Aug 24, 2012

How to Write Colorful Text On Facebook Chat!

Whenever am chatting with friends on Facebook, I always make my chatting moments with friends interesting and unique by changing the text color in the chat box. Colors they say it influence the mood of humans and it gives extra pleasure & excitement on Facebook chat.
Facebook Trick Logo
Facebook itself doesn’t support the use of colors and fonts because of some reasons. Facebook put restrictions on the use of fonts and colors for the sake of efficiency and speed.

Fonts and colors can cause delay and overloading so they are not allowed in Facebook wall section.
Facebook Colored text
Facebook Color Text Generator: In Facebook chat section, you can make use of colorful text. This can be done with some kind of free Facebook colored text generator that will make your chatting moments with buddy on Facebook look cool & fun.

Now, all you got to do with this generator is to copy and paste the code generated into your Facebook chat and the result will be a colorful large font in your Facebook chat. A preview will also be shown to you as you type the text into the generator.
Facebook Chat Box
Please feel free to comment if you liked this trick!

Aug 18, 2012

Download Windows 8 Evaluation Copy for developers!

About This Evaluation: This evaluation provides a 90-day trial of Windows 8 Enterprise edition. Both 32-bit and 64-bit versions are available as ISO images in the following languages: Chinese (Simplified), Chinese (Traditional), English, English (UK), French, German, Italian, Japanese, Korean, Portuguese (Brazil), and Spanish.

In order to use this evaluation, you must register and the product must be activated online with Microsoft-hosted activation and validation services. Microsoft does not provide technical support for this software.
Windows 8 logo Wallpaper
System Requirements
Windows 8 works on the same hardware that powers Windows 7:
  • Processor: 1 gigahertz (GHz) or faster
  • RAM: 1 gigabyte (GB) (32-bit) or 2 GB (64-bit)
  • Hard disk space: 20 GB
  • Graphics card: Microsoft DirectX 9 graphics device with WDDM driver
Additional requirements to use certain features:
  • To use touch, you need a tablet or a monitor that supports multitouch.
  • To access the Windows Store and to download and run apps, you need an active Internet connection and a screen resolution of at least 1024 x 768.
  • To snap apps, you need a screen resolution of at least 1366 x 768.
  • Internet access (ISP fees might apply)
Note: Please read this official article from Microsoft before download!

Select the Version You Want to Download

Download the 32-bit (x86) version
Download the 64-bit (x64) version

Please feel free to leave comment!

Aug 16, 2012

Ek Tha Tiger [pDVD] Full Movie Direct Download Link!

Hello Salman fans, Can't wait to watch the latest movie 'Ek Tha Tiger'! so go on... here i m providing you the one click direct download link of this movie.
Ek Tha Tiger Poster
Ek Tha Tiger
Short Story: In the dark world of intelligence and espionage. all information is guarded in the name of national security... But some stories escape the fiercely guarded classified files... stories that become legends. This is one such story... a story that shook the very foundation of this dark world.

In a government neighborhood in New Delhi, there lived a rugged, handsome and mysterious bachelor about whom his neighbors knew nothing. That was because he was India`s top spy, an officer with the Research and Analysis Wing (RAW), India`s external intelligence agency.

This man was known even in official corridors as TIGER (Salman Khan). Tiger is sent on a relatively easy and safe mission to Dublin, Ireland to observe a scientist of Indian origin who is suspected of sharing his research findings with the Pakistan defense establishment. Tiger attempts to meet the scientist but is not successful. He tries to befriend the scientist`s part time home caretaker, Zoya (Katrina Kaif).

As Tiger begins to get closer to Zoya... he begins to discover his human side. For the first time in his life, Tiger falls in love... What follows is a tumultuous journey that Tiger and Zoya embark upon, battling the dark world of intelligence and espionage that forbids its soldiers from falling in love.

Released : Aug 15, 2012
Source : pDVD
Genre : Action, Romance, Thriller
Star cast : Salman Khan, Katrina Kaif, Ranvir Shorey, Girish Karnad
Duration : 1:44
Size : 124mb
Views : 35488

Download Link Part 1
Download Link Part 2

Please feel free to comment or share this post with your friends!

Aug 15, 2012

How Do You Detect if Someone are Stealing or Using Your WiFi Connection!

