Recent Comments widget by VAMPIRE
Showing posts with label INTERNET TRICKS. Show all posts
Showing posts with label INTERNET TRICKS. Show all posts

Tuesday, June 28, 2011

Make Unlimited LongInternational Calls forFree

How to Make Unlimited

Long International Calls for

Free No one stays put any

more. Gone are the days

when families stayed in one

place their whole lifetime.

People move for a variety

of reasons, following new

jobs, new loves, better

weather, better

opportunities. It is very rare

that people live near

extended families.

Sometimes, like after a

divorce, the immediate

family does not even live

close by. It may be difficult,

frustrating, or just not fair,

but it is the reality of life.

When that happens, we do

the best we can to keep in

touch with the ones we

care about. There are many

ways of communicating

long distance. Phone

service providers often

offer wonderful deals on

long distance phone calls.

But there is no better deal

than calling for free. * Go

on the Internet, and find the

web site for SKYPE. It is an

easy to use application for

communication via

Internet. You can download

the application for free.

Once downloaded, a small

icon for SKYPE will appear

on your computer. * Before

you can use SKYPE, you

need to register. It is very

simple. Just follow the

instructions and select your

username and password.

Pick and choose what type

of information you want to

share with others. Play

around with your profile

settings, so that they are

just so. * E-mail all your

friends and family that you

can be contacted via SKYPE.

Share your username with

them. Ask them to send

you theirs. When you are

ready to contact people,

click on the “New Contacts”

button and type in the user

names you are searching

for. Add them as a contact

and when they confirm

you as their contact, you

are ready to start. If you do

not have the username of

the person you are

searching for, simply write

down their name and hope

that you can find the

person. If several people

with the same name

appear, you can ask them

via instant message if they

are the person you’re

looking for. * SKYPE allows

you to send instant

messages back and forth,

call each other, or even

make contact using the

web camera. * If you want

to speak with someone

regularly , it is smart to

agree on the time before

hand. That way you can

expect SKYPE to ring and be

on the lookout. Sometimes

when you are not close by

to the computer, you

cannot hear it ring. The ring

tone is not as pronounced

as it would be on a regular

phone. * The only

disadvantage of using

SKYPE would be that you’re

somewhat limited in your

movement while using it.

Download Skype For PC

To Download For Your

Mobile Visit http://

www.skype.com/intl/en/

get-skype/on-your-mobile/

download/

Internet Error Codesand Meaning

Sometime you are

browsing the internet and

trying to open any website,

your e-mail and any FTP

sites , but you see different

error codes there. You

should be familiar with

these error codes. You can

solve these problems if you

are well-known with the

meaning of error codes.

Error Codes Meaning 400

This is bad request error,

First check you may be

typing wrong URL name

and server could not

understand your request.

401 You are trying to open

any unauthorized access

site or page. Check your

username and password if

you are trying to open any

webpage. 402 Payment

Required Error 403 You are

trying to open any

forbidden page and you are

blocked by that domain.

404 Here you are trying to

open the webpage that was

removed or re-named, also

check the URL spelling. 408

This is time out error. you

should send the request

with in time that the server

set for you.

Why should we Logoutbefore Closing the WebBrowser?

Why should we Logout

before Closing the Web

Browser? You must always

log out before closing the

browser. Especially ensure

that you logged out after

visiting your e-mail. You

must always ensure that

you logged out and then

close the browser window,

else others could snoop on

your e-mails or even

change your password and

lock you out.. SO BEWARE

and TAKE CARE of

yourself.

Disabling MsnMessenger At Startup

Disabling Msn Messenger At

Startup It is quite irritating

that MSN Messenger pops

up every time you start

windows. To disable

Messenger MSN from

running at startup, try the

following : (1) Go to the start

menu >> RUN >> type

“regedit” >> Press enter. (2)

The Registry editor will now

have opened. Navigate to

the following Key: HKEY_

LOCAL_MACHINE\Software

\Policies\Microsoft (3) Now

create a new key by

selecting Edit from the main

menu bar. Now select New

then Key. Name this new

Key: Messenger . (4) Now

select the newly created

Messenger Key and create

another new Key. Only this

time we are going to name

it: Client (5) Next we have to

create a DWORD value. So

Right Click the new Client

Key and select New then

DWORD. Name the

DWORD PreventRun Set’s it

Data Value to 1. Now restart

Windows XP and you will

have successfully Disabled

Messenger MSN.

