This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Hack ur brain

Health

1. Shake a leg. Lack of blood flow is a common reason for lack of concentration. If you've been sitting in one place for awhile, bounce one of your legs for a minute or two. It gets your blood flowing and sharpens both concentration and recall.
2. Food for thought: Eat breakfast. A lot of people skip breakfast, but creativity is often optimal in the early morning and it helps to have some protein in you to feed your brain. A lack of protein can actually cause headaches.
3. Food for thought, part 2: Eat a light lunch. Heavy lunches have a tendency to make people drowsy. While you could turn this to your advantage by taking a "thinking nap" (see #23), most people haven't learned how.
4. Cognitive enhancers: Ginkgo biloba. Ginkgo biloba is a natural supplement that has been used in China and other countries for centuries and has been reputed to reverse memory loss in rats. It's also suggested by some health practitioners as a nootrope and thus a memory enhancer.
5. Reduce stress + depresssion. Stress and depression may reduce the ability to recall information and thus inhibit learning. Sometimes, all you need to reduce depression is more white light and fewer refined foods.

Balance

6. Sleep on it. Dr. Maxwell Maltz wrote about in his book Psycho-Cybernetics about a man who was was paid good money to come up with ideas. He would lock his office door, close the blinds, turn off the lights. He'd focus on the problem at hand, then take a short nap on a couch. When he awoke, he usually had the problem solved.
7. Take a break. Change phyical or mental perspective to lighten the invisible stress that can sometimes occur when you sit in one place too long, focused on learning. Taking a 5-15 minute break every hour during study sessions is more beneficial than non-stop study. It gives your mind time to relax and absorb information. If you want to get really serious with breaks, try a 20 minute ultradian break as part of every 90 minute cycle. This includes a nap break, which is for a different purpose than #23.
8. Take a hike. Changing your perspective often relieves tension, thus freeing your creative mind. Taking a short walk around the neighborhood may help.
9. Change your focus. Sometimes there simply isn't enough time to take a long break. If so, change subject focus. Alternate between technical and non-technical subjects.

Perspective and Focus

10. Change your focus, part 2. There are three primary ways to learn: visual, kinesthetic, and auditory. If one isn't working for you, try another.
11. Do walking meditation. If you're taking a hike (#25), go one step further and learn walking meditation as a way to tap into your inner resources and your strengthen your ability to focus. Just make sure you're not walking inadvertently into traffic.
12. Focus and immerse yourself. Focus on whatever you're studying. Don't try to watch TV at the same time or worry yourself about other things. Anxiety does not make for absorption of information and ideas.
13. Turn out the lights. This is a way to focus, if you are not into meditating. Sit in the dark, block out extraneous influences. This is ideal for learning kinesthetically, such as guitar chord changes.
14. Take a bath or shower. Both activities loosen you up, making your mind more receptive to recognizing brilliant ideas.

Recall Techniques

15. Listen to music. Researchers have long shown that certain types of music are a great "key" for recalling memories. Information learned while listening to a particular song or collection can often be recalled simply by "playing" the songs mentally.
16. Speedread. Some people believe that speedreading causes you to miss vital information. The fact remains that efficient speedreading results in filtering out irrelevant information. If necessary, you can always read and re-read at slower speeds. Slow reading actually hinders the ability to absorb general ideas. (Although technical subjects often requirer slower reading.) If you're reading online, you can try the free Spreeder Web-based application.
17. Use acronyms and other mnemonic devices. Mnemonics are essentially tricks for remembering information. Some tricks are so effective that proper application will let you recall loads of mundane information years later.

Visual Aids

18. Every picture tells a story. Draw or sketch whatever it is you are trying to achieve. Having a concrete goal in mind helps you progress towards that goal.
19. Brainmap it. Need to plan something? Brain maps, or mind maps, offer a compact way to get both an overview of a project as well as easily add details. With mind maps, you can see the relationships between disparate ideas and they can also act as a receptacle for a brainstorming session.
20. Learn symbolism and semiotics. Semiotics is the study of signs and symbols. Having an understanding of the symbols of a particular discipline aids in learning, and also allows you to record information more efficiently.
21. Use information design. When you record information that has an inherent structure, applying information design helps convey that information more clearly. A great resource is Information Aesthetics, which gives examples of information design and links to their sources.
22. Use visual learning techniques. Try gliffy for structured diagrams. Also see Inspiration.com for an explanation of webs, idea maps, concept maps, and plots.
23. Map your task flow. Learning often requires gaining knowledge in a specific sequence. Organizing your thoughts on what needs to be done is a powerful way to prepare yourself to complete tasks or learn new topics.

Verbal and Auditory Techniques

24. Stimulate ideas. Play rhyming games, utter nonsense words. These loosen you up, making you more receptive to learning.
25. Brainstorm. This is a time-honored technique that combines verbal activity, writing, and collaboration. (One person can brainstorm, but it's more effective in a group.) It's fruitful if you remember some simple rules: Firstly, don't shut anyone's idea out. Secondly, don't "edit" in progress; just record all ideas first, then dissect them later. Participating in brainstorming helps assess what you already know about something, and what you didn't know.
26. Learn by osmosis. Got an iPod? Record a few of your own podcasts, upload them to your iPod and sleep on it. Literally. Put it under your pillow and playback language lessons or whatever.
27. Cognitive enhancers: binaural beats. Binaural beats involve playing two close frequencies simultaneously to produce alpha, beta, delta, and theta waves, all of which produce either sleeping, restfulness, relaxation, meditativeness, alertness, or concentration. Binaural beats are used in conjunction with other excercises for a type of super-learning.
28. Laugh. Laughing relaxes the body. A relaxed body is more receptive to new ideas.

Kinesthetic Techniques

29. Write, don't type. While typing your notes into the computer is great for posterity, writing by hand stimulates ideas. The simple act of holding and using a pen or pencil massages acupuncture points in the hand, which in turn stimulates ideas.
30. Carry a quality notebook at all times. Samuel Taylor Coleridge dreamed the words of the poem "In Xanadu (did Kubla Khan)...". Upon awakening, he wrote down what he could recall, but was distracted by a visitor and promptly forgot the rest of the poem. Forever. If you've been doing "walking meditation" or any kind of meditation or productive napping, ideas may suddenly come to you. Record them immediately.
31. Keep a journal. This isn't exactly the same as a notebook. Journaling has to do with tracking experiences over time. If you add in visual details, charts, brainmaps, etc., you have a much more creative way to keep tabs on what you are learning.
32. Organize. Use sticky colored tabs to divide up a notebook or journal. They are a great way to partition ideas for easy referral.
33. Use post-it notes. Post-it notes provide a helpful way to record your thoughts about passages in books without defacing them with ink or pencil marks.

