This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Error CodeS 1002-1100

1002
The window cannot act on the sent message.
1003
Cannot complete this function.
1004
Invalid flags.
1005
The volume does not contain a recognized file system. Please make sure that all required file system drivers are loaded and that the volume is not corrupted.
1006
The volume for a file has been externally altered so that the opened file is no longer valid.
1007
The requested operation cannot be performed in full-screen mode.
1008
An attempt was made to reference a token that does not exist.
1009
The configuration registry database is corrupt.
1010
The configuration registry key is invalid.
1011
The configuration registry key could not be opened.
1012
The configuration registry key could not be read.
1013
The configuration registry key could not be written.
1014
One of the files in the registry database had to be recovered by use of a log or alternate copy. The recovery was successful.
1015
The registry is corrupted. The structure of one of the files containing registry data is corrupted, or the system's memory image of the file is corrupted, or the file could not be recovered because the alternate copy or log was absent or corrupted.
1016
An I/O operation initiated by the registry failed unrecoverably. The registry could not read in, or write out, or flush, one of the files that contain the system's image of the registry.
1017
The system has attempted to load or restore a file into the registry, but the specified file is not in a registry file format.
1018
Illegal operation attempted on a registry key that has been marked for deletion.
1019
System could not allocate the required space in a registry log.
1020
Cannot create a symbolic link in a registry key that already has subkeys or values.
1021
Cannot create a stable subkey under a volatile parent key.
1022
A notify change request is being completed and the information is not being returned in the caller's buffer. The caller now needs to enumerate the files to find the changes.
1051
A stop control has been sent to a service that other running services are dependent on.
1052
The requested control is not valid for this service.
1053
The service did not respond to the start or control request in a timely fashion.
1054
A thread could not be created for the service.
1055
The service database is locked.
1056
An instance of the service is already running.
1057
The account name is invalid or does not exist, or the password is invalid for the account name specified.
1058
The service cannot be started, either because it is disabled or because it has no enabled devices associated with it.
1059
Circular service dependency was specified.
1060
The specified service does not exist as an installed service.
1061
The service cannot accept control messages at this time.
1062
The service has not been started.
1063
The service process could not connect to the service controller.
1064
An exception occurred in the service when handling the control request.
1065
The database specified does not exist.
1066
The service has returned a service-specific error code.
1067
The process terminated unexpectedly.
1068
The dependency service or group failed to start.
1069
The service did not start due to a logon failure.
1070
After starting, the service hung in a start-pending state.
1071
The specified service database lock is invalid.
1072
The specified service has been marked for deletion.
1073
The specified service already exists.
1074
The system is currently running with the last-known-good configuration.
1075
The dependency service does not exist or has been marked for deletion.
1076
The current boot has already been accepted for use as the last-known-good control set.
1077
No attempts to start the service have been made since the last boot.
1078
The name is already in use as either a service name or a service display name.
1079
The account specified for this service is different from the account specified for other services running in the same process.
1080
Failure actions can only be set for Win32 services, not for drivers.
1081
This service runs in the same process as the service control manager. Therefore, the service control manager cannot take action if this service's process terminates unexpectedly.
1082
No recovery program has been configured for this service.
1083
The executable program that this service is configured to run in does not implement the service.
1084
This service cannot be started in Safe Mode
1100
The physical end of the tape has been reached.

Email hacking

YAHOO # PASSWORD #CRACKING # METHODS #
Methods of getting yahoo passwords
I will explain in this tutorial how to obtain in difrent
ways yahoo passwords so that any N00B can understand and do
it.
It actualy isen't that hard the problem is thet with the
passing of years yahoo security has been getting better and
beter an most proggyes don't work anymore now I will
present to u the most efective reliable and easy to do
methods.After that I will also Informe you on how to
protect your self of thees dangers that go around te
internet.

METHOD 1
------BRUTE FORCING------
This is by far the most used method .You can find crackers
everywhere to download .On http://www.hackerspk.com/ there are a lot
of good cracked downloads.The one for which i sugest
R-G-Kracka it's easy to use and works. This is the most
sawed for method but is good for 2 things cracking boots
and when u realy want a password and will spend some time
cracking testing and working.
For this You have to get A cracker A password list and in
some cases a proxy list but I sugest u try a non proxy
cracker if it's ur first time.
This is a basic method and I'm sure that everyone will get
it the first time aldough results depend on your password
list.
PROTECTION It's simple get a very long password with asci
and numbers the most hard and long password that a brute
forcer will have trouble cracking and getting to is the
last of all asci letters and numbers the last password a
normal brute forcew of let's say 10 chars will be
"zzzzzzzz9!" thIs password will be the last one it will try
to crack.
Method 2
------TROJAN PASSWORD STEALER------
This is one of the most effective methods of obtaining

passwords at this time.U get a programme named Y! Jacked/mps1.5se/sub7 n

one of it's many varyations from http://www.cyberpunkz.com/ or http://www.hackerspk.com/ there are

many trojans n stealers.
With this you have to take the main program put it in a

folder and generate a trojan that you send via atachment to

the victim's mail box.When that person opens it u will have

hi's password.This is a easy to use program just take care

taht most antivirusez see it as a virus and u shoulden't

get alarmed by that.It has a lot of options that u will

understand surely if u know english.
PROTECTION It's the easyest way to protect ur self don't

open atachments from anybody I can send a mail with an

atachment from any mail I want for example It's not smart

to open any atachment without a good antivirus.
METHOD 3
------THE FAKE LOGIN------
This is a modified login page for yahoo.It's code has been

altered .Instead of sending the password and the user to a

yahoo server for loging in it sends them to a yahoo server

that sends them in a mail account.
Get one of thees from cretain people lool.
It's hard to spot people u after u make a page with this u

have to send the link to some1 and he has to sign in from

there.
PROTECTION Don't sign in yahoo from pages like

"www.infernal.isking.com/login.yahoo/script"

This is probably a fake login.
Try to open one of thees pages and check out the source

code u can determine what it will do from there.

Method 4
------PASSWARE OR PASSWORD SENDER------
This is for u people that want all passwords that were

entered in Internet explorer on your computer.
U download Passweare recovery kit and it will give u all of

the passwords on ur computer u can use this for people u

are close to lol.
PROTECTION Be a paranoic son of a bitch scan ur computer

check instaled programs never let other people fuck with it

and of ource never enter your passwords in another person's

computer

Oky this was for all new one's Hope most of them get these

methods and will be able to use them
good luck

Eliminating the Right Click on the Desktop

1. Start Regedit

2. Go to HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer

3. Add a DWORD and give it a name of NoViewContextMenu

4. Give it a value of 1

5. Reboot

Easiest way of creating a Facebook Application

One of the main reasons of success of facebook is the applications it provides you and over that even you can make a facebook application and let others subscribe to it and add to their profiles.
What I am going to tell you here in this post is a simple facebook app creation method which doesnt require any programing but ya,you should know how to make simple webpage.

Facebook application creation explained!!

  • To start with go to Developers : http://www.facebook.com/developers/ and click on create an application
  • Then you will have to enter the application name say : GaufireWeblogs
  • And will have to fill up a form,i tell you about the different terms used in the form in a while
  • Before that ,make a webpage where you can post videos or paste some content which you will change daily like horoscope or match scores etc and upload it on some webhost. Prefer http://pages.google.com for the page uploading
  • Ok so you are ready with your application content and interface [remember your webpage will be the interface of your application means your webpage is what the people will see as your app ---Getting my point??
  • Now let me throw some light on the terms you should know while filling up creating application form

API Key
Facebook will give you once you complete the basic details form,just copy paste whenever asked

Secret
Facebook will give you once you complete the basic details form,just copy paste whenever asked

Contact Email
Your email id

Support Email
Your email id

Callback URL
Address of the webpage where you uploaded it say http://infogaufire.googlepages.com/

Canvas URL
http://apps.facebook.com/gaufire/ : choose any name instead of gaufire

FBML/iframe
iframe : There will be two options FBML and iframe,use iframe only
Dev Mode?
Off

Application Type
Desktop : You can choose either website or desktop

Side Nav URL
http://apps.facebook.com/gaufire/ : Same as that of Canvas URL

Private Install?
No

Description
This is a simple fast loading IPL T20 updated Point table...see if where your team stand!!
Visit us at http://toi-iplt20.blogspot.com
Cricket Application!! : As name suggests describe your applicati


Download 50 Computer Pranks

Products listed here were not designed in any way to damage the end user's machine, and have been written
Just for fun!!

