<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-995130096144042674</atom:id><lastBuildDate>Fri, 25 Oct 2024 00:46:36 +0000</lastBuildDate><category>Tricks</category><category>Hacking</category><category>Tutorials</category><category>Tips</category><category>viruses</category><category>PC Hack</category><category>Windows Tricks</category><category>AwesomeTricks</category><category>Mobile Tricks</category><category>Internet Twick</category><category>KeyLogger</category><category>Adroid Apps And Help</category><category>Android Help</category><category>FullVersionSoftwares</category><category>Hack BroadBand</category><category>Blogger Trix</category><category>Android Update</category><category>Android Tips</category><category>Windows Hacking</category><category>Windows 8</category><category>New Software Android</category><category>Only Hacking Software</category><category>Facebook News</category><category>Facebook Update</category><category>Blogger Tips</category><category>Facebook Hack</category><category>Antivirus</category><category>How To</category><category>RSS Reader</category><category>Tutorial</category><category>Apple Software Update</category><category>Excel Help</category><category>Paisalive Hack</category><category>Promotion</category><category>IOS Apple</category><category>Online Earning</category><title>Only Hacking Addictions</title><description>A Complete Hacking And Cracking Tutorial.</description><link>http://hackingaddictions.blogspot.com/</link><managingEditor>noreply@blogger.com (Anonymous)</managingEditor><generator>Blogger</generator><openSearch:totalResults>146</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle>A Complete Hacking And Cracking Tutorial.</itunes:subtitle><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><guid isPermaLink="false">tag:blogger.com,1999:blog-995130096144042674.post-1303593364333354235</guid><pubDate>Thu, 21 Feb 2013 11:31:00 +0000</pubDate><atom:updated>2013-02-25T21:52:47.550-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">How To</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><category domain="http://www.blogger.com/atom/ns#">Tutorial</category><title>How To Use Your Old Pen Drive To Speed Up Your Win7 or Win8- Tutorial</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
Hi Guys&lt;br /&gt;
&lt;br /&gt;
To Day I Teach You How To Speed up Your Pc Via Pendrive Works In Only Win7 And Win8.&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style="text-align: left;"&gt;
Steps You Do&lt;/h4&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;You Have A Pen Drive (Over 1Gb)&lt;/li&gt;
&lt;li&gt;You Must Be A Win7 Or Win8&lt;/li&gt;
&lt;li&gt;You&amp;nbsp;insert into USB Port&lt;/li&gt;
&lt;li&gt;Click On Format&lt;/li&gt;
&lt;li&gt;Rename It On Ready Boost&lt;/li&gt;
&lt;li&gt;Format it on exfat (52kb)&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Click On Proprties&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Than Click On Readyboost&lt;/li&gt;
&lt;li&gt;Than select your USB Pendrive Space How Much Space You Need&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Than Apply Ok&lt;/li&gt;
&lt;li&gt;And Restart Computer&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;h4 style="text-align: left;"&gt;
Vidio Tutorial For Help&lt;/h4&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;center&gt;
&lt;object height="315" width="420"&gt;&lt;param name="movie" value="http://www.youtube-nocookie.com/v/Bj1wDEh-c5Q?version=3&amp;amp;hl=en_GB"&gt;&lt;/param&gt;
&lt;param name="allowFullScreen" value="true"&gt;&lt;/param&gt;
&lt;param name="allowscriptaccess" value="always"&gt;&lt;/param&gt;
&lt;embed src="http://www.youtube-nocookie.com/v/Bj1wDEh-c5Q?version=3&amp;amp;hl=en_GB" type="application/x-shockwave-flash" width="420" height="315" allowscriptaccess="always" allowfullscreen="true"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;/center&gt;
&lt;/div&gt;
</description><link>http://hackingaddictions.blogspot.com/2013/02/how-to-use-your-old-pen-drive-to-speed.html</link><author>noreply@blogger.com (Narendra KHandwe)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-995130096144042674.post-2385370355210260694</guid><pubDate>Thu, 21 Feb 2013 11:24:00 +0000</pubDate><atom:updated>2013-02-21T03:32:08.800-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">How To</category><category domain="http://www.blogger.com/atom/ns#">Paisalive Hack</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><category domain="http://www.blogger.com/atom/ns#">Tutorial</category><title>How To Hack Friends Or Victum Pc Using Darkcomet - Tutorial - With Software Link </title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
How To Hack Friends Or Victum Pc Using Darkcomet - Tutorial&lt;br /&gt;
&lt;br /&gt;
Hey Guys,&lt;br /&gt;
&lt;br /&gt;
Today i am teach you how to hack computer with Dark comet rat&lt;br /&gt;
&lt;br /&gt;
This Is Article Is Tutorial Purpose Only Do Not Blame Me&lt;br /&gt;
&lt;h4 style="text-align: left;"&gt;
Steps U Do&lt;/h4&gt;
&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;You have on a PC&lt;/li&gt;
&lt;li&gt;Download darkcoment from http://www.mediafire.com/?izp27kvexu0pq4b link&lt;/li&gt;
&lt;li&gt;Run the programm.&lt;/li&gt;
&lt;li&gt;Click on the top left menu darkcoment rat&lt;/li&gt;
&lt;li&gt;Click on server module - full &amp;nbsp;editor (expert)&lt;/li&gt;
&lt;li&gt;127.0.0.1 is the local host of windows. u can change it own ftp or web adress&lt;/li&gt;
&lt;li&gt;Bind a file that can u sent on your friends pc.&lt;/li&gt;
&lt;li&gt;Click on built the sub rename the file and user must click the file you will be shown a Remote pc. double click on it and see the magic&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 style="text-align: left;"&gt;
Vidio Tutorial For More Help&lt;/h4&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;center&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="315" src="http://www.youtube.com/embed/AP0L-XvvI5U" width="420"&gt;&lt;/iframe&gt;&lt;/center&gt;
&lt;/div&gt;
</description><link>http://hackingaddictions.blogspot.com/2013/02/how-to-hack-friends-or-victum-pc-using.html</link><author>noreply@blogger.com (Narendra KHandwe)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/AP0L-XvvI5U/default.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-995130096144042674.post-5206241963324387611</guid><pubDate>Thu, 21 Feb 2013 11:18:00 +0000</pubDate><atom:updated>2013-02-21T03:32:08.802-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">How To</category><category domain="http://www.blogger.com/atom/ns#">Paisalive Hack</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><category domain="http://www.blogger.com/atom/ns#">Tutorial</category><title>How To Hack Paisalive.com - Vidio Tutorial</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
Hey Guys&lt;br /&gt;
&lt;br /&gt;
I M Telling You How To Hack Paisalive.com&lt;br /&gt;
&lt;h3 style="text-align: left;"&gt;
Steps To u Do&lt;/h3&gt;
&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;You have own paisa live account&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Or join paisa live account.&lt;/li&gt;
&lt;li&gt;Go to paisalive.com now watch right click on the mail and select copy link adress&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;h4 style="text-align: left;"&gt;
Example :-&amp;nbsp;&lt;/h4&gt;
&lt;blockquote class="tr_bq"&gt;
http://wwwn.paisalive.com/rd.asp?id=2B55AE17-2C81-4BD9-8101-BC500&lt;/blockquote&gt;
&lt;br /&gt;
Now past in Notpad or any editor copy rd and press ctrl+h replaced with rd and copy the link and past it on your brouser see&lt;br /&gt;
do it all on youre mails happy hacking....... keep subcribe my channel for more tricks.....&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style="text-align: left;"&gt;
Vidio Tutorial For Help&lt;/h4&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;center&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="315" src="http://www.youtube.com/embed/_SQJHHsBGuY" width="420"&gt;&lt;/iframe&gt;&lt;/center&gt;
&lt;/div&gt;
</description><link>http://hackingaddictions.blogspot.com/2013/02/how-to-hack-paisalivecom-vidio-tutorial.html</link><author>noreply@blogger.com (Narendra KHandwe)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/_SQJHHsBGuY/default.jpg" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-995130096144042674.post-8556227886523091234</guid><pubDate>Mon, 31 Dec 2012 14:27:00 +0000</pubDate><atom:updated>2013-02-27T01:53:33.473-08:00</atom:updated><title>Happy New Year 2013</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;h3&gt;Happy New Year 2013&lt;/h3&gt;Happy New Year Receive my simple gift of Love, Wrapped with Sincerity?, Tied with care and Sealed with blessings, 2 Keep you happy and safe all the life long, Happy New Year 2013..   May this new year god grants you five things; Sun, to warm you, Moon to charm you, An Angel to protect you, True love, to care for you, A friend, to listen to you!!   Remove Hate, Lust, Jealousy, Grudge, Animosity, Greed from your dictionary this new year’s eve and replace them with Love, Commitment, Support, Compassion, Honesty and Contentment, Here is wishing you a very happy new year 2013.   Memorable moment are celebrate together, U are my best friend for now &amp;amp; forever, Make me Miss you even more this New Year, Hope this 2009 bring Happiness for you Dear. HAPPY NEW YEAR 2013..&lt;br /&gt;&lt;br /&gt;&lt;img height="240" src="http://www.wallpaperzhd.com/wp-content/uploads/2012/12/Happy-New-Year-2013-01.jpg" width="320" /&gt;&lt;/div&gt;</description><link>http://hackingaddictions.blogspot.com/2012/12/happy-new-year-2013.html</link><author>noreply@blogger.com (Narendra KHandwe)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-995130096144042674.post-5706417729959480319</guid><pubDate>Mon, 10 Dec 2012 06:16:00 +0000</pubDate><atom:updated>2013-02-27T01:53:33.480-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tips</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><category domain="http://www.blogger.com/atom/ns#">Windows 8</category><category domain="http://www.blogger.com/atom/ns#">Windows Hacking</category><category domain="http://www.blogger.com/atom/ns#">Windows Tricks</category><title>20 Must-Know Windows 8 Tips And Tricks</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;img height="214" src="http://zapt1.staticworld.net/images/article/2012/11/tip_primar-100011253-gallery.jpg" width="320" /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Windows 8 is rife with features and behaviors that conspire to perplex even the most experienced PC users. Not all of them are bad, per se, but few of them are immediately intuitive. Making matters worse, the OS was primarily designed for touch control, and as a result, many mouse and keyboard commands feel like tacked-on afterthoughts.&lt;br /&gt;&lt;br /&gt;But help is on the way.&lt;br /&gt;&lt;a href="http://gan.doubleclick.net/gan_click?lid=41000613802578075&amp;pubid=21000000000621153&amp;lsrc=17"&gt;Free shipping on $95 or more at Frederick&amp;#39;s of Hollywood&lt;/a&gt;&lt;br /&gt;We've assembled a list of our favorite Windows 8 shortcuts, tricks, and workarounds. Many focus on making the most of the OS on a traditional desktop PC, so if you're interested in touch gestures, please check out our article that focuses directly on the Windows 8 touch experience. Now let's start our journey of discovery with a look at easy-to-use (though often tough to remember!) Windows 8 hotkey commands.&lt;br /&gt;&lt;br /&gt;&lt;h2 style="text-align: left;"&gt;Employ the hottest hotkeys we know&lt;/h2&gt;In these key combinations, hold down the Windows key (normally located between Alt and Ctrl) and another key, as described on this list.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Press the Windows key to enter the tiled Start screen.&lt;/li&gt;&lt;li&gt;The Windows key + M minimizes everything that's showing on the desktop.&lt;/li&gt;&lt;li&gt;The Windows key + E opens Explorer for quick access to folders.&lt;/li&gt;&lt;li&gt;On the Start screen, press the Windows key + D to instantly get to the desktop.&lt;/li&gt;&lt;li&gt;The Windows key + Tab opens a list of currently running programs.&lt;/li&gt;&lt;li&gt;The Windows key + Print Screen takes a screenshot and saves it in a Screenshots folder nested in your Pictures folder.&amp;nbsp;&lt;/li&gt;&lt;li&gt;To take a screenshot on a Windows 8 tablet, simultaneously press the Windows button and the volume-down button on the tablet chassis.&lt;/li&gt;&lt;li&gt;The Windows key + Q opens a global search menu. Type what you're looking for and where you would like to look.&lt;/li&gt;&lt;li&gt;The Windows key + W opens a search in your system settings to quickly locate and change system properties.&lt;/li&gt;&lt;li&gt;The Windows key + F opens a file and folder search.&lt;/li&gt;&lt;li&gt;The Windows key + Pause opens the system properties page to show you a quick rundown of your specs.&lt;/li&gt;&lt;li&gt;The Windows key + "," (that's the comma sign!) makes all current windows transparent, giving you a peek at the desktop as long as you hold down the Windows key.&lt;/li&gt;&lt;li&gt;The Windows key + "." (the period) snaps a window to the right or left side (toggling each time you press ".").&lt;/li&gt;&lt;li&gt;The Windows key + R prompts the Run command—useful for quickly launching apps and other routines with a command prompt.&lt;/li&gt;&lt;li&gt;The Windows key + X opens the Quick Access Menu, exposing system functionality such as the Command Prompt, Disk Management, File Explorer, Run, and more. Alternatively, you can right-click on the bottom right corner of the screen to spawn the Quick Access Menu.&lt;/li&gt;&lt;li&gt;The Windows key + I opens the settings menu, giving you quick access to the Control Panel, Personalization, and your Power button, among other features.&lt;/li&gt;&lt;li&gt;The Windows key + O locks orientation on devices with an accelerometer.&lt;/li&gt;&lt;/ul&gt;&lt;h2 style="text-align: left;"&gt;Zoom in tight&lt;/h2&gt;&lt;div&gt;&lt;img src="http://images.techhive.com/images/article/2012/11/semantic20zoo-100011204-large.png" /&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;b&gt;&lt;span style="color: #cccccc;"&gt;See all your tiles and groups at once with semantic zoom.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;b&gt;&lt;span style="color: #cccccc;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;The Start Screen is full of nice, big, chunky tiles that represent all your apps. The tiles are easy to see in small groups, but what if you have hundreds of apps installed? Most will be hidden from view, unless you want to do a lot of scrolling. Enter the new semantic zoom feature. If you’re using a touch display, squeeze the Start screen with two fingers to receive a bird’s eye view of your entire screen contents. And the feature is also available to mouse and keyboard users: Simply hold down the Ctrl button, and use your mouse wheel to zoom in and out.&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;h2 style="text-align: left;"&gt;Categorize your apps&lt;/h2&gt;&lt;div&gt;&lt;img src="http://images.techhive.com/images/article/2012/11/naming20and20categorizin-100011199-large.png" /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;Your Start screen can become a cluttered mess if you collect too many apps and other elements that have been pinned to the screen as tiles, so take advantage of built-in organization tools that let you divide everything into labeled groups.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;First, drag all the tiles you want to assign to a single group to the far right-hand side of your Start screen in vacant territory; the OS should sequester the tiles together. Once you're satisfied with your assembly, use semantic zoom (described above) to get a bird's eye view of your desktop. Now right-click the group (or simply drag down on it), and select the "Name group" option on the left of the bar that appears below. Type in the name, and enjoy your newly organized Start screen!&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h2 style="text-align: left;"&gt;&lt;span style="font-size: large;"&gt;Close an application&lt;/span&gt;&lt;/h2&gt;&lt;div&gt;&lt;div style="background-color: white; box-sizing: border-box; color: #222222; font-family: 'Helvetica Neue', Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;"&gt;Closing an app&amp;nbsp;&lt;em style="box-sizing: border-box;"&gt;sounds&lt;/em&gt;&amp;nbsp;simple enough, but you'll quickly notice that close buttons are hard to find in Windows 8. That's because Microsoft encourages us to run apps in the background where they'll take up minimal resources, but still be accessible at any time.&lt;/div&gt;&lt;div style="background-color: white; box-sizing: border-box; color: #222222; font-family: 'Helvetica Neue', Arial, sans-serif; font-size: 15px; line-height: 1.7em; margin-bottom: 0.7em;"&gt;Nonetheless, if you insist on being rebellious, you can close an app by dragging it with your mouse or finger from the top of the screen all the way down to the bottom. As you drag, the app will miminize into a thumbnail, and when you reach the bottom, it will disappear from view.&amp;nbsp;Alternatively, you can still close apps via Alt + F4 and through the Task Manager.&lt;/div&gt;&lt;h2 style="text-align: left;"&gt;&lt;span style="color: #222222; font-family: Helvetica Neue, Arial, sans-serif; font-size: large;"&gt;&lt;span style="line-height: 25.5px;"&gt;Use centralized, contextual search&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;/div&gt;&lt;div&gt;&lt;img src="http://images.techhive.com/images/article/2012/11/contextual20searc-100011195-large.png" /&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;b&gt;&lt;span style="color: #999999;"&gt;Search for anything in any app from one place.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;div&gt;The Search function located on the Charms bar is packed with power, letting you search the directories of not only your Windows 8 machine, but also the greater Windows ecosystem. Simply choose the bucket of data you want to sift through—it could be all your installed apps, your system settings, your files, your mail messages, or even an external service like the Windows Store or Bing Maps—type in a keyword, and hit Enter. The Search function will then return the results, perfectly contextualized for the database you’ve addressed&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Oh, and how's this for cool? You don't even need to hit the Charms bar to access Search. From the Start screen, simply start typing, and you'll be quickly whisked to the text-entry field for search queries. Try it. It works!&lt;/div&gt;&lt;h2&gt;Adjust privacy settings&lt;/h2&gt;&lt;div&gt;&lt;img src="http://images.techhive.com/images/article/2012/11/privacy20setting-100011202-large.png" /&gt;&lt;/div&gt;&lt;div&gt;&lt;div style="text-align: center;"&gt;&lt;b&gt;&lt;span style="color: #999999;"&gt;Customize your privacy settings to your liking.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;A lot of apps tap into very personal information by default. Indeed, your pictures, location, and name are liberally woven throughout the system, and like many users you may not be comfortable trusting your machine with that much sensitive data. To adjust the settings, press the Windows key + I, and go to Change PC Settings. Select the Privacy option, and personalize the settings for your personal data there.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h2 style="text-align: left;"&gt;Adjust SmartScreen settings&lt;/h2&gt;&lt;/div&gt;&lt;div&gt;&lt;img src="http://images.techhive.com/images/article/2012/11/smartscreen20settings20croppe-100011306-large.png" /&gt;&lt;/div&gt;&lt;div style="color: #999999; font-weight: bold; text-align: center;"&gt;Choose your own level of safety with SmartScreen.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;SmartScreen warns you before running an unrecognized app or file from the Internet. While it's helpful to be aware of a file's source, constant warnings can also get a little annoying. By default, you need an administrator's permission, but this can easily be adjusted to just a warning or no indication at all. Using the magic search function described above, type "security" at the Start screen and find the "Check security status" in the Settings tab. From this area, you can adjust various security settings, including the Windows SmartScreen.&lt;/div&gt;&lt;/div&gt;&lt;h2 style="text-align: left;"&gt;Bring up the Quick Access Menu&lt;/h2&gt;&lt;div&gt;&lt;img src="http://images.techhive.com/images/article/2012/11/power20user20start20screen20croppe-100011305-large.png" /&gt;&lt;/div&gt;&lt;div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="color: #cccccc;"&gt;&lt;b&gt;The secret Start button for power users is hidden at the bottom-left.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;Right-clicking on the lower left of the screen—whether you’re in the Windows 8 Start screen or in the desktop—will bring up the Quick Access Menu, which enables a direct line to many key system management chores, including Disk Management, Task Manager, Device Manager, and Control Panel.