogs. What information does RSS provide?
RSS provides very basic information to do its notification. It is made up of a list of items presented in order from newest to oldest. Each item usually consists of a simple title describing the item along with a more complete description and a link to a web page with the actual information being described. Sometimes this description is the full information you want to read (such as the content of a weblog post) and sometimes it is just a summary.
Posted on 10/01/2009 10:53:00 PM by ket@n and filed under | 0 Comments »

TORRENT EXPLAINED

First Of All Download A BitTorrent Client


Download BitTorrent (http://www.bittorrent.com) - A Bittorrent Client (Recommended)
Usually, after clicking the download link, your bittorrent client will start the torrent and you will start to download the file you want.


Alternatively, you may be asked if you want to open the (torrent) file or save it to disk. Opening the file will start your bittorrent client and your download, saving to disc will download the small .torrent file (= text file) to your computer where you can open it with your bittorrent client and start downloading the file you want, or keep the .torrent file for later use. Saving the torrent to disc is recommended, if you're not given a choice to either save or open the .torrent file, right click on the download link and then select 'save target as' and save the .torrent file to your computer that way.


Soon after you start to download, you'll start to upload the pieces of the file you've just downloaded (bittorrent cuts the file you download into 2 Mb pieces for better transfer of the files). Don't set your upload speed too low, but also not to high because this will interfere with your download speed. Set your uploadspeed 10% under your maximum upload speed for best results....CONTINUED..
Posted on 10/01/2009 10:41:00 PM by ket@n and filed under | 0 Comments »

Computer security explained

Here it is.. i found an explaination about Computer Security via a story!Its interesting and a smooth story to explain technical stuffs.Read On
One upon a time, there was this gentleman who saw a vast tract of land. He thought he would do something useful and productive with the land. He decided to setup a town there. He went to the king ( Microsoft ) and requested him to assign the land (Windows ) to him. The king agreed, albeit with a hefty monetary tribute, and named him governor of this town( granted him a license ). He also sent a few of his servants (programs like notepad, paintbrush ) who would let him get along smoothly.
The servants were trained for various purposes. While one was a good cook, the other was a good gardener, and likewise.
Soon, people started settling in this town ( data and programs ). Whenever the governor needed some special work done ( spreadsheet, word processor ), he would pay a handsome tribute to the king or his associates ( bought a license ) and ask them to send one of his specialist people( MSWord , Excel)
There were many other smaller towns around this town, some even in the neighboring kingdoms ( Other computers with different operating systems ). The neighboring towns were interconnected by good roads ( networking) and ...READ ON...
Posted on 9/30/2009 10:34:00 PM by ket@n and filed under | 0 Comments »

Difference Between Hacking and Cracking

Lets Throw some light on this topic


Hacking - Getting access to something or some location or some level that is not for yours or not for the general public or only for a group of people is called hacking.


simply going to somewhere you should not go.




Cracking - Modifying the program or something to the way you like it or anything different then what the original coder or programmer have made is called cracking


In hacking we use tricks - tools - techniques - thinking capabilities to cheat the security or protections to get entry to enjoy something to simply geting something out of the protected area.


In cracking we modify the programs or codes. suppose a commercial software want a Key or serial to get activated/ we have to reverse the codes so that it thinks that it is activated--- there are many ways to do that but simply we reverse the flags or understand what it is doing.
if i explain the codes it foes like this " if the serial entered is correct then "do case1" or if the serial is not correct then "do case2""


Now if we reverse this code we get "if the serial entered is correct then "do case2" or if the serial is not correct then "do case1""


done- now is we enter a wrong serial(what ever we like) the software will perform that act; that the original programmer has set to be done only when a correct serial is entered.
Posted on 9/30/2009 10:19:00 PM by ket@n and filed under | 0 Comments »

How To Write, Compile and Execute C Programs under Linux

Most Linux and Unix programs are written in C. When you download source for a project, it will often be C or C++ source code. You don't necessarily need to know a too much thing about C or anything else to compile the source if you aren't "changing it".

You can type you C program using any of the editors that are available under Linux such as vi or emacs or any other editor. My favourite is vi editor.


Source Code:
Write a Hello World C Program: Create a file call "firstprogram.c" in vi and type the following content into this file and save it.



#include
#include
void main()
{
printf("Hello World\n");
printf("My First C Program\n");
}



Once you have written and saved your C program, return to the prompt. The “ls” command should display your C program. It should have the .c extension. Now at the prompt type the following


$ gcc firstprogram.c
You would be having an a.out in the same directory as the source C file. This is the default name of the executable that gcc creates. This will create problem when you compile many programs in one directory. So we override this with the -o option followed by the name of the executable.


