Write at HWS !!!

Guest Posting

How secure is your Computer ?

Check out your computer safety here . A lot of tools , tricks and hacks related to computer .

Blogger Tips and Tricks

A Lot of tips ,tricks and hacks related to blogger . Seo tricks to get maximum targetted traffic to your blog.

Easy ways to Earn Online

Online earning is not so difficult but it needs a lot of patience and hardwork. Here are some techniques to earn money through internet.

Facebook Tricks

A lot of facebook tips , tricks and hacks.It requires a lot of time but reading is must.

Pro Hacking

If you have knowledge about basic techniques then try this,but be careful as it is highly toxic.

Monday, January 31, 2011

Ninite Easy PC setup

Install multiple apps at once without toolbars or clicking Next using Ninite .

1. Pick your favorite software .
2. Click "Get Installer" and run it.
3. You're done!  

No Toolbars
Ninite says "No" to toolbars
and other junk.
    No Clicking Ninite automates installers offscreen.
    32 and 64-bit Ninite installs the best version of an app for your PC.
    International Ninite installs apps in your PC's language.
    Fast No manual labor means installs finish quickly.
    And More Ninite Pro has even more features.
    CLICK HERE to enjoy the site.






Sunday, January 30, 2011

70 Things Every Computer Geek Should Know.

The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject.
A techie geek is usually one who knows a little about everything, and is thus the person family and friends turn to whenever they have a question. If you’re that type of person and are looking for a few extra skills to pick up, or if you’re a newbie aiming to get a handhold on the honor that is geekhood, read on to find out what skills you need to know.

1. The Meaning of Technical Acronyms


  • USB - Universal Serial Bus

  • GPU - Graphics Processing Unit

  • CPU - Central Processing Unit

  • SATA - Serial ATA

  • HTML - Hyper-text Markup Language

  • HTTP - Hypertext Transfer Protocol

  • FTP - File Transfer Protocol

  • P2P -  peer to peer

  • 2. How to Reset RAM

    If you rolled your eyes here, that is a good thing. If not, you have many things to learn, young padawan. It’s amazing how few people know how to do this. If you’re unsure, hit up the link below to find out how:
    **[Need more study on it]
    http://www.yousaytoo.com/sudjarwo/how-to-reset-ram-in-a-computer/29133

    3. Identify Keyloggers

    Internet cafes are the most likely place you’ll find them, followed by library, perhaps, and maybe even you own house if you’ve some unscrupulous friends/family. Identity theft groups warn about keyloggers and advocate checking out the keyboard yourself before continuing. Can you identify a keylogger, however, if one is plugged into the back of the system?
    Here’s what one looks like:
    Hit up this link for excellent info on keyloggers on public computers and how to protect yourself:
    , http://www.ghacks.net/2007/06/28/how-to-defeat-most-keyloggers-on-public-computers/

    4. Surf the Web Anonymously

    We won’t make any assumptions about why you may need this particular skill, but the fact remains that every geek should know how to traverse the Internet with the highest amount of security possible.
    Aside from the safest method-which is using a connection that is not yours-you will need the ultimate in proxies…Tor. Tor is an onion-routing system which makes it ‘impossible’ for someone to find out who you actually are.

    5. Bypass a Computer Password on All Major Operating Systems

    Obviously you shouldn’t use this to gain unlawful access to a computer. If you’re a geek, however, you’ll eventually end up in a situation where someone forgets their password, you acquire a machine with an operating system you cannot access, or similar situation.
    See this tutorial for info on how to bypass the password on the three major operating systems: Windows, Mac, and Linux.
    http://www.joetech.com/2009/01/29/how-to-crack-the-account-password-on-any-operating-system/

    6. Find a Users IP Address on AIM

    Knowing someones IP address is actually pretty useless in this case, but most people don’t realize that. If someone is harassing you via AIM and you can’t get them to stop, discovering their IP and sending it to them-with a nicely worded threat of law enforcement involvement should they not stop-is likely enough to send them scamping away with tail between legs.
    http://www.elitehackers.info/forums/archive/index.php/t-2827.html

    7. Hide a File Behind a JPEG

    So you need a nice spot to hide your blackmail personal files. You could, of course, bury them deeply within a series of random, useless folders, but there’s always the chance of them being discovered. A password protected RAR is the best choice, but it’s a bit obvious despite the most boring title you could give it.
    A sneaky person would hide the important file behind a completely random and boring family reunion photo, where no person in their right mind would shift through.
    http://www.online-tech-tips.com/computer-tips/hide-file-in-picture/

    8. Crack a Wifi Password

    This is one of those things you don’t need to do (hopefully), but that you still need to know just for the sake of knowledge. A strong WPA password is very secure, but most people don’t want to bother learning a convoluted series of letters, numbers, and symbols, instead opting for random everyday words.
    A good overall tutorial on wifi and cracking can be found here: http://docs.lucidinteractive.ca/index.php/Cracking_WEP_and_WPA_Wireless_Networks

    9. Monitor Network Traffic

    The Internet is a vast place with a bit of everything. Whether you’re curious about what your roommate is downloading, your kid is getting into, or any leeches living around you who’ve unscrupulously breached your wifi, knowing how to analyze network traffic is an invaluable skill.
    Here is a list of dozens of network analyzers, as well as some general info to get you started: http://www.slac.stanford.edu/xorg/nmtf/nmtf-tools.html

    10. Recover Master Boot Record

    A virus or other problem can lead to an MBR error, which will make it impossible to access install. Many users would simply become frustrated and reinstall, but not you! Every geek should know how to recover the master book record.
    Here is an excellent guide to get started: http://www.ntfs.com/mbr-damaged.htm

    11. Retrieve Data off Hard Drive

    There will come some point in your life when a hard drive craps out sans warning. It could be due to a number of reasons-physical damage, file corruption, etc. There are computer service centers that would be happy to extract the data for a (hefty) fee; a true geek would be the one working at center, not taking his or her drive there.
    To find out how to retrieve data off a damaged hard drive, read here: http://laptoplogic.com/resources/5-ways-to-retrieve-data-off-a-crashed-hard-drive

