How To Play PS2 Games On PC

Wanna play PS2 games on your PC? Here is step by step tutorial with images that explains in details how to play PS2 games on your PC. 
STEP 1
First create New Folder, you can name folder what ever you want .In this example it’s PS2 folder.

Automated Blind SQL Injection Attacking Tools~bsqlbf Brute forcer


What is Blind SQL Injection:
Some Websites are vulnerable to SQL Injection but the results of injection are not visible to the attacker.  In this situation, Blind SQL Injection is used. The page with the vulnerability may not be one that displays data but will display differently depending on the results of a logical statement injected into the legitimate SQL statement called for that page. This type of attack can become time-intensive because a new statement must be crafted for each bit recovered. 

Shutdown some ones pc while chatting on msn or yahoo

Hi friends today my post will be regarding hacking msn.The tutorial actually helps youshutdown friends computer while chatting on msn or yahoo.The tutorial actually uses a windows trick to shutdown someones computer 











In this article I will discuss 3 important tips to significantly speed up your internet access through BSNL Dataone broadband connection.
Many BSNL Broadband and BSNL Dataone users  are frustated by BSNL DNS servers. These BSNL DNS are very unresponsive. The look up takes a long duration and many times just time out. I was much frustated by BSNL. But, since this is most cost-effective, i decided to tell you some tricks to speed up BSNL Dataone Broadband connection 


Glassy Glassy: Future’s Mobile Phones

Designed by Mac Funamizu and dubbed Glassy Glassy, these amazing cool and ultra-gorgeous mobile phones are the guy’s vision of how cellphones will look
This is a really nice trick to hack a website and make its images go crazy.
It seems i just discovered that one line of text that will make images flying if you enter it on any website on earth with lots of images


How to hack a website and make images flying

G108 phone watch


Here is a new and amazing device which can invariably be called the most compact yet effective gadget available in the market today. Christened as the G108, this interesting piece has got features which are unique and at the same time quite user friendly too. This watch phone is the invention of China. Its impressive features will make you forget your mobile phones.
Today i will show you two ways to hack software and run a trial software forever.
Most of us are familiar with many softwares that run only for a specified period of time in the trial mode.Once the trial period is expired these softwares stop functioning and demand for a purchase.But there are ways to run the softwares and make them function beyond the trialperiod.


When these softwares are installed for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc.After installation every time you run the software, it compares the current system date and time with the installed date and time.So, with this it can make out whether the trial period is expired or not.

“Digital” mechanical clock


Wow! This one is really amazing! Briefly this is a mechanical clock that emulates digital one. The idea is quite simple and understandable, but the realization is magnificent, just look at the picture:

How to make a facebook virus


I heard from many of my friends that a virus is spreading on facebook which delete our accounts,I first thought it could have been a trojan that spread out,Then i found out that its just simple prank to shutdown your pc,Now today i will show you how to make a facebookvirus to trick your friends
In this tutorial I will show you how to make a Facebook virus using simple commands on notepad. .This will make the victim think they have got a virus when they click on an icon such as Internet Explorer .

LED wristwatch or a chic table?


For those who value time and also for those who do not want to lose track of the time (as in while having a chat with a friend over a cup of coffee), this LED wrist watch, called the Big Time will help you in keeping track of the time you have spent, apart from being used as a table.

How do i change my ip address



What is an ip address?
Every device connected to the public Internet is assigned a unique number known as an Internet Protocol (IP) address. IP addresses consist of four numbers separated by periods (also called a 'dotted-quad') and look something like 127.0.0.1.


Since these numbers are usually assigned to internet service providers within region-based blocks, an IP address can often be used to identify the region or country from which a computer is connecting to the Internet. An IP address can sometimes be used to show the user's general location.

Pantech Sky IM-R100 mobile phone

SKY IM-R100 is Pantech's first mobile phone to be equipped with Oki's FSE.

