tips for hacking, Google tips,computer terms, spyware ,administrator hack,types of viruses,dvd movie backup,MICROSOFT, articles .

*******************************************WELCOME*************************************************

Welcome to all the people to COMPUTER MANIA , those who want to grow interest in computer world and become a perfect computer operator with having good knowledge of hacking,viruses ,worms,computer functinality,softwares,solution of many pc problems and many more.....

spott

Spottt
Spottt

Google search

8/26/08

Airtel Hack for free internet

these are all the tricks available !!working too!
It cannot go beyond this!!
This write up will explain to you how to speed up your Airtel Broadband connection / solve other problems regarding connection failures due to closed ports.Although I use Airtel and a Beetel 220 BX modem as my basis for this write up, the same rules can be applied to others as well. So lets get started.
First thing make sure your DSL modem is on. Fire up your browser. Type http://192.168.1.1 as the address with the following Username/Password -
Username : admin Password : password Note : These are case sensitive. Make sure all are typed in lowercase.
Click on Advanced Setup -> NAT in the page that loads.
If you do not see these options try entering http://192.168.1.1/main.html as the address.
Some routers/modems deliberately try to prevent users from accessing these options.
On the NAT virtual servers page click the add button.
Now add the port number that you wish to open up.
You can even open up a range of ports using the add button.
~cheers~
You need a PC or a Laptop and the required connectivity tools ,ie.,Serial/USB cable OR Infrared Device OR Bluetooth dongle
1) Activate Airtel Live! ( It’s FREE so no probs)
2) Create TWO Airtel gprs data accounts (yep TWO) and select theFIRST as the active profile.
3) Connect your mobile to the PC (or Laptop) and install the driver foryour mobile’s modem.
4) Create a new dial-up connection using the NEW CONNECTIONWIZARD as followsConnecting Device : Your mobile’s modemISP Name : Airtel (or anything you like)Phone Number : *99***2# / Try 99***1Username and Password : blank
5) Configure your browser and download manager to use the proxy100.1.200.99 and port 8080.( My advice is to use Opera since youcan browse both wap and regular websites)
6) Connect to the dial-up account. You will be connected at 115.2kbps (but remember, that is a bad joke).
7) Pick up your mobile and try to access any site. You will get “AccessDenied…”(except for Airtel Live!). IT DOES NOT MATTER.Keep the mobile down.
8 ) On the PC ( or Laptop) open your browser, enter any address ,press ENTER and…….WAIT
9) After a few seconds the page will start to load and you have theWHOLE internet at your disposal. ***************************************************************************************************************
Alternate
For All Airtel UsersRequirements:
1. Airtel live (available 4 free)
2. Nokia series60 handset eg 6600,6630,n series,7610,6670 etc
3. Opera browser
4. mobileProcedure: -
1. Go to ur connection settings and make a new internet profile using the default settings of airtel live. name that new profile as nething(for eg masala); change the home page of that profile to nething u like for eg www.google.com.
2. Go to ur Opera browser and set the default connection as AIRTEL LIVE. this is the original settings u received thru airtel.
3. Go to the services(in n6600) and Web(N6630) and change the default profile for connection as masala (newer one).**Note: always make sure that ur access point is airtelfun.com
Apply:-
1. Open Opera and u will see that homepage of Airtel Live is opened. Minimize the application.
2. Now open web using the duplicate Profile and u will see that two gprs connections will work simultaneously and at the web or the services page it will show "Unable to connect" or any error. well thats the signal of ur success.
3. Simply go on the Opera with web on and open any site u want for free. No Charges No nothing.U can also use it through ur computer..........
someone said dis too
The main principle behind this is we hav 2 fool the bsnl techies 2 activate portal and thus get gprs activated / get "G" signal on ur cell as bsnl portal (wap.cellone.in) needs "gprs signal on ur cel (whether gprs is formaly activated/registerd or not (by my method )i dont know)
NORMALLY THEY DONT DO THAT INSPITE OF THE FACT THAT THEY SHOULD ACTIVATE GPRS SIGNAL SERVICE FOR PORTAL!!! AND THEY WILL GIVE U NO OF REASONS---- ---THAT portal is message based , so go to cellone icon in menu and use that sms based portal (what the f**k) ---THAT portal service will be activated when u will activate gprs by filling up form and registering at nearest CCN!! ---THAT ur handset has some problems (if u say that "G" signal is not present) ----etc,etc!!
U HAVE 2 ACTIVATE PORTAL FIRST WHICH IS FREE AND U CAN EAT UP CC'S FOR THIS REASON!! SO WHAT U HAV 2 DO IS--
1) SEND PORTAL to 3733 AND CONFIRMATION SHD COME WITH 5 MIN AT-MAXIMM !! 2) SEND FOR ATLEAST 20-30 TIMES (CAN B ANY MORE THAN THAT) JUST S**K UP THE NETWORK(3733) WITH THESE MESSAGES !!! THAT'S FREE NO!! BOTH ON POST AND PRE!!
3) NOW ALONG ALSO SEND 20-40 SMS AS GPRS TO 3733 (NO OF SMS DIRECTLY PROPORTIONAL 2 HATE FOR BSNL AND HOW EARLY U WNAN GET UR GPRS ACTIVATED) this is also free both on post and pre!!
4) U WILL GET CONFIRMATION IN BOTH CASES AND MSG TELLS U 2 GET SETTINGS FROM 9400024365, THE NO OF CC!! HERE AT MY PLACE I CAN DIAL 9419024365 ALSO! BOTH R TOLL FREE AND BOTH R LOCATED IN CHANDIGARH!!! (((((((AND SOME OF THE CC'S SAY they cant give such sensitive information that where they r located, as if thay have a 3 rd world of their own! and the other dumbs said that they r in chandigarh!!!!)))))
I WOULD ADVISE ALL FIRST, 2 call them once 2 get the settings!! (most of the times that is incorect but gives u an idea of settings in ur area)) Try and in ur 1 st call only, talk roughly and tell them u r calling 10-20th time just for settings and is that their service!!!
5) Now when u get them save them AND plz post them here!!!
6) now GET ATLEAST 2-3 COMPLAINTS REGISTERED( each after 1 day) THAT UR PORTAL HAS NOT ACTIVATED AND GET THEIR SERIAL NO. and in the end bombard them abt the status of all those complaints !! b4 registering ur complaint they will hesitate much and always say taht they will b sendin new settings which r accurate! but dont belive them and just register complaints!!
7)AFTER THAT, u have 2 only wait until "G" signal is there on ur screen!! LOOK, WHAT I HAVE WRIITEN ABV IS METHOD by which i got activated my "G" service !!! without fillin any form or such and without any money drain!! may be since it bypasses the formal way of registeration, that is why this trick is working !!!!!!!!!!!!

