Friday 19 November 2010

Web-Site Downloader(Offline Web Browser)

Welcome

HTTrack is a free (GPL, libre/free software) and easy-to-use offline browser utility.
It allows you to download a World Wide Web site from the Internet to a local directory, building recursively all directories, getting HTML, images, and other files from the server to your computer. HTTrack arranges the original site's relative link-structure. Simply open a page of the "mirrored" website in your browser, and you can browse the site from link to link, as if you were viewing it online. HTTrack can also update an existing mirrored site, and resume interrupted downloads. HTTrack is fully configurable, and has an integrated help system.
WinHTTrack is the Windows 2000/XP/Vista/Seven release of HTTrack, and WebHTTrack the Linux/Unix/BSD release. See the download page.



Friday 12 November 2010

Commands

ADDUSERS --Add or list users to/from a CSV file
ARP -- Address Resolution Protocol
ASSOC -- Change file extension associations
ASSOCIAT --One step file association
AT -- Schedule a command to run at a later time
ATTRIB --Change file attributes

BOOTCFG --Edit Windows boot settings
BROWSTAT --Get domain, browser and PDC info

CACLS -- Change file permissions
CALL --Call one batch program from another
CD --Change Directory - move to a specific Folder
CHANGE-- Change Terminal Server Session properties
CHKDSK -- Check Disk - check and repair disk problems
CHKNTFS -- Check the NTFS file system
CHOICE --Accept keyboard input to a batch file
CIPHER --Encrypt or Decrypt files/folders
CleanMgr ---Automated cleanup of Temp files, recycle bin
CLEARMEM ---Clear memory leaks
CLIP ---Copy STDIN to the Windows clipboard.
CLS ---Clear the screen
CLUSTER ---Windows Clustering
CMD ---Start a new CMD shell
COLOR --- Change colors of the CMD window
COMP ---Compare the contents of two files or sets of files
COMPACT --- Compress files or folders on an NTFS partition
COMPRESS ---Compress individual files on an NTFS partition
CON2PRT ---Connect or disconnect a Printer
CONVERT ---Convert a FAT drive to NTFS.
COPY ---Copy one or more files to another location
CSCcmd ---Client-side caching (Offline Files)
CSVDE ---Import or Export Active Directory data

DATE --- Display or set the date
Dcomcnfg DCOM ---Configuration Utility
DEFRAG ---Defragment hard drive
DEL ---Delete one or more files
DELPROF--- Delete NT user profiles
DELTREE ---Delete a folder and all subfolders
DevCon ---Device Manager Command Line Utility
DIR ---Display a list of files and folders
DIRUSE --- Display disk usage
DISKCOMP--- Compare the contents of two floppy disks
DISKCOPY ---Copy the contents of one floppy disk to another
DNSSTAT ---DNS Statistics
DOSKEY --- Edit command line, recall commands, and create macros
DSADD ---Add user (computer, group..) to active directory
DSQUERY--- List items in active directory
DSMOD ---Modify user (computer, group..) in active directory

ECHO--- Display message on screen
ENDLOCAL--- End localisation of environment changes in a batch file
ERASE ---Delete one or more files
EXIT ---Quit the current script/routine and set an errorlevel.
EXPAND --- Uncompress files
EXTRACT--- Uncompress CAB files

FC--- Compare two files
FDISK--- Disk Format and partition
FIND ---Search for a text string in a file
FINDSTR--- Search for strings in files
FOR /F ---Loop command: against a set of files
FOR /F ---Loop command: against the results of another command
FOR ---Loop command: all options Files, Directory, List
FORFILES ---Batch process multiple files
FORMAT ---Format a disk
FREEDISK ---Check free disk space (in bytes)
FSUTIL --- File and Volume utilities
FTP --- File Transfer Protocol
FTYPE--- Display or modify file types used in file extension associations

GLOBAL --- Display membership of global groups
GOTO ---Direct a batch program to jump to a labelled line

HELP--- Online Help
HFNETCHK--- Network Security Hotfix Checker

IF--- Conditionally perform a command
IFMEMBER Is the current user in an NT Workgroup
IPCONFIG Configure IP

KILL Remove a program from memory

LABEL --- Edit a disk label
LOCAL --- Display membership of local groups
LOGEVENT--- Write text to the NT event viewer.
LOGOFF --- Log a user off
LOGTIME --- Log the date and time in a file

