Tuesday, November 30, 2010

how to open blocked facebook

hello friends!!
proxies are updated again so enjoy all blocked sites without any interrupt....
click given link for proxies
http://hackers001.blogspot.com/p/open-blocked-sites.html

Monday, November 29, 2010

Facebook Farmville Cheats and Codes

  • Farmville cheats are sometimes available for coins, items and experience as you play the game. However, there are no actual Farmville cheat codes--only occasional glitches that allow players to benefit, and are considered cheats. Find cheats for Farmville throughout the page below, as well as strategies for leveling up quickly and earning lots of money. Listed here are the speed cheats, along with the fastest growing crops.


    FarmVille is a social game developed by Zynga, and available on social networks and iPhones. Launched in June 2009, it became one of the most popular applications on Facebook, garnering 10 million users in less than a month. This is one of the most popular games on the largest social networking system in the world.


    In this MMORPG game, you can buy the farm in a good way. You learn how to plow, plant, reap your harvest, and help your friendly neighbors on this game. This game is for people of all ages, and is easy to learn. Yes, players will find some cheat codes, along with strategy tips and hints for everyone to use.There are links to other Farmville cheats are included in this page.
  • Cheat Software

    Some automated software, or "bots," are available that can speed up the playing process by automatically tending to your crops or performing other game functions. These can be accessed over the Internet and downloaded to your computer. While some of them may be effective, there is always a risk of downloading a virus or spyware. In addition, word on the street is that Zynga looks out for these, and may ban your account if you are caught using one.http://farmvillecheats.co.cc/
  • Facebook Farmville Cheat Codes for Speed

    Clear a section in your field of plots, you need to create a nice section of land. Clear nine spots in a formation. Now ‘walk’ your person in the middle of this section.
    Go to the market, purchase the cheapest fences, and set the fences around the person. After you have set four fences down you will need to turn two of them. You can click on the fence when it is placed and turn it sideways. This effectively blocks in the person and now you can plow and plant much quicker.

    This fence trick is super handy if you have a large amount of area to plow or plant. If you use other items to block in your person, he or she will walk around the perimeter and proceed to plant or plow.

    FarmVille Cheats- The Gift that keeps on Giving
    Try this though it may not work on every browser. Create an additional account (not your main one) which we call the giver. Using the giver account, right click on the "Gift" tab and then click on Open In New Browser. Open as many of this as you want. The, go to each open tab which essentially has the same screen and select the gifts you want. Please make sure you do that for each tab without confirming the selection. Then, go to each tab again and select your main account as the account to receive the gift. Again, the key is not to confirm anything. Once you are done,  you can then click confirm and your main account should receive these gifts. Since gifts=money at some point, you would have created a way to earn unlimited amount of money though it is probably not as fast as doing it the honest way of planting and harvesting crops.


    FarmVille cheats in getting coins
    This is not really a cheat but The trick is really knowing which tree and animals give you the best bang for the buck. It is usually good to just sell the tree once they have gone through one harvest. This is because the initial gifts does not cost any coin, but then it later takes up too much space and so selling them immediately allows you to make some coins on 0 cost and then save the time since it takes some time for the next harvest. Also, you get the most coins when you plant versus rearing animals. Just like stock investing, you really want to diversity as the plants takes different amount of time to grow and harvest. By planting several crops, it allows you to have almost a constant supply of fresh crops ready for harvest so you are not just waiting around for crops to grow.

    You should also know that crops just grow whether you are in front of the computer or not. So, do know the timing of each crop as you need to be able to harvest them within hours or they will start rotting and you do not want to waste time clearing rotting crops.

    Strawberries are the cheapest and grows in about 4 hours. So, you may want to start your morning sowing some strawberry seeds and then log in 4 hours later to harvest it. This is the crop you get started with when you start playing FarmVille, but it is not necessarily the best crop to plant since they can spoil very quickly which means you would have wasted all your money trying to plant the crop.

    FarmVille cheats in a farm on auto pilot mode
    If you do not have much time to work on a farm, yet want a stable cash flow, you may want to make decisions on the kind of tree you want to plant. Fruit trees last longer and allows you to sell the fruits for money. The problem is that they take up space, are expensive to buy and the fruits does not sell for a lot of money. In other words, your return on investment is not the best here. However, if you do not have time anyway, this may be the best for you. Otherwise, you can also invest in animals where you can get milk from the cows, eggs from the duck, etc and make some small cash flow with it. Unlike crops which is time critical, food from the animals never really spoil and so you are not tied to returning to your computer to try to manage it.

    So, most of the Farmville cheats you find online are really not cheats, but just smarters ways to make more money and level up in experience points. Using the Cheat Engine is probably your best bet to quickly change a number in memory. Otherwise,there are also Farmville guide books on that you can buy if you want to learn the strategies and techniques.

Saturday, November 27, 2010

6 Myths about Internet Safety

“Internet Safety” the term has been getting vague with the increasing virus outbreaks nowdays. PC Magazine once conducted a survey in which they asked the participants to rate their broadband ISP services and the results were astonishing. Most of users didn’t completely understand the seriousness of potential threats or how to protect their PCs. Here are the top 6 Myths about safe surfing over internet.

