Thursday, April 18, 2013
Monday, April 15, 2013
Tips For Students To Get More Out Of Google 2013 Tips
Every One Says that Google knows everything means you can find almost everything on Google. If you are a
student and you are conducting a online Research then no doubt Google Will be your first preference, But if you are weak in making search queries then you will find it difficult to search any topic. So here are some tips that will definitely help you in conducting Online search.
If you are point a good query then there will be good chances of getting a good result. So Here is Infographic that will definitely help you in completing your research.
Saturday, April 13, 2013
Windows Task Manager Has Been Disabled, How To Fix It 2013 ?
Many times working online you come across a stage when your computer gets infected with some kind of virus or malware, well that might nor affect anything but your task manager and disable it up, so what you are going to do at that time. Well I have found some easy solutions to get your task manager back working again.
So now normally to open a Task Manager, you normally do one of the following things :
- Press
Ctrl +Alt +Del on the keyboard - Press
Ctrl +Shift +Esc on the keyboard - Right-click on a blank area on the start bar and choose Task Manager
- Click on Start, Run and type
TASKMGR
in the run box and press Enter
Sometimes instead of Task Manager opening you'll see the following screen. In these cases, you'll have to follow the methods below to re-enable access to the Task Manager. First we'll begin with the various registry modification methods for correcting this problem.
Method 1 - Using the Group Policy Editor in Windows XP Professional
Click Start –> Run, type gpedit.msc and click OK.
Under User Configuration, Click on the plus (+) next to Administrative Templates.
Click on the plus (+) next to System, then click on Ctrl+Alt+Delete Options
Find Remove Task Manager in the right-hand pane and double click on it
Choose the option "Not Configured" and click Ok.
Close the Group Policy Window
Method 2: Change the Task Manager Option through the Run line
Click on Start –> Run and type the below command exactly & press Enter.
REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 0 /f
Method 3: Change Task Manager through a Registry REG file
Click on Start –> Run, and type Notepad and press Enter.
Copy and paste the information between the dotted lines into Notepad and save it to your desktop as taskmanager.reg
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System]
"DisableTaskMgr"=dword:00000000
3.Double click on the taskmanager.reg file to enter the information into your Windows registry files.
Method 4: Delete the restriction in the registry manually
Click on Start –> Run, and type regedit and press Enter.
Navigate to the following branch HKEY_CURRENT_USER –> Software –> Microsoft –> Windows –> CurrentVersion –> Policie –> System.
In the right pane, find and delete the value named DisableTaskMgr
Close the registry editor
Method 5: Download and Run FixTaskManager program
Download TaskManagerFix.exe File.
Extract the file from the .zip archive.
Double-click on the file FixTaskManager on your desktop and run it.
That's it it will automatically add registry tweaks and activate you task manager.
How To Rename Multiple Files Quickly In Windows
Hi,
Many time we wanna rename lots of files a time. But this process is very time consuming, If you wanna rename multiple files at a time in windows then I have a trick for you, Just follow below steps:
Steps To Do:
1- First of all open Explorer.
2- Now in Explorer select all the files you wish to rename.
3- After selecting the files press F2 and type the new name for the files. Like: if you type "demo" then this will rename like this demo, demo(2), demo(3) and so on.
But as you can see that you can't give different names, but if you wanna give different names then i also have solution.
1- First of all follow above 2 steps.
2- Now press F2 and rename first one. but don't press enter, just rename it.
3- After this simple press TAB key, it will move you to next one.
Add Background Wallpaper On Your Pandrive
Hi friendzz.....
Today I am introducing a new trick to place background picture for your pen-drive.
Just copy the code below code to notepad & then save it as "desktop.ini"
1.Where "YourPictureName.jpg" is,delete that & replace with your picture name.
For eg: "Tulips.jpg"
2.Put "desktop.ini" and your selected picture in your USB drive then hide it.
3.Refresh and enjoy with your new background.
[.ShellClassInfo]
IconFile=%SystemRoot%\system32\SHELL32.dll
IconIndex=127
ConfirmFileOp=0
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
Attributes=1
IconArea_Image=“YourPictureName.jpg”
IconArea_Text=”0xFFFFFF”
VeBRA sources – don’t delete the tag above, it’s there for XXXXX purposes -
[ExtShellFolderViews]
{BE098140-A513-11D0-A3A4-00C04FD706EC}={BE098140-A513-11D0-A3A4-00C04FD706EC}
{5984FFE0-28D4-11CF-AE66-08002B2E1262}={5984FFE0-28D4-11CF-AE66-08002B2E1262}
[{5984FFE0-28D4-11CF-AE66-08002B2E1262}]
PersistMoniker=Folder.htt
PersistMonikerPreview=%WebDir%\folder.bmp
Serial Keys For Important Softwares
Today i am posting some important software serial keys. i hope it will help you.