Yahoo MessengerShortcut Keys

Yahoo Messenger Shortcut

Keys Yahoo Messenger is

one of the most user IM

clients in the world, and

many users use it for to IM

at work, IM with friends

and family and more.

Yahoo messenger has

several shortcut keys, using

which you can buzz a

person, add emoticon/

smileys to your messages

and more. These Shortcut

Keys will help you to Chat

Fast. General Use Shortcut

Key * Windows Key + Y –

Bring Yahoo Messenger to

Focus, works even if Yahoo

Messenger is sitting in the

system tray. * Ctrl + G –

Buzzes the contact you are

chatting with. * Ctrl + H –

Show or Hide offline

contacts in main

messenger Window. * Ctrl

+ Shift + P – Open

preferences window. * Ctrl

+ M – Provides a option to

send a Instant message. *

Ctrl + T – Provides a option

to send a SMS message. *

Ctrl + L – Provides a option

to make a call. * Ctrl + K –

Provides options to Call a

phone number. * Ctrl + Y –

Send a email message. *

Ctrl + Shift + A – Provides

options to add a contact. *

Ctrl + Shift + 0,1 or 2 –

Switches between different

messaging formats

provided by Yahoo

Messenger 9 and above. *

Esc key – Closes a active

message window. * Ctrl +

D – Sign out of Yahoo

Messenger. * Ctrl + Shift +

D – Sign out of Yahoo

Messenger client and sign in

to your mobile device. *

Ctrl + Shift + F8 – Change

your display Image. * Ctrl +

Shift + C – Send you

contact info in a active chat

window. * Ctrl + Shift + M –

Send you messenger friend

list in a active chat window.

* Ctrl + Shift + R – Request

contact details in a active

chat window. Messaging

Window Editor Shortcut

Keys * Ctrl + B – Toggle

bold on or off, or convert

selected text to bold. * Ctrl +

I – Toggle italic on or off, or

convert selected text to

italic. * Ctrl + U – Toggle

underline on or off, or

convert selected text to

underline. Yahoo

Messenger Emoticons /

Smiley Shortcut Keys All

the emoticons Yahoo has

can be sent using your

keyboard, most of the

popular are :) for happy, :

( for sad, ;) for winking, :D

for big grin and so on.

Yahoo messenger provides

you with a complete list of

shortcuts for typing in

emoticons, in addition to

the normal emoticons there

are also several hidden

emoticons which are not

even available from Yahoo

Messenger and requires

you to use keyboard

shortcuts. Want more such

hidden emoticons, check

out the Yahoo Messenger

page for hidden emoticons.

Google Docs NowSupports PDFs

Google Docs Now Supports

PDFs Google Docs has

added support for PDF files.

This is one the most

requested feature. Users

can now upload and

preview their PDF files to

their Google Docs account

as well as they can share

PDFs with others. image To

get started, click the Upload

button in the Docs home

toolbar, select a PDF file

from your computer and

off you go! It supports PDF

file with size up to 10MB

from your computer or

2MB from the web

10 Tips For GoogleImage Search

10 Tips For Google Image

Search Google Image

Search could be used in

many ways. 1. If you want

to know if a person is a

man or a woman and the

name doesn’t help, do a

search for the name. 2. If

you don’t know the

meaning of a word, the

pictures may help you. 3. A

better search for Flickr.

Google uses information

from other sites that link to

Flickr photos, so you may

find Google search better.

4. Find what’s interesting

about a site, by looking at

the pictures included. For

example: wired.com. 5.

Find a new wallpaper for

your desktop by restricting

your search to large

images. You can automate

this using an application. 6.

