Sunday, September 30, 2012

cmd Format a hard drive with Command Prompt

In Windows I would normally be driven to either format a drive through the Disk Management console or by right-clicking on a drive in Windows Explorer and selecting the “Format…” option, but there can be advantages to formatting a driver through Command Prompt. For example if you are reformatting a drive which previously had an Operating System on the drive you can find there are System Partitions on the drive which can’t be seen in Windows Explorer and refuse to format in the Disk Management console.

Note this is only a quick guide for Formatting Drives from Command Line, there are many more options available at your disposal. For a detailed insight to the options available for the DiskPart tool visit Microsofts Technet. In the example I have formatted an external hard drive for use of file storage in a Windows Operating System environment.

How to use pendrive as ram memory in windows 7

Hi friends, Windows 7 and Windows vista comes with a ready boost option. Q-What is ready boost
Ans- "ReadyBoost is a disk cache component of Microsoft Windows, first introduced with Microsoft's Windows Vista in 2006 and bundled with Windows 7 in 2009. It works by using flash memory, a USB flash drive, SD card, CompactFlash, external hard drive or any kind of portable flash mass storage system as a cache. ReadyBoost is also used to facilitate SuperFetch, which allows it to perform analysis of boot-time disk usage patterns and creates a cache which is used in subsequent system boots." Source
If you are using a high configuration PC, It doesn't show any effect on speed because if you are a normal user I think only a few times you use your full ram memory but if you are using an old pc with low ram memory(Like 512 MB or IGB) and harddisk & using vista or 7. It speed up your PC and you will see the result, reduced application data loading time, reduced shutdown and restart time and many more you can't imagine without High ram memory. How to use this feature
Plug in your pendrive-> Format with NTFS or FAT32
Now go to properties->Select ReadyBoost
Check Use this device->Choose maximum space to reserve system speed
Click on Apply and OK. Your readyboost PenDrive is ready Now to Use.
Here is an personal suggestion HP and Sandisk is the Best for this work so what are you waiting for.

How professional hackers hack e-mail accounts and social networking accounts

Hi friends, Sorry for the late , But from now i will try to publish 2 or 3 post in a week. Today i am going to reveal the secret how professional hackers hack e-mail ids and social networking accounts.





CMD Fun Tricks and Useful CMD Commands

Here are some fun tricks and fun virus-
(1)If you are using a guest account and run is disabled you can use notepad to open regedit and cmd'
open notepad and type command.com and save it as cmd.bat this batch file will open command prompt.
if you cant open regedit by run open notepad type regedit and save it as regedit.bat double click on this and regedit window will open.
(2)use notepad to abort shutdown -Open notepad and type shutdown -a and save it as shutdown.bat.next time when your computer is about to shutdown double click on this bat file. for other cmd commands open command prompt and type shutdown a  and press enter.
(3)cmd fun virus- open notepad and type shutdown -r 10 and save as restart.bat this will restart your computer in 10 seconds if you want to use this for fun paste this file in system 32 and see. computer will restart in every 10 second.
(4)IP command- open command prompt and type ipconfig/all .
(5)How to know your friend's ip when chatting on a messenger. suppose you are using g-talk. ask your friend for a good wallpaper you have downloaded. send this to him .Now open your cmd and type Netstat -n

How to Jailbreak iOS 5.1.1 For iPhone 4S, iPhone 4, iPhone 3GS Users Using Redsn0w [Untethered]

iPhone Dev team has released Redsn0w that includes support for untethered iOS 5.1.1 for iPhone, iPad and iPod touch. It includes Rocky Racoon and untethered iOS 5.1.1 jailbreak developed by pod2g and planetbeing that was used in Absinthe 2.0.x jailbreak.

In this article, we will take you through the step-by-step procedure to jailbreak your iPhone on iOS 5.1.1 using Redsn0w for both Mac and Windows users.

Here are some important points to note before you proceed.

    This tutorial is meant for iPhone users. iPad users can check out this tutorial, while iPod touch users can check out this tutorial.
    Redsn0w 0.9.12b2 supports untethered jailbreak.
    Redsn0w 0.9.12b2 supports iPhone 4S, iPhone 4, iPhone 3GS running on iOS 5.1.1.
    Please ensure your iPhone is on iOS 5.1.1 (Settings --> General --> About --> Version should be 5.1.1) before proceeding.
    Please note that jailbreaking your iPhone may void your warranty and hence proceed with caution and at your own risk.
    Please do not forget to backup your iPhone before you proceed.
    Please ensure you are running latest version of iTunes.
    Important: iPhone 4, iPhone 3GS users who have a lot of media on your device, then you can jailbreak your iOS device by putting it in DFU mode (we'll update this guide with additional instructions for it shortly).

You can follow these step-by-step instructions to jailbreak your iPhone:

Step 1: Download the latest version of Redsn0w from this link and save it in a folder named "Redsn0w" on your desktop.

Step 2: Double click the Redsn0w zip file and extract the application to the Redsn0w folder and then launch the Redsn0w application.

Windows users should run Redsn0w as ‘Administrator’ (right-click on the Redsn0w exe and select 'Run as an Administrator').

Step 3: After launching Redsn0w, click on the Jailbreak button.

Step 4: Redsn0w will start the jailbreak process and go through the following three steps:

1. Preparing

2. Processing

3. Finishing up

Step 5: Once the three steps are completed, Redsn0w will inform you that the jailbreak was successfully installed. But please wait, leave your device alone. Your iPhone will reboot on its own. After it has rebooted, wait for it respring again.

After the respring, your iPhone will be successfully jailbroken and you should be able to find the Cydia icon on the Home screen (please note that the Cydia icon may not be on the first page, so don't assume that your iPhone hasn't been successfully jailbroken, use Spotlight to search for it).
After the jailbreaking process is complete, do not forget to checkout our article on tips to keep your iPhone secure.

If you're new to the jailbreaking world and wondering what to do after jailbreaking your iPhone, checkout our jailbreak apps category page to find out the apps you can install on your iPhone using the Cydia app.

Hope this helped. Please don't forget to let us know how it goes in the comments and drop us a line if you hit any issues.

If you want to show your appreciation for iOS 5.1.1 Jailbreak team's hard work, then don't forget to give them a donation using the link on the Redsn0w application.

How to Become a Hacker

There is a community, a shared culture, of expert programmers and networking wizards that traces its history back through decades to the first time-sharing minicomputers and the earliest ARPAnet experiments. The members of this culture originated the term ‘hacker.’

There is another group of people who loudly call themselves hackers, but aren't. These are people who get a kick out of breaking into computers and phreaking the phone system. Real hackers call these people ‘crackers’ and want nothing to do with them. Real hackers object that being able to break security doesn't make you a hacker any more than being able to hotwire cars makes you an automotive engineer.

There are people who apply the true hacker attitude to other things, like electronics or music — but in the rest of this article we will focus the skills and attitudes of software hackers, and the traditions of the shared culture that originated the term ‘hacker.

Steps

Thinking Like a Hacker

 Adopt the mindset of a hacker. Hackers solve problems and build things, and they believe in freedom and voluntary mutual help. To be accepted as a hacker, you have to behave as though you have this kind of attitude yourself. And to behave as though you have the attitude, you have to really believe the attitude. So, if you want to be a hacker, repeat the following things until you believe them:

  • The world is full of fascinating problems waiting to be solved. Successful athletes get their motivation from a kind of physical delight in making their bodies perform, in pushing themselves past their own physical limits. Similarly, you have to get a basic thrill from solving problems, sharpening your skills, and exercising your intelligence.
  • No problem should ever have to be solved twice. The thinking time of other hackers is precious — so much so that it's almost a moral duty for you to share information, solve problems and then give the solutions away just so other hackers can solve new problems instead of having to perpetually re-address old ones.
  • Boredom and drudgery are evil. When hackers are bored or have to drudge at stupid repetitive work, they aren't doing what only they can do — solve new problems. To behave like a hacker, you have to want to automate away the boring bits as much as possible.
  • Freedom is good. The authoritarian attitude has to be fought wherever you find it, lest it smother you and other hackers. Not all authority figures are authoritarian. However, authoritarians thrive on censorship and secrecy, and they distrust voluntary cooperation and information-sharing.
  • Attitude is no substitute for competence. Hackers won't let posers waste their time, but they recognize competence — especially competence at hacking, but competence at anything is valued. Competence at demanding skills that few can master is especially good, and competence at demanding skills that involve mental acuteness, craft, and concentration is best. 
  •  
  • Earn respect as a hacker. Like most cultures without a monetary economy, hackerdom runs on reputation. You're trying to solve interesting problems, but how interesting they are, and whether your solutions are really good, is something that only your technical peers or superiors are normally equipped to judge. This is why you aren't really a hacker until other hackers consistently call you one. Specifically, hackerdom is what anthropologists call a "gift culture." You gain status and reputation in it not by dominating other people, nor by being beautiful, nor by having things other people want, but rather by giving things away: your time, your creativity, and the results of your skill.
  • Write open-source software. Write programs that other hackers think are fun or useful, and give the program sources away to the whole hacker culture to use. Hackerdom's most revered demigods are people who have written large, capable programs that met a widespread need and given them away, so that now everyone uses them.
  • Help test and debug open-source software. Any open-source author who's thinking will tell you that good beta-testers (who know how to describe symptoms clearly, localize problems well, can tolerate bugs in a quickie release, and are willing to apply a few simple diagnostic routines) are worth their weight in rubies. Try to find a program under development that you're interested in and be a good beta-tester. There's a natural progression from helping test programs to helping debug them to helping modify them. You'll learn a lot this way, and generate good karma with people who will help you later on.
  • Publish useful information. Another good thing is to collect and filter useful and interesting information into web pages or documents like Frequently Asked Questions (FAQ) lists, and make those generally available. Maintainers of major technical FAQs get almost as much respect as open-source authors.
  • Help keep the infrastructure working. The hacker culture (and the engineering development of the Internet, for that matter) is run by volunteers. There's a lot of necessary but unglamorous work that needs done to keep it going — administering mailing lists, moderating newsgroups, maintaining large software archive sites, developing RFCs and other technical standards. People who do this sort of thing well get a lot of respect, because everybody knows these jobs are huge time sinks and not as much fun as playing with code. Doing them shows dedication.
  • Serve the hacker culture itself. This is not something you'll be positioned to do until you've been around for a while and become well-known for one of the four previous items. The hacker culture doesn't have leaders, exactly, but it does have culture heroes and tribal elders and historians and spokespeople. When you've been in the trenches long enough, you may grow into one of these. Beware: hackers distrust blatant ego in their tribal elders, so visibly reaching for this kind of fame is dangerous. Rather than striving for it, you have to sort of position yourself so it drops in your lap, and then be modest and gracious about your status.

