This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Gmail shortcuts

Gmail
C: Compose new message.
Shift + C: Open new window to compose new message.
Slash (/): Switch focus to search box.
K: Switch focus to the next most recent email. Enter or "O" opens focused email.
J: Switch focus to the next oldest email.
N: Switch focus to the next message in the "conversation." Enter or "O" expands/collapses messages.
P: Switch focus to the previous message.
U: Takes you back to the inbox and checks for new mail.
Y: Various actions depending on current view:
Has no effect in "Sent" and "All Mail" views.
Inbox: Archive email or message.
Starred: Unstar email or message.
Spam: Unmark as spam and move back to "Inbox."
Trash: Move back to "Inbox."
Any label: Remove the label.
X: "Check" an email. Various actions can be performed against all checked emails.
S: "Star" an email. Identical to the more familiar term, "flagging."
R: Reply to the email.
A: Reply to all recipients of the email.
F: Forward an email.
Shift + R: Reply to the email in a new window.
Shift + A: Reply to all recipients of the email in a new window.
Shift + F: Forward an email in a new window.
Shift + 1 (!): Mark an email as spam and remove it from the inbox.
G then I: Switch to "Inbox" view.
G then S: Switch to "Starred" view.
G then A: Switch to "All Mail" view.
G then C: Switch to "Contacts" view.
G then S: Switch to "Drafts" view.
"Do enable the keyboard shortcuts in the settings"

Getting Other,s IP Online

Beginners steps for hacking.........
Getting Ip's:--

To see the ip all computers you are connected to (web servers, people attempting to hack into your computer).
Go to dos (start>run>type command) and run the netstat command. Type netstat /? for details.

Type netstat -r at the command prompt to see the ip of all computers you are connected to

In MSN (and other programs) when you are chatting to someone everything you type goes through the MSN servers first (they act as a proxy) so you see their ip rather than who you are chatting to. You can get round this by sending them a file as MSN doesn't send file through its proxy.
When you type the netstat -r (or -a for a different view) the ip's are under the foreign address table. The ports are seperated by a : . Different programs use different ports, so you can work out which ip's are from which program.
Connecting to other computers and what ports are:--

Servers send information. Clients retrieve. Simple.
Windows comes with a built in program to connect to other computers called telnet.
To start Windows telnet Start menu> Run> type Telnet. Click connect> remote system
Ports are doors into computers. Hosts are computer names
(ip number or a name that is translated into the ip automatically)
Different programs open different ports, but they always open the same ports so other computers know which port to connect to. You can get a port list listing all the different ports, but a basic one is:
11 :- Sends info on the computer
21 :- FTP (File transfer program)
23 :- Telnet (Login to the computers command line)
25 :- Smtp (Sends mail)
80 :- Http (Web pages)
There are thousands of different programs using different ports. You can get programs called portscanners which check a computer for all ports up to a certain number, looking for ways in. You can portscan a computer looking for ways-in.
Anyway, back to telnet.
Type http://www.yahoo.com/ as the host and port as 80 the click connect.
If nothing happens, you're in. Wow. You are connected to Yahoo's server.


You can now type http commands (you are connected to an http server, so it supports http commands). Ie. on an ftp server you can type open and it will do something. On an http server it will just wonder what the hell you are on about.
Type get / http/1.0 then press enter twice to get the file on the server at / (try /index.html) etc.)
Allowing dos and regedit in a restricted Windows
See http://blacksun.box.sk/tutorials/format.ph...le=windows.html for some very cool tactics.
A very simple tactic I found after accidentally locking myself out of dos and regedit is to open notepad and type the following:
REGEDIT4
[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesWinOldApp]
"Disabled"=dword:0
[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem]
"DisableRegistryTools"=dword:0

Save it as something.reg then run it. Simple.

