This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Cracking Password Protected Zip Files |

What is FZC?


FZC is a program that cracks zip files (zip is a method of compressing multiple files into one smaller file) that are password-protected (which means you’re gonna need a password to open the zip file and extract files out of it). You can get it anywhere - just use a search engine such as google.com.


FZC uses multiple methods of cracking - bruteforce (guessing passwords systematically until the program gets it) or wordlist attacks (otherwise known as dictionary attacks. Instead of just guessing passwords systematically, the program takes passwords out of a “wordlist”, which is a text file that contains possible passwords. You can get lots of wordlists at www.theargon.com.).


FZC can be used in order to achieve two different goals: you can either use it to recover a lost zip password which you used to remember but somehow forgot, or to crack zip passwords which you’re not supposed to have. So like every tool, this one can be used for good and for evil.


The first thing I want to say is that reading this tutorial… is the easy way to learn how to use this program, but after reading this part of how to use the FZC you should go and check the texts that come with that program and read them all. You are also going to see the phrase “check name.txt” often in this text. These files should be in FZC’s directory. They contain more information about FZC.


FZC is a good password recovery tool, because it’s very fast and also support resuming so you don’t have to keep the computer turned on until you get the password, like it used to be some years ago with older cracking programs. You would probably always get the password unless the password is longer than 32 chars (a char is a character, which can be anything - a number, a lowercase or undercase letter or a symbol such as ! or &) because 32 chars is the maximum value that FZC will accept, but it doesn’t really matter, because in order to bruteforce a password with 32 chars you’ll need to be at least immortal..heehhe.. to see the time that FZC takes with bruteforce just open the Bforce.txt file, which contains such information.


FZC supports brute-force attacks, as well as wordlist attacks. While brute-force attacks don’t require you to have anything, wordlist attacks require you to have wordlists, which you can get from www.theargon.com. There are wordlists in various languages, various topics or just miscellaneous wordlists. The bigger the wordlist is, the more chances you have to crack the password.


Now that you have a good wordlist, just get FZC working on the locked zip file, grab a drink, lie down and wait… and wait… and wait…and have good thoughts like “In wordlist mode I’m gonna get the password in minutes” or something like this… you start doing all this and remember “Hey this guy started with all this bullshit and didn’t say how I can start a wordlist attack!…” So please wait just a little more, read this tutorial ’till the end and you can do all this “bullshit”.


We need to keep in mind that are some people might choose some really weird passwords (for example: ‘e8t7@$^%*gfh), which are harder to crack and are certainly impossible to crack (unless you have some weird wordlist). If you have a bad luck and you got such a file, having a 200MB list won’t help you anymore. Instead, you’ll have to use a different type of attack. If you are a person that gives up at the first sign of failure, stop being like that or you won’t get anywhere. What you need to do in such a situation is to put aside your sweet xxx MB’s list and start using the Brute Force attack.


If you have some sort of a really fast and new computer and you’re afraid that you won’t be able to use your computer’s power to the fullest because the zip cracker doesn’t support this kind of technology, it’s your lucky day! FZC has multiple settings for all sorts of hardware, and will automatically select the best method.


Now that we’ve gone through all the theoretical stuff, let’s get to the actual commands.


Bruteforce


The command line you’ll need to use for using brute force is:


fzc -mb -nzFile.zip -lChr Lenght -cType of chars


Now if you read the bforce.txt that comes with fzc you’ll find the description of how works Chr Lenght and the Type of chars, but hey, I’m gonna explain this too. Why not, right?… (but remember look at the bforce.txt too)


For Chr Lenght you can use 4 kind of switches…


-> You can use range -> 4-6 :it would brute force from 4 Chr passwors to 6 chr passwords

-> You can use just one lenght -> 5 :it would just brute force using passwords with 5 chars

-> You can use also the all number -> 0 :it would start brute forcing from passwords with lenght 0 to lenght 32, even if you are crazy i don’t think that you would do this…. if you are thinking in doing this get a live…