!!...Premium Accounts...!! { 10 Websites Premium Accounts }

...premium accounts......!! ENJOY !!...!!...100% Working Accounts...!!
1.) www.divxcrawler.com {download movies fastly}
Username : divx273
Password : 8342729
2.) www.butterflydownloadnetwork.com {movies, music, Pc Games, Tv shows}
Username : cinemanetwork20
Password : butterfly20
3.) www.downloadprofessional.com {movies,Pc softwares, Pc Games, Tv shows}
Username : lo886Ees
Password : zAgt88er
4.) www.sharingzone.net {movies, Pc softwares, Pc Games}
Username : LODMQYHX
Password : 375021402
Receipt : 4T5W89RD
5.) www.unlimitedgamedownloads.com {movies, Pc Games, psp softwares}
Username : ga20me
Password : ke01feb
6.) www.watchdirect.tv {movies, music, Pc Games, online Tv}
Username : cinemanetwork20
Password : butterfly20
7.) www.fullreleasez.com {Greatly Every thing}
Username : Af872HskL
Password : XjsdH28N
8.) www.fulldownloads.us {Greatly Every thing}
Username : Af872HskL
Password : XjsdH28N
9.) www.pirateaccess.com {Every thing}
Username : yourfrienddalat@gmail.com
Password : CHh5LKPI
Username : xxx_heel_xxx@yahoo.com
Password : MJY0BUY
Username : i_l0ve_u_786@yahoo.com
Password : rYvLgPrtUsername : mubashar_siddique@yahoo.com
Password : F9Gzgwb5
10.) www.warezquality.com {Every thing}
Username : ageg2020
Password : z8fsDfg3

Top 13 causes of a Slow or Freezing PC

When your PC was new, it ran like a champ. Programs loaded fast, you couldget your work done efficiently, browse the web, and play a few gameswith little concern about your PC's performance. But lately you're wondering why your PC is so slow and how these intrusive popup ads had gotten into your system.

To keep your PC as fast and efficient as new, you need to care these 13 common causes of a slow PC.
  1. Browser Hijacks : Who changed my homepage?? Why do these damn popups keep coming?? One of the vulnerabilities of web browsers can be a hijack. Something plugging into, replacing part of, or compromising your window to the Internet, the web browser. These can be stubborn problems.
    Browser hijacks can fall into the same category as Spyware, adware, malware, and other Trojans but always directly affect the web browser of the computer that is hijacked. Many computer users do not realize when these programs have been secretly installed on their computer. They may also not realize that their system or browsers settings have been changed. This might be the top 1 common reason that makes your PC slow.
    Recommended: Download Hijackthis 2.02 to have full check against Browser Hijacks
  2. Spyware :
    Malicious programs that stealthily embed themselves into your Windows Registry and core file system are the number two most common cause of a slow PC or poor PC performance.
    These applications are usually installed without your knowledge or consent during the installation of a "free" application you're trying out, or pushed out automatically in the background when you visit websites that engage in this practice without the user's knowledge.
    These spyware programs must be removed as soon as possible to return your PC to top running speed, and before they damage your file system.
    In some cases they can be removed by manually editing the Windows core file system and registry or by using an automatic spyware remover like XoftspySE, our favorite pick for spyware removal and cleaning.
    Recommended: Download Spyware Doctor to run a free spyware scan
  3. Virus
    Closely related to Spyware, viruses can wreak havoc on your system’s performance and severely limit your PC’s ability to do what you ask it to.
    Typically, viruses get onto your computer via infected email or instant messages, although they can also be installed via applications or files that you download from file-sharing networks and other non-trusted web sites.
    Manual removal of viruses is very difficult and rarely successful, and we strongly advise the use of a quality anti-virus program like Kaspersky Internet Security 7.0
  4. System Start-up packed with too many applications (Start-up overload)
    Over time, as you add more and more programs to your computer, many of these applications automatically add themselves to your Windows Start-up folder.
    Additionally, these applications can add themselves quietly to a hidden area of your Windows Start-up system (accessed via the MSCONFIG run command). In extreme cases your PC will appear completely frozen.
    Limiting the number of applications loading themselves at start-up can speed boot times considerably and increase overall system performance.
    Manage your hidden Windows Start-up controls automatically with PC Washer (Recommended)
  5. Corrupted/Bloated Windows Registry
    The Windows Registry is the master control center for your operating system and applications it runs. Corruption or overload registry issues can cause all sorts of pc performance problems, including poor application startup times, slow Windows start-up, extremely slow shut down, inability to resume from computer sleep and more.
    Cleaning, compacting, and optimizing your Windows registry can go a long way to dramatically speeding up your computer's performance, start-up and shutdown speed.
    Recommended: Download Registry Mechanic to run a free Registry scan now
  6. Badly Fragmented Hard Drive
    The sixth most common reason for a slow PC is hard drive and file system fragmentation. Over time, your computer's files can be scattered into bits and pieces located all over your hard drive. This is called fragmentation. Windows has a built in tool to help you with hard drive defragmentation:
    1. Open My Computer
    2. Right-click once on your C: Drive and go down to "Properties"
    3. Select the "Tools" tab and choose the "Defragment Now" option and follow the step by step instructions.
  7. Poor Security Software that is stealing system resources
    Unfortunately, a large number of security software programs and suites out there demand a huge portion of your system resources and memory. This can lead to sluggish performance from the rest of your PC while your security software is constantly scanning and monitoring your computer for threats.
    While threat detection is essential, some security vendors go overboard with their approach and drag your PC down with them.
    To see how much memory and system resources your security software is using, press and hold CTRL+ALT+DELETE and choose the task manager.
    Once the task manager is open look at the "processes" section to see how much of your system resources are being used by your security apps.
  8. Remnants of uninstalled programs
    Uninstalling an application either via the control panel or the application's start menu folder has been known to leave behind remnants of the uninstalled program. These remnants can slow down your computer while Windows tries to figure out what to do with them. Additionally, residue of old program stays behind in your system registry, clogging up your PC's core.