Find random personal

pictures, using standard file

names from digital

cameras. 7. Type the name

of a painter and you can

take an art class. 8. Install a

Greasemonkey script so

you can view the original

version of the image

directly by clicking on the

thumbnail. 9. Find the color

of a word. “Word Color is a

windows program that

uses Google Image Search

to determine the color of a

word or string of words. It

goes out there, retrieves the

top 9 images and loops

through all pixels,

calculating the average hue,

which is later converted to

a color.” 10. If you want to

grab search results,

GoogleGrab is a tool that

downloads images from

Google Image Search. It

even supports batch

search.

Troubleshoot ADSLModem Connection InXP

How to Troubleshoot

ADSL Modem

Connection In XP If your

computer connects to a

DSL modem you may

have problems or

questions. I will instruct

you in the most

common ways to

troubleshoot your

network. Step 1 Here is

how to check for the

proper settings: 1. In

your command prompt

window, type ipconfig /

all . Be sure that your IP

address ( internet

provider address) and

DNS ( domain name

system ) information

are accurate with the

network card you have

installed on your

computer. Step 2 2. If

you are required to sign

on through your DSL

provider before you are

allowed to use the

internet than go ahead

and do that. You will be

using a kind of old

fashioned dial up

connection, except you

will be digitally

connected over the DSL

network. You will have

to set up a connection

using the ” Connect

using a broadband

connection that requires

a password and user

name “. Step 3 If this is

the case you have with

your situation and you

use a LAN (local area

network ) adapter to

connect to your DSL

modem, this LAN

adapter will have an IP

address that is going to

be used “ONLY” to

communicate or talk to

your DSL modem. Be

sure to check with your

ISP to be sure that your

computer to modem

connection is

configured correctly. If

it is not correct you will

not be able to connect

to your ISP. Step 4 Now,

be sure to use the

Connection icon to

connect to your ISP. You

can get to it quickly

using the start button

and then the connect to.

When the logon process

has been completed

ipconfig should show a

dial up connection with

a different IP address.

This address is your

real, public Internet

address for the duration

of the call. Step 5 If you

have two network cards

in your computer and

you are using a high

speed connection, make

certain you have

enabled sharing on the

correct connection. The

connection you want is

“shared” make sure it is

checked, for this is the

one that connects you

to your high speed DSL

or cable modem. The

network-side

connection is not the

shared connection and

should have an IP

address of 192.168.0.1.

How To Speed Up yourBroadBand Speed

How To Speed Up your

BroadBand Speed I just

found this article which

discusses important tips to

significantly speed up your

internet access through

BSNL Dataone broadband

connection / most other

BroadBand connections like

Reliance or Tata Indicom or

Sify Broadband . Setting

DNS For Your Connection

One of the major problems

with BSNL Dataone

Broadband connection is

the DNS servers they

provide by default. Most of

the time they are very slow

and sometimes they fail to

respond. I noticed that I am

starting to spend a

significant amount of time

in DNS resolution with

Dataone connection, often it

is larger than the time it

takes to actually get the

reponse. Here is a simple

solution to significantly

speed up your DNS

resolution. Open up the

network connection profile

and edit TCP/IP settings. In

the DNS server address

fields, specify the following

DNS server addresses:

208.67.222.222 and

208.67.220.220 Disconnect

the connection and then

connect again. You are

done. This specifies third

party DNS servers which

are significantly faster than

BSNL Dataone’s DNS

servers. Note: The service is

provided by OpenDNS.

Saving your Bandwidth

Firefox users can use

FlashBlock extension to

prevent downloading of

Flash content by default,

thereby significantly

speeding up browsing

experience. You can click on

the placeholder icon to

display the original Flash

content any time. This is

more of a passive tip in that

reduces data usage to

improve your overall

experience. Setting TCP

Parameters You can try to

increase your broadband

bandwidth tweaking the

TCP/IP parameters. The

process is simplified by

using TCPOptimizer, a free

tool. It helped me a lot but

your mileage may vary

►Hack any remote PC

THIS NETBIOS

HACKING GUIDE WILL

TELL YOU ABOUT

HACKING REMOTE

COMPUTER AND

GAINING ACCESS TO IT

’S HARD- DISK OR

PRINTER. NETBIOS

HACK IS THE EASIEST

WAY TO BREAK INTO A

REMOTE COMPUTER.