Learning Programming

  1. 1
    Learn how to program. The best way to learn is to read some stuff written by masters of the form, write some things yourself, read a lot more, write a little more, read a lot more, write some more, and repeat until your writing begins to develop the kind of strength and economy you see in your models. To be a real hacker, however, you need to get to the point where you can learn a new language in days by relating what's in the manual to what you already know. This means you should learn several very different languages. Besides being the most important hacking languages, the following represent very different approaches to programming, and each will educate you in valuable ways:
    • Python is a good language to start off with because it's cleanly designed, well documented, and relatively kind to beginners. Despite being a good first language, it is not just a toy; it is very powerful and flexible and well-suited for large projects. Java is an alternative, but its value as a first programming language has been questioned.
    • If you get into serious programming, you will have to learn C, the core language of Unix (C++ is very closely related to C; if you know one, learning the other will not be difficult). C is very efficient with your machine's resources, but will soak up huge amounts of your time on debugging and is often avoided for that reason (unless machine efficiency is essential).
    • Perl is worth learning for practical reasons; it's very widely used for active web pages and system administration, so that even if you never write Perl you should learn to read it. Many people use Perl to avoid C programming on jobs that don't require C's machine efficiency.
    • LISP is worth learning for a different reason — the profound enlightenment experience you will have when you finally get it. That experience will make you a better programmer for the rest of your days, even if you never actually use LISP itself a lot. You can get some beginning experience with LISP fairly easily by writing and modifying editing modes for the Emacs text editor, or Script-Fu plugins for the GIMP.

Familiarizing Yourself With Unix

  1. 1
    Get one of the open-source Unixes and learn to use and run it. Unix is the operating system of the Internet. While you can learn to use the Internet without knowing Unix, you can't be an Internet hacker without understanding Unix. For this reason, the hacker culture today is pretty strongly Unix-centered. So, bring up a Unix (like Linux but there are other ways and yes, you can run both Linux and Microsoft Windows on the same machine). Learn it. Run it. Tinker with it. Talk to the Internet with it. Read the code. Modify the code.
    • There are other operating systems in the world besides Unix. But they're distributed in binary — you can't read the code, and you can't modify it. Trying to learn to hack on a Microsoft Windows machine or under any other closed-source system is like trying to learn to dance while wearing a body cast. Under Mac OS X it's possible, but only part of the system is open source — you're likely to hit a lot of walls, and you have to be careful not to develop the bad habit of depending on Apple's proprietary code.
    • Download Linux online or (better idea) find a local Linux user group to help you with installation.
    • While other distros have their own areas of strength, Ubuntu is far and away the most accessible to Linux newbies.
    • A good way to dip your toes in the water is to boot up what Linux fans call a live CD, a distribution that runs entirely off a CD without having to modify your hard disk. This is a way to get a look at the possibilities without having to do anything drastic.

Learning HTML

  1. 1
    Learn how to use the World Wide Web and write HTML. Most of the things the hacker culture has built do their work out of sight, helping run factories and offices and universities without any obvious impact on how non-hackers live. The Web is the one big exception, the huge shiny hacker toy that even politicians admit has changed the world. For this reason alone (and a lot of other good ones as well) you need to learn how to work the Web. This doesn't just mean learning how to drive a browser (anyone can do that), but learning how to write HTML, the Web's markup language. If you don't know how to program, writing HTML will teach you some mental habits that will help you learn. So build a home page. Try to stick to XHTML, which is a cleaner language than classic HTML.



Tips

  • Work as intensely as you play, and play as intensely as you work. For true hackers, the boundaries between "play," "work," "science," and "art" all tend to disappear, or to merge into a high-level creative playfulness.
  • Don't be content with a narrow range of skills. Though most hackers describe themselves as programmers, they are very likely to be more than competent in several related skills — system administration, Web design, and PC hardware troubleshooting are common ones. Hackers don't do things by halves; if they invest in a skill at all, they tend to get very good at it.
  • You don't have to believe that you're obligated to give all your creative product away, though the hackers that do are the ones that get most respect from other hackers. It's consistent with hacker values to sell enough of it to keep you in food and rent and computers. It's fine to use your hacking skills to support a family or even get rich, as long as you don't forget your loyalty to your art and your fellow hackers while doing it.
  • Contrary to popular myth, you don't have to be a nerd to be a hacker. It does help, however, and many hackers are in fact nerds. Being something of a social outcast helps you stay concentrated on the really important things, like thinking and hacking. If you can manage to concentrate enough on hacking to be good at it and still have a life, that's fine. Mainstream culture is much friendlier to techno-nerds now.
  • To be a hacker, you have to enter the hacker mindset, and there are some things you can do when you're not at a computer that seem to help. They're not substitutes for hacking (nothing is) but many hackers do them, and feel that they connect in some basic way with the essence of hacking (hackers need to be able to both reason logically and step outside the apparent logic of a problem at a moment's notice).

    • Write your native language well. Though it's a common stereotype that programmers can't write, a surprising number of hackers are very able writers.
    • Read science fiction. Go to science fiction conventions (a good way to meet hackers and proto-hackers).
    • Train in a martial art. The kind of mental discipline required for martial arts seems to be similar in important ways to what hackers do. The most hacker-ly martial arts are those which emphasize mental discipline, relaxed awareness, and control, rather than raw strength, athleticism, or physical toughness. Tai Chi is a good martial art for hackers.
    • Study an actual meditation discipline. The perennial favorite among hackers is Zen (importantly, it is possible to benefit from Zen without acquiring a religion or discarding one you already have).
    • Develop an analytical ear for music. Learn to appreciate peculiar kinds of music, and to play some musical instrument well, or how to sing.
    • Develop your appreciation for puns and wordplay.
    • Master creative thinking. The hacker mentality is driven by creatively solving problems. This creativity gives you the ability to solve problems others see as unsolvable.
  • If you don't speak English, it might be a good idea to learn it. English is the working language of the hacker culture and the Internet, and you might need to know it to function in the hacker community. Translations of technical books written in English are often unsatisfactory (when they get done at all). Being a native English-speaker does not guarantee that you have language skills good enough to function as a hacker. If your writing is semi-literate, ungrammatical, and riddled with misspellings, many hackers will tend to ignore you.
  • Read older pieces, such as the Jargon File or Hacker Manifesto by The Mentor. They may be out of date, but the attitude and spirit come through very clearly.

Warnings
 
  • Cracking is an illegal activity which can result in major penalties. It is a major offense and is punishable under the law.
  • Doing any of the following will earn you a bad reputation in the hacker community. Hackers have long memories — it could take you years to live your early blunders down enough to be accepted. And also, what's on the Internet stays on the Internet. Don't think nobody will stumble across what you did three years ago.
    • Don't use a silly, grandiose user ID or screen name.
    • Don't get in flame wars on Usenet (or anywhere else).
    • Don't call yourself a ‘cyberpunk,’ and don't waste your time on anybody who does.
    • Don't post or email writing that's full of spelling errors and bad grammar.
    • Don't blindly believe the advice given here or anywhere online is true and the only path to embracing the mindset of a hacker.

 

How to become a professional hacker | career in Ethical Hacking

Hi friends, Like others I will not talk about going to launch a magazine, please subscribe this, In the world of computer and Internet i will not make a plan to sell a paper made magazine. I am very angry with people who call themselves hacker, even they don't know coding, Everyone is a hacker who can exploit something. I will not say i have created a hacking videos toolkit, this is awesome and available at discounted prizes for some days, Making people fool before first April is not my hobby. I will not use mumbai terrorist attack photos to get traffic,I will not promote a worst product to earn affiliate commission, or write a paid review about a product or company.
Don't you people think all this is sucking and you are fed up with all this.
   I'll disclose only secrets that no one disclose. Not in this post but in my next post, truth about the security and hacking business.
 I got a lot of questions from my readers that they worked hard on Internet to get deep knowledge about hacking and  security but don't have a certification in hacking. They worked hard but unable to find which job profile suit them best.First of all if you talk about working in a security firm as a professional hacker, you need to know how to become a professional hacker.
There are some steps to do this--
(1) Need a mindset/premindset to exploit things even its a human mind, computer or electric appliance
(2) Sound knowledge of operating systems, application software, Internet and hardware
(3) Every wanna be professional hacker should be perfect in at least one programming language
(4) They should have basic knowledge of networking, routers and servers.
(5) Knowledge of database management is must
(6) knowledge of One web designing language and one server side srcipting language.
(7) CEH certificate or a local vendor certification can also work.
(8) Over confident, Rude behaviour and Attitude, use of abusive words can help you finding a good job( Ha...Ha...Ha)
If you have these seven things no one can stop you  becoming a hacker, now your skills depends on your hard work but when you are going to join a organization as a professional hacker or security expert these basic things are needed, other professional techniques you will learn in the company's training room only.At that place a hardcore hacker get to know he knows nothing about hacking.
Now the question comes in which field i can make my career. Here i want to present an example, some of my friends was good in electronics, but at the time they was going to take admission in B.Tech they thought It market is growing day by day, providing attractive salary packages and have a glamours career. So they took computers and now you can understand in which situation they are living....Jobless, Hopeless and aimless.
So friends never study subject in demand, study which you find interesting.
(1) If you work good as a web developer , make yourself perfect in that type of hacking techniques.
(2) If programming, take a move to pen-testing
(3) If networking, take a move to network security
(4) If you feel you can hack human minds easily, go to social engineering
(5) Having security approach in your mind can also make you a good programmer
(6) If you are operating system worm, that can make you system security engineer
(7) Other than that if your area of interest are mobile, bluetooth or voip they also have a hot career.
Choose one , make a group and start Hacking

Ankit Fadia : “To become a hacker, you need to know how to think like a criminal”

Let’s start with this question: who is Ankit Fadia?

