<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-2540232851354336606</atom:id><lastBuildDate>Fri, 01 Nov 2024 10:35:51 +0000</lastBuildDate><category>ethical hacking</category><category>pc hacking</category><category>systems</category><category>email hacking</category><category>pc virus</category><category>computer hack</category><category>crash pc</category><category>hacking</category><category>monitor pc remotely</category><category>remote connection</category><category>autorun virus</category><category>common hacking tools</category><category>email</category><category>google adsense</category><category>hack</category><category>hack email</category><category>hack orkut</category><category>mail hack</category><category>mobile virus</category><category>orkut hack</category><category>website hacking</category><category>admin hack</category><category>admin password</category><category>adsense</category><category>adsense account</category><category>anonymous mails</category><category>best hackers</category><category>block usb</category><category>block usb ports using virus</category><category>care</category><category>fake gmail</category><category>get password form usb</category><category>hack admin password</category><category>hack orkut account</category><category>hack software</category><category>phishing</category><category>software keys</category><category>windows 7</category><category>BSNL Broadband hack</category><category>admin</category><category>administrator hacks</category><category>administrator password</category><category>adsense account tips</category><category>adsense account tricks</category><category>adsense for wordpress</category><category>adsense making money</category><category>adsense tips</category><category>adsense tricks</category><category>approve adsense account</category><category>attacking email</category><category>autorun.inf virus</category><category>banned from adsense</category><category>best ftp</category><category>best ten hackers</category><category>bidvertiser</category><category>binders</category><category>boot logo change</category><category>c programming</category><category>c++</category><category>cam</category><category>cam hack</category><category>cell phone spy</category><category>cellphone</category><category>cellphone hacks</category><category>change background in windoes 7</category><category>change boot logo</category><category>change boot logo in windows 7</category><category>change boot wallpaper</category><category>change icon of exe</category><category>change ip address</category><category>change wallpaper in windows 7</category><category>choosing password</category><category>cool hackers</category><category>create virus in c</category><category>create virus using c program</category><category>customer</category><category>customer care</category><category>disable usb</category><category>disable usb ports using virus</category><category>download free with rapidleech</category><category>download google videos online</category><category>download google videos without any software</category><category>download hack</category><category>download videos without softwares</category><category>download youtube video online</category><category>download youtube video without any software</category><category>email floods</category><category>email forging</category><category>email from gamil</category><category>emergency numbers of india</category><category>enhance pc</category><category>essential hacknig tools</category><category>ethical hacker</category><category>exe</category><category>exe to icon</category><category>fake login page</category><category>fake mail</category><category>fake mail pranks</category><category>fake page</category><category>fake yahoo mail</category><category>fast speed pc</category><category>finding hacking email</category><category>folder invisible</category><category>folder lock</category><category>forum site for warez</category><category>free adsense account</category><category>free ftp clients</category><category>free hindi online movies</category><category>free movies</category><category>free numbers</category><category>free premium accounts</category><category>free rapidleech</category><category>ftp</category><category>ftp softwares</category><category>generate password</category><category>genuine os</category><category>gmail</category><category>good ftp</category><category>google</category><category>google password</category><category>google password on sms</category><category>google password recover</category><category>google password via sms</category><category>gopsip</category><category>hack admin</category><category>hack cam</category><category>hack gmail</category><category>hack megaupload</category><category>hack megaupload to download</category><category>hack mobiles</category><category>hack pc</category><category>hack the world</category><category>hack webcam</category><category>hack what the hack</category><category>hack yahoo</category><category>hack yahoomail</category><category>hacker</category><category>hackers</category><category>hacking genius</category><category>hacking site</category><category>hacking softwares</category><category>hacking tools</category><category>hacking web cameras</category><category>hacking webcam on internet</category><category>icon</category><category>icon changer</category><category>icon to exe</category><category>inbox</category><category>india emergency numbers</category><category>indian free numbers</category><category>ip address</category><category>ip address change</category><category>iphone</category><category>iphone unlock</category><category>iphone unlocking</category><category>legal notice</category><category>locked orkut photos</category><category>locking folder</category><category>login page fake</category><category>mail fake</category><category>make money</category><category>make wallapaper into slideshow</category><category>make wallapaper slideshow</category><category>make xp genuine</category><category>megaupload</category><category>megaupload download</category><category>method for sql hacking</category><category>mobile hacking</category><category>mobile phone</category><category>mobile phone spy</category><category>mobile phone spy software</category><category>mobile phreaking</category><category>movies</category><category>multiple account on gmail</category><category>mysapace hacking</category><category>myspace account fake login</category><category>myspace account hack</category><category>myspace account login hack</category><category>new adsense account</category><category>new forum</category><category>new google adsense account</category><category>new hindi onlne movies</category><category>new ip address</category><category>nokia mobile phone</category><category>notice</category><category>numbers</category><category>online money</category><category>online movies</category><category>orkut</category><category>orkut account hacked</category><category>orkut image hack</category><category>orkut images</category><category>orkut photos viewing</category><category>password choosing</category><category>password recovery</category><category>password sms</category><category>pendrive virus</category><category>phishing myspace account</category><category>phone</category><category>protect email account from spam</category><category>protect folder</category><category>protect from spam</category><category>protect orkut account</category><category>protect pc</category><category>rapidleech</category><category>rapidleech servers</category><category>recover password via sms</category><category>remove autorun.inf</category><category>remove virus</category><category>restore password using usb drive</category><category>save email from hacking</category><category>secure wifi</category><category>send fake mail</category><category>send mail forging</category><category>serial keys</category><category>service numbers</category><category>setting adsense for wordpress</category><category>site hacking</category><category>sms</category><category>sniff</category><category>sniff password</category><category>sniff password using usb</category><category>spam</category><category>spam account</category><category>spam box</category><category>spam email</category><category>speed up pc</category><category>speed your pc</category><category>spoof your friends</category><category>spy</category><category>spy software</category><category>spy software for mobile phone</category><category>spying mobile phone</category><category>sql</category><category>sql hacking</category><category>sql injection</category><category>sql injection methods</category><category>strong password</category><category>the hack</category><category>toll free numbers of india</category><category>tollfree numbers</category><category>tools for hacker</category><category>top 10 ftp sotwares</category><category>trick for megaupload</category><category>unauthorized activity on email</category><category>unlock iphone</category><category>unlock the iphone</category><category>unlocking iphone</category><category>unlocking iphone prosedure</category><category>unlocking iphone tutorials</category><category>usb drive</category><category>usb virus</category><category>view locked orkut photos</category><category>virus</category><category>virus block website</category><category>vista sp1 bypass</category><category>wallapaper in windows 7</category><category>warez</category><category>warez city</category><category>warez forum</category><category>warez-city</category><category>weak password</category><category>web camera</category><category>web camera hack</category><category>webcam</category><category>website block</category><category>wi-fi</category><category>wifi</category><category>wifi networking</category><category>wifi secure</category><category>win xp</category><category>windows</category><category>windows vista sp1</category><category>wordpress adsense</category><category>xp</category><category>xp genuine</category><category>xp os genuine</category><category>yahoo hack</category><category>ymail hack</category><category>youtube video</category><title>Hacking Tips N Tricks</title><description>This is a blog which will teach u a lot of hacking tricks &amp;amp; ways to hack computer systems.&#xa;THE INFORMATION GIVEN BELOW IS ONLY FOR EDUCATIONAL PURPOSE &amp;amp; THE AUTHOR WILL NOT BE RESPONSIBLE FOR HOW U USE THIS INFORMATION.</description><link>http://hacktipsntricks.blogspot.com/</link><managingEditor>noreply@blogger.com (Akash)</managingEditor><generator>Blogger</generator><openSearch:totalResults>52</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2540232851354336606.post-825388999131974117</guid><pubDate>Sun, 11 Apr 2010 15:28:00 +0000</pubDate><atom:updated>2010-04-11T21:00:52.179+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">free hindi online movies</category><category domain="http://www.blogger.com/atom/ns#">free movies</category><category domain="http://www.blogger.com/atom/ns#">gopsip</category><category domain="http://www.blogger.com/atom/ns#">movies</category><category domain="http://www.blogger.com/atom/ns#">new hindi onlne movies</category><category domain="http://www.blogger.com/atom/ns#">online movies</category><title>Watch Online Hindi Newest Movies with DVD Quality</title><description>Hey Guys, Now watch all the Hindi Movies in DVD Quality with Superb Streaming Speed.. All the newest Movies also in DVD Quality..&lt;br /&gt;&lt;br /&gt;New Movies added every week with every week movies released.&lt;br /&gt;&lt;br /&gt;Also Movies on request is also available. Just make a request and get the movie addded and enjoy the movie in DVD Quality. &lt;br /&gt;&lt;br /&gt;Watch At --&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.gopsip.com&quot;&gt;Gopsip&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Now Watch Online Movies in Smarter Way.&lt;/span&gt;</description><link>http://hacktipsntricks.blogspot.com/2010/04/watch-online-hindi-newest-movies-with.html</link><author>noreply@blogger.com (Akash)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2540232851354336606.post-227284273024546796</guid><pubDate>Wed, 07 Apr 2010 10:18:00 +0000</pubDate><atom:updated>2010-04-07T15:49:47.859+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">folder invisible</category><category domain="http://www.blogger.com/atom/ns#">folder lock</category><category domain="http://www.blogger.com/atom/ns#">locking folder</category><category domain="http://www.blogger.com/atom/ns#">protect folder</category><title>How to Make Invisible Password Protected Folder</title><description>Do you want to password protect your folder? Do you want to make it invisible so that it remains unnoticed by the normal users? Well here is a way to do that. In this post I will show you how to make a password protected folder in Windows without using any additional software. Here is is step by step procedure to create a password protected folder.