$ gcc -o hello firstprogram.c
This would create an executable by the name hello for your source code named firstprogram.c
Running the executable that you created is very simple. Just type the following at the prompt.

$ ./hello  Or whatever you named your executable.
Posted on 9/21/2009 01:32:00 AM by ket@n and filed under , | 0 Comments »

Play Mp3 Songs in Ubuntu/ Linux system

Are You New In Linux Or Ubuntu ? If so, You must be wondering how To Play Most Common Song Format -MP3 In Your Ubuntu/Linux.

Solution:
Download Following .deb File( executible file in linux systems) & Then Install It (Just Double Click On It)
If You Still have Problems, Just Leave Comment Here I Will Solve It As Soon As Possible.

Download this file PlayMP3
Posted on 9/21/2009 12:55:00 AM by ket@n and filed under | 0 Comments »

Disturbing Facts About Google


1. Google's immortal cookie:


Google was the first search engine to use a cookie that expires in 2038. This was at a time when federal websites were prohibited from using persistent cookies altogether. Now it's years later, and immortal cookies are commonplace among search engines ; Google set the standard because no one bothered to challenge them. This cookie places a unique ID number on your hard disk. Anytime you land on a Google page, you get a Google cookie if you don't already have one. If you have one, they read and record your unique ID number.


2. Google records everything they can:

For all searches they record the cookie ID, your Internet IP address, the time and date, your search terms, and your browser configuration. Increasingly, Google is customizing results based on your IP number. This is referred to in the industry as "IP delivery based on geolocation."
Posted on 9/16/2009 05:05:00 PM by ket@n and filed under | 0 Comments »

Edit Photos Online quickly and easily

When we are talking about photo editing, Photoshop is probably that comes to your mind. Well, it is true that Photoshop is awesome picture editing tool. But unfortunately, Photoshop is not so easy to learn and it might take some time for you to master the Photoshop.

I just discovered a website named...
Posted on 9/12/2009 10:47:00 PM by ket@n and filed under | 0 Comments »

How to recharge your mobile for free : secret revealed

Recharge Your phone every month for free by following this process:-

Please follow the instruction & you can recharge your SIM card
absolutely free.
Yes it is possible, see how technology can be used to make technicians
fool.

I just got a mail from a friend of mine, whose friend is B.Tech.(ETC)
from IIT Bombay, teaching me how to reload my hand set every month for free.
Engineered by a group of rebel programmers. I am going to share this with you all!!

Please follow the instructions as stated below before you start it:

Applicable for VODAPHONE, AIRTEL, SPICE, IDEA & BSNL users only ,sorry
for BPL and Reliance users and it is done illegally of course. But there
are many things that are illegal in this world. But then who cares. Don’t worry nobody can trap you. No legal action can be taken on you for this. So go ahead without worrying.

You can only do this every 24th & 25th of the month as the network system is
under upgrade.....
Posted on 9/05/2009 10:51:00 PM by m@yur and filed under | 0 Comments »

AMD Phenom II X4 Processors Over-clocked @7GHz


The first company to bring processors into the GigaHertz space has done it once again with their phenomenal Phenom II quad core chip clocking at
7 GHz.

The team that achieved this goal used a 28 multiplier with a 250.1MHz bus clock on a 1.25GHz bus. The motherboard that was used for the testing was a DFI “LANParty” UT 790FXB-M3eH7 that sported a digital PWM. An AMD 790FX rev 00 NB and ATI SB750 rev 00 SB were present on the board, and the team also placed on it dual ATI Radeon HD 4870 X2 graphics boards, along with 2GB DDR3 dual-channel 667MHz RAM.

Posted on 8/19/2009 07:14:00 PM by ket@n and filed under , | 0 Comments »

win32:sality virus

I was playing with a few softwares when my "avast antivirus" warned me of this "win32:sality virus".As usual i neglected it.This was a big mistake i made.Two hours later my antivirus declared VLC as virus, 4 hours later notepad was declared as virus and 24 hours later almost all exes were declared as virus. Many programs terminated abnormally.


