Friday 28 December 2012

How to crack Win RAR password ( updated)

GOOD EVENING TO ALL OF YOU
today's post is about how to crack password of winrar
In order to protect your winrar files frm others reading, you set the password with your files. After a long time, you forgot the password. Is there any way to break passwords in winrar?

WinRARis a powerful tool allows you to create, manage and control archive files. It consistently makes smaller archives than the competition, saving disk space and transmission costs. Winrar itself can not break password for you. You need another tool which is Rar Paswrd Recovery to find your winrar password back.

Monday 24 December 2012

Need For Speed 2013 !!

WE all just cnt stop Our racing spirit.. one after another .. thrilling racing games brought before us by EA GAMES

its the latest version of NFS MOSTWANTED 2013

this game got a bit hard handling so we got a realist view n real driving experience in hea,,,,
 
WE all just cnt stop Our racing spirit.. one after another .. thrilling racing games brought before us by EA GAMES  

its the latest version of NFS MOSTWANTED 2013

this game got a bit hard handling so we got a realist view n real driving experience in hea,,,,


.$!D

Sunday 23 December 2012

All New and exiting features of windows 8 !!

hI all,
Ones  again i came with a new and exciting stuff regarding WINDOWS 8 latest version of Microsoft.  You must check out all these latest features before pushing you into this awesome stuffs ...

Check it out Gys !! U really Love it................


In this Windows 8 Infographic tells about windows 8 release date, The best Windows 8 10+ new features, Windows 8 usage on Laptop, Desktop and Tablets, and other windows 8 news and specification .

Saturday 22 December 2012

Get a new partation in windows 7 home basic edition !!

Generally,  We know its impossible to create a new partation on WINDOWS 7 ( Home basic ) edition.

** GOOD NEWS **
Its possible, just FOllow some of its simple steps and get it !! Its relay eAsy !!!

Perfect Solution to Problem:


Precautions:

1.Create your recovery DVD's from recovery partition before proceding, or order them from hp so as in case of any error or in worst case system can be set to factory restore.

2.BACK UP YOUR DATA.

3.FOLLOW ON YOUR OWN RISK , NO RESPONSIBILTY FOR DATA LOSS , SYSTEM CRASH, OR LOSS OF RECOVERY PARTITION.

4.Hopefully you have read this , if any consequences arises take it on your part , nothing to do with it, you can leave the rest of reding part if not ready,

THANKS FOR READING........

OOP'S you are here,,,,,,,,,then lets continue at your risk..........


Statement:

You are using this guide at your own risk. I don't take any responsibility for any problems.

Important informations !

Before you will do anything please create a set of recovery discs and back up all important data.
Both these steps will save you a lot of troubles if something will go wrong.
     
            Resource:
         From experience

Remember that if you will decide to use the recovery discs or the F11 option to restore the PC to its originalcondition, all partitions which were created by you will be lost and all the data which were stored on them willalso be lost.

Introduction:

Below screenshot shows pre-configured partitions on HP notebook with pre-loaded Windows 7.
disk.png

As you see mounted HDD has four primary partitions:

  • C - partiton with the operating system.
  • HP_TOOLS - partition which allow to use diagnostic tools after pressing F2 on startup.
  • RECOVERY - partiton which allows to recover system by pressing F11 on startup.
  • SYSTEM - active partition which boots the operating system. 
Here begins our problem. A standard partition table is only able to store information about four partitions.
This means that a hard disk could have a maximum of four partitions. The four standard partitions are oftencalled the primary partitions.

To deal with this limitation we may:

----> Delete hp tools partiton , and create new logical partion, BUT RECOVERY MEDIA SET HAVE BEENCREATED BEFORE......


Tuesday 18 December 2012

How to write Ur Fb status WITH Blue colour..

We have discussed some of facebook tricks. Now i am gooing to tell u a trick to Upade Facebook Status In Blue Color Login to

Facebook Click update status Paste below code to ur status

@[1: ]@@[1:[0:1: Your Text Here ]]
Replace ” Your Text Here” with ur status Click Post Status will be updated in Blue color

.$!D

Friday 7 December 2012

Check who visited ur "FACEBOOK" profile...!!


.$!D

Wednesday 28 November 2012

How to hack a website or ur friends pc using IP adress ? [Study Purpose]

What is the real meaning of a HACKING..

Literally, hacking is accessing something or somebody in internet without their permission or interest. While, speaking in summary, hacking is very easy job, it is like instead of using front door, finding the hidden door of a house and hijacking the precious things. Among all the hacking, hacking via IP address is one of the most common yet powerful beginning.
You may want to hack the website and put your advertisement there or grab some database information In this type of hacking, you are playing with the web server’s computer instead of the administrator’s computer. Because, www.website.com is hosted in separate web server rather than personal computer.
Another can be accessing your friend’s computer from your home. Again this is IP based and this is possible only when your friend’s computer is online. If it is off or not connected to internet then remote IP hacking is totally impossible.

Saturday 24 November 2012

What is the meaning of service pack (SP) ?!

A PERFECT ans...