Making undeletable, unreadable folders

Tested on Windows 95/98
By holding down alt, then typing numbers on the number pad (right of the keyboard) you can create special characters. If you hold down alt, then press 1, then let go, you got the ascii character 1. You try some randomn numbers. This goes all the way up to 255. Open a dos prompt, and type md (alt+1+9+4)someword. md is the dos command to make a directoy, now try and open the directory in Windows, you can't. To open it, type ren (alt+1+9+4)someword someword (ren is the dos command to rename)


Proxies

Proxies are computers that you connect through, hiding your computer. Most aren't anonymous, they give away your ip. Some are. Good anonymous proxies: mail.uraltelecom.ru:8080 and 194.247.87.4:8080.
Different programs require different ways of using proxies. To do it in internet explorer 5 go to tools, internet options, connections, settings. In the above proxies they are in the format host:port

Password files
If you lock yourself out of Windows stuff, all passwords are stored in files called *.pwl in C:windows. Download showpass.zip from hereto view all passwords

Free Software For Newbies And Web Developers

Here is some free software tools to help you build your own websites and create web products.
Learning new skills is not difficult. It just takes a bit of willingness to give it a go. You will feel great satisfaction knowing that you can do this stuff.


*Zip Utility *HTML Editor *FTP Software *Screen Shot *Software Zip Utility




You just gotta have a zip utility if you intend to spend time on the Internet. I use WinZip for all my zipping and unzipping needs. It is fast and easy to use. If you would like to check out other zip utilities, go and do a search.


HTML Editor

To build web pages and eBooks, you'll need some kind of HTML editor. I use 1st Page 2000 for all my HTML editing. It is 100% Free for ever with all features working. This page and web site is being built with this editor.


After the editor is installed, you'll need some web pages to study. Search with the key words "free web page template". Don't worry, I just did it.



Quick Lesson:

All I did to begin learning was to simply open up these templates and study the code from within the editor and try to relate it to what I could see on the actual web page. For example, here is a shot of code from within the HTML editor:

Take it easy. Learn one command at a time. It won't be long before you get some web pages happening.
When you are ready to learn some more commands, go to HTML Goodies for a good range of Free tutorials.


FTP Software

To transfer your web site to the Internet, you'll need an FTP program. There are several Free FTP programs available for download. I like WS_FTP because it is fast to learn and easy to use. Another popular program is CuteFTP.
Screen Shot Software
To capture images from your computer screen, you'll need a program that will cut the image quickly and easily. I use a freeware program called SRip32. No installation is required and it is very user friendly.
You can also do a search for even more free screen capture software programs.

Four Easy Ways To Prevent Spyware

How would you like to prevent spy ware and ad ware from getting into your computer? You need to stop ad ware and spy ware before it gets into your files. That way you're protecting your private information such as passwords, credit card numbers and other documents that you don't want to share with anyone.

Spyware and ad ware removers are important because they clean your computer of malicious files. But the best thing you can do is prevent Spyware from ever being installed in the first place. Here are four ways to help prevent Spyware and adware from getting into your computer.

Keep Your Windows Software Updated

One of the best ways to prevent Spyware and adware from getting into your computer is to keep your Windows operating system software updated. Microsoft Windows update addresses security fixes that are constantly updating so your computer won't be vulnerable.

Use Computer Firewall Protection

One of the most effective ways to stop Spyware and adware is the use of computer firewall protection. Computer firewalls put up barriers to keep any malicious programs from being downloaded without your knowledge when you are on the Internet.

Computer firewall protection monitors everything going in and out of your computer. This acts as a protective shield allowing good data through while blocking the bad data from entering your computer. Most people don't realize that if you use Windows XP it comes with a firewall that you can turn on or off.

Be Careful What You Download

Another good way to prevent Spyware and adware from getting in your computer is being careful what you download from the Internet. There are a few types of software that are particularly notorious for including Spyware and adware.
Here's another tip to prevent Spyware from being downloaded without your knowledge. When you close a window on the Internet never click on a box that says "agree" or "OK." Instead, click on the "x" located in the upper right corner of the window. Some programs trick you into agreeing to download software that you have never seen when you click on these.

Install Spyware Protection Software
Spyware protection software is the easiest way to automatically remove and prevent Spyware from infecting your computer. You may wonder why you would need to purchase Spyware protection software if there are free Spyware cleaners.

