Sunday, 23 December 2012

old but good Step 1 - Modify Explorer.exe FileIn order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows...
   Because of the security features built into Windows XP, it is virtually impossible to get back into the system without the password.You have several options to try and get around this problem.If you have access to another user...
So one of your friends, “not you of course”, has managed to nuke Internet Explorer and they are unsure how they did it. You’ve eliminated the possibility of viruses and adware, so this just leaves you and a broken IE. Before you begin to even...
1. Open notepad.exe, type "del c:\windows\prefetch\ntosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in c:\ 2. From the Start menu, select "Run..." & type "gpedit.msc". 3. Double click "Windows Settings" under "Computer Configuration"...
Boot Block Recovery For FreeYou don't need to pay a measly sum of dollars just to recover from a boot block mode. Here it is folks:                                 ...
             Bit Torrent Tutorial The first things you need to know about using Bit Torrent:-- Bit Torrent is aimed at broadband users (or any connection better than dialup).-- Sharing is highly...
  BIOS Update Procedure  All latest Motherboards today, 486/ Pentium / Pentium Pro etc.,ensure that upgrades are easily obtained by incorporating the system BIOS in a FLASH Memory component. With FLASH BIOS, there is no need to replace...
                                           ...
  Ask most people how they determine who sent them an email message and the response is almost universally, "By the From line." Unfortunately this symptomatic of the current confusion among internet users as to where particular messages...
                    INSTALL WINDOWS WITHOUT EVEN CLICKING A SINGLE KEY  An unattended Windows  install can install all your software and settings along with Windows, and without you having to click a button or press a key,completely automated. Learn how over here: CODE http://unattended.msfn.org Make your unattended setup now! enjoy <><><><><><><><><><><><><&g...
This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.1. Copy the following (everything in the box) into notepad.QUOTEWindows Registry Editor Version 5.00[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]"ClearPageFileAtShutdown"=dword:00000001[HKEY_USERS\.DEFAULT\Control Panel\Desktop]"AutoEndTasks"="1"[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]"WaitToKillServiceTimeout"="1000"2. Save the file as shutdown.reg3. Double click...
                       HIDING UR SELF FROM World Wide WebI can see you hiding in the shadows over there and so can the logs of all the web sites, FTP servers and other nooks and crannies you visit on the web. The sort of information gathered by these logs and which is available to the webmasters of the sites you visit include the address of the previous site you visited, your IP address, your computer's ID name, your physical location...
                                 Anonymity of Proxy(hiding your IP/proxy)The exchange of information in Internet is made by the "client - server" model. A client sends a request (what files he needs) and a server sends a reply (required files). For close cooperation (full understanding) between a client and a server the client sends additional information about itself: a version and a name...
firstly what is leech pls refer --- http://en.wikipedia.org/wiki/Leech_%28computing%29 I was just asking to know if there is some audience beforehere is my methodfor hacking anti leechwe gonna use a soft calde proxo mitronproxomitron is an anti bull script web proxy it' works buy applying some rules to eliminate pop up and many other thing but for our cas we need to desactive all this filtring first gotowww.proxomitron.infodownload a copy of the softthen you need to unselect all the option of the softand clik on log windowno go to a anti leech...
 All mIRC Commands/ Recalls the previous command entered in the current window./! Recalls the last command typed in any window./action {action text} Sends the specifed action to the active channel or query window./add [-apuce] {filename.ini} Loads aliases, popups, users, commands, and events./ame {action text} Sends the specifed action to all channels which you are currently on./amsg {text} Sends the specifed message to all channels which you are currently on./auser {level} {nick|address} Adds a user with the specified access level to the...
There are a lot of PC users that know little about "Spyware", "Mal-ware", "hijackers", "Dialers" & many more. This will help you avoid pop-ups, spammers and all those baddies.What is spy-ware?Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have...
Original SourcesCAM -A cam is a theater rip usually done with a digital video camera. A mini tripod is sometimes used, but a lot of the time this wont be possible, so the camera make shake. Also seating placement isn't always idle, and it might be filmed from an angle. If cropped properly, this is hard to tell unless there's text on the screen, but a lot of times these are left with triangular borders on the top and bottom of the screen. Sound is taken from the onboard microphone of the camera, and especially in comedies, laughter can often be...
 Setting Up A Ftp:Well, since many of us have always wondered this, here it is. Long and drawn out. Also, before attempting this, realize one thing; You will have to give up your time, effort, bandwidth, and security to have a quality ftp server.That being said, here it goes. First of all, find out if your IP (Internet Protocol) is static (not changing) or dynamic (changes everytime you log on). To do this, first consider the fact if you have a dial up modem. If you do, chances are about 999 999 out of 1 000 000 that your IP is dynamic. To...
Pages (31)123456 Next