Uniblue Speed Up My PC 2011 5.1.1.1 Serial:
SP-PQTWP-FKF6H-JCBH9-7UQB7-DWK43-GJEUF
SET NOD32 Antivirus Smart Security 4 Keys
Username: EAV-44623300
Password: mk538ed235
Username: EAV-44504694
Password: k8k3spnujk
Username: EAV-44506038
Password: tk2scjt63h
Username:EAV-44749569
Password:5c4e2rcxfb
Username:EAV-44748649
Password:uvak4b4baj
Username:EAV-44748670
Password:87djmxkv6e
Username:EAV-44749535
Password:c35cbrb3jh
Username:EAV-44750646
Password:ca5n2rtd57
Username:EAV-44750666
Password:j3xceemhaf
Username:EAV-44750669
Password:5v7e84vd3r
Username:EAV-44749537
Password:jn586kkrjc
Username:EAV-44749560
Password:ese8jud87h
Username:EAV-44749695
Password:udhr8mj2n7
Username:EAV-44749708
Password:va6pb6542n
Username:EAV-44748549
Password:sjd8u7bchx
ESET Nod 32 4.0 all version working keys Till 2015
Username:EAV-43398382
Password:s6h25db4c3
Username:EAV-43398400
Password:58tb266fvn
Username:EAV-43398306
Password:2uvxs3dh55
Username:EAV-43398307
Password:c465stdpth
Username:EAV-43398323
Password:pb84cfubpd
Username:EAV-43398340
Password:nacaaephjk
Username:EAV-43398378
Password:3ka3fxnfjv
Username:EAV-43398379
Password:8aavas27kr
Username:EAV-43398380
Password:kfh4aj2db7
Username:EAV-43398342
Password:uvb65a37je
Username:EAV-43398352
Password:p628d2aku5
Username:EAV-43398365
Password:mjdvck67h2
Microsoft Office Home and Student 2007 100% Key
HBC66-D6YR7-CRP7H-T8VP4-99PMW
QXMDH-CRYFM-QFR87-HB783-T7RFQ
P37JV-FYJ32-YHH3T-KX7GX-7BJY3
HRMGX-K8WKJ-7FBGW-FTBCY-DWCM3
RCFMT-WFT7M-R779R-BJQMB-M2KWD
T9HJX-4C3BM-MG2R6-WC933-RCBRT
BTT7P-9HBFP-6QHM7-RFHDV-X8XWG
HWMMV-7H4DT-J2PJ6-YB8X4-VQCM6
JM2QC-KMVTP-VR8GV-HJRKQ-YWXWG
BHD34-K6BT7-T6PXP-BXKT4-X3G8D
DDH8T-C2JGD-G6MWW-6CYBV-BDTB6
Microsoft Office 2010 Retail serial Key
YC8CK-XCDKK-HT398-G8QMY-MC4KG
MV874-M39G6-62W84-37JCQ-32YWB
H3V6V-MJRJT-79V3J-92F9F-R6268
36RJP-T4Y8B-P9HGT-G4C2X-7CB83
BQB2C-G4YR8-6KP2R-6DXJ6-X7TMY
CDQMC-TH6VC-CKCXV-36HRT-QC3DY
V4D3D-MRYR3-Q77QP-9GPB4-8P3DY
HCMJ4-4WM8Q-Q2QTR-WGPD2-Y6QDY
R7FKB-HMKXF-P38MF-HB9HW-VKYMB
RCHJ4-CM64F-GRHK7-BQYC9-K23DY
Q3MR2-7XRGP-HYTGX-V9GMQ-JJMMB
H3YQC-FF4VG-6W8BK-CT6Q3-CGVYB
FTF82-49K3J-BGJQV-RGPMB-7TQDY
Q33W9-T8636-W9VP2-Y87VJ-BDMMB
Microsoft Office Professional plus Retail key
WXJR-XXTM8-XTHJC-Y9P6K-TTBJH
C8YCF-KGDQ3-PFT29-88GT6-Q3KBB
D6Q7W-DKQBQ-W8862-V7HJ9-VY3WB
6BR37-HPGCV-VRM4C-VYVC8-66VX6
2YBB3-FBKX7-HVT4G-DP82G-VGP29
74329-VF7BM-2CDB7-PG3CD-RJMRP
278RC-WK9QG-PVYD7-3MWPF-J9W2K
GMWMX-7G27C-96KWD-TJHXK-RBHTF
RDGF9-WX39F-CGPD8-XFTFQ-WQBQ8
Microsoft office Home and Student 2010 Serial
2KGBH-GH34V-RF6JQ-7Y8PB-VWR8W
WinZip v15.0 Serial Key
ziax9-cvc2u-3fepf-mjka9-xqo2a-oedclzo
tzd6b-bxd3w-mo4us-ipwcs-bodja-ufdclzo
qsvyg-afppm-vl3zq-mwjss-djkha-fkdclzo
CyberLink powerdirector 9 Serial
BF937-FZ7NB-KHZEY-B3LAP-BNEFL-VT3EW
Total Video Converter 3.71 Serial
6DEC207B-F3C6764F-0E90B64F-80F3052A-5FB4E1A9-A9050784-1DA74A30-6E95FC39-B4F627AB-406D07C1-97BAB567-806A4672-39A2B2A5-0C7E9E30-8DFDD3CD-B67F235C
DFC5A0BA-023B98DA-320F9A39-71535F5F-5CFB7288-095258DA-45B477A5-D916E431-EA0DFCB3-525C12DE-C04285C4-7D78AB14-95DDAE18-D684A60B-B5F7BDC9-122DBEC
4D00F429-1FECE58B-DE027AC0-19ADEFB8-166B6D05-3457422C-F57D9F4B-FB0411D9-4F31A2F0-C74724B3-1FF8B8AF-3EEF0751-AD159250-0E7CE6B4-733B0E2E-CAF3DA59
Tune-up Utilities 2011 Serials
J250BQ-JV7CKD-57MEQ9-TNQY37-T227VK-NNKJ0F
J83R7W-09YTEY-D3NBT8-NAW7WT-41CAW8-C5CB0N
YC40X1-Q1VRN4-JMBJWF-D9VDQF-Y8Q5XT-PWMCPQ
7W83H3-DM6MM0-B267Y8-3M5H63-TNCN47-YRT5B9
25HAB6-TW5YN4-Y5HMPV-WDNCT5-X92T0P-Y3MBQF