I define myself as an ethical hacker.

Why ‘ethical hacker?’- does the word ‘hacker’ on its own have a pejorative connotation?

Traditionally, a hacker was somebody who knew everything about technology and understood how to work the computer, internet etc. in ways s/he wanted to. Over the years, the term hacker has come to have a negative connotation. Whenever some cybercrime happens, they say that somebody has ‘hacked’ into the system. So to separate hackers from cybercriminals, the term ‘ethical hacker’ was devised.

So You Want to Be a Hacker?

I. Introduction

So you want to be a hacker? Many people want to be a hacker, but they don't know where to start, or what hacking really means. Hopefully this text will clear some things out and help you on your path to become a true hacker.

II. What is a hacker?

Everyone seems to have their own little definition of what a hacker is. The press views hackers as people who cause computer mischief, AOLers think hackers who are people who can push buttons on their downloaded proggies, computer nerds and rejects from society claim to be hackers because it makes them feel united and part of a group, crackers who write viruses and crash computers think they're hackers, and all thoses kewl people in those IRC chat rooms call themselves hackers, and so on. So what exactly is hacker? Here's the definition that I think most people would agree with:

hacker 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. (taken from The Hacker's Dictionary)

What exactly does this mean? A hacker is someone who is fascinated by computers, wants to learn more about them and then go beyond that. Hackers seek knowledge, especially forbidden or "secret" knowledge. One thing about being a hacker is to remember that knowledge is good, and should be shared with other hackers.

III. Why do people want to become a hacker?

Press, hyped up movies, and the huge growth of the Internet is drawing new hacker wannabes in everyday. It this good? Yes and no. It's mostly good, but it's also bad because some people don't really understand what a hacker is. They think hacking is sending out viruses, crashing computers and stealing passwords from some 12 year old girl off AOL. These things are definitely not cool.

But what about the inside force that really makes people want to become a hacker? Hackers are the "elite" of the Internet. They know far more things than the average user, and can do things to computers that most people wouldn't even know were to start. There is a certain "ego satisfaction" to be a hacker.

IV. How do be a hacker

So, now that you know what a hacker is, and why some people want to become a hacker, here's what I have to say on how to be a hacker. First of all, it takes time to become a hacker. You can't just decide you want to be a hacker and then become one overnight. Second, there are no teachers (unless you're lucky and find a mentor). Most hackers taught themselves. They learned by reading, asking and doing. Now, a note about asking questions. Do not ask stupid questions like "HOW DO I HACK?" Ask questions that have an answer in a couple of sentences. If you do, your question will be answered most of the time. And third, to be a hacker, you have to hack. You can't just sit around and pretend to be a hacker. Do something with your newfound knowledge. But try to follow these two simple rules:

    Don't damage or screw up another system. You will get in trouble.
    Try not to piss people off. Make friends, not enemies.

V. Gaining Knowledge

1). Read. Read everything you can about hacking. Articles, texts, books, magazines, message boards, anything with the word "hack" in it. Of course, anything computer related will also help. You're already doing a good job reading this text. Here are some hacking related books and magazines that I suggest you read:
2600 magazine - Very good source of hacking info. You can find it at your local bookstore, at the magazine rack. Just look for the number 2600.
CYPERPUNK - A book about three different hackers.
Cuckoo's Egg - Informative book about some guy tracking down a hacker who broke into his computer. Definitely not boring and can be informative to those with hardly no knowledge of how hacking into a computer is actually done.

2). Learn to Program. A hacker who can't program is like a skater who can't skate. This is one of the more devious parts of becoming a hacker because it takes time and patience. Why should a hacker know how to program? Because by learning how to program, a hacker can make a computer do whatever the hell he wants it to. And that's power. Have you ever found yourself saying "I wish I had a program to do that..." Well, if you learn to program, you can just make that program. So, where to start? First, you need to choose a programming language. The two most popular out are Visual Basic (VB) and C/C++. The difference between them? VB is easy to use and learn, but its programs aren't that fast and they require a runtime DLL file. C++ compiles fast programs, but is hard to learn and get started. Another difference between them is compatibility. VB is for Windows operating systems only (Win 3.11, Win95/98, WinNT), while C++ code can be made to run on practically any operating system (Windows, Unix, even Mac). Where can you get VB or C++? You buy it (or...ahem, cough, warez, cough, cough, friend with CD burner, cough, cough). Once you learn the basics of the programming language, learn Windows API. It's the guts of Windows.

3). Hack. Like I said before, in order to be a hacker, you have to hack. Hanging around in chat rooms won't help you. Hacking lets you "practice" your hacking skills. The more you practice, the better you get. After you're an experience hacker, contribute something to the hacker community. This could be a simple text file, a web page, or a [free] program. Oh, and help out those newbie hackers. You were one once.

VI. Knowledge is Power

The most frequent questions people ask me are how to get someone's password and how do get someone's IP address.

Getting someone's password

There are three main ways to get someone's password.

1). Social Engineering. By talking to someone who knows the password, you can try to "trick" them into giving you it. Be creative. The AOL equivalent is phishing (posing as an AOL technician or something, claiming to need the person's password), though phishing takes no skill and is hardly considered social engineering.

2). Password Stealers or Sniffers (PWS). A program installed on the user's machine that literally gets the password as it is being typed in. Some PWS also search for stored passwords. After a PWS obtains a password, it usually stores it or sends it out through email. You would probably have to make your own (learn to program!) if you want it to be effective, though sometimes there are pre-made ones. Those AOL PWS are mostly crap, most of them only steal the password from the Change Password Window, which is not very effective.

3). Password Cracker. A program on your machine that guesses passwords from a list. This can take some time, and would not be able to crack a user's password if it's not on the password list.

Getting someone's IP Address

First, you need to understand what an IP address is. Every computer connected to the Internet has an IP address, which is, in simple terms, equivalent to a phone number. It identifies the computer on the Internet. The IP address is where data is sent to and from. If the person is signing on through a dial up account, the IP address is usually different at each login. To find your IP address, click on the Start button, Run, and then type in winipcfg. And for you AOLer's who think who don't have an IP address, make sure that the listbox says "AOL Adapter," not "PPP Adapter." So, why get someone's IP address? Hell if I know. Maybe to do something lame, like nuke (crash) a computer, or maybe because a backdoor like NetBus or BackOrifice is installed. Anyway, IP addresses can be obtain through these methods:

    Email - It's in the header
    IRC - A simple /whois [nick] will return the IP address
    ICQ IP Sniffer - Due to a bug in the ICQ software, it is possible to type in an UIN and get the user's IP address.
    ICQ Software Bug - Another software bug? Yup, only this time you don't need an external prog. If you have someone on your contact list, you can disconnect and then check their info. Their IP address will be in the Last IP box! Works for older versions of ICQ.
    IP Stealer - I haven't seen one of these, but there should be some around. It would work like a Password Stealer, except it would get the IP address instead of the password.

VII. Seek, and ye shall find.

One of the most annoying questions I hear are "Do you have this?" or "Can you send me this?" or "Where can I get this?" Well, I'm going to tell you this TOP SECRET thing I found called a SEARCH ENGINE. You type in what you what you're looking for, and it gives you links to web pages that have the words in it! WOW!

Okay, that was lame, anyway, any experienced web surfer will tell you that you can find anything on the web your heart desires. Whether that would be XXX pics, games, or how to be a hacker, its all there. You just need to know how to find it. Now, for search engines, I prefer www.yahoo.com and www.infoseek.com. When typing stuff in the search box, be sure you use + (plus sign) in front of words that you want combined. For example, let's say you're looking for an ICQ IP sniffer program. Now, if you just typed in "ICQ IP sniffer" (without the quotes), it would give you web sites like ICQ reviews, what IP addresses are, and pages about your mom (heh, j/k). But if you typed in "+ICQ +IP +sniffer," it will look for pages that have all those words. Understand?

Also, another web browsing technique that I like to use is opening multiple windows. This is especially useful when you're like me, stuck with a 33.6 modem. Okay, so, let's say Infoseek found 15 page results that have to do with ICQ IP Sniffers. When I find a link I want to open, instead of just clicking on it, I would click the right mouse button to bring up that pop-up menu, and then click Open Link in New Window. This would open another browsing window. And then when I find another link I want to go to, I do the same thing. The purpose of all this? To view one page while another is loading. 

Congratulations, this concludes the So You Want to Be a Hacker? text. You have now earned your CHW (Certified Hacker Wannabe). So, one last question remains: How do you know when you're a hacker? Well, the answer is when someone tells you.

10 things every Perl hacker should know

Perl is the expert system administrator's scripting language of choice, but it is also a lot more than that. As a language designed for file and text processing, it is ideally suited to UNIX system administration, Web programming, and database programming, among dozens of other uses.

As one of the easiest programming languages to use for whipping up quick, effective code for simple tasks, Perl attracts new users easily and has become an important and popular tool for getting things done. Before jumping fully into Perl programming, though, there are a few things you should know that will make your life easier, both when writing code and when asking for help from Perl experts.


