tag:blogger.com,1999:blog-36344246727853213522024-03-05T17:38:41.728+05:30GRITTOMON THOMAS Revealed TrickzTweak and TricksGRITTOMON THOMAShttp://www.blogger.com/profile/05188021683487338390noreply@blogger.comBlogger56125tag:blogger.com,1999:blog-3634424672785321352.post-60839742591137245452011-03-02T11:06:00.004+05:302011-05-05T00:02:33.685+05:30Delete An “Undeletable” File<div dir="ltr" style="text-align: left;" trbidi="on"><br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNVl_3DD8rBY8mRYOJQAkeHf2NMXlXuJx6gohcjW2Q8puQLeDx9bV-EluJWK_bXHxHwAXKsoWWdeSwFJT7uY0tzg_YCl470rGXzf3sYjFrNbULaUu4a87-3yLQL7LPJSy1WFDPw60EERVl/s1600/error-deleting-file-or-folder.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="105" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNVl_3DD8rBY8mRYOJQAkeHf2NMXlXuJx6gohcjW2Q8puQLeDx9bV-EluJWK_bXHxHwAXKsoWWdeSwFJT7uY0tzg_YCl470rGXzf3sYjFrNbULaUu4a87-3yLQL7LPJSy1WFDPw60EERVl/s400/error-deleting-file-or-folder.png" width="400" /></a></div>1) First of all,<b> close all programs.</b><br />
2) Press <b>CTRL+SHIFT+ESC</b><br />
3) Go to the <b>Processes</b> tab and<b> right-click on explorer.exe</b> and click <b>end task</b>.<br />
4) Go to the<b> Application tab</b> and click on <b>New task</b>.<br />
5) Click on <b>Browse</b><br />
6) Change the file type<b> programs </b>to<b> all files</b>.<b> </b><br />
7) <b>Browse the file</b>, then <b>highlight the file</b> and try to delete the file by pressing <b>SHIFT+DELETE</b>.<br />
8) Go back to <b>Task Manager</b>, click <b>New Task</b> and enter <b>EXPLORER.EXE</b> to restart the GUI shell.<br />
9)<b> Close Task Manager</b>.</div>GRITTOMON THOMAShttp://www.blogger.com/profile/05188021683487338390noreply@blogger.com3tag:blogger.com,1999:blog-3634424672785321352.post-45435667989458631052011-03-02T01:11:00.001+05:302011-03-02T10:58:43.094+05:30How To Hack a Computer Easily using Script..!!!<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEB3IsgGZUn7KeA4494x25oheWxrXqAHJ1LUbdsfLoC2tEIwIsE7pqm4XSWbrgh-Mb3lS00y-k4RfCLBxEMMP-TXaD_v2Rm-P0hAjC6sql6o4vUo1YbEoIXJzLj4argxZb-CbzQbYhsV8d/s1600/hacked-pc-vector.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="269" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEB3IsgGZUn7KeA4494x25oheWxrXqAHJ1LUbdsfLoC2tEIwIsE7pqm4XSWbrgh-Mb3lS00y-k4RfCLBxEMMP-TXaD_v2Rm-P0hAjC6sql6o4vUo1YbEoIXJzLj4argxZb-CbzQbYhsV8d/s320/hacked-pc-vector.png" width="320" /></a></div><div class="separator" style="clear: both; text-align: center;"></div>Well you wanna hack,huh? This will however make a script kiddie..<br />
First off you will need to download ProRat SE 1.9 (Clean)<br />
<a href="http://www.sendspace.com/file/7tlt98" target="_blank">Download it</a> [Password: pro]<br />
Download <a href="http://www.rarlab.com/download.htm" target="_blank">Winrar</a> Also <br />
<h3 style="text-align: left;">Then follow the steps below:<span id="more-192"></span></h3><div style="text-align: left;">1) Extract the file onto your desktop and place them into a folder<br />
2) Open ProRat.exe , you will get a message, press OK<br />
3) once you see the program, click the button CREATE<br />
4) You will get another window, enter your email into the E-MAIL section ( you will need a real email)<br />
5) Go to GENERAL SETTINGS, and check PROTECTION FROM….<br />
and press CREATE SERVER.<br />
Now that you’ve finished the hardest part, follow these steps below and you can get hacking.<br />
6) Send the program to a friend, and make sure he/she opens it.<br />
7) Check your email, (junk in needed), and find the “Your victim is online”<br />
<img alt="8)" class="wp-smiley" src="http://hackoshit.com/wp-includes/images/smilies/icon_cool.gif" /> Copy and paste the IP address onto ProRat where it says “IP:[127.0.0.1]“<br />
9) Press CONNECT, DO NOT CHANGE THE PORT, if u did change it back to 5110<br />
10) Type in the password (default is usually 123456, it is in the email).<br />
11) Your done, now you can mess with the buttons on the program. Especially the GIVE DAMAGE button. It will damage their pc by format, and will make the computer useless.<br />
I will not be responsible for your action, this article is for only education on how it works, and how to prevent it. Still need help?</div></div>GRITTOMON THOMAShttp://www.blogger.com/profile/05188021683487338390noreply@blogger.com1tag:blogger.com,1999:blog-3634424672785321352.post-26913150518964425362011-03-02T00:58:00.000+05:302011-03-02T00:58:02.000+05:30z<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrWqudv2aFRw0qrm8Vf91TPtk2724fvGrVkHmepZHvxY8VnTqJWTKfuLmsBInkZgydkPSof-EjaCbp63OPct1YH1eGUb-R60d5_2WyOx-45DwSy8mJ8e8LG9fJ1EfKn77c84p7BtoCxY0l/s1600/inetOpsSecurity.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrWqudv2aFRw0qrm8Vf91TPtk2724fvGrVkHmepZHvxY8VnTqJWTKfuLmsBInkZgydkPSof-EjaCbp63OPct1YH1eGUb-R60d5_2WyOx-45DwSy8mJ8e8LG9fJ1EfKn77c84p7BtoCxY0l/s320/inetOpsSecurity.jpg" width="283" /></a></div>Ctrl+C may be the most important work we do everyday. But it’s not a very safe thing to do. Read on to know why. What happens when you press Ctrl+C while you are online. We do copy various data by Ctrl + C for pasting elsewhere. This copied data is stored in clipboard and is accessible from the net by a combination of Javascripts and ASP. This is called clipboard hack problem.<br />
<span><span id="more-207"></span><br />
Just try this:<br />
1. Copy any text by Ctrl + C<br />
2.Click the Link: Retrieve Clipboard Text To A Web Page With Javascript – Make Sure You Do Not Allow Someone To Gather This Information, It Is An Exploit In Many Eyes<br />
3.You will see the text you copied was accessed by this web page.</span> <br />
Surprised! I know you are because i was also surprised to see it. Do not keep sensitive data (like passwords, credit card numbers, PIN etc.) in the clipboard while surfing the web. It is extremely easy to extract the text stored in the clipboard to steal your sensitive information. Forward this information to as many friends as you can, to save them from online frauds!<br />
It is true, text you last copied for pasting (copy & paste) can be stolen when you visit web sites using a combination of JavaScript and ASP (or PHP, or CGI) to write your possible sensitive data to a database on another server.<br />
How Cipboard Hack is done?<br />
The Clipboard hack is done by the following Source Code:<br />
How to safeguard yourself from Clipboard Hack Problem?<br />
To avoid clipboard hack problem, do the following:<br />
1.Go to internet options->security.<br />
2.Press custom level.<br />
3.In the security settings, select disable under Allow paste operations via script.<br />
Now the contents of your clipboard are safe</div>GRITTOMON THOMAShttp://www.blogger.com/profile/05188021683487338390noreply@blogger.com1tag:blogger.com,1999:blog-3634424672785321352.post-70443840147433569512011-03-02T00:47:00.000+05:302011-03-02T00:47:50.416+05:30If Orkut Blocked..,,,Surf Anonymously using JAP!!<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYv25sMqYU6o6iwn0mG7Y01Ojsmoms-oC5Tn7tWxOIf2Ouauy1jdmGCFdOGX7EMiyukkT7QJjl5o3n13xMwxnuvfjSu6lMoX7oWNeeYR9t98AbdzCR1v-ro_aRT1S4-kiJmWJy5mf3Eta1/s1600/jap.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYv25sMqYU6o6iwn0mG7Y01Ojsmoms-oC5Tn7tWxOIf2Ouauy1jdmGCFdOGX7EMiyukkT7QJjl5o3n13xMwxnuvfjSu6lMoX7oWNeeYR9t98AbdzCR1v-ro_aRT1S4-kiJmWJy5mf3Eta1/s320/jap.gif" width="320" /></a></div><div>No problem if orkut/youtube etc is blocked in your office or college or school….and you are fed up of using proxy websites and there low surfing speeds.And what worse if these proxy websites are also blocked…..phew!!!!<br />
But no problems…..<br />
<span id="more-258"></span></div><div>Download <strong><a href="http://infogaufire.googlepages.com/japsetup.exe" target="_blank">JAP</a></strong> & Download <strong><a href="http://infogaufire.googlepages.com/Ultrasurf.zip" target="_blank">Ultrasurf</a></strong> and easily surf any blocked website with anonymity</div><div>Step 1: Download JAP or ultrasurf<br />
Step 2: Execute Setup file [may take few minutes depending upon internet speed]<br />
Step 3: Change you Explorer LAN connection settings Change the default gateway IP to 127.0.0.1 and port 4001<br />
Thats it you have gained independence to free to surf any website….</div></div>GRITTOMON THOMAShttp://www.blogger.com/profile/05188021683487338390noreply@blogger.com0tag:blogger.com,1999:blog-3634424672785321352.post-76769106913257839872011-03-02T00:42:00.000+05:302011-03-02T00:42:30.103+05:30Hide User Accounts in Win XP Welcome Screen<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuUGFMK8GmC03J5mMQ6tL-64OW46HDxEK3xkp4xDs242VVLozoDuAw07SAddGQnfHCscFcvmBo71F7KwuOW1B4smcHwEfc3fxKNa_6-rGu5oua3h3oBATp_lBuVMmSgDg6z1GDPFl5Sv80/s1600/windows-xp-welcome-screen.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuUGFMK8GmC03J5mMQ6tL-64OW46HDxEK3xkp4xDs242VVLozoDuAw07SAddGQnfHCscFcvmBo71F7KwuOW1B4smcHwEfc3fxKNa_6-rGu5oua3h3oBATp_lBuVMmSgDg6z1GDPFl5Sv80/s400/windows-xp-welcome-screen.gif" width="400" /></a></div>The welcome screen displays all of the local users on the system, except the built-in administrator account that was created during setup.<span id="more-189"></span><br />