New gadget: G1 Android phone


Google G1 Android phone in Tagzania
Motorola announced last week that their next cell phones will be running Android, Google´s operating system. At the moment, Motorola´s mobile phones were using Symbian. This announcement is not the only one pointing that Android has a brilliant future. Other companies like Sony Ericsson, Toshiba



Here is the easiest way to download any video from Youtube.


BenQ-Siemens, the German-Taiwanese mobile phone manufacturer has released pictures of three amazing concept phones:
benq-siemens concept



What to do if your Google/gmail account is hacked?

Brute force attack

Brute Force Attack is the most widely known password cracking method. This attack simply tries to use every possible character combination as a password. To recover a one-character password it is enough to try 26 combinations (‘a’ to ‘z’). It is guaranteed that you will find thepassword

Samsung SCH-B550

 
Samsung SCH-B550 is a some kind of amazing phone because of its look. most of people says this asian phone will challenge nokia ngage mobiles.
The following article explains the method used for hacking into another persons computer remotely using command prompt in your network ie network computer hacking,I have also posted another article regarding computer hacking termed as How to hack a computer by netbios Hacking,which has a greater sucess rate than this method and written with relavent screen shots



Hacking into another persons computer - Method

Make virus in just one minute

Plx Reply and show your feed back
Here is a simple and easy trick to make a virus in less than 1 minute. :)

5 Programs to Customize Your Desktop

Dektop Icon Toy: http://www.idesksoft.com/

Recently Orkut updated it’s security feature and disabled Right-click on photos of friend’s album. So this makes it difficult to copy photos from Orkut. It’s a new security update made by Orkut to prevent people from copying photos from Orkut and misusing it. This may be annoying most of you! Then…
 
How To Copy Locked Photos From Orkut?

How to Make Vista Look Awesome!

To download any of the programs, search them in google you will find a free download for all of them (trials for some). To get new skins and cursors for all of the programs go to http://www.wincustomize.com/ You can also download 90% of the programs shown at that site. All you need to do is go to the site then look at the right hand side and click on the program of your choice then when it loads look near the top of the page and go to the official website for download before downloading any skins or bootscreens, etc. 

a sample of how you can mod your win xp to make it more and more funny! :)

the software's are:



In this article I will be showing you how to use Ms08_067_Netapi exploit in an Unpatched windows xp to gain access to the machine. The original name of the exploit is "Microsoft Server Service Relative Path Stack Corruption", This exploits helps bypassing NX on various operating systems and service packs, Before we jump into the actual exploitation process, i would suggest you taking some time looking at the exploit code here.

Metaspoit Framework is a open source penetrationtool used for developing and executing exploit code against a remote target machine it, Metasploit frame work has the world's largest database of public, tested exploits. In simple words, Metasploit can be used to test the vulnerability of computer systems in order to protect them and on the other hand it can  alsobe used to break into remote systems.

Its a powerful tool used for penetration testing. Learning to work with metasploit needs a lot of efforts and time. Ofcourse to can learn metasploit overnight, it needs lots of practice and patience

Download here(windows user)
http://www.metasploit.com/releases/framework-3.2.exe

Download here(linux user)
http://www.metasploit.com/releases/framework-3.2.tar.gz

Just give a look at following basic steps for beginners to break into a system using metasploit after gathering some information about the target system.

If you are an android users, you could be or might be the next victim of hackers, According to areport by Mcafee, Google android has became the number 1 target of hackers, The Mcafeereport also says that the recent attacks from hacktivists Anonymous and Lulzsec security helped in driving a massive increase in Online attacks.
According to the threat report the reason why google android is the number 1 target, is because google is not monitoring the active distribution of mobile apps. As a result of which android users are being the victim of massive malware attacks.


What kind of Malware is being distributed?

Lock a folder without any Third Party Software


In general life, we face many times Virus problems in various Folder Locking Softwares that are available on the Internet and most of the times the Viruses included in these Softwares are undetectable with the anti-vs. So, what is the best way for locking any content/folder, which can ensure our security & ends all the possibility of any Virus Infection. Don’t bother friends, here is the solution of your problem, today i am going to show you that how can you lock your own personal content/folder without any Folder lock Software :
Just follow these Instructions :
1- Open Notepad.
2- Copy following CODE :

cls

Hello Friends,
Steps For “How to Run these Commands”.

Go to Start Menu – Run and type in the command to run the specific application. Command are in front of the Program, while program names are first in the list. So, It comes in handy if you have the list of all programs with you.
Run command increases you productivity and saves lot of time as you don’t require to access start menu to launch any application or system utility.
Run Commands Listed below In Alphabetical Order
To search Press Ctrl +F & type the Action you need to do.

Hello Friends,
Steps For “How to Disable CD/DVD or USB drive Auto run.”
Well, this is one of my most suggested and favorite computer trick. What this small trick does is, it simply makes you to disable Autorun of any removable drives such as CD, DVD, Pen drives etc.

If you are feeling that somebody is physically accessing your computer & you don’t know at what time he/she is accessing your computer. Then friends here are the following steps to know the last shut down time of your computer:-
1. Go to start menu & write event viewer in search option & then hit enter. 

How to Back Up the Registry


Before you edit the registry, export the keys in the registry that you plan to edit, or back up the whole registry. If a problem occurs, you can then follow the steps how-to restore the registry to its previous state.

Is your computer infected with virus? Do you often get mysterious error messages? Well this is a common problem faced by almost all the computer users across the globe. There are many viruses and worms out there that could infect your computer. Some are harmless, but, they do have the capacity to do any number of nasty things, up to and including, erasing all data from your computer. However there are ways to keep viruses away from your PC. Here are the 12 tips to maintain a virus free computer.
1. Email is one of the common ways by which your computer can catch a virus. So it is always recommended to stay away from SPAM. Open only those emails that has it’s origin from a trusted source such as those which comes from your contact list. If you are using your own private email host (other than gmail, yahoo, hotmail etc.) then it is highly recommended that you use a good anti-spam software. And finally NEVER click on any links in the emails that comes from untrusted sources.

How to fix corrupted windows files in XP?
How to fix corrupted windows file is very easy.Following these following steps
Requirement:
1. Windows XP CD
Now, follow this steps:
1. Place the xp cd in your cd/dvd drive
2. Go to start
3. Run

Most Useful keyboard Shortcuts.

When speed counts, the keyboard is still king. Almost all the actions and commands you can perform with a mouse you can perform faster using combinations of keys on your keyboard. These simple keyboard shortcuts can get you where you want to go faster than several clicks of a mouse. You’ll work faster on spreadsheets and similar documents, too, because you won’t lose your place switching back and forth between mouse and keys. 



Here are some of the most useful keyboard shortcuts:
Copy. CTRL+C

Hi Guys
In this post i’ll be telling you how you can change start button name.
First of all you will have to download Resource hacker. Resource Hacker is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Win95, Win98, WinME, WinNT, Win2000 and WinXP operating systems.

Play with your Desktop Screen


Play with your Desktop Screen
Here is cool trick to rotate your computer screen. you can rotate it by 90 or 180 or 360 angle. You can invert your window screen an d can impress your friends, This is one of the scariest tricks which turns Windows upside down. Here are steps:

How to Become a Hacker


How to Become a Hacker

 
Most of us are very curious to learn Hacking and want to become a Hacker, but don’t know where to start. If you are in a samilar situation, then this article will most likely guide you to reach your goal.
On a regular basis, I get a lot of emails where people ask me ”How to Become a Hacker”.In fact, this question is not an easy one to answer, since hacking is not an art that can be mastered overnight. It requires knowledge, skills, creativity, dedication and of course the TIME. Everyone can become a hacker provided they learn it from the basics. So, if you wanna become a hacker, then all you need is a good source of knowledge that will guide you through various concepts of hacking from the basics.