Skip to main content

Posts

Showing posts from July, 2012

Auto End Tasks to Enable a Proper Shutdown

This reg file automatically ends tasks and timeouts that prevent programs from shutting down and clears the Paging File on Exit. 1. Copy the following (everything in the box) into notepad. Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management] "ClearPageFileAtShutdown"=dword:00000001 [HKEY_USERS\.DEFAULT\Control Panel\Desktop] "AutoEndTasks"="1" [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control] "WaitToKillServiceTimeout"="1000" 2. Save the file as shutdown.reg 3. Double click the file to import into your registry. NOTE: If your anti-virus software warns you of a "malicious" script, this is normal if you have "Script Safe" or similar technology enabled.

Types of video CD/DVDs

VCD - VCD is an mpeg1 based format, with a constant bitrate of 1150kbit at a resolution of 352x240 (NTCS). VCDs are generally used for lower quality transfers (CAM/TS/TC/Screener(VHS)/TVrip(analogue) in order to make smaller file sizes, and fit as much on a single disc as possible. Both VCDs and SVCDs are timed in minutes, rather than MB, so when looking at an mpeg, it may appear larger than the disc capacity, and in reality u can fit 74min on a CDR74. SVCD - SVCD is an mpeg2 based (same as DVD) which allows variable bit-rates of up to 2500kbits at a resolution of 480x480 (NTSC) which is then decompressed into a 4:3 aspect ratio when played back. Due to the variable bit-rate, the length you can fit on a single CDR is not fixed, but generally between 35-60 Mins are the most common. To get a better SVCD encode using variable bit-rates, it is important to use multiple "passes". this takes a lot longer, but the results are far clearer. XVCD/XSVCD - These are basically

Types of movie prints

Original Sources CAM - A cam is a theater rip usually done with a digital video camera. A mini tripod is sometimes used, but a lot of the time this wont be possible, so the camera make shake. Also seating placement isn't always idle, and it might be filmed from an angle. If cropped properly, this is hard to tell unless there's text on the screen, but a lot of times these are left with triangular borders on the top and bottom of the screen. Sound is taken from the onboard microphone of the camera, and especially in comedies, laughter can often be heard during the film. Due to these factors picture and sound quality are usually quite poor, but sometimes we're lucky, and the theater will be fairly empty and a fairly clear signal will be heard. TELESYNC (TS) - A telesync is the same spec as a CAM except it uses an external audio source (most likely an audio jack in the chair for hard of hearing people). A direct audio source does not ensure a good quality audio sour

Home Page Never Being Changed

Your Home Page Never Being Changed Some websites illegally modify your registry editor and set their website as default home page, for stop this, 1. Right-click on the Internet Explorer icon on your desktop and select "Properties". 2. In the "Target" box you will see "C:\Program Files\Internet Explorer\IEXPLORE.EXE". 3. Now by adding the URL of the site to the end of this it overrides any Homepage setting in internet options: "C:\Program Files\Internet Explorer\IEXPLORE.EXE" www.ch4u.in

Tabnabbing

Tabnabbing is a computer exploit and phishing attack, which persuades users to submittheir login details and passwords to popular websites by impersonating those sites and convincing the user that the site is genuine. The attack's name was coined in early 2010 by Aza Raskin, a security researcher and design expert. The attack takes advantage of user trust and inattention to detail in regard to tabs, and the ability of modern web pages to rewrite tabs and their contents a long time after the page is loaded. Tabnabbing operates in reverse of most phishing attacks in that it doesn’t ask users to click on a obfuscated link but instead loads a fake page in one of the open tabs in your browser. The exploit employs scripts to rewrite a page of average interest with an impersonation of a well-known website, when left unattended for some time. A user who returns after a while and sees the rewritten page may be induced to believe the page is legitimate and enter their login,

Hack facebook using Tabnapping

Hello friends  Today i wil be telling how to hack facebook account using tabnapping to know more about tabnapping click here else below are the steps Follow these steps to Hack Facebook Account :- 1. First of all Download Script from links below and then Extract it!!! link1                       link2                  link3 2. Choose any free hosting websitefor eaxample http://www.host1free.com/ or http://my3gb.com 3. Now Create your account on the free hosting site. You will get all server details in your mail. 4.Login to free web hosting account  Then click on File Manager and then click on Public_Html 5. Now Upload these three files Three Files (Facebook.html , Login.php , google.html) 6. After uploading them you will get thelinks to your file like  this www.yourhosting.com/filename.html 7. Now open the tabnabb.js in note pad. Put your facebook.html your there where you will find the text like this :- window.location = ‘ Enter your Link here ‘  and then upl

10 reasons why PCs crash U must Know

Fatal error : the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications." You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening? 1 Hardware conflict The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device. For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself. If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both dev

how to Copy Text From Any Image

Do you need some information in the form of text from scanned copies of documents.Either you can write the whole text by typing or you can use an OCR software.OCR (optical Character recognition) is method to extract text from images.It can recognize handwritten,printed or typewritten text and can reproduce them into editable word or text format. These OCR software also preserve the formatting of the original scanned document into converted document.They are not 100% accurate and the converted document still requires some editing.But it is better to use an OCR software and do some editing rather to type the whole Document. click here to download Earlier I have reviewed top Free OCR softwares .If you have microsoft office installed in your computer then you won?t need any other third-party software as you can use Microsoft Office OneNote to copy text from image. Trick to Copy Text From Any Image:- ■For this you have to install MS-Office on your system. ■Now open Microsoft

