Your Ad Here

Sunday, April 11, 2010

Watch Online Hindi Newest Movies with DVD Quality

Hey Guys, Now watch all the Hindi Movies in DVD Quality with Superb Streaming Speed.. All the newest Movies also in DVD Quality..

New Movies added every week with every week movies released.

Also Movies on request is also available. Just make a request and get the movie addded and enjoy the movie in DVD Quality.

Watch At -->

Gopsip

Now Watch Online Movies in Smarter Way.

Wednesday, April 7, 2010

How to Make Invisible Password Protected Folder

Do you want to password protect your folder? Do you want to make it invisible so that it remains unnoticed by the normal users? Well here is a way to do that. In this post I will show you how to make a password protected folder in Windows without using any additional software. Here is is step by step procedure to create a password protected folder.



How to create a Password Protected Folder

Step-1: Create a new folder (Right-click -> New -> Folder) and give it any name of your choice. For instance I name it as ABC.

Step-2: Now in this folder place all the important files, documents or any folders that you want to password protect.

Step-3: Now Right-click on this folder (ABC) and select the option Send To -> Compressed (zipped) Folder.

Step-4: Now a new compressed zipped folder gets created next this folder (ABC) with the same name.

Step-5: Double-click on this compressed zipped folder and you should see your original folder (ABC) here.

Step-6: Now goto the File menu and select the option Add a password.

ie: File -> Add a password

Now a small window will pop up and here you can set your desired password. Once the password is set, the folder will ask for the password every time it is opened. Thus you have now created the password protected folder.



How to make it Invisible

Step-1: Now Right-click on this password protected folder and select Properties.

Step-2: At the bottom select the option Hidden and press OK. Now your folder gets invisible (hidden).

Step-3: In order to unhide this folder go to My Computer – >Tools -> Folder options. Switch to View tab, scroll down and under Hidden files and folders you’ll see the following two options

* Do not show hidden files and folders
* Show hidden files and folders

Now select the second option and press OK. Now the invisible folder becomes visible in it’s location. To access it you need the password. To make it invisible again repeat step -1 through step-3 and select the first option and click OK. Now the folder becomes invisible once again.

Wednesday, March 24, 2010

New Awesome Warez Forum Website and Free Public Rapidleech Server

Hey Friends,
Now here is a Warez Forum Website for you where you can get all the latest stuffs absolutely free all the stuffs you needed like Movies,Apps,Games,Warez,E-Books,Web Development,Graphics,Templates and Scripts,Hacking Stuffs,Movies and Games Torrents,Mobile and PDA Games and Softwares and VIP Lounge all in there and also a GREAT thing is that members can use the latest free public version pf Rapidleech so that you can Download and Upload for FREE and FAST without Premium Account of any Site.

so just go and Register there to get the Full Facilities

Warez City

Tuesday, February 23, 2010

Get Approved for Google Adsense

You get money from adsense only if you have a decent traffic. There’s no point in applying for it immediately after you setup your website as you are most likely to end up with your account being rejected if you apply immediately after setting up your website without any content.

Google’s AdSense Program Policies and the Terms and Conditions are probably two of the most informative articles that you must read before applying for adsense.

How long should i have to wait before applying for adsense?

There’s nothing like you must wait for 30 days or 90 says before you can apply for adsense, the only thing is you should have decent content on your blog/website and have some decent traffic. Once approved into adsesne you can use the same publisher ID to display ads on multiple websites. So if you have a aged blog with some traffic on blogger or any other network apply with that url.

Tip: Blogger blogs are easily approved.

If you are previously banned from adsense for click fraud

Google takes click fraud very seriously, if you are previously banned from adsense for click fraud, then apply with a different name, email address and residence address. It’s always tempting for new bloggers and webmasters to click their own ads and asking friends to click on their own ads, don’t ever do that. You will be banned for life time for doing so.

Adsense is like a duck laying golden eggs, handle it with care.