    12. Load Rockbox onto an MP3 Player

    The firmware that comes on your average mp3 player is intended for those who are scared of advanced features; often, the only audio settings available are a few prearranged EQs. If you’re an audiophile-or simply frustrated with the lack of control over your music settings-Rockbox is the firmware for you. Open source and free, it can be installed on several different types of players and enables full control over what you listen to.
    http://rockbox.org

    13. Unbrick a Smartphone

    No geek can resist the allure of flashing the newest beta firmware onto their shiny smartphone. The byproduct of that is sometimes a bricked phone, which would leave many sobbing into their pillow at night. To avoid rendering your $400 gadget into a door stopper, learn the fine art of unbricking and then flash away.
    As the method used to fix a phone will vary, this is the best place to start looking for answers: http://www.howardforums.com/

    14. Replace a Laptop Keyboard

    Keyboards get gummy after awhile. If you use yours a lot (aka: all day), then you probably eat over it at some point. Crumbs get into the keys and things are sticking, and before you know it, you need a new keyboard.
    http://www.refurbished-laptop-guide.com/how-to-remove-a-laptop-keyboard.html

    15. Rip Streaming Videos

    Streaming videos are officially in vogue. We’re not going to make any assumptions about what type of videos you are streaming and may want to keep, but no matter what it is, any geek could rip them while sipping a Red Bull and watching the latest episode of BSG.
    Here’s a hint to get you started: http://applian.com/download-videos/

    16. Strip Windows DRM

    DRM is incredibly annoying. With many online stores now offering DRM-free mp3 audio files, it would seem it’s not as big of an issue as it used to be. That is not not the case, however, with all videos bearing a DRM as well as music of a higher-quality than MP3.
    Stripping Windows DRM is not legal. If you’re a geek, your probably don’t care: http://undrm.info/remove-DRM-protection/FairUse4WM-freeware-DRM-removal-Windows-software-Strip-copy-protection-from-WMV-ASF-WMA-Windows-Media-Player.htm

    17. Homebrew Hack Game Systems

    Gaming consoles are notorious for having features you can’t use simply because the manufacturer decided to lock them down. As a geek, you can’t just be satisfied with the features they decided to give you. No, you have to crack that case open and take a peek inside. Every geek should know how to homebrew hack their system and unlock it’s full potential.

    18. Find a Website IP Address Without Web/Command Prompt Access

    Some school admins think they’re being sneaky when they lock down the command prompt and block all major IP search websites and block all the websites you actually want to visit. Of course, that is child’s play for any geek.
    First, to get a new command prompt, open Notepad and type: command.com. Then, save as “cmd.bat”. You now have a command prompt.
    Now, open the command prompt and type “ping http://www.website.com/” to find the IP address of that website.
    Enter the website into the browser and you will officially have impressed all your friends.

    19. Bypass School or Work Website Blocks

    What is a horrific situation for an average computer user is a simple irritation for an everyday geek. To bypass a website block/filter, simply enter that websites IP address in instead of the actual site address.

    20. Screw with Wifi Leeches

    Nobody likes a wifi leech. At best, they’re simply using up your valuable bandwidth. At the worst-and far more likely, they’re stealing your identity and watching your activities. After watching your network and identifying the leech, use this trick to flip their browser upside down and let them know you don’t appreciate the intrusion.
    http://tech.nocr.at/hacking-security/baffle-wifi-leeches-with-an-upside-down-ternet-2/

    21. Hexadecimal and Binary Number Systems

    Everyone knows the normal, everyday digit system used. It takes a special-possibly psychotic person-to also know hexadecimal and binary number systems.
    Here is an excellent interactive tutorial on learning the two systems: http://www.wisc-online.com/objects/index_tj.asp?objID=DIG1102

    22. How to Hot Wire a Car

    If your family always turns to you any time their computer hiccups, their DVD player needs fixed, or their home security system doesn’t activate, it’s only a matter of time before someone asks you how to hot wire a car. Wouldn’t it be great to be able to answer them?
    To learn this unique skill, read here: http://howto.wired.com/wiki/Hot_Wire_Your_Car

    23. Increase Wifi Range

    With so many small portable gadgets gaining more and more sophisticated web browsers, in addition to gaming systems like the PSP and DS, getting the most use out of your wifi is practically a geek necessity.
    Here is a good guide on extending your wifi’s range: http://www.mavromatic.com/archives/000451

    24. Carrying a Computer Cleaning Arsenal on Your USB Drive

    A good geek prepares for their friends stupidity. No matter how many times you tell them to stop downloading porn, they keep doing it until their machine is so infected it can’t drag itself into a grave. An arsenal of portable malware cleaners, a portable task manager, anti-virus, etc, will make those impromptu purging sessions all the easier.

    25. Running an Operating System from a USB Thumb Drive

    Most people don’t even understand what the magical operating system is. As a geek, you should transcend that basic knowledge and have a small operating system on your thumb drive handy for those times you need computer access but don’t know the password to a nearby computer.
    http://www.pendrivelinux.com/

    26. Understand What “There’s no Place Like 127.0.0.1″ Means

    A lot of geeks wear this shirt as a short hand code for their computer finesse-or maybe just to screw with other people who stare but cannot figure out what it means. No matter the reason, if you’d like an answer, check out the link below.
    http://www.tech-faq.com/127.0.0.1.shtml

    27. Read 1337 At Normal Speed

    Sure, everyone knows about it and it’s no longer cool, but if you’re going to proclaim yourself as a geek, you should be able to read it full speed. Who wants to choke in front of the wannabe that learned to read it full speed and flaunts it in your face?
    http://www.wikihow.com/Read-and-Write-in-1337

    28. At Least One Fictional Language

    And not only should you know a fictional language, but you should use it to say something about yourself. Do you choose Klingon or Quenya?
    Here’s a list of constructed languages: http://en.wikipedia.org/wiki/List_of_constructed_languages

