Glassy Glassy: Future’s Mobile Phones

Designed by Mac Funamizu and dubbed Glassy Glassy, these amazing cool and ultra-gorgeous mobile phones are the guy’s vision of how cellphones will look
This is a really nice trick to hack a website and make its images go crazy.
It seems i just discovered that one line of text that will make images flying if you enter it on any website on earth with lots of images


How to hack a website and make images flying

G108 phone watch


Here is a new and amazing device which can invariably be called the most compact yet effective gadget available in the market today. Christened as the G108, this interesting piece has got features which are unique and at the same time quite user friendly too. This watch phone is the invention of China. Its impressive features will make you forget your mobile phones.
Today i will show you two ways to hack software and run a trial software forever.
Most of us are familiar with many softwares that run only for a specified period of time in the trial mode.Once the trial period is expired these softwares stop functioning and demand for a purchase.But there are ways to run the softwares and make them function beyond the trialperiod.


When these softwares are installed for the first time, they make an entry into the Windows Registry with the details such as Installed Date and Time, installed path etc.After installation every time you run the software, it compares the current system date and time with the installed date and time.So, with this it can make out whether the trial period is expired or not.

“Digital” mechanical clock


Wow! This one is really amazing! Briefly this is a mechanical clock that emulates digital one. The idea is quite simple and understandable, but the realization is magnificent, just look at the picture:

How to make a facebook virus


I heard from many of my friends that a virus is spreading on facebook which delete our accounts,I first thought it could have been a trojan that spread out,Then i found out that its just simple prank to shutdown your pc,Now today i will show you how to make a facebookvirus to trick your friends
In this tutorial I will show you how to make a Facebook virus using simple commands on notepad. .This will make the victim think they have got a virus when they click on an icon such as Internet Explorer .

LED wristwatch or a chic table?


For those who value time and also for those who do not want to lose track of the time (as in while having a chat with a friend over a cup of coffee), this LED wrist watch, called the Big Time will help you in keeping track of the time you have spent, apart from being used as a table.

How do i change my ip address



What is an ip address?
Every device connected to the public Internet is assigned a unique number known as an Internet Protocol (IP) address. IP addresses consist of four numbers separated by periods (also called a 'dotted-quad') and look something like 127.0.0.1.


Since these numbers are usually assigned to internet service providers within region-based blocks, an IP address can often be used to identify the region or country from which a computer is connecting to the Internet. An IP address can sometimes be used to show the user's general location.

Pantech Sky IM-R100 mobile phone

SKY IM-R100 is Pantech's first mobile phone to be equipped with Oki's FSE.

New gadget: G1 Android phone


Google G1 Android phone in Tagzania
Motorola announced last week that their next cell phones will be running Android, Google´s operating system. At the moment, Motorola´s mobile phones were using Symbian. This announcement is not the only one pointing that Android has a brilliant future. Other companies like Sony Ericsson, Toshiba



Here is the easiest way to download any video from Youtube.


BenQ-Siemens, the German-Taiwanese mobile phone manufacturer has released pictures of three amazing concept phones:
benq-siemens concept



What to do if your Google/gmail account is hacked?

Brute force attack

Brute Force Attack is the most widely known password cracking method. This attack simply tries to use every possible character combination as a password. To recover a one-character password it is enough to try 26 combinations (‘a’ to ‘z’). It is guaranteed that you will find thepassword

Samsung SCH-B550

 
Samsung SCH-B550 is a some kind of amazing phone because of its look. most of people says this asian phone will challenge nokia ngage mobiles.
The following article explains the method used for hacking into another persons computer remotely using command prompt in your network ie network computer hacking,I have also posted another article regarding computer hacking termed as How to hack a computer by netbios Hacking,which has a greater sucess rate than this method and written with relavent screen shots



Hacking into another persons computer - Method

Make virus in just one minute

Plx Reply and show your feed back
Here is a simple and easy trick to make a virus in less than 1 minute. :)

5 Programs to Customize Your Desktop

Dektop Icon Toy: http://www.idesksoft.com/

Recently Orkut updated it’s security feature and disabled Right-click on photos of friend’s album. So this makes it difficult to copy photos from Orkut. It’s a new security update made by Orkut to prevent people from copying photos from Orkut and misusing it. This may be annoying most of you! Then…
 
How To Copy Locked Photos From Orkut?