<strong>Hide Your User Account</strong><br />
If we want to hide a specific user from the list, we need to create a special value under this registry key:<br />
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows<br />
NT\CurrentVersion\Winlogon\SpecialAccounts\UserList<br />
Under this key you simply create a new DWORD value – the name matches the users name exactly, and the value is one of the following (Decimal format)<br />
0 – Hides the user just from the welcome screen<br />
1 – The user is shown<br />
<strong><br />
Before you start putting values in this key, I want to warn you. This tip is particularly dangerous. If you make the wrong move, you could make it nearly impossible to get back into your system. (Use safe mode if you mess up, to get back in)</strong><br />
To disable the users I want, I browse to the registry key on my system:<br />
Now I want to hide all of the accounts except my own, so I add each of the accounts shown on the welcome screen, and give them a value of zero.<br />
<a href="http://photobucket.com/" target="_blank"><br />
</a><br />
<strong>How do you log on now that you are a hidden user?</strong><br />
If you are running windows XP Professional you simply need to press CTRL-ALT-DEL twice, and the standard logon screen will be displayed. This has one pitfall – it will fail to work if a user is still currently logged in. If you are having trouble getting it to show, then reboot and press it twice before any users have logged in. <strong>(I have not tested this in Windows XP Home…Some people say that the standard logon screen won’t come up (maybe they didn’t get all of the windows updates?), if that happens boot into safe mode and edit the registry back to normal)</strong></div>GRITTOMON THOMAShttp://www.blogger.com/profile/05188021683487338390noreply@blogger.com1tag:blogger.com,1999:blog-3634424672785321352.post-44257444924334906282011-03-02T00:31:00.001+05:302011-03-02T00:36:58.605+05:30Google Cool Trick<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSNMnWw4k92afsqV4CZXU0f5wai9EkSw8qhzXPFF3gbWPlo3wwGiK700BWfSRc_VnB3537ryK9wzvJdQLJ18jl43pC17MceHzASvYTayE5woDf_4_9oK_x6ESHVnWH7NupBjRmrQaMOjI_/s1600/funny-google.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="314" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSNMnWw4k92afsqV4CZXU0f5wai9EkSw8qhzXPFF3gbWPlo3wwGiK700BWfSRc_VnB3537ryK9wzvJdQLJ18jl43pC17MceHzASvYTayE5woDf_4_9oK_x6ESHVnWH7NupBjRmrQaMOjI_/s400/funny-google.png" width="400" /></a></div>Hi Found a Cool Trick to impress your Friends …<br />
Just for fun not much guys.<span id="more-197"></span><br />
1. Do a Image Search in google.com ( Any Image)<br />
2. Now delete the URL on the Browser ( http://images.google.com/images?client=firefox-a&rls=org.mozilla:en-US:official&channel=s&hl=en&q=fun&um=1&ie=UTF-8&sa=N&tab=wi)<br />
3 Now replce with this code<br />
javascript:R= 0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI= document.images ; DIL=DI.length; function A(){for(i=0; i<dil; ].style;="" cos(r*y1+="" dis.left="Math." dis.position="’absolute’;" dis.top="Math." i*x2+x3)*="" i*y2+y3)*="" i++){dis="DI[" i="" sin(r*x1+="" void(0)="" x4+x5;="" y4+y5}r++="" }setinterval(’a()’,5);=""></dil;><br />
or<br />
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName(”img”); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position=’absolute’; DIS.left=(Math.tan(R*x1+i*x2+x3)*x4+x5)+”px”; DIS.top=(Math.tan(R*y1+i*y2+y3)*y4+y5)+”px”}R++}setInterval(’A()’,5); void(0);<br />
or<br />
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.images; DIL=DI.length; function A(){for(i=0; i<dil; ].style;="" dis.left="Math.sin(R*x1+i*x2+x3)*x4+x5;" dis.position="’absolute’;" dis.top="Math.cos(R*y1+i*y2+y3)*y4+y5}R++}setInterval(’A()’,5);" i++){dis="DI[" i="" void(0)=""></dil;><br />
or<br />
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName(”img”); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position=’absolute’; DIS.left=(Math.sin(R*1+i*x2+x3)*x1+x2)+”px”; DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+”px”}R++}setInterval(’A()’,50); void(0);<br />
4. Pres Enter. Cool yeah..</div>GRITTOMON THOMAShttp://www.blogger.com/profile/05188021683487338390noreply@blogger.com0tag:blogger.com,1999:blog-3634424672785321352.post-8649560472091889292011-03-02T00:26:00.000+05:302011-03-02T00:26:39.224+05:30Speed Up Your Net By 20%<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8PYCI1fQZpkIWpT36sjaiUSJO1TCmB8XDWOfGmpzegH5swSQHv5QUKPSzdXXJno0dMfmiP0V4-Y88sqBY1AhfVqytmsvbnB7XKNO9rdqV3tnxRBiirxjU6NEli0TgF3jtHJIS_nvCZT2Y/s1600/477895_f520.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8PYCI1fQZpkIWpT36sjaiUSJO1TCmB8XDWOfGmpzegH5swSQHv5QUKPSzdXXJno0dMfmiP0V4-Y88sqBY1AhfVqytmsvbnB7XKNO9rdqV3tnxRBiirxjU6NEli0TgF3jtHJIS_nvCZT2Y/s320/477895_f520.jpg" width="240" /></a></div>You can get it back: <br />
Click Start then Run and type “gpedit.msc” without quotes.This opens the group policy editor. Then go to:<br />
<span><span id="more-245"></span><br />
Local Computer Policy ><br />
Computer Configuration ><br />
Administrative Templates ><br />
Network ><br />
QOS Packet Scheduler ><br />
then to Limit Reservable Bandwidth</span><br />
Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the ‘Explain’ tab i.e.”By default,the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default.”<br />
So the trick is to ENABLE reservable bandwidth, then set it to ZERO.<br />
This will allow the system to reserve nothing, rather than the default 20%. It works on Win XP as well.</div>GRITTOMON THOMAShttp://www.blogger.com/profile/05188021683487338390noreply@blogger.com0tag:blogger.com,1999:blog-3634424672785321352.post-39694442300964989872011-03-02T00:07:00.000+05:302011-03-02T00:07:25.400+05:30Mobile Phone Viruses<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6PjxLiDn5iSjpbKtUL0d4vYZHetlfiq_nIi-mvoJx9jpLENQ6zzctJhO5ZFPIFeLKdX9k0_dsawlNM0kbDKE4hyDsj224iR3HCrw5XCR6dUhr9wX_e_tRhyphenhyphenne6IMKnx4ps1tMT2mxluf5/s1600/mobile-malware-virus-lg1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6PjxLiDn5iSjpbKtUL0d4vYZHetlfiq_nIi-mvoJx9jpLENQ6zzctJhO5ZFPIFeLKdX9k0_dsawlNM0kbDKE4hyDsj224iR3HCrw5XCR6dUhr9wX_e_tRhyphenhyphenne6IMKnx4ps1tMT2mxluf5/s1600/mobile-malware-virus-lg1.jpg" /></a></div>A mobile phone virus or mobile malware – malicious mobile software – is a computer virus specifically adapted for the mobile phone environment and designed to spread from one vulnerable phone to another.<br />
<span id="more-50"></span><br />
A virus is a program code that replicates by being copied to another program. Viruses can be transmitted as attachments to an email or in a download file. Some viruses take effect as soon as their code is executed; other viruses can lie dormant. A virus that replicates by resending itself as an email attachment or as a part of a network message is known as a worm.<br />
Viruses can range from benign to quite harmful; they can erase data from the infected phone or send fake messages purporting to be from the phones owner. How prevalent are mobile phone viruses? The current security risk from mobile phone viruses and worms is low.<br />
Until many more smart phones or PDAs are in use, and users of these phones are regularly exchanging executable files, the risk will remain low.<br />
The mobile industry takes the threat of viruses very seriously and is continually monitoring its networks and working to protect users from any future risk from mobile phone viruses. There are also some simple measures that individual users can implement to protect themselves.What can I do to protect my phone?<br />
The following tips can help prevent problems with viruses on your phone:<br />
1. Switch to Bluetooth hidden mode. If your phone has Bluetooth capability, ensure that the Bluetooth capability is switched to hidden or invisible mode unless you specifically need it to be visible.This will help prevent other Bluetooth-enabled devices from finding your phone (unless you grant them the necessary permission) and will therefore help protect your phone from worms that spread using the Bluetooth wireless technology.<br />
2. Exercise caution before opening attachments. When accepting applications sent via Bluetooth, or opening MMS attachments, exercise caution, just as you would when opening an email attachment on your PC, because they may include harmful software.<br />
Ensure the application or attachment comes from a known source, and is wary of opening files that have unfamiliar text attached to them, even if they come from someone you know.<br />
3. Only download content from a trusted source. Trusted sources may include operator portals and other well-known brands that offer adequate protection against viruses and other harmful software. Be aware though that, as with emails, malicious or fraudulent users may be able to fake the appearance of a trusted source.<br />