TC20WH-JJ4TMC-R7734Y-7Q3T4D-KXDJH8-CN8EPH
MNTK1Y-HW5YR8-BPQHRC-WWDNJJ-HPPXME-9XQBXQ
Latest updated Tune-up key
DV77CD-V10K5J-3HWWD3-2Y2EEQ-4K4PVX-KV1DYT
Webroot Spy Sweeper 6.1.0 Serials
SSFC-ONLN-AADI-OOBZ-MSTW
SSFC-ONLN-AADI-OOGA-NRYV
Wonder Bit LifePhotoMaker v1.62 keys
0WJCQB-447TM6-E905UJ-D8F6NX-58GXNZ-HEU3HJ
0WJCQB-447TP4-7J23NZ-NW0R1D-AFB6MR-JJCB27
0WJCQB-447TPC-K12DQG-TAKEYT-9Y16UB-5K1HM6
Windows 7 All Version Update key
Windows 7 Home Premium:
6RBBT-F8VPQ-QCPVQ-KHRB8-RMV82
Windows 7 Professional:
1) VTDC3-WM7HP-XMPMX-K4YQ2-WYGJ8
2) 6RQ9V-6GCG4-8WV2H-966GF-DQ4DQ
3) 32KD2-K9CTF-M3DJT-4J3WC-733WD
Windows 7 Ultimate:
1) FJGCP-4DFJD-GJY49-VJBQ7-HYRR2
USB Secure v1.5.8 Serial :
Serial: U2-453444412-1111
Activation Key: 42F2BAD81844AC38FC5A46E2
Advanced SystemCare Pro 4 Serial
48F0-48F0-F0FF-0CD7
Adobe photoshop CS5 Keys
1330-1451-8723-5410-7237-6068
1330-1464-8862-0857-4064-8596
1330-1611-5806-7017-8124-5859
Microsoft Office 2010 Professional Serial Only
22HGX-728MX-BBWX9-7BB8X-J96B4
Project 2010 Professional use
CQYRY-3KBR3-JW34C-VGH7M-MQM49
Visio Premium use
PQCFB-YGXGC-TXB66-DH3VW-GCGYQ
Windows 7 Ultimate E OEM Serial
TWMF7-M387V-XKW4Y-PVQQD-RK7C8
Autorun Virus Remover serial
Name: Dabangkhan
Serial: ESOSZ
Internet Download Manager 6.06 Build 2 Serial
Name: Dabangkhan
Serial: HP725-68X5M-IIW8F-8411F
TypingMaster Pro 7 Full version Working Key
Launch TypingMaster Pro, and enter license:
License ID: Don Moy
Product Key : 646MW-37XU-HLS-4PCNH47
Close the program and go to program files folder of TypingMaster (e.g. C:/Program Files/TypingMaster )
Right Click on file "tmaster8.net" and go to properties and apply attribute "Read Only"
Uniblue PowerSuite 2011 3.0.1.3 Serial
PS-E9J3T-HHJSM-PV3RM-REXGT-EPJK4-PBTF4
AVG Pc Tune Up 2011 Serial
YA5R41-3PM8J2-MTRD2K-PV0PM3-33F06P-DHTBJW
RRDNDT-XBFM7C-N9RJRJ-9F8NT1-RE1P1V-AQYBRN
5YHDTE-9RWA0K-P1WD6M-F4BVQR-6QKBWA-Y0YJPP
DE9M46-1V8AK7-RQD4FE-X3BAJ6-37256N-8YD5PB
YADCM4-EMHPHT-XE27KW-8H1P34-F81MYC-5A5AJB
JBFWRC-JXQ3BR-F5B8AP-QWM172-85FN15-56PKWC
WinZip v14.5 Serials 100% worked
CE3K3-7NWXA-GR38J-9QWU5-T3YU3-QH30R
EXXX5-2D1N5-CX558-NGKQ7-2UY3Q-8V8ZP
Nero Burning Rom 10
Serial :9X0C-004C-AXCP-797C-7ET6-C723-1ALK-2UTP
Just Follow these step before insert Serial Key >
1.Bock the program accessing internet using firewall/Disconnect internet.Then Install the application
2.Use the serial provided to register,
3.DO not update the program.
4.Done
AVG Anti-Virus Pro 2011 Keys Till 2018
8MEH-RXYFD-JUV72-8922R-FTDO8-QEMBR-ACED
8MEH-RS47Y-82HT8-GONVA-BCCCZ-DEMBR-ACED
8MEH-RGM33-K474L-6FGRR-8QEFN-UEMBR-ACED
8MEH-R6BFE-HWUHF-DPNDA-VFUWX-2EMBR-ACED
Nero 10.5 All products keys Serials
Plugins Serials >
DTS Plug-In: KK00-5195-199K-254K-132E-9056-XC07
DTS Plug-in: 9K00-40E3-8E80-57C0-5058-2410-44A2
mp3PRO Plug-In: KC00-203X-1886-2446-051E-54C2-XC60
mp3PRO plug-in: 1C00-8014-9880-2000-408M-M5K3-M12E
Gracenote Plug-in: 9M0C-0194-WHXE-0EL6-CXK9-L81P-61C6-47X1
Nero Move it Plug-in: 9X11-00AK-W57M-MWHT-WP1C-M79W-WA1X-07W2
Nero Blu-ray Disc Playback Plug-in: 9X12-008A-M8PK-M1AU-0944-AM34-T88E-087A
Nero Multimedia Suite 10.5 Platinum HD serial >
Nero Multimedia Suite 10.5 or
Nero Multimedia Suite 10.5 Platinum HD
9X03-014M-337H-H1CZ-L2KK-229X-1ZUX-LPHA
Winamp Pro 5.58 Build 2975 serial
3MMW8-ZFCNO-C9ETR-N6U97
TrustPort USB Antivirus 2011 v11.0.0.4615
TP-NFRx-ZTC2-MJEX-MJY1-H6GZ14DJ
TP-NFRx-MZRH-NG9W-MMVK-BVZ4AKXT
Here there are some other important software’s serial keys placed alphabetically.