&lt;br /&gt;&lt;br /&gt; &lt;br /&gt;&lt;br /&gt;How to create a Password Protected Folder&lt;br /&gt;&lt;br /&gt;Step-1: Create a new folder (Right-click -&gt; New -&gt; Folder) and give it any name of your choice. For instance I name it as ABC.&lt;br /&gt;&lt;br /&gt;Step-2: Now in this folder place all the important files, documents or any folders that you want to password protect.&lt;br /&gt;&lt;br /&gt;Step-3: Now Right-click on this folder (ABC) and select the option Send To -&gt; Compressed (zipped) Folder.&lt;br /&gt;&lt;br /&gt;Step-4: Now a new compressed zipped folder gets created next this folder (ABC) with the same name.&lt;br /&gt;&lt;br /&gt;Step-5: Double-click on this compressed zipped folder and you should see your original folder (ABC) here.&lt;br /&gt;&lt;br /&gt;Step-6: Now goto the File menu and select the option Add a password.&lt;br /&gt;&lt;br /&gt;ie: File -&gt; Add a password&lt;br /&gt;&lt;br /&gt;Now a small window will pop up and here you can set your desired password. Once the password is set, the folder will ask for the password every time it is opened. Thus you have now created the password protected folder.&lt;br /&gt;&lt;br /&gt; &lt;br /&gt;&lt;br /&gt;How to make it Invisible&lt;br /&gt;&lt;br /&gt;Step-1: Now Right-click on this password protected folder and select Properties.&lt;br /&gt;&lt;br /&gt;Step-2: At the bottom select the option Hidden and press OK. Now your folder gets invisible (hidden).&lt;br /&gt;&lt;br /&gt;Step-3: In order to unhide this folder go to My Computer – &gt;Tools -&gt; Folder options. Switch to View tab, scroll down and under Hidden files and folders you’ll see the following two options&lt;br /&gt;&lt;br /&gt;    * Do not show hidden files and folders&lt;br /&gt;    * Show hidden files and folders&lt;br /&gt;&lt;br /&gt;Now select the second option and press OK. Now the invisible folder becomes visible in it’s location. To access it you need the password. To make it invisible again repeat step -1 through step-3 and select the first option and click OK. Now the folder becomes invisible once again.</description><link>http://hacktipsntricks.blogspot.com/2010/04/how-to-make-invisible-password.html</link><author>noreply@blogger.com (Akash)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2540232851354336606.post-5675613411918950435</guid><pubDate>Wed, 24 Mar 2010 12:10:00 +0000</pubDate><atom:updated>2010-03-24T17:49:20.042+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">download free with rapidleech</category><category domain="http://www.blogger.com/atom/ns#">forum site for warez</category><category domain="http://www.blogger.com/atom/ns#">free premium accounts</category><category domain="http://www.blogger.com/atom/ns#">free rapidleech</category><category domain="http://www.blogger.com/atom/ns#">new forum</category><category domain="http://www.blogger.com/atom/ns#">rapidleech</category><category domain="http://www.blogger.com/atom/ns#">rapidleech servers</category><category domain="http://www.blogger.com/atom/ns#">warez</category><category domain="http://www.blogger.com/atom/ns#">warez city</category><category domain="http://www.blogger.com/atom/ns#">warez forum</category><category domain="http://www.blogger.com/atom/ns#">warez-city</category><title>New Awesome Warez Forum Website and Free Public Rapidleech Server</title><description>Hey Friends,&lt;br /&gt;        Now here is a Warez Forum Website for you where you can get all the latest stuffs absolutely free all the stuffs you needed like &lt;span style=&quot;font-weight:bold;&quot;&gt;Movies,Apps,Games,Warez,E-Books,Web Development,Graphics,Templates and Scripts,Hacking Stuffs,Movies and Games Torrents,Mobile and PDA Games and Softwares and VIP Lounge&lt;/span&gt; all in there and also a GREAT thing is that members can use the latest &lt;span style=&quot;font-weight:bold;&quot;&gt;free public version pf Rapidleech&lt;/span&gt; so that you can &lt;span style=&quot;font-weight:bold;&quot;&gt;Download and Upload for FREE and FAST without Premium Account of any Site&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;so just go and Register there to get the Full Facilities&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.warez-city.net&quot;&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Warez City&lt;/span&gt;&lt;/a&gt;</description><link>http://hacktipsntricks.blogspot.com/2010/03/new-awesome-warez-forum-website-and.html</link><author>noreply@blogger.com (Akash)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2540232851354336606.post-9136277079903068346</guid><pubDate>Tue, 23 Feb 2010 16:41:00 +0000</pubDate><atom:updated>2010-02-23T22:27:44.740+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">adsense account</category><category domain="http://www.blogger.com/atom/ns#">adsense account tips</category><category domain="http://www.blogger.com/atom/ns#">adsense account tricks</category><category domain="http://www.blogger.com/atom/ns#">approve adsense account</category><category domain="http://www.blogger.com/atom/ns#">free adsense account</category><category domain="http://www.blogger.com/atom/ns#">google adsense</category><category domain="http://www.blogger.com/atom/ns#">new adsense account</category><category domain="http://www.blogger.com/atom/ns#">new google adsense account</category><title>Get Approved for Google Adsense</title><description>You get money from adsense only if you have a decent traffic. There’s no point in applying for it immediately after you setup your website as you are most likely to end up with your account being rejected if you apply immediately after setting up your website without any content.&lt;br /&gt;&lt;br /&gt;Google’s AdSense Program Policies and the Terms and Conditions are probably two of the most informative articles that you must read before applying for adsense.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;How long should i have to wait before applying for adsense?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;There’s nothing like you must wait for 30 days or 90 says before you can apply for adsense, the only thing is you should have decent content on your blog/website and have some decent traffic. Once approved into adsesne you can use the same publisher ID to display ads on multiple websites. So if you have a aged blog with some traffic on blogger or any other network apply with that url.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Tip:&lt;/span&gt; Blogger blogs are easily approved.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;If you are previously banned from adsense for click fraud&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Google takes click fraud very seriously, if you are previously banned from adsense for click fraud, then apply with a different name, email address and residence address. It’s always tempting for new bloggers and webmasters to click their own ads and asking friends to click on their own ads, don’t ever do that. You will be banned for life time for doing so.&lt;br /&gt;&lt;br /&gt;Adsense is like a duck laying golden eggs, handle it with care.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Content&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Make sure that your content is in compliance with adsense program policies. You may apply with a site that is in compliance with adsense and later use that account to publish ads on all your other sites.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Note:&lt;/span&gt; Google verifies all the sites on which your ad code is displayed  manually and may ban your account or domain from adsense if they are not in compliance with their program policies.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Age&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;You must be 18 years or older to apply for adsense. If you are not above 18 years you can apply with your elder bro or dads name.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Get a adsense account without having a website&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;If you haven’t created an Adsense account before, then apply through HubPages. Google will approve your account before you even need to write or publish any content.&lt;br /&gt;&lt;br /&gt;That’s right, no need to create content before applying to Google Adsense when you’re applying through HubPages.&lt;br /&gt;&lt;br /&gt;Read the Hubpages FAQ &lt;a href=&quot;http://hubpages.com/_read/faq&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Sign up for Hubpages &lt;a href=&quot;http://hubpages.com/_join/user/new/&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Once you’ve registered a Hubpages Author account go to Affiliate Settings (it’s in your My Account page, under Affiliate Settings).&lt;br /&gt;&lt;br /&gt;On the “Affiliate Settings” page you’ll see next to where it says “Adsense” a link to “Sign Up”. It will then ask “Do you already have a Google AdSense account?”. If you say yes, it’ll ask for your Publisher ID and then in a few simple steps you will have linked and activated your Adsense Publisher ID to your Hubpage account. However you’re here to start an account, so select No.Tick the box for “I have read and understand Google’s terms of service” and click the button “Signup for AdSense” and away you go!</description><link>http://hacktipsntricks.blogspot.com/2010/02/get-approved-for-google-adsense.html</link><author>noreply@blogger.com (Akash)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2540232851354336606.post-9194343092043946483</guid><pubDate>Sat, 20 Feb 2010 06:52:00 +0000</pubDate><atom:updated>2010-02-20T12:25:27.313+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">admin hack</category><category domain="http://www.blogger.com/atom/ns#">admin password</category><category domain="http://www.blogger.com/atom/ns#">hack admin password</category><title>Simple way to reset non-administrator account passwords</title><description>Here is another simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task.&lt;br /&gt;&lt;br /&gt;1. Open the command prompt &lt;span style=&quot;font-weight:bold;&quot;&gt;(Start-&gt;Run-&gt;type cmd-&gt;Enter)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;2. Now type &lt;span style=&quot;font-weight:bold;&quot;&gt;net user&lt;/span&gt; and hit Enter&lt;br /&gt;&lt;br /&gt;3. Now the system will show you a list of user accounts on the computer. Say for example you need to reset the password of the account by name Michael, then do as follows&lt;br /&gt;&lt;br /&gt;4. Type &lt;span style=&quot;font-weight:bold;&quot;&gt;net user Michael *&lt;/span&gt; and hit Enter. Now the system will ask you to enter the new password for the account. That’s it. Now you’ve successfully reset the password for &lt;span style=&quot;font-weight:bold;&quot;&gt;Michael&lt;/span&gt; without knowing his old password.&lt;br /&gt;&lt;br /&gt;So in this way you can reset the password of any Windows account at times when you forget it so that you need not re-install your OS for any reason. Hope this helps.</description><link>http://hacktipsntricks.blogspot.com/2010/02/simple-way-to-reset-non-administrator.html</link><author>noreply@blogger.com (Akash)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2540232851354336606.post-1290675899237055739</guid><pubDate>Sat, 20 Feb 2010 06:45:00 +0000</pubDate><atom:updated>2010-02-20T12:21:35.729+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">admin</category><category domain="http://www.blogger.com/atom/ns#">admin hack</category><category domain="http://www.blogger.com/atom/ns#">admin password</category><category domain="http://www.blogger.com/atom/ns#">administrator hacks</category><category domain="http://www.blogger.com/atom/ns#">administrator password</category><category domain="http://www.blogger.com/atom/ns#">best hackers</category><category domain="http://www.blogger.com/atom/ns#">hack admin</category><category domain="http://www.blogger.com/atom/ns#">hack admin password</category><title>How to Hack Windows Administrator Password</title><description>This hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password.&lt;br /&gt;&lt;br /&gt;Most of us have experienced a situation where in we need to gain access to a computer which is password protected or at times we may forget the administrator password without which it becomes impossible to login to the computer. So here is an excellent hack using which you can reset the password or make the password empty (remove the password) so that you can gain administrator access to the computer. You can do this with a small tool called  &lt;a href=&quot;http://pogostick.net/~pnh/ntpasswd/&quot;&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Offline NT Password &amp; Registry Editor&lt;/span&gt;&lt;/a&gt;. This utility works offline, that means you need to shut down your computer and boot off your using a floppy disk, CD or USB device (such as pen drive). The tool has the following features.