    Recommended: Click here to remove uninstalling remnants
  9. Pagefile
    The Windows page file is a temporary area of memory that your computer uses to move files around while it processes functions. Basically, it’s a buffer that your computer uses for wiggle room. If your Pagefile is too small, your operating system won’t have enough room to move and you could end up with poor performance and error messages.
    1. To increase the size of your Pagefile:
    2. Right-click on "My Computer" and go down to "Properties"
    3. Click the "Advanced" tab
    4. Click "Settings" under the "Performance" section
    5. Click the "Advanced" button
    6. Click "Change" under "Virtual Memory"
  10. Hard Drive getting full and too many internet temp and windows temp files
    If your hard drive has less than 10% free space, you will experience a dramatic slowdown in the performance of your PC. To improve this, free up some space by removing old documents you no longer use or programs that are no longer needed.
    Additionally, your Internet Explorer temp files folder can become jam-packed and lead to extraordinary launch times for Internet Explorer. To clean this folder out with PC Washer (Recommended)
  11. Damaged Operating System
    With enough abuse, any operating system can malfunction. In most cases, it can be repaired using the original installation operating system CD-ROM or sometimes the recovery disk provided by the manufacturer of your computer. This method is basically a re-installation of the operating system files.
  12. Not Enough Memory
    It's important to have enough memory on your computer to keep programs running smoothly, especially if you have large programs like Microsoft Office, or play a lot of PC games. If you are using Windows XP it is recommended that you have at least 512Mb RAM, although at this point, 1Gb seems to be the sweet spot, more again if you are using Vista. The amount of RAM your PC has can be checked by right-clicking 'My Computer' and choosing 'Properties'. If you need to upgrade your RAM be sure it's the right type for your PC. Fitting the wrong type of RAM can cause the PC to slow down even more, crash inexplicably or stop working altogether.
  13. Hardware Problems
    The last common cause of a slow or freezing computer is gradually dying internal hardware components. These can often show up in the form of slow boot and shut down, as well as poor program launches riddled with errors.
    There are very few hardware diagnostic utilities out there, so we recommend careful removal of any newly installed pc components to see if they are causing a problem or incompatibility. Other than that, taking your PC to a certified, trusted hardware repair shop is usually a good idea.
    Before taking it in to a shop with suspected hardware problems however, be sure to try to boot into safe mode to see if you can isolate issues you suspect are hardware failure related.

""How to change the Admin password using the user account?""

Hi friends it is now easy to change the admin password using the user acount for this just open ur command prompt

type " net user "
it will give the all the users
then type " net user administrator * "
(Administrator is default admin for all the computer systems having the very strong password)

then it will give you
"type a new password for this user"
type in the password and press enter
(Note :- the password which youll be typing will be invisible plz type correctly as it not visible and then reenter and press enter)

yupee

then log off and loging using the admin username as
Administrator
and the given password
and youll be loging in with admin rights.


(Please do not use this on your office PC it can creat a mess with Admin users)

Fantastic Windows Trick! Folder Wallpapers!!!!!!!!

Wallpapers For Your Folders!

I'm sure we all have wallpapers for our computer screens. But when we open a folder, all we get is a white background.

Wouldn't it be nice to have a wallpaper in a folder, when we open it up?

Well, there is a way to do it!



It involves making a new desktop.ini system file for that folder, and changing the attributes for that folder.

First, select the picture you want for that folder. It should be sized 815 x 685, or you will get tiles (of course, if you want tiles, use a smaller pic).

You can use your photo editor to crop and/or resize the pic appropriately.

Note the address of the pic. You will need that.

Create a folder (in Documents) to store the desktop.ini file you will make, because it will replace the current system.ini of the folder it's in.

Now, open your notepad. Paste the following code into it.


[{BE0981 40-A513-11D0-A3 A4-00C04FD706EC}]
IconArea_Image ="C:\your picture location.jpg"
IconArea_Text= 0x00000000


Make the following changes:

The first line has spaces in it. Remove those spaces.
In the second line, put the address of the pic you will use, in the quotes.
The third line is the color of the folder text. Use light colored text for dark pics, and dark colored text for light pics.

Some color codes you can use. Feel free to use others, if you know them.

Black - 0x00000000
Pink - 0x00FF99FF
Purple - 0x00FF99FF
Red - 0x00FF0000
White - 0x00FFFFFF


Save the file as: desktop.ini
Save as file type : All Files
Save it in the storage folder you made.

Copy the desktop.ini file you just created, into the folder you want to change.
It should replace the one in there.

Go to START and RUN

Type: attrib +s "C:\Location of your folder"
The location of the folder you want to change is in the quotes.

Click OK (or Return)

Open your folder, and the picture should be there!

If the desktop.ini file shows in the folder, you can right-click it, select Properties, and make it hidden.

Please note, this only changes the folder you put the desktop.ini file in, not all of them.

How to prevent your PEN drive from VIRUS.........?



Friends many of your PC/laptop's normally gets virus because of Pen Drives or USB devices (Even PC's who are not connected to network ). Some Virus like Ravmon Virus , Heap41a worm which are not detected by anti virus normally spreads mostly by the Pen Drives . In such a case what can you do to prevent your PC from getting infected with Virus that spreads through USB devices or Pen Drives ?

You can protect your PC by just following the simple steps below . It won't take much time.
  • Connect your Pen Drive or USB drive to your computer .