How To Hack Nokia Phone’s Security Code

If you forget your Nokia Phone’s Security code then below are the ways to unlock 1st way Hold the menu key for A while then there will be appear “Now Press *” then give star and your phone will unlock. This a easiest best way to unlock your phone when you forget your password. Don’t working this trick?  Try 2nd way, 2nd way This way you can get your nokia phones master code. The master codes unique for each phone and can be used in place for the security/phone code. Get the IMEI number of the phone by pressing *#06# on your phone. Go to http://www.nokialockcode.com/calculate.php Enter your IMEI number there then press generate. There will be your phone's master code. Supported Nokia Phones: 2100, 3110, 3210, 3310, 3315, 3330, 3350, 3390, 3410, 3610, 5110(i), 5130, 5190, 5210, 5510, 6080, 6110, 6130, 6138, 6150, 6190, 6210, 6250, 7110, 8210, 8250, 8290, 8850, 8855, 8890, 9110(i), 9210(i), 9290, 3100(b), 3108, 3120, 3200(b), 3220, 3230, 3300, 3360, 3510(i), 3530, 3590, 3

HOW TO KNOW WHO USED YOUR PC IN YOUR ABSENCE

Just follow these simple steps start >>run>>eventvwr.msc Events are stored in three log files: Application, Security, and System. These logs can be reviewed and archived. For our purposes we want the System log. Click on "System" in the left-hand column for a list of events. Look for a date and time when you weren't home and your computer should have been off. double click on the eg: info n it will show u the detail. You can also use this log to see how long someone was on the computer. Just look at the time the computer was turned on and off for that day.

Qualities of Good Custom Software Developers

Custom software development is very much needed for the development of any business organization as every business has its own working procedure and requirements that they need. Every organization wants to have their custom applications which can fulfill their particular requirements. With the increase in the demands on these type of services many firms are emerging in the market targeting to develop custom software applications as per the specifications provided by the business organizations to them. They help in the smooth running of the work and helps in saving a lot of time and efforts for the business organization.. It offers flexibility as the software gets updated time to time and even the functions can also get altered as per the needs. The companies can save the time which can get wasted in training the staff and can only focus on the proper utilization of resources. The applications are tailored as per the information provided that’s the reason they are very adaptable, t

What is Rooting on Android? The Advantages and Disadvantages

“What is rooting? Why should I root my Android device?” These are common questions that I get asked quite often. Today’s lesson is to talk to you about both the advantages and disadvantages of rooting your Android devices. But before we get started, a word of caution: rooting or modifying your phone in any way will void your manufacturer’s warranty and possibly “brick” it. What does “bricking” your device mean you ask? Exactly what you think… It means screwing up your phone software so badly that your phone can no longer function properly and is pretty much as useless as a brick. I do not in any way recommend anyone to root their Android device. This article is simply to introduce you to the subject of rooting and present you with both the pro’s and con’s so that you can make an educated decision on your own. What is Rooting? “Rooting” your device means obtaining “superuser” rights and permissions to your Android’s software. With these elevated user privileges, you gain the abilit

Get Command Prompt In Windows

Windows XP is a treasure of many invisible facilities and programs. Windows XP has an inbuilt CLI OS. And it is known as DOS(Disk Operating System).You have noticed many public places like Schools and libraries, or many other places the System administrators disable CMD.EXE for user level. But they  forget to disable the older Version,  “COMMAND.COM”. you can even use it. When trying to access CMD.EXE, if you are displayed with the following message: “The command prompt has been disabled by your administrator”. Then you know it is disabled for your user level. But you can still use it with this trick. How To Get Command Prompt In Windows To get a COMMAND.COM prompt up follow this steps 1.  Click Start >> Run. then type this command in Run dialog box.     notepad or 1.  Open Notepad and type in “command.com” (without the quotes). 2.  Next, save it as a batch file via the “.bat” extension. Give any name but with .bat, So save it as “anything.bat”. 3.  You are done. Now

How to Identify whether you are RATTED OR KEYLOGGED

Hello friends Here , i will help you in another way.Today , i will write an in-depth tutorial on how to know whether you are ratted or keylogged by some noobs or hackers.I am here to safeguard you all Smiling For all the noobs out here who don’t know what a keylogger is , Its a tool that logs whatever you type and hence,steal your passwords. For all the noobs,again , i will tell what a RAT is too ! Its called Remote Administration Tool. The name speaks for itself.They can fuck up your computers like u won't understand So beware ! And all you that thinks “I have full version of one of the best antivirus ..I am completely safe !”..Its a myth.. First of all ,let me tell you something, CMD is the master of your pc … So im beginning my tutorial Smiling PHASE ONE Open up Cmd by hitting run and typing in cmd. And type in this : cd %APPDATA% If you see something like the list below,its ok.     ArbiBots.ini     RSBot_Accounts.ini     RSBot Accounts.ini     wklnhst.dat