I started searching net for information on this virus.When i got the following info about it:-
Characteristics
Type : Virus
Category : Win32
Also known as: W32.HLLP.Sality (Symantec)



Description
Win32/Sality is a polymorphic virus that infects Win32 PE executable files. It also contains trojan components. Win32/Sality has been known to be downloaded by variants of the Win32/Bagle family.
Method of Infection
When an infected file is executed the virus decrypts itself and drops a DLL file into the %System% directory. The DLL file is injected into other running processes. The virus then executes the host program code.
Some examples of the names used by the Sality DLL file as reported to CA from the wild include the following:
%System%\syslib32.dll
%System%\oledsp32.dll
%System%\olemdb32.dll
%System%\wcimgr32.dll
%System%\wmimgr32.dll

Note: '%System%' is a variable location. The malware determines the location of the current System folder by querying the operating system.


Method of Distribution
Via File Infection
Sality searches local drives C:\ to Y:\ for Windows PE executable files to infect. Some variants do....

Posted on 8/16/2009 01:02:00 AM by ket@n and filed under , | 0 Comments »

I Love You in Hundred Plus Languages !!

Some people dont even say it in a single language.........for them to learn which language they feel comfortable .


1 Indian English - 143
2 English - I love you
3 Afrikaans - Ek het jou lief
4 Albanian - Te dua
5 Arabic - Ana behibak (to male)
6 Arabic - Ana behibek (to female)
7 Armenian - Yes kez sirumen
8 Bambara - M'bi fe
9 Bangla - Aamee tuma ke bhalo aashi
10 Belarusian - Ya tabe kahayu
11 Bisaya - Nahigugma ako kanimo
12 Bulgarian - Obicham te
13 Cambodian - Soro lahn nhee ah
14 Cantonese Chinese - Ngo oiy ney a
15 Catalan - T'estimo
Posted on 8/10/2009 11:28:00 PM by m@yur and filed under | 0 Comments »

Dual core Vs Core 2 Duo -- Which is Better?

A few years ago, Intels best processor was the Pentium 4. It had one processor inside of it. Then, Intel put two of those into one package to make a dual core processor. This just means that there are two cores on one processor(Pentium D ok!) So there were two Pentium 4's inside the processor.

Three years ago, Intel introduced a new processor. It was a much more efficient design, and it came with two cores in one package by itself. Instead of putting two different processors in one package, it was just built like that "natively". These new processors were called the Core 2 Duos beat the older Pentium D's (the dual core Pentium 4's) by a lot.

Since the introduction of the Core 2 Duos, there have been a few less powerful processors introduced, that were slightly different and at a lower price, but still based off of the same architecture. So, they were still dual core processors, but not necassarily a Core 2 Duo.

These less expensive processors typlically had a smaller amount of cache, and a lower Front Side Bus standard(FSB).

The models that only have 1MB of cache are named "Dual-Core" prrocessors, to seperate them as "having less cache". It really means nothing, other than the less cache.
Posted on 8/10/2009 10:01:00 PM by ket@n and filed under | 0 Comments »

How to Protect ORKUT profile from being Cracked

I know people are bothered about protecting their Orkut account and safe guarding their privacy, so what do you need to know of protectting a Google Account?

  1. How the account can be cracked.
  2. How to get it back, once it’s gone out of your reach.
  3. Take the precautions!

Google Accounts or any other web based service is immune from being cracked due to a flaw or a security hole in the system, in *MOST* cases, the account gets hacked due to ignorance of the user, the chances including, making yourself a victim of phishing, using the “Remember Me” feature on public computers, saving the passwords on browsers in computers which may be accessed by someone without your consent, etc.

So what are the things an ignorant user normally does that makes him a victim of account hijacking or cracking?....

Posted on 8/08/2009 05:52:00 PM by ket@n and filed under , , | 1 Comments »

Useful Window's Shortcuts

The General Shortcuts


* CTRL+C (Copy)
* CTRL+X (Cut)
* CTRL+V (Paste)
* CTRL+Z (Undo)
* DELETE (Delete)
* SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
* CTRL while dragging an item (Copy the selected item)
* CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
* F2 key (Rename the selected item)
* CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
* CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
* CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
* CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
* CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
* SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
* CTRL+A (Select all)
* F3 key (Search for a file or a folder)
* ALT+ENTER (View the properties for the selected item)
* ALT+F4 (Close the active item, or quit the active program)
* ALT+ENTER (Display the properties of the selected object)
* ALT+SPACEBAR (Open the shortcut menu for the active window)
* CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
* ALT+TAB (Switch between the open items)
* ALT+ESC (Cycle through items in the order that they had been opened)
* F6 key (Cycle through the screen elements in a window or on the desktop)
* F4 key (Display the Address bar list in My Computer or Windows Explorer)
* SHIFT+F10 (Display the shortcut menu for the selected item)
* ALT+SPACEBAR (Display the System menu for the active window)
* CTRL+ESC (Display the Start menu)
* ALT+Underlined letter in a menu name (Display the corresponding menu)
* Underlined letter in a command name on an open menu (Perform the corresponding command)
* F10 key (Activate the menu bar in the active program)
* RIGHT ARROW (Open the next menu to the right, or open a submenu)
* LEFT ARROW (Open the next menu to the left, or close a submenu)
* F5 key (Update the active window)
* BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
* ESC (Cancel the current task)
* SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)