Now a dialogue window will popup asking you to choose among the options as shown in the figure.



Don't choose any of them , Just simply click Cancel.
  • *Now go to Start--> Run and type cmd to open the Command Prompt window .
  • *Now go to My Computer and Check the Drive letter of your USB drive or Pen Drive . ( E.g. If it is written Kingston (I:) , then I: will be the drive letter .)
  • *In the Command Window ( cmd ) , type the drive letter: and Hit Enter .
  • *Now type dir/w/o/a/p and Hit Enter
  • *You will get a list of files . In the list , search if anyone of the following do exist
  • 1. Autorun.inf
  • 2. New Folder.exe
  • 3. Bha.vbs
  • 4. Iexplore.vbs
  • 5. Info.exe
  • 6. New_Folder.exe
  • 7. Ravmon.exe
  • 8. RVHost.exe or any other files with .exe Extension .
  • If you find any one of the files above , Run the command attrib -h -r -s -a *.* and Hit Enter.
  • Now Delete each File using the following Command del filename ( E.g del autorun.inf ) .
  • That's it . Now just scan your USB drive with the anti virus you have to ensure that you made your Pen Drive free of Virus .

Hi Frnds...
This virus is very very common now...
To know whether ur system is infected just type C:\heap41a in the address bar...
if there is a folder named heap41a, then ur system is infected...
(AVAST antivirus is the best solution for this worm...) symantec also works.

8/23/08

Trick to Hide Inappropriate Content from Windows Vista Search

With great power comes great responsibility. Windows Vista comes with an amazingly powerful search engine that finds your documents, photos, music, movies, emails, applications and even sensitive materials in milliseconds. Some documents are never meant to be found, such as your private documents and files,want to hide from other users. But with such a powerful search engine, how will you protect your innocence in Windows Vista? Here’s a few tips to hide your documents from Windows Vista Search:

Exclude from Windows Vista Search Indexer

Tackling the problem from the soul of the searching beast. By excluding folders from the Windows Vista search indexer, you will permanently remove any existing indexes on that folder and prevent any future indexes inside that folder. This is recommended for permanent collections that don’t move around.


  • Launch the “Indexing Options” dialog by clicking the Start orbs and search for “index options”
  • Click the “Modify” button.
  • Click the “Show all locations” button, agree to UAC(User Account Control) prompt.
  • Expand the “Change selected locations” tree at the top. Find your inappropriate folders.
    For example: D:\Users\Pictures\vaibhav.jpg
  • Uncheck the folder(s) you wish to exclude from search.
  • Verify your folders have been excluded in the summary below.
  • Close appropriate dialogs

Change the Folder attributes in Windows Vista

An alternative to digging inside the Windows Vista search index is to flag specific folders to be not indexed. This works better for folders that move frequently, but does not guarantee an 100% result, sometimes leaving small traces of folders or files inside the folders.

  • Right click on the folder you wish to flag for non-index. Click “Properties”.
  • Click the “Advanced” button.
  • Uncheck “Index this folder for faster searching.
  • Click “OK”, and close other windows.
Change the File attributes in Windows Vista

Perhaps you just have that special file or document you wouldn’t like to share with the users, but the rest is public domain? Then you can exclude individual files from the Windows Vista search index with a very easy step.


  • Right click on the file you wish to flag for non-index. Click “Properties”.
  • Click the “Advanced” button.
  • Uncheck “Index this file for faster searching.
  • Click “OK”, and close other windows.

Here’s a comparison of the before and after effects by changing file attributes in Windows Vista. It really works!

Create an XP CD that requires no driver installation

To create a Windows XP installation CD that requires no driver installation.

1.Download and install Windows Unattended CD Creator from www.windows-unattended.de.


2. Launch the program and insert your Windows XP CD into the drive.

3. Copy all the contents of the CD. Eject the CD after copying the files.

4. In the program’s first tab—”Source CD”— click Select, and select the folder to which you copied the CD’s contents.

5. Select “Work in source directory” under the “Target directory for new CD” column.

6. Bypass all other options and head to the Driver tab.

7. Insert the driver CD that came with your motherboard.

8. Give a name to the driver group in the General Drivers text box, for example, “Gigabyte”. Click Add.

9. Wait until all the drivers get copied. It should look something like the screenshot below. (The name you gave will appear along with its attributes).

10. Head straight to the Done tab, making no changes.

11. Click Save and then on “Create ISOimage”. Enter the path of where the image should be written to.

12. After completion, burn the ISO image to a CD using a disc burning tool such as Nero. You’re done!

Hack Your Windows Mobile Registry

In all Microsoft operating systems, there is a registry which loads as your computer starts up. The windows registry lets the operating system know what settings to to start your computer up with. Most settings on our computers are stored in the registry somewhere, we just need to know what to change to achieve what we want.

Windows Mobile devices also have a registry like all other Microsoft operating systems. We can customize many of the defaults on our devices to suit our needs. The structure is very similar to the Windows Registry structure, so if you are familiar with it, you will find this just as easy. If you have not yet delved into a registry, you will find this quite tricky.

This article will cover some of the changes we are able to make to our devices, through our devices registry.

Find a Registry Editor:

There are a number of free register editors available for Windows Mobile Devices. We have the option of editing the registry from either a desktop computer or the device itself. I have not tested out any of the programs below extensively but I can confirm they will perform any of the changes listed on this page.

Opening up a registry and making changes is slightly risky. If we change the wrong key, it is possible that our device will no longer work. Backup your devices data before continuing. You should be prepared to reinstall the operating system on your device if something bad does happen. I give you this information for educational use only. If you decide to tinker this way, you are doing so at your own risk.

Mobile Registry Editor: runs on your desktop and connects to your device using ActiveSync. Once you have this installed, connect your device via ActiveSync and click on one of the folder to the left. If the right side refreshes, you have a connection.Being adesktop application, it is easy to navigate and make changes using your keyboard and mouse. As I don’t make many registry changes away from my desktop computer, I would generally use this.

