Keep Window Healthy

Today we are posting ways to keep your window safe and free from errors . Tips . Keep at least 10 GB of free space in your c: drive. Clear junk files on a regular .....

Windowns Heathy

Wanna be hacker....?

In the beginning we all asked ourselves a few questions... Where do I start? Where do I go to learn? What do I need to Hack?...

hackers

Downloading trick for Ebooks..

This is Abhishek nehra. I just observe that in colleges (special in engineering colleges) there is a big problems on books as many of guys have to buy a book of the cost they do not want to.But there is a solution and that is ......

Free

Linux Step by Step ...

Now a days Linux became a main stream operating system. Many users are now start using it. But as we know it's like a platform build for advance users so we face a little difficulty in using it. ......

Linux

Remote File Inclusion ...

Remote file inclusion is basically a one of the most common vulnerability found in web application. This type of vulnerability allows the Hacker or attacker to add a remote file on the web server. If the attacker gets successful in performing.....

Omnis dolor repellendus

Spread your rat...

At Any Thought of a virus who can help you? Not even one? ok!! I will tell you about one , some may know it in advance but......

rat

Playing games without graphics or low graphics..

Many of us has a desire of playing PC games at high-quality. But some of us can’t fulfill our desire because of the non-availability of Graphics card or we can’t afford. Today, maximum pc games demand graphic card

Harum quidem rerum
  • Reiciendis voluptatibus maiores
  • Asumenda omnis dolor
  • Voluptates repudiandae sint
  • Necessitatibus saepe eveniet
  • Omnis dolor repellendus
  • Pomnis voluptas assumenda
  • Harum quidem rerum
Showing posts with label featured. Show all posts
Showing posts with label featured. Show all posts

Saturday, February 12, 2011

Improve your laptops battery life

How many times have you found yourself with a dead laptop battery and no outlet in sight? I know I have, but it’s only happened to me on a few occasions thanks to these tips. You can mitigate being left dry without power to run your laptop by following the easy to implement steps below.
Some of the tips below may seem insignificant with regards to the amount of battery saved, however combined these tips could add minutes to even half an hour of additional battery life so make sure to use them in unison.

1. Reduce Screen Brightness

One of the simplest and most effective ways to reduce the amount of electricity consumed by your notebook is to reduce the brightness of the screen. This can be accomplished in several ways: You can set the brightness manually by using the buttons found on the keyboard that will control the brightness of the screen.
The second option would be to use the built-in power control options in Windows to automatically adjust the brightness of the screen based on use. In Windows 7 you have the option to automatically turn off the display after “x” number of minutes without use. If automatically turning off the display doesn’t work for you then you can set the display to automatically dim to the lowest setting after “x” number of minutes without use.
The third option which is found in the same control panel window is to automatically adjust the screen’s brightness based on whether or not the notebook is running on battery or plugged in.

2. Disable Desktop Background Slideshows

In Windows 7 Microsoft introduced a slew of new features that improve the overall look and feel of the Windows environment. Among those new features is the ability to have rotating wallpapers. Although extremely appealing this little feature consumes a bit of power while running in the background. You have to options to mitigate the power consumption of this feature.
You can increase the time interval between wallpaper changes from 30 minutes (default) to one or two hours. You can also disable the feature altogether by visiting the Advanced Power Settings in Windows 7.

3. Turn Off Unnecessary Radios

How often do you actually use your Bluetooth radio? Most laptops today ship with Wi-Fi and Bluetooth radios, some even have 3G/EVDO and WiMAX radios. If you are running on battery while working on your laptop and you really don’t need the internet, why connect to the internet? Connecting to the internet requires that you use a good amount of electricity that could be saved to extend the battery on your laptop.
Ok, so you do need the internet, but what about Bluetooth? Unless you are syncing your BlackBerry wirelessly or using a Bluetooth peripheral there is no need to keep the Bluetooth radio on, which by the way, is also consuming electricity.
Both radios can be turned off by physical switch or button on your laptop. If you wish to turn one off, but not the other you will have to go to your computer’s Control Panel to turn the radio off independently.

4. Work on One Application

Believe or not, Apple does have a good point about multi-tasking and battery consumtion, just ask an Android or Palm Web OS user. The same applies to the PC, the more apps/programs you run on your laptop the more power your laptop will consume.
Unless you are using a specific application while trying to complete a task, close it. There is no need to have Outlook running in the background checking your messages every five minutes if you are trying to complete a proposal before your battery dies. Close applications you are not using and your battery will last longer.