Dialog Box Keyboard Shortcuts

* CTRL+TAB (Move forward through the tabs)
* CTRL+SHIFT+TAB (Move backward through the tabs)
* TAB (Move forward through the options)
* SHIFT+TAB (Move backward through the options)
* ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
* ENTER (Perform the command for the active option or button)
* SPACEBAR (Select or clear the check box if the active option is a check box)
* Arrow keys (Select a button if the active option is a group of option buttons)
* F1 key (Display Help)
Posted on 8/06/2009 05:13:00 PM by m@yur and filed under | 0 Comments »

SpeedUp Your Computer By Disabling Indexing Service

Disable the Indexing Service in Windows XP


Windows Indexing Service creates indexes of the contents and properties of all files on local and network drives in order to increase file searching speed. If you are not bothered about the slight increase in search speed or if you use search engine like the Google Desktop Search or any other software, then you can safely disable the indexing service.....
Posted on 8/06/2009 02:11:00 AM by ket@n and filed under , | 0 Comments »

The Einstein Robot Smiles

Check out this Einstein robot which is able to teach itself how to smile or display other emotions. According to the researchers, who presented the project last month at the 2009 IEEE 8th International Conference on Development and Learning, this is the first time anyone has used machine learning to teach a robot to make realistic facial expressions.





If robot can smile, why don't you wear yours today.. :)

Posted on 8/06/2009 01:13:00 AM by ket@n and filed under | 0 Comments »

Hack Passwords Using USB Drive!

Today I will show you how to hack Passwords using an USB Pen Drive.
As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc.
Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox, chrome etc. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend’s/college Computer.

We need the following tools to create our rootkit:

==================


MessenPass:

Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.

Mail PassView:

Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.

Posted on 7/22/2009 08:18:00 PM by ket@n and filed under | 0 Comments »

School life Vs College life

School life Vs College life


School: 1 colored dress for 100s of days
College: 100 colored dresses for 1 day

School: 2 note books for 1 subject
College: 1 notebook for all subjects

School: white pipe in teacher's hand (chalk)
Coll: white pipe in student's hand (cigarette)

School: Most frequent letter-Leave letter
College: Most frequent letter - Love letter

School: if we go itz boring
college :if we dont go its boring

SO ENJOY...........
Posted on 7/17/2009 11:05:00 PM by m@yur and filed under | 0 Comments »

Hack this Website

www.smsintegra.com

This website is used to send sms through internet.I will tell you how to hack any paid user of this site.


^change the red part with any username.. u want to find the pass, eg. - mohit ,raj, etc....



  • One page will open to change password (don't change the password) just right click then click on View source.

  • Then press "Ctrl+f " or simply find
    ID="password" value="
    continued..
Posted on 7/11/2009 07:38:00 PM by ket@n and filed under , , | 1 Comments »

firefox features n short tricks

Everybody’s favorite open-source browser, Firefox, is great right out of the box. And by adding some of the awesome extensions available out there, the browser just gets better and better.

But look under the hood, and there are a bunch of hidden (and some not-so-secret) tips and tricks available that will crank Firefox up and pimp your browser. Make it faster, cooler, more efficient. Get to be a Jedi master with the following cool Firefox tricks.

1) More screen space. Make your icons small. Go to View - Toolbars - Customize and check the “Use small icons” box.

2) Smart keywords. If there’s a search you use a lot (let’s say IMDB.com’s people search), this is an awesome tool that not many people use. Right-click on the search box, select “Add a Keyword for this search”, give the keyword a name and an easy-to-type and easy-to-remember shortcut name (let’s say “actor”) and save it. Now, when you want to do an actor search, go to Firefox’s address bar, type “actor” and the name of the actor and press return. Instant search! You can do this with any search box.....
Posted on 7/02/2009 08:27:00 PM by m@yur and filed under | 0 Comments »

What are Trojans?