MAPISEND ---Send email from the command line
MEM --- Display memory usage
MD --- Create new folders
MKLINK --- Create a symbolic link (linkd)
MODE ---Configure a system device
MORE --- Display output, one screen at a time
MOUNTVOL ----Manage a volume mount point
MOVE --- Move files from one folder to another
MOVEUSER--- Move a user from one domain to another
MSG ---Send a message
MSIEXEC --- Microsoft Windows Installer
MSINFO ---Windows NT diagnostics
MSTSC --- Terminal Server Connection (Remote Desktop Protocol)
MUNGE --- Find and Replace text within file(s)
MV --- Copy in-use files

NET --- Manage network resources
NETDOM --- Domain Manager
NETSH ---Configure network protocols
NETSVC ---Command-line Service Controller
NBTSTAT --- Display networking statistics (NetBIOS over TCP/IP)
NETSTAT --- Display networking statistics (TCP/IP)
NOW --- Display the current Date and Time
NSLOOKUP--- Name server lookup
NTBACKUP ---Backup folders to tape
NTRIGHTS E---dit user account rights

PATH --- Display or set a search path for executable files
PATHPING ---Trace route plus network latency and packet loss
PAUSE --- Suspend processing of a batch file and display a message
PERMS --- Show permissions for a user
PERFMON ---Performance Monitor
PING ---Test a network connection
POPD --- Restore the previous value of the current directory saved by PUSHD
PORTQRY--- Display the status of ports and services
PRINT --- Print a text file
PRNCNFG --- Display, configure or rename a printer
PRNMNGR --- Add, delete, list printers set the default printer
PROMPT --- Change the command prompt
PsExec --- Execute process remotely
PsFile --- Show files opened remotely
PsGetSid --- Display the SID of a computer or a user
PsInfo ---List information about a system
PsKill --- Kill processes by name or process ID
PsList --- List detailed information about processes
PsLoggedOn ---Who's logged on (locally or via resource sharing)
PsLogList ---Event log records
PsPasswd --- Change account password
PsService --- View and control services
PsShutdown ---Shutdown or reboot a computer
PsSuspend ---Suspend processes
PUSHD --- Save and then change the current directory

QGREP --- Search file(s) for lines that match a given pattern.

RASDIAL ---Manage RAS connections
RASPHONE ---Manage RAS connections
RECOVER --- Recover a damaged file from a defective disk.
REG --- Registry: Read, Set, Export, Delete keys and values
REGEDIT --- Import or export registry settings
REGSVR32--- Register or unregister a DLL
REGINI ---Change Registry Permissions
REM --- Record comments (remarks) in a batch file
REN --- Rename a file or files.
REPLACE --- Replace or update one file with another
RD ---Delete folder(s) [remove dir]
RDISK ---Create a Recovery Disk
RMTSHARE ---Share a folder or a printer
ROBOCOPY--- Robust File and Folder Copy
ROUTE --- Manipulate network routing tables
RUNAS --- Execute a program under a different user account
RUNDLL32--- Run a DLL command (add/remove print connections)

SC --- Service Control
SCHTASKS--- Create or Edit Scheduled Tasks
SCLIST --- Display NT Services
ScriptIt Control ---GUI applications
SET --- Display, set, or remove environment variables
SETLOCAL--- Control the visibility of environment variables
SETX ---Set environment variables permanently
SHARE --- List or edit a file share or print share
SHIFT --- Shift the position of replaceable parameters in a batch file
SHORTCUT ---Create a windows shortcut (.LNK file)
SHOWGRPS ---List the NT Workgroups a user has joined
SHOWMBRS ---List the Users who are members of a Workgroup
SHUTDOWN ---Shutdown the computer
SLEEP --- Wait for x seconds
SOON --- Schedule a command to run in the near future
SORT --- Sort input
START --- Start a separate window to run a specified program or command
SU ---Switch User
SUBINACL ---Edit file and folder Permissions, Ownership and Domain
SUBST --- Associate a path with a drive letter
SYSTEMINFO--- List system configuration
TASKLIST--- List running applications and services
TIME ---Display or set the system time
TIMEOUT--- Delay processing of a batch file
TITLE --- Set the window title for a CMD.EXE session
TOUCH --- Change file timestamps
TRACERT --- Trace route to a remote host
TREE --- Graphical display of folder structure
TYPE --- Display the contents of a text file
USRSTAT--- List domain usernames and last login
VER ---Display version information
VERIFY --- Verify that files have been saved
VOL --- Display a disk label
WHERE --- Locate and display files in a directory tree
WHOAMI --- Output the current UserName and domain
WINDIFF --- Compare the contents of two files or sets of files
WINMSD --- Windows system diagnostics
WINMSDP--- Windows system diagnostics II
WMIC ---WMI Commands
XCACLS --- Change file permissions
XCOPY--- Copy files and folders

How do you open .dll file ?