How to Backup a SIM Card

I wanted to know how I could backup all of the phone numbers on my cell phone. I searched the internet for products that would do this task. I found a few devices that ran anywhere from $25-$70 plus shipping and handling. I decided to put off buying one of the devises until I could do some more research on what I was buying. I mentioned this situation to a co-worker (Mike G.), and he told be that I didn't have to spend a dime if I could get a hold of an older Nokia cell phone. Just my luck I had an old Nokia phone in my closet that was about 4 years old and was not being used. Read on to see how easy this task is. Besides backing up your SIM card you can also copy numbers from one SIM card to another and merge numbers from multiple SIM cards.



How to Pay for Prepaid SIM Cards

The Subscriber Identification Module card, also called a SIM card, holds the cell phone subscriber's phone number, personal security key and other data necessary for the phone to function. If you are using a phone not linked with any specific provider--an "unlocked" phone--SIM cards may be switched from phone to phone, letting the new phone receive all calls to the subscriber's number. International SIM cards are available for travelers, since country-specific SIM cards usually work only in their country of origin. SIM cards can be conveniently purchased in stores or online.


How to Reprogram a SIM Card

Modern day cell and mobile phones use a tiny memory unit called a subscriber identity module card, or SIM card. It keeps track of your phone numbers, rate plan information, contacts and messages. It is simple to swap out your current SIM card, but you must learn how to reprogram it with your current account information. To achieve this, you must contact your cell phone service provider and have them initiate an over-the-air, or OTA, update that is wirelessly transmitted to your phone.

How to Track Cell Phone Calls With a SIM Card Number

Tracking cell phone calls with a SIM card requires the use of a SIM card reader. A SIM card stores all the information associated with a user's account. A card reader is required to access all the information on the SIM card, including contacts and call history. There are two types of card readers, readers and spoofers. The spoofers can clone the SIM card, which basically means the machine acts like a clone of the SIM card.


How to Detect SIM Card Cloning

SIM card cloning, a type of fraud, occurs when someone intercepts your SIM card information as you make a call with your cell phone, then copies that information to a different cell phone. The person then makes calls and texts that you are billed for. These cloned phones are difficult for the police to find, so it's important that you pay close attention to your mobile phone bill to ensure there are no unauthorized calls or text messages.

Saturday, September 29, 2012

How Does a SIM Card Work?

Introduction

  • SIM cards are the most important part of a cell phone that runs on a GSM network. They enable the phone to receive signal from a mobile phone company. Many people who have phones that accept SIM cards find it extremely easy to simply swap out their SIM card for a new SIM card when in a different country.

What is a SIM Card?

  • SIM cards are formally called Subscriber Identity Module cards. While the first SIM card appeared in 1991, they have been seeing an increase in use due to their ease and their simple design. When compared with a phone that uses CDMA technology, phones that have SIM cards in them offer lower prices and lower rates, especially outside of the United States. When you are traveling to a foreign country, all that you need to do in order to use your GSM, SIM-card enabled phone is to purchase a new SIM card that works for the country that you are in and add credit to it.

    Using a SIM Card

    • When you open up the back of a phone that is equipped with a SIM card, you will see the card tucked into the phone. Usually, the card is tucked behind the battery. SIM cards are also great because they can be used with any handset that accepts them. For example, if your cellular phone breaks and you are unable to make calls from it, but still have an active SIM card, you are in luck. Just take your SIM card out of the old phone and plug it into a new phone and you will have full service. SIM cards are encoded with information about the carrier that you are using, as well as information like your address book. Having information like this on a SIM card will allow you to make a fast and simple switch over to another phone on the same carrier, or to switch carriers completely.

    Other SIM Card Uses

    • Some phones with SIM cards may accept memory cards on their own, however, on most phones, the SIM card is your memory card. All the information that you need is on the phone itself, so you don't have to download all your numbers when you want to switch phones, and you don't even need to worry if a certain phone will work with your SIM card. Some phones may need to be unlocked for service with a specific carrier and you may receive a different SIM card, but otherwise you should have no problems using the phone.

    Summary

    • SIM cards are a great solution for anyone who likes to change phones or carriers or who travels internationally. They are a quick and easy solution to prevent borders, carriers or locked-down phones from slowing you down. SIM cards keep all of the information that is needed right on your phone. There is no need to constantly back up or write down all the numbers on your phone, and you will never have to worry about outrageous bills when calling overseas when you purchase a local SIM card for your phone.

15 Things You Need to Know About the iPhone 5

15 Things You Need to Know About the iPhone 5

 After much anticipation, it is finally here. Yes, that’s right—today the iPhone 5 was unveiled. While we were absolutely thrilled to get our hands on the iPhone 4S its updates were not nearly substantial enough for our tastes. And apparently, they weren’t substantial enough for anyone’s tastes. Wall Street is expecting about 6 million units of the iPhone 5 to be sold during presale alone, proof that consumers are willing to spend on worthwhile upgrades that never happened when the iPhone 4S hit the market.

While we haven’t technically gotten our hands on the iPhone 5 yet, it’s safe to say that Apple has another revolutionary device on its hands. If you’re on the fence about whether or not to take the plunge and purchase it, we’ve compiled a handy list of data about its new features. Here, 15 things you need to know about the iPhone 5.

1. The phone will be offered at the same price as the 4S—$199 for 16 GB, $299 for 32 GB and $399 for 64 GB. There are two colors—black and white. The white version has a raw aluminum back. The black one has the black anodized backing. Preorder starts Friday, September 14, and the devices will ship on September 21.

2. With a taller screen and the same width, it will now show five rows of icons—as well as four shortcuts on the bottom. For example, the calendar will now show the entire five day work week, perfect for seeing your full appointments. You can also use the phone more comfortably with one hand.

3. It is made entirely of glass and aluminum, making it the thinnest and lightest iPhone yet, not to mention the world’s thinnest smart phone.

4. The processor is 22% smaller and more energy-efficient than the 4S.

5. Pages will launch 2.1 times faster than before, while keynote attachments will load 1.7 times faster.

6. The battery life will exceed the 4S, with 8 hours of 3G or LTE talk time or browsing and 10 hours of WiFi browsing.

7. The camera will offer a dynamic low light mode, which evaluates nearby pixels—and it has a 40% faster image capture.

8. Panorama is officially a feature. You will be able to “sweep the scene” vertically.

9. You’ll be able to take photos while taking videos for the first time.

10. There are now three microphones to ease your recording anxiety, located on the front, bottom and back.

11. Although the iPhone has used the iPod’s connector from the start, there will be a new one called “Lightning,” with an all-digital design that is 80% smaller than the previous model.

12. Apple is ditching Google Maps and introducing a new Maps application which they have been working on for years. There’s a built in search engine so all of your restaurant and shopping destinations will be available at the click of a button.

13. For email, you can now mark people as “VIP,” which will place their mail in a separate inbox.

14. Siri is sharper than before, and you’ll be able to make more specific inquiries, like finding out the score of a football game. Siri’s taste level has also improved, and she is now more qualified to offer advice about movies.

15. The iPhone 5 will run on LTE, which is much faster than the majority of WiFi and cable providers.

Will you be pre-ordering the iPhone 5? And what do you think of the new features? Share your thoughts in the comments!

How to Clone a Phone Without a SIM Card

There are many reasons why you may be interested in cloning your cell phone. One reason can be a matter of convenience. You can clone your phone so you will have the exact same contact information and data in both phones. This will create a backup in the event your current phone is lost or stolen. You can also have the cloned phone as your leisure phone and the original as your work phone. whichever the reason, following a few directions will allow you to clone your phone in a short amount of time.

 

Thursday, September 27, 2012

8 Tips To Get More Likes And Comments On Facebook

1. Post in the mornings and evenings Facebook Likes and CommentsSeveral studies conducted have revealed that these are the times that people are the most likely to check their Facebook, most probably upon arrival at the office before the start of a new day or after dinner and a shower. Of course, common sense tells you too that posting in the middle of the night is unlikely to get you far as your posts would have been pushed down the newsfeed by other posts when morning comes.

2. Comment on others’ statuses too By regularly interacting with your friends, a bond is formed and they would be more likely to check out your pages as well as state their views on your posts. Else, some would be obliged to return the favor if you have been regularly commenting on their posts. This explains the close-knit community that bloggers form; they regularly check and comment on each other’s blogs.

3. Ask for opinions It doesn’t have to be real-world issues like “How would the greenhouse effect affect you?” People turn to Facebook to unwind, so asking such a question is unlikely to get you your desired response. Your question could be something fun like “Should I buy that $3,000 bag or an iPad?” Simple but good enough to get some answers!