4. Consider anti-virus software. Some software is available to prevent phone viruses. You may wish to consider downloading this software.<br />
5. Contact your phone manufacturer if concerned. If you think you have a virus, call the phone manufacturer’s care line. They can assist you confirm if it is a virus, and help fix the problem.</div>GRITTOMON THOMAShttp://www.blogger.com/profile/05188021683487338390noreply@blogger.com0tag:blogger.com,1999:blog-3634424672785321352.post-80440088701470063502011-02-26T22:54:00.002+05:302011-02-26T23:00:04.817+05:30Hide IP Address – Real ways to hide your IP<div dir="ltr" style="text-align: left;" trbidi="on">Here in this post I will try to give you every possible information to hide the IP address. If you seriously want to hide your IP address then this post is for you!<br />
One of the most frequently asked questions by the internet users is <strong>How To Hide IP Address ?. </strong>Many times it becomes necessary to hide the real IP address for the sake of privacy. For this, I have tried many softwares, proxy servers and many such tools that guaranteed to hide my IP address.But still none of them worked for me. I think most of you have the same experience. Are you fed up with these dummy softwares that fails to hide the real IP address? Then is there any working way to hide the IP address?<br />
<br />
<div> </div><strong>YES, you can definitely hide your IP</strong><br />
Now I’ll come to the heart of the post, which contains the answer to your curious question <strong>How to Hide the IP address ? </strong>The only solution to hide your IP address is by using a <strong>Proxy Server.</strong> But Wait! The story doesn’t end here. Even though proxy servers are the only way to hide your IP address, there are several ways of connecting your PC to the proxy server. Before setting up the connection with the proxy servers you must know some information about different types of proxy servers and their uses.<br />
<strong>1. Transparent Proxy Server</strong><br />
This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used to speedup the web browsing since thay have a very good ability to cache websites. But they do not conceal the IP of it’s users. It is widely known as transparent proxy because it will expose your real IP address to the web. This type of proxy server does not hide your IP address.<br />
<strong>2. Anonymous Proxy Server</strong><br />
This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users. This type of proxy server will hide your IP address.<br />
<strong>3. Distorting Proxy Server</strong><br />
This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers. This type of proxy server will hide your IP address.<br />
<strong>4. High Anonymity Proxy Server (Elite Proxy)</strong><br />
This type of proxy server does not identify itself as a proxy server and does not make available the original IP address. This type of proxy server will hide your IP address.So this is the best way to mask your IP.<br />
<strong>Which Proxy Server is the best to Hide My IP ? </strong><br />
I know, you can answer this question better than me.Obviously <strong>High Anonymity Proxy or Elite Proxy is the best</strong> to hide your IP. But it’s not easy to get a list of working elite proxies. If you search the Google, you will definitely get tons of proxy list. You’ll get a list of proxies in the following format<br />
<div class="stb-info_box"><strong>IP:Port Number</strong></div>Eg:<strong> 221.90.45.67:8080</strong> (221.90.45.67 is the IP of the proxy server and 8080 is the port number)<br />
But most of them don’t work. Here are some of the problems/risks associated with using free proxies that are available on the internet.<br />
<ul><li>Most of them do not work since the proxy servers frequently changes it’s IP/Port number.</li>
<li>Even if you find a working proxy server it may be too slow.</li>
<li>Your privacy is not guaranteed since all your traffic is routed through the proxy server.</li>
<li>The administrators of the proxy servers may steal your valuable information such as passwords, SSN (Social security number), Credit Card details etc.</li>
</ul>So with all these being the risks then how to find a working, fast ,highly anonymous and secured Proxy servers?<br />
Now I will give a list of softwares that will really hide your IP address. I have tried many such softwares and have found only few of them working perfectly. Here is a list of working IP Hiding softwares that you can try. I have listed them in the order of their popularity<br />
<strong>1. <a href="http://www.hide-the-ip.com/" rel="nofollow" target="_blank">Hide The IP</a> </strong><br />
<strong>Let’s you choose the country, type and speed of the proxy.</strong> Not so popular but personally I recommend this to the users.<br />
<strong>2. <a href="http://www.hide-my-ip.com/" rel="nofollow" target="_blank">Hide My IP</a></strong><br />
<strong>3. </strong><a href="http://www.hide-ip-soft.com/index.htm" rel="nofollow" target="_blank">Hide IP NG</a><br />
You can get more informations about these products on their respective homepages.<br />
<strong>How to ensure that the IP is hidden ?</strong><br />
Before you hide your IP you can check your real IP by visiting the following site.<br />
<a href="http://whatismyipaddress.com/" rel="nofollow" target="_blank">WhatIsMyIPAddress.Com</a><br />
Once you get your real IP, switch on your IP hiding software. Now once again visit the above site and check your IP address. If you see a new IP then this means that your software is doing the right job. Also the above site(Whatismyipaddress.com) is capable of detecting many proxies. If you see the words such as “<span style="color: #ff6666;">suspected proxy server or network sharing device</span>” or similar words then it means that the proxy you are using is not an Elite Proxy.<br />
<strong>One Final Word before you leave! </strong>Even though Elite proxies are almost undetectable this doesn’t mean that you can escape from online crimes by hiding your IP. There are many proxy detecting services available which detect almost any proxy. So if you involve in any cyber crimes then you will definitely be behind the bars. Using proxy will not help you in this case.<br />
One More thing, it is unsafe to use proxy during e-commerce transactions such as Online banking, Online Credit Card payment etc. So please avoid proxies during these circumstances. </div>GRITTOMON THOMAShttp://www.blogger.com/profile/05188021683487338390noreply@blogger.com0tag:blogger.com,1999:blog-3634424672785321352.post-12591809079263217492011-02-26T22:43:00.001+05:302011-02-26T23:42:29.172+05:30How to Trace IP Address<div dir="ltr" style="text-align: left;" trbidi="on">In my earlier post I had discussed about <b>how to capture the IP address</b> of a remote computer. Once you obtain this IP address it is necessary to trace it back to it’s source. So in this post I will show you how to trace any IP address back to it’s source. In fact tracing an IP address is very simple and easy than we think. <br />
<a href="http://www.blogger.com/post-edit.g?blogID=3634424672785321352&postID=1259180907926321749" name="more"></a>There exists many websites through which you can trace any <u><b>IP address</b></u> back to it’s source. One of my favorite site is ip2location.com. <br />
Just go to <a href="http://www.ip2location.com/demo.aspx" rel="nofollow" target="_blank">http://www.ip2location.com/demo.aspx</a> and enter the IP address that you want to trace in the dialog box and click on “Find Location”‘. With just a click of a button you can find the following information for any given IP address.<br />
1. Country in which the IP is located<br />
2. Region<br />
3. City<br />
4. Latitude/Longitude<br />
5. Zip Code<br />
6. Time Zone<br />
7. Name of the ISP<br />
8. Internet Speed<br />
9. Weather Station<br />
10. Area Code and<br />
11. Domain name associated with the IP address.<br />
A sample snapshot of the results from ip2location.com is given below<br />
<br />
<div style="text-align: center;"><img alt="ip2location_results" class="aligncenter size-full wp-image-1716" height="81" src="http://www.gohacking.com/wp-content/uploads/2009/10/ip2location_results1.jpg" title="ip2location_results" width="320" /></div>You can also visually trace route any IP address back to it’s location. For this just visit <a href="http://www.yougetsignal.com/tools/visual-tracert/" rel="nofollow" target="_blank">http://www.yougetsignal.com/tools/visual-tracert/</a> and enter the IP you want to trace in the dialog box and hit the “Proxy Trace” button. Wait for few seconds and the visual trace route tool displays the path Internet packets traverse to reach a specified destination.</div>GRITTOMON THOMAShttp://www.blogger.com/profile/05188021683487338390noreply@blogger.com0tag:blogger.com,1999:blog-3634424672785321352.post-50811042432802647222011-02-26T22:37:00.002+05:302011-02-26T23:00:04.818+05:30How to Find the IP Address of a Remote Computer<div dir="ltr" style="text-align: left;" trbidi="on">Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. In this post I’ll show you how to find the IP address of a remote computer in simple steps. <br />