How to Make Vista Look Awesome!

To download any of the programs, search them in google you will find a free download for all of them (trials for some). To get new skins and cursors for all of the programs go to http://www.wincustomize.com/ You can also download 90% of the programs shown at that site. All you need to do is go to the site then look at the right hand side and click on the program of your choice then when it loads look near the top of the page and go to the official website for download before downloading any skins or bootscreens, etc. 

a sample of how you can mod your win xp to make it more and more funny! :)

the software's are:



In this article I will be showing you how to use Ms08_067_Netapi exploit in an Unpatched windows xp to gain access to the machine. The original name of the exploit is "Microsoft Server Service Relative Path Stack Corruption", This exploits helps bypassing NX on various operating systems and service packs, Before we jump into the actual exploitation process, i would suggest you taking some time looking at the exploit code here.

Metaspoit Framework is a open source penetrationtool used for developing and executing exploit code against a remote target machine it, Metasploit frame work has the world's largest database of public, tested exploits. In simple words, Metasploit can be used to test the vulnerability of computer systems in order to protect them and on the other hand it can  alsobe used to break into remote systems.

Its a powerful tool used for penetration testing. Learning to work with metasploit needs a lot of efforts and time. Ofcourse to can learn metasploit overnight, it needs lots of practice and patience

Download here(windows user)
http://www.metasploit.com/releases/framework-3.2.exe

Download here(linux user)
http://www.metasploit.com/releases/framework-3.2.tar.gz

Just give a look at following basic steps for beginners to break into a system using metasploit after gathering some information about the target system.

If you are an android users, you could be or might be the next victim of hackers, According to areport by Mcafee, Google android has became the number 1 target of hackers, The Mcafeereport also says that the recent attacks from hacktivists Anonymous and Lulzsec security helped in driving a massive increase in Online attacks.
According to the threat report the reason why google android is the number 1 target, is because google is not monitoring the active distribution of mobile apps. As a result of which android users are being the victim of massive malware attacks.


What kind of Malware is being distributed?

Lock a folder without any Third Party Software


In general life, we face many times Virus problems in various Folder Locking Softwares that are available on the Internet and most of the times the Viruses included in these Softwares are undetectable with the anti-vs. So, what is the best way for locking any content/folder, which can ensure our security & ends all the possibility of any Virus Infection. Don’t bother friends, here is the solution of your problem, today i am going to show you that how can you lock your own personal content/folder without any Folder lock Software :
Just follow these Instructions :
1- Open Notepad.
2- Copy following CODE :

cls

Hello Friends,
Steps For “How to Run these Commands”.

Go to Start Menu – Run and type in the command to run the specific application. Command are in front of the Program, while program names are first in the list. So, It comes in handy if you have the list of all programs with you.
Run command increases you productivity and saves lot of time as you don’t require to access start menu to launch any application or system utility.
Run Commands Listed below In Alphabetical Order
To search Press Ctrl +F & type the Action you need to do.

Hello Friends,
Steps For “How to Disable CD/DVD or USB drive Auto run.”
Well, this is one of my most suggested and favorite computer trick. What this small trick does is, it simply makes you to disable Autorun of any removable drives such as CD, DVD, Pen drives etc.

If you are feeling that somebody is physically accessing your computer & you don’t know at what time he/she is accessing your computer. Then friends here are the following steps to know the last shut down time of your computer:-
1. Go to start menu & write event viewer in search option & then hit enter. 

How to Back Up the Registry


Before you edit the registry, export the keys in the registry that you plan to edit, or back up the whole registry. If a problem occurs, you can then follow the steps how-to restore the registry to its previous state.

Is your computer infected with virus? Do you often get mysterious error messages? Well this is a common problem faced by almost all the computer users across the globe. There are many viruses and worms out there that could infect your computer. Some are harmless, but, they do have the capacity to do any number of nasty things, up to and including, erasing all data from your computer. However there are ways to keep viruses away from your PC. Here are the 12 tips to maintain a virus free computer.
1. Email is one of the common ways by which your computer can catch a virus. So it is always recommended to stay away from SPAM. Open only those emails that has it’s origin from a trusted source such as those which comes from your contact list. If you are using your own private email host (other than gmail, yahoo, hotmail etc.) then it is highly recommended that you use a good anti-spam software. And finally NEVER click on any links in the emails that comes from untrusted sources.