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Use Windows 8 apps and your desktop simultaneously&lt;/div&gt;&lt;div&gt;Because the Windows 8 experience is split between new Windows 8 Store apps and old-school desktop apps, the operating system is prone to some strange behaviors. Case in point: When running a multimonitor setup, Windows 8 apps will consume your main screen, leaving your secondary screen running the desktop. This arrangement would seem to allow full-screen multitasking among both types of apps—a modern app on the left side, a desktop app on the right side—but this isn’t the case. Indeed, as soon as you begin using the desktop on your secondary screen, the new-style Windows 8 app disappears, and your primary screen begins running the desktop.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;But here’s a workaround. On your primary screen, use the new Windows 8 split-screen “snapping” function to run the desktop and a new Windows 8 Store app together. The desktop can take up the left-hand sliver, while the Windows 8 app consumes the majority of the screen. Now use your second display for a full desktop view. In this arrangement, you can fully multitask between new-style apps and desktop apps, and both windows will be large enough to be useful.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h2&gt;Go to Task Manager for Startup items&lt;/h2&gt;&lt;/div&gt;&lt;div&gt;&lt;img src="http://images.techhive.com/images/article/2012/11/task20manager20startup20croppe-100011307-large.png" /&gt;&lt;/div&gt;&lt;div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="color: #999999;"&gt;&lt;b&gt;Task manager is more useful than ever&lt;/b&gt;.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;You no longer have to run the MSConfig program to change startup items. Startup items now show up in a tab on Task Manager. Simply press Ctrl + Alt + Del and select Task Manager. Click the "More details" tab at the bottom and find the Startup tab at the top.&lt;/div&gt;&lt;/div&gt;&lt;h2 style="text-align: left;"&gt;Share and share alike&lt;/h2&gt;&lt;div&gt;&lt;img src="http://images.techhive.com/images/article/2012/11/sharein-100011205-large.png" /&gt;&lt;/div&gt;&lt;div&gt;&lt;div style="text-align: center;"&gt;&lt;b&gt;&lt;span style="color: #999999;"&gt;Play with the Share charm in every app.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;Windows 8 is Microsoft’s first social-media-aware PC operating system. Using the Share button located on the Charms bar, you can pick any number of elements from your Windows 8 Store apps—say, a location from your Maps app, a news story from the Finance app, or a even a contact from your People app—and then distribute that item to friends via other Windows 8 programs.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Perhaps most conveniently, you can quickly share a photo via email or Twitter, or to your own SkyDrive or Windows Phone. The Share button is contextual, and the more you use it, the more you’ll discover which apps share with each other, and which don’t. (Hint: None of your desktop apps offer sharing opportunities through the Charms menu.)&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h2 style="text-align: left;"&gt;Create a picture password&lt;/h2&gt;&lt;/div&gt;&lt;div&gt;&lt;img src="http://images.techhive.com/images/article/2012/11/picture20passwor-100011200-large.png" /&gt;&lt;/div&gt;&lt;div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="color: #999999;"&gt;&lt;b&gt;A fun way to protect your system.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;Using a picture password is a fun way keep your device secure while not having to remember a complex password. To enable it, press the Windows key + I to get to the settings charm. Click "Change PC settings" at the bottom right, and go to the Users tab. Under "Sign-in options" will be the "Create a picture password" button. This will give you the option to choose any picture, and then define three gestures anywhere on the image. Your gestures can be circles, swipes and clicks.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;For example, to set a picture password for the image above, you could click on the highest palm tree, draw a circle around the island, and then swipe down from the lens flare in the upper right. Just beware: The direction of each gesture matters! After confirming it a couple times, your picture password will be set.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h2 style="text-align: left;"&gt;Boot to the desktop without an app&lt;/h2&gt;&lt;/div&gt;&lt;div&gt;&lt;img src="http://images.techhive.com/images/article/2012/11/task20scedule20to20desktop20croppe-100011308-large.png" /&gt;&lt;/div&gt;&lt;div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="color: #cccccc;"&gt;&lt;b&gt;Skip the Start screen and get right to the Desktop.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;One of biggest complaints about Windows 8 is that it boots straight to the Start screen—an annoyance for many committed desktop users. The Start8 utility helps you avoid this indignity (among other cool features), but you can actually boot straight to the desktop without installing anything extra.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Go to the start screen and type in "schedule" to search for Schedule Task in Settings. Click on Task Scheduler Library to the left, and select Create Task. Name your task something like "Boot to desktop." Now select the Triggers tab, choose New, and use the drop-down box to select starting the task "At log on." Click OK and go to the Actions tab, choose New, and enter "explorer" for the Program/Script value.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Press OK, save the task, and restart to test it out!&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h2 style="text-align: left;"&gt;Log in without a username or password&lt;/h2&gt;&lt;div&gt;&amp;nbsp;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;To speed up the log-in process, you may want to disable the username and password log-in screen. You can do so by opening the Run window (press the Windows key + R) and typing in "netplwiz" to access the User Accounts dialog box. Uncheck the box near the top that says "Users must enter a user name and password to use this computer." Click OK, and enter the username and password one last time to confirm your choice, and you are all set for easy access to your system.&lt;/div&gt;&lt;/div&gt;&lt;h2 style="text-align: left;"&gt;Refresh your PC&lt;/h2&gt;&lt;div&gt;&lt;img src="http://images.techhive.com/images/article/2012/11/refres20deskto-100011203-large.png" /&gt;&lt;/div&gt;&lt;div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="color: #999999;"&gt;&lt;b&gt;Enjoy a fresh PC without losing everything.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;If your system is feeling a little sluggish, it may be time for a refresh. In the past we would have to find our copy of Windows 7, back up all of our data, and perform a fresh install to enjoy that back-to-factory-fresh feeling. But now Windows 8 allows you to perform a fresh install from within Windows without losing any data.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;In order to perform the refresh, go to Settings and click the Change PC Settings tab near the bottom. Select the General tab and find the "Refresh your PC without affecting your files" section near the middle (you may also select "Remove everything and reinstall Windows" to get the true factory settings treatment). Select "Get started" and press "Refresh." After a few minutes the PC will restart, and you will have a fresh copy of Windows 8.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h2 style="text-align: left;"&gt;Start in Safe Mode&lt;/h2&gt;&lt;div&gt;Safe Mode is a great way to get into your system when something won't allow you to start up normally. Troubleshooting becomes a breeze when corrupted drivers and files aren't loaded that prevents a system from functioning. It used to be as easy as pressing F8 when the system starts up, but doing so with Windows 8 will take you to Automatic Repair Mode. The trick to getting back to good old fashioned Safe Mode? Hold down the Shift key and press F8 while booting up.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;This takes you to the Recovery mode. Select "advanced options," then "troubleshoot," then the "advanced options" again (there are a lot of advanced options). Select Windows Startup Settings and finally the Restart button. This will reboot the computer and give you the option to boot into Safe Mode.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;If you need to get into Safe Mode from within Windows, open the dialog box (the Windows key + R) and type "msconfig" (no quote marks). Select the Boot tab and check the Safe boot box. The system will continually boot into Safe Mode until you go back and uncheck the box.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h2 style="text-align: left;"&gt;Turn Live Tiles on and off&lt;/h2&gt;&lt;/div&gt;&lt;div&gt;&lt;img src="http://images.techhive.com/images/article/2012/11/turning20live20tiles20on20of-100011209-large.png" /&gt;&lt;/div&gt;&lt;div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="color: #999999;"&gt;&lt;b&gt;Use the Live tile option to customize what you want to see.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;When looking at the plethora of tiles on your Start screen, the view can get stagnant, despite all the pretty colors.This is where Live Tiles come in. They offer real-time data right on your Start screen, and you don't need to open any apps. For example, the Weather tile will show you the current conditions, and Mail will show you the subject of the latest message you've received.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;You can customize which apps are live and which aren't by right-clicking on the tiles. A settings bar on the bottom will pop up with an option to turn the Live Tile on or off. Simply select the preferred option, and you're all set. Note, however, that not all apps have a live, real-time data-streaming option.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h2 style="text-align: left;"&gt;Find the Windows games folder&lt;/h2&gt;&lt;div&gt;Currently, the games folder used in Windows 7 isn’t present in Windows 8. Fear not; if you install any current-generation PC game that would regularly save to this folder, the folder is automatically created. For a quick way to find it, right-click on the game icon on the Start screen and choose “Open file location” at the bottom.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h2 style="text-align: left;"&gt;Activate Family Safety&lt;/h2&gt;&lt;/div&gt;&lt;div&gt;&lt;img src="http://images.techhive.com/images/article/2012/11/family20safety20croppe-100011303-large.png" /&gt;&lt;/div&gt;&lt;div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="color: #999999;"&gt;&lt;b&gt;Let your kids play without having to worry.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;Want to avoid some nasty surprises on your credit card? Create a separate, standard account on the device for your kids (Family Safety can't be applied to an administrator account). You can activate Family Safety by going to the Control Panel, User Accounts, and Family Safety, and selecting the account you would like to apply it to. From these settings you can get reports on the account's activity; set a level of Web filtering; set time limits; and enforce Windows Store, game, and app restrictions.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;h2 style="text-align: left;"&gt;Shut down with one click&lt;/h2&gt;&lt;/div&gt;&lt;div&gt;&lt;img src="http://images.techhive.com/images/article/2012/11/shutdownbuttoncroppe-100011310-large.png" /&gt;&lt;/div&gt;&lt;div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="color: #999999;"&gt;&lt;b&gt;Easy to create button to shut down.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;Windows 8 hides the Power button in the Settings menu, forcing a multistep process just to shut down one's PC. But thanks to a crafty shortcut trick, you can pin a Shutdown button right onto the bottom of your desktop. Here's how.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Create a shortcut on your desktop (right-click, go to New, then Shortcut). Enter "shutdown /s /t 0" (with no quotes, and, yes, that's a zero not an "O") as the location of the item, and press Next. Now name the shortcut (prefereably "Shutdown") and press Finish.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Right-click the shortcut, and navigate to Properties. Choose Change Icon in the Shortcut tab, and then OK to leave the warning box. Choose an icon of your choice from the list. In the screenshot above, you'll see we chose a Power button.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Right-click the shortcut again, and select Pin to Start. You can place the icon on your Start screen wherever it's convenient. Clicking it will instantly shut down your computer.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://hackingaddictions.blogspot.com/2012/12/20-must-know-windows-8-tips-and-tricks.html</link><author>noreply@blogger.com (Narendra KHandwe)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-995130096144042674.post-9197079059098540865</guid><pubDate>Tue, 20 Nov 2012 13:21:00 +0000</pubDate><atom:updated>2013-02-27T01:53:33.489-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Windows 8</category><category domain="http://www.blogger.com/atom/ns#">Windows Tricks</category><title>HOW TO ENABLE DESKTOP GADGETS IN WINDOWS 8</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://1.bp.blogspot.com/-Oh8kNLs4H4g/UKuDfM1e2kI/AAAAAAAAEEQ/uCXyDb6hqY4/s1600/ENABLE+DESKTOP+GADGETS+IN+WINDOWS+8.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="256" src="http://1.bp.blogspot.com/-Oh8kNLs4H4g/UKuDfM1e2kI/AAAAAAAAEEQ/uCXyDb6hqY4/s400/ENABLE+DESKTOP+GADGETS+IN+WINDOWS+8.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;There are several features are missing in Windows 8 all due to skip the security vulnerably, we already have guided you to install Aero Transparency theme in Windows 8 and how to use telnet in Windows 8 and How to Enable Hibernation in Windows 8, today we are discussing How to enable Desktop Gadget in Windows 8.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Desktop gadgets were initially introduced in Windows Vista those were limited to a sidebar area than again it has been introduced in Windows 7 in an improved form and can be placed anywhere on the desktop. In Windows 8 as per Microsoft recently released a security advisory that they have disabled Windows Sidebar and Gadgets to protect the operating system due to insecurity that exploit the feature.&lt;br /&gt;&lt;br /&gt;Although there is no option has been given to add desktop gadget to the operating system but today we will introduce two unofficial ways to enable desktop gadget in Windows 8, before going to start the steps I must recommend you to first scan the solution with any up to date antivirus and batter create a backup of your system.&lt;br /&gt;&lt;br /&gt;Let me discuss the ways to enable desktop gadgets in Windows 8&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;&lt;b&gt;1. Enabling Sidebar / Gadgets for Windows 8 RTM&lt;/b&gt;&lt;/h3&gt;&lt;br /&gt;The first solution is using the gadget files which you will have to download from&lt;br /&gt;&lt;br /&gt;64bit only Version:&lt;br /&gt;&lt;br /&gt;depositfiles.com/files/2h42cjlut REUPPED&lt;br /&gt;&lt;br /&gt;32bit only Version:&lt;br /&gt;&lt;br /&gt;depositfiles.com/files/q0gftdd0i&lt;br /&gt;&lt;br /&gt;This uses the gadget files from the Windows 8 Release Preview to make the Windows Sidebar feature available under the final version of Windows 8. Download the 32-bit or 64-bit version link given above to your computer, extract them to the Windows\system32\ folder and then run the install.cmd file right after this install the desktop gadget support on the system again.&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;&lt;b&gt;2. Windows 8 Desktop Gadgets to Install Using Installer&lt;/b&gt;&lt;/h3&gt;&lt;br /&gt;In the Second way you will get an exe file which has been published in Mike’s belog directly to a file it is a downloadable installer. Although it is risky but definitely a way to do so, I must recommend you to install it on a virtual machin first by all steps than install back to the actual operating system. But in any case be safe and take your Windows 8 backup.&lt;br /&gt;&lt;br /&gt;There is an other way by which you may enjoy gadgets but it is by using a desktop customization tool like Rainmeter but this will be useful if you replace the gadgets that you ran under previous versions of Windows and want to have available in Windows 8.&lt;/div&gt;</description><link>http://hackingaddictions.blogspot.com/2012/11/how-to-enable-desktop-gadgets-in.html</link><author>noreply@blogger.com (Narendra KHandwe)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://1.bp.blogspot.com/-Oh8kNLs4H4g/UKuDfM1e2kI/AAAAAAAAEEQ/uCXyDb6hqY4/s72-c/ENABLE+DESKTOP+GADGETS+IN+WINDOWS+8.jpg" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-995130096144042674.post-8500416400562113298</guid><pubDate>Tue, 20 Nov 2012 13:14:00 +0000</pubDate><atom:updated>2013-02-27T01:53:33.495-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Windows 8</category><title>HOW TO ENABLE AERO TRANSPARENCY THEMES IN WINDOWS 8</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://1.bp.blogspot.com/-AWLUDQIaf18/UKuB1HJStZI/AAAAAAAAEEI/EcQWLiuaUbo/s1600/Aero_Themes_in_Windows_81.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="142" src="http://1.bp.blogspot.com/-AWLUDQIaf18/UKuB1HJStZI/AAAAAAAAEEI/EcQWLiuaUbo/s400/Aero_Themes_in_Windows_81.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;Mostly users do use Microsoft Windows because of its user friendliness and those who are very closer to Microsoft Windows are well aware of all kind of themes available in Windows 7 and Windows 8 but the bad news is that Microsoft has dropped Aero transparency from the final build 9200 and users have no options but to use the default set of non-aero themes.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;But we have got the option to make you cheerful and let you know that Aeo peek is still available in Windows 8 RTM, Users who have upgraded from Windows 7 and don’t have the way to use Aero transparency will be glad to know that there is actually a workaround available to enable the missing feature in Windows 8. you may still try it.&lt;br /&gt;&lt;br /&gt;&amp;nbsp;So for this simply follow the instructions given below to enable Aero transparency in your Windows 8.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Step 1:&lt;/b&gt; Go to the desktop, right-click on desktop and then select Personalize.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Step 2:&lt;/b&gt; Here you will see High Contrast Themes, now click on High Contrast White to apply it. After this, click on the Color to open Color and Appearance window. Minimize Color and Appearance window and but close it.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Step 3:&lt;/b&gt; Now hold the mouse and move the cursor to the upper-right corner of the screen to the see the Charms bar, click Settings and then click Personalization to open Personalization window.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Step 4:&lt;/b&gt; Now, click on one of the themes under Windows Default Themes.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Step 5:&lt;/b&gt; Here Maximize Color and Appearance window and click Save changes button to enable Aero transparency.&lt;br /&gt;&lt;br /&gt;Although this method would work and enable transparency, but it’s not perfect. Windows expatriates are working hard to enable this missing feature in Windows 8. Some more time needed before we get a perfect tool to enable Aero transparency.&lt;br /&gt;&lt;/div&gt;</description><link>http://hackingaddictions.blogspot.com/2012/11/how-to-enable-aero-transparency-themes.html</link><author>noreply@blogger.com (Narendra KHandwe)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://1.bp.blogspot.com/-AWLUDQIaf18/UKuB1HJStZI/AAAAAAAAEEI/EcQWLiuaUbo/s72-c/Aero_Themes_in_Windows_81.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-995130096144042674.post-4022733992961554918</guid><pubDate>Tue, 20 Nov 2012 13:04:00 +0000</pubDate><atom:updated>2013-02-27T01:53:33.503-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Windows 8</category><category domain="http://www.blogger.com/atom/ns#">Windows Tricks</category><title>HOW TO ENABLE HIBERNATION IN WINDOWS 8 AND WINDOWS 7</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;&lt;h2 style="text-align: left;"&gt;Enabling Hibernation in Windows 8 and Windows 7&lt;/h2&gt;This articles objective is to guide you step by step to enable the Hibernate option which is disabled by default in Windows 8, Hibernation is a Windows feature which was earlier enabled in Windows XP and prior operating systems, hibernation is actually allow RAM contents to be written on Hard Disk prior to the power off, when next time computer start it reload all the contents of RAM and take the computer to the same state when it got last shutdown.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;You will all the options for example Log Off, Sleep and Shutdown Windows 8 but there is no hibernate, this option is not visible in Windows 8 may be for the sake of batter GUI speed of Windows 8. Anyway lets start enabling Hibernate option in Windows 8.&lt;br /&gt;&lt;br /&gt;To enable Windows 8 Hibernation option, first click on battery icon in system tray and select More power options.&lt;br /&gt;&lt;br /&gt;Now, select “Choose what the Power buttons do” option from left sidebar.