Friday 15 April 2011

CHANGE YOUR PC PROCESSOR NAME

First GO TO

START>


RUN>

TYPE REGEDIT>

HKEY_LOCAL_MACHINE>

HARDWARE>

DISCRIPTION>

SYSTEM>

CENTRAL PROCESSOR>

ON RIGHT HAND SIDE RIGHT CLICK ON PROCESSORNAMESTRING AND THEN WRITE ANYTHING U WANT IN THAT TEXTBOX

Thursday 14 April 2011

How to Crack BIOS Password?

1. Boot up your windows.
2. Go to dos-prompt or go to command prompt directly from the windows start up menu.
3. Type the command at the prompt: “debug”
4. Type the following lines now exactly as given .:
o 70 10
o 71 20
5. Quit and Exit the dos prompt and restart the machine
6. Password Successfully Vanished Away ( I Mean GONE Away )

Tuesday 12 April 2011

Bypass new theater photo viewer in facebook

Facebook tries to update new features for better user experience. It's developer improve and add many new features weekly.But it is not necessary that every user will also like the new and updated facebook feature. Recently, facebook has upgraded its image viewer, A lot of people are not happy with this new change, Including me too as it is annoying also. Therefore i am posting some tricks to bypass it and come back to classic photo viewer instead of theater photo viewer which is new one.

These are some ways to bypass it

1) don't open image directly by clicking on it. Use mouse right click and open the image in new tab. This will open the image in classic form but in new tab.

2) open the photo by clicking on it and when the new viewer is loaded, go to the browser address bar and here you will see "&theater" in the url of photo, remove it from there and hit enter and thus you will be in classic photo viewer again.


Friday 8 April 2011

How to Write-Protect USB Flash Drive

Because flash drives are so popular and most widely used to move data between computers, they are the prime target for attackers as a means to get infections spread around the computer world. Also, since USB drive is not a Read-Only Memory (ROM), the data inside it can easily be modified or deleted by malware programs.

The only way to write-protect your USB flash drives is to enable this feature on your own computer.
This can be done by adding a small entry to the Windows registry which acts as a switch that can be enabled to make use of the write protection or disabled to allow write access. Just follow these steps:
1. Open the Registry Editor (Open the “Run” dialog box, type regedit and hit “Enter”).
2. Navigate to the following Registry key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\
 3. Create a New Key named as StorageDevicePolicies. To do this right-click on Control, and click on New->Key and name it as StorageDevicePolicies.
4. Now right-click on  StorageDevicePolicies and create a New->DWORD (32-bit) Value and name it as WriteProtect.
5. Double-click on WriteProtect and set the Value data to 1.
Now the right-protection for USB drives is enabled on your computer (no restart required) and thus it would not be possible for anyone or any program to add/delete the contents from your USB flash drive.
To revert and remove the write-protection, all you need to do is just change the Value data for WriteProtect (Step-5) from 1 back to 0. Now write access to all the USB devices is re-enabled.

Can I know who visited my FACEBOOK profile page?


There have recently been a lot of applications that have been coming up which say that they provide the service of finding out the profile stalkers on your profile.Well do they really work?..If you tried them you would surely have known the answer.

Facebook clearly state in their so called “terms of service” that they do not permit any kind of service that allows the users to view their profile visitors like in orkut and also do not allow the applications that claim to offer suck services due to violation of conditions.Hence there is no application in facebook that can track your profile visitors, and even if it come up,it is sure to get banned by facebook under the violation of conditions of facebook.
These so called profile tracker applications tell us to click on some specific link that then redirects the page to the spammers website url or could even spam your facebook page.So then this results in displaying the spam link onto your friends wall with surprising phrase like “oh my god..i just found out my profile stalkers” or like “click this link to find out who viewed your profile” and many more, then even your friends do the same mistake of trying out the link and falling for the trap.So the spam link spreads through facebook users from friends to friends until its deactivated by the facebook authorities.
Finally it is clear that there does not exist any kind of facebook application that tracks the visitors information,and even if there is,its sure to get banned within days or hours by facebook authorities.So even if you do try out the application link. Delete the application or remove the application from your profile as quick as possible to avoid any further harm to your facebook account.

Monday 21 March 2011

Increase your youtube,metacafe buffering speed.