PHM Registry Editor: runs on your device so you have free reign over where and when you make changes to the registry.It has a nice interface and is quite easy to use on our little Windows Mobile screens. PHM Registry Editor works a little faster for me than Mobile Registry Editor did.

Both of these Windows Mobile registry editors are easily found from web for free and are suitable for the changes listed below so choose what you think will work best, or try them both out, they are both free.

Some Important Windows Mobile Registry Hacks:

Remove “Message Sent” Notification when sending text messages.

  • Navigate to
    “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Inbox\”
  • Create a key called “Settings”
  • Create a String Value called “SMSNoSendMsg”
  • Set the value to “1”
  • Now when you send a text message, you will feel a little naked.

Change contents of New menu on the “Today Screen”

  • The “New” button allows you to create various file types directly from the today screen. Adding new items in is tricky but it is easy to remove them.
  • Navigate to
    “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shell\Extensions\NewMenu”
  • Look in the keys and remove the items you no longer want. Adding them back will be a pain so take caution doing this.

Change which items load at startup.

  • Navigate to
    “HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Shell\Start Items”
  • Add or Remove keys according to what you want to run. Not all programs are listed here as some programs are configured in their own settings.

Change the amount of suggested words when inputting data.

  • Navigate to
    “HKEY_CURRENT_USER\ControlPanel\Sip”
  • Find “SuggWords”
  • Change value to between 0 and 6(4 is the default)
  • I have been using my device with one word showing since I got my device. This is also configurable through the Settings/Input applet but it did not work for me until I made the registry changes.

Change the location of My Documents to the sd card.

  • This one is complicated but possible. The order in which you do this is essential.
  • Please ensure that your SD card and My Documents are backed up. It is recommended that you do this on a fresh install of your ROM. This cleared out “My Documents” folder but you can easily restore it.
  • Reset your device
  • Synchronize your device with your pc.
  • Navigate to“HKLM\System\StorageManager\Profiles\SDMemory“
  • Change the “Folder” key to “My Documents”
  • Rename your original “My Documents” folder to “My Docs”. This is a crucial step, but it does not matter what you name it.
  • Power off and reset your device.
  • Sync your Device
You should see in “File Explorer that your “My Documents” folder has an SD card icon next to it.Copy your files back into your My Documents.

Windows Vista Registry Trick: Hide Hard Disk Drive's from Computer

It is possible to hide a hard disk drive letter using a simple registry trick in Windows Vista, preventing it from showing up in applications and Windows Explorer. However, this will not prevent you from access files from it manually (by browsing directly to it by typing "D:" for example). This can be useful to hide files quickly and easily in an effective way.The steps for this registry tweak is given:
  • Click on Windows Vista Start and click on the Run tab.
  • Type regedit.exe into the Run box(Press WINDOWS KEY + R to access this) or in the start menu Search box and click OK.
  • This will opens the Windows Vista registry editor and navigate to the following registry key:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
  • Add a new DWORD 32-bit value named NoDrives into the right-hand pane of the Windows Vista registry editor, and then double-click to open it up.
  • To set the registry key value, you’ll first need to change the option of the Base to Decimal, and then you can enter any decimal value you want.This value depends on the drives you wish to hide, and is created by adding the numbers for each drive you wish to hide from the list below. Click OK once you have entered this number.
For example, to hide hard disk drive D in your Windows Vista computer, you would enter a decimal value of 8 in the value field. To hide both the hard disk drives D and E in your computer, you would enter a decimal value of 24 (8+16):

The chart of disk drive numbers is given below:
A = 1
B = 2
C = 4
D = 8
E = 16
F = 32
G = 64
H = 128
I = 256
J = 512
K = 1024
L = 2048
M = 4096
N = 8192
O = 16384
P = 32768
Q = 65536
R = 131072
S = 262144
T = 524288
U = 1048576
V = 2097152
W = 4194304
X = 8388608
Y =16777216
Z = 33554432
All drives = 67108863

Once you restart your computer, the selected hard disk drives should be hidden in your Windows Vista computer. If you wish to remove the hidden drives, browse to the No Drives registry value and delete it.

Note that it is better to create a full registry backup before the Windows registry tweaks,because if any stability problem occurs restore the registry back.So it is a good practice to all,working with windows registry.

Free GPRS Airtel Hack

A little hack found on the forums on about how to access the net from a pc using a mobile with Airtel prepaid card. Enjoy!
Raw Materials:
PC/Laptop and necessary connectivity tools ,ie.,

Serial/USB cable OR Infrared Device OR Bluetooth dongle to connect the mobile to the computer.

1) Activate Airtel Live! ( It’s FREE so no probs)

2)Create TWO Airtel GPRS data accounts (yep TWO) and select the
FIRST as the active profile.

3) Connect your mobile to the PC (or Laptop) and install the driver for
your mobile’s modem.

4) Create a new dial-up connection using the NEW CONNECTION
WIZARD as follows

Connecting Device : Your mobile’s modem
ISP Name : Airtel (or anything you like)
Phone Number : *99***2#
Username and Password : blank

5) Configure your browser and download manager to use the proxy
100.1.200.99 and port 8080.( My advice is to use Opera since you
can browse both wap and regular websites)

6) Connect to the dial-up account. You will be connected at 115.2
kbps (but remember, that is a bad joke).

7) Pick up your mobile and try to access any site. You will get “Access
Denied…”(except for Airtel Live!). IT DOES NOT MATTER.
Keep the mobile down.

8 ) On the PC ( or Laptop) open your browser, enter any address ,
press ENTER and…….WAIT

9) After a few seconds the page will start to load and you have the
WHOLE internet at your disposal.

8/20/08

What is WEB 2.0

Web 2.0 is as yet something of a nebulous term, with as many different definitions out there as people defining it. This naturally can lead to some confusion. O'Reilly Media, an American company who have been one of the leaders in web development book publishing since the internet was in its infancy, came up with the term in a 2003 meeting. Tim O'Reilly and Dale Dougherty, the founders of the company coined the term.