I have created a PHP script to make<br />
<a href="" name="more"></a><br />
it easier for you to find the IP address of the remote computer of your choice. Here is a step-by-step process to find out the IP address.<br />
1. <a href="http://www.ziddu.com/download/11431934/IP_Finder.zip.html" rel="nofollow">Download</a> the <a href="http://www.ziddu.com/download/11431934/IP_Finder.zip.html" rel="nofollow">IP Finder script</a> (IP_Finder.ZIP) that I have created.<br />
2. Open a new account in <a href="http://x10hosting.com/" rel="nofollow" target="_blank">X10Hosting</a> (or any free host that supports PHP).<br />
3. Extract the IP_Finder.ZIP file and upload the two files <b>ip.php</b> and <b>ip_log.txt</b> into the root folder of your hosting account using the File Manager.<br />
4. You can rename the <b>ip.php</b> to any name of your choice.<br />
5. Set the permission to <b>777</b> on <b>ip_log.txt</b>.<br />
Now you are all set to find the IP address of your friend or any remote computer of your choice. All you have to do is send the link of <b>ip.php</b> to your friend or the person with whom you’re chatting. Once the person click’s on the link, his/her IP address is recorded in the file <b>ip_log.txt</b>.<br />
For your better understanding let’s take up the following example.<br />
Suppose you open a new account in X10hosting.com with the subdomain as <b>abc</b>, then your IP Finder link would be<br />
<br />
<div class="stb-info_box"><b>http://abc.x10hosting.com/ip.php</b></div>You have to send the above link to you friend via email or while chatting and ask him to visit that link. Once your friend clicks on the link, his IP address will be recorded along with the Date and Time in the <b>ip_log.txt</b> file. After recording the IP address, the script will redirect the person to google.com so as to avoid any suspicion.<br />
To find the recorded IP address check the logs using the following link.<br />
<div class="stb-info_box"><b>http://abc.x10hosting.com/ip_log.php</b></div>The sample log will be in the following format<br />
79.92.144.237 Thursday 07th of May 2009 05:31:27 PM<br />
59.45.144.237 Thursday 07th of May 2009 05:31:28 PM<br />
123.92.144.237 Thursday 07th of May 2009 05:31:31 PM<br />
<span style="font-size: medium;">NOTE</span>: You have to replace <b>abc</b> with your subdomain name.</div>GRITTOMON THOMAShttp://www.blogger.com/profile/05188021683487338390noreply@blogger.com0tag:blogger.com,1999:blog-3634424672785321352.post-29411778142338559692011-02-26T22:35:00.000+05:302011-02-26T22:58:33.862+05:30A Virus Program to Disable USB Ports<div dir="ltr" style="text-align: left;" trbidi="on">In this post I will show how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual I use my favorite <a href="http://grittothomas.blogspot.com/2011/02/how-to-compile-c-programes.html">C programming language</a> to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program. <br />
Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll will not be able to use your pen drive or any other USB peripheral on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.<br />
1. <a href="http://www.ziddu.com/download/11431836/USB_Block.rar.html" rel="nofollow">Download</a> the <a href="http://www.ziddu.com/download/11431836/USB_Block.rar.html" rel="nofollow">USB_Block.rar</a> file on to your computer.<br />
2. It contains the following 4 files.<br />
<br />
<ul><li>block_usb.c (source code)</li>
<li>unblock_usb.c (source code)</li>
</ul>3. You need to compile them before you can run it. A step-by-step procedure to compile C programs is given in my post - <a href="http://grittothomas.blogspot.com/2011/02/how-to-compile-c-programes.html">How to Compile C Programs.</a><br />
3. Upon compilation of block_usb.c you get <b>block_usb.exe</b> which is a simple virus that will block (disable) all the USB ports on the computer upon execution (double click).<br />
4. To test this virus, just run the <b>block_usb.exe </b>file and insert a USB pen drive (thumb drive). Now you can see that your pen drive will never get detected. To re-enable the USB ports just run the <b>unblock_usb.exe</b> (you need to compile unblock_usb.c) file. Now insert the pen drive and it should get detected.<br />
5. You can also change the icon of this file to make it look like a legitimate program. For more details on this refer my post – <a href="http://grittothomas.blogspot.com/2011/02/how-to-change-icon-of-exe-file.html">How to Change the ICON of an EXE file</a> (This step is also optional).</div>GRITTOMON THOMAShttp://www.blogger.com/profile/05188021683487338390noreply@blogger.com0tag:blogger.com,1999:blog-3634424672785321352.post-9452965548545019532011-02-26T22:32:00.000+05:302011-02-26T23:00:38.404+05:30How to Compile C Programes<div dir="ltr" style="text-align: left;" trbidi="on">In many of my previous posts especially in the VIRUS CREATION section, I have used C as the programming language. If you’re new to C programming and find it difficult to compile the C source codes then this post is for you. Here is a step-by-step procedure to install Borland C++ compiler 5.5 and compile C programs. <br />
<br />
<div> </div><h3>How to install Borland C++ compiler</h3><div> </div>1. Download Borland C++ compiler 5.5 (for Windows platform) from the following link.<br />
<a href="http://www.codegear.com/downloads/free/cppbuilder" rel="nofollow" target="_blank">http://www.codegear.com/downloads/free/cppbuilder</a><br />
2. After you download, run <strong>freecommandlinetools.exe</strong>. The default installation path would be<br />
<div class="stb-info_box">C:\Borland\BCC55</div><div> </div><h3>How to configure Borland C++ compiler</h3><div> </div>1. After you install Borland C++ compier, create two new Text Documents<br />
2. Open the first <strong>New Text Document.txt</strong> file and add the following two lines into it<br />
<div class="stb-info_box"><em>-I”c:\Borland\Bcc55\include”</em> <em>-L”c:\Borland\Bcc55\lib”</em></div>Save changes and close the file. Now rename the file from <strong>New Text Document.txt </strong>to <strong>bcc32.cfg.</strong><br />
3. Open the second <strong>New Text Document (2).txt</strong> file and add the following line into it<br />
<div class="stb-info_box"><span style="color: #333333;"><em><span style="color: black;">-L”c:\Borland\Bcc55\lib”</span></em></span></div>Save changes and close the file. Now rename the file from <strong>New Text Document (2).txt </strong>to <strong>ilink32.cfg.</strong><br />
4. Now copy the two files <strong>bcc32.cfg</strong> and <strong>ilink32.cfg</strong>, navigate to <em><strong>C:\Borland\BCC55\Bin</strong></em> and paste them.<br />
<div> </div><h3>How to compile the C source code (.C files)</h3><div> </div>1. You need to place the .C (example.c) file to be compiled in the following location<br />
<div class="stb-info_box"><em>C:\Borland\BCC55\Bin</em></div>2. Now goto command prompt (Start->Run->type <strong>cmd</strong>->Enter)<br />
3. Make the following path as the present working directory (use CD command)<br />
<div class="stb-info_box"><em>C:\Borland\BCC55\Bin</em></div>4. To compile the file (example.c) use the following command<br />
<div class="stb-container" id="stb-container"><div class="stb-info-caption_box stb_caption">Command to Compile C Program</div><div class="stb-info-body_box stb_body"><strong>bcc32 example.c</strong></div></div>5. Now if there exists no error in the source code you’ll get an executable file (example.exe) in the same location (<em>C:\Borland\BCC55\Bin).</em><br />
6. Now you have successfully compiled the source code into an executable file(.exe file).<br />
<div class="stb-warning_box"><em><strong>NOTE: The above tutorial assumes that you’ve installed the compiler onto the C: drive (by default).</strong></em></div></div>GRITTOMON THOMAShttp://www.blogger.com/profile/05188021683487338390noreply@blogger.com0tag:blogger.com,1999:blog-3634424672785321352.post-81827944688880148562011-02-26T22:27:00.000+05:302011-02-26T22:58:33.862+05:30How To Make A Trojan Hourse<div dir="ltr" style="text-align: left;" trbidi="on">Most of you may be curious to know about <b>how to make a Trojan </b>or Virus on your own. Here is an answer for your curiosity. In this post I’ll show you <b>how to make a simple Trojan on your own </b>using C programming language. This Trojan when executed will eat up the hard disk space on the root drive (The drive on which Windows is installed, usually C: Drive) of the computer on which it is run. Also this Trojan works pretty quickly and is capable of eating up approximately 1 GB of hard disk space for every minute it is run. So, I’ll call this as Space Eater Trojan. Since this Trojan is written using a high level programming language it is often undetected by antivirus. The source code for this Trojan is available for download at the end of this post. Let’s see how this Trojan works…<br />