How do you open .dll files to see what is written inside?

A DLL is a library file that contains a number of ready-to-use code to do something. For example, iphlpapi.dll contains functions or a ready-to-use code to read all TCP "like msn" connections and to kill a particular TCP connection.

You can use a program such as "DLL Export Viewer" (see Related link below) to view DLL files.


Is it possible to read a dll file?

Answer
A program called Resource Hacker will yet you read and change some dll. http://www.users.on.net/johnson/resourcehacker

Tuesday 12 October 2010

Laptop Repair Videos










OVER OTHER LINKS:-

Hacking Hotmail ||Doxing and Reverting||

I know this has been posted many times. However, I have not seen a complete tutorial like this one. This is 100% my work.
This is a complete tutorial on Doxing and Reverting
(Hacking Hotmail)
For the sake of simplicity, I will be using he instead of he/she and him instead of him/her.
FAQ
What is doxing?
Doxing is collecting data about the victim you are going to revert. This brings us to our next FAQ.
What is reverting?
Reverting is using your dox to reset the victim’s password using the “reset my password” form.
Doxing
1. Find a victim
2. Find everything you can about him
3. Write it down
Step one
Find a suitable victim, if he has Facebook, it is all the better. Find out what social networking sites he is registered on, it will come in handy in the next step.
Step two
Next is to find out everything you can about the victim. If you want, you can even stalk him in real life. I advise you use http://pipl.com/ and http://com.lullar.com/ first because they have a very good searching system. If you want, you can try out these links:
This tutorial is property of alfonzo1955 and I am a lousy ripper.
http://www.411.com/
http://www.ask.com/
http://www.bebo.com/
http://www.facebook.com/
http://www.flickr.com/
http://www.ip-adress.com/ipaddresstolocation/
http://www.myspace.com/
http://www.myyearbook.com/
http://www.searchenginez.com/findpeople.html
http://www.skipease.com/
http://www.sonico.com/
http://www.spock.com/
http://www.twitter.com/
http://www.usatrace.com/
http://www.whitepages.com
http://www.whois.com/
http://www.whois.net/
http://www.wink.com/
http://www.youtube.com
http://www.zabasearch.com/
http://www.zoominfo.com
Step three
Time to write all of that info down that you collected in step two. Here is a basic form you should fill out before attempting to revert.
Full name:
Primary Email:
Other Emails:
IP address:
Country:
Province/state:
Zip/Postal Code:
Phone number:
Cellphone number:
Mother’s full name:
Father’s full name:
Reverting
Time to revert the accounts. This tutorial will only cover reverting Hotmail accounts.
I hope I helped you in this tutorial! Also, if you liked it, you know what to do.

Credits Goes To Ankit

Hack gmail id[at random]

In This hack we need not to send anything like keylogger or make victim login on phishing pages
this hack worked for me and many others we can hack gmail id but not targeted one its at random!
1
step 2:-
Now open new tab and go to http://www.gmail.com and click on i cant access my account …
Step 3:-
click on i forgot my username and then click on username recovery page..
2
Step 4:-
now write some thing like tom,jhon,hacker,spider,jasica,..etc in my case i will write
tom@mailinator.com and then click submit and then again click write the captcha and click submit…. .i.e vactim@mailinator.com
12
step 5:-
now open http://www.mailinator.com and in my case i will write tom and then search
and i will c in inbox mail from gmail
11
as i can hack this helloheyster@gmail.com
loans4dreams@gmail.com
tom09876479@gmail.com
ydenneknotyalc@gmail.com
this all email of tom…….
now just copy this and paste it in notepad
Step 6:-
goo to http://www.gmail.com and click i cant acces my acount and then click i forget my password and then pasword recovery page
Step 7:-
write the email address u want to hack in my case i will write helloheyster@gmail.com and then click submit and then enter the captcha
and click submit…
Step 8:-
Go to http://www.mailinator.com again open tom and click serch and u will c another email on his inbox by gmail and open that
Step 9:-
their will be link and click on that link and reset the pasword …

Credit Goes to  Ankit

Friday 1 October 2010

What is the Registry?