Since you can't see who's got a computer hooked up to your wireless router, is there any way to know for sure if someone else has hijacked your signal?
Detect WiFi Stealer
It may be hard to imagine, but just a mere 20 years ago, the Internet was nothing more than a novelty -- a way for incredibly smart college professors and researchers to share information, and for a few people to network across the newly developed World Wide Web. E-mail was nothing like it is today. The primitive e-mail systems found at universities or even through accounts offered with the first Internet service providers (ISPs) such as Prodigy and America Online were often difficult to use.

Fast forward to 2009 and things have changed significantly. Back in the day, you paid for Internet access by the minute. That's not the case anymore. Like virtually every technology, changes occur quickly and often for the better. On top of that, the technology becomes cheaper and easier to use. The Internet has certainly gone through this transformation.

The most recent advance in digital communication is wireless internet or WiFi. Found in coffee shops, libraries and airports throughout the world, WiFi has made using the Internet almost as common as using your cellular phone -- which in itself is technology that exploded over the past decade. Unfortunately, unsavory activities inevitably find a way to enter even the most benign settings like the Internet, and that's (probably) why you're here.

Chances are you're reading this article because you suspect someone is piggybacking or using your WiFi without your permission and you want to learn how to determine if you're correct. When wireless squatters steal your WiFi, they slow down your bandwidth and what's worse, they can even steal information off your computer or infect machines on your network with a virus. Fear not, this article will give you the ammunition to fight back. Let's begin by taking a quick look at what makes up your WiFi network so you can prepare yourself to take control of the Internet connection you pay for.

Understanding Your WiFi Network

Before you can detect if someone is ripping off your wireless Internet connection, it's important to understand some basic computer networking lingo. For more information on how to set up a wireless network, take a look at How WiFi Works. Now, let's look at a few of the areas in a wireless network that will give you a baseline for determining if your WiFi signal is being sapped unexpectedly.

A wireless network is comprised of a broadband Internet connection from a DSL, cable or satellite modem. You attach the modem to the wireless router, which distributes the signal and creates a network.

This is what's called a local area network (LAN). This LAN is where you set up computer peripherals such as your desktop or laptop computer and printer. Your router will have what's called a dynamic host client protocol (DHCP) table. In essence, your DHCP table is your guest list of every allowed piece of computing equipment.

Each device has its own media access control (MAC) address. Think of this as its signature. MAC addresses are assigned by the manufacturer, but can be changed by users, if they know how. Your router uses these addresses to assign each machine on your network an Internet protocol or IP address. The MAC and IP addresses of your equipment will be useful in a moment when we look at ways to detect whether or not someone is stealing your WiFi. For a more in-depth understanding of IP addresses, read What is an IP address?

If you're confused by some of this computer rhetoric, don't be. What's important is that you know what to look for when we get ready to diagnose your WiFi connection. Speaking of which, let's get to it in the next section. After all, that's what you came here for.

Detecting Wireless Piggybacking

Okay, it's time to get down to it. Is your wireless network running slowly? Do you have intermittent losses in Internet access and you can't figure out why? Chances are, you've already detected a WiFi squatter and didn't even know it. If you regularly experience these problems, maybe you have something wrong with your wireless connection. But if you're suddenly having intermittent problems with your Internet performance, especially at the same time each day, it's a red flag that someone is piggybacking off your wireless connection and it's time for you to diagnose your WiFi network.

The first and simplest thing you can do is check out your wireless network connection and see if it's secure. When you install your router, you're given the option of setting a wireless encryption protocol (WEP) key. Basically this is a password-protected method for you to log on to your own wireless network. If you don't have one, you're operating an open network. That means anyone within range can use your wireless for free. While it's not hacking, it is debatable as to whether this is actually stealing. In any case, if you don't have a WEP key, you're vulnerable to WiFi squatting and certainly not deterring squatters.

Even if you have a WEP key, that doesn't necessarily mean your neighbor hasn't bypassed it. To determine if he or she is logging onto your wireless network, you can do so by checking your wireless network log. The exact steps vary depending on your computer's operating system, but in general, if you look at your network and see more devices connected than you have allowed on your network, you have WiFi thieves.

A similar method to determining the status of your WiFi user list is to check your router's DHCP client table. Much like viewing your network, your DHCP client table will list the machines on your network. If the number exceeds what you've set up, you have someone stealing your WiFi.

Nobody wants to be taken advantage of. What's more, you certainly don't want illegal information flowing through your wireless network. That's why you need to take matters in your own hands. The final section will give you the power to thwart off Internet thieves and protect your wireless connection. Are you ready to fight back?.