&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://3.bp.blogspot.com/-0ruJGLG_yHM/UKt-Un-XWLI/AAAAAAAAEDU/K4gzexxO0DQ/s1600/ENABLE+HIBERNATION+IN+WINDOWS1.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="283" src="http://3.bp.blogspot.com/-0ruJGLG_yHM/UKt-Un-XWLI/AAAAAAAAEDU/K4gzexxO0DQ/s400/ENABLE+HIBERNATION+IN+WINDOWS1.jpg" width="400" /&gt;&lt;/a&gt;&lt;a href="http://3.bp.blogspot.com/-0ruJGLG_yHM/UKt-Un-XWLI/AAAAAAAAEDU/K4gzexxO0DQ/s1600/ENABLE+HIBERNATION+IN+WINDOWS1.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;br /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Now select the available option “Change settings that are currently unavailable”.&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://2.bp.blogspot.com/-PJ_9jtSo_mo/UKt-lbVsyqI/AAAAAAAAEDc/zUI50hA0FOg/s1600/ENABLE+HIBERNATION+IN+WINDOWS2.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="287" src="http://2.bp.blogspot.com/-PJ_9jtSo_mo/UKt-lbVsyqI/AAAAAAAAEDc/zUI50hA0FOg/s400/ENABLE+HIBERNATION+IN+WINDOWS2.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;This will enable Hibernation option to you. Now Check Show Hibernate option to enable and click on Save Changes.&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://1.bp.blogspot.com/-0OFDfnxt6oI/UKt-vwAXxsI/AAAAAAAAEDk/FGJkhjCgNpM/s1600/ENABLE+HIBERNATION+IN+WINDOWS3.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="286" src="http://1.bp.blogspot.com/-0OFDfnxt6oI/UKt-vwAXxsI/AAAAAAAAEDk/FGJkhjCgNpM/s400/ENABLE+HIBERNATION+IN+WINDOWS3.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Now this option is visible to you, and you may Hibernate your computer from Windows 8 Power options, which can be accessed from search Charms Bar.&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://4.bp.blogspot.com/-WJVW0ykQYMc/UKt-6gUYIzI/AAAAAAAAEDs/acpwmBcPA4E/s1600/ENABLE+HIBERNATION+IN+WINDOWS4.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="290" src="http://4.bp.blogspot.com/-WJVW0ykQYMc/UKt-6gUYIzI/AAAAAAAAEDs/acpwmBcPA4E/s400/ENABLE+HIBERNATION+IN+WINDOWS4.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Windows 8 is one of the very faster operating system than Windows 7, as it uses a technique which hibernates its system kernel. The estimated time I observed for system resumption from a hibernated state in Windows 8 is almost 10 seconds.&lt;/div&gt;</description><link>http://hackingaddictions.blogspot.com/2012/11/how-to-enable-hibernation-in-windows-8.html</link><author>noreply@blogger.com (Narendra KHandwe)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://3.bp.blogspot.com/-0ruJGLG_yHM/UKt-Un-XWLI/AAAAAAAAEDU/K4gzexxO0DQ/s72-c/ENABLE+HIBERNATION+IN+WINDOWS1.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-995130096144042674.post-6399160782927125055</guid><pubDate>Tue, 20 Nov 2012 12:36:00 +0000</pubDate><atom:updated>2013-02-27T01:53:33.511-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Windows 8</category><category domain="http://www.blogger.com/atom/ns#">Windows Tricks</category><title>View A Log Of All Actions Performed On Your PC With LastActivityView</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;h2 style="text-align: left;"&gt;View A Log Of All Actions Performed On Your PC With LastActivityView&lt;/h2&gt;&lt;div&gt;&lt;div&gt;Spending more than the better part of the day in front of the computer has become quite common for most avid computer users. During these sessions, people open a lot of different applications, install new ones, uninstall the redundant ones and move data from one place to another. Sometimes, the number of activities we perform on the computer in one session is so high that it becomes impossible to remember everything that we did. Nirsoft has just released an application called LastActivityView, which allows you to view all the actions performed on a PC. &amp;nbsp;What makes it different from other file/folder activity monitoring applications is that you don’t need to run it in the background to monitor the activities, instead it automatically fetches useful information from Event Viewer &amp;amp; Windows log files, and organizes it into readable form. You can even check which Dynamic Link Libraries were used to perform one specific function, and how often an app calls system files and libraries. It lets you view the recently accessed files, folders and applications and other recently performed operations including shutdown or restart the system, open a network connection etc.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The program lists down the activity data with date &amp;amp; time stamps, making it easier for you to check when a specific action was performed. In addition, it categorizes information into the columns including Description, Filename, Full Path and More Information (if available), which can be saved in TXT, CSV, HTML and XML formats.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;NirSoft is famous for making simple and easy to use tools, and this one is no exception. The main interface of the application has columns for Action Time, Description, Filename, Full Path and More Information. By default, all the data is sorted according to the Action Time and you can change the sorting order by clicking any of the column headings. The program does not offer real time updates of recent activities, and in order to view the updated list of actions, you have to manually refresh it by using the F5 key or Refresh button in the toolbar.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;a href="http://2.bp.blogspot.com/-FU4AA3ycntI/UKtxxSLvCdI/AAAAAAAAECg/oEsOjloBb5w/s1600/Last+Activity+View.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="227" src="http://2.bp.blogspot.com/-FU4AA3ycntI/UKtxxSLvCdI/AAAAAAAAECg/oEsOjloBb5w/s400/Last+Activity+View.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Double click any activity from the list shows you the detailed properties sheet, which contains information related to the Action Time (date and time), Description of the selected activity, Filename, Full path of the file accessed, and More Information.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;a href="http://3.bp.blogspot.com/-uaQPD9x1D9c/UKtx5zDqrKI/AAAAAAAAECo/R_f-9hQmuhM/s1600/Last+Activity+View+2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="172" src="http://3.bp.blogspot.com/-uaQPD9x1D9c/UKtx5zDqrKI/AAAAAAAAECo/R_f-9hQmuhM/s400/Last+Activity+View+2.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;Click the View menu at the top to generate HTML reports of all or selected items, show/hide grid lines, choose columns and enable auto resizing of columns.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://2.bp.blogspot.com/-XZ_tnnWW7So/UKtyQl7g4JI/AAAAAAAAECw/13JMpPuW5Zo/s1600/Last+Activity+View+4.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="400" src="http://2.bp.blogspot.com/-XZ_tnnWW7So/UKtyQl7g4JI/AAAAAAAAECw/13JMpPuW5Zo/s400/Last+Activity+View+4.png" width="355" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;Other than the HTML format, you can also save the list of selected actions in other formats by selecting the Save Selected Items option in the File menu. You have the option of saving the highlighted items in TXT, CSV, XML, and HTML file formats.&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;a href="http://3.bp.blogspot.com/-zcB2b9c7te0/UKtyaGMziaI/AAAAAAAAEC4/dfEapI7Eqyo/s1600/Last+Activity+View+5.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="235" src="http://3.bp.blogspot.com/-zcB2b9c7te0/UKtyaGMziaI/AAAAAAAAEC4/dfEapI7Eqyo/s400/Last+Activity+View+5.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;center&gt;&lt;a class="button big blue" href="http://www.nirsoft.net/utils/lastactivityview.zip" target="_blank"&gt;Download Last Activity View&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;</description><link>http://hackingaddictions.blogspot.com/2012/11/view-log-of-all-actions-performed-on.html</link><author>noreply@blogger.com (Narendra KHandwe)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://2.bp.blogspot.com/-FU4AA3ycntI/UKtxxSLvCdI/AAAAAAAAECg/oEsOjloBb5w/s72-c/Last+Activity+View.jpg" width="72"/><thr:total>0</thr:total><enclosure length="88232" type="application/zip" url="http://www.nirsoft.net/utils/lastactivityview.zip"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>View A Log Of All Actions Performed On Your PC With LastActivityViewSpending more than the better part of the day in front of the computer has become quite common for most avid computer users. During these sessions, people open a lot of different applications, install new ones, uninstall the redundant ones and move data from one place to another. Sometimes, the number of activities we perform on the computer in one session is so high that it becomes impossible to remember everything that we did. Nirsoft has just released an application called LastActivityView, which allows you to view all the actions performed on a PC. &amp;nbsp;What makes it different from other file/folder activity monitoring applications is that you don’t need to run it in the background to monitor the activities, instead it automatically fetches useful information from Event Viewer &amp;amp; Windows log files, and organizes it into readable form. You can even check which Dynamic Link Libraries were used to perform one specific function, and how often an app calls system files and libraries. It lets you view the recently accessed files, folders and applications and other recently performed operations including shutdown or restart the system, open a network connection etc. The program lists down the activity data with date &amp;amp; time stamps, making it easier for you to check when a specific action was performed. In addition, it categorizes information into the columns including Description, Filename, Full Path and More Information (if available), which can be saved in TXT, CSV, HTML and XML formats. NirSoft is famous for making simple and easy to use tools, and this one is no exception. The main interface of the application has columns for Action Time, Description, Filename, Full Path and More Information. By default, all the data is sorted according to the Action Time and you can change the sorting order by clicking any of the column headings. The program does not offer real time updates of recent activities, and in order to view the updated list of actions, you have to manually refresh it by using the F5 key or Refresh button in the toolbar. Double click any activity from the list shows you the detailed properties sheet, which contains information related to the Action Time (date and time), Description of the selected activity, Filename, Full path of the file accessed, and More Information. Click the View menu at the top to generate HTML reports of all or selected items, show/hide grid lines, choose columns and enable auto resizing of columns. Other than the HTML format, you can also save the list of selected actions in other formats by selecting the Save Selected Items option in the File menu. You have the option of saving the highlighted items in TXT, CSV, XML, and HTML file formats. Download Last Activity View</itunes:subtitle><itunes:author>noreply@blogger.com (Narendra KHandwe)</itunes:author><itunes:summary>View A Log Of All Actions Performed On Your PC With LastActivityViewSpending more than the better part of the day in front of the computer has become quite common for most avid computer users. During these sessions, people open a lot of different applications, install new ones, uninstall the redundant ones and move data from one place to another. Sometimes, the number of activities we perform on the computer in one session is so high that it becomes impossible to remember everything that we did. Nirsoft has just released an application called LastActivityView, which allows you to view all the actions performed on a PC. &amp;nbsp;What makes it different from other file/folder activity monitoring applications is that you don’t need to run it in the background to monitor the activities, instead it automatically fetches useful information from Event Viewer &amp;amp; Windows log files, and organizes it into readable form. You can even check which Dynamic Link Libraries were used to perform one specific function, and how often an app calls system files and libraries. It lets you view the recently accessed files, folders and applications and other recently performed operations including shutdown or restart the system, open a network connection etc. The program lists down the activity data with date &amp;amp; time stamps, making it easier for you to check when a specific action was performed. In addition, it categorizes information into the columns including Description, Filename, Full Path and More Information (if available), which can be saved in TXT, CSV, HTML and XML formats. NirSoft is famous for making simple and easy to use tools, and this one is no exception. The main interface of the application has columns for Action Time, Description, Filename, Full Path and More Information. By default, all the data is sorted according to the Action Time and you can change the sorting order by clicking any of the column headings. The program does not offer real time updates of recent activities, and in order to view the updated list of actions, you have to manually refresh it by using the F5 key or Refresh button in the toolbar. Double click any activity from the list shows you the detailed properties sheet, which contains information related to the Action Time (date and time), Description of the selected activity, Filename, Full path of the file accessed, and More Information. Click the View menu at the top to generate HTML reports of all or selected items, show/hide grid lines, choose columns and enable auto resizing of columns. Other than the HTML format, you can also save the list of selected actions in other formats by selecting the Save Selected Items option in the File menu. You have the option of saving the highlighted items in TXT, CSV, XML, and HTML file formats. Download Last Activity View</itunes:summary><itunes:keywords>Windows 8, Windows Tricks</itunes:keywords></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-995130096144042674.post-1798274809376565191</guid><pubDate>Tue, 20 Nov 2012 11:03:00 +0000</pubDate><atom:updated>2013-02-27T01:53:33.520-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Windows 8</category><title>Two Useful Registry Hacks To Make Windows 8 Seem Faster</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;h2 style="text-align: left;"&gt;Here Are Two Useful Registry Hacks To Make Windows 8 Seem Faster&lt;/h2&gt;&lt;div&gt;Windows 8 is awesome. Once you get past the initial shock of having your Start menu replaced by a Windows Phone-like Start screen, you realize the magnitude of effort that’s been put into the operating system to make it faster, safer and more easy to use. But that doesn’t mean you can’t further improve upon it. We’ve already covered some of the best Windows 8 tweaks, hacks and tips and in this article, we’ll be discussing two more registry-based hacks that will improve your Windows 8 experience.&lt;/div&gt;&lt;h3 style="text-align: left;"&gt;MenuShowDelay&lt;/h3&gt;&lt;div&gt;MenuShowDelay is the name of a property in Windows 8’s registry that sets the time it takes from the moment your mouse cursor points towards a menu till the items of the menu are shown. By default, the value of this property is set to 400. With a few steps, you can change it to a smaller value to make menus appear faster.&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;a href="http://4.bp.blogspot.com/-BW-r8eTST8M/UKth9pDrx4I/AAAAAAAAEBs/4g3u7rjeVho/s1600/Make+Windows+8+Fast.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="223" src="http://4.bp.blogspot.com/-BW-r8eTST8M/UKth9pDrx4I/AAAAAAAAEBs/4g3u7rjeVho/s400/Make+Windows+8+Fast.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;Press Win + Q on your keyboard to launch Search in Windows 8. Type in “regedit”. It will show up towards the left. Click on it to launch it.&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;a href="http://2.bp.blogspot.com/-F5-3Zk5ay9Q/UKtiHx_xs_I/AAAAAAAAEB0/rZE1R8FVD0s/s1600/Make+Windows+8+Fast2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="355" src="http://2.bp.blogspot.com/-F5-3Zk5ay9Q/UKtiHx_xs_I/AAAAAAAAEB0/rZE1R8FVD0s/s400/Make+Windows+8+Fast2.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;Using the tree menu on the left side, navigate to HKEY_CURRENT_USER &amp;gt; Control Panel &amp;gt; Desktop. Click on Desktop. Look for a property called MenuShowDelay, as shown in the screenshot above. Right click on it and choose Modify.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;In the window that appears, change “Value Data” to a value between 0-20. This is the time (in milliseconds) it takes from the moment your cursor is placed over a menu till the relevant menu appears. Click OK, and then Restart your computer.&lt;/div&gt;&lt;h3 style="text-align: left;"&gt;MouseHoverTime&lt;/h3&gt;&lt;div&gt;MouseHoverTime is another property in Windows 8’s registry. It determines the time that the system waits to display a pop-up menu when you hover over an item. Its value, too, can be changed to a smaller one to speed up things. Here’s how you can access it:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Once again, launch Windows 8 Search using Windows button + Q. Search for “regedit”. Launch it when it shows up.&lt;/div&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;a href="http://4.bp.blogspot.com/-XzIL1pZdFQk/UKtiXETludI/AAAAAAAAEB8/Kt1oSM7Y5xo/s1600/Make+Windows+8+Fast3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="355" src="http://4.bp.blogspot.com/-XzIL1pZdFQk/UKtiXETludI/AAAAAAAAEB8/Kt1oSM7Y5xo/s400/Make+Windows+8+Fast3.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Navigate to HKEY_CURRENT_USER &amp;gt; Control Panel &amp;gt; Mouse. Be sure to have ‘Mouse’ highlighted by clicking on it in the left column. Now look for a property called MouseHoverTime, as shown in the screenshot above. Right click on it, and choose Modify.&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;a href="http://2.bp.blogspot.com/-bXNoTaS2ke4/UKtiqptnfoI/AAAAAAAAECE/x_U1fgkANjo/s1600/Make+Windows+8+Fast4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="162" src="http://2.bp.blogspot.com/-bXNoTaS2ke4/UKtiqptnfoI/AAAAAAAAECE/x_U1fgkANjo/s400/Make+Windows+8+Fast4.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;In the window that pop ups, change “Value data” to something between 0-20. This is the time in milliseconds that the system waits before showing information when you hover over an item. Once you’ve entered the value, click OK, and restart your computer.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;I’ve tested this on my Windows 8-powered notebook and can confirm that it works. Just don’t forget to Restart your PC.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;for, Shailu ©&lt;/div&gt;&lt;/div&gt;</description><link>http://hackingaddictions.blogspot.com/2012/11/two-useful-registry-hacks-to-make.html</link><author>noreply@blogger.com (Narendra KHandwe)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://4.bp.blogspot.com/-BW-r8eTST8M/UKth9pDrx4I/AAAAAAAAEBs/4g3u7rjeVho/s72-c/Make+Windows+8+Fast.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-995130096144042674.post-2192853277128340552</guid><pubDate>Tue, 20 Nov 2012 10:31:00 +0000</pubDate><atom:updated>2013-02-27T01:53:33.527-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Windows 8</category><title>How To Enable ‘Delete Confirmation Dialog’ In Windows 8</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;&lt;h2 style="text-align: left;"&gt;How To Enable ‘Delete Confirmation Dialog’ In Windows 8&lt;/h2&gt;&lt;br /&gt;With additions like Metro based panels, Start Menu, and Ribbon Explorer, many Windows 8 UI elements have been revamped, such as, the auto run dialog, low battery on-screen notification, desktop snapping, full screen apps, and much more.. Talking of dialog boxes, the most significant improvement that you will notice is with copy/move conflict resolution dialog box, which seems more smart, intuitive and can handle conflicts from a single window. Other noticeable change is that Windows 8 no longer asks you to confirm the deletion of file and folder, i.e when you select a file/folder and hit Delete key, it sends the respective item straight to Recycle Bin without confirming the action. In this post, we will present a simple solution to bring Windows 8 default file/folder delete dialog box back.&lt;br /&gt;&lt;br /&gt;First off, right-click Recycle Bin and select Properties. You can also access Recycle Bin Properties from within the Recycle Bin from Recycle Bin Manage tab.&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;a href="http://4.bp.blogspot.com/-hhAuNatisHc/UKtaxXshuxI/AAAAAAAAEBI/CEjzD-ZyCcQ/s1600/%E2%80%98Delete+Confirmation+Dialog.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="260" src="http://4.bp.blogspot.com/-hhAuNatisHc/UKtaxXshuxI/AAAAAAAAEBI/CEjzD-ZyCcQ/s320/%E2%80%98Delete+Confirmation+Dialog.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;span style="text-align: left;"&gt;In Recycle Bin Properties dialog, enable Display delete confirmation dialog option andclick OK to &amp;nbsp;apply the change.