    29. How to Survive in a Linux Argument

    Linux is gaining an all around higher standing in the geeksphere, and it’s bound to enter a conversation at some point (which will invariably end up turning into an argument). If you want to keep up, you’ll need to understand the basic points of Linux, as well as the general info of all basic things.
    Here’s a good place to read and gain a foothold: http://www.linux.com/articles/feature/

    30. Identify Major Constellations

    For those times you venture from the air-conditioned, computer filled basement of your parents house (or something like that), look up at the stars and have yourself a Galileo moment. The stars may just be dots to many people, but with the handy website below, you’ll be stopping man-belts and lions in no time.
    http://www.sky-watch.com/astronomy-guide/major-constellations.html

    31. Use a Camera in Manual Mode

    Sure, you could just use auto mode like everyone else too afraid to learn what some letters and numbers mean, but then you wouldn’t be much of a geek, would you? The oft-ignored dial on a camera is the key that unleashes the best quality photos possible, and every geek should be a whiz at using one.
    http://digital-photography-school.com/digital-camera-modes

    32. Who Mulder and Scully Are

    It seems that in the plethora of geek websites, there always appears a joke about Mulder and Scully, the two main characters from the X-Files. If you don’t know who they are, you’ll be left in the dark, alone, contemplating what exactly it was you were doing in the 90′s that you wouldn’t understand the joke.
    http://en.wikipedia.org/wiki/Mulder_and_Scully_(song)

    33. Javascript

    HTML is running the world (not really). Everyone knows some HTML and it makes them feel empowered. As a geek, you want to transcend that basic knowledge others share and know a little more. JavaScript is the answer-it is easy to learn if you’re not actually interested in web programming, but simply curious, and it looks scary to anyone who doesn’t know it.
    http://www.yourhtmlsource.com/javascript/basicjavascript.html

    34. How to Unlock an iPhone

    Sure, most geeks wouldn’t be caught dead with an iPhone, but what about your friends? You’re the smart techie, they’ll expect your to know how to unlock it.
    http://www.pcworld.com/article/137223/how_to_unlock_an_iphone.html

    35. How to Install Mac OS X on a PC

    Just because you don’t want Mac on your PC doesn’t mean you shouldn’t know how to do it. Knowledge is power, right? Go ahead, use this to stump your friends and family.
    http://dailyapps.net/2007/10/hack-attack-install-leopard-on-your-pc-in-3-easy-steps/

    36. Build a PC

    If you purchase a ready-made PC, you can be sure of one thing-you’re paying more than you should. Assembling your own PC isn’t too hard, and is the first thing you should be aiming to accomplish as a geek.
    Here is a massive article on assembling your own PC: http://www.pcmech.com/byopc/

    37. Tethering a Smartphone

    Nothing like a little wifi on the move, eh? Tethering a smartphone means using the Internet on your laptop/netbook via your cell phone. Of course, the method to do this depends on your phone, but here’s an article to get your started:
    http://www.tech-recipes.com/rx/2276/smartphones_bb_treo_tether_modem_usa_carriers/

    38. Wiring a Home Theater System

    Home theater systems used to consist of a TV and a chair. Gone are those days of simplicity, however, and setting up a modern system can be pure mind-boggling horror. Where does the modulator go, why does the DVD player have no video and the cable box no sound?
    Here’s a tutorial, including excellent diagrams, to show you how: http://www.prillaman.net/ht_info_8-wiring.html

    39. Replacing a Laptop LCD

    Laptop LCDs are vulnerable to many different mishaps: accidental pressure spots, shadows, airsoft pellets…. No matter, there will come a point when you need to swap your LCD for a new one. Now, as a geek, you probably don’t have an extended warranty. If that’s the case, here are some excellent pages and pictures on replacing the display:
    http://www.fonerbooks.com/laptop_4.htm

    40. Make a Laptop Cooling Pad

    Can you believe these cost $50?! A geek will need one, because data crunching/DVD ripping/videos playing/rendering at the same times tends to cause excess heat. Instead of shelling out your hard earned dollars, make your own like so: http://www.instructables.com/id/Lazy-mans-laptop-cooler/

    41. Unleash a Laser Pointer’s full potential

    A normal person uses a laser pointer to drive their dog crazy. A geek uses it to melt butter for their grilled cheese sandwich. To unless a laser pointer’s full strength, crack open the case, fry the resistor with a hot soldering iron, then snap it back together and keep it away from flesh/eyes/airplanes. The pointer will burn out after a few hours, but what a fun few hours they will be.
    Note: this is dangerous. Don’t do anything stupid.

    42. Keyboard Shortcuts

    This will depend on your operating system and the apps you use, so there’s no tutorial available. However, that is irrelevant-you’re a geek, you can find them yourself. Shortcuts are the difference between a slow computer user and a geek. The geek will always will out in a speed contest, because they do practically everything from their keyboard.

    43. Soldering Glasses Together

    Nerds use tape on broken glasses; geeks use solder. ‘Nuff said.

    44. How to Execute a Shell Script

    If you’re a true geek, you’ll need to do this at some point. Below are instructions on how to do so. Remember: always be cautious when running a script, you don’t want your computer to turn into a door stop, now do ya?
    http://www.mcsr.olemiss.edu/unixhelp/scrpt/scrpt1.2.html

    45. How to Hack a Pop Machine

    Okay, so stealing isn’t cool. Still, hacking is simply a misunderstood art, right? So hacking a pop machine isn’t really stealing, because it’s not about the pop, it about the pleasure of getting your way. Or something like that. (Newsflash, it is illegal, don’t do it.) If you want to try your fingers at getting a free Coke, check out this link:
    http://skattertech.com/soda-machine-hack/

    46. Turn a Laptop into a Digital Picture Frame

    So you want to show off pictures of your dog and that girl you once met, but you want to do it in an uber geeky way. Any schmuck can go to Walmart and buy a digital picture frame for a grossly inflated price. But you…oh, you’re too smart for that. No, instead you’ll find an old laptop on eBay for $5 and turn it into a true work of art.
    http://repair4laptop.org/notebook_picture_frame.html