-> You can use the + sign with a number -> 3+ :in this case it would brute force from passwords with lenght 3 to passwords with 32 chars of lenght, almost like the last option…


For the Type of chars we have 5 switches they are:


-> a for using lowercase letters

-> A for using uppercase letters

-> ! for using simbols (check the Bforce.txt if you want to see what simbols)

-> s for using space

-> 1 for using numbers


Example:

If you want to find a password with lowercase and numbers by brute force you would just do something like:


fzc -mb -nzTest.zip -l4-7 -ca1


This would try all combinations from passwords with 4 chars of lenght till 7 chars, but just using numbers and lowercase.


*****

hint

*****


You should never start the first brute force attack to a file using all the chars switches, first just try lowercase, then uppercase, then uppercase with number then lowercase with numbers, just do like this because you can get lucky and find the password much faster, if this doesn’t work just prepare your brain and start with a brute force that would take a lot of time. With a combination like lowercase, uppercase, special chars and numbers.


Wordlist


Like I said in the bottom and like you should be thinking now, the wordlist is the most powerfull mode in this program. Using this mode, you can choose between 3 modes, where each one do some changes to the text that is in the wordlist, I’m not going to say what each mode does to the words, for knowing that just check the file wlist.txt, the only thing I’m going to tell you is that the best mode to get passwords is mode 3, but it takes longer time too.

To start a wordlist attak you’ll do something like.


fzc -mwMode number -nzFile.zip -nwWordlist


Where:


Mode number is 1, 2 or 3 just check wlist.txt to see the changes in each mode.

File.zip is the filename and Wordlist is the name of the wordlist that you want to use. Remember that if the file or the wordlist isn’t in the same directory of FZC you’ll need to give the all path.


You can add other switches to that line like -fLine where you define in which line will FZC start reading, and the -lChar Length where it will just be read the words in that char length, the switche works like in bruteforce mode.

So if you something like


fzc -mw1 -nztest.zip -nwMywordlist.txt -f50 -l9+


FZC would just start reading at line 50 and would just read with length >= to 9.


Example:


If you want to crack a file called myfile.zip using the “theargonlistserver1.txt” wordlist, selecting mode 3, and you wanted FZC to start reading at line 50 you would do:


fzc -mw3 -nzmyfile.zip -nwtheargonlistserver1.txt -f50


Resuming


Other good feature in FZC is that FZC supports resuming. If you need to shutdown your computer and FZC is running you just need to press the ESC key, and fzc will stop. Now if you are using a brute force attack the current status will be saved in a file called resume.fzc but if you are using a wordlist it will say to you in what line it ended (you can find the line in the file fzc.log too).

To resume the bruteforce attack you just need to do:


fzc -mr


And the bruteforce attack will start from the place where it stopped when you pressed the ESC key.

But if you want to resume a wordlist attack you’ll need to start a new wordlist attack, saying where it’s gonna start. So if you ended the attack to the file.zip in line 100 using wordlist.txt in mode 3 to resume you’ll type


fzc -mw3 -nzfile.zip -nwwordlist.txt -f100


Doing this FZC would start in line 100, since the others 99 lines where already checked in an earlier FZC session.


Well, it looks like I covered most of what you need to know. I certainly hope it helped you… don’t forget to read the files that come with the program

Premium Accounts…!! { 16 Download Sites }

Following are the list of usernames and passwords of the premium accounts for Best downloads sites.

…!! ENJOY !!…

!!…100% Working Accounts…!!