You can find a technical definition of Web 2.0 on Tim O'Reilly's blog, but most will be left more confused than before upon reading it. O'Reilly has taken this five page definition and put it into (somewhat) simpler language:

"Web 2.0 is the network as platform, spanning all connected devices; Web 2.0 applications are those that make the most of the intrinsic advantage of that platform; delivering software as a continually-updated service that gets better the more people use it, consuming and remixing data from multiple sources, including individual users, while providing their own data and services in a form that allows remixing by others, creating network effects through an "architecture of participation," and going beyond the page metaphor of Web 1.0 to deliver rich user experiences."

The advancements that have been made in computing over the last 25 years are astounding. From DOS to today's portable devices, Web 2.0 is just another step along the same path; one which promises to make the web a more interactive place and more fun to visit. The transition from Web 1.0 to Web 2.0 can be likened to this - with the web the way it is now, we are like spectators at a football game. In Web 2.0, we will be active participants; as if we were on one of the teams playing the game.

What are the differences between the two? For one, Web 2.0 will look different, with bright colors against white backgrounds, rounded fonts and an all over easy to read format are predicted to become the norm. Arial Rounded and Tahoma will replace Times New Roman and CSS (Cascading Style Sheets) will be more heavily used to keep websites more streamlined.

The functionality of Web 2.0 will also be different. MySpace, Twitter and the like are a glimpse at the future, with interaction between user and site being possible. The Web will continue bringing people together to interact and communicate.

Social bookmarking as well as networking will be a big part of Web 2.0. Yahoo Answers is a good example, with people having to ask questions about anything, with users earning points for their answers.

Blogging is something which is often thought of in connection with Web 2.0. Just like a diary, blogging lets people write about anything they like; with the difference being that anyone can now read it. A blog can of course be kept private, but most bloggers prefer to share their thoughts.

The exchange of information between web users overall is a big part of what Web 2.0 is about. Article writing has become a popular activity, with people using them to promote websites or provide information to the public as a whole.

Flickr and YouTube have ushered in an age of picture and video sharing, with interaction possible between poster and viewer.

8/4/08

File Viruses
In terms of sheer number of viruses, these were the most numerous for some time. However, because of bugs in the virus code, they are not the most widely spread. Macro viruses (and system sector viruses) account for more infections in the wild and macro viruses themselves have probably overtaken file viruses in sheer numbers by now.
The simplest file viruses work by locating a type of file they know how to infect (usually a file name ending in .COM or .EXE) and overwriting part of the program they are infecting. When this program is executed, the virus code executes and infects more files. These overwriting viruses do not tend to be very successful since the overwritten program rarely continues to function correctly and the virus is almost immediately discovered.
The more sophisticated file viruses save (rather than overwrite) the original instructions when they insert their code into the program. This allows them to execute the original program after the virus finishes so that everything appears normal.
Just as system sector viruses can remain resident in memory and use stealth techniques to hide their presence, file viruses can also hide this way. If you do a directory listing, you will not see any increase in the length of the file and if you attempt to read the file, the virus will intercept the request and return your original uninfected program to you.
Some file viruses (such as 4096) also infect overlay files as well as the more usual *.COM and *.EXE files. Overlay files have various extensions, but .OVR and .OVL are common. Files with the extension .DLL are also capable of being infected (but generally are not; typically they are only libraries of functions). Indeed, as operating systems become more advanced, typically more files become able to contain executable code and thus be vulnerable to infection. (See the
file extension list for a more complete summary.)
Summary
File viruses number in the thousands, but are not the most widely found in the wild.
File viruses have a wide variety of infection techniques and infect a large number of file types.
Source Code Viruses
While rare, it is possible to infect actual programming source code found on your computer.
Source code comes in many forms because of the many different types of compilers and languages available. This is one reason why source code viruses are not particularly common. The other is that so few people actually write programs it becomes difficult for a source code-only virus to find victims to infect.
Also, because of programming style and differing designs that individuals use when they write program code it's difficult to write a virus that actually spreads via this mechanism. More typically, a source code virus will not infect via source code but simply add Trojan material to existing source code so that when it is compiled and run it does something different than expected.
Die Hard is one example of a type of source code virus. The virus actually spreads by infecting COM and EXE files (a
file virus) but, as part of its payload, in drops Trojan code into any ASM (assembly language) and PAS (Pascal) source files as they are accessed (when the virus is resident in memory).
Source code viruses are not common; but be aware they do exist and have been seen in the wild in the past.
Summary
Source code viruses add instructions to existing programming code found on your system.
They are rare and the code they add is typically a Trojan instead of a full virus.

Viruses

System Sector Viruses
System sectors are special areas on your disk containing programs that are executed when you boot (start) your PC. Every disk (even if it only contains data) has a system sector of some sort. Sectors are simply small areas on your disk that your hardware reads in single chunks. System sectors are invisible to normal programs but are vital for correct operation of your PC. They are a common target for viruses. There are two types of system sectors found on DOS/Windows PCs
Dos boot sector (DBS)
Partiton sectors (often called Master Boot Record or MBR)
System sector viruses modify the program in either the DOS boot sector or the Master Boot Record. Since there isn't much room in the system sector (only 512 bytes), these viruses usually have to hide their code somewhere else on the disk. These viruses sometimes cause problems when this spot already contains data that is then overwritten.
Some viruses, such as the Pakistani Brain virus, mark the spot where they hide their code as bad. This is one reason to be suspicious if any utility suddenly reports additional bad sectors on your disk and you don't know why (don't panic, bad sectors occur frequently for a wide variety of reasons). These viruses usually go resident in memory on your PC, infect the hard disk, and infect any floppy disk that you access. Simply looking at the directory of a floppy disk may cause it to be infected if one of these viruses is active in memory.
On Macintosh systems, some viruses will even infect a diskette immediately upon inserting a diskette into the floppy drive. (PCs generally do not access a disk automatically as the Macintosh does.)
Since viruses are active in memory (resident), they can hide their presence. If Brain is active on your PC, and you use a sector editor to look at the boot sector of an infected diskette, the virus will intercept the attempt to read the infected boot sector and instead return a saved image of the original boot sector. You will see the normal boot sector instead of the infected version. Viruses that do this are known stealth
viruses.
In addition to infecting diskettes, some system sector viruses also spread by infecting files. Viruses of this type are called Multipartite
(multiple part) viruses. Since they can infect both files and system sectors they have more avenues to spread. (Note: Some file viruses also infect system sectors to complete the circle.)
  • Summary: System sectors (MBR and DBS) are often targets for viruses.
    Even data disks can be infected by these viruses.
    System sector viruses spread easily via floppy disk infections and, in some cases, by cross infecting files which then drop system sector viruses when run on clean computers
    .