STEP-BY-STEP NETBIOS

HACKING PROCEDURE

1.Open command

prompt 2. In the

command prompt use

the “net view”

command ( OR YOU CAN

ALSO USE “NB Scanner”

OPTION IN “IP TOOLS”

SOFTWARE BY

ENTERING RANGE OF IP

ADDRESSS. BY THIS

METHOD YOU CAN

SCAN NUMBER OF

COMPUTERS AT A TIME)

. Example: C:\>net view

\ \219.64.55.112 The

above is an example for

operation using

command prompt. “net

view” is one of the

netbios command to

view the shared

resources of the

remote computer. Here

“ 219.64.55.112 " is an IP

address of remote

computer that is to be

hacked through

Netbios. You have to

substitute a valid IP

address in it’s place. If

succeeded a list of

HARD-DISK DRIVES &

PRINTERS are shown. If

not an error message is

displayed. So repeat the

procedure 2 with a

different IP address. 3.

After succeeding, use

the “net use” command

in the command prompt.

The “net use” is

another netbios

command which makes

it possible to hack

remote drives or

printers. Example-1: C:

\>net use D: \

\219.64.55.112\F

Example-2: C:\>net use

G: \

\219.64.55.112\SharedDocs

Example-3: C:\>net use

I: \

\219.64.55.112\Myprint

NOTE: In Examples 1,2

& 3, D:,G: & I: are the

Network Drive Names

that are to be created

on your computer to

access remote

computer ’s hard-disk.

NOTE: GIVE DRIVE

NAMES THAT ARE NOT

USED BY ANY OTHER

DRIVES INCLUDING

HARD-DISK DRIVES,

FLOPPY DRIVES AND

ROM-DRIVES ON YOUR

COMPUTER. THAT IS, IF

YOU HAVE C: & D: AS

HARD DIRVES, A: AS

FLOPPY DIVE AND E: AS

CD-DRIVE, GIVE F: AS

YOUR SHARED DRIVE IN

THE COMMAND PROMPT

F:,”SharedDocs” are the

names of remote

computer’s hard-disk’s

drives that you want to

hack. “ Myprint” is the

name of remote

computer’s printer.

These are displayed

after giving “net use”

command.

“219.64.55.112″ is the IP

address of remote

computer that you want

to hack 4. After

succeeding your

computer will give a

message that “The

command completed

successfully“. Once you

get the above message

you are only one step

away from hacking the

computer. Now open

“My Computer” you will

see a new “Hard-Disk

drive”(Shared) with the

specified name. You

can open it and access

remote computer ’s

Hard-Drive. You can

copy files, music,

folders etc. from victim

’s hard-drive. You can

delete/modify data on

victim’s hard-drive only

if WRITE- ACCESS is

enabled on victim’s

system. You can access

files/ folders quickly

through “Command

Prompt”. NOTE: If

Remote Now open “My

Computer” you will see

a new “Hard-Disk drive

”(Shared) with the

specified name. You

can open it and access

remote computer ’s

Hard-Drive. You can

copy files, music,

folders etc. from victim

’s hard-drive. You can

delete/modify data on

victim’s hard-drive only

if WRITE- ACCESS is

enabled on victim’s

system. You can access

files/ folders quickly

through “Command

Prompt”. NOTE: If

Remote Computer’s

Firewall Is Enabled Your

Computer Will Not

Succeed In Gaining

Access To Remote

Computer Through

Netbios. That is Netbios

Hacking Is Not Possible

In This Situation.(An

Error Message Is

Displayed). So Repeat

The Procedure 2,3 With

Different IP Address.