    47. How to Mod a Flash Drive Case

    All the geeks are doing it…. Whatever. The case your flash drive came in is probably weak and most certainly plain. Why not jazz it up with your own unique style?
    Here’s one such case mod, and dozens of related projects: http://www.instructables.com/id/Metal-USB—Flash-drive-case-mod/

    48. Do Cool Things to Altoids Tins

    People are obsessed with these things. Altoids tins are durable, small, and just begging to be filled with LEDs, mp3 players, audio amps, and maybe some snuff. A good geek will find millions of uses for these little metal wonders. If you need a mental boost, however, here’s some interesting links:
    http://www.squidoo.com/altoids-tins

    49. Convert Cassette Tapes to Digital Audio Files

    If your geekhood started in the 90′s, then you probably have a least a few (dozen) cassette tapes still sitting around. Why not breathe digital life into them before they fall ill to mortal fate?
    http://lifehacker.com/software/mp3/alpha-geek-how-to-digitize-cassette-tapes-222394.php

    50. Lock Your Computer with a USB Drive

    You don’t want anyone getting into your files while you’re gone. A normal password would be enough to keep most people out, but what if you got super-secret X files on your computer? You can lock your machine down with a USB drive via these instructions:
    http://lionjkt.wordpress.com/2008/12/31/how-to-lock-your-computer-with-usb-drive/

    51. Run Your Own Ethernet Line

    Wifi has taken the place of a wired connection in many homes, and with good reasons-you can go anywhere, no cables necessary. What about those…sensitive…activities that you’d rather the neighborhood script kiddie didn’t see on your wifi? An Ethernet cable is your solution.
    To wire your own Ethernet, hit up this link: http://www.ertyu.org/steven_nikkel/ethernetcables.html

    52. Set Up a Streaming Media Server

    With digital files becoming the ultimate medium, many people have hundreds of gigabytes worth of music, videos, and pictures. You could keep them on a portable hard drive, but then you’re have to take it everywhere, and only one person could use it at a time. The solution is a streaming media server, something no geek can live without.
    http://www.n00tz.net/2008/07/vlc-media-server-ubuntu-hardy/

    53. Setting up a VPN

    If you’re like most geeks, you can’t live without your computers. They store your life in some poetic fashion, holding files you feel a personal connection with…. Anyway, if you are at work and suddenly realize you left an important picture at home (or you need blackmail material pronto), having a VPN ready to go will save you big time.
    http://www.computernetworkinghelp.com/content/view/41/1/

    54. Turn Webcams into Security Cameras

    Is someone stealing your Netflix DVDs? Do you suspect it is a fat hairy man in his boxers taking them each morning? If so, you can get your proof using a couple webcams and a bit of software.
    http://www.simplehelp.net/2006/09/27/how-to-use-your-pc-and-webcam-as-a-motion-detecting-and-recording-security-camera/

    55. Control Your House Lights with a Computer

    Controlling the lights in your house via computer is a great way to freak out the neighborhood kids ding-dong-ditching (assuming you wire up a Halloween scream motion sensor, also). If you reasons are less nefarious, you simply use it to turn on and off lights without having to life ye butt from thy seat, which is a good reason in itself.
    http://www.instructables.com/id/Control-lights-in-your-house-with-your-computer/

    56. Play Retro Games without Retro Consoles

    This applies to the geeks who enjoy gaming. Setting up an emulation PC on your TV is a great way to relive those games of old.

    57. Put LEDs Inside a Lightbulb

    The days of hot incandescent and mercury-laden fluorescent are gone, and in are the days of long lasting, low heat, low consumption LEDs. As any good geek, you want to be able to say “I was doing X long before it became mainstream.” Here’s your chance-the following link will show you how to put an LED inside a lightbulb, something sure to stump your friends the same way Grandpa’s ship-in-a-wine-bottle used to stump you.
    http://blog.makezine.com/archive/2006/06/make_a_led_bulb.html

    58. Create Music with Keyboard

    How awesome is KeyBored? This little app gives all of your QWERTY keys a piano note. When you type, it sounds like an infant monkey punching a keyboard. If you’ve got some musical chops, it won’t take you long to figure out the Star Wars theme or find a hidden musical message in Counter Strike control buttons.
    http://agdoa.net/ [edit:link updated]

    59. Make Your Office Ergonomic

    Face it-you spend a lot of time at your desk. You might even have a few extra pounds and pallid skin to show for it. While those things are temporary, far to common and more serious is the carpal tunnel, eye strain, and back problems you’ll develop from having a poor workspace.
    Hit up this link to create a body-friendly workspace that will keep you limber and flexible: http://www.ergotron.com/tabid/305/language/en-US/default.aspx

    60. Adding a Third Monitor

    Studies show that dual monitor increase work productivity by 30%. As a geek, you’ll need a third monitor to equal the dual setup of a layman (if that makes sense). While any hack with a VGA port can add a second monitor, it takes a true geek to add a third (or more). This will vary based on graphics/OS, so hit up Google for a tutorial or two.

    61. How to Convert a DVD to x264 (or XviD or DivX)

    It might seem like child’s play to you, but many individuals do not understand the fine art of converting a DVD into a digital file, let alone the careful skills it takes to achieve a happy balance between size and quality.
    Here is an excellent tutorial demonstrating how to rip a DVD with the multi-platform free software Handbrake: http://howto.diveintomark.org/ipod-dvd-ripping-guide/

    62. Flash System BIOS

    Ya gotta do it some time, so stop putting it off and man up. Flashing the BIOS on your laptop might seem scary (as it should-fear keeps you on your toes and prevents mistakes), but it’s not (actually, it is, but if you even understand why you need to do this, you’ve gotta have at least a few chops by now). Warning-you can seriously bork your computer doing this!
    http://www.pcstats.com/articleview.cfm?articleID=1605

    63. How to Irrecoverably Protect Data

    TrueCrypt, my friends. Learn to use TrueCrypt. If you have ask why, you don’t need it.