8/3/08

How To Back Up A DVD Movie

Even tried creating copies of an original DVD? If yes then you must be knowing that this isn’t any easy job. A DVD containing movie is copyright protected and the security feature won’t permit you to create copies easily. But that is why I write this blog. Workarounds to make life easier.

Official laws do not do not permit you to create copies of original movies and I request you to use this method to create backups for your personal use only.

DVD shrink is the best freeware available to backup your DVD on your hard drive or use it simultaneously with your DVD burning software to replicate the DVD on another empty DVD.

Usually movies in a DVD come in two formats - the regular DVD5 single-layer DVD, or DVD9, also called dual layer DVD, which has almost double the capacity. Movies in DVD9 format cannot fit on recordable DVD5 (DVD-R, DVD+R, DVD+RW, or DVD-RW). DVD shrink compresses the video files and omits the unwanted files (like trailers and making of movie etc.) so as to fit the DVD9 format in your empty DVD5 DVD.

From the website:

Most DVDs are designed to prevent you from making copies.

The first preventative measure is encryption. Commercial DVD titles are often encrypted, which prevents you from either copying them to your hard drive, or if you manage to do so, being able to play the resulting files. DVD Shrink overcomes this problem with built-in decryption algorithms.

The next problem is not so easy. Most DVD video titles are simply too large to fit, without modification, onto a single recordable DVD-R disk. DVD Shrink overcomes this problem by compressing or “shrinking” the data from your original DVD.

DVD Shrink also allows you to re-author your DVD. You can make your own compilation from one or more source DVDs, or select only the parts of a DVD which you intend to view, thus preserving more space on your backup for the highest quality viewing.

Last but not least, why use DVD Shrink? Because DVD Shrink is free!

You can backup your DVD in two ways - Full Disc and in Re-Author mode.

Full Disc Backup (default)

This is the default option and here you can remove the files which you do not need in your backup to reduce the final file size. You are permitted to change the compression settings to no compression, Automatic or Custom Ratio. Check Edit > Preferences > Target DVD Size to change the default options for automatic backup.

Re-Author Mode:

This mode gives you better control over your backup files and it allows you to build a compilation from more than one movie DVD source.

When you click on the backup icon to view the backup dialog box you will find a Target Device tab where you can choose where to store your backup. Under the DVD Region tab; you can choose your backup to be region-free. The quality settings tab is very useful considering you are compressing the file to 4.3 GB. There is Deep Scan Analysis option, which encodes your DVD in two passes - this will improve video quality but will take time. In addition when video is compressed some errors can creep in which are removed by comparing the original video with your final compressed video.

DVD Shrink will open the DVD writing application if you had chosen to backup your DVD in another DVD.

Anti Hacking Tips

Don't ignore operating system updates

Practically every day, some new security flaw is found in the most critical aspect of your business - the operating system on which all your other software runs. While it's a major pain in the butt to apply updates and patches so regularly, especially if you access the web via dialup, it's nonetheless of vital importance not to put off performing these tasks as part of regular maintenance.

Don't wait to be alerted via mainstream media of problems that have been discovered - more often than not, these notifications will be delayed. As a part of your daily routine, it's wise to visit the software vendors' site and keep abreast of any critical security updates. In the case of Microsoft, you'll need to go to the Windows Update site.

Anti-virus software used *properly*

Install anti-virus software and ensure that it's regularly updated - this is of the utmost importance. Many times I have come across people who believe that because an anti-virus program is installed, they are protected, yet the last time the virus data file was updated was months or even years ago. Even missing one update could bring down your computer and the business you have struggled so long to build.

Also remember to password protect the settings on the software so no-one else can alter protection levels.

Firewall software

Anti-virus software isn't enough - it's also a good idea to install firewall software which will help prevent unauthorized incoming and outgoing communications from your computer while connected to the Internet. In most instances you wouldn't even be aware that these illegitimate probes and scans of your systems are occurring. Port scanning is *very* common and is carried out with a view to finding weaknesses in your system that can then be exploited.

If you are using Windows XP, then you're in luck as there's already an effective firewall included - but it's not enabled by default.

To activate the firewall in Windows XP:

- Go to "Start"
- Go to "Settings", then "Network connections"
- Select your Internet connection
- Click on "Properties"
- Click on "Advanced"
- Check the box in the "Internet Connection Firewall" section

Email software preview windows

Some viruses, called worms, can infect your system without you clicking on attachments - they can execute in the message preview window. Many worms can cause your sensitive information and documents to be transmitted to millions of people. While the preview window is a handy feature, it's safest to turn it off.

To turn off the preview window in Outlook Express:

- Select "View" on the Menu Bar
- Select "Layout"
- Uncheck "Show Preview Pane"

To turn off the preview window in Outlook:

- Select "View" on the Menu Bar
- Select "Preview Pane" if it's not already greyed out
- You may need to repeat this for each top level mail folder

Consider email filtering services

More and more people are turning to 3rd party solutions for filtering email of spam and viruses as their inboxes become inundated with junk. Email filtering can be very effective in dramatically reducing security risks before the mail even has a chance to be collected by your email software. It not only reduces the risk, but also the amount of time and bandwidth used in retrieving your mail.

Regularly remove spyware

If you and your familiar do a lot of surfing and downloading of shareware software, then it's likely you'll also accumulate your fair share of spyware. Spyware is a broad term applied to software applications that monitor your actions and report them to back to a company.