Monday, September 3, 2012

EK JID JISNE BADAL DI JINDAGI

जिद जिसने बदल दी जिंदगी

      
जिद जिसने बदल दी जिंदगी जिद नाम है उस हौसले का जिसमें नामुमकिन को मुमकिन बनाने का जुनून हो। बिरले ही होते हैं ऐसे जिद्दी लोग और उनके मजबूत इरादों के सामने दुनिया घुटने टेकने को मजबूर होती है। लगभग 1200  आविष्कार करने वाले अमेरिकी वैज्ञानिक थॉमस अल्वा एडिसन की प्रतिभा को उनके शिक्षक भी पहचान न सके। दिन-रात कल्पना की दुनिया में खोए रहने वाले एडिसन को वे मंदबुद्धि मानते थे। इसी आधार पर उन्हें स्कूल से निकाल दिया गया था। निर्धन परिवार में जन्मे एडिसन  ट्रेन में अखबार  बेच कर गुजारा करते थे। बिजली के बल्ब का आविष्कार करने के दौरान उनके सौ से भी ज्यादा  प्रयास विफल हुए। लोगों ने उनका बहुत मजाक उडाया और उन्हें भविष्य में ऐसा न करने की सलाह दी। फिर भी उन्होंने हार नहीं मानी। अंतत:  जब बल्ब की रौशनी से दुनिया जगमगा उठी तो लोग हैरत में पड गए। एडिसन को अपनी कोशिशों पर पक्का यकीन था। इसीलिए वह अडिग रहे। आसान नहीं होता अपनी बात पर अडिग रहना, पर जिसके इरादों में सच्चाई हो, उसे दुनिया की कोई भी ताकत झुका नहीं सकती।
हौसले की होती है हमेशा जीत
जब भी दृढ इच्छाशक्ति की बात निकलती है तो दुष्यंत कुमार का यह शेर हमें बरबस याद आ जाता है- कैसे आकाश में सूराख हो नहीं सकता/ एक पत्थर तो तबीयत से उछालो यारों..। साधनों की कमी की शिकायत करते हुए खुद कोई प्रयास न करना तो बेहद आसान है। ज्यादातर लोग करते भी यही हैं, लेकिन कुछ ऐसे भी होते हैं, जिनकी इच्छाशक्ति ही उनकी सबसे बडी पूंजी होती है। बिहार के गया जिले के छोटे से गांव गहलौर  के दलित मजदूर दशरथ मांझी की जिद के आगे पर्वत को भी झुकना पडा। उन्होंने राह रोकने वाले पहाड का सीना चीर कर 365  फीट लंबा और 30  फीट चौडा रास्ता बना दिया। दरअसल पहाडी का रास्ता बहुत संकरा और उबड-खाबड  था। उनकी पत्नी उसी रास्ते से पानी भरने जाती थीं। एक रोज उन्हें ठोकर लग गई और वह गिर पडीं। पत्नी के शरीर पर चोट के निशान देख दशरथ को बहुत गुस्सा आया और उन्होंने उसी दम ठान लिया कि अब वह पहाडी को काटकर ऐसा रास्ता बनाएंगे, जिससे किसी को भी ठोकर न लगे। वह हाथों में छेनी-हथौडा लेकर पहाड काटने में जुट गए। तब लोग उन्हें पागल और सनकी समझते थे कि कोई अकेला आदमी पहाड काट सकता है भला! .पर उन्होंने अपनी जिद के आगे किसी की नहीं सुनी। वह रोजाना सुबह से शाम तक अपने काम में जुटे रहते। उन्होंने 1960  में यह काम शुरू किया था और इसे पूरा करने में उन्हें 22  वर्ष लग गए। ..लेकिन अफसोस कि उनका यह काम पूरा होने से कुछ दिनों पहले ही उनकी पत्नी का निधन हो गया। वह अपनी सफलता की यह खुशी उनके साथ बांट न सके। उनकी इस कोशिश से ही बेहद लंबा घुमावदार पहाडी रास्ता छोटा और सुगम हो गया। अब दशरथ इस दुनिया में नहीं हैं पर वह रास्ता आज भी हमें उनके जिद्दी और जुझारू व्यक्तित्व की याद दिलाता है। उनकी दृढ इच्छाशक्ति को सम्मान देते हुए दिल्ली विश्वविद्यालय ने अपने कर्मचारियों के लिए दशरथ मांझी पुरस्कार की शुरुआत की है।
गुस्सा भी होता है अच्छा
जिद की तरह गुस्सा भी हमारी नकारात्मक भावनाओं में शुमार होता है और इन दोनों का बडा ही करीबी रिश्ता है। इस संबंध में मनोवैज्ञानिक सलाहकार डॉ. अशुम गुप्ता कहती हैं, अगर किसी दुर्भावना की वजह से गुस्सा आए और कोई किसी को नुकसान पहुंचाने की जिद करे तो निश्चित रूप से यह खतरनाक  प्रवृत्ति है। इससे इंसान केवल दूसरों का ही नहीं, बल्कि अपना भी अहित कर रहा होता है। हमारी मानसिक संरचना में ये दोनों भावनाएं बिजली की तरह काम करती हैं। अगर सही जगह पर इनका इस्तेमाल किया जाए तो चारों ओर रौशनी फैल सकती है। अगर इनका गलत इस्तेमाल हो तो पल भर में जल कर सब कुछ खाक  हो सकता है। यहां असली मुद्दा नकारात्मक भावनाओं को सकारात्मक ढंग से चैनलाइज  करने का है। अगर बच्चा अपनी मनपसंद चीज लेने की जिद करता है तो बडों को हमेशा उसकी जिद पूरी नहीं करनी चाहिए, बल्कि उससे यह वादा लेना चाहिए कि तुम परीक्षा में अच्छे मा‌र्क्स  लाओ तो तुम्हारी मांग जरूर पूरी की जाएगी। इससे उसे यह एहसास होगा कि बिना मेहनत के कुछ भी हासिल नहीं होता और उसकी जिद पढाई की ओर रुख कर लेगी।
गुस्से के सकारात्मक इस्तेमाल के संदर्भ में चिपको आंदोलन के अग्रणी नेता सुंदर लाल बहुगुणा द्वारा कही गई एक बात बरबस याद आ जाती है, पेड काटने वाले लोगों को देखकर मुझे बहुत ज्यादा गुस्सा आता है। इसलिए मैंने यह संकल्प लिया है कि इतने पेड लाऊंगा कि काटने वाले भले ही थक जाएं, फिर भी हमारी धरती हमेशा हरी-भरी बनी रहे। सच, लाचारी भरी शांति से तो ऐसा गुस्सा हजार गुना बेहतर है, जिससे देश और समाज का भला हो।
दिल पर लगी तो बात बनी
कई बार हमें दुख पहुंचाने वाले या हमारे साथ बुरा बर्ताव करने वाले लोग अनजाने में ही सही, लेकिन हमारी भलाई कर जाते हैं। इस संबंध में डॉ. अशुम  गुप्ता आगे कहती हैं, कई बार दूसरों द्वारा कही गई कडवी बात हमारे लिए शॉक ट्रीटमेंट का काम करती है। ऐसी बातें सुनकर हमारा सोया हुआ जमीर जाग उठता है। फिर हम कई ऐसे मुश्किल काम भी कर गुजरते हैं, जिनके बारे में आमतौर पर सोचना भी असंभव लगता है। जरा सोचिए कि अगर तुलसीदास को अपनी पत्नी रत्नावली की बात दिल पर न लगी होती तो आज हिंदी साहित्य श्रीरामचरितमानस जैसे महाकाव्य से वंचित रह जाता। अगर दक्षिण अफ्रीका के पीट्मेरीज्बर्ग स्टेशन पर उस टीटी ने बैरिस्टर मोहनदास करमचंद  गांधी का सामान ट्रेन की फ‌र्स्ट क्लास की बोगी से बाहर न फेंका होता तो शायद आज भारत का इतिहास कुछ और ही होता।
जब बात हो अपनों की
जिद के साथ कहीं न कहीं अपनों का प्यार और उनकी भावनाएं भी जुडी होती हैं। दिल्ली की मैरी बरुआ का इकलौता बेटा ऑटिज्म से पीडित था। वह दिन-रात उसकी देखभाल में जुटी रहतीं। वह कहती हैं, मेरे लिए मेरा बेटा ही सब कुछ है। मैंने उसकी खातिर ऐसे बच्चों को ट्रेनिंग देने का स्पेशल कोर्स किया। उसी दौरान मुझे यह खयाल आया कि सिर्फ मेरा ही बेटा क्यों.? ऐसे दूसरे बच्चों को भी ट्रेनिंग देकर मैं उन्हें कम से कम इस लायक तो बना दूं कि ये अपने रोजमर्रा के काम खुद करने में सक्षम हों और बडे होने के बाद सामान्य जिंदगी जी सकें। तभी से मैंने ऑटिज्म  से पीडित दूसरे बच्चों की देखभाल शुरू कर दी। इससे मेरे मन को बहुत सुकून  मिलता है। अब जिंदगी से कोई शिकायत नहीं है, बल्कि ऐसा महसूस होता है कि ईश्वर ने मुझे इस काबिल समझा, तभी तो ऐसे बच्चों की जिम्मेदारी मुझे सौंपी है।
फर्क चश्मे का