►Hack any remote PC

THIS NETBIOS

HACKING GUIDE WILL

TELL YOU ABOUT

HACKING REMOTE

COMPUTER AND

GAINING ACCESS TO IT

’S HARD- DISK OR

PRINTER. NETBIOS

HACK IS THE EASIEST

WAY TO BREAK INTO A

REMOTE COMPUTER.

STEP-BY-STEP NETBIOS

HACKING PROCEDURE

1.Open command

prompt 2. In the

command prompt use

the “net view”

command ( OR YOU CAN

ALSO USE “NB Scanner”

OPTION IN “IP TOOLS”

SOFTWARE BY

ENTERING RANGE OF IP

ADDRESSS. BY THIS

METHOD YOU CAN

SCAN NUMBER OF

COMPUTERS AT A TIME)

. Example: C:\>net view

\ \219.64.55.112 The

above is an example for

operation using

command prompt. “net

view” is one of the

netbios command to

view the shared

resources of the

remote computer. Here

“ 219.64.55.112 " is an IP

address of remote

computer that is to be

hacked through

Netbios. You have to

substitute a valid IP

address in it’s place. If

succeeded a list of

HARD-DISK DRIVES &

PRINTERS are shown. If

not an error message is

displayed. So repeat the

procedure 2 with a

different IP address. 3.

After succeeding, use

the “net use” command

in the command prompt.

The “net use” is

another netbios

command which makes

it possible to hack

remote drives or

printers. Example-1: C:

\>net use D: \

\219.64.55.112\F

Example-2: C:\>net use

G: \

\219.64.55.112\SharedDocs

Example-3: C:\>net use

I: \

\219.64.55.112\Myprint

NOTE: In Examples 1,2

& 3, D:,G: & I: are the

Network Drive Names

that are to be created

on your computer to

access remote

computer ’s hard-disk.

NOTE: GIVE DRIVE

NAMES THAT ARE NOT

USED BY ANY OTHER

DRIVES INCLUDING

HARD-DISK DRIVES,

FLOPPY DRIVES AND

ROM-DRIVES ON YOUR

COMPUTER. THAT IS, IF

YOU HAVE C: & D: AS

HARD DIRVES, A: AS

FLOPPY DIVE AND E: AS

CD-DRIVE, GIVE F: AS

YOUR SHARED DRIVE IN

THE COMMAND PROMPT

F:,”SharedDocs” are the

names of remote

computer’s hard-disk’s

drives that you want to

hack. “ Myprint” is the

name of remote

computer’s printer.

These are displayed

after giving “net use”

command.

“219.64.55.112″ is the IP

address of remote

computer that you want

to hack 4. After

succeeding your

computer will give a

message that “The

command completed

successfully“. Once you

get the above message

you are only one step

away from hacking the

computer. Now open

“My Computer” you will

see a new “Hard-Disk

drive”(Shared) with the

specified name. You

can open it and access

remote computer ’s

Hard-Drive. You can

copy files, music,

folders etc. from victim

’s hard-drive. You can

delete/modify data on

victim’s hard-drive only

if WRITE- ACCESS is

enabled on victim’s

system. You can access

files/ folders quickly

through “Command

Prompt”. NOTE: If

Remote Now open “My

Computer” you will see

a new “Hard-Disk drive

”(Shared) with the

specified name. You

can open it and access

remote computer ’s

Hard-Drive. You can

copy files, music,

folders etc. from victim

’s hard-drive. You can

delete/modify data on

victim’s hard-drive only

if WRITE- ACCESS is

enabled on victim’s

system. You can access

files/ folders quickly

through “Command

Prompt”. NOTE: If

Remote Computer’s

Firewall Is Enabled Your

Computer Will Not

Succeed In Gaining

Access To Remote

Computer Through

Netbios. That is Netbios

Hacking Is Not Possible

In This Situation.(An

Error Message Is

Displayed). So Repeat

The Procedure 2,3 With

Different IP Address.