Self-Motivation Techniques

34. Give yourself credit. Ideas are actually a dime a dozen. If you learn to focus your mind on what results you want to achieve, you'll recognize the good ideas. Your mind will become a filter for them, which will motivate you to learn more.
35. Motivate yourself. Why do you want to learn something? What do want to achieve through learning? If you don't know why you want to learn, then distractions will be far more enticing.
36. Set a goal. W. Clement Stone once said "Whatever the mind of man can conceive, it can achieve." It's an amazing phenomenon in goal achievement. Prepare yourself by whatever means necessary, and hurdles will seem surmountable. Anyone who has experienced this phenomenon understands its validity.
37. Think positive. There's no point in setting learning goals for yourself if you don't have any faith in your ability to learn.
38. Organize, part 2. Learning is only one facet of the average adult's daily life. You need to organize your time and tasks else you might find it difficult to fit time in for learning. Try Neptune for a browser-based application for "getting things done."
39. Every skill is learned. With the exception of bodily functions, every skill in life is learned. Generally speaking, if one person can learn something, so can you. It may take you more effort, but if you've set a believable goal, it's likely an achievable goal.
40. Prepare yourself for learning. Thinking positive isn't sufficient for successfully achieving goals. This is especially important if you are an adult, as you'll probably have many distractions surrounding your daily life. Implement ways to reduce distractions, at least for a few hours at a time, else learning will become a frustrating experience.
41. Prepare yourself, part 2. Human nature is such that not everyone in your life will be a well-wisher in your self-improvement and learning plans. They may intentionally or subconsciously distract you from your goal. If you have classes to attend after work, make sure that work colleagues know this, that you are unable to work late. Diplomacy works best if you think your boss is intentionally giving you work on the days he/she knows you have to leave. Reschedule lectures to a later time slot if possible/ necessary.
42. Constrain yourself. Most people need structure in their lives. Freedom is sometimes a scary thing. It's like chaos. But even chaos has order within. By constraining yourself — say giving yourself deadlines, limiting your time on an idea in some manner, or limiting the tools you are working with — you can often accomplish more in less time.

Supplemental Techniques

43. Read as much as you can. How much more obvious can it get? Use Spreeder (#33) if you have to. Get a breadth of topics as well as depth.
44. Cross-pollinate your interests. Neurons that connect to existing neurons give you new perspectives and abilities to use additional knowledge in new ways.
45. Learn another language. New perspectives give you the ability to cross-pollinate cultural concepts and come up with new ideas. As well, sometimes reading a book in its original language will provide you with insights lost in translation.
46. Learn how to learn. Management Help has a resource page, as does SIAST (Virtual Campus), which links to articles about learning methods. They are geared towards online learning, but no doubt you gain something from them for any type of learning. If you are serious about optimum learning, read Headrush's Crash course in learning theory.
47. Learn what you know and what you don't. Many people might say, "I'm dumb," or "I don't know anything about that." The fact is, many people are wholly unaware of what they already know about a topic. If you want to learn about a topic, you need to determine what you already know, figure out what you don't know, and then learn the latter.
48. Multi-task through background processes. Effective multi-tasking allows you to bootstrap limited time to accomplish several tasks. Learning can be bootstrapped through multi-tasking, too. By effective multitasking, I don't mean doing two or more things at exactly the same time. It's not possible. However, you can achieve the semblance of effective multitasking with the right approach, and by prepping your mind for it. For example, a successful freelance writer learns to manage several articles at the same time. Research the first essay, and then let the background processes of your mind takeover. Move on consciously to the second essay. While researching the second essay, the first one will often "write itself." Be prepared to record it when it "appears" to you.
49. Think holistically. Holistic thinking might be the single most "advanced" learning technique that would help students. But it's a mindset rather than a single technique.
50. Use the right type of repetition. Complex concepts often require revisting in order to be fully absorbed. Sometimes, for some people, it may actually take months or years. Repetition of concepts and theory with various concrete examples improves absorption and speeds up learning.
51. Apply the Quantum Learning (QL) model. The Quantum Learning model is being applied in some US schools and goes beyond typical education methods to engage students.
52. Get necessary tools. There are obviously all kinds of tools for learning. If you are learning online like a growing number of people these days, then consider your online tools. One of the best tools for online research is the Firefox web browser, which has loads of extensions (add-ons) with all manner of useful features. One is Googlepedia, which simultaneously displays Google search engine listings, when you search for a term, with related entries from Wikipedia.
53. Get necessary tools, part 2. This is a very niche tip, but if you want to learn fast-track methods for building software, read Getting Real from 37 Signals. The Web page version is free. The techniques in the book have been used to create Basecamp, Campfire, and Backpack web applications in a short time frame. Each of these applications support collaboration and organization.
54. Learn critical thinking. As Keegan-Michael Key's character on MadTV might say, critical thinking takes analysis to "a whole notha level". Read Wikipedia's discourse on critical thinking as a starting point. It involves good analytical skills to aid the ability to learn selectively.
55. Learn complex problem solving. For most people, life is a series of problems to be solved. Learning is part of the process. If you have a complex problem, you need to learn the art of complex problem solving. [The latter page has some incredible visual information.]

For Teachers, Tutors, and Parents

56. Be engaging. Lectures are one-sided and often counter-productive. Information merely heard or witnessed (from a chalkboard for instance) is often forgotten. Teaching is not simply talking. Talking isn't enough. Ask students questions, present scenarios, engage them.
57. Use information pyramids. Learning happens in layers. Build base knowledge upon which you can add advanced concepts.
58. Use video games. Video games get a bad rap because of certain violent games. But video games in general can often be an effective aid to learning.
59. Role play. Younger people often learn better by being part of a learning experience. For example, history is easier to absorb through reenactments.
60. Apply the 80/20 rule. This rule is often interpreted in dfferent ways. In this case, the 80/20 rule means that some concepts, say about 20% of a curriculum, require more effort and time, say about 80%, than others. So be prepared to expand on complex topics.
61. Tell stories. Venus Flytrap, a character from the sitcom WKRP in Cincinnati, once taught a student gang member about atoms, electrons, and protons by saying that an atom was one big neighborhood, and the protons and neutrons had their own smaller neighborhoods and never mixed. Just like rival gangs. The story worked, and understanding sparked in the students eyes.
62. Go beyond the public school curriculum. The public school system is woefully lacking in teaching advanced learning and brainstorming methods. It's not that the methods cannot be taught; they just aren't. To learn more, you have to pay a premium in additional time and effort, and sometimes money for commercially available learning tools. There's nothing wrong with that in itself, but what is taught in schools needs to be expanded. This article's author has proven that a nine-year old can learn (some) university level math, if the learning is approached correctly.
63. Use applied learning. If a high school student were having trouble in math, say with fractions, one example of applied learning might be photography, lenses, f-stops, etc. Another example is cooking and measurement of ingredients. Tailor the applied learning to the interest of the student.

For Students and Self-Studiers

64. Be engaged. Surprise. Sometimes students are bored because they know more than is being taught, maybe even more than a teacher. (Hopefully teachers will assess what each student already knows.) Students should discuss with a teacher if they feel that the material being covered is not challenging. Also consider asking for additional materials.
65. Teach yourself. Teachers cannot always change their curricula. If you're not being challenged, challenge yourself. Some countries still apply country-wide exams for all students. If your lecturer didn't cover a topic, you should learn it on your own. Don't wait for someone to teach you. Lectures are most effective when you've pre-introduced yourself to concepts.
66. Collaborate. If studying by yourself isn't working, maybe a study group will help.
67. Do unto others: teach something. The best way to learn something better is to teach it to someone else. It forces you to learn, if you are motivated enough to share your knowledge.
68. Write about it. An effective way to "teach" something is to create an FAQ or a wiki containing everything you know about a topic. Or blog about the topic. Doing so helps you to realize what you know and more importantly what you don't. You don't even have to spend money if you grab a freebie account with Typepad, Wordpress, or Blogger.
69. Learn by experience. Pretty obvious, right? It means put in the necessary time. An expert is often defined as someone who has put in 10,000 hours into some experience or endeavor. That's approximately 5 years of 40 hours per week, every week. Are you an expert without realizing it? If you're not, do you have the dedication to be an expert?
70. Quiz yourself. Testing what you've learned will reinforce the information. Flash cards are one of the best ways, and are not just for kids.
71. Learn the right things first. Learn the basics. Case in point: a frustrating way to learn a new language is to learn grammar and spelling and sentence constructs first. This is not the way a baby learns a language, and there's no reason why an adult or young adult has to start differently, despite "expert" opinion. Try for yourself and see the difference.
72. Plan your learning. If you have a long-term plan to learn something, then to quote Led Zeppelin, "There are two paths you can go by." You can take a haphazard approach to learning, or you can put in a bit of planning and find an optimum path. Plan your time and balance your learning and living.