&lt;br /&gt;&lt;br /&gt;* You do not need to know the old password to set a new one&lt;br /&gt;* Will detect and offer to unlock locked or disabled out user accounts!&lt;br /&gt;* There is also a registry editor and other registry utilities that works under linux/unix, and can be used for other things than password editing.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;How it works?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Most Windows operating systems stores the login passwords and other encrypted passwords in a file called &lt;span style=&quot;font-weight:bold;&quot;&gt;sam&lt;/span&gt; (Security Accounts Manager). This file can be usually found in \windows\system32\config. This file is a part of Windows registry and remains inaccessible as long as the OS is active. Hence it is necessary that you need to boot off your computer and access this sam file via boot. This tool intelligently gains access to this file and will reset/remove the password associated with administrator or any other account.&lt;br /&gt;&lt;br /&gt;The download link for both CD and floppy drives along with the complete instructions is given below&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;&lt;a href=&quot;http://pogostick.net/~pnh/ntpasswd/bootdisk.html&quot;&gt;Offline NT Password &amp; Reg Editor Download&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;It is recommended that you download the CD version of the tool since floppy drive is outdated and doesn’t exist in today’s computer. Once you download you’ll get a bootable image which you need to burn it onto your CD. Now boot your computer from this CD and follow the screen instructions to reset the password.</description><link>http://hacktipsntricks.blogspot.com/2010/02/how-to-hack-windows-administrator.html</link><author>noreply@blogger.com (Akash)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2540232851354336606.post-2955534166864209804</guid><pubDate>Sun, 14 Feb 2010 06:37:00 +0000</pubDate><atom:updated>2010-02-14T12:10:23.454+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">best ftp</category><category domain="http://www.blogger.com/atom/ns#">free ftp clients</category><category domain="http://www.blogger.com/atom/ns#">ftp</category><category domain="http://www.blogger.com/atom/ns#">ftp softwares</category><category domain="http://www.blogger.com/atom/ns#">good ftp</category><category domain="http://www.blogger.com/atom/ns#">top 10 ftp sotwares</category><title>Some Good and Best free FTP Client Software</title><description>Here are the list for some of those good and best free ftp software!&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;1. FTP Commander (very similar to WS_FTP) http://www.vista.ru/2inter.htm&lt;br /&gt;&lt;br /&gt;2. FileZilla FTP http://filezilla.sourceforge.net/&lt;br /&gt;&lt;br /&gt;3. Core FTP http://www.coreftp.com/&lt;br /&gt;&lt;br /&gt;4. Ace FTP http://freeware.aceftp.com/&lt;br /&gt;&lt;br /&gt;5. Smart FTP http://www.smartftp.com/download/&lt;br /&gt;&lt;br /&gt;6. FTP Explorer (No longer free) one of the best ftp on my list but now turn to money... http://www.ftpx.com/&lt;br /&gt;&lt;br /&gt;7. CoffeeCup Free FTP http://www.tucows.com/preview/195147&lt;br /&gt;&lt;br /&gt;8. Free FTP http://www.brandyware.com/freeftp.htm&lt;br /&gt;&lt;br /&gt;9. Cyberduck: http://cyberduck.ch/&lt;br /&gt;&lt;br /&gt;10. FTP Surfer: http://www.whispertech.com/surfer/&lt;br /&gt;&lt;br /&gt;11. i.Ftp: http://www.memecode.com/iftp.php&lt;br /&gt;&lt;br /&gt;12. LeechFTP (LeechFTP is a free FTP program with the usual features. It is no longer under development.) : http://www.download.com/Leech-FTP/3000-2160_4-10122207.html&lt;br /&gt;&lt;br /&gt;13. Fastream NETFile FTP Client : http://www.fastream.com/netfile.htm (Thanks gideonpyzer for this ftp software link)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Pick your choice, it&#39;s depending on what you like!&lt;br /&gt;&lt;br /&gt;Enjoy!</description><link>http://hacktipsntricks.blogspot.com/2010/02/some-good-and-best-free-ftp-client.html</link><author>noreply@blogger.com (Akash)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2540232851354336606.post-6176851960455165936</guid><pubDate>Tue, 02 Feb 2010 06:22:00 +0000</pubDate><atom:updated>2010-02-02T11:55:30.049+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">best hackers</category><category domain="http://www.blogger.com/atom/ns#">best ten hackers</category><category domain="http://www.blogger.com/atom/ns#">BSNL Broadband hack</category><category domain="http://www.blogger.com/atom/ns#">common hacking tools</category><category domain="http://www.blogger.com/atom/ns#">cool hackers</category><category domain="http://www.blogger.com/atom/ns#">hack the world</category><category domain="http://www.blogger.com/atom/ns#">hack what the hack</category><category domain="http://www.blogger.com/atom/ns#">hackers</category><category domain="http://www.blogger.com/atom/ns#">hacking genius</category><category domain="http://www.blogger.com/atom/ns#">the hack</category><title>Top ten best hackers of the world</title><description>The culture started from the, The hackers culture. Now I am an ethical hacker and many more people like me either interested in or wanted to be hacker , DO you know why is that so ? Answer is these guys made term hacking popular worldwide.&lt;br /&gt;I know they were bad boys , but as an ethical hacker I salute their intelligence , their dedication , and everything they did.&lt;br /&gt;&lt;br /&gt;For the users of this blog I am specially posting the names of top 10 hackers of the world who sometime in the past really rocked the news of the world.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Kevin Mitnick:&lt;/span&gt; Known worldwide as the “most famous hacker” and for having been the first to serve a prison sentence for infiltrating computer systems. He started dabbling when he was a minor, using the practice known as phone phreaking. Although he has never worked in programming, Mitnick is totally convinced that you can cause severe damage with a telephone and some calls. These days, totally distanced from his old hobbies and after passing many years behind bars, he works as a security consultant for multinational companies through his company “Mitnick Security.”&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Gary McKinnon:&lt;/span&gt; This 41-year-old Scotsman, also known as Solo, is the perpetrator of what’s considered the biggest hack in the history of computer science – into a military system. Not satisfied with this, in the years 2001 and 2002, he made a mockery of the information security of NASA itself and the Pentagon. Currently he is at liberty awarding his extradition to the U.S. and prohibited access to a computer with Internet connection.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Vladimir Levin:&lt;/span&gt; This Russian biochemist and mathematician was accused of having committed one of the biggest bank robberies of all times by means of the cracking technique. From Saint Petersburg, Levin managed to transfer funds estimated at approximately 10 million dollars from Citibank in New York to accounts he had opened in distant parts of the world. He was arrested by INTERPOL in 1995 at Heathrow airport (England). Although he managed to rob more than 10 million dollars, he was only sentenced to three years in prison. Currently he is free.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Kevin Poulsen:&lt;/span&gt; Today he may be a journalist and collaborates with authorities to track paedophiles on the Internet, but Poulsen has a dark past as a cracker and phreaker. The event that brought him the most notoriety was taking over Los Angeles phone lines in 1990. A radio station was offering a Porsche as a prize for whoever managed to be caller number 102. It goes without saying that Poulsen was the winner of the contest.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Timothy Lloyd:&lt;/span&gt; In 1996, information services company Omega, provider of NASA and the United States Navy, suffered losses of around 10 million dollars. And it was none other than Tim Lloyd, an x-employee fired some weeks earlier, who was the cause of this financial disaster. Lloyd left a virtually activated information bomb in the company’s codes, which finally detonated July 31 of that same year.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Robert Morris:&lt;/span&gt; Son of one of the forerunners in the creation of the virus, in 1988 Morris managed to infect no fewer than 6,000 computers connected to the ArpaNet network (one of the precursors to the internet) He did it from the prestigious Massachusetts Institute of Technology (MIT) and for his criminal activities he earned a four year prison sentence, which was finally reduced to community service.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;David Smith:&lt;/span&gt; Not all hackers can boast of creating the virus that spread the fastest to computers the width and breadth of the globe – David Smith can. In 1999, the father of the Melissa virus managed to infect and crash 100,000 email accounts with his malicious creation. Smith, who was thirty years old at the time, was sentenced and freed on bail.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;MafiaBoy:&lt;/span&gt; In February of 2000, many of the most important online companies in the US, such as eBay, Yahoo and Amazon, suffered a technical glitch called Denial of Service, which caused a total of 1700 million dollars in losses. But did these sites know that the perpetrator of the attack was a 16 year-old Canadian who responded to the alias MafiaBoy? Surely not, although it didn’t take them long to find out, thanks to his bragging about his bad deed to his classmates at school.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Masters of Deception (MoD):&lt;/span&gt; MoD was a New York cyber-gang that reached its apogee in the early 90s. Under the cover of different aliases, its biggest attacks involved taking over telephone lines and centres of the Internet, then still in its infancy. During this time McD starred in the historic “battles of the hackers,” along with other groups like the Legion of Doom (LoD), as they sought to destroy each other until the computers couldn’t take it anymore.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Richard Stallman:&lt;/span&gt; Since the early 80s when he was a hacker specializing in artificial intelligence, this hippie-looking New Yorker has been one of the most active militants in favor of free software. At MIT he firmly opposed the privatization of the software used by the institute’s laboratory, so much so they he created what today is known as GNU and the concept of CopyLeft. Popular systems like Linux utilize the GNU mode and Stallman is currently one of the gurus of software democratization.</description><link>http://hacktipsntricks.blogspot.com/2010/02/top-ten-best-hackers-of-world.html</link><author>noreply@blogger.com (Akash)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2540232851354336606.post-3499335990630264868</guid><pubDate>Thu, 21 Jan 2010 13:04:00 +0000</pubDate><atom:updated>2010-01-21T18:56:52.159+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">cell phone spy</category><category domain="http://www.blogger.com/atom/ns#">mobile phone</category><category domain="http://www.blogger.com/atom/ns#">mobile phone spy</category><category domain="http://www.blogger.com/atom/ns#">mobile phone spy software</category><category domain="http://www.blogger.com/atom/ns#">spy</category><category domain="http://www.blogger.com/atom/ns#">spy software</category><category domain="http://www.blogger.com/atom/ns#">spy software for mobile phone</category><category domain="http://www.blogger.com/atom/ns#">spying mobile phone</category><title>Want to Spy Mobile Phone - Tutor for Spying Mobile Phones</title><description>Well recently people discuss about the matter of cheating of the girlriend or boyfriend. So do you want to know how about them, to whom they talk,sms,they go? So you have secretly spy on their mobile phone for the SMS text messages, calls, GPS locations and other confidential info of your child’s or spouse’s mobile phone? Get here the tutorial on how to spy on mobile phones.&lt;br /&gt;&lt;br /&gt;To spy on any mobile phone all you have to do is to install a good mobile phone spying software on the mobile phone to whom you want to spy on and once you do this you can silently record every SMS and information about each call. You can also see GPS positions every thirty minutes.&lt;br /&gt;&lt;br /&gt;The best Mobile Phone Spy software recommended is Mobile Spy&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Why to choose Mobile Spy?