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;a href="http://2.bp.blogspot.com/-EZwE95pmvLs/UKta81u5-zI/AAAAAAAAEBQ/jXmiPLGC3Mc/s1600/%E2%80%98Delete+Confirmation+Dialog+2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="http://2.bp.blogspot.com/-EZwE95pmvLs/UKta81u5-zI/AAAAAAAAEBQ/jXmiPLGC3Mc/s320/%E2%80%98Delete+Confirmation+Dialog+2.jpg" width="286" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;Now when you delete a file or folder, it will ask you to confirm the action before sending the item to Recycle Bin.&lt;br /&gt;&lt;br /&gt;For, Shailu©&lt;br /&gt;&lt;/div&gt;</description><link>http://hackingaddictions.blogspot.com/2012/11/how-to-enable-delete-confirmation.html</link><author>noreply@blogger.com (Narendra KHandwe)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://4.bp.blogspot.com/-hhAuNatisHc/UKtaxXshuxI/AAAAAAAAEBI/CEjzD-ZyCcQ/s72-c/%E2%80%98Delete+Confirmation+Dialog.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-995130096144042674.post-2492020868990263368</guid><pubDate>Tue, 20 Nov 2012 10:23:00 +0000</pubDate><atom:updated>2013-02-27T01:53:33.534-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Windows 8</category><title>Windows 8 Compatibility Issues</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;h2 style="text-align: left;"&gt;Windows 8 Available for Download but Compatibility Issues Exist&lt;/h2&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://3.bp.blogspot.com/-b7Sy_jqjQKU/UKtZoyPuwvI/AAAAAAAAEBA/dp64tWGETwQ/s1600/Windows+8+Compatibility+Issues.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="251" src="http://3.bp.blogspot.com/-b7Sy_jqjQKU/UKtZoyPuwvI/AAAAAAAAEBA/dp64tWGETwQ/s320/Windows+8+Compatibility+Issues.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;Microsoft has released its newest operating system, Windows 8, and it is now available for download at no cost to CU-Boulder faculty and staff (including student employees). As is the case with most new software releases, there are initially a number of incompatibilities with commonly used applications and this is also the case with Windows 8. The Office of Information Technology (OIT) recommends upgrading only when applications that you commonly use are supported and compatible, and you have verified that your hardware can support the new OS. You can learn more about Windows 8 and download it by going to OIT’s Windows 8 webpage.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Testing of Windows 8 conducted by OIT has found incompatibilities with some campus services including PGP Whole Disk Encryption and the Cisco Virtual Private Network (VPN). If your Windows machine is encrypted with PGP Whole Disk Encryption you should not upgrade to Windows 8 as this could result in a loss of data. OIT will continue to test compatibility with campus services and supported software and will report the results at OIT’s Windows 8 webpage.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Many industry analysts have pointed out that the home screen in Windows 8, while optimized for viewing on tablets and smartphones, can be confusing for PC and laptop users. In order to help you become more familiar with Windows 8, the OS has been installed on a computer kiosk for walk-in customers in the IT Service Center located in the Telecommunications Center. You can find hours and location information on the IT Service Center page.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The Microsoft Campus Agreement (MSCA) provides licenses as a common good to CU-Boulder faculty and staff (including student employees) for select Microsoft products and upgrades. More information about the MSCA can be found on the Microsoft Campus Agreement webpage.&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;For, Shailu©&lt;/div&gt;&lt;/div&gt;</description><link>http://hackingaddictions.blogspot.com/2012/11/windows-8-compatibility-issues.html</link><author>noreply@blogger.com (Narendra KHandwe)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://3.bp.blogspot.com/-b7Sy_jqjQKU/UKtZoyPuwvI/AAAAAAAAEBA/dp64tWGETwQ/s72-c/Windows+8+Compatibility+Issues.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-995130096144042674.post-2450522162836188242</guid><pubDate>Tue, 23 Oct 2012 12:57:00 +0000</pubDate><atom:updated>2013-02-27T01:53:33.541-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Antivirus</category><title>Avira Internet Security 2012 With Valid Key Till 2013</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://3.bp.blogspot.com/-Ow3fBnUCfVA/UIaRs5nE37I/AAAAAAAAD_w/yG-0v9f11AA/s1600/Avira-Internet-Security-2012.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="222" src="http://3.bp.blogspot.com/-Ow3fBnUCfVA/UIaRs5nE37I/AAAAAAAAD_w/yG-0v9f11AA/s320/Avira-Internet-Security-2012.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h4 style="text-align: left;"&gt;Description:&lt;/h4&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;Avira Internet Security 2012 for computer protection. firewall, antivirus, spyware, antitroyan, scanner-mail and anti-phishing module. Supported refresh the program and database via the Internet. Repeatedly noted and recognized by millions of users of the software with features to protect against viruses and malware are now equipped with personal firewall and antispam module.&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style="text-align: left;"&gt;Features of Avira Internet Security 2012 :&lt;/h3&gt;&lt;div style="text-align: left;"&gt;&lt;div&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Avira Internet Security 2012 can Protection from viruses, worms and Trojans on computer&lt;/li&gt;&lt;li&gt;Locking of hidden dial toll on resources&lt;/li&gt;&lt;li&gt;Detection and elimination of rootkits&lt;/li&gt;&lt;li&gt;Protection from phishing attacks&lt;/li&gt;&lt;li&gt;High speed scanning viruses, worms and Trojans on your computer&lt;/li&gt;&lt;li&gt;Pleasant and easy to use interface&lt;/li&gt;&lt;li&gt;AntiVir stops all types of viruses&lt;/li&gt;&lt;li&gt;AntiAd / Spyware removes adware and spyware&lt;/li&gt;&lt;li&gt;AntiPhishing protection from phishing&lt;/li&gt;&lt;li&gt;AntiRootkit detects hidden rootkits&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;h4 style="text-align: left;"&gt;How to use it..&lt;/h4&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Download it from the link (Setup with Key).&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;center&gt;&lt;a class="button big blue" href="http://www.mediafire.com/?gkb1xhh767ih5uo" target="_blank"&gt;Click Here To Download&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Install setup.exe and run it.Then go to Help in manu &amp;gt; License Agreement.&lt;/li&gt;&lt;li&gt;Then click on onhbdev.key(written n blue) then choose keyfile (hbdev) click yes.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;a href="http://1.bp.blogspot.com/-9yPO0J0cyCo/UIaR1ZzzLCI/AAAAAAAAD_4/VWOOVBnjcWE/s1600/Avia-Internet-Security-2012-license-key.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="302" src="http://1.bp.blogspot.com/-9yPO0J0cyCo/UIaR1ZzzLCI/AAAAAAAAD_4/VWOOVBnjcWE/s400/Avia-Internet-Security-2012-license-key.png" width="400" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div style="text-align: left;"&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;It will registered till 2013.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;a href="http://1.bp.blogspot.com/-LnxKvqo1P6w/UIaR57TS8JI/AAAAAAAAEAA/tr3205Lm5xU/s1600/avira-internet-security-activation.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="166" src="http://1.bp.blogspot.com/-LnxKvqo1P6w/UIaR57TS8JI/AAAAAAAAEAA/tr3205Lm5xU/s320/avira-internet-security-activation.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;&lt;h4 style="text-align: left;"&gt;Enjoy&lt;/h4&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://hackingaddictions.blogspot.com/2012/10/avira-internet-security-2012-with-valid.html</link><author>noreply@blogger.com (Narendra KHandwe)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://3.bp.blogspot.com/-Ow3fBnUCfVA/UIaRs5nE37I/AAAAAAAAD_w/yG-0v9f11AA/s72-c/Avira-Internet-Security-2012.jpg" width="72"/><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-995130096144042674.post-5898692857854929716</guid><pubDate>Thu, 04 Oct 2012 05:14:00 +0000</pubDate><atom:updated>2013-02-27T01:53:33.549-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Facebook Hack</category><category domain="http://www.blogger.com/atom/ns#">Facebook News</category><category domain="http://www.blogger.com/atom/ns#">Facebook Update</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><title>Hack Facebook Account</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: center;"&gt;&lt;img src="http://t2.gstatic.com/images?q=tbn:ANd9GcRwJmKXOkCp1mQ8H5HFjDNh4VAnpKGkQ9BY5s7LvXOBGc6f2CmGMg" /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;Hence we know that there are many techniques for Hack Facebook Account like Phishing Attacks, Keylogging and other Social techniques but today we are going to see how to hack passwords using new feature introduced by Facebook the 3 Trusted Friends Password Recovery Feature in this what happens if you have lost your password and you don’t have any access to your default email address than this feature will handy by sending request to your 3 trusted friends and hence gaining your account password again.&lt;br /&gt;For this technique you need to create 3 fake Facebook account and you need to surely add these as friends into your victims account whose account you are going to hack.&lt;br /&gt;&lt;br /&gt;After success full addition of your fake accounts into victims account as friends follow the below steps .:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Go to Facebook and click Forgot your Password ?&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: center;"&gt;&lt;img src="http://www.hackersonlineclub.com/_/rsrc/1320057406190/hack-facebook-account/01%5B20%5D.png" /&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Than you will get something like below just enter the details you know about him enter his Username, email address and full name.&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: center;"&gt;&lt;img src="http://www.hackersonlineclub.com/_/rsrc/1320057450316/hack-facebook-account/2.png" /&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;&amp;nbsp;After entering everything check it again and click on search.&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: center;"&gt;&lt;img src="http://www.hackersonlineclub.com/_/rsrc/1320057462669/hack-facebook-account/3.png" /&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;span style="background-color: white; font-family: georgia, serif; font-size: 13px; text-align: -webkit-auto;"&gt;After succeful search for the user Facebook will show some information about how many emails are linked to the account and there is simple option saying&lt;/span&gt;&lt;span style="background-color: white; font-family: georgia, serif; font-size: 13px; text-align: -webkit-auto;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="background-color: white; font-family: georgia, serif; font-size: 13px; text-align: -webkit-auto;"&gt;No Longer Access to These click that one.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div style="text-align: center;"&gt;&lt;img src="http://www.hackersonlineclub.com/_/rsrc/1320057473448/hack-facebook-account/4.png" /&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;div style="text-align: left;"&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Now it will promote you to enter a new email address on which you will get the password resetting option so enter your email address I suggest you creating a Fake or Temporary email address for safety purpose.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;&lt;img src="http://www.hackersonlineclub.com/_/rsrc/1320057481763/hack-facebook-account/5.png" /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;div style="text-align: left;"&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;&amp;nbsp;Than it will promote you to enter the Security well if you have some security guess about that one than that’s ok but if you don’t know it than simply enter 3 wrong answers and it will take you to the 3 trusted friends recovery page like below.&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;img src="http://www.hackersonlineclub.com/_/rsrc/1320057490205/hack-facebook-account/7.png" /&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;div style="text-align: left;"&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Now just click continue and facebook will ask you to choose 3 trusted friends choose the 3 fake profiles of your which you created and added into the victims account.&amp;nbsp;&lt;/li&gt;&lt;li&gt;After selecting 3 accounts facebook will send security codes to these accounts just enter these codes and you will get Password Resetting email from Facebook on the account you created in Step 5&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style="text-align: left;"&gt;That’s it now you are successful in Hacking Facebook Password with the 3 Trusted Friends Method.&lt;/h3&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;h4 style="text-align: left;"&gt;&lt;span style="color: red; font-size: x-large;"&gt;Note:&amp;nbsp;&lt;/span&gt;&lt;/h4&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;This trick only works if 3 trusted friends agree to give you the security code so its really important that you add your 3 fake accounts into your victims facebook account as a friend.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://hackingaddictions.blogspot.com/2012/10/hack-facebook-account.html</link><author>noreply@blogger.com (Narendra KHandwe)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-995130096144042674.post-5646733780250872504</guid><pubDate>Thu, 04 Oct 2012 04:51:00 +0000</pubDate><atom:updated>2013-02-27T01:53:33.643-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Blogger Trix</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><category domain="http://www.blogger.com/atom/ns#">viruses</category><category domain="http://www.blogger.com/atom/ns#">Windows 8</category><category domain="http://www.blogger.com/atom/ns#">Windows Tricks</category><title>EXCLUSIVE POST: HACK WIFI</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;img alt="Photo: ***EXCLUSIVE POST: HACK WIFI*** ----------------------------------------------------------------------------------- How to Crack a Wi-Fi Network’s WEP Password with BackTrack You already know that if you want to lock down your Wi-Fi network, you should opt for WPA encryption because WEP is easy to crack. But did you know how easy? Take a look. Note: This post demonstrates how to crack WEP passwords, an older and less often used network security protocol. If the network you want to crack is using the more popular WPA encryption, see our guide to cracking a Wi-Fi network's WPA password with Reaver instead. Today we're going to run down, step-by-step, how to crack a Wi-Fi network with WEP security turned on. But first, a word: Knowledge is power, but power doesn't mean you should be a jerk, or do anything illegal. Knowing how to pick a lock doesn't make you a thief. Consider this post educational, or a proof-of-concept intellectual exercise. Dozens of tutorials on how to crack WEP are already all over the internet using this method. Seriously—Google it. This ain't what you'd call &amp;quot;news.&amp;quot; But what is surprising is that someone like me, with minimal networking experience, can get this done with free software and a cheap Wi-Fi adapter. Here's how it goes. What You'll Need Unless you're a computer security and networking ninja, chances are you don't have all the tools on hand to get this job done. Here's what you'll need:  A compatible wireless adapter—This is the biggest requirement. You'll need a wireless adapter that's capable of packet injection, and chances are the one in your computer is not.  Get the Alfa AWUS036H, not the US050NH, instead.   A BackTrack Live CD. We already took you on a full screenshot tour of how to install and use BackTrack 3, the Linux Live CD that lets you do all sorts of security testing and tasks. Download yourself a copy of the CD and burn it, or load it up in VMware to get started.  A nearby WEP-enabled Wi-Fi network. The signal should be strong and ideally people are using it, connecting and disconnecting their devices from it. The more use it gets while you collect the data you need to run your crack, the better your chances of success.  Patience with the command line. This is an ten-step process that requires typing in long, arcane commands and waiting around for your Wi-Fi card to collect data in order to crack the password. Like the doctor said to the short person, be a little patient. Crack That WEP To crack WEP, you'll need to launch Konsole, BackTrack's built-in command line. It's right there on the taskbar in the lower left corner, second button to the right. Now, the commands. First run the following to get a list of your network interfaces: airmon-ng The only one I've got there is labeled ra0. Yours may be different; take note of the label and write it down. From here on in, substitute it in everywhere a command includes (interface). Now, run the following four commands. See the output that I got for them in the screenshot below.  airmon-ng stop (interface) ifconfig (interface) down macchanger --mac 00:11:22:33:44:55 (interface) airmon-ng start (interface)  If you don't get the same results from these commands as pictured here, most likely your network adapter won't work with this particular crack. If you do, you've successfully &amp;quot;faked&amp;quot; a new MAC address on your network interface, 00:11:22:33:44:55.  Now it's time to pick your network. Run: airodump-ng (interface) To see a list of wireless networks around you. When you see the one you want, hit Ctrl+C to stop the list. Highlight the row pertaining to the network of interest, and take note of two things: its BSSID and its channel (in the column labeled CH), as pictured below. Obviously the network you want to crack should have WEP encryption (in the ENC) column, not WPA or anything else.  Like I said, hit Ctrl+C to stop this listing. (I had to do this once or twice to find the network I was looking for.) Once you've got it, highlight the BSSID and copy it to your clipboard for reuse in the upcoming commands.  Now we're going to watch what's going on with that network you chose and capture that information to a file. Run: airodump-ng -c (channel) -w (file name) --bssid (bssid) (interface) Where (channel) is your network's channel, and (bssid) is the BSSID you just copied to clipboard. You can use the Shift+Insert key combination to paste it into the command. Enter anything descriptive for (file name). I chose &amp;quot;yoyo,&amp;quot; which is the network's name I'm cracking.    You'll get output like what's in the window in the background pictured below. Leave that one be. Open a new Konsole window in the foreground, and enter this command: aireplay-ng -1 0 -a (bssid) -h 00:11:22:33:44:55 -e (essid) (interface) Here the ESSID is the access point's SSID name, which in my case is yoyo. What you want to get after this command is the reassuring &amp;quot;Association successful&amp;quot; message with that smiley face.   You're almost there. Now it's time for: aireplay-ng -3 -b (bssid) -h 00:11:22:33:44:55 (interface) Here we're creating router traffic to capture more throughput faster to speed up our crack. After a few minutes, that front window will start going crazy with read/write packets. (Also, I was unable to surf the web with the yoyo network on a separate computer while this was going on.) Here's the part where you might have to grab yourself a cup of coffee or take a walk. Basically you want to wait until enough data has been collected to run your crack. Watch the number in the &amp;quot;#Data&amp;quot; column—you want it to go above 10,000.  Depending on the power of your network (mine is inexplicably low at -32 in that screenshot, even though the yoyo AP was in the same room as my adapter), this process could take some time. Wait until that #Data goes over 10k, though—because the crack won't work if it doesn't. In fact, you may need more than 10k, though that seems to be a working threshold for many.    Once you've collected enough data, it's the moment of truth. Launch a third Konsole window and run the following to crack that data you've collected: aircrack-ng -b (bssid) (file name-01.cap) Here the filename should be whatever you entered above for (file name). You can browse to your Home directory to see it; it's the one with .cap as the extension. If you didn't get enough data, aircrack will fail and tell you to try again with more. If it succeeds, it will look like this: Full size   The WEP key appears next to &amp;quot;KEY FOUND.&amp;quot; Drop the colons and enter it to log onto the network.   Problems Along the Way With this article I set out to prove that cracking WEP is a relatively &amp;quot;easy&amp;quot; process for someone determined and willing to get the hardware and software going. I still think that's true, but unlike the guy in the video below, I had several difficulties along the way. In fact, you'll notice that the last screenshot up there doesn't look like the others—it's because it's not mine. Even though the AP which I was cracking was my own and in the same room as my Alfa, the power reading on the signal was always around -30, and so the data collection was very slow, and BackTrack would consistently crash before it was complete. After about half a dozen attempts (and trying BackTrack on both my Mac and PC, as a live CD and a virtual machine), I still haven't captured enough data for aircrack to decrypt the key. So while this process is easy in theory, your mileage may vary depending on your hardware, proximity to the AP point, and the way the planets are aligned. Oh yeah, and if you're on deadline—Murphy's Law almost guarantees it won't work if you're on deadline." height="320" src="https://fbcdn-sphotos-e-a.akamaihd.net/hphotos-ak-snc6/c0.0.403.403/p403x403/229429_421319551249113_1129541332_n.jpg" width="320" /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h2 style="text-align: left;"&gt;How to Crack a Wi-Fi Network’s WEP Password with BackTrack&lt;/h2&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;You already know that if you want to lock down your Wi-Fi network, you should opt for WPA encryption because WEP is easy to crack. But did you know how easy? Take a look.