Some software companies use spyware that is incorporated into their software products to gather data about customers, which is often sold to other companies. An excellent free application for removing spyware can be downloaded from Spybot. Learn more about spyware

Not using it? - unplug it..

Disconnect your computer from the Internet when not in use. The longer you are connected to the Internet, the more opportunity you give for persons to gain unauthorized access. This is especially the case where your ISP provides you with a static IP, which usually occurs in broadband scenarios.

Audit your computer regularly

If your computer is used by others, carry out regular audits of the software on it and research any software that you discover that you haven't installed yourself. It's safest to make it a policy not to allow any software to be installed without your permission. Spybot again is a very effective tool for detecting and removing software that may be a security risk

Remember that your anti-virus software, firewalls and email filtering services should always be considered your last line of defense against software nasties - the first line of defense should be you.

Kid's *aren't* all computer whizzes

Monitor your children's computer usage carefully. They may seem to be "experts", but more often than not they will have very little idea of the ramifications of some of their actions whilst on the Internet. Close supervision is especially necessary in chat rooms as these are places where Script Kiddies and other undesirable elements of the online community are very active.

Password issues

If you must store usernames and passwords on your system, ensure they are contained in a document that is password protected. It is safest not to store any passwords on your computer. Don't let Windows "remember" passwords for you. Passwords should always be more than 8 characters long and contain a mixture of numbers and letters. Learn more about password security issues.

Logging out

Ensure that you log out of online services properly. Failure to do so can allow others who use your computer to gain access to those services and you can be blamed for their activities.

The fight against viruses, script kiddies and other online parasites isn't getting any easier for those of us involved with ecommerce; and as the years go by, more and more of our time and money will be spent on dealing with the darker side of the web.

We can only hope that in the future detection methods become so efficient and punishment becomes so harsh that these kinds of incidences stop occurring. But if the history of our species is any indicator - that's highly unlikely to happen.

Viewing and exploring Web page

  • Display Internet Explorer Help, or when in a dialog box, display context Help on an item
  • F1
  • Toggle between full-screen and regular views of the browser window
  • F11
  • Move forward through the items on Web page, Address bar, & Links bar
  • TAB
  • Move back through the items on Web page, Address bar, and Links bar
  • SHIFT+TAB
  • Go to Home page
  • --- --- ALT +HOME
  • Go to the next page
  • --- --- ALT +RIGHT ARROW
  • Go to the previous page
  • --- --- ALT +LEFT ARROW or BACKSPACE
  • Display shortcut menu for a link
  • SHIFT+F10
  • Move forward between frames
  • --- --- CTRL + TAB or F6
  • Move back between frames
  • SHIFT+ --- --- CTRL + TAB
  • Scroll toward the beginning of a document
  • UP ARROW
  • Scroll toward the end of a document
  • DOWN ARROW
  • Scroll toward the beginning of a document in larger increments
  • PAGE UP
  • Scroll toward the end of a document in larger increments
  • PAGE DOWN
  • Move to the beginning of a document
  • HOME
  • Move to the end of a document
  • END
  • Find on this page
  • --- --- CTRL + F
  • Refresh the current Web page
  • F5 or --- --- CTRL + R
  • Stop downloading a page -------------- ESC
  • Go to a new location ---------------
  • --- --- CTRL + O or --- --- CTRL + L
  • Open a new window
  • --- --- CTRL + N
  • Close the current window
  • (Great for zapping popup windows) --- --- CTRL + W
  • Save the current page
  • --- --- CTRL + S
  • Print the current page or active frame
  • --- --- CTRL + P
  • Activate a selected link
  • ENTER
  • Open the Search bar
  • --- --- CTRL + E
  • Open the Favorites bar
  • --- --- CTRL + I
  • Open the History bar
  • --- --- CTRL + H
  • In the History or Favorites bars, open multiple folders
  • --- --- CTRL + click
  • Using Print Preview
  • Set printing options and print the page
  • --- --- ALT +P
  • Change paper, headers and footers, orientation, and margins for this page --- --- ALT +U
  • Display the first page to be printed
  • --- --- ALT +HOME
  • Display the previous page to be printed
  • --- --- ALT +LEFT ARROW
  • Type the number of the page you want displayed
  • --- --- ALT +A
  • Display the next page to be printed
  • --- --- ALT +RIGHT ARROW
  • Display the last page to be printed
  • --- --- ALT +END
  • Zoom out ------
  • --- --- ALT +MINUS
  • Zoom in ------
  • --- --- ALT +PLUS
  • Display a list of zoom percentages --------
  • --- --- ALT +Z
  • Close Print Preview
  • --- --- ALT +C
  • Using the Address Bar

  • Select the text in the Address bar
  • --- --- ALT +D
  • Display a list of addresses you've typed
  • F4
  • When in the Address bar, move the cursor left to the next logical break in the address (period or slash)
  • --- --- CTRL + LEFT ARROW
  • When in the Address bar, move the cursor right to the next logical break in the address (period or slash)
  • --- --- CTRL + RIGHT ARROW
  • Add "www " to the beginning and " com" to the end of the text typed in the Address bar
  • --- CTRL + ENTER
  • Move forward through the list of AutoComplete matches
  • UP ARROW
  • Move back through the list of AutoComplete matches
  • DOWN ARROW

WORKING WITH FAVOURITES

  • Add the current page to your favorites
  • --- --- CTRL + D
  • Open the Organize Favorites dialog box
  • --- --- CTRL + B
  • Move selected item up in the Favorites list in the Organize Favorites dialog box
  • --- --- ALT +UP ARROW
  • Move selected item down in the Favorites list in the Organize Favorites dialog box
  • --- --- ALT +DOWN ARROW

    EDITING

  • Copy the selected items to the Clipboard
  • --- --- CTRL + C
  • Remove the selected items and copy them to the Clipboard
  • --- --- CTRL + X
  • Paste: To insert what's on the clipboard Clipboard (at the selected location)
  • -- --- CTRL + V
  • Select all items on the current Web page (It goes to your invisible clipboard)
  • --- --- CTRL + A