1.) www.divxcrawler.com {download movies fastly}


Username : divx273

Password : 8342729


2.) www.butterflydownloadnetwork.com {movies, music, Pc Games, Tv shows}


Username : cinemanetwork20

Password : butterfly20


3.) www.downloadprofessional.com {movies,Pc softwares, Pc Games, Tv shows}


Username : lo886Ees

Password : zAgt88er


4.) www.sharingzone.net {movies, Pc softwares, Pc Games}


Username : LODMQYHX

Password : 375021402

Receipt : 4T5W89RD


5.) www.unlimitedgamedownloads.com {movies, Pc Games, psp softwares}


Username : ga20me

Password : ke01feb


6.) www.watchdirect.tv {movies, music, Pc Games, online Tv}


Username : cinemanetwork20

Password : butterfly20


7.) www.fullreleasez.com {Greatly Every thing}


Username : Af872HskL

Password : XjsdH28N


8.) www.fulldownloads.us {Greatly Every thing}


Username : Af872HskL

Password : XjsdH28N


9.) www.pirateaccess.com {Every thing}


Username : yourfrienddalat@gmail.com

Password : CHh5LKPI


Username : xxx_heel_xxx@yahoo.com

Password : MJY0BUY


Username : i_l0ve_u_786@yahoo.com

Password : rYvLgPrt


Username : mubashar_siddique@yahoo.com

Password : F9Gzgwb5


10.) www.warezquality.com {Every thing}


Username : ageg2020

Password : z8fsDfg3


11.) wwww.warezreleases.com {All Stuff}


Username : HnRPxKQz

Password : a59KBV7


Username : a25bipZP

Password : 1TeVnoJb


Username : SHYyJfWU

Password : P4K20uO


12.) www.fulldownloadaccess.com {All Stuff}


Username : mpuv3y

Password : umvpy3x


13.) www.alphaload.com {All Stuff}


Username : AL3429352

Password : ykbcKTNS


Username : AL3429355

Password : RCHAbhKM


Username : AL3429350

Password : gMZNFcyS


Username : AL3429351

Password : cTAkWAxc


Username : AL3429352

Password : ykbcKTNS


14) www.gamedownloadnow.com {All Stuff}


Username : ga20me

Password : ke01feb


15.) www.unlimiteddownloadcenter.com {All Stuff}


Username : cu20me

Password : ke01feb


16.) www.tvadvanced.com {online Tv}


Username : mv03dl

Password : frmvdl

Latest Airtel Hack 2008

Now a days Airtel gives New option to the Subscriber to access Mobile Office daily @25.00/perday. But this is too Costly. Only 24 hours and the cost is 25.00. Oh GOD!!


But I got a Trick thats help me to Activate my Mobile Office whole 30 days only for 25.00/. Its really goood.


Just follow the Trick.


1. Your account balance should be above 25.00 for the first time.

2. Acitave your mobile office by dailing *444*1#. You will Activate your Mobile Office in the Morning.

3. You got an Activation msg. Your account should deducted by 25.00/

4. After that your can enjoy mobile office for 24 hours.

5. But for unlimited access you will do this :: Just switch off your mobile from 7.00 am to 10.00am. and your account balance should be below 25.00 /

6. Just try it enjoy the whole world only by 25.00.


I am Sure you should be Benifited. JUST TRY IT!!!!!!!!!

How to Set up your own Proxy Server

Lot´s of people complain that Web Proxys are not working at their Works / Schools computer because they have been banned by administrators. A way around this would be to setup your very own proxy server that is being hosted a) by a free web hosting service that supports either php or cgi or b) your own website that is being hosted by a web hosting company.


Both methods should work and I will walk you right through the installation process for both scripts and give you tips how to find out what is actually being blocked. Before we start you need to download a copy of phpproxy or cgiproxy depending on what you want and can use. You also could perform a search for free web hosting on google for instance and try to find a web host that supports one of the two languages, a good site that I found while searching for those terms might be freewebspace.net


1. phpproxy


Download phpproxy and unpack it to a local directory on your hard drive. All you need to do know is to upload the script to your webspace and open up the new url to check if its working allright. You might want to rename the file to something different, something that does not contain the word proxy in it to avoid filters that ban everything that has the word “proxy” in it.