Stopping Digital Thieves

A WEP key is an absolute must for any wireless network; however, even those are vulnerable. While WEP protection will stop the guy parking in front of your house, it may not stop a more determined user like your neighbor. In that case, you can use a security protocol such as WiFi protected access (WPA); or even better the newer WPA2. This route is more secure but can still be hacked by a determined WiFi thief; though again WPA2 will make this a lot more difficult.

You can also use manual DHCP assignment. To do this, simply set your router's DHCP to the manual setting and enter in each of your computer's physical addresses. This will restrict your network to allow only those computers recognized by the router.

If the manual DHCP route isn't comfortable for your level of computer expertise, you may want to consider generating a MAC access list which usually can be created through the browser interface of the router. Unfortunately, MAC address lists can also be bypassed by savvy WiFi thieves; nevertheless, when used in conjunction with other security methods, they're probably enough on a small home network.

Internet monitoring software is also a viable option. Monitoring software will walk you through some of these methods and is user friendly for those who aren't as comfortable setting up wireless security methods. In addition, monitoring software makes it easy to see what is going on with your wireless connection. Your WiFi router may have some built-in software that will help you monitor your network. Explore the user guide and help section to see if there's a built-in application that will help.

Finally, turn off your router's SSID broadcasting. This effectively makes your network invisible. It's much harder to steal WiFi from a network that doesn't appear on anyone's radar.

Next time you suspect WiFi theft, peek out the front window and see if an unfamiliar car is parked in front of or close to your home. If so, you'll probably find someone in the car sapping your Internet. It sounds simple, but it could be just that easy to determine if someone is stealing your WiFi.

Courtesy to: Original Content.

Aug 14, 2012

Keyboard Shortcuts to Make Symbols Using Alt Key

Do you need to type some kind of special symbols like  © ® ™ ♥ ① ② ③ ④ ⑤ ⑥ ⑦ ⑧ ⑨ ⑩ ♬ ✔  X etc on Microsoft word, excel or Facebook status updates? but you don't have any visual key on your keyboard to type this kind of symbols! no problem, after finishing this article you should have the key to make or write those and lots of symbols.
keyboard Shortcuts

Yes, I'm talking about the Alt key of your keyboard. it can make about a thousand types of computer symbols. you just need to press Alt and then any key from your keyboard numpad. each time you press Alt+ any key a new symbols will appear.

Keyboard

Some Examples:

Alt+0169= © , Alt+0174= ® , Alt+0153= ™ , Alt+0188= ¼ , Alt=0189= ½ , Alt+175= »
More Examples:
Symbol list Using Alt key
Open in a new tab to Enlarge it
Symbol list Using Alt key1
Open in a new tab to Enlarge it
Please feel free to leave your comment or share your suggestions!

Aug 12, 2012

How to Hack or Remove Computer BIOS Password

Have you forgotten your computer BIOS password? Or just want to hack/creak someones BIOS password protected computer and get into it without BIOS password! If so, go on..
BIOS password Hack
First of all let me clear, why don't computer forget the BIOS password, time or date even if we keep it unplugged from power source for a long time. Yeah, It’s because it has got some power back up,or a battery inside it. 
You may have noticed a small coin sized battery on the mother board of your computer if you opened up your CPU cover ever!
BIOS Battery
Let's do some engineering:
1. Have a screw driver.
2. Open up your CPU cover.
3. Remove that small thing, i mean that battery. Play with it and after sometimes, keep it back on its place.
Remove BIOS Battery
4. You are done! Now start the computer and see the magic, your BIOS password has gone!

Please let me know if you have any complicity with above steps or have any suggestion!

Aug 11, 2012

How to Change Windows 7/8 User Password Without Old Password

Do you want to change your school labs PC password or change your friends or someone else? If so, then read this article..Because here i m going to show you the most easy and simple way to change windows 7 or 8 user account password without knowing old password.
Step1: Go to Start > run > cmd.
User password Change
Step2:  Type net user user name passwords.
User password Change1
Passwords Changed!

Please leave comment if you have any complicity!

e-Book Download | The Secret of Hacking 1st Edition!

The secret of hacking has revolved ! Who do you want to know about real hacking? Do you, if so..Then download this eBook and learn the greatest secrets of the hacking.
The secret of hacking
The Secret of Hacking 1st Edition
In The secrets of hacking 1st edition you should find...