अकसर हम लोगों के अडियल व्यवहार को नापसंद करते हैं। आकांक्षा जैन एक निजी कंपनी में मार्केटिंग मैनेजर हैं। इस संबंध में उनका कहना हैं, शुरू से मेरी आदत रही है कि अगर मैंने एक बार कोई काम ठान लिया तो चाहे बीच कितनी ही बाधाएं क्यों न आएं मैं उसे पूरा करके ही दम लेती हूं। मेरी इस आदत की वजह से लोग मुझसे नाराज भी होते हैं, पर बाद में जब वह काम अच्छी तरह पूरा हो जाता है तो उन्हें अपनी गलती का एहसास होता है। अडियल या परफेक्शनिस्ट  होने में कोई बुराई नहीं है। अगर हमारा दृष्टिकोण सकारात्मक हो तो हमें लोगों के जिद्दी व्यवहार का अच्छा पहलू भी नजर आएगा। अगर ऐसा न हो तो दूसरों के हर अच्छे व्यवहार में भी बुराई नजर आएगी।
सामाजिक स्वीकृति में दिक्कत
इस संबंध में समाजशास्त्री डॉ. शैलजा  मेनन  कहती हैं, किसी भी समाज में हमेशा वही व्यवहार स्वीकार्य होता है, जिससे सामने वाले व्यक्ति को कोई असहमति न हो। अगर कोई व्यक्ति लीक से हट कर कुछ भी करना चाहता है तो उसके आसपास के लोग उसे सहजता से स्वीकार नहीं पाते और वे ऐसे व्यक्ति को शक की निगाहों से देखते हैं।
अपनी ही धुन में लगे रहने वाले ऐसे क्रिएटिव  लोगों को शुरुआती दौर में अकसर आलोचना का सामना करना पडता है, लेकिन उन पर नकारात्मकबातों का कोई असर नहीं होता। बाद में दुनिया को उनकी काबिलीयत की पहचान होती है और लोग उन्हें सुपर हीरो बना देते हैं, लेकिन तब तक बहुत देर हो चुकी होती है।
महान इटैलियन वैज्ञानिक गैलीलियो  की जिंदगी इसकी सबसे बडी मिसाल है। उन्होंने उस पारंपरिक धारणा का खंडन किया था कि सूर्य पृथ्वी की परिक्रमा करता है। उन्होंने ही सबसे पहले इस बात की खोज की थी कि पृथ्वी सूर्य के चारों ओर घूमती है। आज उसी वेटिकन सिटी के चर्च में उनकी मूर्ति लगाई जा रही है, जहां 400  साल पहले उनकी इस खोज  को धार्मिक ग्रंथों के खिलाफ  बताते हुए उन्हें यातना शिविर में बंद किया गया था और घोर शारीरिक-मानसिक यातनाएं दी गई थीं। अब सदियों बाद अपने इस प्रयास से चर्च अपनी उस पुरानी गलती का पश्चात्ताप करना चाहता है।
सामाजिक स्वीकृति में दिक्कत
जिद्दी और जोशीले लोगों को चुनौतियां स्वीकारना बहुत अच्छा लगता है। इस संबंध में सॉफ्टवेयर इंजीनियर सिद्धार्थ शर्मा का कहना है, हमारे परिवार की आर्थिक स्थिति अच्छी नहीं थी। हमारे पिता बेहद मामूली सी नौकरी करते थे। हम छह भाई-बहनों की परवरिश बहुत मुश्किल थी। मैं इंजीनियर बनना चाहता था, पर मुझे मालूम था कि इसके लिए पिताजी पैसे नहीं जुटा पाएंगे। इसलिए जी जान से पढाई में जुटा रहता। मैंने ठान लिया था कि मैं केवल मेहनत के बल पर अपना सपना साकार करूंगा। बिना किसी कोचिंग के आईआईटी  के लिए मेरा चयन  हो गया। आगे की पढाई का खर्च  मैंने खुद ट्यूशन करके उठाया। आज इंजीनियर बनने से कहीं ज्यादा, मुझे इस बात की खुशी है कि मैंने संसाधनों की कमी के बावजूद विपरीत परिस्थितियों में भी कामयाबी हासिल की है। अगर कामयाबी ज्यादा  मुश्किलें उठाने के बाद मिले तो उसका मजा दोगुना हो जाता है।
विकी रॉय फोटोग्राफर जिद से मिली जीत मैं पश्चिम बंगाल के पुरूलिया जिले का रहने वाला हूं। वहां गरीबी और मामा-मामी की मारपीट से तंग आकर नौ साल की उम्र में घर से भागकर दिल्ली चला आया। फिर यहां कबाड बीनने से लेकर ढाबे में प्लेटें धोने जैसे कई काम किए। एक रोज ढाबे में मुझे स्वयंसेवी संस्था सलाम बालक ट्रस्ट के कार्यकर्ता संजय श्रीवास्तव मिल गए। वह मुझे अपने साथ संस्था में ले गए। वहां रहकर मैंने अपनी स्कूली शिक्षा पूरी की। मुझे नई-नई जगहें देखने का बहुत शौक है। देश-विदेश घूमने के लालच में ही मैंने फोटोग्राफर बनने का निश्चय किया। सबसे पहले मैं फोटोग्राफी के एक वर्कशॉप में शामिल हुआ। वहां इससे जुडी बेसिक बातें सीखने के बाद मैंने अपनी संस्था से इंट्रेस्ट फ्री लोन लेकर एक कैमरा खरीदा। इसी दौरान मेरी मुलाकात ब्रिटिश फोटोग्राफर बिक्सी बेंजामिन से हुई। मुझे उनके साथ रह कर बहुत कुछ सीखने को मिला। पहले अंग्रेजी समझने में मुझे थोडी दिक्कत जरूर होती थी, फिर भी उनकी एक्टिविटीज देखकर मैं काम का सही तरीका समझ जाता था। इस दौरान द.अफ्रीका, वियतनाम, ब्रिटेन और स्विट्जरलैंड में मुझे अपनी तसवीरों की प्रदर्शनी लगाने का मौका मिला। 2009 में मुझे छह महीने के लिए अमेरिका के इंटरनेशनल सेंटर ऑफ फोटोग्राफी में प्रशिक्षण लेने का अवसर मिला। इतना ही नहीं, उन दिनों वहां व‌र्ल्ड ट्रेड सेंटर के रीकंस्ट्रक्शन का काम चल रहा था। मैंने उसकी कुछ ऐसी तसवीरें उतारीं, जिसे कई अंतरराष्ट्रीय फोटो प्रदर्शनियों में शामिल किया गया और लोगों ने उन्हें बहुत पसंद किया। बचपन से ही मैं जिल्लत और जलालत भरी जिंदगी से बाहर निकलने की कोशिश में जुटा था। मुझे ऐसा लगता है कि बिना जिद के कोई भी लडाई जीतना असंभव है। आर्थिक रूप से आत्मनिर्भर बनने के बाद अब मैं मां और छोटे भाई-बहनों की सारी जिम्मेदारियां निभा रहा हूं।
अब भी नहीं सुधरी मैं
प्राची देसाई, अभिनेत्री
बचपन से मेरी एक ही जिद थी कि मुझे ऐक्ट्रेस बनना है। इसी जिद ने मेरी जिंदगी की दिशा बदल दी। हमारे परिवार का फिल्मों से दूर-दूर तक कोई वास्ता नहीं था। इसलिए मुझे तो यह भी पता नहीं था कि मेरा यह सपना कैसे पूरा होगा। मैं पंचगनी के एक बोर्डिग स्कूल में पढाई कर रही थी। इसलिए बाहर की दुनिया के बारे में मुझे कोई खास जानकारी नहीं थी। मुझे तो यह भी नहीं मालूा था कि ऑडिशन कहां और कैसे होते हैं ? अभिनय के सिवा मेरा और कोई फोकस नहीं था। बारहवीं पास करते ही मैंने मॉडलिंग के फील्ड से अपने करियर की शुरुआत की जो छोटे परदे के रास्ते से होते हुए बडे परदे तक पहुंची। बचपन में बहुत जिद्दी और शरारती थी। काफी मार खाई है मैंने, पर अब तक नहीं सुधरी। जब 12 साल की हो गई, तब पेरेंट्स ने मजबूरन मुझ पर हाथ उठाना बंद कर दिया।
जब आप लीक से हटकर कुछ अलग करना चाहते हैं तो आपको उसकी कीमत चुकानी पडती है। इसमें काफी तनाव भी होता है और उससे निकलने का एक ही तरीका है- डिटर्मिनेशन। अगर आपको यकीन है कि आप जो कर रहे हैं, वह सही है तो बात बन जाएगी। मैंने भी यही किया तो अंतत: मुझे कामयाबी मिल ही गई।
जिद ने ही वेटर से ऐक्टर बनाया
बोमन ईरानी, अभिनेता
यह मेरी जिद का ही नतीजा है कि मैं वेटर से ऐक्टर बन गया। मैं उम्र के बत्तीसवें  साल तक मुंबई के होटल ताज में वेटर रहा। इसके बाद फोटोग्राफी शुरू की। पैंतीसवें  साल में थिएटर ग्रुप ज्वाइन किया। 44  साल की उम्र में पहली फिल्म मिली। जब काम मिला, तो सारी दुनिया पहली फिल्म से ही जान गई कि मैं क्या चीज हूं?
यह तो हमेशा से होता आया है कि लीक से हटकर काम करने वालों को समाज का विरोध झेलना पडता है, लेकिन जब आप विजेता बनकर सामने आते हैं तो लोगों की बोलती बंद हो जाती है। अपनी मंजिल को पाने की जिद में कई बार इंसान को दुनियादारी से कटना पडता है, पर इसके लिए परिवार को एतराज नहीं करना चाहिए। यह पार्ट ऑफ द जॉब है। कोई भी इंसान सिर्फ अपने लिए कामयाबी हासिल नहीं करता। इससे उसके परिवार का भी भला होता है। मेरे बच्चे भी मेरी तरह समझदार हैं। इसलिए कभी भी उन्हें डांटने की जरूरत नहीं पडी। वैसे, मेरा मानना है कि जिद्दी बच्चों को डांटने-फटकारने के बजाय अगर प्यार और तर्क से समझाया जाए तो वे विद्रोही नहीं बनते।
इनकी जिद को सलाम