What is the Registry?
The Registry is a database used to store settings and options for the 32 bit versions of Microsoft Windows including Windows 95, 98, ME and NT/2000. It contains information and settings for all the hardware, software, users, and preferences of the PC. Whenever a user makes changes to a Control Panel settings, or File Associations, System Policies, or installed software, the changes are reflected and stored in the Registry.

The physical files that make up the registry are stored differently depending on your version of Windows; under Windows 95 & 98 it is contained in two hidden files in your Windows directory, called USER.DAT and SYSTEM.DAT, for Windows Me there is an additional CLASSES.DAT file, while under Windows NT/2000 the files are contained seperately in the %SystemRoot%\System32\Config directory. You can not edit these files directly, you must use a tool commonly known as a "Registry Editor" to make any changes (using registry editors will be discussed later in the article).

The Structure of The Registry
The Registry has a hierarchal structure, although it looks complicated the structure is similar to the directory structure on your hard disk, with Regedit being similar to Windows Explorer.

Each main branch (denoted by a folder icon in the Registry Editor, see left) is called a Hive, and Hives contains Keys. Each key can contain other keys (sometimes referred to as sub-keys), as well as Values. The values contain the actual information stored in the Registry. There are three types of values; String, Binary, and DWORD - the use of these depends upon the context.

There are six main branches, each containing a specific portion of the information stored in the Registry. They are as follows:


* HKEY_CLASSES_ROOT - This branch contains all of your file association mappings to support the drag-and-drop feature, OLE information, Windows shortcuts, and core aspects of the Windows user interface.
* HKEY_CURRENT_USER - This branch links to the section of HKEY_USERS appropriate for the user currently logged onto the PC and contains information such as logon names, desktop settings, and Start menu settings.
* HKEY_LOCAL_MACHINE - This branch contains computer specific information about the type of hardware, software, and other preferences on a given PC, this information is used for all users who log onto this computer.
* HKEY_USERS - This branch contains individual preferences for each user of the computer, each user is represented by a SID sub-key located under the main branch.
* HKEY_CURRENT_CONFIG - This branch links to the section of HKEY_LOCAL_MACHINE appropriate for the current hardware configuration.
* HKEY_DYN_DATA - This branch points to the part of HKEY_LOCAL_MACHINE, for use with the Plug-&-Play features of Windows, this section is dymanic and will change as devices are added and removed from the system.



Each registry value is stored as one of five main data types:


* REG_BINARY - This type stores the value as raw binary data. Most hardware component information is stored as binary data, and can be displayed in an editor in hexadecimal format.
* REG_DWORD - This type represents the data by a four byte number and is commonly used for boolean values, such as "0" is disabled and "1" is enabled. Additionally many parameters for device driver and services are this type, and can be displayed in REGEDT32 in binary, hexadecimal and decimal format, or in REGEDIT in hexadecimal and decimal format.
* REG_EXPAND_SZ - This type is an expandable data string that is string containing a variable to be replaced when called by an application. For example, for the following value, the string "%SystemRoot%" will replaced by the actual location of the directory containing the Windows NT system files. (This type is only available using an advanced registry editor such as REGEDT32)
* REG_MULTI_SZ - This type is a multiple string used to represent values that contain lists or multiple values, each entry is separated by a NULL character. (This type is only available using an advanced registry editor such as REGEDT32)
* REG_SZ - This type is a standard string, used to represent human readable text values.



Other data types not available through the standard registry editors include:


* REG_DWORD_LITTLE_ENDIAN - A 32-bit number in little-endian format.
* REG_DWORD_BIG_ENDIAN - A 32-bit number in big-endian format.
* REG_LINK - A Unicode symbolic link. Used internally; applications should not use this type.
* REG_NONE - No defined value type.
* REG_QWORD - A 64-bit number.
* REG_QWORD_LITTLE_ENDIAN - A 64-bit number in little-endian format.
* REG_RESOURCE_LIST - A device-driver resource list.