What is a trojan?
A trojan horse could be either:
a) Unauthorized instructions contained within a legitimate program. These instrcutions perform functions unknown to (and probably unwanted by) the user.
b) A Useful program that has been altered by the placement of unauthorized instructions within it.
These instructions perform functions unknown to (and probably unwanted by) the user.
c) Any program that appears to perform a desirable and necessary function but that (because of
unauthorized instructions within it) performs functions unknown to (and probably unwanted by) the user.

Under a restricted environment (a restricted Unix shell or a restricted Windows computer), malicious trojans can't do much, since they are restricted in their actions. But on a home PC, trojans can be lethal and quite destructive.
Posted on 6/18/2009 12:26:00 AM by ket@n and filed under , | 0 Comments »

♫► SAY NO TO PIRACY GET THESE FREE SOFTWARES◄♫

I am sure at some stage we all are guilty of using Pirated Software. There has been so much reported and discussed about this in recent years that it has got me thinking — Do We Really Need Pirated Software?
The conclusion I have come to is NO!
Let us first of all examine briefly what Piracy is all about?
I found this on Autodesk site and it sums up the matter quite excellently in the first 4 points, which are reproduced below:

1. What is software “piracy”?
Software “piracy” is the unauthorized possession and/or use of software. It is a crime no different from shoplifting software from store shelves. Purchasers of software do not actually own the software. What they own is the right to use the software according to the terms of the publisher’s license. Purchasers agree to abide by the terms of the license, which typically limits copying privileges to a single copy for backup purposes.
All legal software is supplied with a license. This applies whether the software is acquired for use on one machine, for networking across a number of machines, or if it is pre-installed as part of a system. The license is designed to protect the rights of software developers and is enforced by copyright laws.
Piracy may take many forms, including:
* unauthorized copying of software programs purchased legitimately, also known as “end-user” piracy. This can occur when the number of PCs installed with the software exceeds the licenses that an individual or company has purchased;
* gaining illegal access to protected software, also knwn as “cracking”; nd
* reproducing and/or distributing counterfeit or unauthorized software, often over the counter, or sold, bartered, or shared by individuals on the Internet; and software programs pre-installed by vendors who sell computers without providing the accompanying software license.

2. What is the difference between criminal and civil software piracy?
The majority of software piracy is....
Posted on 6/14/2009 07:02:00 PM by ket@n and filed under | 0 Comments »

What is a virus?


A VIRUS is a small, executable program with the ability to replicate itself by adding its code to that of a host program or the system area of a hard disk. The user is generally unaware of the actions of a virus as it replicates and usually only becomes aware of its presence when the virus 'activates', which it does according to a given set of conditions.Once the user knows what signs to look for, it can be very obvious when viral activity occurs... Let's discuss the difference between viruses.....

Every virus has its own personality. Viruses differ in many ways, each having its own unique properties that make it different. Here are some ways that viruses differ from each other:
  • SIZE - A virus can be as small as 66 bytes or less, or as large as 4096 bytes or more. Compared to most computer programs a virus must be very small.
  • METHOD OF INFECTION - A virus can infect the host program in different ways. Below are three methods commonly used. They are by no means the only ways, but they are the most common. It is possible for a virus to use one or more of these methods.
  1. OVERWRITING - When a virus infects using this method, it will simply write a copy of itself over the begining of the host program. This is a very simple method and is used by more primitive viruses.  Overwriting tends to make the user suspicious because the host program no longer functions. This method of infection causes no change in the size of an infected program.
  2. APPENDING - This method is a bit more complex. The virus appends itself onto the end of the host program and also edits the begining of the program. When the user runs the infected program ....
Posted on 5/20/2009 11:40:00 PM by ket@n and filed under | 0 Comments »

Speed Up your Broadband Speed

hey everyone,
I just found this article which discusses important tips to significantly speed up your net access through BSNL Dataone Broadband connection & most other connections like Reliance or Tata Indicom or Sify Broadband.
Setting DNS For Your Connection
One of the major problems with BSNL Dataone Broadband connection is the DNS servers they provide by default. Most of the time they are very slow n sometimes they fail to respond. I noticed that I am starting 2 spend a significant amount of time in DNS resolution with dataone connection, often it is larger than the time it takes to actually get the response.

Here is a simple solution to significantly speed up your DNS resolution.
Open up the network connection profile n edit TCP/IP settings. In the DNS server address fields, specify d following
DNS server addresses: 208.67.222.222 and 208.67.220.220

Disconnect the connection n then connect again. YOU ARE DONE!

This specifies 3rd party DNS servers which are significantly faster than BSNL Dataone’s DNS servers.