You could open up the script and enter your clients ip in there to make sure that only your client will be able to connect or you could add a .htaccess file to the directory forcing everyone who wants to start the script to enter a username and password. Again, use google if you like to find out more information about .htaccess


The php script has some requirements, make sure you read the readme file which is included and check to see if your hoster has those requirements enabled.


2. cgiproxy


Your hoster has to have cgi enabled in order to run this script. Many free hosters do not offer cgi or only some preinstalled scripts. Make sure it is enabled before you start the installation process.


First, download the source and unpack it to a local directory.


Now, open the .cgi file and take a look at the configuration. You can edit lots of settings from within, for example you could configure the script that way that it only allows text to go through the proxy but no images. Everything is explained in detail and all options are explained with comments, browse through the file, edit the options to your liking and save the new file.


After that upload the script to your cgi directory if that is required by your hoster and open the url from your browser. You are now ready to browse the web anonymously, to check if that is really the case load a website like whatismyip.com as the first site and check if the ip matches with the server the script is installed and not your computers ip. If that is the case you´ve done everything right and can surf anonymously. (there are still ways to find out your ip, just in case you are wondering)


3. What is being blocked ?


a) If you can access the proxy from the client they only block domains / ips.

b) If you can´t access the proxy they might be banning filenames that contain proxy as well, try changing the filename.

Enabling/Disabling User Access Control in Windows Vista


Microsoft’s advertising has stressed the new security features found in Windows Vista. From the user perspective, one such feature, User Access Control, is arguably the most noticeable enhancement. User access control is a mechanism by which users — even administrators — perform common Windows tasks with non-administrative rights, or as a standard user. Before administrative tasks can be performed, users must actively approve actions that could be potentially dangerous to the computer.


In this article, I’ll give you a complete look at User Access Control’s inner workings and show you some ways you can change the behavior of this new feature.


How does User Access Control work?


The Inner workings of User Access Control reveal a lot about how this feature protects your computer. First, let’s talk about why User Access Control was developed.


The problem: Windows XP and silent installations


In pre-Vista versions of Windows, upon login, a user was assigned an access token. A non-administrative user was assigned a token that granted him access to resources that did not require administrative rights. Users that were members of an administrative group were assigned a single token that granted them full rights to all of the resources on the local computer.

From an ease-of-use perspective, this level of authority was great. However, from a security perspective, it’s not so great; even for IT pros. Consider the potential for “drive-by” spyware installation. A drive-by installation happens when you visit, either accidentally or intentionally, a site containing malicious code that you don’t know about. While spyware scanners have significantly improved over the past couple of years, there’s not a single solution on the market that will protect against every known threat. Even if there was such a product, there would still be the issue of unknown threats. New spyware pops up every day and it takes vendors time to discover these new nuisances and update their products.

If you’re logged in to Windows XP as a user with administrative privileges at the time the drive-by takes place, spyware may get installed to your computer with absolutely no notice to you. This spyware could be anything from a fairly innocuous tool to a key logger that keeps track of everything you type and sends the results to a predetermined location. You might end up with the installation of a back door that allows a hacker to make his way into your system at some point in the future to achieve his nefarious goals. Worse, the deeper spyware is embedded into your system, the more difficult it is to remove, short of a complete system rebuild, which can take hours.



Note: When you install Windows XP, the Setup Wizard assigns administrative rights to all local accounts.

Now, you might tell yourself you already knowall of this; but, in your organization, you’re forced to allow users to run as a local administrator for any number of reasons. For example, many users (with the backing of management) feel it is vital that they have the ability to install new applications on their desktop. Unfortunately, they’re often right. Doing business on the Web often means having to install a new ActiveX control or other type of application. While not the safest behavior, allowing people to do their jobs is preferable to paying people to sit in a chair doing nothing under the unyielding thumb of IT.