Editing The Registry

The Registry Editor (REGEDIT.EXE) is included with most version of Windows (although you won't find it on the Start Menu) it enables you to view, search and edit the data within the Registry. There are several methods for starting the Registry Editor, the simplest is to click on the Start button, then select Run, and in the Open box type "regedit", and if the Registry Editor is installed it should now open and look like the image below.

An alternative Registry Editor (REGEDT32.EXE) is available for use with Windows NT/2000, it includes some additional features not found in the standard version, including; the ability to view and modify security permissions, and being able to create and modify the extended string values REG_EXPAND_SZ & REG_MULTI_SZ.

Create a Shortcut to Regedit
This can be done by simply right-clicking on a blank area of your desktop, selecting New, then Shortcut, then in the Command line box enter "regedit.exe" and click Next, enter a friendly name (e.g. 'Registry Editor') then click Finish and now you can double click on the new icon to launch the Registry Editor.

Using Regedit to modify your Registry
Once you have started the Regedit you will notice that on the left side there is a tree with folders, and on the right the contents (values) of the currently selected folder.

Like Windows explorer, to expand a certain branch (see the structure of the registry section), click on the plus sign [+] to the left of any folder, or just double-click on the folder. To display the contents of a key (folder), just click the desired key, and look at the values listed on the right side. You can add a new key or value by selecting New from the Edit menu, or by right-clicking your mouse. And you can rename any value and almost any key with the same method used to rename files; right-click on an object and click rename, or click on it twice (slowly), or just press F2 on the keyboard. Lastly, you can delete a key or value by clicking on it, and pressing Delete on the keyboard, or by right-clicking on it, and choosing Delete.

Note: it is always a good idea to backup your registry before making any changes to it. It can be intimidating to a new user, and there is always the possibility of changing or deleting a critical setting causing you to have to reinstall the whole operating system. It's much better to be safe than sorry!

Importing and Exporting Registry Settings

A great feature of the Registry Editor is it's ability to import and export registry settings to a text file, this text file, identified by the .REG extension, can then be saved or shared with other people to easily modify local registry settings. You can see the layout of these text files by simply exporting a key to a file and opening it in Notepad, to do this using the Registry Editor select a key, then from the "Registry" menu choose "Export Registry File...", choose a filename and save. If you open this file in notepad you will see a file similar to the example below:

Quote:

REGEDIT4

[HKEY_LOCAL_MACHINE\SYSTEM\Setup]
"SetupType"=dword:00000000
"CmdLine"="setup -newsetup"
"SystemPrefix"=hex:c5,0b,00,00,00,40,36,02


The layout is quite simple, REGEDIT4 indicated the file type and version, [HKEY_LOCAL_MACHINE\SYSTEM\Setup] indicated the key the values are from, "SetupType"=dword:00000000 are the values themselves the portion after the "=" will vary depending on the type of value they are; DWORD, String or Binary.

So by simply editing this file to make the changes you want, it can then be easily distributed and all that need to be done is to double-click, or choose "Import" from the Registry menu, for the settings to be added to the system Registry.

Deleting keys or values using a REG file
It is also possible to delete keys and values using REG files. To delete a key start by using the same format as the the REG file above, but place a "-" symbol in front of the key name you want to delete. For example to delete the [HKEY_LOCAL_MACHINE\SYSTEM\Setup] key the reg file would look like this:

Quote:

REGEDIT4

[-HKEY_LOCAL_MACHINE\SYSTEM\Setup]


The format used to delete individual values is similar, but instead of a minus sign in front of the whole key, place it after the equal sign of the value. For example, to delete the value "SetupType" the file would look like:

Quote:

REGEDIT4

[HKEY_LOCAL_MACHINE\SYSTEM\Setup]
"SetupType"=-


Use this feature with care, as deleting the wrong key or value could cause major problems within the registry, so remember to always make a backup first.

Regedit Command Line Options
Regedit has a number of command line options to help automate it's use in either batch files or from the command prompt. Listed below are some of the options, please note the some of the functions are operating system specific.