Parting Advice

73. Persist. Don't give up learning in the face of intimdating tasks. Anything one human being can learn, most others can as well. Wasn't it Einstein that said, "Genius is 1% inspiration and 99% perspiration"? Thomas Edison said it, too.
74. Defy the experts. Dyslexia, in a nutshell, is the affliction of mentally jumbling letters and digits, causing difficulties in reading, writing and thus learning. Sometimes spoken words or numbers get mixed up as well. In the past, "experts" declared dyslexic children stupid. Later, they said they were incapable of learning. This author has interacted with and taught dyslexic teens. It's possible. Helen Keller had no experience of sight, sound, or speech, and yet she learned. Conclusion: There is more than one way to learn; never believe you cannot.
75. Challenge yourself. People are often more intelligent than they realize. In a world that compartmentalizes and categorizes everything, not everyone is sure where they fit in. And genius can be found in many walks of life. If you honestly suspect that there's more to you than has been "allowed" to be let out, try an IQ test such as the one offered by MENSA. It's unlike the standardized IQ tests given in many schools. You know the kind — the ones which traumatize many young students into thinking they are stupid, simply because the tests don't really assess all student's knowledge and learning ability. And the ability to learn is far, far more important than what you already know.
76. Party before an exam. Well, don't go that far. The key is to relax. The worse thing to do is cram the night before an exam. If you don't already know a subject by then, cramming isn't going to help. If you have studied, simply review the topic, then go do something pleasant (no more studying). Doing so tells your brain that you are prepared and that you will be able to recall anything that you have already learned. On the other hand, if you didn't spend the semester learning the ideas you need, you might as well go party anyways because cramming at the last minute isn't going to help much at that point.
77. Don't worry; learn happy. Have a real passion for learning and want to share that? Join a group such as the Joyful Jubilant Learning community [via LifeHack].

Hack BSNL Broadband for Speed


If you are a BSNL broadband user, chances are that you are facing frequent DNS issues. Their DNS servers are just unresponsive. The look up takes a long duration and many times just time out. The solution? There is small hack on BSNL for this. Use third party DNS servers instead of BSNL DNS servers or run your own one like djbdns. The easiest options is to use OpenDNS. Just reconfigure your network to use the following DNS servers:


208.67.222.222

208.67.220.220


Detailed instructions specific to operating system or your BSNL modem are available in the OpenDNS website itself. After I reconfigured my BSNL modem to use the above 2 IP addresses, my DNS problems just vanished! Other ‘freebies’ that come with OpenDNS are phishing filters and automatic URL correction. Even if your service provider’s DNS servers are working fine, you can still use OpenDNS just for these two special features.After you hack BSNL DNS servers, you will see a noticeable improvement in your broadband speed.

Bypassing Vista SP1 Windows Genuine Advantage


The fact that Microsoft has relaxed its antipiracy mechanism built into Windows Vista concomitantly with the release of Service Pack 1 failed to stop hackers from providing a crack for the latest version of Windows Genuine Advantage Validation.


Various reports point out that Genuine Advantage Validation and Notifications versions 1.7.69.1 (1.7.0069.1) and 1.7.69.2 released in March 2008, following the March 18 availability of Windows Vista SP1 through Windows Update and the Microsoft Download Center, have been cracked.


The workaround is designed to be integrated with pirated copies of Windows XP and Windows Vista in order to render useless the WGA Validation mechanism. According to the reports, applying the WGA crack will permit users of counterfeit versions of Windows to access and download items from Windows Update, Microsoft Download Center and Microsoft Update. The pirated operating systems with the cracked WGA will pass all validations on Microsoft’s websites and offer anything from updates to applications that are restricted to users of genuine operating systems only.


With the release of Windows Vista SP1, Microsoft has scrapped the Reduced Functionality Mode kill switch in its latest operating system. Users of pirated Vista, just as those of XP and Windows Server 2008 will only be informed of the fact that their operating system is no longer genuine. However, pirated versions of Windows are automatically blocked from downloading certain free applications as well as all updates except those labeled Critical. The WGA crack is designed to fix that.


“After the activation grace period has been exceeded the next logon will present the user with a message that directs the customer to activate that copy of Windows. That dialog includes a fifteen second delay before it can be dismissed. If they want to skip activation at that time they can wait for the fifteen seconds and choose “Activate Later” .

But the new story is different.That is Vista SP1 has been cracked successfully and it’s possible to bypass the Windows Genuine Advantage to fool the OS to beleive it as genuine.The release of Service Pack 1 for Vista seems to put no combat against piracy.This crack is available for download on this site.


MORE INFORMATION ON THE CRACK(ACTIVATOR)


VistaSP1_1-Click Activator

Unlike other cracks eg: Vista Loader 3.0.0.1(which has some known issues with the dual boot systems) this crack has been designed to work on dual boot systems.

This crack has incorporated an automated installation process which makes it easy to install.You can select from 4 OEM Logos and licenses during the installation process and within a few seconds your copy will be activated.You can see the system activated upon restart.



This crack also features an uninstallation process which most of the cracks lack the same.Using this, it is not necessary to carry out the manual uninstallation process.You can just uninstall the crack with a single click.


PLEASE FOLLOW THESE INSTRUCTIONS BEFORE APPLYING THIS CRACK.


1.YOU MUST HAVE FULL ADMINISTRATOR RIGHTS TO INSTALL THIS CRACK.


2.TURN OFF USER ACCOUNT CONTROL(UAC) BEFORE INSTALLING THIS CRACK.


3.THIS CRACK CURRENTLY HAS BEEN TESTED ONLY ON 32-BIT ULTIMATE EDITION OF WINDOWS VISTA.


4.EASY ONE CLICK ACTIVATOR.


5.YOU CAN ALSO USE THIS CRACK TO UNINSTALL THE ACTIVATOR.

ENJOY!!!


Here is the download link for the crack

DOWNLOAD


Please post your feedback through comments.

File Embedder Project in C

Some times it is necessary for our compiled project to have it’s supporting files embedded within the EXE module itself so that the supporting files may not be put into a seperate folder and carried along with the project.So here i am presenting you with the source code of the FILE EMBEDDER UTILITY project.

This utility can be used to embed one file with in the other.ie:Suppose we need to embed a .bat file(or any other file *.exe,*bmp,.txt…..) into our final project so that the batch file is present with in the compiled module and is hidden from the users avoiding tthe need to carry the .bat file every time with the project.

Both the Embedding and extraction process has been presented in seperate functions for your convenience.here’s the code…..