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h2 style="text-align: left;"&gt;&lt;span style="color: red; font-size: x-large;"&gt;Note:&amp;nbsp;&lt;/span&gt;&lt;/h2&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;This post demonstrates how to crack WEP passwords, an older and less often used network security protocol. If the network you want to crack is using the more popular WPA encryption, see our guide to cracking a Wi-Fi network's WPA password with Reaver instead.&lt;/li&gt;&lt;li&gt;Today we're going to run down, step-by-step, how to crack a Wi-Fi network with WEP security turned on. But first, a word: Knowledge is power, but power doesn't mean you should be a jerk, or do anything illegal. Knowing how to pick a lock doesn't make you a thief. Consider this post educational, or a proof-of-concept intellectual exercise.&lt;/li&gt;&lt;li&gt;Dozens of tutorials on how to crack WEP are already all over the internet using this method. Seriously—Google it. This ain't what you'd call "news." But what is surprising is that someone like me, with minimal networking experience, can get this done with free software and a cheap Wi-Fi adapter. Here's how it goes.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;What You'll Need&lt;/h3&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Unless you're a computer security and networking ninja, chances are you don't have all the tools on hand to get this job done. Here's what you'll need:&lt;/li&gt;&lt;li&gt;A compatible wireless adapter—This is the biggest requirement. You'll need a wireless adapter that's capable of packet injection, and chances are the one in your computer is not. Get the Alfa AWUS036H, not the US050NH, instead.&amp;nbsp;&lt;/li&gt;&lt;li&gt;A BackTrack Live CD. We already took you on a full screenshot tour of how to install and use BackTrack 3, the Linux Live CD that lets you do all sorts of security testing and tasks. Download yourself a copy of the CD and burn it, or load it up in VMware to get started.&lt;/li&gt;&lt;li&gt;A nearby WEP-enabled Wi-Fi network. The signal should be strong and ideally people are using it, connecting and disconnecting their devices from it. The more use it gets while you collect the data you need to run your crack, the better your chances of success.&lt;/li&gt;&lt;li&gt;Patience with the command line. This is an ten-step process that requires typing in long, arcane commands and waiting around for your Wi-Fi card to collect data in order to crack the password. Like the doctor said to the short person, be a little patient.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;Crack That WEP&lt;/h3&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;To crack WEP, you'll need to launch Konsole, BackTrack's built-in command line. It's right there on the taskbar in the lower left corner, second button to the right. Now, the commands.&lt;/li&gt;&lt;li&gt;First run the following to get a list of your network interfaces:&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4 style="text-align: left;"&gt;&lt;span style="color: lime; font-size: x-large;"&gt;airmon-ng&lt;/span&gt;&lt;/h4&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;The only one I've got there is labeled ra0. Yours may be different; take note of the label and write it down. From here on in, substitute it in everywhere a command includes (interface).&lt;/li&gt;&lt;li&gt;Now, run the following four commands. See the output that I got for them in the screenshot below.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;&lt;h4 style="text-align: left;"&gt;&lt;span style="color: lime; font-size: x-large;"&gt;airmon-ng stop (interface)&lt;br /&gt;ifconfig (interface) down&lt;br /&gt;macchanger --mac 00:11:22:33:44:55 (interface)&lt;br /&gt;airmon-ng start (interface)&lt;/span&gt;&lt;/h4&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;If you don't get the same results from these commands as pictured here, most likely your network adapter won't work with this particular crack. If you do, you've successfully "faked" a new MAC address on your network interface, 00:11:22:33:44:55.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;Now it's time to pick your network. Run:&lt;/h3&gt;&lt;h4 style="text-align: left;"&gt;&lt;span style="color: lime; font-size: x-large;"&gt;airodump-ng (interface)&lt;/span&gt;&lt;/h4&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;To see a list of wireless networks around you. When you see the one you want, hit Ctrl+C to stop the list. Highlight the row pertaining to the network of interest, and take note of two things: its BSSID and its channel (in the column labeled CH), as pictured below. Obviously the network you want to crack should have WEP encryption (in the ENC) column, not WPA or anything else.&lt;/li&gt;&lt;li&gt;Like I said, hit Ctrl+C to stop this listing. (I had to do this once or twice to find the network I was looking for.) Once you've got it, highlight the BSSID and copy it to your clipboard for reuse in the upcoming commands.&lt;/li&gt;&lt;li&gt;Now we're going to watch what's going on with that network you chose and capture that information to a file. Run:&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4 style="text-align: left;"&gt;&lt;span style="color: lime; font-size: x-large;"&gt;airodump-ng -c (channel) -w (file name) --bssid (bssid) (interface)&lt;/span&gt;&lt;/h4&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Where (channel) is your network's channel, and (bssid) is the BSSID you just copied to clipboard. You can use the Shift+Insert key combination to paste it into the command. Enter anything descriptive for (file name). I chose "yoyo," which is the network's name I'm cracking.&lt;/li&gt;&lt;li&gt;You'll get output like what's in the window in the background pictured below. Leave that one be. Open a new Konsole window in the foreground, and enter this command:&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h4 style="text-align: left;"&gt;&lt;span style="color: lime; font-size: x-large;"&gt;aireplay-ng -1 0 -a (bssid) -h 00:11:22:33:44:55 -e (essid) (interface)&lt;/span&gt;&lt;/h4&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Here the ESSID is the access point's SSID name, which in my case is yoyo. What you want to get after this command is the reassuring "Association successful" message with that smiley face.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;You're almost there. Now it's time for:&lt;/h3&gt;&lt;h4 style="text-align: left;"&gt;&lt;span style="color: lime; font-size: x-large;"&gt;aireplay-ng -3 -b (bssid) -h 00:11:22:33:44:55 (interface)&lt;/span&gt;&lt;/h4&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Here we're creating router traffic to capture more throughput faster to speed up our crack. After a few minutes, that front window will start going crazy with read/write packets. (Also, I was unable to surf the web with the yoyo network on a separate computer while this was going on.) Here's the part where you might have to grab yourself a cup of coffee or take a walk. Basically you want to wait until enough data has been collected to run your crack. Watch the number in the "#Data" column—you want it to go above 10,000.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Depending on the power of your network (mine is inexplicably low at -32 in that screenshot, even though the yoyo AP was in the same room as my adapter), this process could take some time. Wait until that #Data goes over 10k, though—because the crack won't work if it doesn't. In fact, you may need more than 10k, though that seems to be a working threshold for many.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;Once you've collected enough data, it's the moment of truth. Launch a third Konsole window and run the following to crack that data you've collected:&lt;/h3&gt;&lt;h4&gt;&lt;span style="color: lime; font-size: x-large;"&gt;aircrack-ng -b (bssid) (file name-01.cap)&lt;/span&gt;&lt;/h4&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Here the filename should be whatever you entered above for (file name). You can browse to your Home directory to see it; it's the one with .cap as the extension.&lt;/li&gt;&lt;li&gt;If you didn't get enough data, aircrack will fail and tell you to try again with more. If it succeeds, it will look like this:&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h2 style="text-align: left;"&gt;Full size&lt;/h2&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;The WEP key appears next to "KEY FOUND." Drop the colons and enter it to log onto the network.&lt;/h3&gt;&lt;br /&gt;&lt;br /&gt;&lt;h2 style="text-align: left;"&gt;Problems Along the Way&lt;/h2&gt;With this article I set out to prove that cracking WEP is a relatively "easy" process for someone determined and willing to get the hardware and software going. I still think that's true, but unlike the guy in the video below, I had several difficulties along the way. In fact, you'll notice that the last screenshot up there doesn't look like the others—it's because it's not mine. Even though the AP which I was cracking was my own and in the same room as my Alfa, the power reading on the signal was always around -30, and so the data collection was very slow, and BackTrack would consistently crash before it was complete. After about half a dozen attempts (and trying BackTrack on both my Mac and PC, as a live CD and a virtual machine), I still haven't captured enough data for aircrack to decrypt the key.&lt;br /&gt;So while this process is easy in theory, your mileage may vary depending on your hardware, proximity to the AP point, and the way the planets are aligned. Oh yeah, and if you're on deadline—Murphy's Law almost guarantees it won't work if you're on deadline.&lt;br /&gt;&lt;/div&gt;</description><link>http://hackingaddictions.blogspot.com/2012/10/exclusive-post-hack-wifi.html</link><author>noreply@blogger.com (Narendra KHandwe)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-995130096144042674.post-8772095628225034152</guid><pubDate>Wed, 03 Oct 2012 10:38:00 +0000</pubDate><atom:updated>2013-02-27T01:53:33.739-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Blogger Trix</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Internet Twick</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><category domain="http://www.blogger.com/atom/ns#">viruses</category><category domain="http://www.blogger.com/atom/ns#">Windows Tricks</category><title>HACKING THE WAL-MART ARMORGUARD  COMPUTER PROTECTION SYSTEM.</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;&lt;img height="256" src="http://justanothercoverup.com/wp-content/uploads/2010/04/2909598295_92568a38d1.jpg" width="320" /&gt;&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;  &lt;/span&gt;&lt;br /&gt;&lt;b&gt;HACKING THE WAL-MART ARMORGUARD &amp;nbsp;COMPUTER PROTECTION SYSTEM.&lt;/b&gt;&lt;br /&gt;&lt;h2 style="text-align: left;"&gt;&lt;span class="Apple-tab-span" style="white-space: pre;"&gt; &lt;/span&gt;NOTE&lt;/h2&gt;&lt;div style="text-align: left;"&gt;&lt;/div&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;To use this, you must have a system disk (i.e. a disk that has been&amp;nbsp;formatted using [format a: /s]) in 3.5" format under Windows 95, because that&amp;nbsp;is what they sell all of their computers with.&lt;/li&gt;&lt;li&gt;In this file, instructions to be input into the computer are surrounded&amp;nbsp;by [ and ]. &amp;nbsp;Keys are surrounded by &amp;lt; and &amp;gt;. &amp;nbsp;So if I say "hit [&amp;lt;CTRL&amp;gt;-&amp;lt;F1&amp;gt;] I&amp;nbsp;mean to hold down the control button and hit F1.&lt;/li&gt;&lt;li&gt;The&amp;nbsp;armor guard&amp;nbsp;is a program that prevents you from writing to the&amp;nbsp;directories, changing the attributes of files, and deleting files. &amp;nbsp;It&amp;nbsp;basically prevents you from doing anything cool.&lt;/li&gt;&lt;li&gt;The first thing to do is to go into Wal-Mart. &amp;nbsp;Now, go to the&amp;nbsp;computer section and turn off the screen saver. &amp;nbsp;Shut down as many apps as&amp;nbsp;you can with the [&amp;lt;CTRL&amp;gt;-&amp;lt;ALT&amp;gt;-&amp;lt;DEL&amp;gt;] and then choosing a program and&amp;nbsp;hitting enter. &amp;nbsp;You cannot simply do this to the&amp;nbsp;Armor Guard&amp;nbsp;program.&amp;nbsp;&lt;/li&gt;&lt;li&gt;The next thing to do is to go to the DOS PROMPT. &amp;nbsp;Most Wal-Marts&amp;nbsp;take the mouse ball out of all of the display mice to make it harder to&amp;nbsp;control the system. &amp;nbsp;If you are adept at putting your finger inside the mouse&amp;nbsp;and controlling it that way, fine. &amp;nbsp;Otherwise, just hit [&amp;lt;CTRL&amp;gt;-&amp;lt;ALT&amp;gt;-&amp;lt;ESC&amp;gt;].&lt;/li&gt;&lt;li&gt;This activates the start menu. &amp;nbsp;Select "Programs", hit enter, then go down to&amp;nbsp;near the bottom of the "Programs" menu and select "MS-DOS PROMPT". &amp;nbsp;Hit enter.&lt;/li&gt;&lt;li&gt;Now you are in a DOS window and in the C:\Windows directory. &amp;nbsp;Hit&amp;nbsp;[cd..] and then hit [fdisk /mbr], which restores the master boot record, Preventing the password prompt from coming up when you reset the computer.&lt;/li&gt;&lt;li&gt;Now just hit [&amp;lt;CTRL&amp;gt;-&amp;lt;ALT&amp;gt;-&amp;lt;DEL&amp;gt;] twice (once gets you to task manager,&amp;nbsp;twice reboots) and wait. &amp;nbsp;When you see&amp;nbsp;Starting Windows 95...&amp;nbsp;on the screen, hit [&amp;lt;F8&amp;gt;] really fast just once, then choose "Verify&amp;nbsp;each step" (or something to that effect), usually choice number 4. &amp;nbsp;It will &amp;nbsp;give you an A: prompt and say "Please give the path of your command interpreter,&amp;nbsp;i.e. C:\WINDOWS\COMMAND.COM". &amp;nbsp;At this point, put the system disk you have&amp;nbsp;made in the drive and hit [A:\COMMAND.COM]. &amp;nbsp;Say "Yes" to everything except&amp;nbsp;the following:&amp;nbsp;&lt;/li&gt;&lt;li&gt;Log this bootup? (Bootlog.txt)? (y/n)&amp;nbsp;&lt;span class="Apple-tab-span" style="white-space: pre;"&gt; &lt;/span&gt;C:\armguard.exe? (y/n)&amp;nbsp;(***OR ANYTHING ELSE STARTING WITH "C:\ARM", LIKE "C:\ARMOR",&amp;nbsp;for instance.)&lt;/li&gt;&lt;li&gt;If you have done this right, ARMGUARD SHOULDN'T COME UP AT ALL. &amp;nbsp;If&amp;nbsp;it does, hit "command prompt only" instead of "Verify each step" and then&amp;nbsp;specify C:\AUTOEXEC.BAT and C:\CONFIG.SYS if it asks for the configuration&amp;nbsp;and the startup file. &amp;nbsp;(IN THE OPPOSITE ORDER. &amp;nbsp;CONFIG.SYS IS THE CONFIG FILE,&amp;nbsp;AUTOEXEC.BAT IS THE STARTUP FILE.) &amp;nbsp;Then immediately hit [&amp;lt;F4&amp;gt;] and it will&amp;nbsp;give you step-by-step confirmation for each item. &amp;nbsp;See above for the ones&amp;nbsp;to say no to. &amp;nbsp;Then you want to hit&amp;nbsp;[C:\WINDOWS\COMMAND\EDIT.COM C:\WINDOWS\WIN.INI]&amp;nbsp;and the DOS edit program will come up. &amp;nbsp;Choose "Search" and hit "Find" and &amp;nbsp;then tell it to find ARM and make sure it's NOT on match whole word only.&lt;/li&gt;&lt;li&gt;Delete any line with ARM in it that looks like a part of ArmorGuard. &amp;nbsp;This&amp;nbsp;should prevent it from coming up on Windows.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;IF NONE OF THIS WORKS, YOU HAVE TO TAKE THE READ-ONLY AND ARCHIVE&lt;br /&gt;ATTRIBUTES OFF OF THE WIN.INI, SYSTEM.INI, AUTOEXEC.BAT, AND CONFIG.SYS FILES&lt;br /&gt;BY HITTING [ATTRIB -A -R (c:\WHATEVERFILE.YOUWANTTODOTHISTO)]&lt;br /&gt;&lt;br /&gt;I'D ALSO RECOMMEND EDITING THE AUTOEXEC.BAT FILE TO PREVENT ARMGUARD&lt;br /&gt;FROM EVER COMING UP AGAIN.&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;THINGS TO DO AFTER HACKING ARMORGUARD&lt;/h3&gt;&lt;br /&gt;Hmmm....&lt;br /&gt;USE YOUR IMAGINATION!&lt;br /&gt;&lt;br /&gt;Think of this: &amp;nbsp;Hit "shut down in MS-DOS mode" or start up in MS-DOS mode,&lt;br /&gt;put your boot disk in drive a: and hit the following commands&lt;br /&gt;&lt;br /&gt;[A:]&lt;br /&gt;[FORMAT C:]&lt;br /&gt;&lt;br /&gt;and then confirm this. &amp;nbsp;You have just started the permanent erasing of&lt;br /&gt;EVERYTHING on the hard drive. &amp;nbsp;You can also do some other cool stuff with&lt;br /&gt;it too, just basically IF YOU WOULD DO IT TO SOMEONE YOU HATE, DO IT TO&lt;br /&gt;WAL-MART. &amp;nbsp;Personally, I'd think that INSTEAD OF ERASING THE HARD DRIVE, I'D&lt;br /&gt;WRITE A VIRUS AND PUT IT ON THE COMPUTER. &amp;nbsp;THAT WOULD REALLY BE MORE FUN.&lt;br /&gt;JUST STORE IT ON A FLOPPY AND COPY IT. &lt;br /&gt;&lt;h2 style="text-align: left;"&gt;&lt;span style="font-size: x-large;"&gt;HAVE FUN, DON'T GET CAUGHT.&lt;/span&gt;&lt;/h2&gt;&lt;span class="Apple-tab-span" style="white-space: pre;"&gt;    &lt;/span&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://hackingaddictions.blogspot.com/2012/10/hacking-wal-mart-armorguard-computer.html</link><author>noreply@blogger.com (Narendra KHandwe)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-995130096144042674.post-703888507950392091</guid><pubDate>Wed, 03 Oct 2012 08:50:00 +0000</pubDate><atom:updated>2013-02-27T01:53:33.834-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Blogger Trix</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><category domain="http://www.blogger.com/atom/ns#">viruses</category><category domain="http://www.blogger.com/atom/ns#">Windows Tricks</category><title>Caught A Virus?</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;&lt;img src="http://t3.gstatic.com/images?q=tbn:ANd9GcRsaq9pxRyx80a8Hq-bV3WJiP6BL9EqbHvHMFxVTGKcZQPehYlRO5xOH7h8" /&gt;&lt;br /&gt;&lt;br /&gt;If you've let your guard down--or even if you haven't--it can be hard to tell if your PC is infected. Here's what to do if you suspect the worst.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Heard this one before? You must run antivirus software and keep it up to date or else your PC will get infected, you'll lose all your data, and you'll incur the wrath of every e-mail buddy you unknowingly infect because of your carelessness.&lt;br /&gt;&lt;br /&gt;You know they're right. Yet for one reason or another, you're not running antivirus software, or you are but it's not up to date. Maybe you turned off your virus scanner because it conflicted with another program. Maybe you got tired of upgrading after you bought Norton Antivirus 2001, 2002, and 2003. Or maybe your annual subscription of virus definitions recently expired, and you've put off renewing.&lt;br /&gt;&lt;br /&gt;It happens. It's nothing to be ashamed of. But chances are, either you're infected right now, as we speak, or you will be very soon.&lt;br /&gt;&lt;br /&gt;For a few days in late January, the Netsky.p worm was infecting about 2,500 PCs a day. Meanwhile the MySQL bot infected approximately 100 systems a minute (albeit not necessarily desktop PCs). As David Perry, global director of education for security software provider Trend Micro, puts it, "an unprotected [Windows] computer will become owned by a bot within 14 minutes."&lt;br /&gt;&lt;br /&gt;Today's viruses, worms, and so-called bots--which turn your PC into a zombie that does the hacker's bidding (such as mass-mailing spam)--aren't going to announce their presence. Real viruses aren't like the ones in Hollywood movies that melt down whole networks in seconds and destroy alien spacecraft. They operate in the background, quietly altering data, stealing private operations, or using your PC for their own illegal ends. This makes them hard to spot if you're not well protected.&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;Is Your PC "Owned?"&lt;/h3&gt;&lt;br /&gt;I should start by saying that not every system oddity is due to a virus, worm, or bot. Is your system slowing down? Is your hard drive filling up rapidly? Are programs crashing without warning? These symptoms are more likely caused by Windows, or badly written legitimate programs, rather than malware. After all, people who write malware want to hide their program's presence. People who write commercial software put icons all over your desktop. Who's going to work harder to go unnoticed?&lt;br /&gt;&lt;br /&gt;Other indicators that may, in fact, indicate that there's nothing that you need to worry about, include:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;An automated e-mail telling you that you're sending out infected mail. E-mail viruses and worms typically come from faked addresses.&lt;/li&gt;&lt;li&gt;A frantic note from a friend saying they've been infected, and therefore so have you. This is likely a hoax. It's especially suspicious if the note tells you the virus can't be detected but you can get rid of it by deleting one simple file. Don't be fooled--and don't delete that file.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;I'm not saying that you should ignore such warnings. Copy the subject line or a snippet from the body of the e-mail and plug it into your favorite search engine to see if other people have received the same note. A security site may have already pegged it as a hoax.