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;There are many mobile phone spy software&#39;s in the market and hence people often get confused to which mobile phone spy software they choose. So People experimened and saw the good results and recommended for the Mobile Spy to go with.&lt;br /&gt;&lt;br /&gt;Mobile Spy is one of the best and award winning mobile phone spy softwares in the market also with an affordable price. Mobile Spy team provides an exmobileent support and hence it becomes just so simplier to spy on any mobile phone you want to! As i mentioned previously the cheating cases of girlfriend and boyfriend have been increased so this is a useful software for them and also for the parents so they come to know what their children are doing? If you’re really serious to spy on a mobile phone then Mobile Spy is for you.Get a copy of Mobile Spy and expose the truth.&lt;br /&gt;&lt;br /&gt;Mobile Spy is a perfect tool for parents to monitor their children’s activity on their mobile phone!&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Mobile Spy Features&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Mobile Spy is a hybrid spy software/service which allows you to spy on the mobile phone you want in real time. This unique system records the activities of anyone who uses the compatible mobile phone ( iPhone, Windows Mobile or Symbian OS smartphone). For this you need to install a small application onto the mobile phone. This application starts at every boot of the phone but remains stealth and does not show up in the running process list. It runs in the background and will spy on every activity that takes place on the phone. Thus the spying feature is completely undetected!&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Logging Features&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;1. Spy on Calls Log – Each incoming and outgoing number on the phone is logged along with duration and time stamp.&lt;br /&gt;&lt;br /&gt;2. Spy on SMS – Every text message/MMS is logged even if the phone’s logs are deleted. Includes full text.&lt;br /&gt;&lt;br /&gt;3. Spy on Location – The phones’s current location is frequently logged using GPS when signal is available.&lt;br /&gt;&lt;br /&gt;4. Spy on Web Activity – Each address entered into Internet Explorer (or any browser) on the phone is logged.&lt;br /&gt;&lt;br /&gt;5. This mobile phone spy software works in total stealth mode. The person using the phone can never come to know about the presence of this spy software.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;How it works&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The working of Mobile Spy is very simple and needs no extra knowledge to install and use.&lt;br /&gt;&lt;br /&gt;Step 1- After you purchase Mobile Spy you’ll get a link to download the software. Along with this you’ll get a username and password for you online control panel.&lt;br /&gt;&lt;br /&gt;Step 2- Install the downloaded mobile phone spy software onto any of the compatible mobile phone. After installation the spy software starts recording all the activities on the mobile phone.&lt;br /&gt;&lt;br /&gt;Step 3- Login to your online control panel to see the logs containing the recorded information.&lt;br /&gt;&lt;br /&gt;This is just a small list of Mobile Spy features. For a list of compatible phones, step-by-step installation guide and more details visit the &lt;a href=&quot;http://www.mobile-spy.com&quot;&gt;Mobile Spy Homepage&lt;/a&gt;</description><link>http://hacktipsntricks.blogspot.com/2010/01/want-to-spy-mobile-phone-tutor-for.html</link><author>noreply@blogger.com (Akash)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2540232851354336606.post-4196637580968078184</guid><pubDate>Mon, 18 Jan 2010 17:14:00 +0000</pubDate><atom:updated>2010-01-18T22:56:59.759+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">download google videos online</category><category domain="http://www.blogger.com/atom/ns#">download google videos without any software</category><category domain="http://www.blogger.com/atom/ns#">download videos without softwares</category><category domain="http://www.blogger.com/atom/ns#">download youtube video online</category><category domain="http://www.blogger.com/atom/ns#">download youtube video without any software</category><category domain="http://www.blogger.com/atom/ns#">youtube video</category><title>Download YouTube Videos and else without any software</title><description>&lt;span style=&quot;font-weight:bold;&quot;&gt;Download YouTube and else Videos online without any softwares.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.dlyoutube.com&quot;&gt;http://www.dlyoutube.com&lt;/a&gt;&lt;br /&gt;This site for youtube download.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.keepvid.com&quot;&gt;http://www.keepvid.com&lt;/a&gt;&lt;br /&gt;This is for any video like youtube,google video,etc&lt;br /&gt;&lt;br /&gt;- Open the above link.&lt;br /&gt;- Just copy and paste the url of a YouTube video and you want to download and press the download button.&lt;br /&gt;- You will get another download link below. Click it and save the file.&lt;br /&gt;- Save it as .flv file&lt;br /&gt;Download the .FLV Player (to play the above file) available at that website.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;There is one another simple way to download the youtube video files...&lt;br /&gt;&lt;br /&gt;1. Open any video you want to watch from youtube website and copy that url.&lt;br /&gt;2. Type “kiss” before youtube.com/abcdefgh123&lt;br /&gt;ie. www.kissyoutube.com/abcdefgh123&lt;br /&gt;3. And you can see the download link is available for your video just download the video .flv file….&lt;br /&gt;&lt;br /&gt;No software required all online download.</description><link>http://hacktipsntricks.blogspot.com/2010/01/download-youtube-videos-and-else.html</link><author>noreply@blogger.com (Akash)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2540232851354336606.post-5771223770092672635</guid><pubDate>Mon, 04 Jan 2010 14:04:00 +0000</pubDate><atom:updated>2010-01-04T19:38:04.043+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">attacking email</category><category domain="http://www.blogger.com/atom/ns#">email</category><category domain="http://www.blogger.com/atom/ns#">email floods</category><category domain="http://www.blogger.com/atom/ns#">finding hacking email</category><category domain="http://www.blogger.com/atom/ns#">hack email</category><category domain="http://www.blogger.com/atom/ns#">save email from hacking</category><category domain="http://www.blogger.com/atom/ns#">unauthorized activity on email</category><title>Find Unauthorized Activity on Your Email Account</title><description>Do you suspect that your email account is under attack? Do you want to maintain total security of your email account and make it 100% hack proof? Well, Some times our email account might have got hacked and we may not be aware of that. We may believe that our email account is safe, but in reality our private and confidential information may be falling into the hands of a third person.&lt;br /&gt;&lt;br /&gt;Here are some signs of unauthorized activity on an email account.&lt;br /&gt;&lt;br /&gt;1. Your new emails are marked as Read even if you’ve not read them.&lt;br /&gt;&lt;br /&gt;2. Your emails are moved to Trash or even permanently deleted without your notice.&lt;br /&gt;&lt;br /&gt;3. Your emails are being forwarded to a third party email address (check your settings-&gt;forwarding).&lt;br /&gt;&lt;br /&gt;4. Your secondary email address is changed.&lt;br /&gt;&lt;br /&gt;If you come across any of the above activities on your email account, then it is a clear indication that your email account is hacked.&lt;br /&gt;&lt;br /&gt;Additional Security Features in Gmail to ensure the Safety of your Account&lt;br /&gt;&lt;br /&gt;Gmail provides an additional security feature to protect your email account through the means of IP address logging. That is, Gmail records your IP address every time you login to your Gmail account. So, if a third party gets access to your account then even his/her IP is also recorded. To see a list of recorded IP address, scroll down to the bottom of your Gmail account and you’ll see something like this.&lt;br /&gt;&lt;br /&gt;Gmail - Last account activity&lt;br /&gt;&lt;br /&gt;You can see from the above figure that Gmail shows the IP address of last login (last account activity). You can click on Details to see the IP address of your last 5 activities. If you find that the IP listed in the logs doesn’t belong to you, then you can suspect unauthorized activity.&lt;br /&gt;&lt;br /&gt;Steps to be carried out to stop unauthorized activity on your email account&lt;br /&gt;&lt;br /&gt;If you feel/suspect that your account is hacked then you must immediately take the actions mentioned below &lt;br /&gt;&lt;br /&gt;1. Change your Password&lt;br /&gt;&lt;br /&gt;2. Change your security question.&lt;br /&gt;&lt;br /&gt;2. Remove any third party email address (if any) to which your account is set to forward emails.&lt;br /&gt;&lt;br /&gt;3. Make sure that you can access the email account of your secondary email address.&lt;br /&gt;&lt;br /&gt;4. Also change you secondary email password and security question.&lt;br /&gt;&lt;br /&gt;This ensures that your account is safe from future attacks.</description><link>http://hacktipsntricks.blogspot.com/2010/01/find-unauthorized-activity-on-your.html</link><author>noreply@blogger.com (Akash)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2540232851354336606.post-4881604603917444675</guid><pubDate>Fri, 01 Jan 2010 19:34:00 +0000</pubDate><atom:updated>2010-01-02T01:12:08.469+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">iphone</category><category domain="http://www.blogger.com/atom/ns#">iphone unlock</category><category domain="http://www.blogger.com/atom/ns#">iphone unlocking</category><category domain="http://www.blogger.com/atom/ns#">unlock iphone</category><category domain="http://www.blogger.com/atom/ns#">unlock the iphone</category><category domain="http://www.blogger.com/atom/ns#">unlocking iphone</category><category domain="http://www.blogger.com/atom/ns#">unlocking iphone prosedure</category><category domain="http://www.blogger.com/atom/ns#">unlocking iphone tutorials</category><title>Unlocking your Iphone</title><description>Now unlock your iphone your self by just following simple steps and enjoy using your favourite network sim card in it. Just some simple steps-&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;–&gt;Make sure your iPhone is docked and charged&lt;br /&gt;–&gt;Backup all of your phone settings&lt;br /&gt;–&gt;Also make sure that the processes iTunes.exe and iTunesHelper.exe arent running.&lt;br /&gt;&lt;br /&gt;–&gt;Download the following and place them into “phone” folder created in c: drive.&lt;br /&gt;1.software restore file from Apple(&lt;a href=&quot;http://appldnld.apple.com.edgesuite.net/content.info.apple.com/iPhone/061-3538.20070629.B7vXa/iPhone1,1_1.0_1A543a_Restore.ipsw&quot;&gt;here&lt;/a&gt;)&lt;br /&gt;2.Jailbreak program &lt;a href=&quot;http://mackalvin.com/Documents/jailbreak2.zip&quot;&gt;here&lt;/a&gt;&lt;br /&gt;3.iPhoneInterface (v 0.3.3) program &lt;a href=&quot;http://mackalvin.com/Documents/ipi2.zip&quot;&gt;here&lt;/a&gt;&lt;br /&gt;4.iTunesMobileDevice.dll from &lt;a href=&quot;http://www.mackalvin.com/Documents/iTunesMobileDevice.dll.zip&quot;&gt;here&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;–&gt;Navigate to the phone folder from cmd prompt and type jailbreak&lt;br /&gt;Jailbreak should say Sending Files… You’ll then be prompted to hold the POWER and HOME buttons for 25 seconds. The phone will automatically shut down, and then restart..&lt;br /&gt;&lt;br /&gt;–&gt;In the command prompt type: iphoneinterface and a prompt for&lt;br /&gt;iPhone:/# should appear.Next type: deactivate&lt;br /&gt;&lt;br /&gt;–&gt;Now go to this site. Right click the iPhoneActivation.pem link at the top of the page and&lt;br /&gt;save it to your C:\phonedmg directory and keep your browser open on this page.&lt;br /&gt;&lt;br /&gt;–&gt;Back to command prompt,type&lt;br /&gt;cd /System/Library/Lockdown/&lt;br /&gt;putfile /System/Library/Lockdown/iPhoneActivation.pem&lt;br /&gt;This will copy over a modified iPhoneActivation.pem file that is required for this to work.&lt;br /&gt;&lt;br /&gt;–&gt;Now you need to find your iPhone’s Device ID found at:&lt;br /&gt;C:\Documents and Settings\username\Application Data\Apple Computer\Lockdown.If you can not find this file check the hidden files.&lt;br /&gt;As for the other two numbers, the IMEI and ICCID are found by pressing the “i” button&lt;br /&gt;when the iPhone asks for activation&lt;br /&gt;&lt;br /&gt;–&gt;now fill in these details in the open browser page and generate a custom activator and place it in your phone folder.