5. Disable Background Programs

Even if you run one application at a time as suggested above, there are several applications and services that are running in the background that eat up the valuable battery life you are trying to conserve. An example of background applications that may be running in the background are listed below. I have also provided a link to a recently published article that lists some of the most common services that can be safely disabled.
Background Applications
    • ZumoDrive • SugarSync • PandoraOne • DropBox • OneNote Side Note
List of services that can be safely disabled – Article

6. Disable Automatic Send/Receive

Programs like Outlook will automatically look for new messages every 30 minutes; this send/receive of information requires resources that will consume a small amount of battery life. The default setting for Outlook is about 30 minutes, but what if you’ve changed that setting to every 5 minutes or worse every minute?
All email clients have this functionality so you can extend the amount of time between email checks or disable them all together. The option is yours.

7. Defragment Your Hard Drive

How long does it take to locate a book in a bookshelf that is not organized alphabetically? Now how long does it take to locate that same book when it is organized alphabetically? A lot faster. The same applies to your computer’s hard drive; if the files are fragmented (scattered) all over your computer will take a longer time locating files.
If your computer were defragmented (organized) then files would be found in a snap. All this means is that if your hard drive is fragmented, the hard drive will have to work harder to locate those files which means that more power will be consumed.
Want to optimize your hard drive while saving battery life? Defragment your hard drive. Windows ships with a built-in defragmentation application, so put it to good use and schedule defragmentation a least once a week.

8. Remove Disc Media from Drives

Believe it or not, each time you open My Computer to browse the contents of your computer, the CD/DVD drive spins if a disc is inserted into the drive. It will also spin when you boot up and shut down the computer. All of these spins require power to move the small motor the spins the drive. To squeeze a little more battery life out of your laptop, consider removing any removable media that could “spin” while using your laptop.

9. Hibernate Don’t Sleep

If you need to turn your computer off, but want instant access to it you may be tempted to put it to Sleep, however when your laptop is in Sleep mode it is placed in a low power state, meaning that you are still consuming battery power. What if you meant to put the computer down for 30 minutes, but got caught up with something else and came back to it four hours later only to find that the battery died?
You can keep this from happening and save battery life by placing your computer in a Hibernate state rather than Sleep. Hibernate saves your laptop’s current state onto the hard drive and turns off the computer. This means there will be no power consumption and you can boot right up.

10. Take Care of Your Battery

Long gone are the days of having to make sure you completely discharged the batter before recharging. All you have to worry about is that you make sure you store your battery when not in use. If you plan to leave your laptop plugged in for more than a couple of weeks, you might want to consider removing the battery and storing it in a dry location.
Note: Whenever you remove your battery make sure that the battery contacts are clean and free of any dust or gunk that builds over time.
These tips will help maintain the battery’s charge capacity and extend its life. Do you have any other tips to help squeeze more battery life out of a laptop? Please post them below.
Posted by Unknown 0 comments

Google Pagerank


Google Pagerank

Here is a very cool trick (Found by Jimmy) to determine Google Pagerank on websites by modifying your search query URL on Google Search. The best part about this is that it returns the output in plain text, making it easier for developers to get this information without long scripts. This means you could write a Sphider Mod to get better search results or use it within a custom program to see how popular (or important) a website is on the internet.



Get the Pagerank:
To get pagerank, type in: http://www.google.com/search?client=navclient-auto&ch=656688533331624&features=Rank&q=info:google.com

To change the website in the request, simply change “info:google.com” to “info:” and the website domain of your choice (I.E. “info:thetechcorner.net”)

Be sure to change the value of “ch” (656688533331624) to a new number every time you request the page or else Google will deny the request to the server.
Note: Not all numbers will work, but keep trying random numbers until it works. There might be a reason for this number and it may have to do with the length of the url.

Reading the Output:
When you request the pagerank of twitter.com, you should get the return of: Rank_1:1:9
The last number (which is 9) would be the pagerank of the site. I don’t know what the other two numbers mean in front of that (maybe the version of the system??).

If you do not know how to write a script to find the pagerank from a PHP program, there is a great one here: DevPapers Google PageRank
Posted by Unknown 0 comments

Tuesday, February 1, 2011

All About Keyloggers - The Complete FAQ


A keylogger sometimes called a spying software is a small program which is used to monitor a local or a Remote PC, Keyloggers now a days are so easy to use that a person with even a basic knowledge of computers can use keylogger.Once a keylogger is installed in your computer it can monitor each and every keystroke typed on your computer, thus you can see how dangerous a keylogger can be.
Types of Keylogger


There are two types of Keyloggers:

1.Hardware keylogger
2.Software keylogger

Hardware keyloggers are rarely used now a days since you can monitor a Remote computer, Software keyloggers are the most widely used keyloggers as some of them support remote installaiton which means that you can monitor any computer anywhere in the World.