3D Studio Max 4 :::: Number: 226-19791979 / CD Key: XLSQBQ
-Adobe Golive 4 :::: GJW400R2100006-625
-Adobe InDesign :::: IPE123R12345678-337
-Adobe PageMaker 6.5 BR :::: 03-5004-201500745
-Adobe PageMaker 7.0 :::: 1039-1121-2998-7586-7388-7545
-Adobe Premiere 6.0 :::: MBF500B7205104-998
-Adobe Premiere 7.0 PRO:::: 1132-1381-7346-2847-2617-6783
-Aldus Photo Styler 2.0 :::: 15-1001-000000001
-Adobe Framemaker 7.0 :::: 1030-1208-8265-3458-9287-7077
-Adobe Premiere 6.0 :::: MBF500B7205104-998
-Adobe Premiere 6.5 :::: MBE600R7100024-900-960
-Adobe Premiere Pro v7.0 :::: 1132-1381-7346-2847-2617-6783
-After Effects 5.5 :::: EWW470R1001999-030-259
-Aplicativos Comerciais :::: 2003 0947201
-Architectural Desktop 3.3 SERIAL :::: 400-12345678 / CD KEY: T4ED6P
-AutoCad 14 :::: 117-99703105 / W36H / C3DF32EA
-AutoCad 2002 SERIAL :::: 400-12345678 / CD KEY: T4ED6P
-CakeWalk Home Studio 2004 :::: CWHS2.20-003021
-CakeWalk Home Studio 2002 XL :::: 2002 XL CWHX1.02-002397
-CakeWalk Pyro 2003 :::: CWPY200333333 / MP3: 95F5AGFD
-CorelDraw 8 :::: DR-8XR-23969F-63
-CorelDraw 11 :::: DR11CRD-0012082-DGW
-CorelDraw 12 :::: DR12WEX – 1504397 – KTY
-Curso – Flash 4 :::: 540234330 / 55623255258 / 5279103
-Delta Translator :::: DTR2-29108-84895-00412-18
-Dicionário Michaelis V.5.0 BR :::: CD6BL9805083
-Easy CD Creator 5.2 :::: G332NB-MGJNH-ZFVPB
-Easy CD Creator 5 :::: P-7TGQ4-G06CM-N5G1L
-Easy CD Creator 6 :::: BD-JWZS4-QX3MR-0241L
-Easy Media Creator 7.0 serial :::: YN-Y7WVY-CQXG6-K3KWZ
-Enciclopédia de Tomografia Comp. LEE :::: RUSR23351
-Empresário 3 serial :::: e3co-1-co-065-00-00-m1oe111
-English Teacher :::: 03231183
-Exchange 2000 Server :::: KRJQ8-RQ822-YRMXF-6TTXC-HD2VM
-Globalink Power Translator 6.4 :::: PT6PU7-6.41-698-0474
-Guia do Sexo :::: 3746
-Houaiss :::: DHS-21771533
-Inventor 4 :::: 202-12345678 / CD KEY: G4ED6P
-James Bond 007: NightFire :::: 1740-9488245-5171152-5578
-JurissÃntese Millenium :::: JS164-29
-Kylix 3.0 :::: 6AKT-TE29VM-7GZV6D-28?Y / Aut. Key: GFW-?RW
-Macromedia Studio MX :::: WSW600-59791-91721-99978
-Make Money 2.0 :::: PRF 0200153
-Mechanical Desktop 6.0 :::: 400-19791979 / CD-Key: TLSQBS
-Norton System Works 2005 :::: BBCQ-9BCY-PKCX-GJPD-GYTK-HKGJ
-Norton Inter Security 2005 :::: BBCY-PK26-GKCP-7BCM-VY22-3VMF
-Office 2000 :::: GC6J3-GTQ62-FP876-94FBR-D3DX8
-Office 2003 :::: GWH28-DGCMP-P6RC4-6J4MT-3HFDY
-Office XP Full BR :::: HXT2X-8CDBF-HYY8H-TYJ7Q-HMHHG
-Ominipage 11 :::: 2889A L00 500020
-Page Maker 7.0 :::: 1039-1121-2998-7586-7388-7545
-Photoshop 5.5 BR :::: PWB550E7100088-110
-Photoshop 6.0 BR :::: PWW600R7105467-948
-Photoshop 7.0 :::: 1045-1209-6738-4668-7696-2783
-Photoshop 8 CS :::: EWW470R1001999-030-259
-Photoshop Elements :::: 1057-4422-1198-0751-6983-5530
-Plus Windows :::: 95 411-1410701
-Project98 BR :::: 1112-1111111
-Project Server BR 2003 :::: WFDWY-XQXJF-RHRYG-BG7RQ-BBDHM
-QuarkXPress 5.0 :::: 39173027QHSKKJF3199PYJX2
-RoboHelp Enterprise 2002 :::: REF22-C3E40SHK
-ROXIO EASY CD & DVD CREATOR SUITE 6.0 :::: BD-JWZS4-QX3MR-0241L
-Seagate Crystal Reports 8.5 :::: A6A50-8900008-ZE1007S
-Seagete Crystal Reports 9.2 :::: AVS50-81SG00S-G61002U
-SIC 3.02 Serial :::: 12D2-2501-8410-32X0-6752 / Série: 060086
-Sound Forge 5 :::: 3B-9FWG9Z-T60ZYS-0QZY0D
-Ulead VÃdeo Studio 8.0 :::: 81102-86000-13994421
-Via Voice :::: RPB000049301
-Visual Kit 5 V.6.0 :::: W60.000.001.425-789
-Visual Kit 5 V.7.0 2003 :::: U5R.
-Visual SouceSafe 6.0 :::: 885-2814463
-Visual Studio 6.0 :::: 111-11111
-Visual Studio.net :::: D64GG-GXY6T-V6FTR-WCPBB-2YDYB2
-Win DVD 2000 :::: GMR22WGYXPUB8LH
-Winace :::: ACEQ79TFDSWXC3H4R64
-Windows 95 :::: 28595-OEM-0005727-80940
-Windows 98 :::: KGGJF-Q3HCX-88JJV-DM3KH-VY6VQ
-Windows 98SE :::: XJ3XX-YR4CJ-TQD6J-76QJR-GJMJB
-Windows 2000 Server BR :::: M2GHT-V6YK6-P6Q9D-PRCXF-FCWXT
-Windows 2003 BR :::: JB88F-WT2Q3-DPXTT-Y8GHG-7YYQY
-Windows 2003 Server :::: QW32K-48T2T-3D2PJ-DXBWY-C6WRJ
-Windows ME :::: Q7JRD-HH6DG-RD4BK-H93DF-DQ4FG
-Windows ME Completo :::: B6BYC-6T7C3-4PXRW-2XKWB-GYV33
-Windows NT 4.0 :::: 419-0949015
-Windows XP Corporate :::: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
-Windows XP CORPORATE C/SP2 :::: VDDF2-JJWM3-X7P27-FRHRT-8BVHT
-Windows XP Home BR :::: K8GMG-PRV3M-VG2JH-DJJ48-RY7FV
-Windows XP Professional C/SP2 BR :::: BX6HT-MDJKW-H2J4X-BX67W-TVVFG
-Windows XP Professional – Inglês :::: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
-Windows XP BR :::: JB88F-WT2Q3-DPXTT-Y8GHG-7YYQY
-Windows XP Server :::: BJXGH-4TG7P-F9PRP-K6FJD-JQMPM
-Windows Server 2003 Enterprise Corporate Edition :::: JB88F-WT2Q3-DPXTT-Y8GHG-7YYQY
-Windows 2003 Standard Server :::: M6RJ9-TBJH3-9DDXM-4VX9Q-K8M8M
-Windows 2003 Web Server :::: d42x8-7mwxd-m4b76-mkyp7-cw9fd
-Windows 2003 Server Corporate 3 in 1 :::: JB88F-WT2Q3-DPXTT-Y8GHG-7YYQY
-Windows 2003 Server/Enterprise/MSDN :::: QW32K-48T2T-3D2PJ-DXBWY-C6WRJ
Watch 18+ Videos On Youtube Without Signing In
Sometime its annoying when youtube ask you to sign in for your age verification to watch 18+ videos. So i will make it easy for you by showing you a simple youtube trick to watch adult or 18+ youtube videos without signing In. This trick is 100% working as of 2013. So lets get started.