The solution: Windows Vista and User Access Control


Windows Vista’s introduction of User Access Control aims to tame this beast and bring some order back to chaos. Under Vista, when an administrative user logs in to the system, he is granted not one, but two access tokens: an administrative access token and a standard user access token. The standard access token is used to start the user’s desktop. The end result is that the administrator is running a system with more limited rights than he would have received upon login under Windows XP. Until there is a need, the second token — the one with administrative rights — is not used.

This situation takes place, for example, when the administrative user starts a control panel applet and tries to change a setting, Windows Vista’s User Access Control feature pops up a window indicating that permission is necessary to continue. When you choose to allow an administrative action to take place using the administrative token, you are allowing that application to run with elevated privileges. Figure A gives you a look at a typical User Access Control dialog box. If you want to allow the action, press the Continue button.

Figure A


windows Vista user access control UAC - The Ethical Hacking


User Access Control asks if you want to proceed with the action.


If you’ve seen the Mac v. PC commercials on Apple’s Web site, you’ll recognize this dialog box as being the point of discussion between the PC and the Mac with a security guard standing behind the PC to verify every communication with the Mac. In reality, the situation is not quite that bad. In fact, although annoying from time to time, the situation is much better as the new system provides a visual cue that something is going on and gives a user an opportunity to decline an action.

Annoyance is one of the results I will try to help you with in this article. I’ll show how you can disable User Access Control altogether, and how to indicate that specific applications should always run in an elevated state.



Completely disabling User Access Control


I’ll preface this section by saying I don’t recommend you take this action, even on your own computer. Much as I am loathe to admit it, even though I preach the dangers of the “blind click” on a pop-up and the resulting spyware that ensues to students and users, I sometimes forget my own advice. Last summer, when I was in a hurry to complete a task, I got what appeared to be a system dialog box and pressed the OK button. Just as I released the mouse button, I realized that the “OK button” I had just pressed was actually a pop-up from a Web site. Just hours later, my system was infested with spyware.

The lesson here is this: Even those of us that do this for a living fall victim to spyware. With User Access Control, at least there is one more barrier between us and them.

But, if you find that User Access Control is seriously debilitating, you candisable it and move on. There are a number of ways to disable User Access Control. I’ll show you how to do so using the Control Panel, the Registry Editor, and Group Policy.

All of the solutions in this article require that you log on as a user with administrative rights. For most solutions, however, you cannot use the local administrator account. This account is not subject to administrative approval. Use another account that is a member of the local administrators group.


Disable User Access Control using MSConfig


For a few machines, you can use MSConfig to change the behavior of User Access Control:



  1. Go to Start | All Programs | Accessories | Run.

  2. In the Run box, type “msconfig”, and press [Enter].

  3. From the System Configuration window, choose the Tools tab, as shown in Figure B.

  4. In the Tool Name column, look for the Disable UAC option.

  5. Press the Launch button.

  6. Reboot the system.


Figure B


windows Vista user access control UAC - The Ethical Hacking

The System Configuration window Tools tab.



Disable User Access Control via the Control Panel


If you have just a couple of machines, the easiest way to disable User Access Control is to disable the feature via the Control Panel. Follow these steps to achieve this goal:




  1. Go to Start | Control Panel.

  2. Viewing the Control Panel in “Classic” mode, choose the User Accounts applet. This opens the screen shown below in Figure.



windows Vista user access control UAC - The Ethical Hacking


The User Accounts control panel applet.




  1. Choose the “Turn User Account Control on or off” option. Note that this applet has a little shield next to it. This shield indicates that this function is itself protected by User Account Control.

  2. Deselect the checkbox next to Use User Account Control (UAC) To Help Protect Your Computer. See Figure D.


Figure D


windows Vista user access control UAC - The Ethical Hacking


The User Accounts control panel applet.