1. Introduction to Real Hacking.
2. Advance Maleware Research.
3. Windows Hacking
4. Password Hacking
5. Email Hacking
6. Web Application Hacking
7. Website Defacement and Domain Hacking
8. Miscellaneous Hacking.
9. Mobile and Computer Forensic
10. VOIP and Wireless Hacking
11. Vulnerability Discovery and Penetration Testing.
12. Advance Hacking With Metasploit
13. Firewall, IDS and Honey Pot Hacking.
14. Securing Systems and Wireless.

Download link:
Thank You
Please feel free to leave your feedback.

Aug 7, 2012

How to Make A Pen Drive To Reset Windows 7 Password!

We tend to have lots of passwords at work, online and at various computers. So to save yourself from a locked out situation, I recommend that you create a password reset disk.

In this article, I will show you a very simple method to create a Windows 7 Password Reset Pen Drive. So next time you are locked out of Windows 7 at the login screen, you can plug in this USB pen drive in your computer and reset the Windows Password.
Windows7 password Reset
To create a Windows 7 Password reset pen drive, I advice to have a small capacity pen drive which is cheap and you should keep it at a safe place, but not so safe that you forget where you kept it when you need it sometime in future.


Please Follow these simple steps:

1. Insert a pen drive (backup any data if present on the pen drive and delete everything).

2. Go to Windows 7 Start Menu and type “create password reset disk” in the start menu search and launch the program “Create a password reset disk ” which will be highlighted in the search results.

3. Just follow the simple Password reset Wizard as seen below, by selecting the pen drive from a list of drives it will show you.
Windows7 password Reset1
Note: If you have not inserted a Pen Drive before launching the utility, it will not work and will give an error. If the pen drive is in place, you will see Wizard something like the images below. It will also ask for your current password to create a password reset pen drive.

4. Now you simple need to keep this drive at a safe place. You can use this in case you forget your Windows 

7 Password sometime in future, just click forgotten password on the login screen and choose the option to Reset Password after inserting this pen drive into any of the working USB ports of your computer.

NOTE: Windows will honor only the most recent Password reset disk that you have created, so in case you happen to create more than one disk, only the one which is latest will work, all other old password reset disk will not be able to reset the Windows 7 Password.

If you have not created a reset disk and have forgotten your password, you can still reset the password using some utilities like Windows Password Recovery Tool. But these processes may cost you little money if you need to buy a software to do that. So to avoid any inconvenience later, I personally recommend that you create a password reset disk.
Thank You

Please feel free to leave a comment or suggestion!

Aug 6, 2012

Easy Way to Hack WEP/WPA/ WPA2 Wi-Fi Password Using Pen Drive!

Do you live nearby someones WiFi hotspot and every time your laptop search for a internet connection and your neighbors hotspot name showing up? But you can't access and use that connection because you don't have the authorization password?
No problem, I'll show you How you can hack/creak that network and use unlimited free internet.
wifi hacking using beini

Almost every neighbor will not let you to use their Wi-Fi at free but I'll not let you to pay anything for that internet. By reading this tutorial you will be able to hack any type of WEP/ WPA/WPA2 Wi-Fi hotspot key or passwords of your neighbor.

No more paid internet! See our Wi-Fi hacking tutorials using CommView Wi-Fi, Beini iso, Linux backtrack. & Wireshark Network Analyzer.

In this tutorial I’ll show to hack any WEP/WPA/WPA2 Wi-Fi connection using a bootable USB and beini.iso!



Things should be needed:

1. A USB pen drive.
2. beini.iso file. [Download it from here].
3. UNetbootin software to make your USB bootable. [Download for Windows, Linux or Mac]


Now Follow This Few Steps (WEP):

1. Write beini.iso on your USB by UNetbootin. Set everything according to this image bellow.
WiFi Hacking1
Open in a new tab to enlarge this image
2. After finishing restart your PC and boot it from your USB.
3. If you were successful to boot up then you should see something like this. Click Minidwep-gtk.
WiFi Hacking2

4. Click OK.
WiFi Hacking3

5. Now Minipwep-gtk  program will open. Click Scan.
WiFi Hacking4

6. Select a wireless network(should have Clint) from the list. And click Lunch to start creaking process.
WiFi Hacking5

7. Sometimes its take a while according to your victim connections IVS value and password strength. So keep passions.
WiFi Hacking6

8. If it found a password, it should appear like this.
WiFi Hacking7

=> To creak WPA/WPA2 follow this instruction showing in the image bellow
WiFi Hacking8

=> Watch this video tutorial if are not getting the above manual process.