Content

Make sure that your content is in compliance with adsense program policies. You may apply with a site that is in compliance with adsense and later use that account to publish ads on all your other sites.

Note: Google verifies all the sites on which your ad code is displayed manually and may ban your account or domain from adsense if they are not in compliance with their program policies.

Age

You must be 18 years or older to apply for adsense. If you are not above 18 years you can apply with your elder bro or dads name.

Get a adsense account without having a website

If you haven’t created an Adsense account before, then apply through HubPages. Google will approve your account before you even need to write or publish any content.

That’s right, no need to create content before applying to Google Adsense when you’re applying through HubPages.

Read the Hubpages FAQ here.

Sign up for Hubpages here.

Once you’ve registered a Hubpages Author account go to Affiliate Settings (it’s in your My Account page, under Affiliate Settings).

On the “Affiliate Settings” page you’ll see next to where it says “Adsense” a link to “Sign Up”. It will then ask “Do you already have a Google AdSense account?”. If you say yes, it’ll ask for your Publisher ID and then in a few simple steps you will have linked and activated your Adsense Publisher ID to your Hubpage account. However you’re here to start an account, so select No.Tick the box for “I have read and understand Google’s terms of service” and click the button “Signup for AdSense” and away you go!

Saturday, February 20, 2010

Simple way to reset non-administrator account passwords

Here is another simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task.

1. Open the command prompt (Start->Run->type cmd->Enter)

2. Now type net user and hit Enter

3. Now the system will show you a list of user accounts on the computer. Say for example you need to reset the password of the account by name Michael, then do as follows

4. Type net user Michael * and hit Enter. Now the system will ask you to enter the new password for the account. That’s it. Now you’ve successfully reset the password for Michael without knowing his old password.

So in this way you can reset the password of any Windows account at times when you forget it so that you need not re-install your OS for any reason. Hope this helps.

How to Hack Windows Administrator Password

This hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password.

Most of us have experienced a situation where in we need to gain access to a computer which is password protected or at times we may forget the administrator password without which it becomes impossible to login to the computer. So here is an excellent hack using which you can reset the password or make the password empty (remove the password) so that you can gain administrator access to the computer. You can do this with a small tool called Offline NT Password & Registry Editor. This utility works offline, that means you need to shut down your computer and boot off your using a floppy disk, CD or USB device (such as pen drive). The tool has the following features.

* You do not need to know the old password to set a new one
* Will detect and offer to unlock locked or disabled out user accounts!
* There is also a registry editor and other registry utilities that works under linux/unix, and can be used for other things than password editing.

How it works?

Most Windows operating systems stores the login passwords and other encrypted passwords in a file called sam (Security Accounts Manager). This file can be usually found in \windows\system32\config. This file is a part of Windows registry and remains inaccessible as long as the OS is active. Hence it is necessary that you need to boot off your computer and access this sam file via boot. This tool intelligently gains access to this file and will reset/remove the password associated with administrator or any other account.

The download link for both CD and floppy drives along with the complete instructions is given below

Offline NT Password & Reg Editor Download

It is recommended that you download the CD version of the tool since floppy drive is outdated and doesn’t exist in today’s computer. Once you download you’ll get a bootable image which you need to burn it onto your CD. Now boot your computer from this CD and follow the screen instructions to reset the password.

Sunday, February 14, 2010

Some Good and Best free FTP Client Software

Here are the list for some of those good and best free ftp software!

1. FTP Commander (very similar to WS_FTP) http://www.vista.ru/2inter.htm

2. FileZilla FTP http://filezilla.sourceforge.net/

3. Core FTP http://www.coreftp.com/

4. Ace FTP http://freeware.aceftp.com/

5. Smart FTP http://www.smartftp.com/download/

6. FTP Explorer (No longer free) one of the best ftp on my list but now turn to money... http://www.ftpx.com/

7. CoffeeCup Free FTP http://www.tucows.com/preview/195147

8. Free FTP http://www.brandyware.com/freeftp.htm

9. Cyberduck: http://cyberduck.ch/

10. FTP Surfer: http://www.whispertech.com/surfer/

11. i.Ftp: http://www.memecode.com/iftp.php

12. LeechFTP (LeechFTP is a free FTP program with the usual features. It is no longer under development.) : http://www.download.com/Leech-FTP/3000-2160_4-10122207.html

13. Fastream NETFile FTP Client : http://www.fastream.com/netfile.htm (Thanks gideonpyzer for this ftp software link)



Pick your choice, it's depending on what you like!

Enjoy!

Tuesday, February 2, 2010

Top ten best hackers of the world

The culture started from the, The hackers culture. Now I am an ethical hacker and many more people like me either interested in or wanted to be hacker , DO you know why is that so ? Answer is these guys made term hacking popular worldwide.
I know they were bad boys , but as an ethical hacker I salute their intelligence , their dedication , and everything they did.

For the users of this blog I am specially posting the names of top 10 hackers of the world who sometime in the past really rocked the news of the world.

Kevin Mitnick: Known worldwide as the “most famous hacker” and for having been the first to serve a prison sentence for infiltrating computer systems. He started dabbling when he was a minor, using the practice known as phone phreaking. Although he has never worked in programming, Mitnick is totally convinced that you can cause severe damage with a telephone and some calls. These days, totally distanced from his old hobbies and after passing many years behind bars, he works as a security consultant for multinational companies through his company “Mitnick Security.”

Gary McKinnon: This 41-year-old Scotsman, also known as Solo, is the perpetrator of what’s considered the biggest hack in the history of computer science – into a military system. Not satisfied with this, in the years 2001 and 2002, he made a mockery of the information security of NASA itself and the Pentagon. Currently he is at liberty awarding his extradition to the U.S. and prohibited access to a computer with Internet connection.

Vladimir Levin: This Russian biochemist and mathematician was accused of having committed one of the biggest bank robberies of all times by means of the cracking technique. From Saint Petersburg, Levin managed to transfer funds estimated at approximately 10 million dollars from Citibank in New York to accounts he had opened in distant parts of the world. He was arrested by INTERPOL in 1995 at Heathrow airport (England). Although he managed to rob more than 10 million dollars, he was only sentenced to three years in prison. Currently he is free.

Kevin Poulsen: Today he may be a journalist and collaborates with authorities to track paedophiles on the Internet, but Poulsen has a dark past as a cracker and phreaker. The event that brought him the most notoriety was taking over Los Angeles phone lines in 1990. A radio station was offering a Porsche as a prize for whoever managed to be caller number 102. It goes without saying that Poulsen was the winner of the contest.

Timothy Lloyd: In 1996, information services company Omega, provider of NASA and the United States Navy, suffered losses of around 10 million dollars. And it was none other than Tim Lloyd, an x-employee fired some weeks earlier, who was the cause of this financial disaster. Lloyd left a virtually activated information bomb in the company’s codes, which finally detonated July 31 of that same year.

Robert Morris: Son of one of the forerunners in the creation of the virus, in 1988 Morris managed to infect no fewer than 6,000 computers connected to the ArpaNet network (one of the precursors to the internet) He did it from the prestigious Massachusetts Institute of Technology (MIT) and for his criminal activities he earned a four year prison sentence, which was finally reduced to community service.

David Smith: Not all hackers can boast of creating the virus that spread the fastest to computers the width and breadth of the globe – David Smith can. In 1999, the father of the Melissa virus managed to infect and crash 100,000 email accounts with his malicious creation. Smith, who was thirty years old at the time, was sentenced and freed on bail.

MafiaBoy: In February of 2000, many of the most important online companies in the US, such as eBay, Yahoo and Amazon, suffered a technical glitch called Denial of Service, which caused a total of 1700 million dollars in losses. But did these sites know that the perpetrator of the attack was a 16 year-old Canadian who responded to the alias MafiaBoy? Surely not, although it didn’t take them long to find out, thanks to his bragging about his bad deed to his classmates at school.