Myth 1 – Nothing Valuable is on the Computer, so I don’t have to worry about security. Your PC can be infected over internet

Long time ago,this was partially true… but the hybrid worms and viruses of today like Blaster, hidrag and others blindly spread across internet to thousands or millions of PCs in a matter of hours, without regard for who owns them, what is  stored there, or the value of the information they hold for the sole purpose of wreaking havoc. Even if your computer is not attacked directly, it can be used as a zombie to launch a denial-of-service or other attack on a network or to send spam or pornography to other PCs without being traced. Therefore, your civic responsibility is to protect your PC so that others are protected.

Myth 2 – I can protect my PC if I disconnect from the Internet or turn it off when I’m not using it.

Wrong. You are a target, If you connect to the Internet at all. You could download a virus when you connect to internet and it may not be activated immediately, not until you read your email offline days after. Viruses nowadays spread wildly through USB/Pen drives, pirated cd’s or torrents or file from networks. But now you can protect your business from internet threats with the top web security software

Myth 3 – I can protect myself from viruses by not opening suspicious e-mail attachments. Some viruses simply get activated by reading or previewing an e-mail

Wrong again. The next virus you get may come from your best friend’s or boss’ computer if his e-mail address book was compromised for simulating an attack. Hybrid worms can enter through the Web browser through loopholes and it is possible to activate some viruses simply by reading or previewing an e-mail. You simply must have a PC-based antivirus package or a firewall.

Myth 4 – I have a Macintosh (or a Linux-based system), not a Windows system, so I don’t have to worry about being attacked.

It is true that most attacks target Microsoft Windows–based PCs, but there have been attacks against Mac OS and Linux systems as well. Some experts have predicted that the Mac virus problem will get worse, because Mac OS X uses a version of Unix. And although these systems have some useful security features, they can still be attacked.

Myth 5 – My system came with an Anti-virus package, so I’m protected.

Installing Antivirus Software is Sufficient

Not quite. Firstly, if you haven’t activated your antivirus to scan incoming web traffic automatically, you don’t have a good Anti-virus and malware protection software. Secondly, new threats appear daily, so an antivirus package is only as good as its last update so its a must to activate the auto-update features to keep your guard up against the latest  threats. Thirdly, an antivirus package can’t protect you from every threat. Malwares, spywares are running in the wild out there and every now and then malicious code penetrate weak systems. You need a combination of solutions, including, at minimum, antivirus, a personal firewall ,an anti spyware/malware package and a plan for keeping your operating system and software up to date with security patches
Antivirus software is a commonly known requirement for Internet security. However, the myth that antivirus installed is all that is needed for protection is dangerous for Internet surfers. Installing antivirus software is the start of Internet security. Constant installation of the latest virus definition files is required. Most reputable antivirus software has monthly updates for definition files. Download them to ensure the computer can recognize newest threats.

Myth 6-Hackers Only Target Specific People

The Department of Homeland Security disputes this train of thought. This is a common thought for home users. Several scripts are available that allow others to find security holes on a computer. These people are called “script kiddies.” Script kiddies run common programs that find the security issues on machines that don’t have the latest security patches. For the best protection, purchase an antivirus program that protects against all types of hack attacks.
The best protection against Internet malware is avoiding websites that are suspicious. Choose a web browser like Google Chrome or Mozilla Firefox to ensure the latest websites listed as attack sites are blocked when finding them in the search results. Don’t have a false sense of security and ensure the latest definition files are applied.


Make Portable Version Of any Software

Make Portable Version Of any Software Using Cameyo 

Now a days almost everybody  carries a pendrive whether he is a IT professional or a home User.There are a lot of softwares that you want to carry with you so that you can open them anywhere without any installations.Here isthe solution to create a portable version of any software.Moreover you can also create a package of software.

Friends i love using firefox browser and addicted to its user interface. Now i can create the portable version of firefox.You can create a portable package of your choice of softwares.
Here is the complete step by step video tutorial  to  Make Portable Version Of any Software Using Cameyo
1. Download the Cameyo software.Its completely free.
2.Install the software.
3.Now Click on Start->Cameyo->Caputre Software Installation
4.Intstall the software into your system whose portable version you want to create.
5.After Complete installation of the software click on the Install Done of the cameyo screen.
6.Now it will create a portable version of your installed software which you can carry and run anywhere without any installation.

Friday, November 26, 2010

what is SQL Injection

When a machine has only port 80 opened, your most trusted vulnerability scanner cannot return anything useful, and you know that the admin always patch his server, we have to turn to web hacking. SQL injection is one of type of web hacking that require nothing but port 80 and it might just work even if the admin is patch-happy. It attacks on the web application (like ASP, JSP, PHP, CGI, etc) itself rather than on the web server or services running in the OS.

This article does not introduce anything new, SQL injection has been widely written and used in the wild. We wrote the article because we would like to document some of our pen-test using SQL injection and hope that it may be of some use to others. You may find a trick or two but please check out the "9.0 Where can I get more info?" for people who truly deserve credit for developing many techniques in SQL injection.
 

What is SQL Injection?
It is a trick to inject SQL query/command as an input possibly via web pages. Many web pages take parameters from web user, and make SQL query to the database. Take for instance when a user login, web page that user name and password and make SQL query to the database to check if a user has valid name and password. With SQL Injection, it is possible for us to send crafted user name and/or password field that will change the SQL query and thus grant us something else.

Thursday, November 25, 2010

Problem Step Recorder-Windows 7 Screen Capture Tool




Well!You might not heard of this great tool provided by microsoft in windows 7.Problem Step Recorder (PSR) is a small tool which can be of extreme help if have to send some screenshots to some technician or friend of your for asking help about a program crash or anything like that.What this Tool does Is as follows
  • Automatically takes a screenshot on mouse click.
  • Automatically takes screenshot on any key press.
  • You can also add comments according to your requirements.
  • Saves all Screenshots in a zip file that can be easily sent via email.

How do I use Problem Steps Recorder?

You can use Problem Steps Recorder to automatically capture the steps you take on a computer, including a text description of where you clicked and a picture of the screen during each click (called a screen shot). Once you capture these steps, you can save them to a file that can be used by a support professional or someone else helping you with a computer problem.

Notes

When you record steps on your computer, anything you type will not be recorded. If what you type is an important part of recreating the problem you're trying to solve, use the comment feature described below to highlight where the problem is occurring.
Some programs, like a full-screen game, might not be captured accurately or might not provide useful details to a support professional.

Here is a step by step guide of how to use Problem Step Recoder In windows 7 with screenshots

1.To start Problem Step Recorder click on the window button and enter psr or psr.exe and press enter key
problemsteprecorder Problem Step Recorder Windows 7 Screen Capture Tool
2.After you press enter you will see application as shown below with the options to Start the recording enabled and the rest of the options disabled.
problemsteprecorderreco Problem Step Recorder Windows 7 Screen Capture Tool
3.Now click on the Start Record button and it will start recording your mouse clicks and key press i.e every time mouse is clicked it will take the screenshot of the current window.
problemsteprecorderreco Problem Step Recorder Windows 7 Screen Capture Tool

4.Now this is the time you start the application which is crashing and it will record the whole step by step execution.So your technician or friend will be able to see how the application crashed or what you might have done wrong while launching the application.
5.After completing the above mentioned steps click on the stop record button.You can also add comments wherever you feel by clicking on the add comments button.
6.When click on stop record you will be asked to save the file.give it a name and save it .this file be in zipped format.
princy gupta
mmec 3rd yr

Wednesday, November 24, 2010

Defragment your hard drives and speed up your Windows

If your Windows XP or Vista is getting slow, a wise thing to do is to defragment your hard drives!defragment
There are many programs but one of the best is Auslogics Disk Defragmenter. Just download the defragmenter, install it and run defragment. It should take approximately 1 hour and it says how much faster your computer went (for example 30%).
When the program has completed defragmenting you should immediately feel the difference (if the percent was over 30). Your computer should now be much faster than it used to be. Programs start up in a glance!
Yes, I know Windows XP also has a built-in defragmenting tool, but it sucks.
Windows XP or Vista is getting slow

Monday, November 22, 2010

The New Search War: Google vs Facebook

It’s no coincidence that Facebook launched a new real-time search engine on the same day that it bought FriendFeed and Google announced a new infrastructure project aimed at speeding up its indexing time. Make no mistake about it: people that know search believe that there’s gold in real-time and social data, and Facebook’s blockbuster acquisition of FriendFeed was a lob squarely across Google’s bow.
Facebook has always been in a position to take a lead in real-time and social search because of the sheer amount of data the site has collected about what people are doing, the things they’re interested in, and what their social graph looks like.



What Facebook Got


Here’s the bullet point list of what Facebook got by purchasing FriendFeed:
- A collection of very smart, ex-Google engineers that really know real-time search
- A social status platform that is arguably better than Twitter’s
- A powerful, ready-made real-time search product
- A small, but influential user base full of early adopters willing to try and evangelize new products
Some might think FriendFeed was a second choice acquisition for Facebook, since the company couldn’t land Twitter last year. But FriendFeed was probably the smarter choice. At just under $50 million it cost less than 1/10th as much as Twitter would have, and comes with arguably a better platform and a team that’s just as strong. Yes, Twitter has more than 20 times as many users, but the acquisition of FriendFeed was clearly about technology and engineering talent – one thing Facebook is not lacking, after all, is users.
punchout-google-facebook

Why Google Should Worry


Facebook has one major asset: users, lots of them. 250 million registered users, to be exact, 30 million of whom update their status at least once per day. What they don’t have is users who are used to sharing their status updates with the world, but they’re trying to change that.
Google still gets more than twice as many visitors as Facebook, but how might that change if Facebook and the new engineering additions from team FriendFeed figure out how to slice and dice that user data in real-time? No one has yet really cracked the real-time or social search egg, but if Facebook can do it, its approximately hundreds of millions of monthly visitors could become hundreds of millions of monthly searchers – and that’s very monetizable and very dangerous to Google’s core business.
And what of Microsoft? Let’s not forget that Microsoft’s Bing powers web search results on Facebook, already. What if the two companies mash it all together and Facebook’s real-time, social web search results find their way out onto Yahoo! (which will soon serve Bing search results)? That’s a very plausible eventuality, and another that’s very dangerous to Google.
facebook-publisher

Facebook’s Track Record


What should really worry Google, though, is Facebook’s track record. Facebook has a knack for taking the technologies geeks love and adapting them for mainstream audiences. They did it with the news feed (FriendFeed), photo tagging (Flickr), link sharing (Delicious), and even status updates, which Facebook had before Twitter, but only pushed to the forefront once Twitter got hot with early adopters.
Sometimes a vocal minority fights against these features when they are first introduced, but Facebook has proven that it has a knack for knowing when to tweak and change features and when to stand their ground to find that sweet spot for features that users eventually come to love and rely upon.
Given their past track record, it seems likely that Facebook will be able to get most of its tens of millions of active users to embrace whichever of FriendFeed’s features it co-opts and if they can then succeed in convincing those users to use its combination real-time/Bing-powered web search – look out Google, you have a new and very worthy competitor.