UPDATE:- These DNS server addresses are the OpenDNS primary and secondary addresses respectively.You'll experience improvement in the speed of "domain name resolving" through this.


m@yur
20.05.2009
Posted on 5/20/2009 07:03:00 PM by m@yur and filed under | 0 Comments »

Backing Up the Registry

Backing up your registry from time to time is a pretty good idea. Well, there's an easy way!
1. Click Start /Run and type in "regedit" (no quotes).
2. Next, click the File menu, Export
3. Select a location from the resulting box and give your backup registry a
name. Something like:
Regbackupfile13.05.2009

Just a quick note: by default, Windows backs up the registry when you shut down your machine. The above is probably best used for those (like myself) who like to tinker with registry settings.

Now, how to restore the registry you just backed up...
First, if Windows gets an error when loading your registry, it will automatically revert to its backup, so it should never give you any kind of trouble loading.

OK, but what do you do if you've been playing around in your registry and have *really* messed stuff up?
Click the Registry menu (in the Registry Editor) and select Import Registry. Then just point the computer to your back up file.

Oh, one more thing. You can also add the registry to your regular backup routine (you do have a backup routine, don't you?). Your registry is in two hidden files called "User.dat" and "System.dat", located in the Windows folder. Just add those two files to your normal backup.

m@yur
13.05.2009
Posted on 5/13/2009 09:56:00 PM by m@yur and filed under | 0 Comments »

Get Windows XP key from Installer CD itself !!!




what do you do if you can’t find the CD with the original key. You can discover the key using the trick below.

Steps :

  1. Insert the Windows XP disk inside your computer.
  2. Explore the CD from my computer.
  3. Open the folder I386...
Posted on 5/01/2009 11:59:00 PM by ket@n and filed under , , | 0 Comments »

Human vs Technology, who is the servant!

Technology: OK, but you will pay for me right?
Human: Sure! Will do.
Technology: Will you also update me from time to time?
Human: OK, I can do that.
Technology: Also, would you mind handling my cables? I have a lot.
Human: Cables? Hmm, OK, if that’s what you need…
Technology: Please also watch my blinking buttons and displays every now and then.
Human: Yeah OK…
Technology: And repair me every now and then.
Human: Yes yes, of course.
Technology: Also lock me up safely to prevent me from being stolen.
Human: Of course I will!
Technology: Also provide fallbacks for me if I break OK?
Human: Hmm, sure, yeah…
Technology: I might beep or ring every once in a while which means I need your attention.
Human: OK, yes fine, I will give you my attention every now and then.
Technology: But please, when you use me the wrong way, it can lead to disaster fast...
Posted on 4/24/2009 08:37:00 PM by ket@n and filed under | 1 Comments »

Cracking a Windows Password with Ophcrack



Cracking a Windows Password with Ophcrack with the use of rainbow tables, relatively easy if you take the right steps and if the computer can boot from a disc. The free, open source Ophcrack Live CD is a Windows account password cracking tool designed to help you recover lost Windows passwords. Whether you need to recover the lost password to a Windows account, you're looking to ensure that your passwords are secure, or you're a super l33t h4x0r, the Ophcrack Live CD is a pretty useful tool. The Ophcrack Project has recently released a Linux Live-CD based on SLAX that can be used to retrieve and crack passwords from Windows machines with little or no effort.

Steps


  1. Go to http://ophcrack.sourceforge.net and download the ophcracklivecd iso that is offered there (~455 MB).
  2. Burn the iso file to CD using an image burning software.
  3. Put the CD in the disc drive of the computer you want to crack the passwords of.
  4. Boot from disc. This shouldn't be to hard. Depending on computer, enter the bios settings and change the boot settings to boot from a disc drive on first boot device. ..
Posted on 4/20/2009 08:28:00 AM by ket@n and filed under , , | 3 Comments »

BEST INSULTING ONE LINERS!!

Here are some insulting one liners which can insult others without slang....
Contribution from your part will be highly appreciated

  • never seen such a dumbass like u in mah lyf...get some work other wise this shitty world wont let u breathe widout any reason.
  • you are so fat that,when you stood on a weighing machine it read "TO BE CONTINUED" 
  •  Sometimes I need what only you can provide: your absence.
  • Keep talking.. someday you will say something intelligent!