►Working of SQLInjection Attacks

SQl injection is a

vulnerability that allows an

attacker to influence the

queries that are passed to

the back-end database. It

has been present since the

time databases have been

attached to the web

applications. Before

understanding the how

SQL injection attacks we

need to understand the

Simple Three Tier

Architectureor a Four Tier

Architecture.This will clear

your basics and give you a

rough idea of how

database-driven web

applications work. Three

Tier Architecture In a

simple three tier datbase-

driven architecture the

three layers that are used

are:- 1. Presentation Tier

(Browsers) 2. Logic Tier 3.

Storage Tier(Database) The

three tier architecture

follows a linear relationship

i.e Presentation Tier

connects to the Logic Tier

and theLogic Tier connects

to the Storage Tier

Presentation Tier <–> Logic

Tier <--> Storage Tier

Suppose you connect to

the http://

www.website.com using

his web browser.This is

your presentation tier.Now

the web server residing in

the logic tier will load the

script for the entered url

and will pass it to the

scripting engine which will

parse and execute the

script.It will also open a

connection to the database

i.e Storage Tier .It will

perform the queries and

the data from the database

is transferred to the logic

tier which will now convert

into HTML which is

rendered by the Browser.

Four Tier Architecture In

Four Tier Architecture an

layer of Application Server

is inserted between a web

server and the database. 1.

Presentation Tier(Browsers)

2. Logic Tier 3. Application

Tier 4. Storage Tier

(Database) In four tier

architecture the connection

to the database is opened

by application server which

has Application

Programming Interface

(API) that implements the

business logic before

transferring the data to the

Logic tier. Presentation

TierLogic Tier Application

Server Storage Tier

Working Of SQL Injection

SQL injection can be used

using various methods.In

this page I will explain to

the basic concepts behind

the SQL injection. Suppose

you are on a shopping site

and you have selected the

option of showing all the

accessories that costless

then 200$ and its Url is like

http://

www.shoppingsite.com/

products.php?val=100 To

test this website for SQL

injection try appending

your SQl injection

commands in the val

parameter ‘OR ‘1’=’1 http://

www.shoppingsite.com/

products.php?

val=100’OR’1’=’1 If the

above injection works and

shows the list of all the

accessories then the

website is vulnerable to this

type of SQL injection This

means that at the backend

the script will be executed

as shown: SELECT *

FROMProductstbl

WHEREPrice<’200.00’ OR

‘1’=’1’ ORDER

BYProductdescription As

the condition 1=1 so this

will give you list of all the

products How this SQL

injection Attack Can Be

Harmful Suppose a website

uses the following url for

logging into admin panel

http://www.website.com/

cms/login.php?

username=saini&password=go

now if the above website is

vulnerable to the SQL

injection as mentioned in

the above example then by

entering any username and

password in the url you

can login http://

www.website.com/ms/

login.php?

username=dnt&password=dnt’OR’1’=’1

so you will just login

without valid username

and password to the

admin panel of a website.

NOTE:"The Above

Information is Only For

Education purposes and to

make our Users beware of

Threats,plz DO NOT Misuse

your Knowledge"

►Bypass Firewall AtSchool,College OrOffice

Is Orkut,Facebook,Yahoo

blocked on your

school,college or office?

Then,dont worry I have a

solution for you that will

not only unblock all the

websites that have been

blocked but also make

your internet surfing

anonymous so that

nobody can trace your

orignal ip address.As you

know that most of the

proxy websites are blocked

with your school,college or

office firewall and even if

you find some new proxies

they even them block them

out.So,why not to move

something that is almost a

permanent solution. We

will be using a very small

and free software called

ultrasurf.It will not only

allow you to surf blocked

websites but it will also

give you freedom to

stream videos,download

and upload files. Now Here

is the step by step tutorial

1. First you need to

Download Ultrasurf. 2. You

will get a zipped file with

a .exe file in it.Click on it # It

will start ultra surf and

automatically connect to its

server.

Click HERE To Download

Ultrasurf

*Even it will open your

Internet explorer

automatically.Now you can

have an unblocked and

secure to internet... "just

Enjoy"

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Sweet Tomatoes Printable Coupons