    64. The Fastest way to Kill a Computer

    It’s said that you have to get into a killers mind to understand their weaknesses, right? Same goes for the unfortunate boobs who always kill their laptops. Here’s a list of all the different ways you can accidentally kill a computer-arm your family and friends, and save yourself grief (because it’s surely you they will call when something goes horribly, horribly wrong).
    http://www.pcstats.com/articleview.cfm?articleID=1720

    65.GK for every drunken Geek

    Describing the advantages and disadvantages in various alcoholic drinks
    http://www.aagneyam.com/blog/?p=797

    66.Microsoft Network Monitor

    Microsoft Network Monitor is a network protocol analyzer that lets you capture, view, and analyze network traffic. Version 3.3 of Network Monitor is available in 32- and 64-bit versions

    67.Windows Sysinternals Suite

    The Windows Sysinternals Suite is a set of advanced tools for troubleshooting issues with Windows-based computers. These tools were originally developed by Winternals Software LP, which Microsoft acquired in 2006.
    http://download.sysinternals.com/Files/SysinternalsSuite.zip

    68.NTFS support for Mac OS.

    Mac OS X v10.3 and later include read-only support for NTFS-formatted partitions. The GPL-licensed NTFS-3G also works on Mac OS X through FUSE and allows reading and writing to NTFS partitions. A performance enhanced commercial version, called Tuxera NTFS for Mac, is also available from the NTFS-3G developers. NTFS write support has been discovered in Mac OS X 10.6, but has not been activated as of version 10.6.1, although hacks do exist to enable the functionality. However, user reports indicate the functionality is unstable and tends to cause kernel panics, probably the reason why write support has not been enabled or advertised.
    Download Tuxera NTFS for Mac 2010.9-RC

    69.15 Web Alternatives to Popular Desktop Software.

    Web applications have come a long way. They used to be amateur imitations of their desktop counterparts, with only one or two functions and not at all practical. But my, have these web apps grown. Web apps these days have become so powerful and useful that in some cases, they’ve begun to replace desktop software.
    http://web.appstorm.net/roundups/15-web-alternatives-to-popular-desktop-software/

    70.Top 6 Underground Search Engines You Never Knew About

    In many cases, these search engines are tapped into what is currently termed the “invisible web,” which is the information available on the Internet that standard search engines don’t have access to, because they are buried behind query forms or directory requests.
    http://www.makeuseof.com/tag/top-7-underground-search-engines-knew/







    Windows password cracker

    What is ophcrack?

    Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms.

    Features:

    • » Runs on Windows, Linux/Unix, Mac OS X, ...
    • » Cracks LM and NTLM hashes.
    • » Free tables available for Windows XP and Vista.
    • » Brute-force module for simple passwords.
    • » Audit mode and CSV export.
    • » Real-time graphs to analyze the passwords.
    • » LiveCD available to simplify the cracking.
    • » Loads hashes from encrypted SAM recovered from a Windows partition, Vista included.
    • » Free and open source software (GPL).

    Download







    Spyware and Security - I'm Having No Trouble!

    Sygate Personal Firewall

    I had been running Sygate for over a year when I received an offer to upgrade via a system notification. Unfortunately, the automated upgrade within the program didn't work so I pulled up the Sygate web page and found out that they had been purchased by Symantec. I'm not a Symantec fan because when my computer was new it came with a trial copy of Symantec fire wall but when it came time to pay up, I decided not to license the software and when I tried to uninstall their software it locked up my system! I had a terrible time uninstalling it. Therefore, I wasn't happy when I found out that Sygate was purchased by Symantec so I decided to look at other free firewalls. I downloaded Kerio and Zone Labs and I had problems with both. I liked Zone Labs but for some reason it locked up my system and I couldn't figure it out so I had to uninstall it. I was bummed out because I really liked the interface. So I tried Kerio and that worked OK for a while but then I started having core memory dumps. I had three very scary events and after the third event I booted up my system and there was a window from Kerio apologizing for the event and saying that it was their fault and it wanted me to send them an automatically generated report. It took too long to compile the report so I had to hit cancel before it was complete and then I uninstalled it. So after all of my efforts I ended up finding my old, and free, version of Sygate again. It's available on twocows. The free version is not available from Symantec's page. The Sygate firewall works pretty well for me. I've had no problems with it. The GUI isn't as fancy as some but it works and you can get the information you need. Best of all, it's reliable. The motto of this whole experience... If it works don't fix it!!!

    http://www.tucows.com/preview/213160


    Spyware Guard
    This is a great freeware application that provides the real-time monitoring that your system needs. It protects against browser hijacking and notifies you if a program tries to write to your registry. I don't run it all the time but it is nice to have on hand so you can engage it if things "heat up".

    http://www.javacoolsoftware.com/sgdownload.html


    LavaSoft

    One of the standard freeware packages for finding spyware that has hidden itself on your PC is LavaSoft. It scans your system and fixes the problems. LavaSoft has been around for a long time and they continually update their database. Every home computer should run this freeware at least once a month.

    http://www.lavasoftusa.com/


    Avast

    I think Avast is the best suite of anitvirus software on the market. They update regularly because they have a good fee based business that demands them to stay current and there is not any difference between the products that are free and their fee based stuff. Basically, Avast is free for the home user but it is a pay service if you are a business user. They provide a great service and have a strong business. The Avast suite is a little resource intensive but antivirus is an important function so this is a good spot to spend cycles. Every home user that runs Avast owes them a big thank you because we are getting a lot of value free of charge. If I were a business owner or if I had influence in a business where I worked, I would definitely be using Avast because they have proven themselves to me. I recommend them to you with confidence.

    http://www.avast.com/eng/programs.html


    CC Cleaner

    I've run CC Cleaner for years and it'’s always provided a good service. It enables you to clean just about every temporary file that is stored on your computer. Of course, you can select which files to delete. After it's set up, you push one button, and your system is cleaned in less than a minute. It also has a good software de-installer (under the "tools" tab).

    http://www.ccleaner.com/ccdownload.asp


    Harden It

    This is a security patch that tightens up some of the loop holes in your XP software. Run it and forget about it.