#include
#include
#include
#include
#include
#include
#include

void embed(void);
void extract(void);

char buff[1],sname[128],tname[128],dname[128],choice;
unsigned long int size=0;long int psize=0;int outh,bytes=0;
FILE *source,*target,*data;

void main()
{
while(1)
{
clrscr();
puts(”\n\n\t\t\tFILE EMBEDDING UTILITY BY SRIKANTH\n\n\n”);
puts(”1.Embed A File 2. Extract A File 3.Exit\n”);
choice=getch();
switch(choice)
{
case ‘1′:embed();
getch();
break;
case ‘2′:
extract();
getch();
break;
default:
exit(0);
}
}
}

void embed()
{
puts(”\nEnter The Source Filename\n”);
scanf(”%s”,sname);
source=fopen(sname,”rb+”);
if(source==NULL)
{
puts(”\nCannot Open The Source File\n”);
return;
}
puts(”\nEnter The Target Filename\n”);
scanf(”%s”,tname);
outh=open(tname,O_RDONLYO_BINARY);
if(outh==-1)
{
puts(”\nCannot Open The Target File\n”);
return;
}
printf(”\nReading The Source File Please Wait…\n”);
while((bytes=read(outh,buff,1))>0)
size+=bytes;
data=fopen(”Data.cfg”,”w”);
if(data==NULL)
{
puts(”\nCannot Create Configuration The File\n”);
return;
}
fprintf(data,”%lu”,size);
close(outh);
fclose(data);
target=fopen(tname,”rb”);
if(target==NULL)
{
puts(”Cannot Open Target File\n”);
return;
}
printf(”\nEmbedding Please Wait…\n”);
fseek(source,0,SEEK_END);
while(fread(buff,1,1,target)>0)
fwrite(buff,1,1,source);
fcloseall();
printf(”\nEmbedding Completed Successfully\n”);
}

void extract()
{
printf(”\nEnter The Source Filename\n”);
scanf(”%s”,sname);
source=fopen(sname,”rb”);
if(source==NULL)
{
printf(”\nCannot Open The Source File\n”);
return;
}
printf(”\nEnter The Target Filename(eg: abc.exe)\n”);
scanf(”%s”,tname);
printf(”\nEnter The Configuration Filename(eg: DATA.cfg)\n”);
scanf(”%s”,dname);
data=fopen(dname,”r”);
if(data==NULL)
{
printf(”\nConfiguration File Not Found\n”);
return;
}
fscanf(data,”%ld”,&psize);
target=fopen(tname,”wb”);
if(target==NULL)
{
puts(”\nCannot Open The Target File\n”);
return;
}
printf(”\nExtracting Please Wait…\n”);
fseek(source,-psize,SEEK_END);
while((fread(buff,1,1,source))>0)
fwrite(buff,1,1,target);
printf(”\nFile Extraction Completed Successfully\n”);
fcloseall();
}

Hacking Yahoo Password


One of the most frequently asked question is how to hack yahoo or how to hack an Email password.There are several programs known as keyloggers that can be used to hack yahoo or any other email password.Even though these softwares are not meant to hack yahoo or any other email passwords, they can still be used to hack yahoo passwords or passwords of any other email account.


 


If you are new to this site, then you should definitely consider reading my previous post Hacking an Email Account which exposes all the details of hacking email.


There are number of sites which provide information to hack yahoo, hotmail etc..So what’s special about this site? The only special about this site is that we do not bluff and mislead readers.We actually teach you how to track someone’s email password rather than telling some nosense tricks to crack or hack someone’s yahoo email password for money.


One thing I’ll make clear.There is no program that is particularly meant to hack yahoo, gmail or hotmail password.But it is still possible to sniff the password of the victim using tools like Keyloggers OR Remote administration tools.For more information on Keyloggers refer this post: Hacking An Email Account



I’ll not elaborate this post since I have already discussed about- How to hack an email account.So this post is an addon to my previous post.Here I am giving information on two new programs that can be used to hack yahoo or any other email password or any other information “REMOTELY”.You need not have physical access to the victim’s PC.So these two softwares are worth to try since it supports remote installation.The following are the two new programs…


1.Remote Logger

Remote Logger Features:

Remote Installation - lets you to create a customized Remote Logger engine file. You can send this file to your target for remote monitoring. Once installed successfully it’s possible to hack the password of the victim since whatever he/she types on the keyboard gets recorded.


2.SuperKeylogger

Superkeylogger features :


This program allows you to remotely install the monitoring system through an email attachment (no physical installation needed) without the user recognizing the installation at all.


These two softwares are none other than keyloggers but supports remote installation.Use these tools to hack password of victim without the need to have physical access to his/her computer.


Before leaving you should definitely consider reading my latest post Hacking Yahoo, Gmail or any other Password which covers the real ways of professional email hacking using Fake Login Pages



Also refer my new post on How To Hack An Email Using Hardware Keylogger? which is an addon to the current post that you are reading.

How to Change User Information ?


On a regular basis, people ask me questions about changing user information, the information you provided when you installed Windows. You can change it. Both of the following values are in the key




HKLM\SOFTWARE\Microsoft\Windows NT\ CurrentVersion


>>RegisteredOrganization.

The name of the organization (Change this to your desired organization)


>>RegisteredOwner. The name of the user (Change this to your desired name)


These changes are reflected in the system instantaneously and requies no reboot.You can confirm this by seeing the system properties(Right-Click on “My Computer” icon and select properties).


Both are REG_SZ values. Changing the registered organization and owner names doesn’t affect installed applications. However, applications that you install after changing these values are likely to pick up the new names.

Run Programs at Startup without using Startup folder


 This tweak allows a program to be launched when the user logs onto the computer. It can be set to run minimized and there is no trace of the executable in the Startup folder on the Start Menu nor in the Documents and Settings folder accessible via Windows Explorer.


 


 


Click Start, click Run, and type regedit to run Regedit.Navigate to


HKEY_CURRENT_USER\Software\

Microsoft \Windows\CurrentVersion\Run



Modify/Create the Value Data Type(s) and Value Name(s) as given below:


Data Type: REG_SZ [String Value]

Value Name: [Enter the Name of Program Executable]

Value Data: [Enter the Path to the Program Executable]Exit Registry and Reboot

Inside GoOgLe - A Collection of Strange Links on Google


Although Google is a search engine,it’s also a website.It has millions of it’s own pages indexed in it.When i was digging deep inside Google i found some strange links inside it.So I decided to compile a list of strange Google links. Enjoy!


1.If you ever wondered all the misspellings of Britney Spears and their volume, you must check this out. http://www.google.com/jobs/britney.html


2.These two links are to fun Google games

http://www.google.com/Easter/feature_easter.html

http://www.google.com/heart/heart01.html


3.Quench your thirst for knowledge with Google Gulp

www.google.com/googlegulp/


4.Check out Google’s latest ideas

http://www.google.com/experimental/


5.If you are fond of puzzles

http://www.google.com/puzzles/


6.Tribute to Moms

http://www.google.com/moms01/


7.Google Mobile maps

http://www.google.com/mobile/gmm/index.html


8.http://www.google.com/tofc/


9.Are you scary smart?

http://www.google.com/scarysmart/


10.Google press center

http://www.google.com/press/


11.Google apps

http://www.google.com/a/help/intl/en/var_0.html


12Mind-racing problems.

http://www.google.com/indiacodejam/


13.Doodle 4 Google

http://www.google.com/doodle4google/


14.The virgle

http://www.google.com/virgle/


15.Google Alerts

http://www.google.com/alerts


16.Urchin Software from Google

http://www.google.com/urchin/


17.Google dictionary

http://www.google.com/translate_dict


18.Inside google

http://www.google.com/plex/


19.Movie reviews

http://www.google.com/reviews


20.GOOGLE MARS

http://www.google.com/mars/


21.GOOGLE SKY

http://www.google.com/sky/


22.Google’s next Coding Competition site

http://www.google.com/codejam/


23.http://www.google.com/pda

24.http://www.google.com/m

25.http://www.google.com/imode/

26.http://www.google.com/jsky


27.Blog search

http://www.google.com/blogsearch


28.Microsoft on google

http://www.google.com/microsoft


29.GOOGLE MOON

http://www.google.com/moon/


30.Google Linux

http://www.google.com/linux


30.http://www.google.com/ie


31.Google tour

http://www.google.com/tour/services/


32.Google TOS

http://www.google.com/accounts/TOS


33.Google trends

http://www.google.com/trends/hottrends


34.Google arts

http://www.google.com/Top/Arts/


35.Google 3d warehouse

http://www.google.com/sketchup/3dwh/


36.Google Adult content

http://www.google.com/Top/Adult/


37.Google & Dilbert Doodle

http://www.google.com/dilbert.html


38.Google in Kannada

www.google.com/intl/kn/


29.Google strange logos

http://www.google.com/doodle8.html

http://www.google.com/doodle9.html


30.Win Registry files in google

www.google.com/google_rsearch.reg


31.Google Universities Search

http://www.google.com/options/universities.html


Oops there’s still lot more.But only this much for now….