* regedit.exe [options] [filename] [regpath]
* [filename] Import .reg file into the registry
* /s [filename] Silent import, i.e. hide confirmation box when importing files
* /e [filename] [regpath] Export the registry to [filename] starting at [regpath]
e.g. regedit /e file.reg HKEY_USERS\.DEFAULT
* /L:system Specify the location of the system.dat to use
* /R:user Specify the location of the user.dat to use
* /C [filename] Compress (Windows 98)
* /D [regpath] Delete the specified key (Windows 98)

Maintaining the Registry

How can you backup and restore the Registry?

Windows 95
Microsoft included a utility on the Windows 95 CD-ROM that lets you create backups of the Registry on your computer. The Microsoft Configuration Backup program, CFGBACK.EXE, can be found in the \Other\Misc\Cfgback directory on the Windows 95 CD-ROM. This utility lets you create up to nine different backup copies of the Registry, which it stores, with the extension RBK, in your \Windows directory. If your system is set up for multiple users, CFGBACK.EXE won't back up the USER.DAT file.

After you have backed up your Registry, you can copy the RBK file onto a floppy disk for safekeeping. However, to restore from a backup, the RBK file must reside in the \Windows directory. Windows 95 stores the backups in compressed form, which you can then restore only by using the CFGBACK.EXE utility.

Windows 98
Microsoft Windows 98 automatically creates a backup copy of the registry every time Windows starts, in addition to this you can manually create a backup using the Registry Checker utility by running SCANREGW.EXE from Start | Run menu.

What to do if you get a Corrupted Registry
Windows 95, 98 and NT all have a simple registry backup mechanism that is quite reliable, although you should never simply rely on it, remember to always make a backup first!

Windows 95
In the Windows directory there are several hidden files, four of these will be SYSTEM.DAT & USER.DAT, your current registry, and SYSTEM.DA0 & USER.DA0, a backup of your registry. Windows 9x has a nice reature in that every time it appears to start successfully it will copy the registry over these backup files, so just in case something goes wrong can can restore it to a known good state. To restore the registry follow these instruction:
[list=1]
* Click the Start button, and then click Shut Down.

* Click Restart The Computer In MS-DOS Mode, then click Yes.

* Change to your Windows directory. For example, if your Windows directory is c:\windows, you would type the following:

cd c:\windows

* Type the following commands, pressing ENTER after each one. (Note that SYSTEM.DA0 and USER.DA0 contain the number zero.)

attrib -h -r -s system.dat
attrib -h -r -s system.da0
copy system.da0 system.dat
attrib -h -r -s user.dat
attrib -h -r -s user.da0
copy user.da0 user.dat

* Restart your computer.



Following this procedure will restore your registry to its state when you last successfully started your computer.

If all else fails, there is a file on your hard disk named SYSTEM.1ST that was created when Windows 95 was first successfully installed. If necessary you could also change the file attributes of this file from read-only and hidden to archive to copy the file to C:\WINDOWS\SYSTEM.DAT.

Windows NT
On Windows NT you can use either the "Last Known Good" option or RDISK to restore to registry to a stable working configuration.

How can I clean out old data from the Registry?
Although it's possible to manually go through the Registry and delete unwanted entries, Microsoft provides a tool to automate the process, the program is called RegClean. RegClean analyzes Windows Registry keys stored in a common location in the Windows Registry. It finds keys that contain erroneous values, it removes them from the Windows Registry after having recording those entries in the Undo.Reg file.

Create Your Own Drive In My Computer



Create Your Own Drive Which Acts Like Your Personal Folder
If want to have your personal folder in My Computer

Do this


Go to c drive

Create a new folder ( say samp1 )

now go to command prompt and type

subst z: c:\samp1

now go to my computer and check it..........



to remove the drive

go to command prompt and type

subst z: /d

Use Trial Software Forever



Now we download stuff almost daily. New products pop out so often. You can use any software forever you want. You can download trial version, right. Trial version expires after some days. You can stop that expiration. You can tell trial version of the software to not count days or do not bother about time. The software will stay and keep working like original software forever and will not expire or cease to work. You do not have to change your system clock. This little software does it all.


Time Stopper is the software which can stop the time for try out version software. When you stop the time you can use your try-out versions forever. When you stop the time of a try-out version using this Time Stopper it works via this Time Stopper. Real time and date run normally on your system. You can use any number of try-out version softwares with this software.


