old but good
Step 1 - Modify Explorer.exe FileIn order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows...
Sunday, 23 December 2012
Posted By:Unknown | At:Sunday, December 23, 2012
Be the first to comment!

Because of the security features built into Windows XP, it is virtually impossible to get back into the system without the password.You have several options to try and get around this problem.If you have access to another user...
Posted By:Unknown | At:Sunday, December 23, 2012
Be the first to comment!

So one of your friends, “not you of course”, has managed to nuke Internet Explorer and they are unsure how they did it. You’ve eliminated the possibility of viruses and adware, so this just leaves you and a broken IE. Before you begin to even...
Posted By:Unknown | At:Sunday, December 23, 2012
Be the first to comment!

1. Open notepad.exe, type "del c:\windows\prefetch\ntosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in c:\
2. From the Start menu, select "Run..." & type "gpedit.msc".
3. Double click "Windows Settings" under "Computer Configuration"...
Posted By:Unknown | At:Sunday, December 23, 2012
Be the first to comment!

Boot Block Recovery For FreeYou don't need to pay a measly sum of dollars just to recover from a boot block mode. Here it is folks:
...
Posted By:Unknown | At:Sunday, December 23, 2012
Be the first to comment!

Bit Torrent Tutorial
The first things you need to know about using Bit Torrent:-- Bit Torrent is aimed at broadband users (or any connection better than dialup).-- Sharing is highly...
Posted By:Unknown | At:Sunday, December 23, 2012
Be the first to comment!

BIOS Update Procedure
All latest Motherboards today, 486/ Pentium / Pentium Pro etc.,ensure that upgrades are easily obtained by incorporating the system BIOS in a FLASH Memory component. With FLASH BIOS, there is no need to replace...
Posted By:Unknown | At:Sunday, December 23, 2012
Be the first to comment!

Ask most people how they determine who sent them an email message and the response is almost universally, "By the From line." Unfortunately this symptomatic of the current confusion among internet users as to where particular messages...
Posted By:Unknown | At:Sunday, December 23, 2012
Be the first to comment!
INSTALL WINDOWS WITHOUT EVEN CLICKING A SINGLE KEY
An unattended Windows install can install all your software and settings along with Windows, and without you having to click a button or press a key,completely automated. Learn how over here:
CODE
http://unattended.msfn.org
Make your unattended setup now! enjoy <><><><><><><><><><><><><&g...
Posted By:Unknown | At:Sunday, December 23, 2012
Be the first to comment!
This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit.1. Copy the following (everything in the box) into notepad.QUOTEWindows Registry Editor Version 5.00[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]"ClearPageFileAtShutdown"=dword:00000001[HKEY_USERS\.DEFAULT\Control Panel\Desktop]"AutoEndTasks"="1"[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control]"WaitToKillServiceTimeout"="1000"2. Save the file as shutdown.reg3. Double click...
Posted By:Unknown | At:Sunday, December 23, 2012
Be the first to comment!
HIDING UR SELF FROM World Wide WebI can see you hiding in the shadows over there and so can the logs of all the web sites, FTP servers and other nooks and crannies you visit on the web. The sort of information gathered by these logs and which is available to the webmasters of the sites you visit include the address of the previous site you visited, your IP address, your computer's ID name, your physical location...
Posted By:Unknown | At:Sunday, December 23, 2012
Be the first to comment!
Anonymity of Proxy(hiding your IP/proxy)The exchange of information in Internet is made by the "client - server" model. A client sends a request (what files he needs) and a server sends a reply (required files). For close cooperation (full understanding) between a client and a server the client sends additional information about itself: a version and a name...
Posted By:Unknown | At:Sunday, December 23, 2012
Be the first to comment!
firstly what is leech pls refer --- http://en.wikipedia.org/wiki/Leech_%28computing%29
I was just asking to know if there is some audience beforehere is my methodfor hacking anti leechwe gonna use a soft calde proxo mitronproxomitron is an anti bull script web proxy it' works buy applying some rules to eliminate pop up and many other thing but for our cas we need to desactive all this filtring first gotowww.proxomitron.infodownload a copy of the softthen you need to unselect all the option of the softand clik on log windowno go to a anti leech...
Posted By:Unknown | At:Sunday, December 23, 2012
Be the first to comment!
All mIRC Commands/ Recalls the previous command entered in the current window./! Recalls the last command typed in any window./action {action text} Sends the specifed action to the active channel or query window./add [-apuce] {filename.ini} Loads aliases, popups, users, commands, and events./ame {action text} Sends the specifed action to all channels which you are currently on./amsg {text} Sends the specifed message to all channels which you are currently on./auser {level} {nick|address} Adds a user with the specified access level to the...
Posted By:Unknown | At:Sunday, December 23, 2012
Be the first to comment!
There are a lot of PC users that know little about "Spyware", "Mal-ware", "hijackers", "Dialers" & many more. This will help you avoid pop-ups, spammers and all those baddies.What is spy-ware?Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have...
Posted By:Unknown | At:Sunday, December 23, 2012
Be the first to comment!
Original SourcesCAM -A cam is a theater rip usually done with a digital video camera. A mini tripod is sometimes used, but a lot of the time this wont be possible, so the camera make shake. Also seating placement isn't always idle, and it might be filmed from an angle. If cropped properly, this is hard to tell unless there's text on the screen, but a lot of times these are left with triangular borders on the top and bottom of the screen. Sound is taken from the onboard microphone of the camera, and especially in comedies, laughter can often be...
Posted By:Unknown | At:Sunday, December 23, 2012
Be the first to comment!
Setting Up A Ftp:Well, since many of us have always wondered this, here it is. Long and drawn out. Also, before attempting this, realize one thing; You will have to give up your time, effort, bandwidth, and security to have a quality ftp server.That being said, here it goes. First of all, find out if your IP (Internet Protocol) is static (not changing) or dynamic (changes everytime you log on). To do this, first consider the fact if you have a dial up modem. If you do, chances are about 999 999 out of 1 000 000 that your IP is dynamic. To...
Subscribe to:
Posts (Atom)