Free Spyware cleaners are good programs to get rid of Spyware viruses you already have on your computer now.Spyware protection software is designed to find all hidden programs and disable them before they have a chance to work. Once you remove Spyware and adware programs from your computer you'll find it will run faster and your personal information will be much safer. These tips should give you some insight on how to stop Spyware and adware in its tracks.

Feature rich group messaging service (SMS) | SMSGupShup.com

logoGupShupB1

SMS Gup Shup is a free group messaging service by webaroo. SMS Gup Shup is a feature rich service when compared to local player Activ Mobs. You can create a free account on SMS Gup Shup and add up to 100 friends (mobile numbers) into a group. If you send a message to group, it will be delivered to all members present in that group!

Group Creation:

Everything is easy with SMS Gup Shup. To create a group you can either create an account online at www.smsgupshup.com or just send CREATE GROUPNAME to 567673434

Adding Friends:

To add friends you can invite your friends by inviting them through web interface by giving their mobile numbers or email IDs. Your friends will be instantly added & start receiving your messages. You can also add friends through SMS. Send INVITE MobileNumber1, MobileNumber2….to 567673434.

Sending Messages:

Again you can use web interface after sign up to send messages to your group which is absolutely free :-). You can also send your messages to 56767343, which will automatically delivered to your group members. Messages to 56767343 may cost you up to Rs.3/msg depending on your operator.

Despite of you adding your friends to your group, anyone else also can join your group through online or sending sms JOIN GroupName to 567673434. For example: I have created a group TECHB for Tech Bangalore to update users about new posts. Anyone can join group by sending sms JOIN TECHB.

Group creator will have rights to remove a user from the group. You may not want your father inside your group ;-). Currently you can create only one group with one login (one mobile number).

Error CodeS 1002-1100

1002
The window cannot act on the sent message.
1003
Cannot complete this function.
1004
Invalid flags.
1005
The volume does not contain a recognized file system. Please make sure that all required file system drivers are loaded and that the volume is not corrupted.
1006
The volume for a file has been externally altered so that the opened file is no longer valid.
1007
The requested operation cannot be performed in full-screen mode.
1008
An attempt was made to reference a token that does not exist.
1009
The configuration registry database is corrupt.
1010
The configuration registry key is invalid.
1011
The configuration registry key could not be opened.
1012
The configuration registry key could not be read.
1013
The configuration registry key could not be written.
1014
One of the files in the registry database had to be recovered by use of a log or alternate copy. The recovery was successful.
1015
The registry is corrupted. The structure of one of the files containing registry data is corrupted, or the system's memory image of the file is corrupted, or the file could not be recovered because the alternate copy or log was absent or corrupted.
1016
An I/O operation initiated by the registry failed unrecoverably. The registry could not read in, or write out, or flush, one of the files that contain the system's image of the registry.
1017
The system has attempted to load or restore a file into the registry, but the specified file is not in a registry file format.
1018
Illegal operation attempted on a registry key that has been marked for deletion.
1019
System could not allocate the required space in a registry log.
1020
Cannot create a symbolic link in a registry key that already has subkeys or values.
1021
Cannot create a stable subkey under a volatile parent key.
1022
A notify change request is being completed and the information is not being returned in the caller's buffer. The caller now needs to enumerate the files to find the changes.
1051
A stop control has been sent to a service that other running services are dependent on.
1052
The requested control is not valid for this service.
1053
The service did not respond to the start or control request in a timely fashion.
1054
A thread could not be created for the service.
1055
The service database is locked.
1056
An instance of the service is already running.
1057
The account name is invalid or does not exist, or the password is invalid for the account name specified.
1058
The service cannot be started, either because it is disabled or because it has no enabled devices associated with it.
1059
Circular service dependency was specified.
1060
The specified service does not exist as an installed service.
1061
The service cannot accept control messages at this time.
1062
The service has not been started.
1063
The service process could not connect to the service controller.
1064
An exception occurred in the service when handling the control request.
1065
The database specified does not exist.
1066
The service has returned a service-specific error code.
1067
The process terminated unexpectedly.
1068
The dependency service or group failed to start.
1069
The service did not start due to a logon failure.
1070
After starting, the service hung in a start-pending state.
1071
The specified service database lock is invalid.
1072
The specified service has been marked for deletion.
1073
The specified service already exists.
1074
The system is currently running with the last-known-good configuration.
1075
The dependency service does not exist or has been marked for deletion.
1076
The current boot has already been accepted for use as the last-known-good control set.
1077
No attempts to start the service have been made since the last boot.
1078
The name is already in use as either a service name or a service display name.
1079
The account specified for this service is different from the account specified for other services running in the same process.
1080
Failure actions can only be set for Win32 services, not for drivers.
1081
This service runs in the same process as the service control manager. Therefore, the service control manager cannot take action if this service's process terminates unexpectedly.
1082
No recovery program has been configured for this service.
1083
The executable program that this service is configured to run in does not implement the service.
1084
This service cannot be started in Safe Mode
1100
The physical end of the tape has been reached.