How it Works:

Open Time Stopper
Browse and select .exe of required trial software
Choose the new date (Any date which occurs in between your trial software time period before expiration, suggestion: set it to two days before trial software expiration date.)
Choose any time
Click open software on your selected date


If you wish to create an icon for your modified trial software and do not want to open Time stopper every time then use last button in software to create new icon. open that trial software after that from that newly created icon always otherwise it can expire.


This is 100% FREE and WORKING!!!

Download link
http://www.ziddu.com/download/11906337/TS2.zip.html

How to find almost everything using google



This is a tutorial to teach you how to find what you need(games,cracked programs,ebooks,movies etc.) without downloading any software, you just use google.Also this can help you to find from your favourite host.(rapidshare,megaupload etc.)
So let's say you want a game named 12345 and you want it from rapidshare.
1.Go to google
2.Type 12345
3.Leave a space and type rapidshare.com/files
4.Click search
5.See the result

How this works:
Google show you pages that the 12345 game exist and the links to download it are from rapidshare.

Also:
If you need links from megaupload type megaupload.com/?d= instead of rapidshare.com/files

Reinstall Windows Not Losing Anything



You can use this method as often as you like when you need to repair something that had gotten corrupted and you don't want to do a clean install.

This is better than doing a windows repair install from the cd because doing that can cause changes to settings and even make it so you can't get updates anymore from microsoft update site because of the 'silent install' they did a year or so ago (unless you rereg some dll files).

1- Start WindowsXP
2- Go to the location of your source files
3- Run WINNT32 /unattend
For example, D:\I386\winnt32 /unattend ( copy & paste this command into the RUN box, then press ENTER ) Your computer will do the rest.

OR

Start > All Programs > Accessories > Command Prompt.
Copy & paste > D:\I386\winnt32 /unattend (notice the space between 32 and / )
Press Enter.
If you have i386 on your drive, you can replace D: ( if D: is your cd drive ) with the location of it. (be sure it's the full i386 though)

D: is the driver letter where your windows XP Cd is
if D:\I386\winnt32 /unattend doesn't work then try : d:\winnt32 /unattend.

Sunday 26 September 2010

FREE AIRTEL GPRS

Once again, free Airtel GPRS is working.
In NUTSHELL you had to do only 3 things
  1. Enter your cel no. into USER NAME/NO. Field (If it is blank)
  2. Change access point / APN to airtelfun.com or airtelmms.com
  3. Configuring your application for following proxy setting…
- If u r using airtelfun.com
IP Addr : 100.1.200.99
Port no. 8080
- If u r using airtelmms.com
IP Addr : 100.1.201.172
Port No. 8799

Friday 24 September 2010

KMPlayer



The KMPlayer is a versatile media player which can cover various types of container format such as VCD, DVD, AVI, MKV, Ogg Theora, OGM, 3GP, MPEG-1/2/4, WMV, RealMedia, and QuickTime among others. It handles a wide range of subtitles and allows you to capture audio, video, and screenshots in many ways.
The player provides both internal and external filters with a fully controlled environment in terms of connections to other splitters, decoders, audio/video transform filters and renderers without grappling with the DirectShow merit system. Internal filters are not registered to user's system to keep it from being messed up with system filters.
In December 2008 KMPlayer was bought by Pandora.tv, and continues to be made available as freeware.

Tuesday 21 September 2010

Apple itunes


iTunes is a free application for Mac and PC. It plays all your digital music and video. It syncs content to your iPod, iPhone, and Apple TV. And it's an entertainment superstore that stays open 24/7.

Organize your music into playlists
Edit file information
Record compact discs
Copy files to an iPod or other digital audio player
Purchase music and videos on the Internet through the built-in iTunes store
Run a visualizer to display graphical effects in time to the music
Encode music into a number of different audio formats.

This is the 32-bit version


This is the 64-bit version

VIRTUAL BOX



VirtualBox is a general-purpose full virtualizer for x86 hardware. Targeted at server, desktop and embedded use, it is now the only professional-quality virtualization solution that is also Open Source Software.

Some of the features of VirtualBox are:

Modularity. VirtualBox has an extremely modular design with well-defined internal programming interfaces and a client/server design. This makes it easy to control it from several interfaces at once: for example, you can start a virtual machine in a typical virtual machine GUI and then control that machine from the command line, or possibly remotely. VirtualBox also comes with a full Software Development Kit: even though it is Open Source Software, you don't have to hack the source to write a new interface for VirtualBox.
Virtual machine descriptions in XML. The configuration settings of virtual machines are stored entirely in XML and are independent of the local machines. Virtual machine definitions can therefore easily be ported to other computers.