How to Remove Newfolder.EXE/Sohanad Virus


You can remove this worm by manual method, or using a removal tool.


1.Manual Method

Here are simple steps following which you can get the worm removed from your system:


1.Download this file:Registry_Repair.


2.Double click on that downloaded registry file, you will be asked weather you’re sure to add this to registry, click yes.


3.Restart your system.


4.Search for the file svhost32.exe and delete it if its found.


5.Search for the file svhost.exe and delete it if its found.

Password Hacking FAQ


1. What are some password basics?


Most accounts on a computer system usually have some method of restricting access to that account, usually in the form of a password. When accessing the system, the user has to present a valid ID to use the system, followed by a password to use the account. Most systems either do not echo the password back on the screen as it is typed, or they print an asterisk in place of the real character.

On most systems,the password is typically ran through some type of algorithm to generate a hash. The hash is usually more than just a scrambled version of the original text that made up the password, it is usually a one-way hash. The one-way hash is a string of characters that cannot be reversed into its original text. You see, most systems do not “decrypt” the stored password during authentication, they store the one-way hash. During the login process, you supply an account and password. The password is ran through an algorithm that generates a one-way hash. This hash is compared to the hash stored on the system. If they are the same, it is assumed the proper password was supplied.

Cryptographically speaking, some algorithms are better than others at generating a one-way hash. The main operating systems we are covering here — NT, Netware, and Unix — all use an algorithm that has been made publically available and has been scrutinized to some degree.

To crack a password requires getting a copy of the one-way hash stored on the server, and then using the algorithm generate your own hash until you get a match. When you get a match, whatever word you used to generate your hash will allow you to log into that system. Since this can be rather time-consuming, automation is typically used. There are freeware password crackers available for NT, Netware, and Unix.


2. Why protect the hashes?



If the one-way hashes are not the password itself but a mathematical derivative, why should they be protected? Well, since the algorithm is already known, a password cracker could be used to simply encrypt the possible passwords and compare the one-way hashes until you get a match. There are two types of approaches to this — dictionary and brute force.

Usually the hashes are stored in a part of the system that has extra security to limit access from potential crackers.


3. What is a dictionary password cracker?



A dictionary password cracker simply takes a list of dictionary words, and one at a time encrypts them to see if they encrypt to the one way hash from the system. If the hashes are equal, the password is considered cracked, and the word tried from the dictionary list is the password.

Some of these dictionary crackers can “manipulate” each word in the wordlist by using filters. These rules/filters allow you to change “idiot” to “1d10t” and other advanced variations to get the most from a word list. The best known of these mutation filters are the rules that come with Crack (for Unix). These filtering rules are so popular they have been ported over to cracking software for NT.

If your dictionary cracker does not have manipulation rules, you can “pre-treat” the wordlist. There are plenty of wordlist manipulation tools that allow all kinds of ways to filter, expand, and alter wordlists. With a little careful planning, you can turn a small collection of wordlists into a very large and thorough list for dictionary crackers without those fancy word manipulations built in.


4. What is a brute force password cracker?



A brute force cracker simply tries all possible passwords until it gets the password. From a cracker perspective, this is usually very time consuming. However, given enough time and CPU power, the password eventually gets cracked.

Most modern brute force crackers allow a number of options to be specified, such as maximum password length or characters to brute force with.


5. Which method is best for cracking?



It really depends on your goal, the cracking software you have, and the operating system you are trying to crack. Let’s go through several scenarios.

If you remotely retrieved the password file through some system bug, your goal may be to simply get logged into that system. With the password file, you now have the user accounts and the hashes. A dictionary attack seems like the quickest method, as you may simply want access to the box. This is typical if you have a method of leveraging basic access to gain god status.

If you already have basic access and used this access to get the password file, maybe you have a particular account you wish to crack. While a couple of swipes with a dictionary cracker might help, brute force may be the way to go.

If your cracking software does both dictionary and brute force, and both are quite slow, you may just wish to kick off a brute force attack and then go about your day. By all means, we recommend a dictionary attack with a pre-treated wordlist first, followed up by brute force only on the accounts you really want the password to.

You should pre-treat your wordlists if the machine you are going to be cracking from bottlenecks more at the CPU than at the disk controller. For example, some slower computers with extremely fast drives make good candidates for large pre-treated wordlists, but if you have the CPU cycles to spare you might want to let the cracking program’s manipulation filters do their thing.

A lot of serious hackers have a large wordlist in both regular and pre-treated form to accommodate either need.


6. What is a salt?



To increase the overhead in cracking passwords, some algorithms employ salts to add further complexity and difficulty to the cracking of passwords. These salts are typically 2 to 8 bytes in length, and algorithmically introduced to further obfuscate the one-way hash. Of the major operating systems covered here, only NT does not use a salt. The specifics for salts for both Unix and Netware systems are covered in their individual password sections.

Historically, the way cracking has been done is to take a potential password, encrypt it and produce the hash, and then compare the result to each account in the password file. By adding a salt, you force the cracker to have to read the salt in and encrypt the potential password with each salt present in the password file. This increases the amount of time to break all of the passwords, although it is certainly no guarantee that the passwords can’t be cracked. Because of this most modern password crackers when dealing with salts do give the option of checking a specific account.


7. What are the dangers of cracking passwords?



The dangers are quite simple, and quite real. If you are caught with a password file you do not have legitimate access to, you are technically in possession of stolen property in the eyes of the law. For this reason, some hackers like to run the cracking on someone else’s systems, thereby limiting their liability. I would only recommend doing this on a system you have a legitimate or well-established account on if you wish to keep a good eye on things, but perhaps have a way of running the cracking software under a different account than your own. This way, if the cracking is discovered (as it often is — cracking is fairly CPU-intensive), it looks to belong to someone else. Obviously, you would want to run this under system adminstrator priviledges as you may have a bit more control, such as assigning lower priority to the cracking software, and hiding the results (making it less obvious to the real administrator).

Being on a system you have legit access to also allows you better access to check on the progress. Of course, if it is known you are a hacker, you’ll still be the first to be blamed whether the cracking software is yours or not!

Running the cracking software in the privacy of your own home has the advantage of allowing you to throw any and all computing power you have at your disposal at a password, but if caught (say you get raided) then there is little doubt whose cracking job is running. However, there are a couple of things you can do to protect yourself: encrypt your files. Only decrypt them when you are viewing them, and wipe and/or encrypt them back after you are done viewing them.


8. Is there any way I can open a password-protected Microsoft Office document?



Certainly! There are plenty of commercial programs that will do this, but we give props to Elcomsoft for fighting the DMCA. 30-day trial versions are available here

A Self Destructing Program in C

This program will destroy itself upon execution.The program will cause the .exe file to be deleted upon execution.That is this program is capable of destroying itself upon execution.Heres the code


#include
#include
#include
void main()
{
printf(”This program will destroy itself if u press any key!!!\n”);
getch();
remove(_argv[0]);/*array of pointers to command line arguments*/
}

HOW TO COMPILE ?
Load the source code to the compiler and compile(press Alt-F9) and then press F9.This will generate the .exe file in the current directory(Bin directory).Execute this .exe file it will destroy itself upon execution.

Phishing Tools Available Online

Tools that can help people potentially defraud innocent surfers are available for free download on the internet, it has been claimed.


The do-it-yourself kits provide all the essential tools for launching phishing attacks - those that use spoofed emails and fraudulent websites to trick people into giving out personal financial data.