    http://www.sniff-em.com/harden-it.shtml


    SpyBot Search and Destroy

    Spybot is a very popular adware and virus scanner. Spybot is an essential part of any home computer system. The GUI is pretty intuitive so download it, learn what it does, and your computer will benefit. I don't spend much time protecting my PC from all the crap that is out there. If you take a few precautions (running spybot 1 time a month is one of them) you shouldn't have any trouble either.

    http://www.safer-networking.org/en/download/index.html


    XP Antispy


    This is a must have program for anyone running Windows XP. There are all kinds of things in Windows XP that you don't necessarily want to run. This program allows you to shut off a lot of the unnecessary services that your XP is running. This program puts a GUI around the administrative chore of shutting down the services. The GUI tells you what it is doing and provides some great information about the services so you can make the right choice on whether or not it is important for each service to run in your environment. Everyone running Windows XP should install and run this product because it tightens up your security and saves you a lot of resources.

    http://xp-antispy.org/index.php?option=com_remository&func=sellang&iso=en






    Administration Tools - Power to Change Your World!

    Process Explorer

    This is a replacement for task manager that provides more information and is more customizable. It took me several weeks to feel comfortable to disable Task Manager but I've completely migrated now. I've been running it for over three years now and it has proven itself to be a very stable program. Process Explorer is a very impressive freeware program and I think most people running XP, that know what they are doing, use this program in place of task manager. I think you will like it, you can change the colors of OS based services vs the services you start so it gives the user more flexibility. It also lists out the complete path and even more information on the dlls of each running process. Everyone should be running process explorer instead of task manager. Consider it a free upgrade from Task Manager!

    http://www.sysinternals.com/ntw2k/freeware/procexp.shtml


    Filemon

    This is another great free product from sysinternals. They have so many different products but I have found the combination of Process Explorer and Filemon to be very effective. If my machine disk is spinning like crazy and my CPU is off the chart I can find out what is going on by utilizing these 2 products. Process Explorer will tell me what is using CPU and ram but filemon tells me what products are opening files on your disk. This is crucial information... After you set up filemon and then open it up you will get a window "on the run" one of the buttons on top, I believe 2nd from the left, stops the scrolling so you can have a good hard look at which programs are causing your disk to spin. This is very useful.

    http://www.sysinternals.com/Utilities/Diskmon.html


    AutoRun

    You need to have some kind of window into your “start menu”. When you install programs a lot of them put an executable in your "start menu" and they automatically run when you turn on your computer. The good programs give you an option to place it there but many programs do it without asking you. Even for the programs that ask you if you want to run them on start up you always want to make changes to what runs and what doesn't at startup. This is the best program for looking into all the "start files" on your PC.

    http://www.sysinternals.com/ntw2k/freeware/autoruns.shtml


    Sysinternals
    A word of thanks to Sysinternals who has put out more quality free utilities than anyone else I know. There are several applications that I have not highlighted here because I personally have not found a need for them. However, I'm sure that some of my readers may find a need for some of them. If you are interested in really digging into things yourself just go to the Sysinternal's website and check out all the administrative tools they have for you!