Before I move to explain the features of this Trojan you need to know <a href="http://en.wikipedia.org/wiki/Trojan_horse_%28computing%29" target="_blank">what exactly is a Trojan horse</a> and how it works. As most of us think a Trojan or a Trojan horse is not a virus. In simple words a Trojan horse is a program that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the host machine or create a damage to the computer.<br />
<br />
<b>Now lets move to the working of our Trojan</b><br />
The Trojan horse which I have made appears itself as an antivirus program that scans the computer and removes the threats. But in reality it does nothing but occupy the hard disk space on the root drive by just filling it up with a huge junk file. The rate at which it fills up the hard disk space it too high. As a result the the disk gets filled up to 100% with in minutes of running this Trojan. Once the disk space is full, the Trojan reports that the scan is complete. The victim will not be able to clean up the hard disk space using any cleanup program. This is because the Trojan intelligently creates a huge file in the <b>Windows\System32</b> folder with the <b>.dll </b>extension. Since the junk file has the <b>.dll</b> extention it is often ignored by disk cleanup softwares. So for the victim, there is now way to recover the hard disk space unless reformatting his drive.<br />
<b>The algorithm of the Trojan is as follows</b><br />
1. Search for the <b>root drive</b><br />
2. Navigate to <b>WindowsSystem32</b> on the root drive<br />
3. Create the file named “<b>spceshot.dll</b>”<br />
4. Start <b>dumping the junk data </b>onto the above file and keep increasing it’s size until the drive is full<br />
5. Once the drive is full, <b>stop the process</b>.<br />
You can <a href="http://www.ziddu.com/download/11431905/Space_Eater.rar.html" rel="nofollow"><b>download</b></a> the Trojan source code<b> </b><a href="http://www.ziddu.com/download/11431905/Space_Eater.rar.html" rel="nofollow"><b>HERE</b></a>. Please note that I have not included the executabe for security reasons. You need to compile it to obtain the executable.<br />
<h3>How to compile, test and remove the damage?</h3><b>Compilation:</b><br />
For step-by-step compilation guide, refer my post How to compile C Programs.<br />
<b>Testing:</b><br />
To test the Trojan, just run the <b>SpaceEater.exe</b> file on your computer. It’ll generate a warning message at the beginning. Once you accept it, the Trojan runs and eats up hard disk space.<br />
<div class="stb-warning_box"><i>NOTE: To remove the warning message you’ve to edit the source code and then re-compile it.</i></div><b>How to remove the Damage and free up the space?</b><br />
To remove the damage and free up the space, just type the following in the “<b>run</b>” dialog box.<br />
<div class="stb-info_box"><b>%systemroot%\system32</b></div>Now search for the file “<b>spceshot.dll</b>“. Just delete it and you’re done. No need to re-format the hard disk.<br />
<div class="stb-warning_box"><b><i> NOTE: You can also change the ICON of the virus to make it look like a legitimate program. This method is described in the post: </i></b><a href="http://grittothomas.blogspot.com/2011/02/how-to-change-icon-of-exe-file.html"><b><i>How to Change the ICON of an EXE file ?</i></b></a></div>Please pass your comments and tell me your opinion. I am just waiting for your comments… </div>GRITTOMON THOMAShttp://www.blogger.com/profile/05188021683487338390noreply@blogger.com0tag:blogger.com,1999:blog-3634424672785321352.post-60468924078826068612011-02-26T22:19:00.000+05:302011-02-26T22:20:38.790+05:30How To Speedup Your XP<div dir="ltr" style="text-align: left;" trbidi="on"><div> Services You Can Disable</div><div><br />
</div><div>There are quite a few services you can disable from starting automatically.</div><div>This would be to speed up your boot time and free resources.</div><div>They are only suggestions so I suggestion you read the description of each one when you run Services</div><div>and that you turn them off one at a time.</div><div><br />
</div><div>Some possibilities are:</div><div>Alerter</div><div>Application Management</div><div>Clipbook</div><div>Fast UserSwitching</div><div>Human Interface Devices</div><div>Indexing Service</div><div>Messenger</div><div>Net Logon</div><div>NetMeeting</div><div>QOS RSVP</div><div>Remote Desktop Help Session Manager</div><div>Remote Registry</div><div>Routing & Remote Access</div><div>SSDP Discovery Service</div><div>Universal Plug and Play Device Host</div><div>Web Client</div><div><br />
</div><div><br />
</div><div>--------------------------------------------------------------------------------</div><div><br />
</div><div>Cleaning the Prefetch Directory</div><div><br />
</div><div>WindowsXP has a new feature called Prefetch. This keeps a shortcut to recently used programs.</div><div>However it can fill up with old and obsolete programs.</div><div><br />
</div><div>To clean this periodically go to:</div><div><br />
</div><div>Star / Run / Prefetch</div><div>Press Ctrl-A to highlight all the shorcuts</div><div>Delete them</div><div><br />
</div><div>--------------------------------------------------------------------------------</div><div><br />
</div><div>Not Displaying Logon, Logoff, Startup and Shutdown Status Messages</div><div><br />
</div><div>To turn these off:</div><div><br />
</div><div>Start Regedit</div><div>Go to HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionpoliciessystem</div><div>If it is not already there, create a DWORD value named DisableStatusMessages</div><div>Give it a value of 1</div><div><br />
</div><div>--------------------------------------------------------------------------------</div><div>Clearing the Page File on Shutdown</div><div><br />
</div><div>Click on the Start button</div><div>Go to the Control Panel</div><div>Administrative Tools</div><div>Local Security Policy</div><div>Local Policies</div><div>Click on Security Options</div><div>Right hand menu - right click on "Shutdown: Clear Virtual Memory Pagefile"</div><div>Select "Enable"</div><div>Reboot</div><div><br />
</div><div>For regedit users.....</div><div>If you want to clear the page file on each shutdown:</div><div><br />
</div><div>Start Regedit</div><div>Go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory ManagementClearPageFileAtShutdown</div><div>Set the value to 1</div><div><br />
</div><div>--------------------------------------------------------------------------------</div><div><br />
</div><div>No GUI Boot</div><div><br />
</div><div>If you don't need to see the XP boot logo,</div><div><br />
</div><div>Run MSCONFIG</div><div>Click on the BOOT.INI tab</div><div>Check the box for /NOGUIBOOT</div><div><br />
</div><div>---------------------------------------------------------------------------------</div><div>Speeding the Startup of Some CD Burner Programs</div><div><br />
</div><div>If you use program other than the native WindowsXP CD Burner software,</div><div>you might be able to increase the speed that it loads.</div><div><br />
</div><div>Go to Control Panel / Administrative Tools / Services</div><div>Double-click on IMAPI CD-Burning COM Service</div><div>For the Startup Type, select Disabled</div><div>Click on the OK button and then close the Services window</div><div>If you dont You should notice</div><div><br />
</div><div>--------------------------------------------------------------------------------</div><div><br />
</div><div>Getting Rid of Unread Email Messages</div><div><br />
</div><div>To remove the Unread Email message by user's login names:</div><div><br />
</div><div>Start Regedit</div><div>For a single user: Go to HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionUnreadMail</div><div>For all users: Go to HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionUnreadMail</div><div>Create a DWORD key called MessageExpiryDays</div><div>Give it a value of 0</div><div><br />
</div><div>------------------------------------------------------------------------------</div><div><br />
</div><div>Decreasing Boot Time</div><div><br />
</div><div>Microsoft has made available a program to analyze and decrease the time it takes to boot to WindowsXP</div><div>The program is called BootVis</div><div><br />
</div><div>Uncompress the file.</div><div>Run BOOTVIS.EXE</div><div>For a starting point, run Trace / Next Boot + Driver Delays</div><div>This will reboot your computer and provide a benchmark</div><div>After the reboot, BootVis will take a minute or two to show graphs of your system startup.</div><div>Note how much time it takes for your system to load (click on the red vertical line)</div><div>Then run Trace / Optimize System</div><div>Re-Run the Next Boot + Drive Delays</div><div>Note how much the time has decreased</div><div>Mine went from approximately 33 to 25 seconds.</div><div><br />
</div><div>--------------------------------------------------------------------------------</div><div>Increasing Graphics Performance</div><div><br />
</div><div>By default, WindowsXP turns on a lot of shadows, fades, slides etc to menu items.</div><div>Most simply slow down their display.</div><div><br />