How to fix corrupted windows files in XP?
How to fix corrupted windows file is very easy.Following these following steps
Requirement:
1. Windows XP CD
Now, follow this steps:
1. Place the xp cd in your cd/dvd drive
2. Go to start
3. Run

Most Useful keyboard Shortcuts.

When speed counts, the keyboard is still king. Almost all the actions and commands you can perform with a mouse you can perform faster using combinations of keys on your keyboard. These simple keyboard shortcuts can get you where you want to go faster than several clicks of a mouse. You’ll work faster on spreadsheets and similar documents, too, because you won’t lose your place switching back and forth between mouse and keys. 



Here are some of the most useful keyboard shortcuts:
Copy. CTRL+C

Hi Guys
In this post i’ll be telling you how you can change start button name.
First of all you will have to download Resource hacker. Resource Hacker is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Win95, Win98, WinME, WinNT, Win2000 and WinXP operating systems.

Play with your Desktop Screen


Play with your Desktop Screen
Here is cool trick to rotate your computer screen. you can rotate it by 90 or 180 or 360 angle. You can invert your window screen an d can impress your friends, This is one of the scariest tricks which turns Windows upside down. Here are steps:

How to Become a Hacker


How to Become a Hacker

 
Most of us are very curious to learn Hacking and want to become a Hacker, but don’t know where to start. If you are in a samilar situation, then this article will most likely guide you to reach your goal.
On a regular basis, I get a lot of emails where people ask me ”How to Become a Hacker”.In fact, this question is not an easy one to answer, since hacking is not an art that can be mastered overnight. It requires knowledge, skills, creativity, dedication and of course the TIME. Everyone can become a hacker provided they learn it from the basics. So, if you wanna become a hacker, then all you need is a good source of knowledge that will guide you through various concepts of hacking from the basics.

What is CAPTCHA and How it Works?

CAPTCHA or Captcha (pronounced as cap-ch-uh) which stands for “Completely Automated Public Turing test to tell Computers and Humans Apart” is a type of challenge-response test to ensure that the response is only generated by humans and not by a computer. In simple words, CAPTCHA is the word verification test that you will come across the end of a sign-up form while signing up for Gmail or Yahoo account. The following image shows the typical samples of CAPTCHA. 






Internet Protocol (IP) addresses are usually of two types:Public and Private. If you have ever wondered to know what is the difference between a public and a private IP address, then you are at the right place. In this post I will try to explain the difference between a public and a private IP addres in layman’s terms so that it becomes simple and easy to understand.

As the fraudsters are now becoming more sophisticated in bypassing the Geo-location controls by using proxies (Anonymous IPs) to spoof their IP address, it has become very much necessary to come up with a means for detecting the proxies so that the authenticity of the users can be verified. Using a proxy (web proxy) is the simplest and easiest way to conceal the IP address of an Internet user and maintain the online privacy. However proxies are more widely used by online fraudsters to engage in cyber crimes since it is the easiest way to hide their actual Geo-location such as city/country through a spoofed IP address

In this post I will tell you about how the domain names are hacked and how they can be protected. The act of hacking domain names is commonly known as Domain Hijacking. For most of you, the term “domain hijacking” may seem to be like an alien. So let me first tell you what domain hijacking is all about.

Today in this post I’ll teach you how to protect your email account from being hacked. Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”. Now one question which arises in our mind is: “Is it so easy to hack an email accountOR Is it so difficult to protect an email account from being hacked?”. The single answer to these two questions is “Absolutely NOT!”. It is neither easy to hack an email nor difficult to protect an email account from bieng hacked.

Wondering to know how to hack an email account? Well, before you can do that, you need to understand the real ways of hacking that actually work and also that are simply scam and do not work.
So, here in this post, I am going to discuss some of theReal and Working Ways to hack emails; along with that, I am also going to make you aware of the common myths and scams associated with email hacking.