Email hacking

YAHOO # PASSWORD #CRACKING # METHODS #
Methods of getting yahoo passwords
I will explain in this tutorial how to obtain in difrent
ways yahoo passwords so that any N00B can understand and do
it.
It actualy isen't that hard the problem is thet with the
passing of years yahoo security has been getting better and
beter an most proggyes don't work anymore now I will
present to u the most efective reliable and easy to do
methods.After that I will also Informe you on how to
protect your self of thees dangers that go around te
internet.

METHOD 1
------BRUTE FORCING------
This is by far the most used method .You can find crackers
everywhere to download .On http://www.hackerspk.com/ there are a lot
of good cracked downloads.The one for which i sugest
R-G-Kracka it's easy to use and works. This is the most
sawed for method but is good for 2 things cracking boots
and when u realy want a password and will spend some time
cracking testing and working.
For this You have to get A cracker A password list and in
some cases a proxy list but I sugest u try a non proxy
cracker if it's ur first time.
This is a basic method and I'm sure that everyone will get
it the first time aldough results depend on your password
list.
PROTECTION It's simple get a very long password with asci
and numbers the most hard and long password that a brute
forcer will have trouble cracking and getting to is the
last of all asci letters and numbers the last password a
normal brute forcew of let's say 10 chars will be
"zzzzzzzz9!" thIs password will be the last one it will try
to crack.
Method 2
------TROJAN PASSWORD STEALER------
This is one of the most effective methods of obtaining

passwords at this time.U get a programme named Y! Jacked/mps1.5se/sub7 n

one of it's many varyations from http://www.cyberpunkz.com/ or http://www.hackerspk.com/ there are

many trojans n stealers.
With this you have to take the main program put it in a

folder and generate a trojan that you send via atachment to

the victim's mail box.When that person opens it u will have

hi's password.This is a easy to use program just take care

taht most antivirusez see it as a virus and u shoulden't

get alarmed by that.It has a lot of options that u will

understand surely if u know english.
PROTECTION It's the easyest way to protect ur self don't

open atachments from anybody I can send a mail with an

atachment from any mail I want for example It's not smart

to open any atachment without a good antivirus.
METHOD 3
------THE FAKE LOGIN------
This is a modified login page for yahoo.It's code has been

altered .Instead of sending the password and the user to a

yahoo server for loging in it sends them to a yahoo server

that sends them in a mail account.
Get one of thees from cretain people lool.
It's hard to spot people u after u make a page with this u

have to send the link to some1 and he has to sign in from

there.
PROTECTION Don't sign in yahoo from pages like

"www.infernal.isking.com/login.yahoo/script"

This is probably a fake login.
Try to open one of thees pages and check out the source

code u can determine what it will do from there.

Method 4
------PASSWARE OR PASSWORD SENDER------
This is for u people that want all passwords that were

entered in Internet explorer on your computer.
U download Passweare recovery kit and it will give u all of

the passwords on ur computer u can use this for people u

are close to lol.
PROTECTION Be a paranoic son of a bitch scan ur computer

check instaled programs never let other people fuck with it

and of ource never enter your passwords in another person's

computer

Oky this was for all new one's Hope most of them get these

methods and will be able to use them
good luck