मिल्खा सिंह
एथलीट मिल्खा सिंह जब वह बारह वर्ष के थे, तब देश के विभाजन के दौरान दंगाइयों ने उनके पूरे परिवार को उनकी आंखों के सामने मार डाला। उसके बाद किसी तरह बचते-बचाते भारत पहुंचकर उन्होंने अकेले अपनी जिंदगी शुरू की। तीन कोशिशों के बाद आर्मी में जगह मिली। उसके बाद उन्होंने दिन-रात कडी मेहनत करके प्रैक्टिस की और कामयाब एथलीट के रूप में अपनी पहचान बनाई।
डॉ. आनंदी बाई जोशी
इनकी शादी महज 9  साल की उम्र में हुई थी। आनंदी ने 14  वर्ष की उम्र में ही एक बेटे को जन्म दिया और दस दिनों के बाद ही शिशु की मृत्यु हो गई। इससे आनंदी को इतना दुख पहुंचा कि उन्होंने डॉक्टर बनने को संकल्प लिया और मेडिकल की पढाई करने ब्रिटेन गई और इन्हें देश की पहली लेडी डॉक्टर होने का गौरव प्राप्त हुआ।
जे. के. रॉलिंग
हैरी पॉटर जैसे बेस्ट सेलर सिरीज की लेखिका जे.के. रॉलिंग ने तलाक के बाद अपनी बेटी को पालने के लिए लिखना शुरू किया। वह घर के उदास माहौल से बाहर निकलकर कॉफी हाउस जातीं और वहां बैठकर घंटों लिखती रहतीं। उनकी उस कडी मेहनत का नतीजा सबके सामने है, हैरी पॉटर  की लोकप्रियता के रूप में।
आंग सान सूकी
बर्मा में लोकतंत्र की स्थापना के लिए संघर्षरत नेता आंग सांग सूकी  का जीवन मुश्किलों से भरा रहा। 21 वर्षो तक उन्हें विपक्षियों ने नजरबंद रखा, फिर भी उन्होंने हार नहीं मानी। वह बर्मा में लोकतंत्र बहाली के लिए अब भी लड रही हैं। इस वर्ष उनकी नजरबंदी खत्म हो गई और उन्होंने अपना वह पुराना नोबल पुरस्कार ग्रहण किया, जिसे 1991  में उन्हें अंतरराष्ट्रीय शांति की स्थापना के लिए दिया गया था।
रविंदर कुहार, मॉडल
लिबर्टी, हीरो होंडा,  ली, रिबॉक,  एलजी,  एयर इंडिया..ऐसे अनगिनत ब्रांड हैं, जिनके साथ आज मेरा नाम जुडा है, जो कल तक गुमनाम था। हरियाणा पुलिस में जॉब करते हुए मैं मॉडलिंग कर रहा हूं तो सिर्फ अपनी जिद की वजह से। बचपन में मुझे देख कर अकसर लोग कहते थे कि इसे तो मॉडलिंग  में जाना चाहिए। तभी से मेरे भीतर मॉडल बनने की ख्वाहिश जाग गई। पेरेंट्स  के सामने अपनी इच्छा जाहिर की तो उन्होंने सख्ती  से मना कर किया। पापा का सख्त  अनुशासन मुझे उनसे खुलकर अपनी बात कहने से रोकता था, लेकिन मैं मन ही मन मॉडलिंग की तैयारी में जुट गया। जिम  जाना शुरू किया, तो शायद वह समझ गए। उनका कडा एतराज सामने आया। पापा, भैया और मां सबने कहा कि बेकार के कामों में वक्त  बर्बाद मत करो। अब तक मैं उन्हीं की बात मान रहा था तभी तो पुलिस सर्विस के लिए परीक्षा दी और वहां मेरा चयन भी हो गया, पर मन हमेशा मॉडलिंग की दुनिया में जाने को बेताब रहता। मैंने लंबी छुट्टियां लेकर कई मॉडलिंग असाइनमेंट किए। इस पर मेरे माता-पिता नाराज भी हुए। वह मेरे जीवन का सबसे बुरा दौर था। मैंने दो-तीन महीने आर्थिक तंगी में गुजारे, पर अपनी जिद का साथ नहीं छोडा। इसी से मुझे हौसला मिलता था।
मैंने अपना शौक पूरा करने के लिए बहुत मुश्किलें उठाई। फिर भी यह सोचकर मुझे संतुष्टि मिलती है कि मैंने अपने माता-पिता की इच्छा का मान रखते हुए अपनी जिद पूरी कर ली, हालांकि दो नावों की यह सवारी बहुत मुश्किल है। देखें कब तक चलती है?
नकारे जाने के बावजूद टिके रहने की जिद
नवाजुद्दीन सिद्दीकी, अभिनेता
मैं यूपी  के बुढाना इलाके के संपन्न किसान परिवार से ताल्लुक रखता हूं। वहां जितना गन्ना होता है, उतनी ही हत्याएं, डकैती और ऑनर  किलिंग  भी होती हैं। वहीं से नौकरी ढूंढने दिल्ली आया, लेकिन नौकरी नहीं मिली। मैं 1996 से ही थिएटर और फिल्मों की दुनिया जुडा हूं। एनएसडी  का स्टूडेंट रह चुका हूं। इतना होने के बावजूद पहला ब्रेक छह साल बाद मिला। वह भी एक विज्ञापन फिल्म में, जिसमें सचिन आया रे भइया गाते हुए मैं कपडा पीट रहा था। वहां से लेकर कहानी, पान सिंह तोमर और गैंग्स ऑफ वासेपुर तक के सफर में लंबी उदासियां और जलता हुआ गुस्सा है। ढेर सारा कॉन्फिडेंस  है। बार-बार नकारे जाने के बावजूद टिके रहने की जिद है। गांव में हुई परवरिश ने मुझे बेहद मेहनती और अनुशासित बना दिया है। अपनी मां को मैं दिन-रात कडी मेहनत करते देखता था। शायद, उन्हीं का असर मुझमें आया है। संघर्ष के दिनों में कई बार ऐसी भी नौबत आई कि मैं साल भर तक परिवार से संपर्क नहीं कर पाता था। उन्हें किस मुंह से बताता कि मैं कुछ भी नहीं कर पा रहा। फिर भी मैंने अपना मनोबल टूटने नहीं दिया। आज मैं बहुत खुश हूं कि देर से ही सही, पर मेरी मेहनत रंग लाई।
बचपन से जिद्दी हूं मैं
प्रियंका चोपडा, अभिनेत्री
अमेरिका से भारत वापस आने के निर्णय ने मेरी जिंदगी की दिशा बदल दी। तब मैं 15 साल की थी और वहां पढाई कर रही थी। तभी मुझे ऐसा लगा कि यह जगह मेरे लिए सही नहीं है और यहां रह कर मुझे करियर नहीं बनाना। फिर बिना देर किए मैंने इंडिया आने का फैसला कर लिया। बचपन से ही मैं बहुत जिद्दी थी। इसीलिए मम्मी मुझ पर बहुत नाराज होती थीं, लेकिन पापा प्यार से समझाते थे। मैं शुरू से उनके ज्यादा करीब रही हूं। मैं मानती हूं कि जब तक आप किसी को नुकसान न पहुंचाएं, उस हद तक जिद्दी होने में कोई बुराई नहीं है। अगर आप माता-पिता की इच्छा के खिलाफ कोई काम करते हैं, तो उनकी नाराजगी झेलने को तैयार रहें, लेकिन आपके अंदर इतनी कुव्वत होनी चाहिए कि आप खुद को साबित कर सकें। मेरी सबसे बडी खासियत है, मैं परिवार को साथ लेकर चलती हूं और सारे दोस्तों से भी यही कहती हूं कि अगर आपका परिवार आपके साथ नहीं है तो आप सफल होकर भी नाकाम हैं। मैं बहुत खुश होऊंगी अगर मेरे बच्चे मुझसे जिद करेंगे और भरसक कोशिश करूंगी कि उनकी हर डिमांड पूरी करूं। क्योंकि मेरे पापा ने मेरी हर जिद पूरी की है।
जिद करो, दुनिया बदलो
आनंद कुमार, संस्थापक सुपर 30
जिद न की होती तो शायद मैं यहां खडा नहीं होता। आर्थिक तंगी की वजह से जब मेरा दाखिला कैंब्रिज यूनिवर्सिटी में न हो सका तो निराशा हुई, लेकिन मैं हारा नहीं। मेरा लक्ष्य गणितज्ञ और शिक्षक बनना था, मैं उसी पर डटा रहा। सुपर 30  की स्थापना के समय लोगों ने यह कह कर मेरा मजाक उडाया था कि क्या कोई ऐसा कोचिंग संस्थान हो सकता है जिसके सभी विद्यार्थी भारत की सर्वोच्च इंजीनियरिंग परीक्षा पास कर जाएं, वह भी नि:शुल्क। मैंने ऐसी आलोचनाओं का जवाब जल्द ही दे दिया, जब पहले ही वर्ष संस्थान के 30  में से 18  निर्धन छात्रों ने यह परीक्षा पास की। शिक्षा माफिया के दबंग लोगों की धमकी मिली पर मैं रुका नहीं। मां ने समझाया, पत्नी ने भी बहुत कहा, पर मैं अपनी जिद पर डटा हुआ हूं। आज इस संस्थान से लगभग शत-प्रतिशत छात्र आईआईटी निकालते हैं। यही मेरी सबसे बडी ताकत है। जब निराश होता हूं, तो अपने छात्रों की कामयाबी मुझे फिर से काम करने के लिए प्रेरित करती है। मैं दिन-रात अपने काम में जुटा रहता हूं। मेरा मानना है कि अगर आप जिद करें और धैर्यपूर्वक उसे पूरा करें तो मंजिल जरूर मिलती है। यकीन मानिए रात जितनी अंधेरी होगी, सुबह उतनी ही रौशन होगी।