How To Watch 18+ Youtube Videos Without Logging In ?
1. First get the Url of video you want to watch. As shown below.
http://www.youtube.com/watch?v=4Xkh6j7RMqk
2. Then copy the Video Id. For above link video Id is 4Xkh6j7RMqk
3. Now paste the Video Id in the link given below.
http://www.youtube.com/v/VideoId?fs=1
Replace VideoId with the Id you copied in Step 2
4. Now the url will become as shown below.
http://www.youtube.com/v/4Xkh6j7RMqk?fs=15. Done.
Learn To Hide Files Behind The Images Tips
There are some important files or document you want to hide from others on your computer. To do that you might be creating folder inside folder to hide such files but in todays tutorial i will change this by teaching you a interesting trick to hide files behind images.To hide a file behind a image means that if any one opens that image he will see the image, but to see the hidden file we need to open that image in a specific way. So lets get started.
How To Hide File Behind Image ?
In order to do this you should have basic understanding of command line, but if you don't know check out tutorial given below.
Video Tutorial On Basic Terminal Commands
1. Select an image to be used for hiding file behind the image.
2. Now select a file to hide behind the image and make it in .RAR format. With the help of the WinRAR.
3. And most important is that paste both the files on desktop. You may do this anywhere instead of desktop if you have some basic understanding of command line.
4. Now open cmd by going to Start > Accessories > Command Prompt and type following commands in it.
cd desktop
5. CD stands for change directory by typing above command you change your directory to desktop. After that type command given below.
Copy /b imagename.jpg + filename.rar finalimage.jpg♦ Replace imagename.jpg with the name of image you want your file to be hidden behind. Don't forget to add image format (Eg: .jpg,.png,.gif)
♦ Replace filename with name of your file you want to hide. It must be in .rar format.
♦ Finally Replace finalimage.jpg with whatever name you want your final image with hidden files should be. This is the image where your file will be hidden.
6. Now when you will try to open this newly created image it will open as normal image, but to open you hidden file you need follow steps given below.
How To Access Hidden File ?
To access your hidden file you need to open the newly created image in winrar. Just follow simple steps given below to do that.
1. Open winrar
2. Now locate your image and open it or simply drag your image in winrar.
3. Extract the file and done.
Hack A Server 2013
Hello my friends , today i will explain you how to hack a server and exploit it ^_^
First thing you gonna do all this from Localhost use "Wamp" or "Easy php". Then upload a shell with full option like my shell ^_^
Now the most important thing is to know what is the version of the server and the kernel version ^_^
We are not going to target a website of the server and try to upload a shell and try to symlink or root ^_^
Linux xxxxxxxxxxx.xxxxxxxxxxx.net 2.6.32-379.19.1.lve1.2.7.el6.x86_64 #1 SMP Wed Jan 23 14:53:41 E
As we can see Linux and the kernel version is 2.6.32 x86_64
Now what to do ?
Go to www.google.com and type this: Linux 2.6.32 x86_64 exploit
you will find many exploits find the right exploit script upload it in your Localhost then edit it with the IP of your
server target and choose the right port of the exploit if the exploit is SSH (22) , FTP (21) , etc.....
Then use Netcat to make Backconnect from your Shell if Backconnect is not etablished that's mean that your
server target has been patched or you are not using the right port to backconnect or you need to forward
your port.The rest you can do it from putty i'm not going to talk about this here i'm just giving
some educational informations ^_^
Another method is to find the host of the server for example if you ping www.google.com
Ip is 173.194.34.19
The Host is "par03s02-in-f19.1e100.net" but as you know Google is very secured all their system is from localhost
and most of their services in remote are Filtred , so How many Google Websites of some countries was Hacked
Well they wasn't certified by "Google Inc" so if you scanned them in the past you could find a port open in the server
or the host enabled , even a exploit in the kernel or a Dns Exploit ^_^ if you try to telnet the port 25 (SMTP)
of Google you will find it open certainly "Limited" (.....) but there is no a hacker that can exploit it yet ^_^
Professional Hacking Tricks And Attacks List 2013
What is hacking?
Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator's original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.
Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it's not limited to either of them.
Due to the mass attention given to blackhat hackers from the media, the whole hacking term is often mistaken for any security related cyber crime. This damages the reputation of all hackers, and is very cruel and unfair to the law abiding ones of them, from who the term itself originated. The goal of this website is to introduce people the true philosophy and ethics of hackers, hopefully clearing their name and giving them the social status they deserve.
There are three types of hackers :-
1. White hat hacker (WHH)
2. Black hat hacker (BHH)
3. Gray hat hacker (GHH)
4. Script Kiddie
Here is some Professional hacking attacks, Hope every beginner will like to read this article.