&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;Sniffing Out an Infection&lt;/h3&gt;&lt;br /&gt;There are signs that indicate that your PC is actually infected. A lot of network activity coming from your system (when you're not actually using Internet) can be a good indicator that something is amiss. A good software firewall, such as ZoneAlarm, will ask your permission before letting anything leave your PC, and will give you enough information to help you judge if the outgoing data is legitimate. By the way, the firewall that comes with Windows, even the improved version in XP Service Pack 2, lacks this capability.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;To put a network status light in your system tray, follow these steps: In Windows XP, choose Start, Control Panel, Network Connections, right-click the network connection you want to monitor, choose Properties, check "Show icon in notification area when connected," and click OK.&lt;/li&gt;&lt;li&gt;If you're interested in being a PC detective, you can sniff around further for malware. By hitting Ctrl-Alt-Delete in Windows, you'll bring up the Task Manager, which will show you the various processes your system is running. Most, if not all, are legit, but if you see a file name that looks suspicious, type it into a search engine and find out what it is.&lt;/li&gt;&lt;li&gt;Want another place to look? In Windows XP, click Start, Run, type "services.msc" in the box, and press Enter. You'll see detailed descriptions of the services Windows is running. Something look weird? Check with your search engine.&lt;/li&gt;&lt;li&gt;Finally, you can do more detective work by selecting Start, Run, and typing "msconfig" in the box. With this tool you not only see the services running, but also the programs that your system is launching at startup. Again, check for anything weird.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;If any of these tools won't run--or if your security software won't run--that in itself is a good sign your computer is infected. Some viruses intentionally disable such programs as a way to protect themselves.&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;What to Do Next&lt;/h3&gt;&lt;br /&gt;Once you're fairly sure your system is infected, don't panic. There are steps you can take to assess the damage, depending on your current level of protection.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;If you don't have any antivirus software on your system (shame on you), or if the software has stopped working, stay online and go for a free scan at one of several Web sites. There's McAfee FreeScan, Symantec Security Check, and Trend Micro's HouseCall. If one doesn't find anything, try two. In fact, running a free online virus scan is a good way to double-check the work of your own local antivirus program. When you're done, buy or download a real antivirus program.&lt;/li&gt;&lt;li&gt;If you have antivirus software, but it isn't active, get offline, unplug wires-- whatever it takes to stop your computer from communicating via the Internet. Then, promptly perform a scan with the installed software.&lt;/li&gt;&lt;li&gt;If nothing seems to be working, do more research on the Web. There are several online virus libraries where you can find out about known viruses. These sites often provide instructions for removing viruses--if manual removal is possible--or a free removal tool if it isn't. Check out GriSOFT's Virus Encyclopedia, Eset's Virus Descriptions, McAffee's Virus Glossary, Symantec's Virus Encyclopedia, or Trend Micro's Virus Encyclopedia.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;A Microgram of Prevention&lt;/h3&gt;&lt;br /&gt;Assuming your system is now clean, you need to make sure it stays that way. Preventing a breach of your computer's security is far more effective than cleaning up the mess afterwards. Start with a good security program, such Trend Micro's PC-Cillin, which you can buy for $50.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Don't want to shell out any money? You can cobble together security through free downloads, such as AVG Anti-Virus Free Edition, ZoneAlarm (a personal firewall), and Ad-Aware SE (an antispyware tool).&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Just make sure you keep all security software up to date. The bad guys constantly try out new ways to fool security programs. Any security tool without regular, easy (if not automatic) updates isn't worth your money or your time.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;Speaking of updating, the same goes for Windows. Use Windows Update (it's right there on your Start Menu) to make sure you're getting all of the high priority updates. If you run Windows XP, make sure to get the Service Pack 2 update. To find out if you already have it, right-click My Computer, and select Properties. Under the General tab, under System, it should say "Service Pack 2."&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;Here are a few more pointers for a virus-free life:&lt;/h3&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Be careful with e-mail. Set your e-mail software security settings to high. Don't open messages with generic-sounding subjects that don't apply specifically to you from people you don't know. Don't open an attachment unless you're expecting it.&lt;/li&gt;&lt;li&gt;If you have broadband Internet access, such as DSL or cable, get a router, even if you only have one PC. A router adds an extra layer of protection because your PC is not connecting directly with the Internet.&lt;/li&gt;&lt;li&gt;Check your Internet ports. These doorways between your computer and the Internet can be open, in which case your PC is very vulnerable; closed, but still somewhat vulnerable; or stealthed (or hidden), which is safest. Visit Gibson Research's Web site and run the free ShieldsUP test to see your ports' status. If some ports show up as closed--or worse yet, open--check your router's documentation to find out how to hide them.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://hackingaddictions.blogspot.com/2012/10/caught-virus.html</link><author>noreply@blogger.com (Narendra KHandwe)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-995130096144042674.post-3479771747879596626</guid><pubDate>Wed, 03 Oct 2012 08:44:00 +0000</pubDate><atom:updated>2013-02-27T01:53:33.931-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Blogger Trix</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><category domain="http://www.blogger.com/atom/ns#">viruses</category><title> A simple TCP spoofing attack</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;&lt;img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzg2V8ZHWFntQ02FogEHA9Anmcw-49tmJrNlYNLjDOiblUJF4G5bdrz3_bf-Wf_LaITAli7uZ-eKQncD5GOd8UWwO_ilGYTefFsrE8YEOg8CXzUpW8EeZIa6LSjEb-kswPk5Mb_Ju_IzYh/s320/TCP-Sequence-Prediction-Attack.gif" /&gt;&lt;br /&gt;Over the past few years TCP sequence number prediction attacks have become a&lt;br /&gt;real threat against unprotected networks, taking advantage of the inherent&lt;br /&gt;trust relationships present in many network installations. &amp;nbsp;TCP sequence&lt;br /&gt;number prediction attacks have most commonly been implemented by opening a&lt;br /&gt;series of connections to the target host, and attempting to predict the&lt;br /&gt;sequence number which will be used next. &amp;nbsp;Many operating systems have&lt;br /&gt;therefore attempted to solve this problem by implementing a method of&lt;br /&gt;generating sequence numbers in unpredictable fashions. &amp;nbsp;This method does&lt;br /&gt;not solve the problem.&lt;br /&gt;&lt;br /&gt;This advisory introduces an alternative method of obtaining the initial&lt;br /&gt;sequence number from some common trusted services. &amp;nbsp;The attack presented here&lt;br /&gt;does not require the attacker to open multiple connections, or flood a port&lt;br /&gt;on the trusted host to complete the attack. &amp;nbsp;The only requirement is that&lt;br /&gt;source routed packets can be injected into the target network with fake&lt;br /&gt;source addresses.&lt;br /&gt;&lt;br /&gt;This advisory assumes that the reader already has an understanding of how&lt;br /&gt;TCP sequence number prediction attacks are implemented.&lt;br /&gt;&lt;br /&gt;The impact of this advisory is greatly diminished due to the large number of&lt;br /&gt;organizations which block source routed packets and packets with addresses&lt;br /&gt;inside of their networks. &amp;nbsp;Therefore we present the information as more of&lt;br /&gt;a 'heads up' message for the technically inclined, and to re-iterate that&lt;br /&gt;the randomization of TCP sequence numbers is not an effective solution&lt;br /&gt;against this attack.&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;&lt;br /&gt;Technical Details&lt;br /&gt;~~~~~~~~~~~~~~~~~&lt;/h3&gt;&lt;br /&gt;The problem occurs when particular network daemons accept connections&lt;br /&gt;with source routing enabled, and proceed to disable any source routing&lt;br /&gt;options on the connection. &amp;nbsp;The connection is allowed to continue, however&lt;br /&gt;the reverse route is no longer used. &amp;nbsp;An example attack can launched against&lt;br /&gt;the in.rshd daemon, which on most systems will retrieve the socket options&lt;br /&gt;via getsockopt() and then turn off any dangerous options via setsockopt().&lt;br /&gt;&lt;br /&gt;An example attack follows.&lt;br /&gt;&lt;br /&gt;Host A is the trusted host&lt;br /&gt;Host B is the target host&lt;br /&gt;Host C is the attacker&lt;br /&gt;&lt;br /&gt;Host C initiates a source routed connection to in.rshd on host B, pretending&lt;br /&gt;to be host A.&lt;br /&gt;&lt;br /&gt;Host C spoofing Host A &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;SYN&amp;gt; &amp;nbsp; &amp;nbsp;--&amp;gt; &amp;nbsp;Host B in.rshd&lt;br /&gt;&lt;br /&gt;Host B receives the initial SYN packet, creates a new PCB (protocol&lt;br /&gt;control block) and associates the route with the PCB. &amp;nbsp;Host B responds,&lt;br /&gt;using the reverse route, sending back a SYN/ACK with the sequence number.&lt;br /&gt;&lt;br /&gt;Host C spoofing Host A &amp;nbsp;&amp;lt;-- &amp;nbsp;&amp;lt;SYN/ACK&amp;gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; Host B in.rshd&lt;br /&gt;&lt;br /&gt;Host C responds, still spoofing host A, acknowledging the sequence number.&lt;br /&gt;Source routing options are not required on this packet.&lt;br /&gt;&lt;br /&gt;Host C spoofing Host A &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;ACK&amp;gt; &amp;nbsp; &amp;nbsp;--&amp;gt; &amp;nbsp;Host B in.rshd&lt;br /&gt;&lt;br /&gt;We now have an established connection, the accept() call completes, and&lt;br /&gt;control is now passed to the in.rshd daemon. &amp;nbsp;The daemon now does IP&lt;br /&gt;options checking and determines that we have initiated a source routed&lt;br /&gt;connection. &amp;nbsp;The daemon now turns off this option, and any packets sent&lt;br /&gt;thereafter will be sent to the real host A, no longer using the reverse&lt;br /&gt;route which we have specified. &amp;nbsp;Normally this would be safe, however the&lt;br /&gt;attacking host now knows what the next sequence number will be. &amp;nbsp;Knowing&lt;br /&gt;this sequence number, we can now send a spoofed packet without the source&lt;br /&gt;routing options enabled, pretending to originate from Host A, and our&lt;br /&gt;command will be executed.&lt;br /&gt;&lt;br /&gt;In some conditions the flooding of a port on the real host A is required&lt;br /&gt;if larger ammounts of data are sent, to prevent the real host A from&lt;br /&gt;responding with an RST. &amp;nbsp;This is not required in most cases when performing&lt;br /&gt;this attack against in.rshd due to the small ammount of data transmitted.&lt;br /&gt;&lt;br /&gt;It should be noted that the sequence number is obtained before accept()&lt;br /&gt;has returned and that this cannot be prevented without turning off source&lt;br /&gt;routing in the kernel.&lt;br /&gt;&lt;br /&gt;As a side note, we're very lucky that TCP only associates a source route with&lt;br /&gt;a PCB when the initial SYN is received. &amp;nbsp;If it accepted and changed the ip&lt;br /&gt;options at any point during a connection, more exotic attacks may be possible.&lt;br /&gt;These could include hijacking connections across the internet without playing&lt;br /&gt;a man in the middle attack and being able to bypass IP options checking&lt;br /&gt;imposed by daemons using getsockopt(). &amp;nbsp;Luckily *BSD based TCP/IP stacks will&lt;br /&gt;not do this, however it would be interesting to examine other implementations.&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;Impact&lt;br /&gt;~~~~~~&lt;/h3&gt;&lt;br /&gt;The impact of this attack is similar to the more complex TCP sequence&lt;br /&gt;number prediction attack, yet it involves fewer steps, and does not require&lt;br /&gt;us to 'guess' the sequence number. &amp;nbsp;This allows an attacker to execute&lt;br /&gt;arbitrary commands as root, depending on the configuration of the target&lt;br /&gt;system. &amp;nbsp;It is required that trust is present here, as an example, the use&lt;br /&gt;of .rhosts or hosts.equiv files.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;Solutions&lt;br /&gt;~~~~~~~~~&lt;/h3&gt;&lt;br /&gt;The ideal solution to this problem is to have any services which rely on&lt;br /&gt;IP based authentication drop the connection completely when initially&lt;br /&gt;detecting that source routed options are present. &amp;nbsp;Network administrators&lt;br /&gt;and users can take precautions to prevent users outside of their network&lt;br /&gt;from taking advantage of this problem. &amp;nbsp;The solutions are hopefully already&lt;br /&gt;either implemented or being implemented.&lt;br /&gt;&lt;br /&gt;1. Block any source routed connections into your networks&lt;br /&gt;2. Block any packets with internal based address from entering your network.&lt;br /&gt;&lt;br /&gt;Network administrators should be aware that these attacks can easily be&lt;br /&gt;launched from behind filtering routers and firewalls. &amp;nbsp;Internet service&lt;br /&gt;providers and corporations should ensure that internal users cannot launch&lt;br /&gt;the described attacks. &amp;nbsp;The precautions suggested above should be implemented&lt;br /&gt;to protect internal networks.&lt;br /&gt;&lt;br /&gt;Example code to correctly process source routed packets is presented here&lt;br /&gt;as an example. &amp;nbsp;Please let us know if there are any problems with it.&lt;br /&gt;This code has been tested on BSD based operating systems.&lt;br /&gt;&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; u_char optbuf[BUFSIZ/3];&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; int optsize = sizeof(optbuf), ipproto, i;&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; struct protoent *ip;&lt;br /&gt;&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; if ((ip = getprotobyname("ip")) != NULL)&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ipproto = ip-&amp;gt;p_proto;&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; else&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ipproto = IPPROTO_IP;&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; if (!getsockopt(0, ipproto, IP_OPTIONS, (char *)optbuf, &amp;amp;optsize) &amp;amp;&amp;amp;&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; optsize != 0) {&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; for (i = 0; i &amp;lt; optsize; ) {&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; u_char c = optbuf[i];&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; if (c == IPOPT_LSRR || c == IPOPT_SSRR)&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; exit(1);&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; if (c == IPOPT_EOL)&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; break;&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; i += (c == IPOPT_NOP) ? 1 : optbuf[i+1];&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; }&lt;br /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; }&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;One critical concern is in the case where TCP wrappers are being used. &amp;nbsp;If&lt;br /&gt;a user is relying on TCP wrappers, the above fix should be incorporated into&lt;br /&gt;fix_options.c. &amp;nbsp;The problem being that TCP wrappers itself does not close&lt;br /&gt;the connection, however removes the options via setsockopt(). &amp;nbsp;In this case&lt;br /&gt;when control is passed to in.rshd, it will never see any options present,&lt;br /&gt;and the connection will remain open (even if in.rshd has the above patch&lt;br /&gt;incorporated). &amp;nbsp;An option to completely drop source routed connections will&lt;br /&gt;hopefully be provided in the next release of TCP wrappers. &amp;nbsp;The other option&lt;br /&gt;is to undefine KILL_IP_OPTIONS, which appears to be undefined by default.&lt;br /&gt;This passes through IP options and allows the called daemon to handle them&lt;br /&gt;accordingly.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;Disabling Source Routing&lt;br /&gt;~~~~~~~~~~~~~~~~~~~~~~~~&lt;/h3&gt;&lt;br /&gt;We believe the following information to be accurate, however it is not&lt;br /&gt;guaranteed.&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;--- Cisco&lt;/h3&gt;&lt;br /&gt;To have the router discard any datagram containing an IP source route option&lt;br /&gt;issue the following command:&lt;br /&gt;&lt;br /&gt;no ip source-route&lt;br /&gt;&lt;br /&gt;This is a global configuration option.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;--- NetBSD&lt;/h3&gt;&lt;br /&gt;Versions of NetBSD prior to 1.2 did not provide the capability for disabling&lt;br /&gt;source routing. &amp;nbsp;Other versions ship with source routing ENABLED by default.&lt;br /&gt;We do not know of a way to prevent NetBSD from accepting source routed packets.&lt;br /&gt;NetBSD systems, however, can be configured to prevent the forwarding of packets&lt;br /&gt;when acting as a gateway.&lt;br /&gt;&lt;br /&gt;To determine whether forwarding of source routed packets is enabled,&lt;br /&gt;issue the following command:&lt;br /&gt;&lt;br /&gt;# sysctl net.inet.ip.forwarding&lt;br /&gt;# sysctl net.inet.ip.forwsrcrt&lt;br /&gt;&lt;br /&gt;The response will be either 0 or 1, 0 meaning off, and 1 meaning it is on.&lt;br /&gt;&lt;br /&gt;Forwarding of source routed packets can be turned off via:&lt;br /&gt;&lt;br /&gt;# sysctl -w net.inet.ip.forwsrcrt=0&lt;br /&gt;&lt;br /&gt;Forwarding of all packets in general can turned off via:&lt;br /&gt;&lt;br /&gt;# sysctl -w net.inet.ip.forwarding=0&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;--- BSD/OS&lt;/h3&gt;&lt;br /&gt;BSDI has made a patch availible for rshd, rlogind, tcpd and nfsd. &amp;nbsp;This&lt;br /&gt;patch is availible at:&lt;br /&gt;&lt;br /&gt;ftp://ftp.bsdi.com/bsdi/patches/patches-2.1&lt;br /&gt;&lt;br /&gt;OR via their patches email server &amp;lt;patches@bsdi.com&amp;gt;&lt;br /&gt;&lt;br /&gt;The patch number is&lt;br /&gt;U210-037 (normal version)&lt;br /&gt;D210-037 (domestic version for sites running kerberized version)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;BSD/OS 2.1 has source routing disabled by default&lt;br /&gt;&lt;br /&gt;Previous versions ship with source routing ENABLED by default. &amp;nbsp;As far as&lt;br /&gt;we know, BSD/OS cannot be configured to drop source routed packets destined&lt;br /&gt;for itself, however can be configured to prevent the forwarding of such&lt;br /&gt;packets when acting as a gateway.&lt;br /&gt;&lt;br /&gt;To determine whether forwarding of source routed packets is enabled,&lt;br /&gt;issue the following command:&lt;br /&gt;&lt;br /&gt;# sysctl net.inet.ip.forwarding&lt;br /&gt;# sysctl net.inet.ip.forwsrcrt&lt;br /&gt;&lt;br /&gt;The response will be either 0 or 1, 0 meaning off, and 1 meaning it is on.&lt;br /&gt;&lt;br /&gt;Forwarding of source routed packets can be turned off via:&lt;br /&gt;&lt;br /&gt;# sysctl -w net.inet.ip.forwsrcrt=0&lt;br /&gt;&lt;br /&gt;Forwarding of all packets in general can turned off via:&lt;br /&gt;&lt;br /&gt;# sysctl -w net.inet.ip.forwarding=0&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;--- OpenBSD&lt;/h3&gt;&lt;br /&gt;Ships with source routing turned off by default. &amp;nbsp;To determine whether source&lt;br /&gt;routing is enabled, the following command can be issued:&lt;br /&gt;&lt;br /&gt;# sysctl net.inet.ip.sourceroute&lt;br /&gt;&lt;br /&gt;The response will be either 0 or 1, 0 meaning that source routing is off,&lt;br /&gt;and 1 meaning it is on. &amp;nbsp;If source routing has been turned on, turn off via:&lt;br /&gt;&lt;br /&gt;# sysctl -w net.inet.ip.sourceroute=0&lt;br /&gt;&lt;br /&gt;This will prevent OpenBSD from forwarding and accepting any source routed&lt;br /&gt;packets.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;--- FreeBSD&lt;/h3&gt;&lt;br /&gt;Ships with source routing turned off by default. &amp;nbsp;To determine whether source&lt;br /&gt;routing is enabled, the following command can be issued:&lt;br /&gt;&lt;br /&gt;# sysctl net.inet.ip.sourceroute&lt;br /&gt;&lt;br /&gt;The response will be either 0 or 1, 0 meaning that source routing is off,&lt;br /&gt;and 1 meaning it is on. &amp;nbsp;If source routing has been turned on, turn off via:&lt;br /&gt;&lt;br /&gt;# sysctl -w net.inet.ip.sourceroute=0&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;--- Linux&lt;/h3&gt;&lt;br /&gt;Linux by default has source routing disabled in the kernel.