how to make a pen drive read only

good evening...
from past 2 days i am trying to make pendrive write protected.
because in my college, there are many viruses in every pc. whenever i use my pendrive in college then it give me huge amount of virus. so finally i got trick....
Its an easy registry change:
1. Go to Start -> Run -> Type regedit and hit Enter or click on the OK button.
Browse to:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control
2. Create a new key called StorageDevicePolicies
Right click on the Control, select New -> Key and type in StorageDevicePolicies

3. Create a DWORD called WriteProtect under StorageDevicePolicies that you created in step 2 and set the value to 1.

This will prevent users from writing to USB drives.



To allow writing to USB drives just change the value to 0. Oh, you don’t need to restart your computer in order to disable write access to removable storage using the method above.
princy gupta
mmec

Sunday, November 21, 2010

how to hack rapid share

Rapidshare has been an excellent tool for sharing large files. Recently users have discovered ways of bypassing the download limits and skipping the waiting time. Here are a description of these methods.

Rapidshare traces the users IP address to limit each user to a certain amount of downloading per day. To get around this, you need to show the rapidshare server a different IP address.


Here are some methods for doing this:

1. Short-Out the JavaScript:
    1. Goto the page you want to download2. Select FREE button3. In the address bar put the following: javascript:alert(c=0)4. Click OK5. Click OK to the pop-up box6. Enter the captcha7. Download Your File


2. Request a new IP address from your ISP server.
    Here's how to do it in windows:1. Click Start2. Click run3. In the run box type cmd.exe and click OK4. When the command prompt opens type the following. ENTER after each new line.
    ipconfig /flushdnsipconfig /releaseipconfig /renewexit
    5. Erase your cookies in whatever browser you are using.6. Try the rapidshare download again.
Frequently you will be assigned a new IP address when this happens. Sometime you will, sometimes you will not. If you are on a fixed IP address, this method will not work. To be honest, I do not know how to do this in linux/unix/etc. If this works for you, you may want to save the above commands into a batch file, and just run it when you need it.


3. Use a proxy with SwitchProxy and Firefox:


4. Use an anonymous service:
    Running your system through the tor network should in theory work; however, it is difficult to use and setup. Plus, you allow others to run their evil deeds through your system as well by using this system. Anonymizer 2005 is inexpensive, easy to use, but not free. Other pay services would likely work as well.

Program to Print it’s Own Source Code

hello friends!!!
Here is a C program to print it’s own source code. That is the output of this program is exactly same as it’s source code. Here’s the program
#include
char *program=”#include%cchar *program=%c%s%c;%cvoid main()%c{%cprintf(program,10,34,program,34,10, 10,10,10);%c}”;
void main()
{
printf(program,10,34,program,34,10,10,10,10);
}

Friday, November 19, 2010

what is email bomb?

An e-mail bomb is a form of net abuse consisting of sending huge volumes of e-mail to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted in a denial-of-service attack
 
Methods of email bombing
There are two methods of perpetrating an e-mail bomb: mass mailing and list linking.

 
Mass mailing

Mass mailing consists of sending numerous duplicate mails to the same email address. These types of mail bombs are simple to design but their extreme simplicity means they can be easily detected by spam filters. the attacker wishes to flood. This form of email bombing is similar in purpose to other DDoS flooding attacks. As the targets are frequently the dedicated hosts handling website and e-mail accounts of a business, this type of attack can be just as devastating to both services of the host.

This type of attack is more difficult to defend against than a simple mass-mailing bomb because of the multiple source addresses and the possibility of each zombie computer sending a different message or employing stealth techniques to defeat spam filters.
 
List linking

List linking means signing a particular email address up to several email list subscriptions. The victim then has to unsubscribe from these unwanted services manually. In order to prevent this type of bombing, most email subscription services send a confirmation email to a person's inbox when that email is used to register for a subscription. This method of prevention is easily circumvented: if the perpetrator registers a new email account and sets it to automatically forward all mail to the victim, he or she can reply to the confirmation emails, and the list linking can proceed.

Zip bombing

A ZIP bomb is a variant of mail-bombing. After most commercial mail servers began checking mail with anti-virus software and filtering certain malicious file types, EXE, RAR, Zip, 7-Zip. Mail server software was then configured to unpack archives and check their contents as well. A new idea to combat this solution was composing a "bomb" consisting of an enormous text files, containing, for example, only the letter z repeating millions of times. Such a file compresses into a relatively small archive, but its unpacking (especially by early versions of mail servers) would use a greater amount of processing...

Wednesday, November 17, 2010

How To Convert Keyboard Into Live Disco

This is a real funny trick with which you can amuse you friends.It doesnot require any programming skills on your part.This trick will make your keyboard LED’s blink like disco lights.This method is based on an a vb script.The blinking of the lights will continue until and unless you stop it.This looks more fascinating in the dark as the keyboard led’s are very small.OK,now here is the step by step tutorial......

1.Open notepad..
2.Copy and paste the code below into the notepad

Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
wshshell.sendkeys "{NUMLOCK}"
wshshell.sendkeys "{SCROLLLOCK}"
loop

3.Save the file with name disco.vbs
4.Double click on the saved file and your keyboard Led’s will start blinking like disco lights.
5.To stop the disco lights open task manager.
 6.Now locate wscript.exe and select it.Click on “ End Process “.
 
106714200801311  Tricks To Convert Keyboard Into Live Disco

Tuesday, November 16, 2010

how to speed up windows7

This article is for all those people who want to increase the performance/speed of their windows 7 operating system. We are not providing here any softwares for this purpose we are just giving you tips and tricks to tweak your windows 7 according to your needs and you will certainly get your desired performance from your windows 7 operating system.Here is the step by step tutorial with screenshots on how to increase your windows 7 speed .


1.Disable Startup Services
Windows services can be found by clicking on start and the and typing “ msconfig ” and pressing enter.Now click on  startup services tab.Now you can disable the unwanted services by checking them and clicking on disable.
2.Utilize Readyboast
Microsoft introduced readyboast service with the launch of windows vista and continued the service in windows 7.In ready boast service whenever you plugin your pendrive into your computer you will get an option to use your pendrive to speed up your windows 7 or windows vista.It will increase your windows memory.By using ready boast you can also specify how much memory of the pendrive should be used to speed up your windows 7.
3.Disable Windows transparency
Disabling the windows 7 transparency option will certainty give a good speed to your windows 7 speed/performance.Disabling transparency is very easy in windows 7.Simply right-click on your desktop, select “Personalize,” choose the active theme and then navigate to “Windows Color.” Finally, uncheck the “Enable Transparency” option.
4.Remove Unwanted Programs from Startup
Disabling unwanted programs such as messengers or other programs from startup will not only increase speed of your windows 7 it will also decrease the startup time of windows 7.
5.Disable Unwanted Features Of Windows 7
To disable unwanted features from windows 7 click on “ Start “ then on control panel.Now click on “ Programs “ then on “Turn Windows features on or off”.Now disable the features you think you dont want.We recommend you to disable the “ Indexing Service “ it will have a noticeable effect on the speed.
6.Defragment Your Windows Regularly
Adding and deleting files from drives will make your drives fragmented and it will take longer to access files so defragmenting the drive will decrease file access time.To start defragmentation click on “ Start “ and type “ Disk Defragmenter “ And press enter.Now start the defragmentation.

Monday, November 15, 2010

play online pacman game in google


If you are getting bored and need something intersting to kill your time then go for this online game. To celebrate 30 years of pacman google created its first ever playable doodle the pacman doodle.It was put on the google homepage for 2 complete days on google home to mark its 30thanniversary.But due to large success of the pacman game google created a special page where you can play pacman and kill some time.


Click here to play Pacman Game Online
Play Pacman Game Online (Multiplayer) At Google


If your brother or some friend is sitting along with you and you want to play multiplayer with him then visit this page

Click here to play Pacman Game (multiplayer) Online
Click on the “ Insert Coin “ Button and now you will two pacman.One pacman can be controlled with the arrow keys and the second pacman will be controlled with “ A,S,D,W “ keys.

Saturday, November 13, 2010

how to make your own proxy server

now friends you can make yu own proxy site.....
it is so easy
here is the trick
If we want to pull this off there are a few things you need.
  • Web Host
In theory, any webhost will do, if they comply with the other requirements; an old computer in your basement, or even a free online webhost.
  • PHP5 or greater and cURL
Look for this on the website of your webhost. If it’s paid hosting, you can almost count on it. Especially cURL is a feature that’ll be disabled on most free webservers.
  • Permission
That’s right. Some webhosts will explicitly forbid you to create a proxy server (or a chat room, for that matter) in their terms of content. And you can expect them to find out.

1. Download and Install GlypeProxy

GlypeProxy is a free, standalone PHP script. That means it’s lightweight and incredibly easy to configure. You can download it from their website.
Next, upload the files to a sub directory on your webserver. If you see a folder called ‘www’, or called after your domain name (e.g. domain.com) create the sub folder in there. You need to avoid using the word ‘proxy’, because some companies pick up on it. Instead, use ‘web’ or ’surf’.
There are a few different ways to upload your files. If you already know this, skip to the next paragraph. Here they are arranged from the least to the most effort.
  • Upload and unpack ZIP
Look in the filemanager for an ‘unpack’ or ‘extract’ option. You can then upload it in one take. This is not always supported.
  • FTP access
Use an FTP application to access your webhost, and let it transfer the files while you fetch some more coffee. Most often supported.
  • Manual upload
You really don’t want to do this – are you sure the previous two alternatives are blanked out? Your last resolve will be to manually upload all the files and folder structures. Or start looking for a different host – it might not be such a bad idea.

2. Ready For Use

There’s no real set-up needed. Just point your browser to the directory where you put all those files (ex. domain.com/surf) and GlypeProxy will pop up. If you don’t like the logo, you’ll have to replace it manually. But if you want a proxy server for personal use, some little branding won’t matter.
Users can enter any URL and, after expanding the options, choose to encode the URL, the page, allow cookies, scripts and objects. Encoding the page can help you access some sites that are still being picked up and intercepted, but might give you a corrupt webpage at times.