&lt;br /&gt;&lt;br /&gt;–&gt;doubleclick the file just d/l and ull be shown details abt ur iphone..You will then get this pop up telling you your iPhone is activated&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Smile and Enjoy…..</description><link>http://hacktipsntricks.blogspot.com/2010/01/unlocking-your-iphone.html</link><author>noreply@blogger.com (Akash)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2540232851354336606.post-6962405413799757954</guid><pubDate>Wed, 09 Dec 2009 11:55:00 +0000</pubDate><atom:updated>2009-12-09T17:37:24.120+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">cam</category><category domain="http://www.blogger.com/atom/ns#">cam hack</category><category domain="http://www.blogger.com/atom/ns#">common hacking tools</category><category domain="http://www.blogger.com/atom/ns#">hack cam</category><category domain="http://www.blogger.com/atom/ns#">hack webcam</category><category domain="http://www.blogger.com/atom/ns#">hacking web cameras</category><category domain="http://www.blogger.com/atom/ns#">hacking webcam on internet</category><category domain="http://www.blogger.com/atom/ns#">web camera</category><category domain="http://www.blogger.com/atom/ns#">web camera hack</category><category domain="http://www.blogger.com/atom/ns#">webcam</category><title>Hack web cameras on internet online</title><description>The main thing you have to do to hack the web cameras on internet is go to www.google.co.in and then type the code given below in the search box:(without quotes) the quote is given simply to understand the code starting and ending.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;&lt;/span&gt;“inurl:/view/index.shtml” and press enter&lt;br /&gt;&lt;br /&gt;then you will get list of some website showing the IP addresses and some link like that actually they are the web cameras link on the internet.&lt;br /&gt;&lt;br /&gt;Please note one thing here- if u type the IP address of the computer in place of inurl when u type the code in the search box there then the web camera of that computer can be hacked directly means direct access if that pc is having web camera online.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;For Ex. type in google search as&lt;br /&gt;&lt;br /&gt;207.111.165.30/view/index.shtml to view web camera used at that ip address&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;the other google search links which makes web cameras publicly viewable are:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;inurl:/view.shtml&lt;br /&gt;intitle:”Live View / – AXIS” | inurl:view/view.shtml^&lt;br /&gt;inurl:ViewerFrame?Mode=&lt;br /&gt;inurl:ViewerFrame?Mode=Refresh&lt;br /&gt;inurl:axis-cgi/jpg&lt;br /&gt;inurl:axis-cgi/mjpg (motion-JPEG)&lt;br /&gt;inurl:view/indexFrame.shtml&lt;br /&gt;inurl:view/index.shtml&lt;br /&gt;inurl:view/view.shtml&lt;br /&gt;liveapplet&lt;br /&gt;intitle:”live view” intitle:axis&lt;br /&gt;intitle:liveapplet&lt;br /&gt;allintitle:”Network Camera NetworkCamera”&lt;br /&gt;intitle:axis intitle:”video server”&lt;br /&gt;intitle:liveapplet inurl:LvAppl&lt;br /&gt;intitle:”EvoCam” inurl:”webcam.html”&lt;br /&gt;intitle:”Live NetSnap Cam-Server feed”&lt;br /&gt;intitle:”Live View / – AXIS”&lt;br /&gt;intitle:”Live View / – AXIS 206M”&lt;br /&gt;intitle:”Live View / – AXIS 206W”&lt;br /&gt;intitle:”Live View / – AXIS 210?&lt;br /&gt;inurl:indexFrame.shtml Axis&lt;br /&gt;inurl:”MultiCameraFrame?Mode=Motion”&lt;br /&gt;intitle:start inurl:cgistart&lt;br /&gt;intitle:”WJ-NT104 Main Page”&lt;br /&gt;intext:”MOBOTIX M1? intext:”Open Menu”&lt;br /&gt;intext:”MOBOTIX M10? intext:”Open Menu”&lt;br /&gt;intext:”MOBOTIX D10? intext:”Open Menu”&lt;br /&gt;intitle:snc-z20 inurl:home/&lt;br /&gt;intitle:snc-cs3 inurl:home/&lt;br /&gt;intitle:snc-rz30 inurl:home/&lt;br /&gt;intitle:”sony network camera snc-p1?&lt;br /&gt;intitle:”sony network camera snc-m1?&lt;br /&gt;site:.viewnetcam.com -www.viewnetcam.com&lt;br /&gt;intitle:”Toshiba Network Camera” user login&lt;br /&gt;intitle:”netcam live image”&lt;br /&gt;intitle:”i-Catcher Console – Web Monitor”&lt;/span&gt;</description><link>http://hacktipsntricks.blogspot.com/2009/12/hack-web-cameras-on-internet-online.html</link><author>noreply@blogger.com (Akash)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2540232851354336606.post-840084035587439009</guid><pubDate>Thu, 26 Nov 2009 15:30:00 +0000</pubDate><atom:updated>2009-11-26T21:02:24.846+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">boot logo change</category><category domain="http://www.blogger.com/atom/ns#">change boot logo</category><category domain="http://www.blogger.com/atom/ns#">change boot logo in windows 7</category><category domain="http://www.blogger.com/atom/ns#">change boot wallpaper</category><category domain="http://www.blogger.com/atom/ns#">windows 7</category><title>Changing boot logo in Windows 7</title><description>In Windows Vista, there was the possibility of an alternative splash screen to switch instead of the normal load bar that is displayed by Windows Vista. In Windows 7 boot screen is not available but may be the Windows logo that is displayed when launching Windows 7 be completely eliminated. In Windows 7 boot screen is not available but may be the Windows logo that is displayed when launching Windows 7 be completely eliminated. Once you choose to disable the logo is only a black screen. Once you choose to disable the logo is only a black screen.&lt;br /&gt;&lt;br /&gt;Go to Start, click All Programs and then Accessories and select Run here. Then type msconfig and click OK. Then type msconfig and click OK. In the window that opens click on the tab &quot;Start computer. In the window that opens click on the tab &quot;Start computer. Click here for the tick in&quot; Without UI to launch &quot;, if you can show jusit information at startup, check also&quot; Information about startup operating system to. Turn here for the tick in &quot;Without UI to launch&quot;, if you can show jusit information at startup, check also &quot;Information about operating system to startup.&lt;br /&gt;&lt;br /&gt;Then press OK, the reboot as requested here is not necessary. The next time the computer starts the Windows logo will not appear. The next time the computer starts the Windows logo will not appear.</description><link>http://hacktipsntricks.blogspot.com/2009/11/changing-boot-logo-in-windows-7.html</link><author>noreply@blogger.com (Akash)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2540232851354336606.post-329262211241427654</guid><pubDate>Thu, 26 Nov 2009 15:26:00 +0000</pubDate><atom:updated>2009-11-26T21:00:00.108+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">choosing password</category><category domain="http://www.blogger.com/atom/ns#">generate password</category><category domain="http://www.blogger.com/atom/ns#">get password form usb</category><category domain="http://www.blogger.com/atom/ns#">password choosing</category><category domain="http://www.blogger.com/atom/ns#">strong password</category><category domain="http://www.blogger.com/atom/ns#">weak password</category><title>How to generate the passwords</title><description>Many users often have to be a simple password that is used also in several places such as the computer itself, Live Messenger and Google. It is always advisable in that regard for the safety for a strong password and set up a different password for each service so when your password may be overtaken by someone else not have direct access to all services that you use. It is always advisable in that regard for the safety for a strong password and set up a different password for each service so when your password may be over taken by someone else not have direct access to all services that you use.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Weak passwords&lt;/span&gt;&lt;br /&gt;Examples of weak passwords include 12345678, qwerty, zxcvbn, asdfgh, ABCDEFG and other words with a clear sense of order as the names of parents, children / grandchildren, birth dates, etc. Examples of weak administrator passwords include 12345678, qwerty, zxcvbn , asdfgh, ABCDEFG and other words with a clear sense of order as the names of parents, children / grand children, birth dates, administrator etc.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Strong Passwords Strong passwords&lt;/span&gt;&lt;br /&gt;Strong passwords have an outsider has no meaning and are difficult to guess. Strong passwords have no meaning for an outsider and they are harder to guess. The password easier to remember you can combine as names and birth dates. The password easier to remember you can combine as names and birth dates. Imagine you have a date of birth 14/02/1975 and pet named Kyra example you can make of it: # 12Kyra75. Imagine you have a date of birth 14/02/1975 and pet named Kyra example you can make of it: # 12Kyra75.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Key issues in creating and using a password:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;1.The longer the better, try to keep at least 8 characters.&lt;br /&gt;2.Use uppercase and lowercase letters and combine it with numbers and any special characters such as points and fences.&lt;br /&gt;3.Change your password periodically, eg every 3 months.&lt;br /&gt;4.Try a different password for each service used.&lt;br /&gt;5.Keep an alternate email address is set to recover passwords.&lt;br /&gt;6.Do not use the &quot;Ask&quot; option. You can often choose a question in this one password in order to recover your password. You can often choose a question in this one password in order to recover your password.&lt;br /&gt;7.Note Phishing Mails.&lt;br /&gt;8.Be careful when using other computers. If possible use in this case the private mode of the browser, almost all modern browsers have this as InPrivate Internet Explorer and Chrome Incognito mode. If possible use in this case the private mode of the browser, almost all modern browsers have this as InPrivate Internet Explorer and Chrome Incognito mode.&lt;br /&gt;9.Important not to write passwords, nor store them in a text file. Want to save the passwords do pay attention that you do not file as &quot;ABC.doc&quot; where possible and protect the file so you must first enter a password for the document to open. Want to save the passwords do pay attention that you do not file as &quot;ABC.doc&quot; where possible and protect the file so you must first enter a password for the document to open.&lt;br /&gt;10.Not to tell passwords to others.&lt;br /&gt;11.May not save passwords in the browser, especially on other computers.</description><link>http://hacktipsntricks.blogspot.com/2009/11/how-to-generate-passwords.html</link><author>noreply@blogger.com (Akash)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2540232851354336606.post-4232942998861631535</guid><pubDate>Thu, 26 Nov 2009 15:18:00 +0000</pubDate><atom:updated>2009-11-26T20:56:21.963+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">change background in windoes 7</category><category domain="http://www.blogger.com/atom/ns#">change wallpaper in windows 7</category><category domain="http://www.blogger.com/atom/ns#">make wallapaper into slideshow</category><category domain="http://www.blogger.com/atom/ns#">make wallapaper slideshow</category><category domain="http://www.blogger.com/atom/ns#">wallapaper in windows 7</category><category domain="http://www.blogger.com/atom/ns#">windows 7</category><title>Make Slideshow as desktop background in Windows 7</title><description>There are several programs that allow you a slideshow as a desktop background set as the Webshots program, but may since Windows 7 Windows yourself. To own a slideshow set to click anywhere on the desktop, right-click &quot;Personalize&quot;. To own a slideshow set to click anywhere on the desktop, right-click &quot;Personalize&quot;. In the window that opens you see a list of topics, click here below and then click Desktop Background list opens with the wallpaper. In the window that opens you see a list of topics, click here below and then click Desktop Background list opens with the wallpaper.&lt;br /&gt;&lt;br /&gt;Top of the window then a Browse button so a folder to select their own images instead of the default Windows wallpaper. Top of the window then a Browse button so a folder to select their own images instead of the default Windows wallpaper.&lt;br /&gt;&lt;br /&gt;You can search the list by Determining Whether the picture should be included in the slideshow. To set this up go with the mouse over a thumbnail and click the checkbox to select a photo to be included in the slideshow. To set this up go with the mouse over a thumbnail and click the checkbox to select a photo to be included in the slideshow. Use the &#39;Select All&#39; button at the top select all pictures at once. Use the &#39;Select All&#39; button at the top select all pictures at once. The slideshow is automatically activated when multiple images are selected. The slideshow is automatically activated when multiple images are selected.