Can the victim detect it's presence once keylogger is installed in his/her computer?

Well it's really difficult for the victim to detect keylogger's presence as it runs in complete stealth mode, It hides it self from task manager, startup etc

Can I the victim trace you back?

Once the keylogger is installed, I think it's almost impossible for the victim to trace you back

How can I protect my self from keylogger?

A simple keylogger can be detected by even a lame antivirus, but sometimes the attacker can use methods like Crypting,Binding,Hexing etc, that make it harder for the Antivirus to detect the keylogger. So to counter that you should use a piece of software called sandboxie, Sandboxie runs the choosen computer program in an Isolated space so if the file you receive is a keylogger, You need no to worry because it won't affect your other programs, Firefox users can use the free version of keyscrambler which encrypts each and every keystrokes you type, so even if a keylogger is installed in your computer, You need not to worry as the attacker will receive the encrypted keystroke


Which Keylogger is the best?

With my experience of more than 4 years in the field of Ethical Hacking and security I suggest only two keyloggers which I think are best and have a comparatively low antivirus detection rate:

1.Sniperspy
2.Winspy


How do I find if a file is binded with a keylogger?

Keylogger can be binded with almost any file so how do you know if the file is binded?, You can use Bintext or Hex editor to find out, But Bintext and Hex editing method do not work effectively if the server is crypted so alternatively there is a great piece of software named asas "Resource hacker" that can tell you if the file is binded or not

Hope you had enjoyed reading the article.If you have any questions feel free to ask.
Posted by Unknown 0 comments

Confused about perfect books? Try These Ones.

There are many people who always gotta confused between which book they should prefer according to their subject.
So here is a list of top books in each subjects which I can include.
If your subject is not in this post then let me know about this. I will surely feel
happy to help you.
The order of books are set by their raking so choose the best one which is easily available to you. 
To Get a trick to download these books you may refers to my previous post on ebook download tricks. Click Here To Go.
I will continuously post regarding some other subjects.
For Algorithms and data structure : - >
1. Introduction to Algorithms   by Thomas H. Cormen, Charles E. Leiserson,
     Ronald L. Rivest, Clifford Stein

2. Algorithms in C++, Parts 1-4: Fundamentals, Data Structure, Sorting,
     Searching by Robert Sedgewick

3. Art of Computer Programming, Volume 1: Fundamental Algorithms
     by Donald E. Knuth 

For C and c++ Programming  
1. C++ Without Fear
2. Practical C++ Programming
3. Effective C++ : 55 Specific Ways to Improve Your Programs and Designs  
4. More Effective C++: 35 New Ways to Improve Your Programs and Designs.
5.The C++ Programming Language
6. Schaum's Outline of Programming with C++
7.The C Programming Language by Brian W. Kernighan, Dennis M. Ritchie Highly recommended
8. C Programming: A Modern Approach by K.N. King Highly recommended
9. C for Dummies Vol. I by Dan Gookin

The Python books  :->
1. Learning Python By: Mark Lutz
2. Python For Dummies By: Stef Maruch, Aahz Maruch
3. Beginning Python: From Novice to Professional By: Magnus Lie Hetland
4. Dive Into Python By: Mark Pilgrim 
5. Python in a Nutshell By: Alex Martelli
6. Python Essential Reference By: David M. Beazley

For Perl and Java :->

1. Thinking in Java, by Bruce Eckel

2. Beginning Java 2, by Ivor Horton

3.  For More Detail refers to this site http://www.javacoffeebreak.com/books/index.html

4. Object Oriented Perl (1st edition), by Damian Conway

For Operating Systems :->
1. Operating Systems: A Systematic View , by William S. Davis ,T.M. Rajkumar 
2. Operating Systems  , by Jean Bacon and Tim Harri 
3. Operating Systems: Internals and Design Principles, Fifth Edition
4.  Operating Systems Design and Implementation , 

 Database Designing :->

1. Access Database Design & Programming

2. ADO.NET in a Nutshell

3. ASP.NET in a Nutshell

4. Mastering Visual Basic .NET Database Programming

5. Java Oracle Database Development

 For Web Designing :-> 

1. CSS Web Site Design by Eric A. Meyer

2. High Performance Web Sites: Essential Knowledge for Frontend Developers by Steve Souders
3. PHP 6 and MySQL 5 for Dynamic Web Sites by Larry Ullman
4. Don’t Make Me Think!: A Common Sense Approach to Web Usability by Steve Krug
5. JavaScript: The Definitive Guide by David Flanagan
6. Learning jQuery 1.3 by Jonathan Chaffer and Karl Swedberg
7. Adobe Flash CS3 Professional Hands-On Training by Todd Perkins
8. Drupal 6 Themes by Ric Shreves
9. Even Faster Web Sites by Steve Souders
10. PHP 5 Advanced by Larry Ullman