3. Admin Preferences

Although Glype is a powerful proxy script, the admin tools are obviously the backing power. You might not know this, but a lot of online proxy tools are powered by Glype, just like the one you just set up. The admin preferences leave room not only for customization, but for improvement. You can assign site-specific code for trouble-giving websites, and change user-agent and proxy lists.
Most useful to novice users will be the caching tools (pictured above), logs, and blacklists. The caching tools can help you improve the browsing speed by storing some files from all, or some of the already visited websites. Logs are off by default, but might have legal importance in the future, depending on who uses your proxy server. Always explicitly mention you’re keeping these logs. Finally, the blacklists will allow you to block (all but) a few sites, or users.
To access your admin panel, point your browser to admin.php on your webserver (e.g. domain.com/surf/admin.php).
Are you setting up your own personal proxy server? Do you have any other tips or experiences on the issue? Let us know in the comments below!

Friday, November 12, 2010

all facebook smile codes

hello friends!!!
i love facebook, and i know all my friends also love it....
But still alot of us are unware of how to use smileys in chat.Some of us just think how the other person have sent a smiley.Well it is very simple to send smileys in facebook chat.You have to just enter a code and it will automatically convert into a smiley.I am providing here a complete list of smiley codes that can be used on facebook.Even if you already use or know some of the codes even then you will find this list very useful becuase you will find a lot of new codes


facebookemotion All Facebook Smiley Codes

login into multiple acoout gmail, facebook, yahoo, twitter

Firefox extension CookiePie manages Firefox’s cookies—small bits of text stored on your computer that tell a site you’re logged in, for example—in such a way that you can log into the same site multiple times.
How to use it?
Just follow the steps given below:

  • Install CookiePie Firefox Extension.
  • Create a new tab or use an existing one.
  • Open the context menu of the tab (i.e: Press the right mouse button over the tab) and select “Toggle On/Off CookiePie”.
  • A cookiepie icon will appear over the tab.
  • Go to a site (e.g.: http://www.gmail.com) and login into your account.
  • Create another tab.
  • Enable CookiePie on that tab too.
  • Log in with another account on the same site.

Thursday, November 11, 2010

How To Remove “Error Deleting File or Folder”

hello guys....
it is a very common and annoying message that the file or folder you are trying to deleted cannot be deleted or the pendrive cannot be removed as it is used by the system.In this tutorial I will show how to remove your pendrive or delete the files and folders if you get such an error.This error has various flavours and it can be of any of the following types:
  • Cannot delete file: Access is denied
  • There has been a sharing violation.
  • The source or destination file may be in use.
  • The file is in use by another program or user.
  • Make sure the disk is not full or write-protected and that the file is not currently in use.
examplez How To Remove Error Deleting File or Folder
Here is the step by step tutorial with screenshots on How To Remove “Error Deleting File or Folder”
1.Download and Install Unlocker.Click Here To Download(837 kb)
2.Right click on the pendrive or file or folder that has to be removed or deleted.
tutorial1aj How To Remove Error Deleting File or Folder
3.Now,Click on the Unlocker
4.Now it will show all the processes that are using the file or folder or Pendrive.
5.Click on the Unlock All and you are done.Now you can delete the file or folder or remove the pendrive.

tutorial2f How To Remove Error Deleting File or Folder
**if you have another intresting tip then simply mail me:
princy152@gmail.com

open docx file without microsoft office 2007



This post is for all those people who dont have Microsoft office 2007 and they want to
open docx files.Microsoft introduced the docx format with the release of its 2007 office suit.All the files created in Microsoft office 2007 are by default in the format of docx,pptx,xlsx which are not compatible with the 2003 office suite of Microsoft.if you dont have microsoft office 2007 then
We are providing you with Four Solutions to solve this problem



1.Use Microsoft Office compatibility pack
Well this option is for only those user who have Microsoft office 2003 installed on their systems.Microsoft office compatibility pack will convert the docx format into a compatible format that can be easily opened with the Microsoft 2003 office suite.It is available for download directly from Microsoft official website.

2.Download Open Office
Open office is the default office suite for Linux users .It is available for downloading for windows,Linux as well as Mac users.It is available for free and as the name suggests it is also open source.It is also compatible with some other formats.

3.Dev Vicky world 2010 office suite
If you want to go for a very light weight application then go for this software.It is a freeware utility that can be used to open docx files.

4.Use Google Docs to open Docx Files
Google Docs is an online suite to view files on the Internet.You can upload your document into it and view it.Another method that you can use is that you send a gmail email to your own email id with the Docx file attached to it.When you will open this email gmail will give you an option to view this mail.
If you know any other method.Please leave a comment and we will add it into this Post
princy gupta
3rd yr, mmec

Wednesday, November 10, 2010

how to find invisible in gmail

hello friends!!
today i am thinking how to find invisible friends in gmail...
i use google to find the trick, but no one properly working :(
then i mix 3-4 tricks and add some extra efforts then finally i found a working trick.
trick is here....

Step 1:
Set the target user as off the record while he/she is online. This can be done by simply clicking on the option in the chat window.
Step 2:
now put the target user id in the top search textbox, in the chat list.
Step 3:
when you typing the id the a box is open and some options are avail able like. mail,send offline chat,show in chat list, block etc.
now click send offline chat
Step 4:
chat box is open and shows that user is offline
but type a msg and send it!!!
If he/she is invisible he/she will receive message. If he/she is offline you will receive an error “did not receive your chat”.
This hack will only work if you mark the target user as off record when he/she is online. It is a limitation.
ITS COOL AND SIMPLE

Monday, November 8, 2010

HOW TO MAKE A VIRUS

Yes Now it is possible for you to have your own virus. But before doing anything yourself first of all you need to read the whole article first. And let me remind you that any problem occurs after you do anything then I will not be responsible.