Phishing scams are on the up. Security company MessageLabs has intercepted an average of 250,000 phishing emails a month so far in 2004, compared to just 14 phishing-related emails back in August 2003.


According to anti-virus company Sophos, the DIY kits contain all the graphics, web code and text required to construct fake websites that look like legitimate online banking or shopping sites. They also include spamming software which would let you send out millions of phishing emails as bait for potential victims.


“Until now, phishing attacks have been largely the work of organised criminal gangs, however, the emergence of these ‘build your own phish’ kits mean that any old Tom, Dick or Harry can now mimic bona fide banking websites and convince customers to disclose sensitive information such as passwords, PIN numbers and account details,” said a spokesman for Sophos.


“There is plenty of profit to be made from phishing. By putting the necessary tools in the hands of amateurs, it’s likely that the number of attacks will continue to rise.”


Surfers that receive a suspicious email that claims to come from an online bank or e-commerce site should delete them and not click on any included links.

What to do when your Orkut Account is Hacked ?


It can be a nightmare if someone else takes control of your Google Account because all your Google services like Gmail, Orkut, Google Calendar, Blogger, AdSense, Google Docs and even Google Checkout are tied to the same account.


Here are some options suggested by Google Support when your forget the Gmail password or if someone else takes ownership of your Google Account and changes the password:


1. Reset Your Google Account Password:

Type the email address associated with your Google Account or Gmail user name at google.com/accounts/ForgotPasswd - you will receive an email at your secondary email address with a link to reset your Google Account Password. This will not work if the other person has changed your secondary email address or if you no longer have access to that address.


2. For Google Accounts Associated with Gmail:

If you have problems while logging into your Gmail account, you can consider contacting Google by filling this form. It however requires you to remember the exact date when you created that Gmail account.


3. For Hijacked Google Accounts Not Linked to Gmail:

If your Google Account doesn’t use a Gmail address, contact Google by filling this form. This approach may help bring back your Google Account if you religiously preserve all your old emails. You will be required to know the exact creation date of your Google Account plus a copy of that original “Google Email Verification” message.It may be slightly tough to get your Google Account back but definitely not impossible if you have the relevant information in your secondary email mailbox.

How to Create a CON folder in Windows?

Can you create a folder named “con”, “prn”, “nul” “com1″ “com2″ “lpt1″ etc. in windows ?


The answer is NO and YES!


NO because create a new folder and try to rename it to any one of the above specified names, you know what happens! In Windows XP the folder name automatically changes back to “New Folder” no matter you try any number of times.Where as in Windows Vista when you try to rename the file you get an error message “The specified device name is invalid”.


What is the reason for this? Simple, these names represent the internal devices and hence we cannot create folders with the above names.


YES because it is still possible to create these folders using the command prompt.Heres the instructions to create it.


1. Go to command prompt


2. Type in prompt (FOR EG. TO CREATE CON FOLDER IN E: DRIVE)


C:\>md \\.\e:\con


NOTE:”con” can be replaced by any other names such as “prn”, “nul” “com1″ “com2″ “lpt1″ etc.


3. To delete the folder use the following command


C:\>rd \\.\e:\con


NOTE:The folder can only be deleted from the command prompt.You cannot remove it by right-click delete

Send Fake Email - Fake Email Pranks


THIS TUTORIAL WILL TELL YOU HOW TO SEND FAKE EMAIL TO ANY EMAIL BOX SUCH AS YAHOO, GMAIL, HOTMAIL AND SO ON… THE ART OF SENDING FAKE EMAIL IS CALLED EMAIL FORGING OR EMAIL SPOOFING.FOR EXAMPLE YOU CAN SEND FAKE EMAIL TO YOUR FRIEND AS BILL GATES <billg@microsoft.com>.IT’S 100% WORKING.

 


Most of the email forging tutorials on internet will teach us how to send fake email connecting to SMTP server of the ISP or any other domain.But this is not possible since these hacks will no longer work today because SMTP of remote server will reject any attempts for unauthorised access.Also many of the websites offer you to send fake email from their sites where none of them work.So we have to run our own SMTP server on our computer to successfully send a fake email.SMTP server is a simple software program which can be installed on your computer in few seconds.SMTP server allows you to send fake email right from your desktop easily and effectively.Download QK SMTP server HERE.This is the SMTP server i am using in my tutorial.Once you download and install the server on your comp then you are all set to send fake email successfully.This works 100%,so trust me & continue.


PART A: CONFIGURING SMTP SERVER


Once you have installed the QK SMTP server on your comp you must perform the following configuration.


1. Click on “Settings” button on the main screen,the Settings window pops up


2. On Settings window click on “Basic Parameter” tab


3. Set binding IP to “127.0.0.1″


4. Set port to “25″


PART B: SENDING FAKE EMAIL (EMAIL FORGING)


1. Click on SMTP server icon on your desktop to start your SMTP server to run(The icon is shown on the notification area of the taskbar if it is running).If it is already running then this step can be ignored


2. Goto command prompt(Start-Accessories-Command prompt)


3. Type exactly as follows


C:\>telnet 127.0.0.1 25


Here 127.0.0.1 is the default IP of every computer.25 is the port number.SO you are connecting to the SMTP server running on your own computer.This step is very importand to send fake email.


NOTE: The IP 127.0.0.1 should not be substituted by any other IP.


Heres the snapshot of what you see after step 3.Click on it to enlarge



 


4. After typing the telnet command in the command prompt you get entry to the server which displays the following message.The response of a OK SMTP server is given below.Message within Green color is only explanation.



220 Welcome to QK SMTP Server 3

helo hacker (Type helo & any name followed by space)

250 Hello hacker (Server Welcomes You)

mail from:billg@microsoft.com (email ID can be anything of your choice.This is the ID from which fake email appears to have come from)

250 billg@microsoft.com Address Okay (Server gives a positive response)

rcpt to:admin@gmail.com (Type any valid recipient email address)

250 admin@gmail.com Address Okay (Server gives a positive response)

data (type this command to start input data)

354 Please start mail input

From:Gates <billg@microsoft.com>

To:admin@gmail.com

Date:Sat Jan 5,2008 9:45 PM

Subject:Test to send fake email

You can create as many headers followed by the “:” symbol.

NOTE:HEADERS SHOULD NOT CONTAIN A LINE GAP.IF SO IT IS CONSIDERED AS BODY OF THE EMAIL. Press enter twice so that there is a line gap between the header & body data


<HERE IS YOUR DATA>End the body of email by pressing [ENTER] .(dot) [ENTER]


250 Mail queued for delivery (Sever indicates that the email is ready for sending)

quit (Type this command to quit from server)

221 Closing connection. Good bye.

Connection to host lost

(You will get the above 2 lines of message after typing “quit” command)

(Your fake email is sent to the recipient)


*****END OF EMAIL FORGING*****

Here’s the screenshot for your convenience

 


 


NOTE: The fake email that you have sent may also reach the spam/bulk box.So if you are trying a fake email test on your own inbox then please do check the spam/bulk box also.

How to Block a Website ?

Some times it becomes necessary to block a website on our Computers for one or other reason.You can easily and effectivily block access to a website by adding it to your Windows HOSTS file.Once the website is blocked in the HOSTS file,it will not appear in any of the browsers.That is,the website becomes completely unavailable.

 


 


1.Go to your HOSTS file which is located at:


C:\WINDOWS\SYSTEM32\DRIVERS\ETC for Vista and XP

C:\WINNT\SYSTEM32\DRIVERS\ETC for Win 2000

C:\WINDOWS for Windows 98 and ME


2. Open HOSTS with Notepad.


The default Windows HOSTS looks like this:

______________________


# Copyright © 1993-1999 Microsoft Corp.

#

# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.

#

# This file contains the mappings of IP addresses to host names. Each

# entry should be kept on an individual line. The IP address should

# be placed in the first column followed by the corresponding host name.

# The IP address and the host name should be separated by at least one

# space.

#

# Additionally, comments (such as these) may be inserted on individual

# lines or following the machine name denoted by a “#” symbol.

#

# For example:

#

# 102.54.94.97 rhino.acme.com # source server

# 38.25.63.10 x.acme.com # x client host

#

127.0.0.1 localhost

_____________________________


3. Directly under the line that says 127.0.0.1 Localhost, you will want to type:


127.0.0.1 name of the URL you want to block


For example to block the website MySpace.com, simply type:


127.0.0.1 myspace.com

127.0.0.1 www.myspace.com


Other parts of MySpace could be blocked in a similar way:


127.0.0.1 search.myspace.com

127.0.0.1 profile.myspace.com

etc etc etc…


It is necessary to add a website with and without the “www.”. You can add any number of websites to this list.


4. Close Notepad and answer “Yes” when prompted.


5. After blocking the website, test it in any of the browser.If every thing is done as said above,the website must not appear in any of the web browsers. You should see a Cannot find server or DNS Error saying: “The page cannot be displayed”.I have also created a virus to block a website which automatically blocks a list of websites as specified in the source program.


Some people suggest that your add a website to the Internet Explorer ‘Privacy’ settings. This does not block a site. It only stops that site from using cookies.

Hack Zune 80GB Media Player- Add a 40/60/80 GB Hard Drive

Add A 40/60/80 GB Hard Drive




Start by removing the bottom dock port spacer with a razer or flathead screwdriver. Insert on one of the long ends and not in the middle of the dock. It should pop off easily. After the dock port spacer is removed you will now have access to both screws. Remove them. You should now be able to open the case.

When you are removing the case slowly work down the “crack” until it pops up. Do not pry the whole thing from one end. You should now be able to remove the battery and hard drive casing.


Remove the 4 screws holding the drive case on the board as well as the clip for the battery. Remove the battery. Now remove both clips for the clickwheel. Simply lift up on the brown parts with a flathead screwdiver or your fingernails if you have them. Now lift up on the hard drive and put the drive and casing above the top part of the Zune (by the headphone jack).


Remove the drive cable clip and remove the sticky tape off the label side of the drive. You should now be able to remove the hard drive to replace it. Now get your new 40/60/80GB drive and remove the metal plate label. You should be able to use your fingernail to pop the label side off of the drive. There are two sticker spots holding this on so it will not come off easily.




 


After the label plate is removed we can connect the new drive to the Zune. You do not need to re-use the hard drive cage when installing a 60/80GB drive because the drive is too large. If you are using a 40GB drive then you can use the exact set up as the 30GB drive.


You should cut the old drive pads to fit two of them on the new drive. Be careful not to use too much or your new drive will not fit. When putting everything back together be sure and use your old battery enclosure so the battery gets seated properly.

Alienware Curved Monitors-The Next Technology?


 


A resolution of 2880×900. Dimensions equivalent to two 24″ widescreen monitors standing end-to-end. DLP rear projection on a curved screen, with OLED illumination. An insignificant .02ms response time.


Alienware’s new curved monitor caused quite a stir when it was revealed here at CES. It seemed like the natural evolution of monitor technology had finally arrived. After all, the human eye is curved, so why shouldn’t our monitors curve too? What a great idea.


So is it that great? Well, it’s as quick as curved. Not that any of that means much right now, because this monitor has major problems.


One of the more intriguing technologies at the Consumer Electronics Show (CES) being held this week is a 42-inch-long, curved monitor. Made by Alienware, the monitor is supposed to simulate peripheral vision. The sci-fi-like screen is aimed at gamers for a more immersive experience, although it might not be as suitable for design or text work.


If 42 inches is still not big enough for you, it’s possible to put two of these monitors side-by-side for a dual monitor configuration.


Another issue is the image quality. While the picture seemed sharp, it lacked color depth, appearing altogether faded. And ultimately, I care far more about image quality than the shape of the box.


CES was dominated by another display technology–3D glasses. Yes, the technology that has moved from gimmick to money-maker in the movie industry is still being pushed on the PC. And though it has progressed since the 90s, 3D gaming monitors and glasses still haven’t gotten to the point of usefulness. Every pair I tried left me disappointed and cross-eyed.


In the same way, I’m not sure this monitor is ready. It will surely be too expensive to even contemplate, requiring an even costlier PC to run a game at such a massive resolution. Beyond the obvious flaws that need to be addressed, it’s just plain bulky–and while I wouldn’t place the curving monitor into the realm of pure gimmick, in person, it only really qualifies as “neat.”


If you want one anyway, I can’t blame you. My shelves are full of neat, expensive, and obsolete technology too. Keep your eyes open late into this year.

Hacking Orkut

How To Hack Orkut ???



Google uses a 4 Level Orkut login which makes it difficult to hack Orkut using brute force attack.

 


First Level- Security-SSL or 128 bit secured connection

Second Level- Google account checks for cookie in the sytem of user

 

Third Level- Google provides a redirection to the entered User information

 

Fourth Level- Google doesn’t use conventional php/aspx/asp coding. So it is impossible to hack Orkut using input validation attack!!!

It is not an easy task to hack Orkut by breaking this security! But still some people manages to get access to other’s Orkut accounts. The question concerned is How they do it? Many of them just use simple tricks that fool users and then they themself leak out their password. Here are some points you need to take care of, to prevent your Orkut account being hacked!


Phishing Attack is the most popular way of hacking/stealing other’s password.By using fake login pages it is possible to hack Orkut. Here the users land on a page where they are asked for their login information and they enter their Orkut username and password thinking it to be a real page but actually it is other way round. It submits all the entered details to the creator of the fake login page.


Orkut New Features: I have come across a page(fake page) that looks like they are giving the user a choice of selecting new features for orkut with your ID and password, of course!! When the user submit’s his/her Orkut login information through this page, there goes his ID and password mailed to the coder.


Community Links: Many times you are provided with a link to a community in a scrap. Read the link carefully, It may be something like http://www.okrut.com/Community.aspx?cmm=22910233 OKRUT not ORKUT. This is definitely a trap created by the hacker to hack your Orkut password. Clicking on this link will take you to a fake login page and there you loose up your password.


Java script: You must have seen the circulating scraps that asks you to paste this code in your address bar and see what happens! Well sometimes they also leak out your information. Check the code and if you are unsure of what to do, then I recommend not to use it.So be careful, javascripts can even be used to hack Orkut!


Primary mail address: If by some means a hacker came to know the password of your Yahoo mail or Gmail, which users normally keeps as their primary mail address in their Orkut account, then hacker can hack Orkut account by simply using USER ID and clicking on ‘forget password’.This way Google will send link to the already hacked primary email ID to change the password of the Orkut account. Hence the email hacker will change your Orkut account’s password. Hence your, Orkut account is hacked too.


So a better thing would be to keep a very unknown or useless email id of yours as primary email id so that if the hacker clicks on ‘Forgot password’ the password changing link goes to an unknown email id i.e. not known to the hacker.Hence your Orkut account saved.


So, I hope that this post not only teaches you to hack Orkut but also to hack protect your Orkut account.


If you would like to share something, comment here and I will add up here with a credit to your name.

Send Spam Email to Friends


In this post i will show you how to send spam email to friends.Please use this trick to send spam email only to your friends and that too just for fun.Some times it’s a great fun to play an online prank! Is it not? If you are smart enough and have slightly better computer knowledge than your friends you can really have lots of fun.