 For Microprocessors :->

1. Microprocessor Architecture, Programming, and Applications with the 8085 (4th Edition)

2. 8086 Microprocessor: Programming and Interfacing the PC (Paperback)  Kenneth J Ayala Kennth J Ayala

3.The 8086 Microprocessor: Architecture, Software, and Interfacing Techniques by Walter A Triebel

4.Computer Organization and Design, Fourth Edition: The Hardware/Software Interface (The Morgan Kaufmann Series in Computer Architecture and Design)

5. MICROPROCESSOR 8086 : ARCHITECTURE, PROGRAMMING AND INTERFACING, By mathur

For Network and Security :->1.Information Security Roles & Responsibilities Made Easy, Version 2 by Charles Cresson Wood

2. Hardening Network Security by John Mallery, et al

3. Hacking Exposed: Network Security Secrets & Solutions, 3/e by Stuart McClure

4. Hacking Linux Exposed by James Lee
  

For Hacking :->
1. hacking Complete package
   Hacking for Dummies
   Hacking Intranet Websites
   Hacking Techniques
   Hacking The Cable Modem
   Hacking The Linux
   Hacking Web Applications
   Hacking Windows XP
   Hacking PSP
   The Art of Deception
   The Art of Intrusion
   Network Security Hacks
   Paypal Hacks
   PC Hacks
   Simple Hacks
   The Database Hacker Handbook
   Wireless Hacking
   Wireless Hacks
   Bluetooth Hacking
   Ethical Hacking
   Google Hacks
   Hack & Crack
   Hack Attacks Testing
   Hack IT
   Hack Proofing Your Network 1st
   Hack Proofing Your Network 2nd
   Hack Proofing Your Web Server
   Hack The Net
   Hack Xbox 360
   Hackers Black Book
   Hacking Firewalls And Networks
   Hacking a Coke Machine
   Hacking and Network Defense
   Wireless Network Hacks & Mods 
2.Rapidshare Links :->
1- http://rapidshare.com/files/118027617/CEH_Official_Certified_Ethical_Hacker_Review_Guide_Exam_312-050___2007_.pdf
2-http://rapidshare.com/files/118896077/Hacking_into_Computer_Systems11.pdf
3-http://rapidshare.com/files/119089966/CEH_v5_Module_08_Denial_of_Service.pdf
4-http://rapidshare.com/files/119133768/For.Dummies.Hacking.for.Dummies.pdf
5-http://rapidshare.com/files/119896220/CEH_v5_Module_07_Sniffers.pdf
6-http://rapidshare.com/files/119901767/CEH_v5_Module_12_Web_Application_Vulnerabilities.pdf
7-http://rapidshare.com/files/119901768/CEH_v5_Module_06_Trojans_and_Backdoors.pdf
8-http://rapidshare.com/files/119919879/Hacking_Guide_v3.1_Breaking_into_Computer_networks_from_internet.pdf
9-http://rapidshare.com/files/123599392/CEH_v5_Module_16_Virus_and_Worms.pdf
10-http://rapidshare.com/files/119865862/CCSP_Quick_Reference_Sheets.pdf
 

Posted by Unknown 0 comments

Tuesday, January 25, 2011

Now iTs turn to Downloading Tricks - 3 (For Movies and videos without torrents)

In my earlier post I show you how to download with torrents. You can download anything from there.
But many times a problem occurs that downloading speed through torrents very slow.
So I am writing this post for the users who do not want to download movies through torrents.
There are some recommendation of software.
 (1 is only for window users).
1.Internet Download manager(You can found a trial version Here)(For cracked version I will show you in my next post)
2.For Download Youtube videos firefox users can download  youtubedownload addon(Click Here For Link).
3.A another firefox add on for downloading is Downloadthemall(Link)

(I prefer mozilla firefox for download because most of the users uses it but IDM will work on any browser.)
 Now I will Show you How IDM works :->

Download and install it in your system.
Now you have to integrate it with the browser you want.
I have been using Firefox so I will use screen shots of firefox. You can ask any question regarding any other browser.
Just watch how idm gives you downloading permission to download any streaming video.