  1. Press OK.

  2. Reboot your computer for the changes to take effect.


Disable User Access Control via the Registry Editor


A second way to disable User Access Control involves the use of the registry editor. By changing a specific key on each Vista machine, you can disable User Access Control. Here are the steps:




  1. Start the Registry Editor.

  2. Browse to the following key: HKEY_LOCAL_MACHINE Software Microsoft Windows CurrentVersion Policies System.

  3. Change the value of the EnableLUA entry to “0″ If you ever want to re-enable User Access Control, follow these instructions, but change the value of the EnableLUA entry to “1″. See Figure E for a look at the screen.

  4. When you are done, reboot the computer for the change to take effect.



Figure E


windows Vista user access control UAC - The Ethical Hacking


The EnableLUA key in the Registry Editor.


Manage/Disable User Access Control via Group Policy


If you have a lot of computers and you want to change User Access Control behavior across all of them, your best bet is to use Group Policy. The Group Policy method is also the most granular of the bunch and allows you to set a variety of parameter related to User Access Control. I’ll show you how to accomplish this using the local group policy administrative tool.



  1. Go to Start | All Programs | Accessories | Run.

  2. In the Run box, type “secpol.msc” and press [Enter].

  3. When User Account Control asks for permission to continue, press the Continue button.

  4. Browse to Computer Configuration | Windows Settings | Security Settings | Local Policies | Security Options. You’ll see the screen shown in Figure F.

  5. Select the group policy object you wish to modify and change the setting to the desired value. The list below provides you with a look at all of the group policy settings associated with User Access Control.



Figure F


windows Vista user access control UAC - The Ethical Hacking

The Group Policy Object Editor.


There are a number of options related to User Access Control:




  • User Account Control: Behavior of the elevation prompt for the built-in Administrator account — This setting determines the behavior of User Access Control when used with the built-in Administrator account.

    • Enabled: When running an application that needs administrative rights, the built-in Administrator account will be subject to User Access Control.

    • Disabled (default): The built-in Administrator account will run all applications without further prompting.



  • User Account Control: of the elevation prompt for administrators in Admin Approval Mode — This setting determines what takes place when administrators (besides the built-in Administrator account) run a privileged application.

    • Elevate without prompting: This is the most dangerous setting and should be used only in very secure environments. Restricted applications are run with administrative rights without intervention.

    • Prompt for credentials: The user is prompted to provide the user name and password for a user with local administrative rights.

    • Prompt for consent (default): This is the normal behavior for User Access Control and asks the user (assuming the user has administrative rights) to permit or deny running an application with administrative rights.



  • User Account Control: Behavior of the elevation prompt for standard users — This setting determines what takes place when standard users try to run a privileged application.

    • Prompt for credentials (Default for Home editions): The user is prompted to provide the user name and password for a user with local administrative rights.

    • Automatically deny elevation requests (Default for Enterprise editions): The user will receive a message indicating that access to the application has been denied.



  • User Account Control: Detect application installations and prompt for elevation — How will the User Access Control system respond to requests for the installation of new programs?

    • Enabled (Default for home): Application installations that require administrative privileges will trigger the User Access Control prompt.

    • Disabled (Default for enterprise): Since many application installations are handled via Group Policy, user intervention and approval is not necessary.



  • User Account Control: Only elevate executables that are signed and validated — Do elevated applications require a valid PKI certificate chain?

    • Enabled: Requires that an application has a valid PKI certificate chain before it is allowed to run.

    • Disabled (default): Does not require that an application be signed in order to run.



  • User Account Control: Only elevate UIAccess applications that are installed in secure location — Applications that request execution with a UIAccess integrity level must reside in a secure area of the system.

    • Enabled (default): An application with UIAccess integrity with launch only if it resides in a protected area of the system.

    • Disabled: An application with UIAccess integrity will launch regardless of the location of the executable.



  • User Account Control: Run all administrators in Admin Approval Mode — Run all users, including administrators, as standard users. This effectively enables or disables User Access Control. If you change this setting, you must reboot the system.

    • Enabled (default): Administrative Approval Mode and User Access Control is enabled.