1- AddRemove v1.00
2- Avoid v1.01
3- Back Pack Prank
4- Blue Screen of Death Prank
5- Bomb v1.02
6- Buttons Prank
7- Click Me v1.01
8- ClickStart v1.00
9- Clippy v1.00
10- Copy Cursor v1.00
11- Crazy Num Caps Scroll v1.04
12- Cursor Fun v1.01
13- Dirty Mouse v1.00
14- DownHoax v1.02
15- Email Fun v1.00
16- Enhance Your Mouse Prank
17- Exit P Prank
18- Fake Delete v3.05
19- Fake Format v1.05
20- Fake Shutdown v1.00
21- Fake Start Menu 95 v1.00
22- Flasher v1.00
23- Flip It v1.00
24- Floppy Madness v1.00
25- Follow Me v1.00
26- Gas Gripe v1.00
27- HeadAche v1.01
28- Image Capture Prank
29- IQ Test Prank
30- Message Manager Lite v1.06
31- Mouse Droppings v1.00
32- Mouse Move v1.00
33- MouseClicks v1.00
34- Password Prank v1.00
35- Pirated Software v1.00
36- Popup Prank v1.00
37- Print Me v1.00
38- Program - WAV Launcher v1.07
39- Random Burper v1.00
40- Relationship Test Prank
41- ReplaceKeys v1.00
42- Rotate v1.00
43- Screen Screw v1.00
44- Shakedown v1.00
45- Show - Hide Desktop v1.00
46- Swap Mouse Buttons Prank
47- The Finger v1.01
48- Time Traveler v1.00
49- Windows Wordpad Prank
50- Y2K Joke v2.00


Size=23.3MB
http://w14.easy-share.com/5310031.html

Domain name extensions:

The last word (sometimes words) after the last period (.) of an Internet domain name generally represents either the type of the organization or the geographical location of that particular domain.

For example, microsoft.com (note .com at the end) means that microsoft.com is a domain name of a commercial entity.Top Level Domains

Example: school_name.EDU = Domain name of an educational institute

ARPA Old style Arpanet
COM Commercial
EDU Educational
GOV Government
INT International field
MIL US Military
NATO Nato field
NET Network
ORG Non-Profit Organization

Country Codes:

Example: my_domain.CA = Canadian domain name AD Andorra

AE United Arab Emirates
AF Afghanistan
AG Antigua and Barbuda
AI Anguilla
AL Albania
AM Armenia
AN Netherland Antilles
AO Angola
AQ Antarctica
AR Argentina
AS American Samoa
AT Austria
AU Australia
AW Aruba
AZ Azerbaidjan
BA Bosnia-Herzegovina
BB Barbados
BD Bangladesh
BE Belgium
BF Burkina Faso
BG Bulgaria
BH Bahrain
BI Burundi
BJ Benin
BM Bermuda
BN Brunei Darussalam
BO Bolivia
BR Brazil
BS Bahamas
BT Buthan
BV Bouvet Island
BW Botswana
BY Belarus
BZ Belize
CA Canada
CC Cocos (Keeling) Isl.
CF Central African Rep.
CG Congo
CH Switzerland
CI Ivory Coast
CK Cook Islands
CL Chile
CM Cameroon
CN China
CO Colombia
CR Costa Rica
CS Czechoslovakia
CU Cuba
CV Cape Verde
CX Christmas Island
CY Cyprus
CZ Czech Republic
DE Germany
DJ Djibouti
DK Denmark
DM Dominica
DO Dominican Republic
DZ Algeria
EC Ecuador
EE Estonia
EG Egypt
EH Western Sahara
ES Spain
ET Ethiopia
FI Finland
FJ Fiji
FK Falkland Isl.(Malvinas)
FM Micronesia
FO Faroe Islands
FR France
FX France (European Ter.)
GA Gabon
GB Great Britain (UK)
GD Grenada
GE Georgia
GH Ghana
GI Gibraltar
GL Greenland
GP Guadeloupe (Fr.)
GQ Equatorial Guinea
GF Guyana (Fr.)
GM Gambia
GN Guinea
GR Greece
GT Guatemala
GU Guam (US)
GW Guinea Bissau
GY Guyana
HK Hong Kong
HM Heard & McDonald Is
HN Honduras
HR Croatia
HT Haiti
HU Hungary
ID Indonesia
IE Ireland
IL Israel
IN India
IO British Indian O. Terr.
IQ Iraq
IR Iran
IS Iceland
IT Italy
JM Jamaica
JO Jordan
JP Japan
KE Kenya
KG Kirgistan
KH Cambodia
KI Kiribati
KM Comoros
KN St.Kitts Nevis Anguilla
KP Korea (North)
KR Korea (South)
KW Kuwait
KY Cayman Islands
KZ Kazachstan
LA Laos
LB Lebanon
LC Saint Lucia
LI Liechtenstein
LK Sri Lanka
LR Liberia
LS Lesotho
LT Lithuania
LU Luxembourg
LV Latvia
LY Libya
MA Morocco
MC Monaco
MD Moldavia
MG Madagascar
MH Marshall Islands
ML Mali
MM Myanmar
MN Mongolia
MO Macau
MP Northern Mariana Isl.
MQ Martinique (Fr.)
MR Mauritania
MS Montserrat
MT Malta
MU Mauritius
MV Maldives
MW Malawi
MX Mexico
MY Malaysia
MZ Mozambique
NA Namibia
NC New Caledonia (Fr.)
NE Niger
NF Norfolk Island
NG Nigeria
NI Nicaragua
NL Netherlands
NO Norway
NP Nepal
NR Nauru
NT Neutral Zone
NU Niue
NZ New Zealand
OM Oman
PA Panama
PE Peru
PF Polynesia (Fr.)
PG Papua New Guinea
PH Philippines
PK Pakistan
PL Poland
PM St. Pierre & Miquel
PN Pitcairn
PT Portugal
PR Puerto Rico (US)
PW Palau
PY Paraguay
QA Qatar
RE Reunion (Fr.)
RO Romania
RU Russian Federation
RW Rwanda
SA Saudi Arabia
SB Solomon Islands
SC Seychelles
SD Sudan
SE Sweden
SG Singapore
SH St. Helena
SI Slovenia
SJ Svalbard & Jan Maye
SK Slovak Republic
SL Sierra Leone
SM San Marino
SN Senegal
SO Somalia
SR Suriname
ST St. Tome and Principe
SU Soviet Union
SV El Salvador
SY Syria
SZ Swaziland
TC Turks & Caicos Isla
TD Chad
TF French Southern Terr.
TG Togo
TH Thailand
TJ Tadjikistan
TK Tokelau
TM Turkmenistan
TN Tunisia
TO Tonga
TP East Timor
TR Turkey
TT Trinidad & Tobago
TV Tuvalu
TW Taiwan
TZ Tanzania
UA Ukraine
UG Uganda
UK United Kingdom
UM US Minor outlying Isl.
US United States
UY Uruguay
UZ Uzbekistan
VA Vatican City State
VC St.Vincent & Grenad
VE Venezuela
VG Virgin Islands (British
VI Virgin Islands (US)
VN Vietnam
VU Vanuatu
WF Wallis & Futuna Isl
WS Samoa
YE Yemen
YU Yugoslavia
ZA South Africa
ZM Zambia
ZR Zaire
ZW Zimbabwe

Disabling the F3 Search Key !!

1. Start Regedit

2. Go to HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Restrictions

3. Create a Dword value called NoFindFiles

4. Give it a value of 1

5. Reboot