&lt;br /&gt;&lt;br /&gt;At the bottom you have the options for the slideshow itself. Under &quot;Change picture every:&quot; you determine the time after which a picture has to be changed. Under &quot;Change picture every:&quot; you determining the time after which a picture has to be changed. You need the ability to choose between 10 seconds up to one days. You need the ability to choose between 10 seconds up to one days. Next door is an option called &quot;Random&quot;. Next door is an option called &quot;Random&quot;. This pictures are displayed randomly and not in the default order in the list. This pictures are displayed randomly and not in the default order in the list.&lt;br /&gt;&lt;br /&gt;For laptop users there is now an extra option available. By default the slideshow will be disabled when the laptop only uses the battery. By default the slideshow will be disabled when the laptop only uses the battery. Remove the tick if this road to the slideshow even then available. Remove the tick if this road to the slideshow here then available.&lt;br /&gt;&lt;br /&gt;If the slideshow is enabled you can quickly change a photo by right clicking on the desktop and selecting &quot;Next background. If the slideshow is enabled you can quickly change a photo by right clicking on the desktop and selecting &quot;Next background.</description><link>http://hacktipsntricks.blogspot.com/2009/11/make-slideshow-as-desktop-background-in.html</link><author>noreply@blogger.com (Akash)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2540232851354336606.post-1471700919710531733</guid><pubDate>Thu, 19 Nov 2009 09:17:00 +0000</pubDate><atom:updated>2009-11-19T14:54:04.044+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">block usb</category><category domain="http://www.blogger.com/atom/ns#">block usb ports using virus</category><category domain="http://www.blogger.com/atom/ns#">get password form usb</category><category domain="http://www.blogger.com/atom/ns#">restore password using usb drive</category><category domain="http://www.blogger.com/atom/ns#">sniff</category><category domain="http://www.blogger.com/atom/ns#">sniff password</category><category domain="http://www.blogger.com/atom/ns#">sniff password using usb</category><category domain="http://www.blogger.com/atom/ns#">usb drive</category><title>How to Sniff Passwords Using USB Drive</title><description>As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to sniff passwords from any computer. We need the following tools to create our rootkit.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;MessenPass:&lt;/span&gt; Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Mail PassView:&lt;/span&gt; Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.&lt;br /&gt;Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;IE Passview:&lt;/span&gt; IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 – v6.0&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Protected Storage PassView:&lt;/span&gt; Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;PasswordFox:&lt;/span&gt; PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename. &lt;br /&gt;&lt;br /&gt;Here is a step by step procedure to create the password hacking toolkit.&lt;br /&gt;&lt;br /&gt;NOTE: You must temporarily disable your antivirus before following these steps.&lt;br /&gt;&lt;br /&gt;1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.&lt;br /&gt;&lt;br /&gt;ie: Copy the files – mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.&lt;br /&gt;&lt;br /&gt;2. Create a new Notepad and write the following text into it&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;[autorun]&lt;br /&gt;open=launch.bat&lt;br /&gt;ACTION= Perform a Virus Scan&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;save the Notepad and rename it from&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;New Text Document.txt to autorun.inf&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Now copy the &lt;span style=&quot;font-weight:bold;&quot;&gt;autorun.inf&lt;/span&gt; file onto your USB pendrive.&lt;br /&gt;&lt;br /&gt;3. Create another Notepad and write the following text onto it.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;start mspass.exe /stext mspass.txt&lt;br /&gt;&lt;br /&gt;start mailpv.exe /stext mailpv.txt&lt;br /&gt;&lt;br /&gt;start iepv.exe /stext iepv.txt&lt;br /&gt;&lt;br /&gt;start pspv.exe /stext pspv.txt&lt;br /&gt;&lt;br /&gt;start passwordfox.exe /stext passwordfox.txt&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;save the Notepad and rename it from&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;New Text Document.txt to launch.bat&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Copy the launch.bat file also to your USB drive.&lt;br /&gt;&lt;br /&gt;Now your rootkit is ready and you are all set to sniff the passwords. You can use this pendrive on on any computer to sniff the stored passwords. Just follow these steps&lt;br /&gt;&lt;br /&gt;1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).&lt;br /&gt;&lt;br /&gt;2. In the pop-up window, select the first option (Perform a Virus Scan).&lt;br /&gt;&lt;br /&gt;3. Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.&lt;br /&gt;&lt;br /&gt;4. Remove the pendrive and you’ll see the stored passwords in the .TXT files.&lt;br /&gt;&lt;br /&gt;This hack works on Windows 2000, XP and Vista&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;NOTE: This procedure will only recover the stored passwords (if any) on the Computer.&lt;/span&gt;</description><link>http://hacktipsntricks.blogspot.com/2009/11/how-to-sniff-passwords-using-usb-drive.html</link><author>noreply@blogger.com (Akash)</author><thr:total>6</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2540232851354336606.post-4637783441550757141</guid><pubDate>Thu, 19 Nov 2009 09:11:00 +0000</pubDate><atom:updated>2009-11-19T14:47:13.044+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">email</category><category domain="http://www.blogger.com/atom/ns#">inbox</category><category domain="http://www.blogger.com/atom/ns#">protect email account from spam</category><category domain="http://www.blogger.com/atom/ns#">protect from spam</category><category domain="http://www.blogger.com/atom/ns#">spam</category><category domain="http://www.blogger.com/atom/ns#">spam account</category><category domain="http://www.blogger.com/atom/ns#">spam box</category><category domain="http://www.blogger.com/atom/ns#">spam email</category><title>How to Protect an Email Account from SPAM</title><description>Most of us get SPAM every day. Some of us get more and some little. Even a newly created email account will begin to receive spam just after a few days of it’s creation. Many times we wonder where these spam come from and why? But this question remains unanswered within ourselves. So in this post I will try my best to give every possible information about the spam and will also tell you about how to combat spam.&lt;br /&gt;&lt;br /&gt;What is SPAM?&lt;br /&gt;&lt;br /&gt;Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. Most widely recognized form of spam is email spam.&lt;br /&gt;&lt;br /&gt;Where do these SPAM come from?&lt;br /&gt;&lt;br /&gt;These spam come only from spammers and never from a legitimate user or a company. These spammers send a single email to hundreds (some times thousands or millions) of email addresses at a time. They either send it manually or use spambots to automate the process of spamming.&lt;br /&gt;&lt;br /&gt;Why do spammers SPAM?&lt;br /&gt;&lt;br /&gt;The main goal of spammers is to send the spam (unsolicited bulk messages) to as many people as possible in order to make profit. For example, John builds a small website to sell an ebook which gives information about weight loss. In order to make sales he needs publicity for his website. Instead of spending money on advertising, John decides to create an email which contains information about his site along with it’s link and send this email to say 100 email addresses in his contact list. If 1 person out of hundred buy this book john gets $10. What if he sends this email to 1000s of email addresses. He gets $100. Imagine, if he sends this email to 1 Million email addresses he gets $100000.&lt;br /&gt;&lt;br /&gt;Now I hope you understood the idea behind spamming. So in order to make money, spammers send their advertising emails to as many people as possible without respecting the recipient’s privacy.&lt;br /&gt;&lt;br /&gt;From where do SPAMmers get my email address?&lt;br /&gt;&lt;br /&gt;On the Internet there exists many sites who collect the email IDs of people and sell them to spammers in bulk. Most often, people sign up for monthly newsletters and take up surveys. This is the time where these scam sites get their email addresses. Also many spammers collect email addresses by using spambots. These spambots collect email addresses from the Internet in order to build mailing lists. Such spambots are web crawlers that can gather email addresses from Web sites, newsgroups, forums, special-interest group (SIG) postings, and chat-room conversations.&lt;br /&gt;&lt;br /&gt;Spammers also use the trick of creating Hoax Emails for gathering a huge list of email IDs. For example, a spammer sends a hoax email which says “Forward this Message to Help Severely Burned Child”. This email claims that 11 cents will be donated to the child’s family every time the message is sent to others. Most of the people believe this and start forwarding this hoax email to all of the IDs in their contact list. In this way the email spreads rapidly and eventually when it reaches the creator (spammer), the spammer gets a huge list of valid email addresses in the email header. When you get these kind of hoax emails, you can see for yourself in the email header which contains a huge list of email addresses of all those people to whom the email is being forwarded to. This is one of the effective methods used by spammers to gather email addresses.&lt;br /&gt;&lt;br /&gt;Is SPAMming legal?&lt;br /&gt;&lt;br /&gt;Spamming is completely illegal. Yet it is really difficult to stop spammers from spamming since they keep moving from one hosting company to another after getting banned. This makes it practically impossible to catch spammers and prosecute them.&lt;br /&gt;&lt;br /&gt;How to protect my email account from getting SPAMmed?&lt;br /&gt;&lt;br /&gt;The following methods can be used to combat email spam.&lt;br /&gt;&lt;br /&gt;1. Use spam filters for your email account. If you’re using email services like Gmail, Yahoo, Hotmail etc. then spam filters are used by defaut. Each spam filter has it’s algorithm to detect spam emails and will automatically move them to SPAM folder. This keeps your inbox free from spam. However some spam emails become successful to make their way into the inbox by successfully bypassing the filters.&lt;br /&gt;&lt;br /&gt;2. Do not post your email address in public forums, user comments and chat-rooms. Give your email address only to trustworthy websites while signing up for newsletters.&lt;br /&gt;&lt;br /&gt;3. While taking up online surveys and filling up feedback forms, it is better not to give your personal email address. Instead singup for a dummy email account and use this for surveys and feedback forms.&lt;br /&gt;&lt;br /&gt;4. While posting your contact email address on your website use this format: emailaddress [at] yoursite.com instead of emailaddress@yoursite.com. This protects your email address from being indexed by spambots.&lt;br /&gt;&lt;br /&gt;5. Do not respond to hoax messages. When you receive a hoax email, avoid forwarding it to your friends. Examples of hoax messages can be found at www.hoax-slayer.com. If you really want to forward it to your friends, make sure that you use “Bcc” (blind certified copy) option to send the email. This will hide all the email IDs to which the mail is forwarded to.</description><link>http://hacktipsntricks.blogspot.com/2009/11/how-to-protect-email-account-from-spam.html</link><author>noreply@blogger.com (Akash)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2540232851354336606.post-3004985845101803851</guid><pubDate>Thu, 19 Nov 2009 09:06:00 +0000</pubDate><atom:updated>2009-11-19T14:40:33.487+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">email</category><category domain="http://www.blogger.com/atom/ns#">email from gamil</category><category domain="http://www.blogger.com/atom/ns#">fake gmail</category><category domain="http://www.blogger.com/atom/ns#">gmail</category><category domain="http://www.blogger.com/atom/ns#">hack gmail</category><category domain="http://www.blogger.com/atom/ns#">multiple account on gmail</category><title>Use Gmail Account to Send Emails from Multiple Addresses</title><description>In this post you can learn how to use your Gmail account to send and receive emails from multiple addresses. Most of us own more than one email account say for example, one from Gmail, one from Yahoo and one from Hotmail. If you are tired of logging into multiple accounts to check your inbox or to send emails, I have a solution here.&lt;br /&gt;&lt;br /&gt;Gmail has an option to integrate multiple email accounts (email addresses) into a single Gmail account. Once you integrate multiple email addresses into your Gmail account, you can use the same account to send emails from different addresses and receive emails for different addresses. Let’s take a simple example&lt;br /&gt;&lt;br /&gt;Suppose you have three email addresses (email accounts)&lt;br /&gt;&lt;br /&gt;1. hacking@gmail.com&lt;br /&gt;&lt;br /&gt;2. hacking@yahoo.com&lt;br /&gt;&lt;br /&gt;3. hacker@hotmail.com&lt;br /&gt;&lt;br /&gt;You can integrate the emails hacking@yahoo.com and hacker@hotmail.com to hacking@gmail.com and operate all the three accounts from your single gmail account. Here is a step-by-step procedure to do this.&lt;br /&gt;&lt;br /&gt;1. Login to your gmail account.&lt;br /&gt;&lt;br /&gt;2. Click on Settings at the top right corner.&lt;br /&gt;&lt;br /&gt;3. Under Settings, click on Accounts tab.&lt;br /&gt;&lt;br /&gt;4. Now you’ll see the first option “Send mail as:“&lt;br /&gt;&lt;br /&gt;5. Under this option, click on Add another email address you own&lt;br /&gt;&lt;br /&gt;6. Now a small new window will pop-up asking you to enter the details of your new email address.&lt;br /&gt;&lt;br /&gt;7. Here you can enter any name and any email address. The email address need not belong to gmail only. You can enter your yahoo, hotmail or any other valid email address.&lt;br /&gt;&lt;br /&gt;8. A Verification email will be sent to the address that you specify. Once you verify that you own the email address, it will be integrated to your Gmail account.&lt;br /&gt;&lt;br /&gt;Now when you compose a new email, you’ll see an option to select from multiple address to send the mail. Also you’ll receive the incoming mails for multiple addresses to a single mailbox. I hope this will benefit you.&lt;br /&gt;&lt;br /&gt;Before you leave, note this, according to Gmail privacy policy, they will not send the user’s IP address in the outgoing emails. That means when you send an email from your Gmail account , the receiver will not be able to find out your IP address. But you don’t have this advantage in Yahoo or other email providers.</description><link>http://hacktipsntricks.blogspot.com/2009/11/use-gmail-account-to-send-emails-from.html</link><author>noreply@blogger.com (Akash)</author><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2540232851354336606.post-3976785467848721331</guid><pubDate>Thu, 19 Nov 2009 09:00:00 +0000</pubDate><atom:updated>2009-11-19T14:33:12.846+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">autorun virus</category><category domain="http://www.blogger.com/atom/ns#">block usb</category><category domain="http://www.blogger.com/atom/ns#">block usb ports using virus</category><category domain="http://www.blogger.com/atom/ns#">disable usb</category><category domain="http://www.blogger.com/atom/ns#">disable usb ports using virus</category><title>A Virus Program to Disable USB Ports</title><description>This post will show you how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual use C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.&lt;br /&gt;&lt;br /&gt;Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll will not be able to use your pen drive or any other USB peripheral on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.&lt;br /&gt;&lt;br /&gt;1. Download the &lt;a href=&quot;http://www.gohacking.com/downloads/source_codes/USB_Block.rar&quot;&gt;USB_Block.rar&lt;/a&gt; file on to your computer.&lt;br /&gt;&lt;br /&gt;2. It contains the following 4 files.&lt;br /&gt;&lt;br /&gt;    * block_usb.c (source code)&lt;br /&gt;    * unblock_usb.c (source code)&lt;br /&gt;&lt;br /&gt;3. You need to compile them before you can run it. A step-by-step procedure to compile C programs is given in previous post - How to Compile C Programs.&lt;br /&gt;&lt;br /&gt;3. Upon compilation of block_usb.c you get block_usb.exe which is a simple virus that will block (disable) all the USB ports on the computer upon execution (double click).&lt;br /&gt;&lt;br /&gt;4. To test this virus, just run the block_usb.exe file and insert a USB pen drive (thumb drive). Now you can see that your pen drive will never get detected. To re-enable the USB ports just run the unblock_usb.exe  (you need to compile unblock_usb.c) file. Now insert the pen drive and it should get detected.&lt;br /&gt;&lt;br /&gt;5. You can also change the icon of this file to make it look like a legitimate program. For more details on this refer the previous post – How to Change the ICON of an EXE file (This step is also optional).</description><link>http://hacktipsntricks.blogspot.com/2009/11/virus-program-to-disable-usb-ports.html</link><author>noreply@blogger.com (Akash)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2540232851354336606.post-8387463742168129113</guid><pubDate>Thu, 19 Nov 2009 08:49:00 +0000</pubDate><atom:updated>2009-11-19T14:29:25.043+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">binders</category><category domain="http://www.blogger.com/atom/ns#">change icon of exe</category><category domain="http://www.blogger.com/atom/ns#">exe</category><category domain="http://www.blogger.com/atom/ns#">exe to icon</category><category domain="http://www.blogger.com/atom/ns#">icon</category><category domain="http://www.blogger.com/atom/ns#">icon changer</category><category domain="http://www.blogger.com/atom/ns#">icon to exe</category><title>How to Change the ICON of an EXE file</title><description>Some times it becomes necessary to change the ICON of an executable(.exe) file so that the exe file get’s a new appearence.Many of the Tools such as TuneUP Winstyler does this job by adjusting the Windows to display a custom icon to the user.But in reality when the file is carried to a different computer, then it shows it’s original ICON itself.This means that inorder to permanantly change the ICON, it is necessary to modify the executable file and embed the ICON inside the file itself.Now when this is done the exe file’s ICON is changed permanantly so that even if you take file to a different computer it show’s a new icon.&lt;br /&gt;&lt;br /&gt;For this purpose here is a nice tool which modifies the exe file and will embed the ICON of your choice into the file itself. ie:The tool changes the exe ICON permanantly.&lt;br /&gt;&lt;br /&gt;I’ll give you a step-by-step instruction on how to use this tool to change the icon.&lt;br /&gt;&lt;br /&gt;1. Goto &lt;a href=&quot;www.shelllabs.com&quot;&gt;Shelllabs.com&lt;/a&gt; and download the trial version of Icon Changer and install it (Works on both XP and Vista).&lt;br /&gt;&lt;br /&gt;2. Right-click on the exe file whose ICON is to be changed.&lt;br /&gt;&lt;br /&gt;3. Now you will see the option Change Icon…Click on that option.&lt;br /&gt;&lt;br /&gt;4. Now the Icon Changer program will open up.&lt;br /&gt;&lt;br /&gt;5. Icon changer will search for all the ICONS on your system so that you can select any one of those.&lt;br /&gt;&lt;br /&gt;6. Now select the ICON of your choice and click on SET.&lt;br /&gt;&lt;br /&gt;7. Now a popup window will appear and ask you to select from either of these two options.&lt;br /&gt;&lt;br /&gt;    * Change embeded icon.&lt;br /&gt;    * Adjust Windows to display custom icon.&lt;br /&gt;&lt;br /&gt;Select the first option (Change embeded icon).&lt;br /&gt;&lt;br /&gt;8. You are done.The ICON get’s changed.</description><link>http://hacktipsntricks.blogspot.com/2009/11/how-to-change-icon-of-exe-file.html</link><author>noreply@blogger.com (Akash)</author><thr:total>5</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2540232851354336606.post-7957161015515277244</guid><pubDate>Thu, 19 Nov 2009 08:37:00 +0000</pubDate><atom:updated>2009-11-19T14:11:26.691+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">autorun virus</category><category domain="http://www.blogger.com/atom/ns#">c programming</category><category domain="http://www.blogger.com/atom/ns#">c++</category><category domain="http://www.blogger.com/atom/ns#">care</category><category domain="http://www.blogger.com/atom/ns#">create virus in c</category><category domain="http://www.blogger.com/atom/ns#">create virus using c program</category><title>How to Compile C Programs</title><description>If you’re new to C programming and find it difficult to compile the C source codes then this post is for you. Here is a step-by-step procedure to install Borland C++ compiler 5.5 and compile C programs.&lt;br /&gt;How to install Borland C++ compiler&lt;br /&gt;&lt;br /&gt;1. Download Borland C++ compiler 5.5 (for Windows platform) from the following link.&lt;br /&gt;&lt;br /&gt;Click Here &gt;&gt; &lt;a href=&quot;http://www.codegear.com/downloads/free/cppbuilder&quot;&gt;CodeGear&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;2. After you download, run freecommandlinetools.exe. The default installation path would be&lt;br /&gt;&lt;br /&gt;C:\Borland\BCC55&lt;br /&gt;How to configure Borland C++ compiler&lt;br /&gt;&lt;br /&gt;1. After you install Borland C++ compier, create two new Text Documents&lt;br /&gt;&lt;br /&gt;2. Open the first New Text Document.txt file and add the following two lines into it&lt;br /&gt;&lt;br /&gt;-I”c:\Borland\Bcc55\include”&lt;br /&gt;&lt;br /&gt;-L”c:\Borland\Bcc55\lib”&lt;br /&gt;&lt;br /&gt;Save changes and close the file. Now rename the file from New Text Document.txt to bcc32.cfg.&lt;br /&gt;&lt;br /&gt;3. Open the second New Text Document (2).txt file and add the following line into it&lt;br /&gt;&lt;br /&gt;-L”c:\Borland\Bcc55\lib”&lt;br /&gt;&lt;br /&gt;Save changes and close the file. Now rename the file from New Text Document (2).txt to ilink32.cfg.&lt;br /&gt;&lt;br /&gt;4. Now copy the two files bcc32.cfg and ilink32.cfg, navigate to C:\Borland\BCC55\Bin and paste them.&lt;br /&gt;How to compile the C source code (.C files)&lt;br /&gt;&lt;br /&gt;1. You need to place the .C (example.c) file to be compiled in the following location&lt;br /&gt;&lt;br /&gt;C:\Borland\BCC55\Bin&lt;br /&gt;&lt;br /&gt;2. Now goto command prompt (Start-&gt;Run-&gt;type cmd-&gt;Enter)&lt;br /&gt;&lt;br /&gt;3. Make the following path as the present working directory (use CD command)&lt;br /&gt;&lt;br /&gt;C:\Borland\BCC55\Bin&lt;br /&gt;&lt;br /&gt;4. To compile the file (example.c) use the following command&lt;br /&gt;&lt;br /&gt;bcc32 example.c&lt;br /&gt;&lt;br /&gt;5. Now if there exists no error in the source code you’ll get an executable file (example.exe) in the same location (C:\Borland\BCC55\Bin).&lt;br /&gt;&lt;br /&gt;6. Now you have successfully compiled the source code into an executable file(.exe file). &lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;NOTE: The above tutorial assumes that you’ve installed the compiler onto the C: drive (by default).&lt;/span&gt;</description><link>http://hacktipsntricks.blogspot.com/2009/11/how-to-compile-c-programs.html</link><author>noreply@blogger.com (Akash)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2540232851354336606.post-802962256226169352</guid><pubDate>Thu, 12 Nov 2009 06:00:00 +0000</pubDate><atom:updated>2009-11-12T11:40:03.256+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">genuine os</category><category domain="http://www.blogger.com/atom/ns#">make xp genuine</category><category domain="http://www.blogger.com/atom/ns#">win xp</category><category domain="http://www.blogger.com/atom/ns#">xp</category><category domain="http://www.blogger.com/atom/ns#">xp genuine</category><category domain="http://www.blogger.com/atom/ns#">xp os genuine</category><title>Make Windows Xp Genuine Forever</title><description>The most popular way? to make your Os genuine is to hunt up Genuine Operating system Product keys.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Note:Genuine keys can only be used once.If they are used on different computers having same Operating system they become non-genuine.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Note:All the steps below are to be followed using Internet explorer otherwise they wont work.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Step 1: Confirm your windows XP is Genuine or not ? by Clicking on the link below:&lt;br /&gt;&lt;a href=&quot;http://www.microsoft.com/genuine/default.aspx?displaylang=en&quot;&gt;Go to Microsoft.com to validate&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Step 2: On the right hand side you will find two options named “Validate Windows” and “Validate Office” Click on validate windows.