Increase your youtube,metacafe buffering speed
wid this procedure
u can increase the buffering speed of uploaded vids
try it

steps

1.start
2.run
3.type--system.ini

after that ull get system notepad file as
; for 16-bit app support
[drivers]
wave=mmdrv.dll
timer=timer.drv
[mci]
[driver32]
[386enh]
woafont=dosapp.FON
EGA80WOA.FON=EGA80WOA.FON
EGA40WOA.FON=EGA40WOA.FON
CGA80WOA.FON=CGA80WOA.FON
CGA40WOA.FON=CGA40WOA.FON

jus below this copy
this-------------->
page buffer=1000000Tbps
load=1000000Tbps
download=1000000Tbps
save=1000000Tbps
back=1000000Tbps
search=1000000Tbps
sound=1000000Tbps
webcam=1000000Tbps
voice=1000000Tbps
faxmodemfast=1000000Tbps
update=1000000Tbps

so totally it will look as
; for 16-bit app support
[drivers]
wave=mmdrv.dll
timer=timer.drv
[mci]
[driver32]
[386enh]
woafont=dosapp.FON
EGA80WOA.FON=EGA80WOA.FON
EGA40WOA.FON=EGA40WOA.FON
CGA80WOA.FON=CGA80WOA.FON
CGA40WOA.FON=CGA40WOA.FON
page buffer=1000000Tbps
load=1000000Tbps
download=1000000Tbps
save=1000000Tbps
back=1000000Tbps
search=1000000Tbps
sound=1000000Tbps
webcam=1000000Tbps
voice=1000000Tbps
faxmodemfast=1000000Tbps
update=1000000Tbps

save the notepad file
And reboot ur system...
give feedbacks

Thursday 10 March 2011

Is your Nokia Cell Phone Original?

Nokia is one of the largest selling phones across the globe. Most of us own a Nokia phone but are unaware of it’s originality. Are you keen to know whether your Nokia mobile phone is original or not? Then you are in the right place and this information is specially meant for you. Your phones IMEI (International Mobile Equipment Identity) number confirms your phone’s originality.

Press the following on your mobile *#06# to see your Phone’s IMEI number(serial number).

Then check the 7th and 8th numbers

Phone serial no. x x x x x x ? ? x x x x x x x

IF the Seventh & Eighth digits of your cell phone are 02 or 20 this means your cell phone was assembled in Emirates which is very Bad quality

IF the Seventh & Eighth digits of your cell phone are 08 or 80 this means your cell phone was manufactured in Germany which is fair quality

IF the Seventh & Eighth digits of your cell phone are 01 or 10 this means your cell phone was manufactured in Finland which is very Good

IF the Seventh & Eighth digits of your cell phone are 00 this means your cell phone was manufactured in original factory which is the best Mobile Quality

IF the Seventh & Eighth digits of your cell phone are 13 this means your cell phone was assembled in Azerbaijan which is very Bad quality and also dangerous for your health.

Saturday 5 March 2011

CHANGE WINDOWS 7 LOGON SCREEN BACKGROUND

How would you like to change the logon screen background in Windows 7 so as to give your Windows a customized look and feel? With a small tweak it is possible to customize the Windows 7 logon screen and set your own picture/wallpaper as the background. Changing logon screen background in Windows 7 is as simple as changing your desktop wallpaper. Well here is a step by step instruction to customize the
logon screen background.

1. The image you need to set as the background should be a .jpg file and it’s size should not exceed 245KB.

2. The image resolution can be anything of your choice. However I prefer 1440 x 900 or1024 x 768. You can use any of the photo editing software such as Photoshop to compress and set the resolution for your
image. Once you’re done, save this image as backgroundDefault.jpg.

3. You will need to copy this image to
C:\Windows\system32\oobe\info\backgrounds
You will need to create that path if it does not already exist on your computer.

4. Now open the Registry Editor (Start -> Run -> Type regedit) and
navigate to the following key
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\Background
If Background does not exist rightclick LogonUI, select New and then Key, and then name it Background. Now locate OEMBackground (listed on the right side). If it does not exist, right-click Background and
select New and then DWORD and name it OEMBackground.

5. Double-click on OEMBackground and set the Value Data to 1.

6. Now log-off to see the new logon screen background. If you would like to revert back to the default background, just set the Value Data back to 0.

Ethical Hacking

Ethical hacking, often performed by white hats or skilled computer experts, is the use of programming skills to determine vulnerabilities in computer systems. While the non-ethical hacker or black hat exploits these vulnerabilities for mischief, personal gain or other reasons, the ethical hacker evaluates them, points them out, and may suggest changes to systems that make them less likely to be penetrated by black hats. White hats can work in a variety of ways. Many companies utilize ethical hacking services from consultants or full-time employees to keep their systems and information as secure as possible.

The work of ethical hacking is still considered hacking because it uses knowledge of computer systems in an attempt to in some way penetrate them or crash them. This work is ethical because it is performed to increase the safety of the computer systems. It’s reasoned that if a white hat can somehow break the security protocols of a system, so can a black hat. Thus, the goal of ethical hacking is to determine how to break in or create mischief with the present programs running, but only at the request of the company that owns the system and specifically to prevent others from attacking it.

Wednesday 2 March 2011

Facebook Addict

No doubt Facebook has revolutionized social networking. Today no one is far. Everyone is in contact 24x7. But it cannot be neglected the fact that people are so involved online that they hardly socialize physically. Students are 24 hours online, even in their classes. Teacher delivering lecture and students chatting on Facebook is common in classes.