</div><div>To turn these off selectively:</div><div><br />
</div><div>Right click on the My Computer icon</div><div>Select Properties</div><div>Click on the Advanced tab</div><div>Under Performance, click on the Settings button</div><div>To turn them all of, select Adjust for best performance</div><div>My preference is to leave them all off except for Show shadows under mouse pointer and Show window contents while dragging</div><div><br />
</div><div>---------------------------------------------------------------------------</div><div><br />
</div><div>Increasing System Performance</div><div><br />
</div><div>If you have 512 megs or more of memory, you can increase system performance</div><div>by having the core system kept in memory.</div><div><br />
</div><div>Start Regedit</div><div>Go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory ManagementDisablePagingExecutive</div><div>Set the value to be 1</div><div>Reboot the computer</div><div><br />
</div><div>---------------------------------------------------------------------------</div><div><br />
</div><div>Increasing File System Caching</div><div><br />
</div><div>To increase the amount of memory Windows will locked for I/O operations:</div><div><br />
</div><div>Start Regedit</div><div>Go to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management</div><div>Edit the key IoPageLockLimit</div><div><br />
</div><div>-----------------------------------------------------------------------------</div><div><br />
</div><div>Resolving Inability to Add or Remove Programs</div><div><br />
</div><div>If a particular user cannot add or remove programs, there might be a simple registry edit neeed.</div><div><br />
</div><div>Go to HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesUninstall</div><div>Change the DWORD NoAddRemovePrograms to 0 disable it</div><div><br />
</div><div>4096 - 32megs of memory or less</div><div>8192 - 32+ megs of memory</div><div>16384 - 64+ megs of memory</div><div>32768 - 128+ megs of memory</div><div>65536 - 256+ megs of memory</div></div>GRITTOMON THOMAShttp://www.blogger.com/profile/05188021683487338390noreply@blogger.com0tag:blogger.com,1999:blog-3634424672785321352.post-10670929353967077142011-02-26T12:23:00.002+05:302011-02-26T22:20:20.182+05:30Unblock or Bypass Orkut Restrictions<div dir="ltr" style="text-align: left;" trbidi="on">Hi friends, since I am getting a lot of comments on how to unblock or to bypass orkut restrictions, I have been on the look out for new proxies. Bennet at circumventor has a great list of proxy sites. I had subscribed to his newsletter and got these proxies. I have not tried them out, since Orkut is no longer blocked in my college.<br />
You can reply to comments using these proxies by using reply option.<br />
Please send in your valuable comments.<br />
Use http / https<span id="more-183"></span><br />
<a href="http://www.yogurtgland.com/" style="color: yellow;" target="_blank">http://www.yogurtgland.com</a><br style="color: yellow;" /> <a href="http://www.olivejoke.com/" style="color: yellow;" target="_blank">http://www.olivejoke.com/</a><br style="color: yellow;" /> <a href="http://www.turtlebride.com/" style="color: yellow;" target="_blank">http://www.turtlebride.com/</a><br style="color: yellow;" /> <a class="broken_link" href="http://www.cashcrumpet.com/" style="color: yellow;" target="_blank">http://www.cashcrumpet.com/</a><br style="color: yellow;" /> <a href="http://www.swanbike.com/" style="color: yellow;" target="_blank">http://www.swanbike.com/</a><br style="color: yellow;" /> <a class="broken_link" href="http://www.filterdisable.com/" style="color: yellow;" target="_blank">http://www.FilterDisable.com/</a><br style="color: yellow;" /> <a href="http://www.plumfriend.com/" style="color: yellow;" target="_blank">http://www.plumfriend.com/</a><br style="color: yellow;" /> <a href="http://www.clattercup.com/" style="color: yellow;" target="_blank">http://www.clattercup.com/</a><br style="color: yellow;" /> <a href="http://www.gravityguy.com/" style="color: yellow;" target="_blank">http://www.gravityguy.com/</a><br style="color: yellow;" /> <a class="broken_link" href="http://www.crimepuff.com/" style="color: yellow;" target="_blank">http://www.crimepuff.com/</a><br style="color: yellow;" /> <a href="http://www.clubsurfer.com/" style="color: yellow;" target="_blank">http://www.clubsurfer.com/</a><br style="color: yellow;" /> <a href="http://www.grapemouse.com/" style="color: yellow;" target="_blank">http://www.grapemouse.com/</a><br style="color: yellow;" /> <a href="http://www.goldpuddle.com/" style="color: yellow;" target="_blank">http://www.goldpuddle.com/</a><br style="color: yellow;" /> <a href="http://www.fancysportscar.com/" style="color: yellow;" target="_blank">http://www.fancysportscar.com/</a><br style="color: yellow;" /> <a href="http://www.headcross.com/" style="color: yellow;" target="_blank">http://www.headcross.com/</a><br style="color: yellow;" /> <a href="http://www.youngcheese.com/" style="color: yellow;" target="_blank">http://www.youngcheese.com/</a><br style="color: yellow;" /> <a href="http://www.fearbutter.com/" style="color: yellow;" target="_blank">http://www.fearbutter.com/</a><br style="color: yellow;" /> <a href="http://www.leafdrink.com/" style="color: yellow;" target="_blank">http://www.leafdrink.com/</a><br style="color: yellow;" /> <a href="http://www.turtlejar.com/" style="color: yellow;" target="_blank">http://www.turtlejar.com/</a></div>GRITTOMON THOMAShttp://www.blogger.com/profile/05188021683487338390noreply@blogger.com0tag:blogger.com,1999:blog-3634424672785321352.post-86539090028391542052011-02-25T13:52:00.003+05:302011-02-26T22:19:45.914+05:30How To Change Windows 7 Logon Screen Easily<div dir="ltr" style="text-align: left;" trbidi="on">Finally Microsoft has incorporated a new feature in the latest build (7057) of Windows 7 which supports the end user to change the logon screen background without using any hacks or third-party tools.<br />
<a href="http://www.intowindows.com/wp-content/uploads/2009/03/windows7logonbackground.png"><img alt="Windows 7 logon background" border="0" height="147" src="http://www.intowindows.com/wp-content/uploads/2009/03/windows7logonbackground-thumb.png" title="Windows 7 logon background" width="320" /></a><span id="more-299"></span><br />
In previous version of Windows, user had to use third-parry tools like Tune-Up-Utilities to change the logon screen background easily. Windows 7 now supports customization of Windows 7 logon screen officially. Replacing the old logon screen is just another task like changing wallpaper (Desktop background). Thanks to withinwindows for finding out this excellent feature.<br />
Follow the procedure below to change the Windows 7 logon screen.<br />
1. Download the registry file from<b><span style="color: red;"> <a href="http://www.intowindows.com/wp-content/uploads/My%20uploaded%20files/Enable%20Logon%20In%20Windows%207.rar">here</a></span><span style="color: red;">.</span></b> Extract the file and double-click on the file to enable this feature (Alternative method: right-click, select Merge).<br />
2. Now, head over to the following folder:<br />
<b>C:\Windows\System32\oobe</b> (“<b>C</b>” is your Windows Seven Installation drive)<br />
3. Here, create a new folder named <b>Info</b>. Again, create a new folder inside the <b>Info</b> folder and rename it as<b> backgrounds.</b><br />
4. Copy your favorite image file to this folder and rename it as <b>backgroundDefault</b>. Note that the image must be in<b> JPG</b> format and the size should be less than <b>256</b> <b>KB</b>.<br />
5. You are done. Reboot your system and see the change.<br />
The following files (sorted by width-to-height ratio) are supported in <b>C:\Windows\System32\oobe\Info\Backgrounds</b> folder:<br />
* backgroundDefault.jpg<br />
* background768×1280.jpg (0.6)<br />
* background900×1440.jpg (0.625)<br />
* background960×1280.jpg (0.75)<br />
* background1024×1280.jpg (0.8)<br />
* background1280×1024.jpg (1.25)<br />
* background1024×768.jpg (1.33-)<br />
* background1280×960.jpg (1.33-)<br />
* background1600×1200.jpg (1.33-)<br />
* background1440×900.jpg (1.6)<br />
* background1920×1200.jpg (1.6)<br />
* background1280×768.jpg (1.66-)<br />
* background1360×768.jpg (1.770833-)</div>GRITTOMON THOMAShttp://www.blogger.com/profile/05188021683487338390noreply@blogger.com0tag:blogger.com,1999:blog-3634424672785321352.post-50660550520804669812010-11-27T04:56:00.000+05:302010-11-27T05:28:30.830+05:30Speed up BSNL Dataone BroadbandBsnl broadband is a good service, but sometimes it can be very sluggish and slow like hell. If you need to achieve the maximum potential of your broadband connection follow these simple steps.<br />
<br />
Before we start go to<u><i><b> speedtest.net</b></i></u> and test your broadband speed.<br />
<br />
<b>1)</b> First thing you will have to do is change your dns settings and no not open dns, 'open dns' is "crap" when you are connecting from a place like India. change your dns settings to: <i><b>218.248.240.208 & 218.248.240.135<br />