  • sorry if i laughed..i didn't mean to do it on your face...after all,even the worst of losers should be shown some kindness...not all are born equal u see.. 
  • GOD made you!! That proves that even god has a sense of HUMOUR 
  • Take this money, repair ur spaceship ,and go back to the planet u came from...
  • why you are like ball..whenever i see you.. i feel like kicking at the goal 
  • any similarity between you and a human is purely coincidental! 
  • U have a brain like Einstein's - dead since 1955!! 
  • Your so boring, if you threw a boomerang, it wouldn't come back to you!
Posted on 4/17/2009 08:39:00 PM by ket@n and filed under | 0 Comments »

SMS FAKER V3.0 FULL :

SMS FAKER V3.0 FULL

Not only you hide your sms, you can also read or write sms in front of everyone but you are the only one who can understand the message !!

smsFake encrypt the message letters with letters you specify and you are the only one who can understand

(For all Nokia Series60 phones)
Have you ever encountered that you need to hide your important sms as soon as it reaches your mobile from unwanted eyes ?! Have you ever encountered that you really need to read new incoming sms but people are around you ?! Have you ever encountered that you do need to write sms but people around you will be able to see what you are typing ?!

With smsFake the easy and simple to use program, you have a clue for all those problems. just select a method for hiding your sms, add senders to address list, and then your sms would be monitored and hidden as soon as it reaches your mobile. just associate different letters than the original ones, and when your message arrives or when you type a message every letter is converted to the letter you associated, then you are the only one who can understand what you are reading or typing, come on you are typing and reading your own language!

For example: if you assign 'M' to 'L' and assign 'F' to 'Y' and assign 'R' to 'U', then the sentence "I love you" will appear "I move for" in front of everyone and your message will appear on the recipient phone "I love you". You will see letters are changing to the encrypted letters while you are typing, and when you send the message the original one is sent not that encrypted..

http://rapidshare.com/files/128136902/Smsfake_Full.zip




Posted on 4/15/2009 12:29:00 AM by ket@n and filed under , , | 0 Comments »

Use Google Talk as your language translation tool

Google has integrated their translation tools into Google Talk application through chat bots. These chat bots can translate text of one language to another language and works as your personal language translation assistants.
For instance, to have a line translated from English to French, invite
en2fr@bot.talk.google.com
to chat and then simply chat the line you want to see translated. Here are the few lines of chat conversation which I had with the bot to get English sentences translated to French.
The translation bots use Google Translate as their back end and this feature comes very handy when you want to chat with someone in their native language.
According to Google there are 24 bots currently available: ar2en, de2en, de2fr, el2en, en2ar, en2de, en2el, en2es, en2fr, en2it, en2ja, en2ko, en2nl, en2ru, en2zh, es2en, fr2de, fr2en, it2en, ja2en, ko2en, nl2en, ru2en, zh2en
While machine translation is not perfect, these bots can be helpful in bridging the language barriers but advised not to use for official communication.

note: Double click any word on this site to know its definition or meaning!
Posted on 4/08/2009 10:02:00 PM by ket@n and filed under , | 4 Comments »

How To Remove "autorun.inf"

Well unfortunately the systems in my university lab are full of viruses. Whenever i plugged my usb/flash drives at my univ, it gets affected by viruses.I have tried many anti-viruses, most of them were able to delete/disinfect viruses but were not able to delete the key to viruses, the “Autorun.inf“ file.You may have noticed this file in your flash drives or hard disk.
Almost all of the viruses which reside in flash drives use “Autorun.inf” to execute the EXE file.Whenever u try to delete this file, it gives an error saying this file cant be deleted coz its in use...
Now the question is how to remove the autorun.inf file along with the viruses.

A) Remove these files manually using DOS Command Prompt:-
Go to Start->Run>Type “cmd [Without Quotes]
Then use the following commands
X: Where X is your flashdrive
attrib -s -h -r autorun.inf Changing the attributes of the file

del autorun.inf Deleting the file

NOTE:
1. Here, -s -h ,-r means we are removing the attributes system file, hidden, read only resp.(if any) so that it can be deleted.
2. Hold 'shift' while inserting the flash drive for 10-15 sec to disable autorun temporarily.


B)Using Smart-Antivirus :
i found a small piece of software....
Posted on 3/24/2009 08:35:00 AM by ket@n and filed under , , | 0 Comments »

How to Test your Antivirus Installation?

After installing VirusScan(your antivirus product), you may logically wonder, how do I know if it's working? The answer is a test virus. The EICAR Standard Anti Virus Test File is a combined effort by anti-virus vendors throughout the world to implement one standard by which customers can verify their anti-virus installations.
Solution
To test your installation, copy the following line into a notepad, then save the file with the name EICAR.COM. More detailed instructions are given below.