I created a list call it as a Pro hack attack (PHA)
Download This Complete List From here
♦ Session One Getting the basics right
♦ TCP/IP Fundamentals
♦ System Fundamentals
♦ Firewall Technologies
♦ Programming & Database Fundamentals
♦ Session Two - Network Cartography
♦ Advanced Google Hacking
♦ Fingerprinting
♦ Nmapping the network
♦ Footprinting
♦ Session Three - Exploitation
♦ Hacking networks
♦ Hacking servers
♦ Hacking databases
♦ Backdooring
♦ Session Four - Advanced Exploitation
♦ Hacking WLANs
♦ Evading IDS, Firewalls and Detecting Honey Pots
♦ Web Application Hacking
♦ Advanced Web Hacking
♦ Hacking Web Browsers (Firefox, IE)
♦ Session Five - Black-belt Hacking
♦ Buffer overflows
♦ Metasploiting the universe
♦ Reverse Engineering
♦ Covert Hacking
♦ Session Six - Social Engineering
♦ What is Social Engineering?
♦ Common Types of Attacks
♦ Social Engineering by Phone
♦ Dumpster Diving
♦ Online Social Engineering
♦ Reverse Social Engineering
♦ Policies and Procedures
♦ Employee Education
♦ Session Seven - Cryptography
♦ Encryption and Decryption
♦ Cryptographic Algorithms
♦ . DES
♦ . RC
♦ . RC
♦ . Blowfish
♦ . MD
♦ . SHA
♦ Government Access Key - GAK
♦ Digital Signature
♦ Cryptography Tools
♦ Code Breaking Methodologies
♦ Cryptography Attacks
♦ Session Eight - Honeypots
♦ What is Honeypot?
♦ Honey net Project
♦ Types of Honey Pot
♦ Honey Pot Replacement
♦ Various Open Source and Commercial Honey Pots
♦ Session Nine - Esoteric Hacking
♦ RFID Hacking
♦ Hacking Mobile Phones, PDA and Handheld Devices
♦ VoIP Hacking
♦ Cyber Warfare
♦ Hacking E-mails Accounts
♦ Corporate Espionage
♦ Botnets
♦ Bluetooth Hacking
♦ Hacking USB Devices
♦ Spamming
♦ Session PHA attacks
♦ SQL Injection attack
♦ Blind SQL Injection attack
♦ HTML Injection attack
♦ PHP Code Injection attack
♦ Java Applet attack method
♦ SET attacks
♦ Web Jacking attack
♦ Spoofing attacks
♦ Backtrack Information Gathering Tools
♦ Backtrack have More than 65 Hacking TOOLS
♦ Session Ten - Password Cracking
♦ How to Steal Passwords
♦ Hashing Algorithm
♦ Active Brute Forcing
♦ Passive Brute Forcing
♦ Web-Based Password Cracking Techniques
♦ Session Eleven - Trojans and Backdoors
♦ Session Twelve - Viruses and Worms
♦ Writing Virus Codes
♦ Session Thirteen - Phishing
♦ Session Fourteen – Exploit Writing
♦ Assembly Language Tutorial
♦ Exploit Writing
♦ Session Fifteen - Privacy on the Internet
♦ Session Sixteen - Spying Technologies
♦ Session Seventeen - Credit Card Frauds
♦ Session Eighteen - Software Piracy and Warez
♦ Session Nineteen – Securing Laptop Computers
♦ Session Twenty - Data Loss Prevention
♦ Session Twenty One - Physical Security
♦ Session Twenty Two - Basics of Digital Forensics
Hacking Incidents
Defining the Forensics Process
Digital Forensics Essentials – A’s
Investigation Guidelines
Disk Based Forensics v/s Network Based Forensics
Chain of Custody
♦ Hands-on Exercises
♦ In-depth exploration of TCP/IP using Wireshark
♦ Exercise Analysis of tcpdump output to determine attacks
♦ In-depth usage of Nmap
♦ Cracking WLANs
♦ Hacking Oracle
♦ Building your own exploit
♦ Metasploit
Arbitrary File Deletion
Code Execution Hacking(LFI,RFI,Iframe Injection, Remote Code Execution)
Cookie Manipulation (Meta HTTP-EQUIV & CRLF Injection)
CRLF Injection (HTTP response splitting & Headers Injection)
Cross Frame Scripting ( XFS )
Cross-Site Scripting ( XSS - Persistent, Non-Persistent, DOM Based)
Directory traversal including shell uploading
Email Injection
File Inclusion (LFI,RFI with and without null byte)
Full Path Disclosure
LDAP Injection
PHP code injection
PHP curl_exec() url is controlled by user
PHP invalid data type error message
PHP preg_replace used on user input
PHP unserialize() used on user input
Remote XSL inclusion
Script source code disclosure
Server-Side Includes (SSI) Injection
Structured Query Language Injection(SQL Injection)
URL Redirection
XPath Injection vulnerability
EXIF
Buffer Overflows
Clickjacking
Dangling Pointers
Format String Attack
FTP Bounce Attack
Symlinking and Server Rooting
Blind SQL injection (timing - Boolean Based)
Blind SQL Injection (Blind SQL String Based and Double Query Blind Based)
8.3 DOS Filename Source Code Disclosure
Search for Backup files
Cross Site Scripting in URI
PHP super-globals-overwrite
Script errors (such as the Microsoft IIS Cookie Variable Information Disclosure)
WebDAV (very vulnerable component of IIS servers)
Application error message
Check for common files
Directory Listing
Email address found
Local path disclosure
Possible sensitive files
Microsoft Office possible sensitive information
Possible internal IP address disclosure
Possible server path disclosure (Unix and Windows)
Possible username or password disclosure
Sensitive data not encrypted
Source code disclosure
Cross-Site Request Forgery (CSRF)
5 Things A Beginner Hacker Should Know Before Hack
Here are few points for beginners which they should know :-)
1- At this stage, most of the students search for hacking tools and software. But Here i want to make this clear that no tool and software exists which can hack Gmail, Facebook, Yahoo, twitter or any aother website or email account in just few clicks. These types of posts on internet are just for attracting visits and spread spams. Most of this type of hacking tools are binded with trojans which leads your system at risk. The recent example it Anonymous LOIC tool which is used to hack members to use their system in criminal activities.
2- Never use any premium keylogger which is available free on filehosting websites.Hackers always host this type of tool with Trojans. After installing this type of keyloggers you will be hacked.
3- Never pay for hacking on the websites which are asking money in return of hacking. If you want to pay for any hacking book, tool or other kit, pay only on the trusted websites.