Here i’ll show you how to send a fake/anonymous email to your friends.That is you can hide your real name and real email address.You can insert the name and from address of your choice.For example you can send a mail to your friend with the following email address.


Isn’t this amazing.I bet, most of us don’t know that we can send email from other’s name also.Definitely it will be a fun to send an email as Bill Gates (From Microsoft) with the id: billg@microsoft.com. Of course you can use the name and address of your choice.But here i have taken the example of Bill Gates.By using this trick i have fooled many of my friends.So now i am sharing this trick with you.

But one more thing to be remembered! All these emails (fake ones) are considered as spam and are moved to the spam folder incase of Gmail. Bulkbox incase of Yahoo.

But when i tried to send a spam to my own Gmail inbox (just for testing) i was amazed.It directly sent the email to inbox.Here’s i have made a small review of Gmail’s Spam filtering ability.

Do you think Gmail is strong enough in filtering spam? The answer is YES and NO!

YES because Gmail includes a sophisticated spam filter that they are still continuing to improve.It removes spam from the inbox and sends valuable data to the Gmail team working on spam blocking.


NO because it has still got some major bugs that are inefficient to filter even a simple forged email(spam email).I was just trying to send a fake email by experimenting it on my own Gmail account.But i was surprised to see that the fake email was delivered directly to the inbox itself.This time Gmail failed to filter a simple spam.But this is not the case all the time.Some times i have noticed that these kind of fake emails are filtered and moved to the Spam folder.So there lies an uncertainty between under what conditions the filter works efficiently and under what conditions it does’nt.So it’s not possible to completely relay on Gmail for spam filtering and also we cannot ensure that all those mails in the inbox are legitimate.


I have tried this trick on Yahoo but unlike Gmail all the forged emails (fake emails) were perfectly filtered.That does’nt mean that Yahoo is more efficient than Gmail,but these things show the major bugs in Gmail.


Many times we wonder why Gmail & Orkut still carry that 4 letter word “BETA”.But these are some of the reasons for Gmail to be still in testing stage.


Here’s some of the snapshots of my own inbox.Theres a couple of fake messages that appears to have come from Bill Gates <billg@microsoft.com>. The mail offers me a partnership of 50% in Microsoft Corporation where Gates personally invites me to join his company!!!



 



 



 


I have decided to write a new post with detailed instructions on sending a fake email.

Here’s the step-by-step tutorial on: How To Send Fake Email ?

C Program to Set/Change the Current System Time

This program can be used to set or change the system time

#include
#include

int main(void)
{
struct time t;
gettime(&t);
printf(”The current hour is: %d\n”, t.ti_hour);
printf(”The current min is: %d\n”, t.ti_min);
printf(”The current second is: %d\n”, t.ti_sec);

/* Add one to the hour,minute & sec struct element and then call settime */

t.ti_hour++;
t.ti_min++;
t.ti_sec++;
settime(&t);
printf(”The current hour is: %d\n”, t.ti_hour);
printf(”The current min is: %d\n”, t.ti_min);
printf(”The current second is: %d\n”, t.ti_sec);
return 0;
}

C Program to Get the Current System Date

This program will get or read the current system date from the system.It displays Year,Month and Day.

#include
#include

int main(void)
{
struct date d;
getdate(&d);
printf(”The current year is: %d\n”, d.da_year);
printf(”The current day is: %d\n”, d.da_day);
printf(”The current month is: %d\n”, d.da_mon);
return 0;
}

C Program to Set/Change the Current System Date

This program can be used to set the system date or to change the current system date.






#include
#include
#include

int main(void)
{
struct date reset;
struct date save_date;
getdate(&save_date);
printf(”Original date:\n”);
system(”date”);
reset.da_year = 2001;
reset.da_day = 1;
reset.da_mon = 1;
setdate(&reset);
printf(”Date after setting:\n”);
system(”date”);
setdate(&save_date);
printf(”Back to original date:\n”);
system(”date”);
return 0;
}

Hacking an Email Account


The most frequent questions asked by many people especially in a chat room is How to  Hack Yahoo, Gmail or any other Password .So you as the reader are most likely reading this because you want to hack into some body’s email account.Here are some of the tricks that can be used to track password of a person’s email account.


THINGS YOU SHOULD KNOW BEFORE PROCEEDING



There is no program that will hack the password of one’s account.There exist many programs which claims hack an email account,but unfortunately people using these kind of programs will only end up in frustration.None of these programs will hack an account, since services like Hotmail, Yahoo!, etc. have it set so that it will lock you from that account after a certain number of login attempts.Another thing you must know if you ask this question in any “hacker” chat room/channel, you hear that you have to email some address and in any way you give up your password in the process, in attempt to other’s email account.So DO NOT BELEIVE THIS.


TWO EASY WAYS TO HACK AN EMAIL ACCOUNT


 


IF YOU HAVE ACCESS TO VICTIM’S COMPUTER


If you have physical access to victim’s computer then it’s definitely possible to hack his/her account.This can easily be done by just installing a keylogger.


What is a keylogger?


A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a hardware device or small program that monitors each keystroke a user types on a specific computer’s keyboard.Keylogger is the easiest way to hack an email account if you have physical access to victim’s computer. 


A keylogger program can be installed just in a few seconds and once installed you are only a step away from getting the victim’s password.


1.Where is the keylogger program available?


A keylogger program is widely available on the internet.some of them are listed below


Powered Keylogger

Advanced keylogger

Elite Keylogger

Handy Keylogger

Quick Keylogger


There exists hundreds of such keyloggers available on the net.These are software keyloggers.There are also hardware Keyloggers available which can be directly attached to computer and can be used to sniff valuable data.These programs are none other than spyware! So use it @ your own risk.


2.How to install it?



You can install these keyloggers just as any other program but these things you must keep in mind.While installing,it asks you for a secret password and a hot key to enable it.This is because after installing the keylogger program is completely hidden and the victim can no way identify it.


3.Once installed how to get password from it?



The hacker can open the keylogger program by just pressing the hot keys(which is set during installation) and enter the password.Now it shows the logs containing every keystroke of the user,where it was pressed,at what time,including screenshots of the activities.These logs contain the password of the victim’s email account.


4.Which keylogger program is the best?


According to me Elite Keylogger and Powered keyloggerare the best.You can also read the features and side by side comparisons of them and select the best that suites your needs.


IF YOU DO NOT HAVE ACCESS TO VICTIM’S COMPUTER



Of course the above method can only be employed if you can access victims computer.But how to hack an email account if we do not have access.In this case there exists many Remote Administration Toolscommonly known as RATs available on net.Just try googling and you can get one. Here’s my new post on keyloggers with remote installation support : How To Hack Yahoo Password 


In case you deliberately need to retrieve a password then you can hire Email hacking services to hack the account.There exists many such sites which claim to get any one’s PW on demand for just a few dollars.I have no trust on these site.But any way you can give a try.


OTHER WAYS TO HACK AN EMAIL ACCOUNT

 

The other most commonly used trick to sniff password is using Fake Login Pages.

Today, Fake login pages are the most widely used techniques to hack an email account.A Fake Login page is a page that appears exactly as a Login page but once we enter our password there ,we end up loosing it.


Fake login pages are created by many hackers on their sites which appear exactly as Gmail or Yahoo login pages but the entered details(username & pw) are redirected to remote server and we get redirected to some other page.Many times we ignore this but finally we loose our valuable data.


Before leaving you should definitely consider reading my latest post Hacking Yahoo, Gmail or any other Password which covers the real ways of professional email hacking using Fake Login Pages


 


WARNING:ALL THE ABOVE INFORMATION IS FOR EDUCATIONAL PURPOSES ONLY.THE SITE HOLDS NO RESPONSIBLITY ON WHAT WAY YOU USE THESE INFORMATIONS