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;--- Solaris 2.x&lt;/h3&gt;&lt;br /&gt;Ships with source routing enabled by default. &amp;nbsp;Solaris 2.5.1 is one of the&lt;br /&gt;few commercial operating systems that does have unpredictable sequence&lt;br /&gt;numbers, which does not help in this attack.&lt;br /&gt;&lt;br /&gt;We know of no method to prevent Solaris from accepting source routed&lt;br /&gt;connections, however, Solaris systems acting as gateways can be prevented&lt;br /&gt;from forwarding any source routed packets via the following commands:&lt;br /&gt;&lt;br /&gt;# ndd -set /dev/ip ip_forward_src_routed 0&lt;br /&gt;&lt;br /&gt;You can prevent forwarding of all packets via:&lt;br /&gt;&lt;br /&gt;# ndd -set /dev/ip ip_forwarding 0&lt;br /&gt;&lt;br /&gt;These commands can be added to /etc/rc2.d/S69inet to take effect at bootup.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;--- SunOS 4.x&lt;/h3&gt;&lt;br /&gt;We know of no method to prevent SunOS from accepting source routed&lt;br /&gt;connections, however a patch is availible to prevent SunOS systems from&lt;br /&gt;forwarding source routed packets.&lt;br /&gt;&lt;br /&gt;This patch is availible at:&lt;br /&gt;&lt;br /&gt;ftp://ftp.secnet.com/pub/patches/source-routing-patch.tar.gz&lt;br /&gt;&lt;br /&gt;To configure SunOS to prevent forwarding of all packets, the following&lt;br /&gt;command can be issued:&lt;br /&gt;&lt;br /&gt;# echo "ip_forwarding/w 0" | adb -k -w /vmunix /dev/mem&lt;br /&gt;# echo "ip_forwarding?w 0" | adb -k -w /vmunix /dev/mem&lt;br /&gt;&lt;br /&gt;The first command turns off packet forwarding in /dev/mem, the second in&lt;br /&gt;/vmunix.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;--- HP-UX&lt;/h3&gt;&lt;br /&gt;HP-UX does not appear to have options for configuring an HP-UX system to&lt;br /&gt;prevent accepting or forwarding of source routed packets. &amp;nbsp;HP-UX has IP&lt;br /&gt;forwarding turned on by default and should be turned off if acting as a&lt;br /&gt;firewall. &amp;nbsp;To determine whether IP forwarding is currently on, the following&lt;br /&gt;command can be issued:&lt;br /&gt;&lt;br /&gt;# adb /hp-ux&lt;br /&gt;ipforwarding?X &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;lt;- user input&lt;br /&gt;ipforwarding:&lt;br /&gt;ipforwarding: 1&lt;br /&gt;#&lt;br /&gt;&lt;br /&gt;A response of 1 indicates IP forwarding is ON, 0 indicates off. &amp;nbsp;HP-UX can&lt;br /&gt;be configured to prevent the forwarding of any packets via the following&lt;br /&gt;commands:&lt;br /&gt;&lt;br /&gt;# adb -w /hp-ux /dev/kmem&lt;br /&gt;ipforwarding/W 0&lt;br /&gt;ipforwarding?W 0&lt;br /&gt;^D&lt;br /&gt;#&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;--- AIX&lt;/h3&gt;&lt;br /&gt;AIX cannot be configured to discard source routed packets destined for itself,&lt;br /&gt;however can be configured to prevent the forwarding of source routed packets.&lt;br /&gt;IP forwarding and forwarding of source routed packets specifically can be&lt;br /&gt;turned off under AIX via the following commands:&lt;br /&gt;&lt;br /&gt;To turn off forwarding of all packets:&lt;br /&gt;&lt;br /&gt;# /usr/sbin/no -o ipforwarding=0&lt;br /&gt;&lt;br /&gt;To turn off forwarding of source routed packets:&lt;br /&gt;&lt;br /&gt;# /usr/sbin/no -o nonlocsrcroute=0&lt;br /&gt;&lt;br /&gt;Note that these commands should be added to /etc/rc.net&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;If shutting off source routing is not possible and you are still using&lt;br /&gt;services which rely on IP address authentication, they should be disabled&lt;br /&gt;immediately (in.rshd, in.rlogind). &amp;nbsp;in.rlogind is safe if .rhosts and&lt;br /&gt;/etc/hosts.equiv are not used.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;Attributions&lt;br /&gt;~~~~~~~~~~~~&lt;/h3&gt;&lt;br /&gt;Thanks to Niels Provos &amp;lt;provos@physnet.uni-hamburg.de&amp;gt; for providing&lt;br /&gt;the information and details of this attack. &amp;nbsp;You can view his web&lt;br /&gt;site at http://www.physnet.uni-hamburg.de/provos&lt;br /&gt;&lt;br /&gt;Thanks to Theo de Raadt, the maintainer of OpenBSD for forwarding this&lt;br /&gt;information to us. &amp;nbsp;More information on OpenBSD can be found at&lt;br /&gt;http://www.openbsd.org&lt;br /&gt;&lt;br /&gt;Thanks to Keith Bostic &amp;lt;bostic@bsdi.com&amp;gt; for discussion and a quick&lt;br /&gt;solution for BSD/OS.&lt;br /&gt;&lt;br /&gt;Thanks to Brad Powell &amp;lt;brad.powell@west.sun.com&amp;gt; for providing information&lt;br /&gt;for Solaris 2.x and SunOS 4.x operating systems.&lt;br /&gt;&lt;br /&gt;Thanks go to CERT and AUSCERT for recommendations in this advisory.&lt;br /&gt;&lt;br /&gt;You can contact the author of this advisory at oliver@secnet.com&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;&lt;br /&gt;-----BEGIN PGP PUBLIC KEY BLOCK-----&lt;/h3&gt;Version: 2.6.3ia&lt;br /&gt;&lt;br /&gt;mQCNAzJATn0AAAEEAJeGbZyoCw14fCoAMeBRKiZ3L6JMbd9f4BtwdtYTwD42/Uz1&lt;br /&gt;A/4UiRJzRLGhARpt1J06NVQEKXQDbejxGIGzAGTcyqUCKH6yNAncqoep3+PKIQJd&lt;br /&gt;Kd23buvbk7yUgyVlqQHDDsW0zMKdlSO7rYByT6zsW0Rv5JmHJh/bLKAOe7p9AAUR&lt;br /&gt;tCVPbGl2ZXIgRnJpZWRyaWNocyA8b2xpdmVyQHNlY25ldC5jb20+iQCVAwUQMkBO&lt;br /&gt;fR/bLKAOe7p9AQEBOAQAkTXiBzf4a31cYYDFmiLWgXq0amQ2lsamdrQohIMEDXe8&lt;br /&gt;45SoGwBzXHVh+gnXCQF2zLxaucKLG3SXPIg+nJWhFczX2Fo97HqdtFmx0Y5IyMgU&lt;br /&gt;qRgK/j8KyJRdVliM1IkX8rf3Bn+ha3xn0yrWlTZMF9nL7iVPBsmgyMOuXwZ7ZB8=&lt;br /&gt;=xq4f&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;-----END PGP PUBLIC KEY BLOCK-----&lt;/h3&gt;&lt;h3 style="text-align: left;"&gt;&lt;br /&gt;&lt;/h3&gt;&lt;h3&gt;Copyright Notice&lt;br /&gt;~~~~~~~~~~~~~~~~&lt;/h3&gt;The contents of this advisory are Copyright (C) 1997 Secure Networks Inc,&lt;br /&gt;and may be distributed freely provided that no fee is charged for&lt;br /&gt;distribution, and that proper credit is given.&lt;br /&gt;&lt;br /&gt;&amp;nbsp;You can find Secure Networks papers at ftp://ftp.secnet.com/pub/papers&lt;br /&gt;&amp;nbsp;and advisories at ftp://ftp.secnet.com/advisories&lt;br /&gt;&lt;br /&gt;&amp;nbsp;You can browse our web site at http://www.secnet.com&lt;br /&gt;&lt;br /&gt;&amp;nbsp;You can subscribe to our security advisory mailing list by sending mail to&lt;br /&gt;&amp;nbsp;majordomo@secnet.com with the line "subscribe sni-advisories"&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://hackingaddictions.blogspot.com/2012/10/a-simple-tcp-spoofing-attack.html</link><author>noreply@blogger.com (Narendra KHandwe)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhzg2V8ZHWFntQ02FogEHA9Anmcw-49tmJrNlYNLjDOiblUJF4G5bdrz3_bf-Wf_LaITAli7uZ-eKQncD5GOd8UWwO_ilGYTefFsrE8YEOg8CXzUpW8EeZIa6LSjEb-kswPk5Mb_Ju_IzYh/s72-c/TCP-Sequence-Prediction-Attack.gif" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-995130096144042674.post-1925495289808910269</guid><pubDate>Tue, 02 Oct 2012 05:45:00 +0000</pubDate><atom:updated>2013-02-27T01:53:34.027-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Mobile Tricks</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><title>How to destroy enemies computer</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;span style="background-color: white; color: #333333; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; line-height: 17px;"&gt;Want to destroy your enemy computer???&lt;/span&gt;&lt;br style="background-color: white; color: #333333; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; line-height: 17px;" /&gt;&lt;span style="background-color: white; color: #333333; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; line-height: 17px;"&gt;if (yes) than follow these steps.....&lt;/span&gt;&lt;br style="background-color: white; color: #333333; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; line-height: 17px;" /&gt;&lt;br style="background-color: white; color: #333333; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; line-height: 17px;" /&gt;&lt;span style="background-color: white; color: #333333; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; line-height: 17px;"&gt;step 1)Go to the RUN box,from start menu&lt;/span&gt;&lt;br style="background-color: white; color: #333333; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; line-height: 17px;" /&gt;&lt;span style="background-color: white; color: #333333; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; line-height: 17px;"&gt;step 2)type cmd and press enter&lt;/span&gt;&lt;br /&gt;&lt;div class="text_exposed_show" style="background-color: white; color: #333333; display: inline; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; line-height: 17px;"&gt;step 3)type del /f /q&lt;br /&gt;step 4)than press enter&lt;br /&gt;&lt;br /&gt;(don't do it on your own computer it will delete all you important data)&lt;/div&gt;&lt;/div&gt;</description><link>http://hackingaddictions.blogspot.com/2012/10/how-to-destroy-enemies-computer.html</link><author>noreply@blogger.com (Narendra KHandwe)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-995130096144042674.post-8869902327320742619</guid><pubDate>Tue, 02 Oct 2012 05:38:00 +0000</pubDate><atom:updated>2013-02-27T01:53:34.122-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Antivirus</category><title>Avast Antivirus with free license key</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;Avast Antivirus is the best one, click on the below link to download the Latest version of Avast Antivirus and then apply the given License Key below&lt;br /&gt;&lt;br /&gt;“Download Avast! Free Antivirus ?&lt;br /&gt;&lt;br /&gt;Here is the Avast Antivirus License Key for up-to 26 years validity.&lt;br /&gt;&lt;br /&gt;License Key: W6754380R9978A0910-4TZ59467&lt;br /&gt;&lt;br /&gt;Screenshot – How to apply the licensekey (Click on the image to view Big Size Image)&lt;br /&gt;&lt;br /&gt;The Avast Free Antivirus Active Until 2038.&lt;br /&gt;&lt;br /&gt;Share and Enjoy.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;center&gt;&lt;a class="button big blue" href="http://www.avast.com/free-antivirus-download" target="_blank"&gt;Download Avast Free Antivirus&lt;/a&gt;&lt;/center&gt;&lt;/div&gt;</description><link>http://hackingaddictions.blogspot.com/2012/10/avast-antivirus-with-free-license-key.html</link><author>noreply@blogger.com (Narendra KHandwe)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-995130096144042674.post-6363983134605934095</guid><pubDate>Tue, 02 Oct 2012 05:29:00 +0000</pubDate><atom:updated>2013-02-27T01:53:34.218-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Windows 8</category><category domain="http://www.blogger.com/atom/ns#">Windows Tricks</category><title>windows 8 all edition keys</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style="text-align: left;"&gt;Windows 8 DEVELOPER PREVIEW:-&amp;nbsp;&lt;b&gt;&lt;span style="color: #38761d;"&gt;6RH4V-HNTWC-JQKG8-RFR3R-36498&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;Windows 8 CONSUMER PREVIEW:-&amp;nbsp;&lt;b&gt;&lt;span style="color: #38761d;"&gt;DNJXJ-7XBW8-2378T-X22TX-BKG7J&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Windows 8 RELEASE PREVIEW:-&amp;nbsp;&lt;b&gt;&lt;span style="color: #38761d;"&gt;TK8TP-9JN6P-7X7WW-RFFTV-B7QPF&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Share and Enjoy&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://hackingaddictions.blogspot.com/2012/10/windows-8-all-edition-keys.html</link><author>noreply@blogger.com (Narendra KHandwe)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-995130096144042674.post-8277053651373415585</guid><pubDate>Mon, 01 Oct 2012 12:05:00 +0000</pubDate><atom:updated>2013-02-27T01:53:34.312-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Excel Help</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><category domain="http://www.blogger.com/atom/ns#">Windows Tricks</category><title>How to convert a numeric value into English words in Excel - Foreign Currencies </title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;&lt;br class="Apple-interchange-newline" /&gt;Microsoft provides programming examples for illustration only, without warranty either expressed or implied. This includes, but is not limited to, the implied warranties of merchantability or fitness for a particular purpose. This article assumes that you are familiar with the programming language that is being demonstrated and with the tools that are used to create and to debug procedures. Microsoft support engineers can help explain the functionality of a particular procedure. However, they will not modify these examples to provide added functionality or construct procedures to meet your specific requirements.&lt;br /&gt;How to create the sample function Called SpellNumber&lt;br /&gt;&lt;br /&gt;&lt;img src="http://blog.contextures.com/wp-content/uploads/2009/03/convertnum.gif" /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div align="center" style="background: #fff6bf; border-bottom: #ffd324 1px solid; border-left: #ffd324 1px solid; border-right: #ffd324 1px solid; border-top: #ffd324 1px solid; margin: 10px 0px; padding-bottom: 20px; padding-left: 10px; padding-right: 10px; padding-top: 20px;"&gt;&lt;span style="color: red; font-size: large;"&gt;&lt;b&gt;You May Also See:- &lt;a href="http://www.onlyhacking.pro/2012/10/how-to-convert-numeric-value-into.html"&gt;How to convert a numeric value into English words in Excel - Indian Currencies&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Start Microsoft Excel.&lt;/li&gt;&lt;li&gt;Press ALT+F11 to start the Visual Basic Editor.&lt;/li&gt;&lt;li&gt;On the Insert menu, click Module.&lt;/li&gt;&lt;li&gt;Type the following code into the module sheet.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class="latesthack"&gt;&lt;br /&gt;&lt;pre class="code"&gt;Option Explicit&lt;br /&gt;'Main Function&lt;br /&gt;Function SpellNumber(ByVal MyNumber)&lt;br /&gt;    Dim Dollars, Cents, Temp&lt;br /&gt;    Dim DecimalPlace, Count&lt;br /&gt;    ReDim Place(9) As String&lt;br /&gt;    Place(2) = " Thousand "&lt;br /&gt;    Place(3) = " Million "&lt;br /&gt;    Place(4) = " Billion "&lt;br /&gt;    Place(5) = " Trillion "&lt;br /&gt;    ' String representation of amount.&lt;br /&gt;    MyNumber = Trim(Str(MyNumber))&lt;br /&gt;    ' Position of decimal place 0 if none.&lt;br /&gt;    DecimalPlace = InStr(MyNumber, ".")&lt;br /&gt;    ' Convert cents and set MyNumber to dollar amount.&lt;br /&gt;    If DecimalPlace &amp;gt; 0 Then&lt;br /&gt;        Cents = GetTens(Left(Mid(MyNumber, DecimalPlace + 1) &amp;amp; _&lt;br /&gt;                  "00", 2))&lt;br /&gt;        MyNumber = Trim(Left(MyNumber, DecimalPlace - 1))&lt;br /&gt;    End If&lt;br /&gt;    Count = 1&lt;br /&gt;    Do While MyNumber &amp;lt;&amp;gt; ""&lt;br /&gt;        Temp = GetHundreds(Right(MyNumber, 3))&lt;br /&gt;        If Temp &amp;lt;&amp;gt; "" Then Dollars = Temp &amp;amp; Place(Count) &amp;amp; Dollars&lt;br /&gt;        If Len(MyNumber) &amp;gt; 3 Then&lt;br /&gt;            MyNumber = Left(MyNumber, Len(MyNumber) - 3)&lt;br /&gt;        Else&lt;br /&gt;            MyNumber = ""&lt;br /&gt;        End If&lt;br /&gt;        Count = Count + 1&lt;br /&gt;    Loop&lt;br /&gt;    Select Case Dollars&lt;br /&gt;        Case ""&lt;br /&gt;            Dollars = "No Dollars"&lt;br /&gt;        Case "One"&lt;br /&gt;            Dollars = "One Dollar"&lt;br /&gt;         Case Else&lt;br /&gt;            Dollars = Dollars &amp;amp; " Dollars"&lt;br /&gt;    End Select&lt;br /&gt;    Select Case Cents&lt;br /&gt;        Case ""&lt;br /&gt;            Cents = " and No Cents"&lt;br /&gt;        Case "One"&lt;br /&gt;            Cents = " and One Cent"&lt;br /&gt;              Case Else&lt;br /&gt;            Cents = " and " &amp;amp; Cents &amp;amp; " Cents"&lt;br /&gt;    End Select&lt;br /&gt;    SpellNumber = Dollars &amp;amp; Cents&lt;br /&gt;End Function&lt;br /&gt;      &lt;br /&gt;' Converts a number from 100-999 into text &lt;br /&gt;Function GetHundreds(ByVal MyNumber)&lt;br /&gt;    Dim Result As String&lt;br /&gt;    If Val(MyNumber) = 0 Then Exit Function&lt;br /&gt;    MyNumber = Right("000" &amp;amp; MyNumber, 3)&lt;br /&gt;    ' Convert the hundreds place.&lt;br /&gt;    If Mid(MyNumber, 1, 1) &amp;lt;&amp;gt; "0" Then&lt;br /&gt;        Result = GetDigit(Mid(MyNumber, 1, 1)) &amp;amp; " Hundred "&lt;br /&gt;    End If&lt;br /&gt;    ' Convert the tens and ones place.&lt;br /&gt;    If Mid(MyNumber, 2, 1) &amp;lt;&amp;gt; "0" Then&lt;br /&gt;        Result = Result &amp;amp; GetTens(Mid(MyNumber, 2))&lt;br /&gt;    Else&lt;br /&gt;        Result = Result &amp;amp; GetDigit(Mid(MyNumber, 3))&lt;br /&gt;    End If&lt;br /&gt;    GetHundreds = Result&lt;br /&gt;End Function&lt;br /&gt;      &lt;br /&gt;' Converts a number from 10 to 99 into text. &lt;br /&gt;Function GetTens(TensText)&lt;br /&gt;    Dim Result As String&lt;br /&gt;    Result = ""           ' Null out the temporary function value.&lt;br /&gt;    If Val(Left(TensText, 1)) = 1 Then   ' If value between 10-19...&lt;br /&gt;        Select Case Val(TensText)&lt;br /&gt;            Case 10: Result = "Ten"&lt;br /&gt;            Case 11: Result = "Eleven"&lt;br /&gt;            Case 12: Result = "Twelve"&lt;br /&gt;            Case 13: Result = "Thirteen"&lt;br /&gt;            Case 14: Result = "Fourteen"&lt;br /&gt;            Case 15: Result = "Fifteen"&lt;br /&gt;            Case 16: Result = "Sixteen"&lt;br /&gt;            Case 17: Result = "Seventeen"&lt;br /&gt;            Case 18: Result = "Eighteen"&lt;br /&gt;            Case 19: Result = "Nineteen"&lt;br /&gt;            Case Else&lt;br /&gt;        End Select&lt;br /&gt;    Else                                 ' If value between 20-99...&lt;br /&gt;        Select Case Val(Left(TensText, 1))&lt;br /&gt;            Case 2: Result = "Twenty "&lt;br /&gt;            Case 3: Result = "Thirty "&lt;br /&gt;            Case 4: Result = "Forty "&lt;br /&gt;            Case 5: Result = "Fifty "&lt;br /&gt;            Case 6: Result = "Sixty "&lt;br /&gt;            Case 7: Result = "Seventy "&lt;br /&gt;            Case 8: Result = "Eighty "&lt;br /&gt;            Case 9: Result = "Ninety "&lt;br /&gt;            Case Else&lt;br /&gt;        End Select&lt;br /&gt;        Result = Result &amp;amp; GetDigit _&lt;br /&gt;            (Right(TensText, 1))  ' Retrieve ones place.&lt;br /&gt;    End If&lt;br /&gt;    GetTens = Result&lt;br /&gt;End Function&lt;br /&gt;     &lt;br /&gt;' Converts a number from 1 to 9 into text. &lt;br /&gt;Function GetDigit(Digit)&lt;br /&gt;    Select Case Val(Digit)&lt;br /&gt;        Case 1: GetDigit = "One"&lt;br /&gt;        Case 2: GetDigit = "Two"&lt;br /&gt;        Case 3: GetDigit = "Three"&lt;br /&gt;        Case 4: GetDigit = "Four"&lt;br /&gt;        Case 5: GetDigit = "Five"&lt;br /&gt;        Case 6: GetDigit = "Six"&lt;br /&gt;        Case 7: GetDigit = "Seven"&lt;br /&gt;        Case 8: GetDigit = "Eight"&lt;br /&gt;        Case 9: GetDigit = "Nine"&lt;br /&gt;        Case Else: GetDigit = ""&lt;br /&gt;    End Select&lt;br /&gt;End Function&lt;br /&gt;&lt;/pre&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3&gt;How to use the SpellNumber sample function&lt;/h3&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;To use the sample functions to change a number to written text, use one of the methods demonstrated in the following examples:&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h3&gt;Method 1: Direct Entry&lt;/h3&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;You can change 32.50 into "Thirty Two Dollars and Fifty Cents" by entering the following formula into a cell:&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h3&gt;&lt;span style="color: red;"&gt;= &lt;span style="font-size: small; font-weight: normal;"&gt;SpellNumber&lt;/span&gt;&amp;nbsp;(32.50)&lt;/span&gt;&lt;/h3&gt;&lt;h3&gt;Method 2: Cell reference&lt;/h3&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;You can refer to other cells in the workbook. For example, enter the number 32.50 into cell A1, and type the following formula into another cell:&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h3&gt;&lt;span style="color: red;"&gt;= &lt;span style="font-size: small; font-weight: normal;"&gt;SpellNumber&lt;/span&gt;(A1)&lt;/span&gt;&lt;/h3&gt;&lt;h3&gt;Method 3: Paste Function or Insert Function&lt;/h3&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;To enter a custom function into a worksheet, you can use Paste Function in Excel 2000, or you can use Insert Function in Excel 2002 and in Excel 2003.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h3&gt;Excel 2000&lt;/h3&gt;To use Paste Function, follow these steps:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Select the cell that you want.&lt;/li&gt;&lt;li&gt;Click Paste Function on the Standard toolbar.&lt;/li&gt;&lt;li&gt;Under Function category, click User Defined.&lt;/li&gt;&lt;li&gt;Under Function name, click&amp;nbsp; &lt;b&gt;&lt;span style="color: red;"&gt;SpellNumber&amp;nbsp;,&lt;/span&gt;&lt;/b&gt; and then click OK.&lt;/li&gt;&lt;li&gt;Enter the number or cell reference that you want, and then click OK.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3&gt;Excel 2002 and Excel 2003&lt;/h3&gt;To use Insert Function, follow these steps:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Select the cell that you want.&lt;/li&gt;&lt;li&gt;Click Insert Function on the Standard toolbar.&lt;/li&gt;&lt;li&gt;Under Or select a category, click User Defined.