    http://www.sysinternals.com/






    51 Free Tools to Stay Informed and Invisible on the Internet

    If you value your rapidly disappearing privacy while surfing the Internet you need to know about these tools. Whether you want to protect yourself from snoopers, want to spy on those out to get you, or want to be able to track trends that you know will lead to something big, then these tools will help you get the job done. The best part about them is they are FREE!
    “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.”
    -Google CEO Eric Schmidt
    Without a Trace
    If you want to use the Internet without anyone knowing who you are or leave an untraceable phone number or email address, then these tools are for you.
    1. Big String. Big String offers self-destructing IMs and emails for those who don’t want any evidence of their online communications. Use with many popular IM clients.
    2. Mozilla Firefox, Portable Edition. This free web browser leaves no personal information on your computer. Not only can you use this anywhere, but no one will know you were there.
    3. x Paranoia mod. This Firefox extension is great for those who want to leave nothing behind on the computer. With a couple of clicks you can clear all your Internet history, passwords, cookies, and cache.
    4. Bugmenot.com. If you’ve ever had to register with a site just to read an article or watch a video, then you will want this tool. Find login information for many websites that require registration and never have to give your information again.
    5. 10 Minute Mail. Use this tool to get an email address that is good for 10 minutes, then expires. This is a great way to register with sites that require an email validation or just to cover your tracks.
    6. inumbr. Get a disposable phone number that you can use to forward calls to any other phone in the U.S. No one will be able to trace you with this number.
    7. GrandCentral. Here’s another phone option when you don’t want to be traced by your number. Consolidate all your phones into one with this tool that gives you one voice mailbox and one number for all your phones.
    8. drop.io. Want to share a top-secret online file with someone and then have no sign of the evidence later? This is the tool for you. The file is deleted after 30 days.
    9. Fake Name Generator. If you need a name, address, email, or even a UPS tracking code, use this handy tool to generate any one of the necessary fakes.
    10. cl1p.net. Create a note or upload a photo that you can keep for yourself or share, then delete it when you are finished with absolutely no sign of what you had.
    Browsing Security
    If you want to browse the Internet in privacy, these tools will help you do just that. Use these to do the actual browsing or to check the security of your browsing privacy.
    1. Hide My Ass!. Hide your identity with this free tool. This proxy service will hide your IP address so no one will know you.
    2. Tor. Like getting secreted away, this free service allows you to hide your Internet identity with a “network of virtual tunnels.” Join journalists, government agencies, and more who use Tor for the ultimate in Internet privacy.
    3. Guardster. Another proxy service that hides your IP, this one is available in both free and for a fee versions. The free version does not work with encrypted SSL sites.
    4. Megaproxy. Paste the URL for whatever website you want to visit into this tool and you will have a completely private look at your target site. No registration or downloads needed to use this tool.
    5. Scandoo. Get real time protection when surfing the Internet with warnings about websites before you click on them. Based on ScanSafe technology, this home version is free.
    6. ShieldsUP!. Check out this tool to learn what information your browser is sending out. You can also test the effectiveness of your personal firewall when running ShieldsUP! testing.
    7. Privoxy. Privoxy is an open source non-caching web proxy with advanced filtering capabilities for enhancing privacy, modifying web page data and HTTP headers, controlling access, and removing ads and other obnoxious Internet junk.
    8. What Is My IP Address?. Use this tool to ensure your IP blocking software is working correctly and not revealing your true IP address.
    9. Clusty. Use this search engine when browsing. Clusty doesn’t save your information or track you at all when you use it.
    10. Scroogle. Try searching Google with this tool. Scroogle uses SSL to send your search terms to Google with encryption, then does the same when sending the results back to you.
    Computer Security
    Using the Internet is a huge open door for people to stick their nose in your business. Use these tools to slam that door tightly shut.
    1. Malwarebytes’ Anti-Malware. This anti-malware software is one of the best tools available for removing crap from your computer. Best when used in conjunction with Ad-Aware to keep your PC 99.999% malware free.
    2. avast!. This free anti-virus software is one of the best available (for free or for a fee) at protecting your computer. This tool will alert you any time malware is detected and even checks incoming email. avast! also includes a boot-time scan option.
    3. Ad-Aware. The free version of this software does an excellent job of protecting your computer against spyware and adware. The paid version gives you real-time protection which is not available with the free one.
    4. Sandboxie. This free tool is great for both protecting your computer and getting rid of evidence. It works as a temporary storage area for information that would normally go to and from your hard drive. When you are finished in the “sandbox,” you can just clear it out.
    5. ThreatFire. Use this in conjunction with your anti-virus to fend off malware. ThreatFire detects malicious behavior such as capturing keystrokes and also serves to defend against zero-day threats.
    6. SnoopFree Privacy Shield. The ultimate free software for the ultra-cautious, this tool will detect any method of privacy invasion through your keyboard, screen, and open windows.
    7. Comodo Firewall. Keep out hackers with this free firewall. This program is one of the best when it comes to protecting your computer.
    8. WinPatrol. Protect your privacy and your computer with this free tool that works by alerting you to “hijackings, malware attacks and critical changes made to your computer without your permission.”
    9. AVG Free Anti-Virus. Get anti-virus and anti-spyware protection from this free software. This software also includes a scheduled scan option.
    10. TrueCrypt. This disk encryption software will keep nosey-parkers at bay. You can create a virtual encrypted disk, encrypt USB flash drives and hard drives, and more.
    11. Trustable Downloader. Download files from the Internet without worries of Trojans, worms, or viruses with this free application. As described, this tool will help guard you against government spying on its citizens.
    12. SiteAdvisor. This software alerts you before you visit a website that has spyware or harvests your information for spam. Use their color-coded system to alert you to the potential dangers of websites.
    13. Peer Guardian 2. This IP blocker is capable of blocking incoming and outgoing connections. You can also select to block spyware, adware, and educational and government ranges.
    14. GlowWorm FW Lite . Mac users can use this software to be informed when a program attempts to make an outgoing connection. Not only will this tool protect your information, it also guards against malware.
    Laptop Tracking
    If someone makes off with your laptop, know how to stop them with these tools.
    1. Adeona. If you want to guard against someone taking your laptop, check out this tool. This software continually tells you where your laptop is located without the interference of any third party to help you track and recover your computer.
    2. iAlertU. Another laptop protection and tracking device, this one specifically for Macs, this software is based off mouse and keyboard movement which sets off an alarm, takes a photo of the thief, and emails the photo to a specified email address.
    Spying on Those Out to Get You
    If you know someone is trying to get to you, then turn the tables on them with these tools that will help you get the dirt on them.
    1. GotVoice. Take advantage of the 14 day free trial to have your target’s voice mail sent directly to you. If you need more time, get another 14 day trial with different information.
    2. Decoding Social Security Numbers in One Step. You can’t get everything out of that magical number with this tool, but you can narrow down the state and year of issue with any social security number instantly.
    3. Keylogger. This free software allows you to log everything entered on the keyboard so you can track computer usage. Be sure to use the stealth mode so your target doesn’t know you are tracking him.
    4. Decode Your License. This article describes how you can get a driver’s license from any state and decode the barcode on it to receive personal information. You will need the Internet tool described in the article and a scanner.
    5. Webcam Spy. Use this software to spy on your target using a webcam. The software activates the webcam with a motion sensor for an auto on and off feature. Spying on your target isn’t the only use for this-you can also use it in your home to see who comes by when you are gone.
    Maps for Monitoring Occurrences
    Whether you are looking for evidence for your conspiracy theory or trying to put all the pieces together on a plot you know is about to be hatched, then these maps will help you get all the information you need.
    1. Global Incident Map. Find out where terrorism is occurring around the world with this mapping tool. You be able to find plenty of patterns to put together your own theories.
    2. HealthMap. This tool will keep you posted on health alerts. Find outbreaks by geographical location, disease, or chronological occurrence.
    3. Who is Sick?. This Google map-based tool shows symptoms for any geographical spot. You’ll be able to track any type of outbreaks with this tool.
    4. Incident1. Track police, fire, and emergency services on this map. You can also do a search by zip code or select a region within the states.
    5. Incidentlog. If you live in the northeast and couldn’t find anything on Incident1, try Incidentlog for more options. This map is populated from a different pool of data.
    6. Havaria Information Service Alert Map. Find everything from earthquakes to hazmat incidences to biological hazards on this world map. You can narrow the results by country if you don’t want to see the world view.
    7. GeoMAC Wildfire Information. This map shows where wildfires are currently burning throughout the United States or check out past wildfires since 2002.
    8. Piracy Attacks Maps. Pirates on the high seas are not a thing of the past. Use this map to track current piracy around the world.
    9. UNEP: Atlas of Our Changing Environment. Sponsored by the United Nations Environment Programme, this map includes incidents that document environmental changes around the world. Click on each incident to see photos and read the story.
    10. Google Maps Mania. This unofficial site follows the incredible array of various interactive maps being used in conjunction with Google Maps. Find a map that tracks your favorite passion or create one of your own.