Masters of Deception (MoD): MoD was a New York cyber-gang that reached its apogee in the early 90s. Under the cover of different aliases, its biggest attacks involved taking over telephone lines and centres of the Internet, then still in its infancy. During this time McD starred in the historic “battles of the hackers,” along with other groups like the Legion of Doom (LoD), as they sought to destroy each other until the computers couldn’t take it anymore.

Richard Stallman: Since the early 80s when he was a hacker specializing in artificial intelligence, this hippie-looking New Yorker has been one of the most active militants in favor of free software. At MIT he firmly opposed the privatization of the software used by the institute’s laboratory, so much so they he created what today is known as GNU and the concept of CopyLeft. Popular systems like Linux utilize the GNU mode and Stallman is currently one of the gurus of software democratization.

Thursday, January 21, 2010

Want to Spy Mobile Phone - Tutor for Spying Mobile Phones

Well recently people discuss about the matter of cheating of the girlriend or boyfriend. So do you want to know how about them, to whom they talk,sms,they go? So you have secretly spy on their mobile phone for the SMS text messages, calls, GPS locations and other confidential info of your child’s or spouse’s mobile phone? Get here the tutorial on how to spy on mobile phones.

To spy on any mobile phone all you have to do is to install a good mobile phone spying software on the mobile phone to whom you want to spy on and once you do this you can silently record every SMS and information about each call. You can also see GPS positions every thirty minutes.

The best Mobile Phone Spy software recommended is Mobile Spy

Why to choose Mobile Spy?

There are many mobile phone spy software's in the market and hence people often get confused to which mobile phone spy software they choose. So People experimened and saw the good results and recommended for the Mobile Spy to go with.

Mobile Spy is one of the best and award winning mobile phone spy softwares in the market also with an affordable price. Mobile Spy team provides an exmobileent support and hence it becomes just so simplier to spy on any mobile phone you want to! As i mentioned previously the cheating cases of girlfriend and boyfriend have been increased so this is a useful software for them and also for the parents so they come to know what their children are doing? If you’re really serious to spy on a mobile phone then Mobile Spy is for you.Get a copy of Mobile Spy and expose the truth.

Mobile Spy is a perfect tool for parents to monitor their children’s activity on their mobile phone!

Mobile Spy Features

Mobile Spy is a hybrid spy software/service which allows you to spy on the mobile phone you want in real time. This unique system records the activities of anyone who uses the compatible mobile phone ( iPhone, Windows Mobile or Symbian OS smartphone). For this you need to install a small application onto the mobile phone. This application starts at every boot of the phone but remains stealth and does not show up in the running process list. It runs in the background and will spy on every activity that takes place on the phone. Thus the spying feature is completely undetected!

Logging Features

1. Spy on Calls Log – Each incoming and outgoing number on the phone is logged along with duration and time stamp.

2. Spy on SMS – Every text message/MMS is logged even if the phone’s logs are deleted. Includes full text.

3. Spy on Location – The phones’s current location is frequently logged using GPS when signal is available.

4. Spy on Web Activity – Each address entered into Internet Explorer (or any browser) on the phone is logged.

5. This mobile phone spy software works in total stealth mode. The person using the phone can never come to know about the presence of this spy software.

How it works

The working of Mobile Spy is very simple and needs no extra knowledge to install and use.

Step 1- After you purchase Mobile Spy you’ll get a link to download the software. Along with this you’ll get a username and password for you online control panel.

Step 2- Install the downloaded mobile phone spy software onto any of the compatible mobile phone. After installation the spy software starts recording all the activities on the mobile phone.

Step 3- Login to your online control panel to see the logs containing the recorded information.

This is just a small list of Mobile Spy features. For a list of compatible phones, step-by-step installation guide and more details visit the Mobile Spy Homepage

Monday, January 18, 2010

Download YouTube Videos and else without any software

Download YouTube and else Videos online without any softwares.

http://www.dlyoutube.com
This site for youtube download.

http://www.keepvid.com
This is for any video like youtube,google video,etc

- Open the above link.
- Just copy and paste the url of a YouTube video and you want to download and press the download button.
- You will get another download link below. Click it and save the file.
- Save it as .flv file
Download the .FLV Player (to play the above file) available at that website.


There is one another simple way to download the youtube video files...

1. Open any video you want to watch from youtube website and copy that url.
2. Type “kiss” before youtube.com/abcdefgh123
ie. www.kissyoutube.com/abcdefgh123
3. And you can see the download link is available for your video just download the video .flv file….

No software required all online download.

Monday, January 4, 2010

Find Unauthorized Activity on Your Email Account

Do you suspect that your email account is under attack? Do you want to maintain total security of your email account and make it 100% hack proof? Well, Some times our email account might have got hacked and we may not be aware of that. We may believe that our email account is safe, but in reality our private and confidential information may be falling into the hands of a third person.

Here are some signs of unauthorized activity on an email account.

1. Your new emails are marked as Read even if you’ve not read them.

2. Your emails are moved to Trash or even permanently deleted without your notice.

3. Your emails are being forwarded to a third party email address (check your settings->forwarding).

4. Your secondary email address is changed.

If you come across any of the above activities on your email account, then it is a clear indication that your email account is hacked.

Additional Security Features in Gmail to ensure the Safety of your Account

Gmail provides an additional security feature to protect your email account through the means of IP address logging. That is, Gmail records your IP address every time you login to your Gmail account. So, if a third party gets access to your account then even his/her IP is also recorded. To see a list of recorded IP address, scroll down to the bottom of your Gmail account and you’ll see something like this.

Gmail - Last account activity

You can see from the above figure that Gmail shows the IP address of last login (last account activity). You can click on Details to see the IP address of your last 5 activities. If you find that the IP listed in the logs doesn’t belong to you, then you can suspect unauthorized activity.

Steps to be carried out to stop unauthorized activity on your email account

If you feel/suspect that your account is hacked then you must immediately take the actions mentioned below

1. Change your Password

2. Change your security question.

2. Remove any third party email address (if any) to which your account is set to forward emails.

3. Make sure that you can access the email account of your secondary email address.

4. Also change you secondary email password and security question.

This ensures that your account is safe from future attacks.

Saturday, January 2, 2010

Unlocking your Iphone

Now unlock your iphone your self by just following simple steps and enjoy using your favourite network sim card in it. Just some simple steps-

–>Make sure your iPhone is docked and charged
–>Backup all of your phone settings
–>Also make sure that the processes iTunes.exe and iTunesHelper.exe arent running.

–>Download the following and place them into “phone” folder created in c: drive.
1.software restore file from Apple(here)
2.Jailbreak program here
3.iPhoneInterface (v 0.3.3) program here
4.iTunesMobileDevice.dll from here

–>Navigate to the phone folder from cmd prompt and type jailbreak
Jailbreak should say Sending Files… You’ll then be prompted to hold the POWER and HOME buttons for 25 seconds. The phone will automatically shut down, and then restart..

–>In the command prompt type: iphoneinterface and a prompt for
iPhone:/# should appear.Next type: deactivate

–>Now go to this site. Right click the iPhoneActivation.pem link at the top of the page and
save it to your C:\phonedmg directory and keep your browser open on this page.

–>Back to command prompt,type
cd /System/Library/Lockdown/
putfile /System/Library/Lockdown/iPhoneActivation.pem
This will copy over a modified iPhoneActivation.pem file that is required for this to work.

–>Now you need to find your iPhone’s Device ID found at:
C:\Documents and Settings\username\Application Data\Apple Computer\Lockdown.If you can not find this file check the hidden files.
As for the other two numbers, the IMEI and ICCID are found by pressing the “i” button
when the iPhone asks for activation

–>now fill in these details in the open browser page and generate a custom activator and place it in your phone folder.

–>doubleclick the file just d/l and ull be shown details abt ur iphone..You will then get this pop up telling you your iPhone is activated


Smile and Enjoy…..