This is a YouTube Video. You can also download any streaming video.
Now its turn to Movies :->
Links for Good Download site
1.http://www.onlinemoviesfreee.com
2.http://www.mediafiremovies.com
3.http://www.onlinemovies4u.com
If You have good Downloading speed then you should go for 1st link.
And if you want to download a movie in less memory size(DvD RiP for approx. 400-500 mb) but the problem is that it downloads the movies in parts.
So it up to you what you choose.
I will show Onlinmoviesfreee downloading tricks here and mediafire in next post as this post may be larg.
Let us assume you have to download WWE Monday night raw of 24 jan 2011.
Now On page of site you may see this link or simply you can search for wwe raw.
Click on Download button which will take you to the next page.
This next page will look something like this :->



Here is the different links from which you can download wwe raw.
I will prefer to use cramit and movshare as these both have the resume facility.
After clicking any Link (Suppose you choose Movshare)

For Download Through cramit:->







Through cramit you can download using Download manager or you can download using Browsers default downloads.
You can also choose any download links from the above site but there very less sites which gave you resume facility in free downloading.
Enjoy with this and if any question you can ask me Here or My mail ID is
avinehrajat@gmail.com
rit2009057@iiita.ac.in
Posted by Unknown 0 comments

Friday, January 21, 2011

Help Needed

Hi friends if you are a Hacker, System Expert, Networking Expert or anything else and want to share your knowledge with others here is the platform you needed to fulfil your wish to help others.

Your posts are published hear with your name and if you too own a blog than share your link with others hear



What are you thinking it the time to make a decision.................

Still thinking....................


I am waiting bro.................



Are you ready to give your contribution to this project...............




If yes then

Just send your email id to me with your name and place

Just do it by clicking hear or on the mail id


My mail id is

wetsat1@gmail.com
Posted by Unknown 0 comments

Wednesday, January 19, 2011

Keep Your Window Healthy 1


Today we are posting whys to keep your window safe and free from errors

Tips
  • Keep at least 10 GB of free space in your c: drive.
  • Clear junk files on a regular basis.
  • keep your anti-virus up to date.
  • Use some window tweak software.
  • Use registry cleaner to keep your registry clean.
  • Use some good software listed below.
Software list
  • Firefox:- firefox is one of the best web browser which protect your security always. You can use some good add-on to optimise it hear is the list of them


Download Statusbar
Download Statusbar

Monitor downloads from within your browser
This handy browser extension lets you control and keep track of your downloads right from the Firefox browser. Rather than opening a separate download window, a small bar at the bottom of your browser displays data about your ongoing downloads, including speed and time until completion. Right-clicking brings up a menu that lets you pause or cancel a download, or launch an installer before deleting it from your system. Free. Download It Now

Fire Tune
FireTune

Speed up Firefox
FireTune speeds up Firefox by helping you quickly and easily tweak the browser's Registry, so it's optimized for your system, whether you run a smoking Core i7 rig with a blistering-fast broadband connection or a decade-old notebook that connects via dialup. Click to create a backup of your configuration, choose your combination of fast or slow computer and fast or slow connection, and click the "Tune it!" button. Relaunch Firefox and your browser will be optimized for maximum performance on your system. Free. Download It Now

Foxmarks
Foxmarks

Get your bookmarks anywhere
This free browser extension backs up your Firefox link list on the Web and syncs it automatically with any Firefox browser you use that has the extension installed. Pointing your cell phone browser to my.foxmarks.com gets you easy access to all your essential links. You could use a flash drive and carry Portable Firefox with you, but if all you need is access to your links on another PC or your phone, Foxmarks is a simpler solution. Free. Download It Now

Read It Later
Read It Later

Save Web pages to check out later
Read It Later lets you easily mark Web pages for later perusal. It adds a book icon to the upper-right corner of your browser, where your reading list is located. To add a page you want to check out later, just click the check icon next to the bookmark star on the right side of the page’s URL field. (You can also save the pages for off-line viewing.) It’s a good way to make sure you don't miss something important, without cluttering up your bookmarks folder with items you’ll look at only once. Pair it with Foxmarks and access your reading list on your phone, so you'll always have something constructive or enjoyable to do during downtime or on your commute. Free. Download It Now

Tab Scope
Tab Scope

Don’t get lost in the tab jungle
If you multi-task like mad, it's common to wind up with at least a dozen open pages, making finding your way back to a specific tab difficult. Of course, you could click through each tab until you stumble on the right one, or you could add the Tab Scope Firefox extension. It displays an image of a given tab whenever you mouse over it in the tool-bar. You can even adjust the size of the image and reload a page without even clicking back into the page. Free. Download It Now
Posted by Unknown 0 comments