    Saturday, January 29, 2011

    Earn money thru adf.ly

    A URL shortener is an internet website that individuals utilize to shrink their long links.
     

    Hence, let us say you have a long URL like:

    http//example.com/thisisanexamaplesdffggllkkja/page1/page2/%20%page4/ex.html


    You can utilise an online based service link shrinker to shorten your URL to something resembling:


    http//adf.ly/ds3q/


    (which only has 18 characters)



    How much money can you make through Adf.ly?

    It is an apt question. The overall sum of income you can make through Adfly is dependent upon where the individuals whom click your Adf.ly urls are located.

    The pay rate on average is $2.00 per 1000 clicks. So far as I'm aware, this is the very best paying link shortening site around. Okay, $2.00 sounds small, although if you were using bitly or tinyurl, you would not be getting a cent. And think for a minute... How many people use Facebook? Over five hundred million people the world over utilize their Facebook accounts on a daily basis. I suggest, if you can get a small fragment of Facebook users to click your Adfly shortened links, you can well be earning a tidy amount of extra cash on the side! Among the many many vast ways to draw in lots of people to visit your Adfly shortened URL is to bring about your own Facebook group. A significant quantity of these groups include many many users - so, if you are able to get your thinking cap on, you'll be able to make good money with your links exceptionally swiftly. And do not just limit your thought to Facebook, consider all the other huge social networking internet sites where it is possible to post your adfly cash making urls... My adfly vs sheds added light on the subject.

    Your Adfly account...

    Adfly has a very simple to reach pay-threshold after you have made five dollars on your Adf.ly-account, your earnings wlll automatically get paid in to your PayPal account. If you do not have a Paypal account, do not be anxious, they're free of charge to possess, and straightforward to use.


    Step 1:

    CLICK HERE to create an account on the site .

    Step 2 :

    Now shorten different links and send it to your friends and whoever clicks on them you will get paid.






    Wednesday, January 26, 2011

    Add FaceBook Like Button For Blogger ( BlogSpot ) And Customize It.


    Few days ago, face book surprised us by launching a lot of social plugins, one of them, actually the most popular one yet is the famous like button,
    In this tutorial you’ll learn how to add it to your blogger blog.
    and you’ll learn how to customize
    • change the verb, like or recommend.
    • change it’s color.
    • change it’s font.
    Step 1. adding it to your template.
    The button code,


    <b:if cond='data:blog.pageType == &
    quot;item"'>
    <iframe allowTransparency='
    true' expr:src='"
    http://www.facebook.com/plugins/like.php?href=&
    quot; + data:post.url + "&
    layout=standard&show_faces=false&
    width=100&action=like&
    font=arial&
    colorscheme=light"' 
    frameborder='0' scrolling='no' 
    style='border:none; overflow:hidden; 
    width:450px; height:40px;'/>
    </b:if>
     
    where to add it ?

    Log into your blogger account, then go to Layout >> Edit Html.
    Before doing any thing you must check Expand Widget Templates box.
    And find the next Code



    <div class='post-header-line-1'/>

    And after it, paste your button code
    What, If you didn’t find the code above in your template, The try to find the following,

    <data:post.body/>
    And paste the button code Before it.
    click Save Template and you are done.

    Step 2. Customize your button & Demo.

    In the above code you can customize 3 parts. and i’ve colored them to make it easy for you to recognize,
    in the above code change the following parts,
    • like this part controls the verb that appear on your button, keep it as you see or change it to recommend if you want.
    • arial this part controls the font type, keep it or change it to one of the following, lucida+grande
      segoe+ui
      tahoma
      trebuchet+ms
      verdana
    • light this part controls your button color theme, and you have three options, light, evil, or dark
    • Update, How to make it appear on your home page.
    in the button code there are two parts you’ll need to remove to make this button appear on your home page, the first line and the last line, if you still don’t under stand, please see the following parts and delete it before pasting the code to your template,



    <b:if cond='data:blog.pageType == &
    quot;item"'>


    </b:if>
     

    I wish you all like it and please leave your comments if you need any help, can ask .






    Add Apture ToolBar For Your Blogger blog, With Some Great Features.

    Today no one can deny that the social bookmarking and sharing is one of the most important factors for making your blog more popular and more visible for all your targeted visitors.
    And i’m sure that you want to make it easier for your visitors to share your posts on their favorite social networking sites.
    today we’ll talk about the new Apture ToolBar and it’s features and how to add it to your blogger ( blogspot ) blog.

    About Apture ToolBar and it’s features. 
    The Apture Site Bar is a new way to give readers more information without leaving the page. this is what Apture authors says about the toolbar, but i’ll try to describe what is this toolbar can do for you,
    once your visitor scroll down on your blog, this bar will appear loaded with some great features.
    • Share on facebook button with a counter.
    • Tweet this for twitter button with a counter.
    • Share on email
    • Search box with jquery, and this mean that your visitor don’t have to leave the page when he search for another content.
    • When your visitor can select any part of your posts text small button will appear that says Search
    • You can customize it with your own logo.

    How To Add It To Your Blog.
    You can add it in a very easy way, please visit www.apture.com,
    and click Design a bar now
    and on the next page, please fill the following info.
    • Your website address:
    • Your email:
    • Upload a Logo or Set Title
    • you can upload your blog logo from your computer ( don’t forget to click upload ) , or just type your blog title.
    • Pick your bar color
    and now click Get my bar. please wait till the site finish loading and i’ll give you a code titled, Apture Magic Javascript
    Copy the code and now go to your blogger account,
    navigate to Layout >> Edit html and now find the following code.



    </body>
    and paste your toolbar code before it.
    Now Click Save Template
    That’s it, and you are now done and your blog ready to show the bar to see a demo for the toolbar please click here.







    Twitter Delicious Facebook Digg Stumbleupon Favorites More

     

    Recent Posts

    Join Me On Facebook

    200+ Followers

    Followers


    meet women in Ukraine contatore visite website counter

    Recent Comments

    Follow Me On Twitter

    1112+ Followers