A SP or a service pack is a collection of updates and fixes, called patches, for an operating system or a software program. Many of these patches are often released before the larger service pack, but the service pack allows for an easy, single installation.
Service packs also often include new features in addition to fixes.
***********

 A service pack (in short SP) is a collection of updates, fixes, or enhancements to a software program delivered in the form of a single installable package. Companies often release a service pack when the number of individual patches to a given program reaches a certain (arbitrary) limit. Installing a service pack is easier and less error-prone than installing many individual patches, even more so when updating multiple computers over a network.
Service packs are usually numbered, and thus shortly referred to as SP1, SP2, SP3 etc.They may also bring, besides bug fixes, entirely new features, as is the case of SP2 of Windows XP.

Thursday 15 November 2012

Run Ur pc smoother Ever...!

PC maintenance tips

  1. Always protect your PC by installing some kind of antivirus and regularly keep the antivirus updated. There are numerous antivirus software available on the internet. Make sure you choose a known anti-virus after consulting a computer expert. A weak anti-virus program will do more harm than good to your computer. A high-quality anti-virus program on the other hand will protect your computer from dangerous invasive software that can wash out your important data. Here are top three free antivirus: Avast Home Edition Free Antivirus, Avira Personal Free Antivirus and AVG Antivirus Free Edition. You can choose the one you like best.
  2. Keep the firewall protection on as it will protect your PC from the unwanted interferers. If the firewall is not turned on and you are accessing the internet, then some hackers can see and access all the files on your computer and can infect your PC with viruses that can slow down your PC and can sometimes even crash it. Three free firewall products I recommend are: PC Tools Firewall Plus (totally free for Windows without limitations or time-limit), COMODO Internet Security and ZoneAlarm Free Firewall.
  3. Temp files, downloaded Internet files, and old, unused files can occupy space in your PC. Do regular disk cleanup using tools available or you can also do so manually. Regularly delete files from the Recycle Bin to remove all the unneeded files from the computer. Remove all the cookies from the PC as they are unneeded and will occupy computer’s memory and slows down its performance.
  4. You should also install a Registry Cleaner tool from the internet. It will increase the efficiency of the PC as well as make the hardware and software run smoothly. Run this regularly weekly for best results. There are a few popular free Registry Cleaners you can get online: Registry Mechanic, Registry Easy and Registry Fix. Also there are a few commercial Registry Cleaner tools I recommend: Registryrid, WiseCleaner and Registry Medic.
  5. Keep checking for spyware and adware infection by installing spyware detectors.  A high-quality Anti Virus program also helps you detect these. Spyware/Malware/Adware are very infectious and make the PC run very slow and sometimes even damage your system and invade your personal data. There are three popular free antispyware: Ad-Aware Free, Spybot Search & Destroy and Windows Defender. You can read the reviews before you download.
  6. All the software installed in your computer must be regularly updated so that they can work efficiently. Nowadays most software have auto update facility and they prompt for updating them. As soon as the internet is turned on, they will automatically search for the updates and if new updates are available they will get it.
  7. Sometimes it may happen that your computer is not infected but still it is running slow. The reason for this is the installed programs require more memory for smooth running than that is available in your PC. So the solution for this is to add more RAM.
  8. Backups help to preserve the data and important files stored within the computer. Backup creation is an easy process; you just need to copy your important data in another hard drive or pen drive/USB Sticks etc. depending on the amount of data. USB drives and sticks are convenient and portable.
  9. Make sure that you clean your PC to ensure that dust does not harm its components. CPU fan must be cleaned regularly to avoid dust and small debris which can harm your PC in many ways. CPU fan plays an important role in making the computer run faster. The computer monitor also must be cleaned. You can do so using the household glass cleaner and a soft cloth.
  10. When your PC is not in use, ensure that you turn it off. Also, don’t turn off the PC directly from the power switch till the Windows shuts down completely.
.$!d

Wednesday 7 November 2012

The SToRy Of Top 8 Most zaPing Virus ..

1 ) Jerusalem – 1987
This is one of the first MS-DOS viruses in history that caused enormous destructions, affecting many countries, universities and company worldwide. On Friday 13, 1988 the computer virus managed to infect a number of institutions in Europe, America and the Middle East. The name was given to the virus after one of the first places that got “acquainted” with it – the Jerusalem University.
Along with a number of other computer viruses, including “Cascade”, “Stoned”, “Vienna” the Jerusalem virus managed to infect thousands of computers while still remaining unnoticed. Back then the anti-virus programs were not as advanced as they are today and a lot of users had little belief of the existence of computer viruses.

2 ) Morris (a.k.a. Internet Worm) – November 1988
The Morris worm or Internet worm was one of the first computer worms distributed via the Internet. It is considered the first worm and was certainly the first to gain significant mainstream media attention. It also resulted in the first conviction in the US under the 1986 Computer Fraud and Abuse Act. Once the worm discovers an internet connection, all that it must do is download a copy of itself to that location, and continue running as normal.  Now it has been 7 years since the Worm was defeated, but it is still worth looking at what happened, both in terms of how the program operated, and as to what conditions allowed it to do what it did. With that in mind, there are a number of subtopics of interest.
 
3 ) Solar Sunrise – 1998
Two Californian teenagers took American government by surprise, in 1998, when they intruded and took control of around 500 systems that belonged to the governmental as well as private sector. This was done with the help of a computer virus and the situation was given the name of Solar Sunrise, after an operating system called Sun Solaris. The computers that ran this OS had few weaknesses. US government took the incident as another golden opportunity to blame Iraqis but soon found out that the culprits were no other than their own Americans.
Initially it was believed that the attacks were planed by the operatives in Iraq. It was later revealed that the incidents represented the work of two American teenagers from California. After the attacks, the Defense Department took drastic actions to prevent future incidents of this kind.
 
4 ) Melissa – 1999
The Melissa virus, also known as “Mailissa”, “Simpsons”, “Kwyjibo”, or “Kwejeebo”, is a mass-mailing macro virus. As it is not a standalone program, it is not in fact a worm. Melissa can spread on word processors Microsoft Word 97 and Word 2000 and also Microsoft Excel 97, 2000 and 2003. It can mass-mail itself from e-mail client Microsoft Outlook 97 or Outlook 98.  If a Word document containing the virus, either LIST.DOC or another infected file, is downloaded and opened, then the macro in the document runs and attempts to mass mail itself.  When the macro mass-mails, it collects the first 50 entries from the alias list or address book and sends itself to the e-mail addresses in those entries.
Melissa computer virus was developed by David L. Smith in Aberdeen Township, New Jersey. Its name comes from a lap dancer that the programmer got acknowledged with while in Florida. After being caught, the creator of the virus was sentenced to 20 months in federal prison and ordered to pay a fine of $5,000. The arrest represented a collaboration of FBI, New Jersey State Police and Monmouth Internet.
 
5 ) I Love You – May 2000
This is one of the most dangerous worms ever and spread worldwide in only one night. It infected around ten percent of all internet users, and the monetary loss was around $5.5 billion. The process started when a user received an email with the subject “ILOVEYOU” and an attachment “LOVE-LETTER-FOR-YOU.TXT.vbs”. As soon as the file was opened, the virus managed to send its copy to every address present in the Windows Address Book. This worm was written by a Filipino student who was punished as Philippines had no law related to such cyber crimes. Perhaps this incident triggered the creation of European Union’s global Cybercrime Treaty.
 
6 ) The Code Red worm – July 2001
The Code Red worm was a computer worm observed on the Internet  on July 13, 2001. It attacked computers running Microsoft’s IIS web server.  The Code Red worm was first discovered and researched by eEye Digital Security employees Marc Maiffret and Ryan Permeh. The worm was named the .ida “Code Red” worm because Code Red Mountain Dew was what they were drinking at the time, and because of the phrase “Hacked by Chinese!” with which the worm defaced websites.
Although the worm had been released on July 13, the largest group of infected computers was seen on July 19, 2001. On this day, the number of infected hosts reached 359,000. The worm spread itself using a common type of vulnerability known as a buffer overflow. It did this by using a long string of the repeated character ‘N’ to overflow a buffer, allowing the worm to execute arbitrary code and infect the machine.
 
7 ) Nimda – 2001
Nimda is a computer worm, and is also a file infector. It quickly spread, eclipsing the economic damage caused by past outbreaks such as Code Red. Multiple propagation vectors allowed Nimda to become the Internet’s most widespread virus/worm within 22 minutes.  The worm was released on September 18, 2001. Nimda was considered to be one of the most complicated viruses, having up to 5 different methods of infecting computers systems and duplicating itself.
 
8 ) Downadup – 2009
The Downadup worm, also known as Conficker and Kido, has affected 6 million PCs in just the past three days, according to British officials. his malicious program was able to spread using a patched Windows flaw. Downadup was successful in spreading across the Web due to the fact that it used a flaw that Microsoft patched in October in order to distantly compromise computers that ran unpatched versions of Microsoft’s operating system. According to New York Times, conficker has more than 7 million computer systems under its control now. China, Argentina, Brazil, Russia, and India were the main affected nations.

Wednesday 4 January 2012

Router- A Hardware revolution in Computing





A router is a device that forwards data packets between computer networks, creating an overlay internetwork. A router is connected to two or more data lines from different networks. When a data packet comes in on one of the lines, the router reads the address information in the packet to determine its ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey. Routers perform the "traffic directing" functions on the Internet. A data packet is typically forwarded from one router to another through the networks that constitute the internetwork until it gets to its destination node.[1]
The most familiar type of routers are home and small office routers that simply pass data, such as web pages and email, between the home computers and the owner's cable or DSL modem, which connects to the Internet (ISP). However more sophisticated routers range from enterprise routers, which connect large business or ISP networks up to the powerful core routers that forward data at high speed along the optical fiber lines of the Internet backbone.

Blog Top Sites

Share Our Badge

 Computer Stuffs

Be Updated Its Free.

Subscribe via Email

Visitors Everyday



Website Security Test

Followers