4- Join any good hacking forum and learn new things from the experts. Never follow a person just for his claims. Always follow a person who has real knowledge. Adding hacker word is not going to make anyone hacker. There are many Javascript pranks and online websites are available which are used to create fake screenshot and defacing pages. These are used by many noobs to create some fake hacking screenshot to share on Facebook. And beginners follow them thinking as a hacker.
5- Learn Programming languages and networking. These are must to be a hacker. Most of the hacking attacks such as SQL injection, PHP injection, XSS, Phising and many other needs the knowledge of programming.
Cracking Wi-Fi WEP Networks With Commview / Aircrack-Ng 2013
Hello Friends here i am sharing another tutorial for wifi cracking via Commview and aircrack so lets start it.
Tools Needed :
1) Commview for Wifi
2) Aircrack-ng
Instructions :
1) Download, Install and open Commview for wifi.
2) Click on the “Blue play button” and the screen shown below will appear. Click on the “Start Scanning” button
3) Now as all the available networks start to load, look for your target. Click on your target network (Make sure its WEP) and proceed to press the “Capture” button. (Shown Below)
4) Now you will see the screen shown below as they collect packets. I have read tutorials claiming that a minimum of 5000 packets is needed. But in my experience, iv had to collect at least 15,000 packets before successfully cracking it.
Note : The packets are secondary, What is actually happening here is that we are trying to collect as much IVs (Initialization vector) from those retrieved packets. The more IVs collected the higher the chance of cracking it. So if you collected 5000 packets but have shit loads of IVs in them, Then that is all you will need. But if the IVs is limited then you might have to go for 15,000+++++++ packets. Do the Math.
5) Now that i have collected around 50,000 packets, i proceed to click on the “blue stop button.” Next click on the “Logging” tab to check where the packets were saved on your hard drive. In my case its saved on my desktop. Or if you prefer in the future do this setting before starting. (Shown Below)
6) Now minimize Commview and locate the logged packets on your hard drive. Once you have found it, double click on it and a screen will appear. Click “File”, “Save as” and change the output file to “WireShark/TCPDump” and press save.
7) Now lets proceed to “aircrack-ng.zip” and unzip the folder to your desktop.
8) Double click on the extracted folder and locate the bin folder within.
9) Once you are inside the bin folder, locate the file Aircrack-ng-GUI.exe and double click on it. The screen shown below will appear.
10) Click on the “Choose Button” and direct it to your Wireshark file that you just saved a minute ago.
11) Lets keep the Encryption type to “WEP”.
12) Key Size : 128
13) Now proceed to press on the launch button. A command prompt will appear, allow it to fully load .
14) Index number of target network? In my case i key in 1 and press enter.
15) The screen shown below will appear, sit back and wait for it to do its magic. And before you know it! Voila!
Congratulations! We have successfully cracked the WEP password !
Author note : This is for educational purposes and this is my own network.
Download the PDF version of this tutorial here.
Friday, April 12, 2013
IDM BROKEN FILE RESUMING DOWNLOAD
As we all know IDM ( Internet Down-loader Manager ) is one of the fastest download manager amongst all. Sometimes when you tried to download the file with IDM, it failed to download. Really its frustrating if we already completed that file above 50 % and suddenly it stops resuming and the message displayed " Do You Want To Download The File From Beginning ". Here is the trick which help you to resume the file.
CAUSE FOR SUDDENLY STOPS DOWNLOADING :
☼ Server Stopped Responding.
☼ You Internet Connection Stopped Working.
☼ You Manually Pause It.
☼ Stopped it to download it later because you can see that it got a resume capability .
FOLLOW THE STEPS CAREFULLY FOR RESUMING DOWNLOAD BROKEN FILE :
1) Open the same file in the Browser, click to download it again and when dialogue box appears select to 'Download It later' (But be sure that file must have the same file size and from the same link/server).
2) Now open IDM and double click the file which you clicked earlier to Download it later.
3) Now in next window, copy the full address field.
4) Now double click that file which has not been resuming (i.e download broken file) and paste the address there which you have copied earlier in the address field and press OK.
5) Now You're done, Finally click the file and press Resume.
◘ Hope You Enjoyed This :)
How To Use Windows 7 Without Activation
Most of you might be aware of the fact that it is possible to use Windows 7 and Vista for 120 days without activation. This is actually possible using the slmgr -rearm command which will extend the grace period from 30 days to 120 days. However in this post I will show you a small trick using which it is possible to use Windows 7 without activation for approximately an year! Here is a way to do that.
1. Goto “Start Menu -> All Programs -> Accessories” . Right click on “Command Prompt” and select “Run as Administrator“. If you are not the administrator then you are prompted to enter the password, or else you can proceed to step-2.
2. Now type the following command and hit enter
slmgr -rearm
3. You will be prompted to restart the computer. Once restarted the trial period will be once again reset to 30 days. You can use the above command for up to 3 times by which you can extend the trial period to 120 days without activation.4. Now comes the actual trick by which you can extend the trial period for another 240 days. Open Registry Editor (type regedit in “Run” and hit Enter) and navigate to the following location
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SoftwareProtectionPlatform
5. In right-side pane, change value of SkipRearm to 1.
6. Now you will be able to use the slmgr -rearm command for another 8 times so that you can skip activation process for another 240 days. So you will get 120 + 240 = 360 days of free Windows 7 usage.
120 days using “slmgr -rearm” command before registry edit
+
240 days using “slmgr -rearm” command after registry edit
= 360 Days
How To Hack Windows Administrator Password
This hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password.
Most of us have experienced a situation where in we need to gain access to a computer which is password protected or at times we may forget the administrator password without which it becomes impossible to login to the computer. So here is an excellent hack using which you can reset the password or make the password empty (remove the password) so that you can gain administrator access to the computer.
You can do this with a small tool called Offline NT Password & Registry Editor. This utility works offline, that means you need to shut down your computer and boot off your using a floppy disk, CD or USB device (such as pen drive). The tool has the following features.
You do not need to know the old password to set a new one
Will detect and offer to unlock locked or disabled out user accounts!
There is also a registry editor and other registry utilities that works under linux/unix, and can be used for other things than password editing.