</b></i> <u><b>To change your dns:</b></u><br />
1.Double click on Local Area Connection and select Properties.<br />
2.Select ‘Internet Protocol(TCP/IP)’ and click on Properties.<br />
3.Select ‘Use following IP address’ and enter IP address 192.168.1.100, subnet mask 255.255.255.0, Default gatway 192.168.1.1, Preferred DNS 218.248.240.208 and Alternate DNS as 218.248.240.135<br />
<br />
<br />
<b>2)</b> <u><b>Next go to speedguide.net and download their tcp/ip optimiser then open up tcp/ip optimiser then write down the following settings:</b></u><br />
General Settings tab:<br />
Custom settings - check<br />
Modify All Network Adapters - check<br />
network adapter selection - your NIC<br />
MTU - 1480<br />
TTL - 64<br />
TCP Receive Window - 126720<br />
MTU Discovery - Yes<br />
Black Hole Detect - No<br />
Selective Acks - Yes<br />
Max Duplicate ACKs - 2<br />
TCP 1323 Options:<br />
Windows Scaling - checked<br />
Timestamps - uncheck<br />
<br />
Advanced Settings tab:<br />
Max Connections per Server - 10<br />
Max Connections per 1.0 Server - 20<br />
LocalPriority - 1<br />
Host Priority - 1<br />
DNSPriority - 1<br />
NetbtPriority - 1<br />
Lan Browsing speedup - optimized<br />
QoS: NonBestEffortLimit - 0<br />
ToS: DisableUserTOSSetting - 0<br />
ToS: DefaultTOSValue - 136<br />
MaxNegativeCacheTtl - 0<br />
NetFailureCacheTime - 0<br />
NegativeSOACache Time - 0<br />
LAN Request Buffer Size - 32768<br />
Then select "Apply Changes" and reboot to take effect<br />
<br />
Use the following with TCP Optimizer for 512 kbps:<br />
<br />
General Settings tab:<br />
Custom settings - check<br />
Modify All Network Adapters - check<br />
network adapter selection - your NIC<br />
MTU - 1480<br />
TTL - 64<br />
TCP Receive Window - 31680<br />
MTU Discovery - Yes<br />
Black Hole Detect - No<br />
Selective Acks - Yes<br />
Max Duplicate ACKs - 2<br />
TCP 1323 Options:<br />
Windows Scaling - uncheck<br />
Timestamps - uncheck<br />
<br />
Advanced Settings tab:<br />
Max Connections per Server - 10<br />
Max Connections per 1.0 Server - 20<br />
LocalPriority - 1<br />
Host Priority - 1<br />
DNSPriority - 1<br />
NetbtPriority - 1<br />
Lan Browsing speedup - optimized<br />
QoS: NonBestEffortLimit - 0<br />
ToS: DisableUserTOSSetting - 0<br />
ToS: DefaultTOSValue - 136<br />
MaxNegativeCacheTtl - 0<br />
NetFailureCacheTime - 0<br />
NegativeSOACache Time - 0<br />
LAN Request Buffer Size - 32768<br />
Then select "Apply Changes" and reboot to take effect<br />
(You can also try using SpeedConnect Internet.Accelerator which is fully-automated,to download it go to megadownload.net and type speed connect)<br />
<br />
<br />
<b>3)<u> XP reserve 20% of the bandwidth :heres how to disable it</u></b><br />
1. make sure your logged on as actually "<b>Administrator</b>". Do not log on with any account that just has administrator privileges.<br />
2. start - run - type<i><b> gpedit.msc</b></i><br />
3. expand the "<i><b>local computer policy</b></i>" branch<br />
4. expand the "<i><b>administrative templates</b></i>" branch<br />
5. expand the "<i><b>network branch</b></i>"<br />
6. Highlight the "<i><b>QoS Packet Scheduler</b></i>" in left window<br />
7. in right window double click the "<i><b>limit reservable bandwidth</b></i>" setting<br />
8. on setting tab check the "<i><b>enabled</b></i>" item<br />
9. where it says "<i><b>Bandwidth limit %" change it to read 0</b></i><br />
10. <i><b>Reboot </b></i>if you want to but not necessary on some systems your all done. Effect is immediate on some systems. some need re-boot. I have one machine that needs to reboot first, the others didn't. Don't know why this is.<br />
<br />
<br />
<b>4)<u> Disable unnecessary services:</u></b><br />
Go to network connections>Local Area Connection right click select properties &<i><b> disable client for microsoft networks, file & printer.......,qos packet scheduler.</b></i> If you have other lan cards /adapters which is not in use. Right click it, and uncheck all of the boxes even the internet protocol(tcp/ip)<br />
5.get spyware doctor and scan for spywares and adwares everyday.<br />
6.get a registry fixing tool and scan for registry problems.<br />
7.Delete temporary files regularly. Try using cc cleaner.<br />
<br />
Now again go to<u><i><b> speedtest.net</b></i></u> and test your speed i am sure now you get twice the speed you got last timeGRITTOMON THOMAShttp://www.blogger.com/profile/05188021683487338390noreply@blogger.com0tag:blogger.com,1999:blog-3634424672785321352.post-18981839721766059252010-03-12T03:02:00.000+05:302010-03-12T03:02:02.454+05:30Add Music in Orkut Profile<span class="Apple-style-span" style="-webkit-border-horizontal-spacing: 2px; -webkit-border-vertical-spacing: 2px; border-collapse: collapse; font-family: arial; font-size: 13px;"><b><i>Hi friends,</i></b></span><br />
<div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b><i> Here is the simple trick to add music in your okrut profile.</i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b><i><br />
</i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b>Step 1 :<i> Open your Notepad.</i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b>Step 2 :<i> Paste this :- <span class="Apple-style-span" style="font-weight: normal;"><span class="Apple-style-span" style="font-style: normal;"><embed src="http://i134.photobucket.com/albums/q113/Zackuzt/mediaplayer.swf" allowfullscreen="false" flashvars="http://www.123musiq.com/SOURCE/Malayalam/Aarya2/03%20-%20My%20Love%20Is%20Gone%20-%20Alex.mp3de=redirect.mp3&height=1&width=1&showeq=false&autostart=true&repeat=true&shuffle=false&volume=100" height="1" width="1"></embed></span></span></i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><br />
</div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b>Step 3 :<i> Save it as music.htm</i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b>Step 4 :<i> Open "music.htm" in your browser</i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b>Step 5 :<i> Goto Edit -> Select All.</i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b>Step 6 :<i> Goto Edit -> Copy.</i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b>Step 7 :<i> Open your New Orkut.</i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b>Step 8 :<i> Click on edit for about me.</i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b>Step 9 :<i> Paste there.</i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b>Step 10 :<i> Save it.</i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b><i><br />
</i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b>Note:-<span class="Apple-style-span" style="font-style: italic;"></span></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b><span class="Apple-style-span" style="font-style: italic;">You can't see anything when you paste on about me.</span></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b><i><br />
</i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b><i><br />
</i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b>Change the Song<i>:-</i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b><i>Remove this link :- <span class="Apple-style-span" style="font-style: normal; font-weight: normal;">http://www.123musiq.com/SOURCE/Malayalam/Aarya2/03%20-%20My%20Love%20Is%20Gone%20-%20Alex.mp3de=redirect.mp3</span></i></b></div><b><i>And paste the mp3 link of your favorite music.</i></b><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b><i><br />
</i></b></div><b>Note:-</b><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b><i>Only mp3 files works.</i></b><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b><i>Need music files with mp3 extension.</i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b><i><br />
</i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b>Websites for Musics:-</b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b><i>Airmp3.com</i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b><i>123musiq.com</i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b><i>songs.pk</i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b><i>apunkabollywood.com</i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b><i>etc......</i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b><i><br />
</i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b>See this Orkut Profile :-</b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;">http://www.orkut.co.in/Main#Profile?uid=5806723742392194203</div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><br />
</div><b>Need more help :-</b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b><i>grittothegenius@gmail.com</i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b><i><br />
</i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b><i>http://grittothomas.blogspot.com</i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b><i><br />
</i></b></div><div style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative;"><b><i>+919995290008</i></b></div><div><b><i><br />
</i></b></div>GRITTOMON THOMAShttp://www.blogger.com/profile/05188021683487338390noreply@blogger.com0tag:blogger.com,1999:blog-3634424672785321352.post-34436843531450849802010-03-09T18:54:00.003+05:302011-03-04T13:15:46.372+05:30Bypass Youtube Age Verification<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-TWjC81Id9C3Cj6nacPTz-984qBgIZxT2riTodDah955aDCr4igg7zBFpjBOg5Dzb1C5esyD_7HfvMLF5Z4gdqz74d51zkMBAbc9h-TkRTx70dUOucbyAFqxFxy5BmpRviwmu5UcBYATk/s1600/e40d5f0e89enough.png.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="206" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-TWjC81Id9C3Cj6nacPTz-984qBgIZxT2riTodDah955aDCr4igg7zBFpjBOg5Dzb1C5esyD_7HfvMLF5Z4gdqz74d51zkMBAbc9h-TkRTx70dUOucbyAFqxFxy5BmpRviwmu5UcBYATk/s400/e40d5f0e89enough.png.png" width="400" /></a></div><br />
Youtube uses a flag system that allows users to report videos as inappropriate which according to Youtube means any violation of the Youtube terms of service. A flagged video will be reviewed by an administrator who has numerous options at hand including setting the flag for age verification which requires users to login before they can view the video. Age verification is pretty basic and anyone who cheated on his birthday can watch the video after logging in.<br />
<br />
The message that gets displayed when a user who is not logged in loads a video with age verification is the following: “This video or group may contain content that is inappropriate for some users, as flagged by YouTube’s user community. To view this video or group, please verify you are 18 or older by signing in or signing up.”<br />
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbp25oO9qAQBTvx36715c9sl2wtdvHUvCtX1aE_3-BBI6bMkapsoaR8xjqGAmlmhjXB1JeXdo-wynPD9Kj8NZKeGmlKigCiI5fgBjA6smSnzqI2F-18ztBSts6jix1m9ewA4Do_nAwoiTj/s1600/bypass%252Byou%252Btube%252Bage%252Bverification.JPG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="96" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjbp25oO9qAQBTvx36715c9sl2wtdvHUvCtX1aE_3-BBI6bMkapsoaR8xjqGAmlmhjXB1JeXdo-wynPD9Kj8NZKeGmlKigCiI5fgBjA6smSnzqI2F-18ztBSts6jix1m9ewA4Do_nAwoiTj/s320/bypass%252Byou%252Btube%252Bage%252Bverification.JPG" width="320" /></a>Numerous ways to bypass that age verification check have been posted which included using caches and proxies. The Firefox extension "<span style="font-size: small;"><i><b><span style="color: red;">You Old Enough</span></b></i></span>" provides users with another way. The experimental add-on will check if the video on Youtube is flagged for age verification and open it immediately in apopup window.<br />
<br />
</div>GRITTOMON THOMAShttp://www.blogger.com/profile/05188021683487338390noreply@blogger.com0tag:blogger.com,1999:blog-3634424672785321352.post-10231971080696902992010-02-05T01:04:00.004+05:302010-02-05T01:38:51.263+05:30Free Airtel GPRS From Your Mobile Or PC<span style="text-decoration: underline;"><b>Requirements</b>: </span><br />
<span style="text-decoration: underline;"><br />
</span><br />
<span class="post_content">You require a PC or a Laptop and Serial/USB cable OR Infrared Device OR <span class="IL_AD" id="IL_AD11">Bluetooth dongle</span> in order to first connect your phone with your computer.</span><br />
<span class="post_content"><br />
</span><br />
<span style="text-decoration: underline;"><b>Step By Step Procedure: </b></span><br />
<span style="text-decoration: underline;"><b><br />
</b></span><br />
1)First Activate Airtel Live!( It is FREE).<br />
<br />
<span id="more-31"></span><br />
2) Create TWO <span class="IL_AD" id="IL_AD4">Airtel gprs</span> data accounts in your mobile and set the<br />
<span class="IL_AD" id="IL_AD6">FIRST one</span> as the active profile.<br />
<br />
3)Connect your phone with your <span class="IL_AD" id="IL_AD10">connectivity cable</span> using blutooth dongle or usb/serial cable.<br />
<br />
4) Go to control panel and create a new <span class="IL_AD" id="IL_AD3">dial up connection</span>. <br />
Connection Device : Your mobile’s modem<br />
ISP Name : Anything you want to enter. <br />
Phone Number : Your mobile number.<br />
Password: blank<br />
<br />
5) Now setup your browser at your pc to use the proxy<br />
100.1.200.99 and port 8080.<br />
<br />
6) Connect to the dial-up account.<br />
<br />
7) Try on your mobile and access any site. You will get “Access<br />
Denied…”. Keep the mobile down.<br />
<br />
8 ) On the PC ( or Laptop) open your browser, enter any address ,<br />
press ENTER and WAIT for some minutes.<br />
<br />
9) That’s it done ! now you can open any page on your pc for free.<br />
I hope these settings may work please let me know if you have any problem by leaving a comment here.GRITTOMON THOMAShttp://www.blogger.com/profile/05188021683487338390noreply@blogger.com0tag:blogger.com,1999:blog-3634424672785321352.post-55495786867140473012010-02-05T01:00:00.000+05:302010-02-05T01:38:51.263+05:30AirTel Free Miss Call Alert !Kerala : call *62*+91567#<br />
<br />
Tamil Nadu : *62*+919894035100#<br />
<br />
Mumbai : *62*+91560#<br />
<br />
Maharashtra : *62*+91560#<br />
<br />
Gujarat : *62*+91567#<br />
<br />
Tested in Kerala, Working.GRITTOMON THOMAShttp://www.blogger.com/profile/05188021683487338390noreply@blogger.com0tag:blogger.com,1999:blog-3634424672785321352.post-60106327709130164212010-02-05T00:49:00.001+05:302010-03-09T18:57:38.708+05:30Remove Password Without Current Password In XP !<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy5cteFLBL6EMnD5KGYXhcTperYyPtcYM9pzLFOCQgonAz_2L8X6k2tQtmN2gwgskqGmP_p95e36avid4OD47AHDlNICxG-J7-jSCgx13WlsSVUBBN8z1HGzvl2A6Sj7KgBxZmClOjarMU/s1600-h/screenshot+of+cmd.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy5cteFLBL6EMnD5KGYXhcTperYyPtcYM9pzLFOCQgonAz_2L8X6k2tQtmN2gwgskqGmP_p95e36avid4OD47AHDlNICxG-J7-jSCgx13WlsSVUBBN8z1HGzvl2A6Sj7KgBxZmClOjarMU/s320/screenshot+of+cmd.jpg" width="320" /></a></div><ul><li>Press Win + R -> type cmd.exe in Run -></li>
<li style="text-align: left;">Type net users and hit enter.</li>
<li>CMD will shows the User Accounts in the system.</li>
<li>If you want reset administrator password then type net users "administrator" * and hit enter 3 times.</li>
<li>Now Administrator is free without password.</li>
</ul>GRITTOMON THOMAShttp://www.blogger.com/profile/05188021683487338390noreply@blogger.com0tag:blogger.com,1999:blog-3634424672785321352.post-34591771574637920702010-02-05T00:19:00.000+05:302010-03-09T18:57:51.405+05:30Simple Trick in Windows XP : Login Without PasswordBoot your XP -> [Logon screen] Press CTRL + ALT + DEL -> [Classic View of Logon Screen] User Name : administrator _ Password : [nothing] -> Hit Enter.<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;"></div>GRITTOMON THOMAShttp://www.blogger.com/profile/05188021683487338390noreply@blogger.com0tag:blogger.com,1999:blog-3634424672785321352.post-21913007326092771662010-02-04T21:19:00.000+05:302010-02-04T21:29:02.365+05:30Some Hoax Messages<b>Version 1<br />
To: ALL ORANGE USERS</b><br />
<br />
<br />
If you receive a phone call and your mobiles phone displays ACE-? on the screen DON'T ANSWER THIS CALL - END THE CALL IMMEDIATELY. IF YOU<br />
ANSWER THE CALL, YOUR PHONE WILL BE INFECTED BY THIS VIRUS. This virus will erase all IMEI and IMSI information from both your phone and your SIM card, which will make your phone unable to connect with the telephone network. You will have to buy a new phone. ? This information has been confirmed by both Motorola and Nokia. There are over 3 million mobile phones being infected by this virus in USA now.<br />
<br />
You can also check this news in the CNN web site. ?<br />
<br />
Please forward this piece of information to all your friends<br />
<br />
Warm Regards,<br />
<br />
<b>Version 2<br />
Dear all mobile phone's owners,</b><br />
<br />
ATTENTION!!!<br />
<br />
NOW THERE IS A VIRUS ON MOBILE PHONE SYSTEM..<br />
<br />
All mobile phone in DIGITAL system can be infected by this virus..If you receive a phone call and your phone display "UNAVAILABLE" on the screen (for most of digital mobile phones with a function to display in-coming call telephone number), DON'T ANSWER THE CALL. END THE CALL IMMEDIATELY!!!BECAUSE IF YOU ANSWER THE CALL, YOUR PHONE WIL L BE INFECTED BY THIS VIRUS.. This virus will erase all IMIE and IMSI information from both your phone and your SIM card which will make your phone unable to connect with the telephone network. You will have to buy a new phone.<br />
<br />
This information has been confirmed by both Motorola and Nokia..<br />
For more information, please visit Motorola or Nokia web sites:<br />
http:/ /www.mot.com<br />
http:/ /www.mot.com or http:/ /www.nokia.com<br />
<br />
<br />
There are over 3 million mobile phone being infected by this virus in USA now. You can also check this news in CNN web site: http://www.cnn.com..<br />
<br />
Please forward this information to all your friends who have digital mobile phones..GRITTOMON THOMAShttp://www.blogger.com/profile/05188021683487338390noreply@blogger.com0