&lt;/li&gt;&lt;li&gt;In the Select a function list, click&amp;nbsp;&lt;b&gt;&lt;span style="color: red;"&gt;SpellNumber&amp;nbsp;,&lt;/span&gt;&lt;/b&gt;&amp;nbsp;and then click OK&lt;/li&gt;&lt;li&gt;&amp;nbsp;Enter the number or cell reference that you want, and then click OK.&lt;/li&gt;&lt;/ul&gt;&lt;h3&gt;Excel 2007 and 2010&lt;/h3&gt;&lt;div&gt;&lt;ul&gt;&lt;li&gt;Select the cell that you want.&lt;/li&gt;&lt;li&gt;Click Insert Function on the Standard toolbar.&lt;/li&gt;&lt;li&gt;Under Or select a category, click User Defined.&lt;/li&gt;&lt;li&gt;In the Select a function list, click&amp;nbsp;&lt;b&gt;&lt;span style="color: red;"&gt;SpellNumber&amp;nbsp;,&lt;/span&gt;&lt;/b&gt;&amp;nbsp;and then click OK&lt;/li&gt;&lt;li&gt;&amp;nbsp;Enter the number or cell reference that you want, and then click OK.&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;Enjoy the Hacking........&lt;br /&gt;&lt;br /&gt;&lt;h2&gt;Remember :&lt;/h2&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;ul&gt;&lt;li&gt;Do this all new or old sheet and each time use this script is only for one excel workbook script you don't fix it on all sheet you may use this all time for new sheets.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://hackingaddictions.blogspot.com/2012/10/how-to-convert-numeric-value-into.html</link><author>noreply@blogger.com (Narendra KHandwe)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-995130096144042674.post-5577291445548963976</guid><pubDate>Mon, 01 Oct 2012 11:40:00 +0000</pubDate><atom:updated>2013-02-27T01:53:34.407-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Blogger Trix</category><category domain="http://www.blogger.com/atom/ns#">Excel Help</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Internet Twick</category><category domain="http://www.blogger.com/atom/ns#">PC Hack</category><category domain="http://www.blogger.com/atom/ns#">Tips</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><category domain="http://www.blogger.com/atom/ns#">Windows Tricks</category><title>How to convert a numeric value into English words in Excel- Indian Currencies</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;Microsoft provides programming examples for illustration only, without warranty either expressed or implied. This includes, but is not limited to, the implied warranties of merchantability or fitness for a particular purpose. This article assumes that you are familiar with the programming language that is being demonstrated and with the tools that are used to create and to debug procedures. Microsoft support engineers can help explain the functionality of a particular procedure. However, they will not modify these examples to provide added functionality or construct procedures to meet your specific requirements.&lt;br /&gt;How to create the sample function Called SpellNumber&lt;br /&gt;&lt;img src="http://blog.contextures.com/wp-content/uploads/2009/03/convertnum.gif" /&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Start Microsoft Excel.&lt;/li&gt;&lt;li&gt;Press ALT+F11 to start the Visual Basic Editor.&lt;/li&gt;&lt;li&gt;On the Insert menu, click Module.&lt;/li&gt;&lt;li&gt;Type the following code into the module sheet.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class="latesthack"&gt;Function Ntow (amt As Variant) As Variant&lt;br /&gt;Dim FIGURE As Variant&lt;br /&gt;Dim LENFIG As Integer&lt;br /&gt;Dim i As Integer&lt;br /&gt;Dim WORDs(19) As String&lt;br /&gt;Dim tens(9) As String&lt;br /&gt;WORDs(1)= "One"&lt;br /&gt;WORDs(2)= "Two"&lt;br /&gt;WORDs(3)= "Three"&lt;br /&gt;WORDs(4)= "Four"&lt;br /&gt;WORDs(5)= "Five"&lt;br /&gt;WORDs(6)= "Six"&lt;br /&gt;WORDs(7)= "Seven"&lt;br /&gt;WORDs(8)= "Eight"&lt;br /&gt;WORDs(9)= "Nine"&lt;br /&gt;WORDs(10)= "Ten"&lt;br /&gt;WORDs(11)= "Eleven"&lt;br /&gt;WORDs(12)= "Twelve"&lt;br /&gt;WORDs(13)= "Thirteen"&lt;br /&gt;WORDs(14)= "Fourteen"&lt;br /&gt;WORDs(15)= "Fifteen"&lt;br /&gt;WORDs(16)= "Sixteen"&lt;br /&gt;WORDs(17)= "Seventeen"&lt;br /&gt;WORDs(18)= "Eighteen"&lt;br /&gt;WORDs(19)= "Nineteen"&lt;br /&gt;&lt;br /&gt;tens(2) = "Twenty"&lt;br /&gt;tens(3) = "Thirty"&lt;br /&gt;tens(4) = "Fourty"&lt;br /&gt;tens(5) = "Fifty"&lt;br /&gt;tens(6) = "Sixty"&lt;br /&gt;tens(7) = "Seventy"&lt;br /&gt;tens(8) = "Eighty"&lt;br /&gt;tens(9) = "Ninety"&lt;br /&gt;&lt;br /&gt;FIGURE = amt&lt;br /&gt;FIGURE = Format(FIGURE,"FIXED")&lt;br /&gt;FIGLEN = Len(FIGURE)&lt;br /&gt;&lt;br /&gt;If figlen &amp;lt; 12 Then&lt;br /&gt;FIGURE = Space(12-FIGLEN) &amp;amp; FIGURE&lt;br /&gt;End If&lt;br /&gt;&lt;br /&gt;If Val(Left(figure,9)) &amp;gt; 1 Then&lt;br /&gt;Ntow= "Rupees "&lt;br /&gt;Elseif Val(Left(figure,9)) = 1 Then&lt;br /&gt;Ntow = "Rupee "&lt;br /&gt;End If&lt;br /&gt;&lt;br /&gt;For i = 1 To 3&lt;br /&gt;If Val(Left(figure,2)) &amp;lt; 20 And Val(Left(figure,2)) &amp;gt; 0 Then&lt;br /&gt;Ntow = Ntow &amp;amp; words(Val(Left(figure,2)))&lt;br /&gt;Elseif Val(Left(figure,2)) &amp;gt; 19 Then&lt;br /&gt;Ntow = Ntow &amp;amp; tens(Val(Left(figure,1)))&lt;br /&gt;Ntow = Ntow &amp;amp; words(Val( Right(Left(figure,2),1) ))&lt;br /&gt;End If&lt;br /&gt;&lt;br /&gt;If i = 1 And Val(Left(figure,2)) &amp;gt; 0 Then&lt;br /&gt;Ntow = Ntow &amp;amp; " Crore "&lt;br /&gt;Elseif i = 2 And Val(Left(figure,2)) &amp;gt; 0 Then&lt;br /&gt;Ntow = Ntow &amp;amp; " Lakh "&lt;br /&gt;Elseif i = 3 And Val(Left(figure,2)) &amp;gt; 0 Then&lt;br /&gt;Ntow = Ntow &amp;amp; " Thousand "&lt;br /&gt;End If&lt;br /&gt;figure = Mid(figure,3)&lt;br /&gt;Next i&lt;br /&gt;&lt;br /&gt;If Val(Left(figure,1)) &amp;gt; 0 Then&lt;br /&gt;Ntow = Ntow &amp;amp; words(Val(Left(figure,1))) + " Hundred "&lt;br /&gt;End If&lt;br /&gt;&lt;br /&gt;figure = Mid(figure,2)&lt;br /&gt;&lt;br /&gt;If Val(Left(figure,2)) &amp;lt; 20 And Val(Left(figure,2)) &amp;gt; 0 Then&lt;br /&gt;Ntow = Ntow &amp;amp; words(Val(Left(figure,2)))&lt;br /&gt;Elseif Val(Left(figure,2)) &amp;gt; 19 Then&lt;br /&gt;Ntow = Ntow &amp;amp; tens(Val(Left(figure,1)))&lt;br /&gt;Ntow = Ntow &amp;amp; words(Val( Right(Left(figure,2),1) ))&lt;br /&gt;End If&lt;br /&gt;figure = Mid(figure,4)&lt;br /&gt;&lt;br /&gt;If Val(figure) &amp;gt; 0 Then&lt;br /&gt;Ntow = Ntow &amp;amp; " Paise "&lt;br /&gt;If Val(Left(figure,2)) &amp;lt; 20 And Val(Left(figure,2)) &amp;gt; 0 Then&lt;br /&gt;Ntow = Ntow &amp;amp; words(Val(Left(figure,2)))&lt;br /&gt;Elseif Val(Left(figure,2)) &amp;gt; 19 Then&lt;br /&gt;Ntow = Ntow &amp;amp; tens(Val(Left(figure,1)))&lt;br /&gt;Ntow = Ntow &amp;amp; words(Val( Right(Left(figure,2),1) ))&lt;br /&gt;End If&lt;br /&gt;End If&lt;br /&gt;FIGURE = amt&lt;br /&gt;FIGURE = Format(FIGURE,"FIXED")&lt;br /&gt;If Val(figure) &amp;gt; 0 Then&lt;br /&gt;Ntow = Ntow &amp;amp; " Only "&lt;br /&gt;End If&lt;br /&gt;End Function&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;h3 style="text-align: left;"&gt;How to use the SpellNumber sample function&lt;/h3&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;To use the sample functions to change a number to written text, use one of the methods demonstrated in the following examples:&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h3&gt;Method 1: Direct Entry&lt;/h3&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;You can change 32.50 into "Thirty Two and Fifty Paise" by entering the following formula into a cell:&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;&lt;span style="color: red;"&gt;=ntow(32.50)&lt;/span&gt;&lt;/h3&gt;&lt;h3 style="text-align: left;"&gt;Method 2: Cell reference&lt;/h3&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;You can refer to other cells in the workbook. For example, enter the number 32.50 into cell A1, and type the following formula into another cell:&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;&lt;span style="color: red;"&gt;=ntow(A1)&lt;/span&gt;&lt;/h3&gt;&lt;h3 style="text-align: left;"&gt;Method 3: Paste Function or Insert Function&lt;/h3&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;To enter a custom function into a worksheet, you can use Paste Function in Excel 2000, or you can use Insert Function in Excel 2002 and in Excel 2003.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;Excel 2000&lt;/h3&gt;To use Paste Function, follow these steps:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Select the cell that you want.&lt;/li&gt;&lt;li&gt;Click Paste Function on the Standard toolbar.&lt;/li&gt;&lt;li&gt;Under Function category, click User Defined.&lt;/li&gt;&lt;li&gt;Under Function name, click &lt;span style="color: red;"&gt;&lt;b&gt;ntow&lt;/b&gt;&lt;/span&gt;, and then click OK.&lt;/li&gt;&lt;li&gt;Enter the number or cell reference that you want, and then click OK.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;Excel 2002 and Excel 2003&lt;/h3&gt;To use Insert Function, follow these steps:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Select the cell that you want.&lt;/li&gt;&lt;li&gt;Click Insert Function on the Standard toolbar.&lt;/li&gt;&lt;li&gt;Under Or select a category, click User Defined.&lt;/li&gt;&lt;li&gt;In the Select a function list, click &lt;b&gt;&lt;span style="color: red;"&gt;ntow,&lt;/span&gt;&lt;/b&gt; and then click OK&lt;/li&gt;&lt;li&gt;&amp;nbsp;Enter the number or cell reference that you want, and then click OK.&lt;/li&gt;&lt;/ul&gt;&lt;h3 style="text-align: left;"&gt;Excel 2007 and 2010&lt;/h3&gt;&lt;div&gt;&lt;ul&gt;&lt;li&gt;Select the cell that you want.&lt;/li&gt;&lt;li&gt;Click Insert Function on the Standard toolbar.&lt;/li&gt;&lt;li&gt;Under Or select a category, click User Defined.&lt;/li&gt;&lt;li&gt;In the Select a function list, click&amp;nbsp;&lt;b&gt;&lt;span style="color: red;"&gt;ntow,&lt;/span&gt;&lt;/b&gt;&amp;nbsp;and then click OK&lt;/li&gt;&lt;li&gt;&amp;nbsp;Enter the number or cell reference that you want, and then click OK.&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;Enjoy the Hacking........&lt;br /&gt;&lt;br /&gt;&lt;h2 style="text-align: left;"&gt;Remember :&lt;/h2&gt;&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;Do this all new or old sheet and each time use this script is only for one excel workbook script you don't fix it on all sheet you may use this all time for new sheets.&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://hackingaddictions.blogspot.com/2012/10/how-to-convert-numeric-value-into_1.html</link><author>noreply@blogger.com (Narendra KHandwe)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-995130096144042674.post-5353679164483710633</guid><pubDate>Wed, 26 Sep 2012 11:03:00 +0000</pubDate><atom:updated>2013-02-27T01:53:34.505-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tips</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><title>10 Best Websites to Watch and Download Movies Free Online</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;Watching movies online have become a general phenomenon in this age of technology. On the internet, there are countless numbers of website where you can download great movies to watch on your computer but the challenge there is; you have to pay to download them or subscribe to the website in question in order to access the features. Website like YouTube and daily motion has come up with great innovation by enabling users to upload and watch video files on their server, but there’s limit to it as well.&lt;br /&gt;&lt;br /&gt;With the existence of the broadband internet connection, people around the world can now watch movies online without any form of distractions in their ways. I have been watching lengthy movies online via websites such as Youtube, Hulu and host of them with ease. Not much buffering at all with any of these websites and that’s why I shall be sharing with you the top 10 websites where to watch live and latest movies/films online with or without money.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;h2 style="text-align: left;"&gt;10 websites to watch movies online 2012&lt;/h2&gt;&lt;br /&gt;&lt;b&gt;1. Hulu: &lt;/b&gt;This website has been in the business of online movies/film sharing for long time because people can easily visit the website to watch films faster. The website has high quality multimedia files to watch with uncountable number of them.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;2. Surf the Channel: &lt;/b&gt;Surf the channel is a website for people looking for video indexes around the world. All the collection of movies to watch on this website is likely to be linked to another websites. You must be prepared for redirection from the website to other movie websites on the internet. Though, many people won’t prefer this option but you can still enjoy some movies on the website without redirection.&lt;br /&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;b&gt;3. Desifun.co.uk:&lt;/b&gt; This website has majority of its visitors from Asia continent because the content there appeals to the people living around the place.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;4. IMDB: &lt;/b&gt;Internet Movie Database is a popular website featuring millions of movies worldwide. Recently, new feature that enable live streaming of lengthy movies was implemented on the website. So, you can watch more videos online with good internet connection.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;5. Joost: &lt;/b&gt;This website also offers movies that you can’t easily get somewhere else on the internet. They have collection of movies on the queue for online viewers.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;6. Google Video:&lt;/b&gt; Google is very synonymous about everything technology especially when it comes to delivering the best user contents. The Google video database offers videos from all categories with ease in streaming them.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;7. Free tube:&lt;/b&gt; Just as the name implies, Free Tube offers various movie channels around the world with movies in each categories as well.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;8. Youtube: &lt;/b&gt;Aside from watching short movies and short video tutorials, you can also watch lengthy video/movies on youtube. This service can be accessed via http://youtube.com/movies and you can select movies from different categories as well as FreeTube.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;9. Let Me Watch This: &lt;/b&gt;LMWT is the best platform for watching unlimited international movies that appeal to people of the world.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;10. Free Movies Theatre:&lt;/b&gt; International movie are hosted on this website in large proportion. The website is Great movie and theatre around the world that makes everything easy.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;11. OVGuide:&lt;/b&gt; This website will also allow you to watch movie online with its selection of up to date movies. Aside listing of best movies you can watch every day, you also get video guides to help you get the best out of your stay on the website. This website is one of my favourite movie sites.&lt;br /&gt;&lt;br /&gt;Conclusion&lt;br /&gt;&lt;br /&gt;These are the best 11 websites where I download and watch movies from the web, but if you have more of them, kindly add in the comment section below.&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://hackingaddictions.blogspot.com/2012/09/10-best-websites-to-watch-and-download.html</link><author>noreply@blogger.com (Narendra KHandwe)</author><thr:total>27</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-995130096144042674.post-4275306187683666359</guid><pubDate>Wed, 26 Sep 2012 10:49:00 +0000</pubDate><atom:updated>2013-02-27T01:53:34.599-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tips</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><category domain="http://www.blogger.com/atom/ns#">Tutorials</category><title>Use google in our daily life? Google search tips &amp;amp; tricks</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;Our dependency on technology is increasing day by day, if it increases as same, then the time is no longer far, where from wake-up to sleep and sleep to wake-up, we fully depends on technology.&lt;br /&gt;&lt;br /&gt;Technology dependency has both advantages and disadvantage same, but here we only talk about technology advantages,(Internet Technology), like every one says, technology made our life so easy such as, Now it’s only take few seconds to check which movies is playing on Multiplex or How’s the traffic today.&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;br /&gt;Yes, technology made our life so easy, but did you ever notice, how much time you wasted without proper knowledge, means you struggle from search engine to website to find some basic things, So here I came with this post to make your life some more easy.&lt;br /&gt;&lt;br /&gt;In this post, I am sharing some google search tips &amp;amp; tricks,&lt;br /&gt;&lt;br /&gt;&lt;h2 style="text-align: left;"&gt;1. Search Movie times in your City:&lt;/h2&gt;To search latest movies timing in your city, type movie on google search box, if it shows another city then change your location, and click on any movie on search result and check their timing direct from google.&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://3.bp.blogspot.com/-mz3zs9DRTVo/UGLdI1UkZyI/AAAAAAAAD6o/TrK1nndS7_w/s1600/google+movies.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="360" src="http://3.bp.blogspot.com/-mz3zs9DRTVo/UGLdI1UkZyI/AAAAAAAAD6o/TrK1nndS7_w/s640/google+movies.jpg" width="550" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style="text-align: left;"&gt;2. Check Flight between cities:&lt;/h2&gt;You can check any available flight between two cities, to check type your cities with “to”, like, delhi to goa.&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://4.bp.blogspot.com/-P7inhFu7jrk/UGLdT5JiXuI/AAAAAAAAD64/zAS0TQuDJjg/s1600/check-flight-between-cities.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="286" src="http://4.bp.blogspot.com/-P7inhFu7jrk/UGLdT5JiXuI/AAAAAAAAD64/zAS0TQuDJjg/s640/check-flight-between-cities.png" width="550" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;h2 style="text-align: left;"&gt;3. Track Flight status:&lt;/h2&gt;Go to google search box, and enter your flight name, such as: Spice jet 253&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://2.bp.blogspot.com/-_YOfl-rGwGo/UGLdPBRWWhI/AAAAAAAAD6w/OI4TnX99J6M/s1600/check-flight-status.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="404" src="http://2.bp.blogspot.com/-_YOfl-rGwGo/UGLdPBRWWhI/AAAAAAAAD6w/OI4TnX99J6M/s640/check-flight-status.png" width="550" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style="text-align: left;"&gt;4. Search About any Famous People/cities/places and more:&lt;/h2&gt;By simple typing name of any famous things, you can read a short description on search page, all information is fetch from Wikipedia, like: sariska, taj mahal, anna hazare..&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://3.bp.blogspot.com/-6V_O_ZgqPIs/UGLd9vuIFwI/AAAAAAAAD7A/JZrbnUOSbPs/s1600/check-famous-peoples-places-1024x558.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="348" src="http://3.bp.blogspot.com/-6V_O_ZgqPIs/UGLd9vuIFwI/AAAAAAAAD7A/JZrbnUOSbPs/s640/check-famous-peoples-places-1024x558.png" width="550" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style="text-align: left;"&gt;5. Check weather in your city:&lt;/h2&gt;simply type weather in search box, it automatically shows weather of your current city, if not showing then use this parse, weather your_city, like weather jaipur&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://1.bp.blogspot.com/-vpxvlMTMNqw/UGLeEdXZ5SI/AAAAAAAAD7I/EHwft6y16CI/s1600/check-weather.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="254" src="http://1.bp.blogspot.com/-vpxvlMTMNqw/UGLeEdXZ5SI/AAAAAAAAD7I/EHwft6y16CI/s640/check-weather.png" width="550" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;h2 style="text-align: left;"&gt;6. Convert Currency, metrics and more:&lt;/h2&gt;You can use google powerful converter for easily convert currency, temperature, length, area, mass and more. ex:- dollar rupees&lt;br /&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://2.bp.blogspot.com/-RZrEndJwNXE/UGLeLeetfnI/AAAAAAAAD7Q/6FQU4vutwf8/s1600/convert-currency-metrics-length.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="204" src="http://2.bp.blogspot.com/-RZrEndJwNXE/UGLeLeetfnI/AAAAAAAAD7Q/6FQU4vutwf8/s640/convert-currency-metrics-length.png" width="550" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style="text-align: left;"&gt;7. Research about health Conditions:&lt;/h2&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="http://1.bp.blogspot.com/-WgRqBKplVTk/UGLeSdg9htI/AAAAAAAAD7Y/z8BatVNcMzk/s1600/check-disease-information-google.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="250" src="http://1.bp.blogspot.com/-WgRqBKplVTk/UGLeSdg9htI/AAAAAAAAD7Y/z8BatVNcMzk/s640/check-disease-information-google.png" width="550" /&gt;&lt;/a&gt;&lt;/div&gt;To see information about a common disease or symptom, enter it into the google search box, like: malaria&lt;br /&gt;Do you like these google search tips &amp;amp; tricks, tell us in comments, some more are in next step&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://hackingaddictions.blogspot.com/2012/09/use-google-in-our-daily-life-google.html</link><author>noreply@blogger.com (Narendra KHandwe)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://3.bp.blogspot.com/-mz3zs9DRTVo/UGLdI1UkZyI/AAAAAAAAD6o/TrK1nndS7_w/s72-c/google+movies.jpg" width="72"/><thr:total>0</thr:total></item></channel></rss>