How it works?
Most Windows operating systems stores the login passwords and other encrypted passwords in a file called sam (Security Accounts Manager). This file can be usually found in \windows\system32\config. This file is a part of Windows registry and remains inaccessible as long as the OS is active. Hence it is necessary that you need to boot off your computer and access this sam file via boot. This tool intelligently gains access to this file and will reset/remove the password associated with administrator or any other account.
The download link for both CD and floppy drives along with the complete instructions is given below
Offline NT Password & Reg Editor Download
Another simple way to reset non-administrator account passwords
Here is another simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task.
1. Open the command prompt (Start->Run->type cmd->Enter)
2. Now type net user and hit Enter
3. Now the system will show you a list of user accounts on the computer. Say for example you need to reset the password of the account by name John, then do as follows
4. Type net user John * and hit Enter. Now the system will ask you to enter the new password for the account. That’s it. Now you’ve successfully reset the password for John without knowing his old password.
So in this way you can reset the password of any Windows account at times when you forget it so that you need not re-install your OS for any reason. I hope this helps.
How To Hack Windows XP Login Password Without Any Software ?
Passwords can be describes as a verification tool for a object. Passwords are used to ensure legal or proper access to only those people who have the necessary authority or the permission. In this tutorial I will show you how you can change or remove the Windows XP login password without using kind type of software or password cracker. There are three methods for performing this hack. In the first two methods you can changer/remove the password without logging into any account, and in the third method if you are having a account on a computer and want to reset the password of other account you can use the last method.
First Method-
In the first method, when the computer boots press F8 key repeatatly until you get WINDOWS ADVANCE BOOT MENU,
When this menu comes. Look for the third option called Safe Mode with Command Prompt, Select this option and hit enter. Wait for sometimes until you get the Comman Prompt on your screen. When the command prompt windows it opened in front of you type
"net user" (without quotes) /* This will give you the name of accounts which are present on the computer */
Now type net user "you username here" new password
Suppose you username is Almas and want the password hacker, you will type
net user "almas" hacker (and hit enter)
You will get a message Command Successful, whch means the account's password is changed sucessfully.. In case you get an error, this means that you don't have the administrator privileges to change the password.
Second Method-
Now, in the second method when you get the windows login screen were you enter your account password.
Press ALT+CTRL+Del two times, you will get a small window which will ask you for the user name and the password, in the user name feild type ADMINISTRATOR and leave the password felid blank and hit enter. You will be logged on as administrator
(this account is temprory ,after you log out that account will disappear). Now from that account you can change the password of any other account without any problem.
Third Method-
In the third method log in into your account, open run box and type CONTROL USERPASSWORDS2 and hit enter. There you will get the list of accounts which are currently created on your computer select and account and change the password.
How To Install Windows XP In 10 Minutes ?
As We all know that During Formatting a Computer After the File Copying is Completed then windows Require 39 Minutes Time…
But What Extreme In It…. YesWe can Bypass this faking Time ….
How TO DO IT???
So read On.. >>
INSTALLING WIN XP IN10 MINUTES! <<
STEP1 : After the Copy Part is Over …
System is Rebooted as we all know In general Foramatting Procedure…
Now After Reboot The Below Image Will Appear. …
STEP 2: You Have to Press “Shift F10 ” . This Will Open The command Prompt…
Now type taskmgr in it. This will open the Task manager .
STEP 3 : After The task Manager Opens Goto Processes …
And Find”Setup.exe” process and Right CLICK on It….
and set the Priority to Highest….
STEP 4: Now Just Watch the Set It will take around 9 minutes and 2 minutes for Tolerance(depends System to system)….
Thats the Overall Tutorial…Hope You all Have LIKED IT…
So When you Format your PC Next Time It willReally Save Your TIME i.e around 20 to 25 minutes….Enjoy
Monday, April 8, 2013
What is backtrack
What is BackTrack:
Backtrack is Ubuntu based operating system. Backtrack is the best operating system for the security professionals and hackers. There are lots of inbuilt tools in the backtrack 5 like sqlmap , metasploit , Information gathering, maintaining access , backdooring etc.
Download backtack
How to install the backtrack ?
You can install it using making a flash drive or burning the DVD. I recommend make a flash drive and install it. (create flash drive of backtrack)
What to do after installing ?
The default id and password of this operating system is
root and toor so after installing backtrack restart your computer and add this id and password.
Now if you want to use the GUI then simply type “Startx” to enter in the GUI of backtrack 5.
Subscribe to:
Posts (Atom)
Welcome
Popular Posts
-
[How to] Post your images Or New Text Fonts Codes in facebook your conversation
-
How To Hack Windows XP Login Password Without Any Software ?
-
Cracking Wi-Fi WEP Networks With Commview / Aircrack-Ng 2013
-
Windows 8 Keyboard Shortcuts
-
Watch Banned and Blocked Videos On Youtube
-
Cool Keyboard Tricks in Windows 7
-
Windows 7 Hack : Add Folder To “Send To” Menu
-
HACK GMAIL ACCOUNTS
-
How to Convert Facebook Friends to A Page Likes
-
Serial Keys For Important Softwares
About Me
Archive
-
▼
2013
(55)
-
▼
April
(18)
- HOW TO SAVE IPHONE 5 BATTERY
- Tips For Students To Get More Out Of Google 2013 Tips
- Windows Task Manager Has Been Disabled, How To Fix...
- How To Rename Multiple Files Quickly In Windows
- Add Background Wallpaper On Your Pandrive
- Serial Keys For Important Softwares
- Watch 18+ Videos On Youtube Without Signing In
- Learn To Hide Files Behind The Images Tips
- Hack A Server 2013
- Professional Hacking Tricks And Attacks List 2013
- 5 Things A Beginner Hacker Should Know Before Hack
- Cracking Wi-Fi WEP Networks With Commview / Aircra...
- IDM BROKEN FILE RESUMING DOWNLOAD
- How To Use Windows 7 Without Activation
- How To Hack Windows Administrator Password
- How To Hack Windows XP Login Password Without Any ...
- How To Install Windows XP In 10 Minutes ?
- What is backtrack
-
▼
April
(18)
1 comments: