Thursday 26 May 2011

AusLogics BoostSpeed 5.0.6.250

Your one-stop PC maintenance and optimization tool.
The program will clean up, speed up and repair your system to make it running as fast and stable as new.

  • Cleans up the Windows registry
  • Defragments hard drives
  • Frees up disk space
  • Recovers accidentally deleted files
  • Speeds up Internet connection

1-Click Scan
Removes junk files, defragments disks and repairs registry errors with just a couple of mouse clicks.

System Advisor
Analyzes your system health, giving you a comprehensive diagnosis and improvement advice.

Over 18 tools
Supplied with over eighteen power tools for complete computer maintenance and ultimate speedup.

Disk Defrag 3
Includes the latest version of our award-winning defragmenter with its every feature and advantage.

Internet Optimizer
Automatically tunes Internet connection settings to maximize your download and web surfing speed.

File Recovery
.
Recovers accidentally deleted files or files damaged by spyware and computer viruses

Monday 16 May 2011

WebCam Looker 6.0









As soon as movement is detected inside or around your property, the program immediately sends alarm signals. It can cause any of the following: sound, SMS, email with attached image, network message, external application execution, area blinking, upload to ftp or web server, save to file or archive, etc.

Acunetix Web Vulnerability Scanner 7.0



As many as 70% of web sites have vulnerabilities that could lead to the theft of sensitive corporate data such as credit card information and customer lists.

Hackers are concentrating their efforts on web-based applications - shopping carts, forms, login pages, dynamic content, etc. Accessible 24/7 from anywhere in the world, insecure web applications provide easy access to backend corporate databases and also allow hackers to perform illegal activities

using the attacked site. A victim’s website can be used to launch criminal activities such as hosting phishing sites or to transfer illicit content, while abusing the website’s bandwidth and making its owner liable for these unlawful acts.

Saturday 14 May 2011

How to Configure peer to peer workgroup network Step by Step Guide


How will you set up this workgroup network?

  • Determine your requirements
  • Choose between wired and wireless media
  • Map your physical network
  • Map your logical network
  • Create a utilization plan
We assume that you have gone through these steps and come with a plan to use 4 computers with star topology for this network.


Computers
4 With any descriptive Name
Operating system
windows XP professional and vista
Topology
Star
Printer
One
Modem
One
Workgroup Name
Mouse

TURN ON UR PC IN JUST 10 SECONDS

Alright so u wanna know how to turn the pc on in 10 seconds(may vary).Here's what u have to do to turn ur pc on in 10 seconds

Click on the start button then press R it will take u to Run well go to run
& type Regedit
press enter
this will open Registery Editor
now look for the key

HKEY_LOACAL_MECHINE\SYSTEM\CurrentControlSet\Control\
ContentIndex

now there find the Key Called
"Startup Delay"
Double Click On It
Now where its Base
Click Decimal
Now its Default Value Is 4800000(75300:hexadecimal)
Change The Value To 40000
here u go u have done it
now close the Registery Editor and Restart Your Computer
You'll See The Result

Increase your internet speed by other tricks!

1: go to ur desktop
2: right click on "My computer"
3: den select "properties"
4: den click on "HARDWARE" tab
5: den click "Device manager"
6: now u see a new window(Device manager window)
7: look down now u can see "Ports(COM & LPT)" ...click on it
8:den double click on "Communication Ports"
9: after open u can see a "Communication Port properties"..
10: now go the "Port Setting"
11: and now change ur "Bits per second" to "128000".
12: and "Flow control" change 2 "Hardware".

apply and see the result.........

To Create Folder " CON "


Try to create a folder in Windows with either of these names--

"con" or "nul" or "Aux" or "Lpt1".Windows will not let u create ....
Reason: all this correspond to some of the famous ports
>con corresponds to the console
>Lpt1 corresponds to printer and so on....
HOWEVER I FOUND A TRICK TO CREAT FOLDER "CON"
Here is a simple method..........
Rename folder from the right click option........
Now press alt and press 255...
press 255 frm the right sideof the key bords i.e., num pad....
where only numbers r given.....
now write con and then press enter!!
you ll see a con folder in ur pc and also you can delete it easily.

Block Or Unblock Websites without software !


Lots Of people want to Block some websites that are harmfull to our PC. Like someparents take care of their children by blocking porn websites and some colleges/schools blocks some special websites that may harm there network.You may need a costly (or even free) software to block such websites Why to spend money and time and why give HDD space to such uselesssoftwares. Just do this and block unwanted softwares from accesing.

Steps:


1] Browse C:\WINDOWS\system32\drivers\etc
2] Find the file named "HOSTS"
3] Open it in notepad
4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.xyz.com , and that site will no longer be accessable.
5] Done!


Use Proxies in Windows (working 100%)

Go to control panel
1)phone modem options
2)advanced
3)In Providers, click Microsoft H.323 Telephony Service Provider, and then click Configure.
4)In Configure H.323 Service Provider
5)To specify an H.323 proxy, select the Use H.323 proxy, and then type the server name or IP address for the proxy.

Try google for available proxy IP /servers...
Or
try www.proxy4free.com
this is a easy way of using private proxy with windows... plus its more secure than public CGI ones :D

Use Proxies in Windows (working 100%)

Go to control panel
1)phone modem options
2)advanced
3)In Providers, click Microsoft H.323 Telephony Service Provider, and then click Configure.
4)In Configure H.323 Service Provider
5)To specify an H.323 proxy, select the Use H.323 proxy, and then type the server name or IP address for the proxy.

Try google for available proxy IP /servers...
Or
try www.proxy4free.com
this is a easy way of using private proxy with windows... plus its more secure than public CGI ones :D

Saturday 7 May 2011

Aidfile Recovery tool

                                              Aidfile Recovery 3.2.0.0 Incl Activater | 4,54Mb

Aidfile Recovery software is a powerful data recovery tool for recovering files from deleted / formatted / repartition / missing drives / partition table damaged etc. It supports EXFAT / FAT32 / NTFS file systems.

Aidfile data recovery can recover the data while there is an error happens to your software, for example: partition error writing, unintentional formatting, accidentally deletion, false backup, MBR losing, bad sector of BOOT, virus attack, Hackers Attack, conversion error, partition logic error, logical bad sectors of hard drives, partition table lost, ect. The success rate is exclusively high.

Aidfile recovery software Lost partition recovery, deleted drive recovery repartition recovery, changed drive recovery

Key feature:
File recovery after accidental format, even if you have reinstalled Windows.
Get back files after a partitioning error or hard disk crash.
Recover lost deleted partitions.
Recover deleted or lost files emptied from the Recycle Bin.
Recover formatted lost MS office word excel document, photo, image, video, music, email, etc.
Recover from hard drive, USB drive, memory card, memory stick, camera card, Zip, floppy disk or other storage media.
Support EXFAT, FAT32, NTFS file systems.
High quality of file recovery.

Power Data Recovery is a powerful data recovery software developed by MT Solution Ltd. Since the first release of version 1.0 in 2003 we have had many happy customers around the world. It is one of the fastest and most effective programs of the data recovery software. Power Data Recovery is becoming the first choice when you need data recovery software to help you recover your lost data.


Power Data Recovery is a read-only File Recovery Software and Data Recovery Software. Power data recovery software could help you recover all your data no matter the data is lost by accidental deletion, format, re-partition, system crash or virus attack. Power data recovery is able to scan your device sector by sector to recover what ever left on your device.




DOWNLOAD HERE

System Administrator is a powerful tool designed to manage computer usage and internet access.



It helps to prevent wasting company time and avoid losses. The software assists you in increasing productivity by blocking activity that is not work related such as Myspace or Facebook, instant messengers, online games, etc.



Once activated, System Administrator can restrict access to games, instant messengers, internet browsers and other programs installed on the PC. As a powerful internet filter, System Administrator restricts internet usage by blocking specified websites and inappropriate content. The program protects the computer from negligent users by blocking installers and preventing negative computer changes. The detail reports allow you to see how System Administrator works and what websites and programs were blocked. System Administrator is the best way to restrict your employees' activity and internet usage.

Parental Control is powerful computer monitoring software with web filter and applications blocker!





The program records all what your children are doing on the computer and brings you the reports via email. Tracking is absolutely invisible and includes programs, websites, keystrokes, screenshots and other computer activity.

Saturday 30 April 2011

how to hack Email account using Cookie Stealing


If you are a newbie and don't know about cookie, then for your information, Cookie is a piece of text stored on user computer by websites visited by the user. This stored cookie is used by webserver to identify and authenticate the user. So, if you steal this cookie (which is stored in victim browser) and inject this stealed cookie in your browser, you can imitate victim identity to webserver and enter his Email account easily. This is called Session Hijacking. Thus, you can easily hack Email account using such Cookie stealing hacks.

Friday 29 April 2011

HONEYPOTS TUTORIAL

Introduction
For every consumer and business that is on the Internet, viruses, worms, and crackers are but a few security threats. There are the obvious tools that aid information security professionals against these problem such as anti-virus software, firewalls, and intrusion detection systems, but these systems can only react to or prevent attacks – they cannot give us information about the attacker, the tools used or even the methods employed. Given all of these security questions, honeypots are a novel approach to network security and security research alike.  This paper will first give an introduction to honeypots – the types and uses. We will then look at the nuts and bolts of honeypots and how to put them together. With a more advanced idea of how honeypots work, we will then investigate the research related to honeypots and look at the possible legal ramifications for the those who deploy them. Finally, we shall conclude by looking at what the future holds for honeypots and honeynets.

Thursday 28 April 2011

Automatic Screen Refresh



When you make changes to your file system and use Explorer, the changes are not usually displayed until you press the F5 key
To refresh automatically:
1. Open RegEdit
2. Go to
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Update
3. Set the value name "UpdateMode" to 1

Changing Exchange/Outlook Mailbox Location



To change the location of your mailbox for Exchange:
1. Open RegEdit
2. Go to
HKEY_CURRENT_USER\Software\ Microsoft\Windows Messaging Subsystem\ Profiles
3. Go to the profile you want to change
4. Go to the value name that has the file location for your mailbox (*.PST) file
5. Make the change to file location or name

To change the location of your mailbox for Outlook
1. Open RegEdit
2. Go to HKEY_CURRENT_USER\Software\Microsoft\Outlook (or Outlook Express if Outlook Express)
3. Go to the section "Store Root"

4. Make the change to file location.

HOW HACKERS USE KEYLOGGERS TO HACK PASSWORD ?

Keylogger is a hardware device or a software program that records the real time activity of a computer user including the keyboard keys they press,as i explain in my last artilce. These keyloggers allow not only keyboard keystrokes to be captured but also are often capable of collecting screen captures from the computer. The keys they press are programmed to automatically transmit data over the network to a remote computer or Web server.

Tuesday 26 April 2011

PHISHING EXPLAIN

WHAT IS PHISHING ?

Phishing is a fraudulent attempt, usually made through email, to steal your personal information. The best way to protect yourself from phishing is to learn how to recognize a phish.

Phishing emails usually appear to come from a well-known organization and ask for your personal information — such as credit card number, social security number, account number or password. Often times phishing attempts appear to come from sites, services and companies with which you do not even have an account.
In order for Internet criminals to successfully "phish" your personal information, they must get you to go from an email to a website. Phishing emails will almost always tell you to click a link that takes you to a site where your personal information is requested. Legitimate organizations would never request this information of you via email.

ENABLE NEW 2-STEP VERIFICATION SECURITY MECHANISM IN GMAIL ACCOUNTS




What is Gmail 2-Step Verification:


Gmail started 2-step verification which adds an extra layer of security to your Google account by requiring you have to access your phone as well as username and password.


These means that even if some steals or guess your password, then too the hackers still wont be able to access your account since they don't have your phone.


How you sign-in with 2 steps:





  • When you access any Google products, enter your username and password.
  • and then click setting.



How to Enable 2-Step Verification:
(1)  Open Google Account setting after open this page..

(2)  Click on "Using 2-step verification" link under "Personal Settings" section.

(3)  If you can't see the link, you can use following direct URL:

(4)  Follow the instructions and add your phone number to the extra security mechanism.

Monday 25 April 2011

SPEED AND BOOST YOUR XP PERFORMANCE


Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing.

HOW TO ENABLE TASK MANAGER

Some Malware and Trojan often disable access to Windows Task Manager. Fortunately, a few quick Registry edits are usually all that are needed to regain control.

Keep Protect Your FaceBook and Twitter Privacy


Surfing the web no longer a solo activity. Facebook, Twitter, and other social networks have quickly become an integral part of the online culture, and with them comes an array of serious threats to your privacy. In this article, I’ll identify some of the key dangers of social networking and offer a few easy steps that you can take to stay safe online. Social networking is n           built on the idea of sharing information openly and fostering a sense of community. Unfortunately, an online network of individuals who actively share their experiences and seek connections with other like-minded people can be easy prey for hackers engaged in social engineering and phishing attacks. It’s important to be aware of the threats and to use discretion in all of your online interactions.