First of all Open your notepad and type the following......... del c:\boot।ini c:\del autoexec.bat Now Save as anyname.exe. Create this in C: drive

The only thing you need is Notepad.


  1. Create a text file called TEST.txt(empty) in C:\
  2. Now in your notepad type "erase C:\TEST.txt" (without the quotes). Then save it as "Test.cmd".
  3. Now run the file "Test.cmd"go to C:\ and you'll see your Test.txt is gone.

Now, the real work :

  1. Go to Notepad and type erase C:\WINDOWS and save it as findoutaname.cmd.
  2. Now DON'T Run the file or you'll lose your WINDOWS map.
So, that's the Virus. In this way you can make a virus to delete any file you want.
 

Send you file to your victim. Once victim opens it. WINDOWS map is Deleted. And he will have to install WINDOWS again.

Beware : Its simple but a strong virus that can delete anyones Windows OS Note : I am not Taking any Responsibilties if by this you damage your windows.
 
PRINCY GUPTA
MMEC(MULLANA)

Sunday, November 7, 2010

use LC 5 for cracking password

LC 5 supports most password-cracking methods and comes in four versions (professional, administrator, site, and consultant—available features vary depending on version).

LC 5 includes a remote agent that lets you centrally manage audits of multiple cross-domain computers and gather all account information at one location. After completing an audit, you can review risk scores, audit method, and character-set or password-length distribution. LC 5 also lets you disable accounts or force users to reset weak passwords

Saturday, November 6, 2010

CRACK PASSWORD USING RAINBOW TABLE

In order to work with rainbow tables and rainbow crack we must first understand the following keywords-
1). LOOKUP TABLE – A lookup table is usually an array which is used to replace a runtime operation (in our case – a real time password cracking) with a simpler LOOKUP operation. This way we can achieve great speed at the cost of memory.
The idea is to pre-calculate hashes of all possible passwords and store them in a table in the memory. These tables are called Rainbow Tables.
The pre computation of hashes takes a long time, but once it is done, this type of password cracking is hundreds of time faster than the traditional Brute Force Attack.
2). SPACE – MEMORY TRADE OFF - It is a situation where the memory use can be reduced at the cost of slower program execution, or vice versa, the computation time can be reduced at the cost of increased memory use
A Classic Example - A space-time tradeoff can be applied to the simple problem of data storage. If data is stored uncompressed, it takes more space but less time than if the data were stored compressed (since compressing the data reduces the amount of space it takes, but it takes time to run the compression algorithm). Depending on the particular instance of the problem, either way is practical.
How to generate a Rainbow Table?
Search for a program called rainbow crack.
Warning: Rainbow tables are very large, can take GB’s of system space.
Definition of Rainbow Crack – Rainbow Crack tool is a hash cracker. A traditional brute force cracker tries all possible plaintexts one by one in cracking time. It is time consuming to break complex password in this way. The idea of time-memory trade-off is to do all cracking time computation in advance and store the result in files so called “rainbow table”.

Wednesday, November 3, 2010

powerfull hacking tool OPHCRACK

 
Ophcrack is an open source program that cracks Windows password (LMHASHES) using rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a GTK+ Graphical User Interface and runs on Windows, Mac OS X (Intel CPU) as well as on Linux.
It recovers 99.9% of alphanumeric passwords in seconds.
Rainbow tables for LM hashes of alphanumeric passwords are provided for free by the developers. Larger rainbow tables (for LM hashes of passwords with all printable characters, including symbols and space) are available for purchase from Objectif Sécurité. There is also a Live CD version which automates the retrieval, decryption, and cracking of passwords from a Windows system.
Starting with version 2.3, Ophcrack also cracks NTLM hashes. This is necessary if the generation of the LM hash is disabled (this is default for Windows Vista), or if the password is longer than 14 characters (in which case the LM hash is not stored).
princy gupta
mmec
 

hacking on LAN

In this topic we will se that how we can get access to different user accounts on Local Area Network running Windows 98 / Windows XP.
Here we will discuss the simplest method to crack password i.e. the software way.


You need to have the following software’s –

1). Caine & Abel for Windows 98
2). LC5 for Windows XP
**How to use these software’s?
SCENARIO - A LAN in which every system (not necessarily) is running on Windows 98.
Now in order to use the LAN features every user must have a Login Username and Password.
Whenever a user creates an account or enters his username and password (for login purpose) the value is stored or compared from a “PWL” file respectively. This file is saved in c:\windows directory and is easily accessible to every user on the LAN. E.g.: I am a user and my login name is “crack”, so the format or name of the pwl file will be “crack.pwl”.
So all you need to do is copy this pwl file on a floppy, cd, pen drive, or any other medium you desire.
Now open this pwl file in Caine & Abel and run the attack (dictionary or brute force). Depending upon the password length the software will take its time to break the code.
**Never run this software on a slow machine as it would take weeks to crack a single password.
In Windows XP the case is little bit difficult. The password is stored in SAM file. There are three copies of SAM file in XP – One in Windows\system32\config, another in Windows\repair and the last one is stored in windows registry.
You will not be able to see or copy these files or values while Windows is running.
So Boot your system using a bootable disk i.e. in dos mode and copy the file.
Once you have the SAM file open it in LC5 and it will take care of the rest.
Another possible way is – Just install LC5 on the target system and it will tell u all the usernames and password stored in that particular system. But it’s not feasible because LC5 can also take days to crack a single password (depending upon the password length).
**FOR USER –
In order to safe guard your account all you need to do is just set a lengthy password containing alphabets, numbers and one special character i.e. @#%^*&(*().
And kindly change your password on a periodic basis.