How to Install and Configure a Wireless Router

A wireless router affords laptop or portable computer users greater mobility in their home and business places. In most home networks, wireless routers are connected to a cable or DSL modem, and the router sends the signals and information that make up an Internet protocol (IP) thread to the user's computer via radio signals rather than wires.
To communicate with the wireless router, individual computers house transceivers such as an internal expansion card, a peripheral docked by USB or, in the case of laptops, a PC card or hard-wired internal device. For those accessing the Internet through a high-speed connection, a wireless router can also serve as a hardware firewall (as opposed to a software program), enabling protection from undesirable outside computers without exhausting as many system resources as traditional firewall programs.
Wireless Router Setup
Installing a Wireless Router
 1. First, turn off the PC and modem, then remove the Ethernet cable from the PC and plug it into the router's WAN port.
2. Install a second Ethernet cable between the PC's Ethernet port and one of the router's Ethernet ports.
3. Power the modem, router and then PC, waiting for the system to boot and initialize before attempting an Internet connection.

Note:  Most routers are programmed with the manufacturer's default settings, including the network's name or service set identifier (SSID), channel and sign-on password. These default settings generally may be changed using included software or an online setup utility provided by the router's manufacturer.

configuring a Wireless Router
Configure the router by entering the router configuration IP address at the URL provided, followed by the configuration utility ID and the default password. To find your router's default IP address and the default login info, refer to the owner's manual. If you own a Linksys router, a popular brand, the IP address is usually 192.168.1.1. Two other popular brands, D-Link and Netgear, generally use 192.168.0.1.

Connecting a Printer to a Wireless Router
First, check the documentation that came with your printer to determine how it's designed to connect to computers. Connections made through Ethernet, USB and (obsolescent) parallel ports are common, but newer printers are sometimes wireless-enabled and allow you to simply add them to your wireless network.

Refer to the owner's manual for your particular wireless router. Inside, find the default IP address and the default login info. If you own a Linksys router, the IP address is usually 192.168.1.1. Other popular brands D-Link and Netgear generally use 192.168.0.1.

Connecting Between Two Wireless Routers
 Bridging two wireless routers involves configuring both networks manually. Visit each network location - which should be recognized by your computer automatically - and configure the appropriate Service Set Identifier (SSID), Wireless Encryption Protocol (WEP) or WiFi Protected Access (WPA) key and authentication information. Make sure you know the SSID and WEP or WPA key ahead of time.


Please feel free to post your problem, suggestion or opinion!

Aug 2, 2012

Increase Virtual RAM and Make Your System Faster

Is your computer running slowly because of your RAM? If so, then i have a suggestion for you. You can increase your RAM virtually on your system. No physical configuration changes will be needed.
RAM
Follow the steps given below :

1. Hold down the 'Windows' Key and Press the 'Pause/Break' button at the top right of your keyboard.
Another way is Right-Clicking 'My Computer' and then Select 'Properties'.

2. Click on the 'Advanced' tab.
PC properties
3. Under 'Performance', click 'Settings'.
performance tab
4. Then click the 'Advanced' tab on the button that pops up.

5. Under 'Virtual Memory' at the bottom, click 'Change'.
virtual memory
6. Check the 'Custom Size' option.

7. For the initial size (depending on your HD space), type in anywhere from 1000-1500 (although I use 4000), and for the Maximum size type in anywhere from 2000-2500 (although I use 6000).
virtual memory
8. Click 'Set', and then exit out of all of the windows.

9. Finally, Restart your computer.

Now your system should have faster performance then ever before and 1-2GB of Virtual RAM.
Please feel free to post a comment or if you have a question or suggestion!

Aug 1, 2012

Simple Trick to Speed-Up The PC Start-Up Performance!

So many computer users claimed their computer is taking so much time to starting up. There could be so many reasons why this is happening. The major one of theme are the start-up programs. Several start-up programs at start-up list takes a major role to slow-down a clean PC. so removing unnecessary programs from start-up list will increase your PC start up performance.
Speed up
What really the start-up programs are?
start-up programs are nothing but the programs(installed programs such as: yahoo messenger, G talk, Skype, e.t.c) which start automatically while the system starts.

How to remove unnecessary programs from start-up list?
1. Go to run (use Home+R) and type msconfig
2. Switch to Startup tab and uncheck the programs that you think its not necessary to start automatically at start-up,and click apply.
startup list
You have done it, now restart your PC and see the performance.
thank you
Feel free to comment or leave a question!