Sunday 19 September 2010

Sharpreader


SharpReader is an RSS/Atom Aggregator with the following features:
  • Handles all RSS versions, ATOM 0.3 and 1.0, modules like dublin core, content:encoding, xhtml:body, etc.
  • Advanced threading support allowing you to view connected items together in a threaded fashion. SharpReader detects and shows connections between items if they have same link, if one item links to another, if two items both link to the same external webpage, or if an item has comments (for feeds supporting the standard).
  • Group subscribed feeds into custom categories.
  • Feed settings like refresh-rate and purge timeout can be set per feed or per category. Category-wide settings apply to all feeds in that category that are still set to "Default" for the setting in question.
  • Dialog-less way of subscribing to new feeds - just drag a link from your browser into SharpReader, or enter the url into the address-bar at the top.
  • Feedster integration to easily search weblogs and newssites for specific terms, and even subscribe to such a search to be notified of new results.
  • Support for proxy-servers and proxy authentication.
  • Reduces bandwidth by using HTTP Conditional GETs and gzip/deflate encoding.
  • Minimizes to the system-tray.
  • Systray popup when new items arrive (can be disabled on a per-feed or per-category basis through the properties pane).
  • Easy keyboard navigation to go the next or previous unread item.
  • Import and export your subscriptions using OPML.
  • Filter items.
  • International Character-set support.
  • HTTP Authentication support.

VMware Player


A virtual machine is a computer defined in software. It's like running a PC on your PC.
This free desktop virtualization software application makes it easy to operate any virtual machine created by VMware Workstation, VMware Fusion, VMware Server or VMware ESX, as well as Microsoft Virtual Server virtual machines or Microsoft Virtual PC virtual machines.
  • Run multiple operating systems simultaneously on a single PC
  • Experience the benefits of preconfigured products without any installation or configuration hassles
  • Share data between host computer and virtual machine
  • Run 32- and 64-bit virtual machines
  • Leverage 2-way Virtual SMP
  • Use 3rd-party virtual machines and images
  • Share data between host computer and virtual machine
  • Broad host and guest operating system support
  • Support for USB 2.0 devices
  • Get appliance info at start-up
  • Gain easy access to virtual machines via intuitive home page interface

Scribus


Scribus is an open-source program that brings professional page layout to Linux/Unix, MacOS X, OS/2 and Windows.
It is powerful software that helps you create great looking documents of all kinds. It also comes with a lot of support options to help you achieve the best result. There is an enthusiastic and friendly community around Scribus that assists beginner and pro alike through our mailing list, IRC channel, wiki, contracted support, and the bugtracker.
Scribus supports professional features, such as CMYK color, spot color, separations, ICC color and robust commercial grade PDF.
AVG Anti-Virus Free Edition is trusted antivirus and antispyware protection for Windows available to download for free. In addition, the new included LinkScanner® Active Surf-Shield checks web pages for threats at the only time that matters - when you're about to click that link.
AVG Anti-Virus Free has these following features:
  • Award-winning antivirus and antispyware
  • Real-time safe internet surfing and searching
  • Quality proven by 80 million of users
  • Easy to download, install and use
  • Protection against viruses and spyware
  • Compatible with Windows 7, Windows Vista and Windows XP
AVG Anti-Virus Free Edition is only available for single computer use for home and non commercial use.

POWER POINT VIEWER


PowerPoint Viewer lets you view full-featured presentations created in PowerPoint 2010 and previous versions. This viewer also supports opening password-protected Microsoft PowerPoint presentations. You can view and print presentations, but you cannot edit them in the PowerPoint Viewer.
Note: After installing the PowerPoint Viewer please install all High-Priority updates from Microsoft Update.
The following Microsoft PowerPoint features are not supported by this viewer:
  • Information Rights Management (IRM) presentations.
  • Running macros, programs, or opening linked or embedded objects.
Note: PowerPoint Viewer registers itself with the .ppt, .pot, and .pps file extensions only if a version of PowerPoint is not installed on your computer. If registered, double-clicking on these file types will launch PowerPoint Viewer.

LinkWithin

Related Posts Plugin for WordPress, Blogger...