    • Disabled: Disable User Access Control and Admin Approval Mode.



  • User Account Control: Switch to the secure desktop when prompting for elevation — When User Access Control is enabled and displays an elevation prompt, change Windows Vista to the secure desktop as opposed to the standard user’s desktop.

    • Enabled (default): Elevation requests are directed to a secure desktop.

    • Disabled: Elevation requests are directed to the standard desktop.



  • User Account Control: Virtualize file and registry write failures to per-user locations — This setting enables the redirection of legacy application write failures to defined locations in both the registry and file system, mitigating those applications that historically ran as administrator and wrote runtime application data back to %ProgramFiles%, %Windir%; %Windir%\system32 or HKLM\Software\. In short, this key helps to maintain backward compatibility with legacy applications that do not like to run as a standard user.

    • Enabled (default): Applications writing data to protected areas will be redirected to other locations.

    • Disabled: Applications writing data to protected areas will fail.


    </LI>



Selectively disabling User Access Control


Not all applications are marked in such a way as to trigger a User Access Control warning when executed. However, many applications need to be run with administrative rights enabled in order to function as intended. In order to accommodate this situation, you can mark an application so it runs with administrative rights each time the application is executed. To do so:



  1. Right-click the executable associated with the application.

  2. From the shortcut menu, choose the Properties option.

  3. From the Properties page, select the Compatibility tab.

  4. Under the Privilege Level heading, select the checkbox next to “Run this program as an administrator” , as seen in Figure G.

  5. Press OK.



Figure G


windows Vista user access control UAC - The Ethical Hacking


The application’ s Compatibility tab.


For some applications, the “Run this program as an administrator” option may not be available. There can be a number of reasons for this:



  • You are not logged in as a user with administrative rights.

  • The application is not capable of being run with elevated rights.

  • The application is a part of the operating system. OS applications cannot be modified in this manner.


Annoying, but worth it


User Access Control might be an annoying way to achieve system security, but it’s actually pretty welcome when it comes to maintaining system security, especially for home users. Mac and Linux users have long had to deal with the same basic security scheme, but it’s new to Windows users. Once Windows users get used to it, they’ll appreciate the added security it provides.


Making Windows Genuine

1 . start > run > ” regedit” (without the quotes of course)


2 . Go to the key:


    HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WindowsNT\ CurrentVersion\WPAEvents\OOBETimer

    …and doubleclick on it.

    Then change some of the value data to ANYTHING ELSE…delete some, add some letters, ..just change it! now close out regedit.

3 . Go to start > run > “%systemroot%\system32\oobe\msoobe.exe /a” (again, don’t type the quotes)


4 . The activation screen will come up, click on register over telephone,>next> then click on CHANGE PRODUCT KEY, enter in this key:


JG28K-H9Q7X-BH6W4-3PDCQ-6XBFJ and give update.


(Now automatically window will return back to activate by telephone mode and ask for activation code,just ignore and exit that window it’s done)

Access Orkut On Your Mobile Phone or PDA

Here is a Great Hack for all Orkut Users…


Have you ever tried to access orkut on your Mobile Browser. If you have tried, you must surely know what happens……….


Let me tell u for those who have not tried it..The login box does not appear…. As a result you cannot sign in and therefore, to say as a whole, ORKUT CANNOT BE ACCESSED ON MOBILE!!!!!


But here is a trick for all to ACCESS ORKUT ON YOUR MOBILE.. You need to do nothing, just follow the link:


https://www.google.com/accounts/Serv….aspx&hl=en-US


And you will see that only the login-box appears, just sign in and there you are…


The whole ORKUT at your hands!!!!


If you lose this link,, here is how to get it.. when you open www.orkut.com on your pc. The login box loads in a different frame.., In Firefox, right click on this frame and Select load this frame only, and the link you get for that frame is this link.Actualy what happens is that we load only this frame and not the others..