&lt;br /&gt;&lt;br /&gt;Step 3: You will find a pop up which will state”Did you notice the information Bar”Just tick mark the don’t show this message again box and click on Ok.&lt;br /&gt;&lt;br /&gt;Step 4: On the top of your browser you will see the information bar where you will find the following text written”This site might require following ActiveX control…….”Click on the information bar and then click on install ActiveX control.&lt;br /&gt;&lt;br /&gt;Step 5: Another pop up box will appear asking you whether you want to install this software.Click on Install.&lt;br /&gt;&lt;br /&gt;Step 7:Now it will tell you that you are a victim of software counterfeit,this means that your copy is pirated.If it doesn’t then your windows copy is already genuine.&lt;br /&gt;&lt;br /&gt;1 simple step to make it genuine.&lt;br /&gt;&lt;br /&gt;Download this file from rapidshare.It makes minute changes in the registry so that your windows xp becomes genuine.&lt;br /&gt;&lt;br /&gt;Here is the Link: &lt;a href=&quot;http://rapidshare.com/files/115057416/GENUINE.reg.html&quot;&gt;Download the Registry File&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Run the file. It will ask you for a confirmation regarding whether you want to run it or not.Click on yes.&lt;br /&gt;&lt;br /&gt;Now try all as told to you i.e about how to validate your XP. After validating it will surely not tell you that your copy of XP is pirated. It’s will work and make it Genuine for you.&lt;br /&gt;&lt;br /&gt;Try installing Wmp 11,Ie 7 or 8…..trying updating your XP !!! It&#39;s gonna work...&lt;br /&gt;&lt;br /&gt;You have now got a Genuine xp.</description><link>http://hacktipsntricks.blogspot.com/2009/11/make-windows-xp-genuine-forever.html</link><author>noreply@blogger.com (Akash)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2540232851354336606.post-3442897960688013195</guid><pubDate>Mon, 09 Nov 2009 13:36:00 +0000</pubDate><atom:updated>2009-11-09T19:40:49.110+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">care</category><category domain="http://www.blogger.com/atom/ns#">customer</category><category domain="http://www.blogger.com/atom/ns#">customer care</category><category domain="http://www.blogger.com/atom/ns#">emergency numbers of india</category><category domain="http://www.blogger.com/atom/ns#">free numbers</category><category domain="http://www.blogger.com/atom/ns#">india emergency numbers</category><category domain="http://www.blogger.com/atom/ns#">indian free numbers</category><category domain="http://www.blogger.com/atom/ns#">numbers</category><category domain="http://www.blogger.com/atom/ns#">service numbers</category><category domain="http://www.blogger.com/atom/ns#">toll free numbers of india</category><category domain="http://www.blogger.com/atom/ns#">tollfree numbers</category><title>India Toll Free Numbers / Customer Care Numbers List</title><description>I received this as an email forward, did not verify the numbers. I am not responsible for any errors in the list!&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Airways&lt;/span&gt;&lt;br /&gt;Indian Airlines – 1800 180 1407&lt;br /&gt;Jet Airways – 1800 22 5522&lt;br /&gt;SpiceJet – 1800 180 3333&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Automobiles&lt;/span&gt;&lt;br /&gt;Mahindra Scorpio – 1800 22 6006&lt;br /&gt;Maruti – 1800 111 515&lt;br /&gt;Tata Motors – 1800 22 5552&lt;br /&gt;Windshield Experts – 1800 11 3636&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Banks&lt;/span&gt;&lt;br /&gt;ABN AMRO – 1800 11 2224&lt;br /&gt;Axis Bank – 1860 425 8888&lt;br /&gt;Canara Bank – 1800 44 6000&lt;br /&gt;Citibank – 1800 44 2265&lt;br /&gt;Corporatin Bank – 1800 443 555&lt;br /&gt;Development Credit Bank – 1800 22 5769&lt;br /&gt;HDFC Bank – 1800 227 227&lt;br /&gt;ICICI Bank – 1800 333 499&lt;br /&gt;ICICI Bank NRI – 1800 22 4848&lt;br /&gt;IDBI Bank – 1800 11 6999&lt;br /&gt;Indian Bank – 1800 425 1400&lt;br /&gt;ING Vysya – 1800 44 9900&lt;br /&gt;Kotak Mahindra Bank – 1800 22 6022&lt;br /&gt;Lord Krishna Bank – 1800 11 2300&lt;br /&gt;Punjab National Bank – 1800 122 222&lt;br /&gt;State Bank of India – 1800 44 1955&lt;br /&gt;Syndicate Bank – 1800 44 6655&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Cell Phones&lt;/span&gt;&lt;br /&gt;BenQ – 1800 22 08 08&lt;br /&gt;Bird CellPhones – 1800 11 7700&lt;br /&gt;Motorola MotoAssist – 1800 11 1211&lt;br /&gt;Nokia – 3030 3838&lt;br /&gt;Samsung – 1800110011&lt;br /&gt;Sony Ericsson – 3901 1111&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Computers/IT&lt;/span&gt;&lt;br /&gt;Adrenalin – 1800 444 445&lt;br /&gt;AMD – 1800 425 6664&lt;br /&gt;Apple Computers – 1800 444 683&lt;br /&gt;Canon – 1800 333 366&lt;br /&gt;Cisco Systems – 1800 221 777&lt;br /&gt;Compaq – HP – 1800 444 999&lt;br /&gt;Data One Broadband – 1800 424 1800&lt;br /&gt;Dell – 1800 425 9046&lt;br /&gt;Epson – 1800 44 0011&lt;br /&gt;eSys – 3970 0011&lt;br /&gt;Genesis Tally Academy – 1800 444 888&lt;br /&gt;HCL – 1800 180 8080&lt;br /&gt;IBM – 1800 443 333&lt;br /&gt;Lexmark – 1800 22 4477&lt;br /&gt;Marshal’s Point – 1800 33 4488&lt;br /&gt;Microsoft – 1800 111 100&lt;br /&gt;Microsoft Virus Update – 1901 333 334&lt;br /&gt;&lt;br /&gt;Seagate – 1800 180 1104&lt;br /&gt;Symantec – 1800 44 5533&lt;br /&gt;TVS Electronics – 1800 444 566&lt;br /&gt;WeP Peripherals – 1800 44 6446&lt;br /&gt;Wipro – 1800 333 312&lt;br /&gt;xerox – 1800 180 1225&lt;br /&gt;Zenith – 1800 222 004&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Couriers/Packers &amp; Movers&lt;/span&gt;&lt;br /&gt;ABT Courier – 1800 44 8585&lt;br /&gt;AFL Wizz – 1800 22 9696&lt;br /&gt;Agarwal Packers &amp; Movers – 1800 11 4321&lt;br /&gt;Associated Packers P Ltd – 1800 21 4560&lt;br /&gt;DHL – 1800 111 345&lt;br /&gt;FedEx – 1800 22 6161&lt;br /&gt;Goel Packers &amp; Movers – 1800 11 3456&lt;br /&gt;UPS – 1800 22 7171&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Education&lt;/span&gt;&lt;br /&gt;Edu Plus – 1800 444 000&lt;br /&gt;Hindustan College – 1800 33 4438&lt;br /&gt;NCERT – 1800 11 1265&lt;br /&gt;Vellore Institute of Technology – 1800 441 555&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Healthcare&lt;/span&gt;&lt;br /&gt;Best on Health – 1800 11 8899&lt;br /&gt;Dr Batras – 1800 11 6767&lt;br /&gt;GlaxoSmithKline – 1800 22 8797&lt;br /&gt;Johnson &amp; Johnson – 1800 22 8111&lt;br /&gt;Kaya Skin Clinic – 1800 22 5292&lt;br /&gt;LifeCell – 1800 44 5323&lt;br /&gt;&lt;br /&gt;Manmar Technologies – 1800 33 4420&lt;br /&gt;Pfizer – 1800 442 442&lt;br /&gt;Roche Accu-Chek – 1800 11 45 46&lt;br /&gt;Rudraksha – 1800 21 4708&lt;br /&gt;Varilux Lenses – 1800 44 8383&lt;br /&gt;VLCC – 1800 33 1262&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Home Appliances&lt;/span&gt;&lt;br /&gt;Aiwa/Sony – 1800 11 1188&lt;br /&gt;Anchor Switches – 1800 22 7979&lt;br /&gt;Blue Star – 1800 22 2200&lt;br /&gt;Bose Audio – 1800 11 2673&lt;br /&gt;Bru Coffee Vending Machines – 1800 44 7171&lt;br /&gt;Daikin Air Conditioners – 1800 444 222&lt;br /&gt;DishTV – 1800 12 3474&lt;br /&gt;Faber Chimneys – 1800 21 4595&lt;br /&gt;Godrej – 1800 22 5511&lt;br /&gt;Grundfos Pumps – 1800 33 4555&lt;br /&gt;&lt;br /&gt;LG – 1901 180 9999&lt;br /&gt;Philips – 1800 22 4422&lt;br /&gt;Samsung – 1800 113 444&lt;br /&gt;Sanyo – 1800 11 0101&lt;br /&gt;Voltas – 1800 33 4546&lt;br /&gt;WorldSpace Satellite Radio – 1800 44 5432&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Hotel Reservations&lt;/span&gt;&lt;br /&gt;GRT Grand – 1800 44 5500&lt;br /&gt;InterContinental Hotels Group – 1800 111 000&lt;br /&gt;Marriott – 1800 22 0044&lt;br /&gt;Sarovar Park Plaza – 1800 111 222&lt;br /&gt;Taj Holidays – 1800 111 825&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Insurance&lt;/span&gt;&lt;br /&gt;AMP Sanmar – 1800 44 2200&lt;br /&gt;Aviva – 1800 33 2244&lt;br /&gt;Bajaj Allianz – 1800 22 5858&lt;br /&gt;Chola MS General Insurance – 1800 44 5544&lt;br /&gt;HDFC Standard Life – 1800 227 227&lt;br /&gt;LIC – 1800 33 4433&lt;br /&gt;Max New York Life – 1800 33 5577&lt;br /&gt;Royal Sundaram – 1800 33 8899&lt;br /&gt;SBI Life Insurance – 1800 22 9090&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Mattresses&lt;/span&gt;&lt;br /&gt;Kurl-on – 1800 44 0404&lt;br /&gt;Sleepwell – 1800 11 2266&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Investments/Finance&lt;/span&gt;&lt;br /&gt;CAMS – 1800 44 2267&lt;br /&gt;Chola Mutual Fund – 1800 22 2300&lt;br /&gt;Easy IPO’s – 3030 5757&lt;br /&gt;Fidelity Investments – 1800 180 8000&lt;br /&gt;Franklin Templeton Fund – 1800 425 4255&lt;br /&gt;J M Morgan Stanley – 1800 22 0004&lt;br /&gt;Kotak Mutual Fund – 1800 222 626&lt;br /&gt;LIC Housing Finance – 1800 44 0005&lt;br /&gt;SBI Mutual Fund – 1800 22 3040&lt;br /&gt;Sharekhan – 1800 22 7500&lt;br /&gt;Tata Mutual Fund – 1800 22 0101&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Paints&lt;/span&gt;&lt;br /&gt;Asian Paints Home Solutions – 1800 22 5678&lt;br /&gt;Berger Paints Home Decor – 1800 33 8800&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Teleshopping&lt;/span&gt;&lt;br /&gt;Asian Sky Shop – 1800 22 1800&lt;br /&gt;Jaipan Teleshoppe – 1800 11 5225&lt;br /&gt;Tele Brands – 1800 11 8000&lt;br /&gt;VMI Teleshopping – 1800 447 777&lt;br /&gt;WWS Teleshopping – 1800 220 777&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Travel&lt;/span&gt;&lt;br /&gt;Club Mahindra Holidays – 1800 33 4539&lt;br /&gt;Cox &amp; Kings – 1800 22 1235&lt;br /&gt;God TV Tours – 1800 442 777&lt;br /&gt;Kerala Tourism – 1800 444 747&lt;br /&gt;Kumarakom Lake Resort – 1800 44 5030&lt;br /&gt;Raj Travels &amp; Tours – 1800 22 9900&lt;br /&gt;Sita Tours – 1800 111 911&lt;br /&gt;SOTC Tours – 1800 22 3344&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;UPS&lt;/span&gt;&lt;br /&gt;APC – 1800 44 4272&lt;br /&gt;Numeric – 1800 44 3266&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;Others&lt;/span&gt;&lt;br /&gt;Consumer Helpline – 1800 11 4000&lt;br /&gt;L’Or?al, GARNIeR – 1800 223 000&lt;br /&gt;KONE Elevator – 1800 444 666&lt;br /&gt;Indane – 1800 44 51 15&lt;br /&gt;Aavin – 1800 44 3300&lt;br /&gt;Pedigree – 1800 11 2121&lt;br /&gt;Kodak India – 1800 22 8877&lt;br /&gt;Domino’s Pizza – 1800 111 123&lt;br /&gt;World Vision India – 1800 444 550&lt;br /&gt;Telecom Monitoring Cell – 1800 110 420&lt;br /&gt;&lt;br /&gt;Did these numbers work for you? Let me know in comments page. BTW, updated the numbers from 1600* to 1800*</description><link>http://hacktipsntricks.blogspot.com/2009/11/india-toll-free-numbers-customer-care.html</link><author>noreply@blogger.com (Akash)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-2540232851354336606.post-4212950453501046238</guid><pubDate>Mon, 09 Nov 2009 13:33:00 +0000</pubDate><atom:updated>2009-11-09T20:56:13.466+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">download hack</category><category domain="http://www.blogger.com/atom/ns#">hack megaupload</category><category domain="http://www.blogger.com/atom/ns#">hack megaupload to download</category><category domain="http://www.blogger.com/atom/ns#">megaupload</category><category domain="http://www.blogger.com/atom/ns#">megaupload download</category><category domain="http://www.blogger.com/atom/ns#">trick for megaupload</category><title>Megaupload Trick - download without countdown or captchas</title><description>If you want to download from Megaupload without captchas or countdown timers, here is a trick worth trying out. It helps to convert megaupload links into direct download links.&lt;br /&gt;Megaupload Direct Download Link Generator&lt;br /&gt;&lt;br /&gt;If you are having a download link from megaupload like&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;http://www.megaupload.com/?d=GVOMXHQ2&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;then convert it to&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight:bold;&quot;&gt;http://www.megaupload.com/mgr_dl.php?d=GVOMXHQ2&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;That is, just replace &lt;span style=&quot;font-weight:bold;&quot;&gt;“/?”&lt;/span&gt; of the original download URL with &lt;span style=&quot;font-weight:bold;&quot;&gt;&quot;/mgr_dl.php?&quot;&lt;/span&gt; just after the &lt;span style=&quot;font-weight:bold;&quot;&gt;&quot;.com/&quot;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;You can place this direct link in download managers for immediate downloads from megaupload.&lt;br /&gt;&lt;br /&gt;No Coundown&lt;br /&gt;&lt;br /&gt;No Captchas&lt;br /&gt;&lt;br /&gt;Maximum Speed</description><link>http://hacktipsntricks.blogspot.com/2009/11/megaupload-trick-download-without.html</link><author>noreply@blogger.com (Akash)</author><thr:total>2</thr:total></item></channel></rss>