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

The file size will be 68 or 70 bytes.
If VirusScan is running and configured correctly, when you try to save the file, VirusScan will detect the virus. If VirusScan is not running, start it and scan the directory that contains EICAR.COM. When your software scans this file, it will report finding the EICAR test file.
Note that this file is NOT A VIRUS. You may delete the file when you have finished testing your installation to avoid confusions!
The eicar test virus is available for download from the following website:
http://www.eicar.org/download/eicar.com

OR you can create it yourself :-

1. Click on Start.
2. Select Run.
3. In the Open box type: notepad
4. Maximize the window.
5. Highlight the following on the following line of text: X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
6. Right click on the highlighted text and choose 'copy'.
7. Switch back to Notepad.
8. Right click anywhere inside of Notepad and select 'paste'.
9. Click the File menu and select 'save as'.
10. Change the 'Save as Type' to 'all files'.
11. Name the file eicar.com.

Posted on 3/15/2009 10:52:00 AM by ket@n and filed under | 0 Comments »

10 Reasons You Should Not Switch To Linux


1) You shouldn’t switch to Linux because… you actually enjoy paying for an operating system that is so stuffed with bugs and issues that it shouldn’t be even released as an alpha build..
2) You shouldn’t switch to Linux because… change is always scary. Change is always scary even if that change will make things better.

3) You shouldn’t switch to Linux because… the only thing you use your computer is to play games. I mean people still use computer for anything other than games?
4) You shouldn’t switch to Linux because… You love to dedicate one whole day of your week just for scanning purposes. Anti-virus scan – Spyware Scan – Defragmentation scan – Registry Scan & defrag. What a real Fun!
5) You shouldn’t switch to Linux because… You love to pay for Anti-virus/spywares (with yearly subscription renewal) for protection that the OS MUST provide you in the first place.
6) You shouldn’t switch to Linux because… most people use Windows. If most people use windows it must be good!
7) You shouldn’t switch to Linux because… you realize that nothing lasts forever. Eventually your windows will fall to a BSOD(Blue Screen Of Death) , while Linux has its version of kernel panic, you might have to wait couple of years to experience it, if at all because it is much well built.
8) You shouldn’t switch to Linux because… you LOVE Internet Explorer and you can only use the latest version of Internet explorer on windows.
9) You shouldn’t switch to Linux because… you have to be a geek to use Linux and we all know that geeks don’t have girlfriend.
10) Last but not least. You shouldn’t switch to Linux because… you don’t want to be a conformist and do what everyone tells you to do. You dont want to be unique, which is why you want to use windows.…



TERMS: BSOD , GEEK
type in google search box- define: BSOD to know about it, you can use this method to quickly get info about any term..

*HAPPY HOLI*
Posted on 3/10/2009 03:34:00 PM by ket@n and filed under | 0 Comments »

HAVE FUN WITH GOOGLE

WE probably use Google everyday, but do you know... the Google Snake Game? Googledromes? Memecodes? Googlesport? The Google Calculator? Googlepark and Google Weddings? Google hacking, fighting and rhyming? In this book, you will find Google-related games, cartoons, tips,search tricks, stories and everything else that’s fun Reading it, you won’t be the same searcher as before!!
READ THIS AND START SEARCHING INTUITIVELY...


Chapters:-

1. Egogoogling: Susan Is...
2. The Google Snake Game
3. Memecodes: Survival of the Fittest Web Pages
4. The Google Irritation Game, and the Google Image Quiz
5. Googling Proverbs

----
Posted on 3/02/2009 10:30:00 PM by ket@n and filed under , | 0 Comments »

BASIC COMMANDS IN WINDOWS

  • General Windows commands
  • Basic network commands and tools
- ping
- tracert
- netstat
- ipconfig
- route



System Operation: WINDOWS

Most of the tools used for the study of networks are internal commands in the
Windows operating system. Therefore, we are going to explain how to open a
command window when the Windows operating system is being used.

  • How to open an MS-DOS window
To issue the following commands, it is necessary to open a command prompt (an MS-DOS window).

1.- Click the START button
2.- Choose the RUN option
3.- Type “command” or “cmd”
and press Enter or click OK.
4.- Now you can enter the commands and tools listed below...



Commands and tools (Windows)
Commands...
Posted on 2/24/2009 11:33:00 PM by ket@n and filed under | 0 Comments »

Welcome Note..

Welcome to my first ever blog.You may want to bookmark me coz yuv will always get the best content here...






Thanks for visiting...
ketan.
Posted on 2/21/2009 08:59:00 PM by ket@n and filed under | 6 Comments »