XP hacking,windows Tips,windows hacking,Windows tips,Dos hacking, Wireless Hacking, Piratsbay,isohunt,DVD movies,Wwe, Google,Microsoft,Mac,Linux,Open source, Firefox,Internet explorer, Safari, Opera, Google crome,
Mar 31, 2011
Mar 29, 2011
How to Use Windows 7 Without Activation
Most of you might be aware of the fact that it is possible to use Windows 7 and Vista for 120 days without activation. This is actually possible using the slmgr -rearm command which will extend the grace period from 30 days to 120 days. However in this post I will show you a small trick using which it is possible to use Windows 7 without activation for approximately an year! Here is a way to do that.
1. Goto “Start Menu -> All Programs -> Accessories” . Right click on “Command Prompt” and select “Run as Administrator“. If you are not the administrator then you are prompted to enter the password, or else you can proceed to step-2.
2. Now type the following command and hit enter
slmgr -rearm
3. You will be prompted to restart the computer. Once restarted the trial period will be once again reset to 30 days. You can use the above command for up to 3 times by which you can extend the trial period to 120 days without activation.
4. Now comes the actual trick by which you can extend the trial period for another 240 days. Open Registry Editor (type regedit in “Run” and hit Enter) and navigate to the following location
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform
5. In right-side pane, change value of SkipRearm to 1.
6. Now you will be able to use the slmgr -rearm command for another 8 times so that you can skip activation process for another 240 days. So you will get 120 + 240 = 360 days of free Windows 7 usage.
120 days using “slmgr -rearm” command before registry edit +
240 days using “slmgr -rearm” command after registry edit
= 360 Days
240 days using “slmgr -rearm” command after registry edit
= 360 Days
Mar 27, 2011
How to Detect Anonymous IP Addresses
As the fraudsters are now becoming more sophisticated in bypassing the Geo-location controls by using proxies (Anonymous IPs) to spoof their IP address, it has become very much necessary to come up with a means for detecting the proxies so that the authenticity of the users can be verified. Using a proxy (web proxy) is the simplest and easiest way to conceal the IP address of an Internet user and maintain the online privacy. However proxies are more widely used by online fraudsters to engage in cyber crimes since it is the easiest way to hide their actual Geo-location such as city/country through a spoofed IP address. Following are some of the examples where fraudsters use the proxies to hide their actual IP.
1. Credit Card Frauds
For example, say a Nigerian fraudster tries to purchase goods online with a stolen credit card for which the billing address is associated with New York. Most credit card merchants use Geo-location to block orders from countries like Nigeria and other high risk countries. So in order to bypass this restriction the credit card fraudster uses a proxy to spoof his IP address so that it appears to have come from New York. The IP address location appears to be legitimate since it is in the same city as the billing address. A proxy check would be needed to flag this order.
2. Bypass Website Country Restrictions
Some website services are restricted to users form only a selected list of countries. For example, a paid survey may be restricted only to countries like United States and Canada. So a user from say China may use a proxy so as to make his IP appear to have come from U.S. so that he can earn from participating in the paid survey.
Proxy Detection Services
So in order to stop such online frauds, Proxy Detection has become a critical component. Today most companies, credit card merchants and websites that deal with e-commerce transactions make use of Proxy Detection Services like MaxMind and FraudLabs to detect the usage of proxy or spoofed IP from users participating online.
Proxy Detection web services allow instant detection of anonymous IP addresses. Even though the use of proxy address by users is not a direct indication of fraudulent behaviour, it can often indicate the intention of the user to hide his or her real IP. In fact, some of the most used ISPs like AOL and MSN are forms of proxies and are used by both good and bad consumers.
How Proxy Detection Works?
Proxy detection services often rely on IP addresses to determine whether or not the IP is a proxy. Merchants can obtain the IP address of the users from the HTTP header on the order that comes into their website. This IP address is sent to the proxy detecting service in real time to confirm it’s authenticity.
The proxy detection services on the other hand compare this IP against a known list of flagged IPs that belong to proxy services. If the IP is not on the list then it is authenticated and the confirmation is sent back to the merchant. Otherwise it is reported to be a suspected proxy. These proxy detection services work continuously to grab a list or range of IPs that are commonly used for proxy services. With this it is possible to tell whether or not a given IP address is a proxy or spoofed IP.
How to Tell Whether a given IP is Real or a Proxy?
There are a few free sites that help you determine whether or not a given IP is a proxy. You can use free services like WhatisMyIPAddress to detect proxy IPs. Just enter the suspected IP in the field and click on “Lookup IP Address” button to check the IP address. If it is a suspected proxy then you will see the results something as follows.
So for all those who think that they can escape by using a spoofed IP, this post is the answer. I hope this information helps. Pass your comments.
Mar 26, 2011
Rajdeep is waiting on Brijj.com to network with you
| ||||||||||||||||||||||||||||||||||||||
To stop receiving reminders for invitation requests recieved, click Brijj.com. |
Mar 25, 2011
How Antivirus Software Works
Due to ever increasing threat from virus and other malicious programs, almost every computer today comes with a pre-installed antivirus software on it. In fact, an antivirus has become one of the most essential software package for every computer. Even though every one of us have an antivirus software installed on our computers, only a few really bother to understand how it actually works! Well if you are one among those few who would really bother to understand how an antivirus works, then this article is for you.
How Antivirus Works
An antivirus software typically uses a variety of strategies in detecting and removing viruses, worms and other malware programs. The following are the two most widely employed identification methods:
1. Signature-based dectection (Dictionary approach)
This is the most commonly employed method which involves searching for known patterns of virus within a given file. Every antivirus software will have a dictionary of sample malware codes called signatures in it’s database. Whenever a file is examined, the antivirus refers to the dictionary of sample codes present within it’s database and compares the same with the current file. If the piece of code within the file matches with the one in it’s dictionary then it is flagged and proper action is taken immediately so as to stop the virus from further replicating. The antivirus may choose to repair the file, quarantine or delete it permanently based on it’s potential risk.
As new viruses and malwares are created and released every day, this method of detection cannot defend against new malwares unless their samples are collected and signatures are released by the antivirus software company. Some companies may also encourage the users to upload new viruses or variants, so that the virus can be analyzed and the signature can be added to the dictionary.
Signature based detection can be very effective, but requires frequent updates of the virus signature dictionary. Hence the users must update their antivirus software on a regular basis so as to defend against new threats that are released daily.
2. Heuristic-based detection (Suspicious behaviour approach)
Heuristic-based detection involves identifying suspicious behaviour from any given program which might indicate a potential risk. This approach is used by some of the sophisticated antivirus softwares to identify new malware and variants of known malware. Unlike the signature based approach, here the antivirus doesn’t attempt to identify known viruses, but instead monitors the behavior of all programs.
For example, malicious behaviours like a program trying to write data to an executable program is flagged and the user is alerted about this action. This method of detection gives an additional level of security from unidentified threats.
File emulation: This is another type of heuristic-based approach where a given program is executed in a virtual environment and the actions performed by it are logged. Based on the actions logged, the antivirus software can determine if the program is malicious or not and carry out necessary actions in order to clean the infection.
Most commercial antivirus softwares use a combination of both signature-based and heuristic-based approaches to combat malware.
Issues of concern
Zero-day threats: A zero-day (zero-hour ) threat or attack is where a malware tries to exploit computer application vulnerabilities that are yet unidentified by the antivirus software companies. These attacks are used to cause damage to the computer even before they are identified. Since patches are not yet released for these kind of new threats, they can easily manage to bypass the antivirus software and carry out malicious actions. However most of the threats are identified after a day or two of it’s release, but damage caused by them before identification is quite inevitable.
Daily Updates: Since new viruses and threats are released everyday, it is most essential to update the antivirus software so as to keep the virus definitions up-to-date. Most softwares will have an auto-update feature so that the virus definitions are updated whenever the computer is connected to the Internet.
Effectiveness: Even though an antivirus software can catch almost every malware, it is still not 100% foolproof against all kinds of threats. As explained earlier, a zero-day threat can easily bypass the protective shield of the antivirus software. Also virus authors have tried to stay a step ahead by writing “oligomorphic“, “polymorphic” and, more recently, “metamorphic” virus codes, which will encrypt parts of themselves or otherwise modify themselves as a method of disguise, so as to not match virus signatures in the dictionary.
Thus user education is as important as antivirus software; users must be trained to practice safe surfing habits such as downloading files only from trusted websites and not blindly executing a program that is unknown or obtained from an untrusted source. I hope this article will help you understand the working of an antivirus software.
Mar 20, 2011
How to Write-Protect Your USB Flash Drive
How to Write-Protect USB Flash Drive
Many a time, it becomes necessary for us to write protect our USB flash drive so as to protect it from viruses and other malware programs. Because flash drives are so popular and most widely used to move data between computers, they are the prime target for attackers as a means to get infections spread around the computer world. Also, since USB drive is not a Read-Only Memory (ROM), the data inside it can easily be modified or deleted by malware programs.
But unfortunately, most of the new flash drives do not come with a write-protect feature as the manufacturers wish to cut down the cost of production. Hence, the only way to write-protect your USB flash drives is to enable this feature on your own computer.
This can be done by adding a small entry to the Windows registry which acts as a switch that can be enabled to make use of the write protection or disabled to allow write access. Just follow these steps:
1. Open the Registry Editor (Open the “Run” dialog box, type regedit and hit “Enter”).
2. Navigate to the following Registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\
3. Create a New Key named as StorageDevicePolicies. To do this right-click on Control, and click on New->Key and name it as StorageDevicePolicies.
4. Now right-click on StorageDevicePolicies and create a New->DWORD (32-bit) Value and name it as WriteProtect.
5. Double-click on WriteProtect and set the Value data to 1.
Now the right-protection for USB drives is enabled on your computer (no restart required) and thus it would not be possible for anyone or any program to add/delete the contents from your USB flash drive. Any attempt to copy or download the files onto the USB drive will result in the following error message being displayed.
To revert and remove the write-protection, all you need to do is just change the Value data for WriteProtect (Step-5) from 1 back to 0. Now write access to all the USB devices is re-enabled.
Sometimes it may seem difficult to remember and follow the above mentioned steps each time you want to enable/disable the write protection. Hence as an alternative way, there are many tools available to automatically enable/disable the write-protection feature. One of my favorite tool is USB Write Protect by Naresh Manadhar. Using this tool you can limit write access to your USB drives with just a click of a button. You can download this tool from the following link:
MTV Roadies 8 fake truth of Suraj aka Nagesh
You’ve got to be blind to not want to look beyond what you see on Roadies 8, and if you’re not curious, then Nagesh P. Mithun aka Suraj will make you so senti awwwwww. Okay to start with. Snapshot of the real Suraj from MTV Roadies 8.
Suraj aka Nagesh of MTV Roadies 8 has been a student of the Indian Institute of Bartending. If this listing of Nagesh from MTV Roadies 8 in the students profile isn’t enough, then nothing will be. We’ve just resized the image but please feel free to check http://www.iibtindia.com/placement.html
Suraj from MTV Roadies 8 boasts of the 9th student profile that’s featured on the institute website. If you look closely, Nagesh from MTV Roadies 8 has his eyebrow pierced and is quite a happening dude from Jalna, and quite hep for being broke.
That’s not all. Appears Suraj of MTV Roadies 8 is successful at bartending. Suraj of MTV Roadies 8. successfully enthralled students at the Bartending Seminar & Workshop held on Tuesday 27th July, 2010 for students of Merit Swiss Asian School of Hotel Management.
Common sense in the Suraj aka Nagesh P. Mithun from MTV Roadies 8 scenario: In 2010, Suraj from MTV Roadies 8 should have been working in Mumbai as claimed by him. It was the time Suraj aka Nagesh took a train from Jalna to Mumbai and worked as a sweeper. His student profile at http://www.iibtindia.com/placement.html clearly mentions Suraj was working at a call center in Mumbai.
The workshop details we have attained reveal the workshop was held in July 2010. As such, Nagesh obviously did the course before that or during that period, so, Suraj was in Mumbai working at some call center even before 2010. Here’s the actual pdf supporting workshop details.
The most elaborate IIBT course lasts a year and costs Rs. 55, 000 and the shortest one lasts 6 weeks and costs Rs. 9,000. Obviously he wouldn’t be heading a workshop after just 6 weeks, so, we assume Suraj aka Nagesh P. Mithun from MTV Roadies 8. was at IIBT for a year.
Roadies 8 is going to do brilliantly because this guy is so smart. What I would really like to know is whether the bald Raghu and Rajiv, and now seemingly silly Ranvijay, sit together and practice such a dumb script. MTV Roadies must do some homework because your show credibility suffers a blow if contestants are going t fool you so easily, or, I’m guessing all reality shows are scripted. This is your winning card this year but we have unearthed the truth about Suraj aka Nagesh P. Mithun from MTV Roadies 8. For everyone who was taken aback by Suraj’s heart wrenching truth, don’t always believe reality tv, it’s reality tv for a certain reason.
Mar 6, 2011
Subscribe to:
Posts (Atom)
Subscribe via email N get Tips
Label Cloud
2009
(1)
2010
(3)
2011
(1)
2011 IPL Player
(1)
3 IDIOTS
(1)
3G dongle
(1)
Academics
(3)
ACCOUNT
(1)
ACRTICALS
(3)
acta
(1)
Addons
(1)
ADSL Router
(1)
Adzero
(1)
AIRTEL
(14)
Airtel 3G
(1)
airtel Grps
(1)
airtel proxy
(1)
android
(3)
Android Phone
(3)
Android Phone codes
(1)
ANTIVIRUS
(7)
ARP hacking
(1)
BAT
(2)
BHUVAN
(1)
BIOS
(2)
bitcomet
(16)
BITTORRENT
(21)
BLOG
(4)
BLOGGER
(5)
blu ray
(1)
BOLLYWOOD LATEST MOVIES
(4)
BOLLYWOOD MOVIES
(4)
BOOK
(2)
British rapper
(1)
BROADBAND
(4)
BSNL
(7)
BTJunkie
(1)
BTJunkie Shut down
(1)
BTJUNKIES
(17)
Cabana
(1)
calender
(2)
Caller ID
(1)
CAM RIPS
(8)
CAPCHA
(1)
CAT
(1)
CCNA
(6)
CCNP
(1)
CES 2011
(1)
CHAT
(2)
CHATING
(1)
CHATTING
(1)
CHINA
(3)
Christmas
(1)
CID
(1)
CISCO
(8)
CISCO PRESS
(2)
CLONING
(1)
CODE
(5)
COLLECTION
(2)
COMMAND
(2)
CRACK
(26)
crack key
(3)
CRACKSOFTWARE
(11)
CSS
(1)
DAILY MOTION
(1)
Dan Bull
(1)
DAP
(1)
data backup
(1)
data storage
(1)
dekstop
(1)
Delhi 100 Year
(1)
DESI TORRENTS
(20)
DISK
(1)
DIY
(1)
DOCOMO
(2)
Docs
(1)
DOWNLOAD
(13)
DragonBall Browser
(1)
dvd
(1)
DVD Rip
(12)
dvd vs blu ray
(1)
E-mail
(1)
Ebook
(7)
EDUCATION
(3)
ERROR
(3)
ESET
(1)
ET
(4)
EXAM
(8)
EXPLORER
(2)
EXRTA TORRENT
(20)
extratorrent
(10)
FACEBOOK
(8)
facebook hacking
(6)
FACEBOOK TIMELINE
(2)
FACEBOOK Tips
(1)
FAT32
(1)
FILESHARNING
(1)
FIRE FOX
(14)
First Bamboo Smartphone
(1)
FIRST ON NET
(1)
FOLDER
(2)
FORMAT
(1)
Free DNS
(1)
FREE GPRS
(22)
FREE MMS
(12)
FREE SMS
(16)
freesoftware
(6)
FRIST ON NET
(1)
FTP
(1)
full software
(25)
FUNNY
(3)
G.D
(1)
G.D.
(1)
GAME HACKING
(12)
GAME KEYS
(2)
GMAIL
(12)
GMAIL HACKING
(16)
GMAT
(1)
GNS3
(1)
GOOGLE
(53)
GOOGLE CROME
(20)
Google Doodles
(3)
GOOGLE EARTH
(23)
Google Global DNS
(2)
Google Map.
(1)
Google Nexus
(2)
Google Nexus mobile
(2)
Google Open DNS
(2)
google pulgins
(16)
google Search Tips
(7)
google software
(5)
Google Tip
(6)
Google Tricks
(6)
GOOLGE HACK
(35)
GSM
(2)
gsm hack
(1)
GTALK
(7)
GURU OF HACKING
(8)
H
(3)
HA
(1)
HAC
(3)
HACK
(100)
HACKER
(39)
Hackers
(14)
HACKING
(76)
HACKINGTOOLS
(38)
Happy holidays
(1)
Happy holidays 2011
(1)
HARDWARE
(2)
HOLLYWOOD MOVIES
(4)
hotmai
(1)
How To
(1)
how to backup data
(1)
how to store data
(1)
HSTR
(2)
HTML
(1)
HUTCH
(2)
I-PHONE
(4)
I-phone 4
(3)
I-Phone 5
(3)
I-Phone 5 Leak
(2)
I-phone Leak Video
(2)
IDEA
(6)
IDM software
(1)
IE
(8)
IE8
(6)
IE9
(6)
India Delhi
(1)
INFORMATION
(3)
INTERNET
(22)
IP-ADDRESS
(6)
iPhone 3
(1)
iPhone 4s
(1)
iPhone 4s Tariff plan for india
(1)
iPhone 5
(1)
iPhone4
(1)
IPL 2011
(1)
IPL 4 Auction News
(1)
IPL4
(1)
IPLT20 Schedule
(1)
ISOHUNT
(2)
ISP
(2)
IT
(2)
jingle bells
(1)
JOKES
(2)
JTO 2009
(1)
KEY
(4)
KeyBoard
(1)
Keyboard Tips
(1)
Kieron-Scott
(1)
KUTCH
(1)
learning software . Photoshop
(2)
lightroom
(1)
long term data backup
(1)
long term storage
(1)
Lumia 710
(1)
Lumia 800
(1)
MAC
(2)
MAC OS
(1)
Malware
(1)
Mango
(1)
MANGO Mobile OS
(1)
MANGO OS
(2)
MAT
(1)
MBA
(3)
Meego
(1)
MESSENGER
(3)
METACAFE
(1)
MICROSOFT
(7)
Microsoft Onenote
(1)
Microsoft PowerPoint
(3)
MOBILE
(41)
MOBILE CODES
(27)
Mobile Memory Card
(1)
Mobile Repair.
(2)
Mobile Save
(1)
mobile software
(1)
MODEM
(2)
MOTOROLA
(2)
MOUSE
(1)
MOVIES
(5)
MS-DOS
(4)
MS-OFFICE
(3)
MS-OFFICE KEYS
(2)
MSN HACKING
(7)
MSN PASSWORD
(11)
MTV
(2)
MYSPACE
(1)
N-SERIES
(1)
Network
(5)
NETWORKING
(6)
new camera
(1)
New Year
(5)
NEWS
(3)
NOD32
(1)
NOKIA
(10)
Nokia lumia
(1)
Nokia Lumia 800
(1)
Nokia Lumia 820
(1)
Nokia Lumia 900
(1)
Nokia Lumia 920
(1)
Nokia Mango
(2)
Nokia meego
(2)
Nokia N9
(1)
NORTON 360
(1)
NOTEPAD
(1)
NOTIFICATION
(1)
NTFS
(1)
OPERA
(5)
ORKUT
(16)
ORKUT HACKING
(18)
ORKUT VIRUS
(8)
OUTLOOK
(4)
P2P
(10)
PAPER
(1)
PASSWORD
(7)
PC SUITE
(3)
Peer To Peer
(8)
PENDRIVE
(1)
PHILIPS
(1)
PHOTO
(2)
photoshop
(1)
pipa
(1)
Piracy
(13)
PIRATESBAY
(26)
PRINTER
(1)
PROXY SITES
(3)
Ragaa.com
(1)
RAPID HACK
(6)
rapidshare
(1)
Rapper protests piracy
(1)
REGISTRY
(4)
Reset Your Mobile Memory
(1)
RESULTS
(4)
ROADIES
(4)
Roadies 8.0 Raghu Rajiv RAnvijay Bani Roadies 5.0 Roadies 6.0 Roadies 7.0
(2)
ROUTER
(4)
RSS
(1)
S60
(5)
SAGEM
(2)
SAMSUNG
(7)
SARDAR
(1)
SCPIRTING
(5)
SCRAP
(2)
Search by Image
(1)
secret codes
(2)
Secure Your Computer
(1)
SECURITY
(6)
Serial key
(2)
SETTING
(2)
Shirt
(1)
SIM
(1)
SIMULATOR
(3)
SITEMETER HACK
(1)
SKYPE
(1)
Smartphone
(1)
SMS
(7)
SOFTWARE
(17)
Songs
(1)
Songs.pk
(1)
SOPA
(2)
SOPA Cabana
(1)
SPAM MAIL
(3)
statcounter
(1)
STD
(1)
storage
(1)
suraj fake
(1)
SYSTEM
(1)
T
(1)
TAG
(1)
Tango OS
(1)
TECH NEWS
(1)
THEMES
(3)
Timeline
(1)
TIMEPASS
(4)
TIP
(110)
TIPS
(126)
TNA
(1)
TOOLBAR
(1)
TOOLS
(7)
torrent
(23)
TORRENT HACK
(9)
TRICK
(187)
TROJAN
(4)
TUTORIAL
(1)
TV
(1)
TWEAK
(8)
UK
(1)
Unlimited Download
(1)
unlocking
(1)
UNRATED EDITIONS
(3)
USB
(9)
USB dongle
(1)
UTORRENT
(15)
VIDEO
(4)
Virus
(2)
Virus google
(1)
Virus total
(1)
Virustotal
(1)
VODAFONE
(5)
w3 counter
(1)
WAY2SMS
(2)
website
(1)
WI-FI
(14)
WINDOWS
(96)
WINDOWS 7
(44)
windows 7 GodMode
(2)
Windows 7.5 OS
(5)
Windows 8
(9)
windows 8 installation
(2)
WINDOWS VISTA
(27)
WINDOWS XP
(92)
windowsphone
(1)
Winzip
(1)
WIRELESS
(12)
WORDPRESS
(1)
WP7
(3)
WP8
(3)
WVIL
(1)
WVIL unbelievable
(1)
WWE PAYPER VIEW
(1)
WWE RAW
(1)
WWE SMACKDOWN
(1)
www.extrattorrent.com
(5)
XAT
(1)
XP Password
(2)
Xvid
(9)
YAHOO
(18)
YAHOO HACKING
(11)
yahoo messanger
(4)
YOUTUBE
(9)
YOUTUBE dOWNLOAD
(3)
YOUTUBE DOWNLOADER
(3)
youtube new look
(2)
zip7
(1)