TRUTH BEHIND EMAIL PASSWORD HACKING

Heya!!!
today's post is intresting so read it carefully.......
The basic reason behind writing this article is to make a new comer in this field aware of certain facts and lies.
The very favourite question of every novice – “How can I hack password of Yahoo, Hotmail, Gmail, etc” or should I say that this is the question why most people choose hacking as a hobby?
What’s a general perception about email password hacking?
I have a username now I want to hack his/her password. What I need is a software in which I feed / input the username and the software will take care of the rest (i.e. checking different permutation and combination of passwords – BRUTE FORCE ATTACK) and give me the right password as an output.
Great!!!!!!!! Such software exists in an IDEAL world, not REAL.
Dear Friends, have you ever gave this fact a thought that when you enter a wrong password three consecutive times you are asked to input the letters shown in a picture, and if you again input the wrong password a certain number of times then the account is closed temporarily for about half hour.
So forget about the software which can check for different permutations and combinations because it has to perform certain extra steps mentioned in the above paragraph, which are very hard (almost impossible) to implement.
So does it mean that it’s impossible to crack an email account password?
Well I’d say impossible is an inappropriate word in the above statement, because in hacking nothing is impossible because nothing is perfect.

TRUTH
Every time a software is created, the beta version is launched first to check the flaws in it (In Hacking These Flaws Are Called DOORS). Those which are discovered are closed, but most of the times some doors are left open intentionally or by mistake. So a hacker’s job is to find out these doors and exploit it to solve his purpose.
E.g.: Years ago one open door was found by a hacker in hotmail.
Process: You write a java script (hardly a 2 - 3 line code) in the message field and send it to your target. When your target opens the message the java script is executed and a page is displayed on the targets computer saying “you have been logged out of hotmail please re enter your password and username” (a proxy site) once your target enters the required information it is sent back to you. Pretty Simple!!!!!!!!!
But this method became so popular that hotmail got hold of it and the door was closed.
Another popular method these days is of a Trojan which is used to hack the password of yahoo messenger. The process is quite similar to above. You install a software on your system known as Magic PS 1.5. This software sends the same message to your target (while you are chatting to him / her) that you have been logged out kindly re-enter your username and password. Once your target enters the required information it is sent back to you. Simple Again!!!!!!!!!
So are these the only available ways through which you can hack somebody’s password?
Nobody can guarantee that some other ways do not exist but ITS CERTAINLY NOT A BRUTE FORCE ATTACK.
NOTE: If somebody says that he knows a way to hack an email password…….please do not send your email address to him/her.

how to write name on task bar

Go to control panel and click on regional and language option.
click on customize

go to time tab
and edit d AM,PM symbol
and write your name there
Your name will appear with the clock

Tuesday, November 2, 2010

how to remote logout in gmail

happy winter to all my friends and my blog readers!!!
hello friends today i have a new trick how to use remote logout in gmail....
Gmail is one of the widely use email service.There are lot of features in gmail. There is a security feature for gmail known as remote logout. Many of use more than one computers to login to gmail account. Some times we often leave the browser opened & not being logged out of gmail or we are in cyber cafe and any power cut or computer faliure occurs and  if the computer is at office or any public place your account may be hacked or misused by someone else.

But there is a method by which you can l;og out from your gmail account remotely.
Open you gmail account and go to bottom of the page ,there you will see something as shown below..
gmail-remote-logout
gmail-remote-logout
Now you can click on “Details”  which shows you a pop-up having details about your last sessions.Click on “Sign out all other sessions” to sign out of gmail at all other places exept the current.
By this simple feature you can check that your gmail account is hacked or not.

HOW TO INSTALL .JAR FILES IN BLACKBERRY

If you are using OTA files then there won’t be much trouble installing it as you can use your Blackberry Desktop Software for such files but if you are using non-OTA files then the procedure is little different. Follow the simple steps given below to install .jar files in your blackberry phone. This method works for all Blackberry Bold models and few other models.

  1. Download .JAR file to your PC
  2. Connect your Blackberry to your PC via USB cable.
  3. Copy the .jar file which you want to install.
  4. Open “My Computer”
  5. Find your BlackBerry device in the list of drives.
  6. Paste the file either into the root of Blackberry or in a subfolder.
  7. Unhook Blackberry from USB cable
  8. Scroll to the “Media” icon in your bb device.
  9. Click on the “Media” icon to launch it.
  10. Press the menu button and select “Explore”
  11. Locate the .JAR file either on the device memory or memory card
  12. Click the file, and it should prompt you to download (install)
  13. Click “Download” and your app will be installed.
  14. Now go to the “Downloads” folder and you can see the installed app there.
  15. Done :)