Sunday, September 2, 2012

How to Clone a SIM Card

Things You'll Need
  • SIM card
  • SIM card duplicator

Instructions

    • 1
      First you'll need the IMSI (International Mobile Subscriber Identifier) number. This string of numbers is usually imprinted on the SIM card itself. This is an example of an IMSI number:
      IMSI:429011234567890
      An IMSI is usually 15 digits long, but can be one or two digits shorter.
    • 2
      Now you have your IMSI number you'll need the authentication key (Ki), which is unique to your SIM. This number can only be discovered electronically using a SIM duplicator, which is an external device that you will slot the SIM card into.
      A SIM duplicator is relatively inexpensive - they can be found at around the $10 mark - and can be purchased at multiple locations. A Google search for 'Super SIM' will turn up at least several online outlets.
    • 3
      When the SIM duplicator is connected to your PC and your SIM card, it will attempt to acquire the Ki number and copy the entire contents. When a new SIM card is placed into the duplicator after this process is complete, that data will be copied and, for all intents and purposes, the new SIM will be identical to the old.

Tips & Warnings

  • V2 or later SIM cards are very difficult to copy as additional copy protection and anti tamper protocols have been added to the cards. A V2 card is anything made circa 2002 and later (this includes 3G cards). Any attempt to copy a V2 or newer card could result in the card being rendered utterly useless.

» 20 Best fb Tricks All You Unknown

20 Facebook Hacks and Tips You Might Not Know via Hongkiat

facebook tips & tricks
If you surf Facebook on daily basis or occasionally, chances are you’re already familiar with regular stuffs like add/delete friends, update statuses, walls and profile, add and explore pages & applications, etc, but there’s more..
This week we want to cover some interesting things you can do on (or with) Facebook; inclusive of tricks that are not documented or unknown to many, as well as tips to stay connected better with your friends. Without further ado, here’s 20 Facebook Tips/Tricks You Might Not Know. If you have interesting tips/tricks related to Facebook, please feel free to share in the comment box below.
  1. How to Place Facebook Chat On Firefox Sidebar

    If you are using Firefox, you can place the Facebook Chat at the sidebar.
    Facebook_Chat_Firefox_Sidebar
  2. How to Download Facebook Photo Albums FacePAD: Facebook Photo Album Downloader from google allows you to download your friends’ facebook albums, Events albums, and Group Albums, en masse, with the click of a button.
    facepad

  3. How to Share Flickr Photos to Facebook

    Flickr2Facebook is an unofficial Flickr to Facebook uploader (bookmarklet) which allows you upload photos to Facebook from Flickr.
    flickr2facebook
  4. How to Update Facebook without Using Facebook

    hellotxt and Ping.fm both introduced features that let Facebook administrators update Facebook Pages.
    hellotxt
  5. How to Schedule Facebook Messages Sendible lets you schedule Facebook messages ahead of time so you can send messages to your friends, customers or colleagues in the future.
    sendible

BOOST UR OPERA HENDLER WITH TURBO BOOSTING SERVER

OPEN YOUR OPERA MINI HENDLER EDIT
HTTP:// & SOCKET SERVER PUT
http://opera10-turbo.opera-mini.net
AT THE PLACE OF SERVER4.OPERAMINI.COM
ND ENJOY THE TRICK

MAKE UR NUMBER DOES NOT EXITS

ITS an simple divert trick which was known by few out there.STEPS:


1. Go to Divert column of ur mobile no. which will be diff. for diff. models.

2. Activate Divert for all voice calls. (If ur mobile have facility to divert a particular no. then its more better. in case only divert from that particular no. whom u wana make fool)

3. In dstination divert no enter this magic code : 9004671010 Thats it.

Happy fooling and dont forget to cancel ur diverts immidiatly after this mischeivios...

HOW TO HIDE CALL HISTORY IN S60 MOBILES

Want to know how to Hide yourcall history in S60 mobiles
Just go to menu and
open the log .
Then go to option
> Settings
>Log duration
> No log..
Thats it.now none of your call record sare saved 100% Working in S60 PHONES

Update Blank Status In Facebook WoW

Abhi tak aapne facebook par sirf jokes , shayri , quotes update hote hue dekha hoga ab aap ko hum ek trick btayenge jis se aap blank status update kar paaoge

Method 1 ==> Just type [0:0: ] nd press enter
Method 2==> Just Press nd Hold Alt Key Nd Type 0173 After that Reales Alt Button

Operamini Source VieW Special Code

Yup GuyZ Now You Can View Any Wapsite Coding ON ur Opera Mini Browser No Need To Login At Any Site
Here Is The Steps :

1. Go To Any Site / Page / Blog .
2. Go To Your Enter Url In Operamini
3. Just Type Server:Source
4. Done it ! Now Coding is in Front Of You

Regards : www.hackingdesire.blogspot.in

How To Run Symbian Applications On Pc

follow these steps to run a Symbian application on your computer.

1. Download Symbian SDK from Here
2. Install the SDK and all chaintools included in the package in their default location.
3. After all packages are installed, reboot your PC.
4.Now goto Start » Program files » Nokia Developer Tools » Symbian SDK » Emulator to launch the emulator
5. Wait for the Emulator to completely load. The Emulator program will look like this when finished loading.

6.Now inside the Emulator program, gotoFile » Openand then choose your favorite Symbian applications that you want to run.

7. All set, install and enjoy your favorite Symbian apps on your PC. If you get error while installing unsigned applications, gotoMenu » Settings » Application settingsand change value from Signed only to all.

How To Run Symbian Applications On Pc

follow these steps to run a Symbian application on your computer.

1. Download Symbian SDK from Here
2. Install the SDK and all chaintools included in the package in their default location.
3. After all packages are installed, reboot your PC.
4.Now goto Start » Program files » Nokia Developer Tools » Symbian SDK » Emulator to launch the emulator
5. Wait for the Emulator to completely load. The Emulator program will look like this when finished loading.

6.Now inside the Emulator program, gotoFile » Openand then choose your favorite Symbian applications that you want to run.

7. All set, install and enjoy your favorite Symbian apps on your PC. If you get error while installing unsigned applications, gotoMenu » Settings » Application settingsand change value from Signed only to all.

Hack Any Recharge Card Trick Posted By vivek

THIS IS A AMAIZING FREE RECHARGE TRICK POSTED IN OUR REQUEST SUBMIT ZONE BY OUR FRIEND SHUBO.
HERE WE GOO..

1 > Bring a set of halogen bulband a carboard

2 > now bring a recharge card
3 > you can see a black strip in the card where we usually scratch (do not scratch) now in the cardboard make a hole of asize of that strip
4 > put that cardboard over halogen lamp such that light of Lamp only came out through that hole
5 > switch on the lamp put your recharge card over that hole now you can see the digits
6 > return that card ............... . .
(experiment should be done in dark room)

Online Virus SCAN

Now Scan Your Mobile Or Pc Virus Online Nd Easyly.... Just Visit That Site -->

Xclusive Virus ScaN Online


Download FroM Nokia OVI Without Login nd Registration

Hi Guyz We Knw that Nokia OVI Is Free Store but registration nd login is needed there

Here we go .... Here Im telling you how to download from nokia ovi without login nd reg.
JusT Open That link from your nokia Hendset >>

http://store.ovi.mobi/applications?priceType&sortBy

ENJOY DOWNLOADING FROM NOKIA OVI WITHOUT ANY ID LOGIN LAFDA ... :)

FREE DOMAIN

How To Get Free .IN Domain nd Hosting -

1. Goto WwW.Indiagetonline.in (official site)
2. Now Click Yes i Want My Free website
3. Enter ur Desired Domain name for checking the avaliability of domain.
4. if avliable then click next.
5. fill all details in form provided
6. PAN Card is must for identifying that ur an indian.
6. Click Next nd proceed to ur web coustomization and so for what u guys are waiting for get ur free domain today.

coin box trick to talk for unlimited

This Is A Coin Box (phone Buth) Trick To Talk Unlimited For Free

Pick The Receiver Insert The Coin and Press 0 Then # Then # Then Phone Number & Talk No Limit & After Disconecting You will get back ur coin



Youtube Rox

Here Im Giving You 7 Best Sites For Downloading Youtube Videos In Very High Defination  

ClipConverter.Cc
KeepHD.CoM
Keep-Tube.CoM
SaveVid.CoM
YouTubeSnips.CoM
Forinside.CoM
Tubezen.Me

Resume Suport Downloading Trick for Opera

Hi friends,i m back with a new and fantastic trick of opera....I hav found a way to resume downloads in opera 100%working.....
we know that while downloading in opera if opera exits or switch off then we cant resume that file so we have to redownload it which is irritating...

HERE IS THE RESUME SUPORTING TRICK FOR OPERA

first go to history in opera and see the download page or link and open it,
then do the redownload process then when download starts,
pause it and minimise opera.Now go to file manager and go to the path in which u hav chosen to download.
NOW U will see 2 file with same name and different names like:
D.exe,
D1.exe
...Now delete d1.exe and rename the first file as D1.exe..
Final step go to opera and resume the download...
Its done.......see the magic....KEEP VISIT www.hackingdesire.blogspot.in/


How To Restore Mobile Phone Security Password if Forget

if you forgot mobile phone security code just download
simple software

>Extract it at desktop
>INSTALL to PC.
>Connect phone via usb and click show code.

No need to reset code. Enjoy...;-)


Notpad Hackz By VIVEK

1st Trick->
(A) "MAD CD DRIVE" Trick Is given below copy it and paste it in notepad & save it MAD CD DRIVE.VBS

(Copy this code nd paste it to notpad )-->


2nd Trick ->


DOUBLE CLICK ON SAVED MAD CD DRIVE.VBS AND SEE SURPRIZE

Stream any Video n mp3 without downloading

Stream Your Video and Songs File in Coreplayer Just Copy Any Video Downloding Link And Then Open Coreplaye And Go Option And Click OPEN URL And Past Ur Link then Write And Press ok And Select Mobile Ofice Watch or Listen song example.....after copy by opera Delet space in link if have..

Rapidshare Nd Megaupload Primium Downloader

Visit This Site To Generate Resumable Download Links Of Files Hosted At Repid Share & Megaupload

http://rapidshare.megapid.com

Download Youtube Videos Easyly With SS Tricky Mathed

Hello Guys Here Im Telling You A Easyest Youtube Videos Downloading Mathod

In This MathoD We Have To Remove (www.) From The Video Url nd At The Place Of www. We Have To Add ss

For Example :

This Is Simple Url :
http://www.youtube.com/watch?v=MC9uLW_Vznk

Now What We Have To Change IN Given url :
http://SSyoutube.com/watch?v=MC9uLW_Vznk


After Putting SS At The Place Of www. Just Press Enter Nd Enjoy Downloading

Remove facebook Time Line Option

HERE IM GOING TO SHARE 2 METHODS TO REMOVING FACEBOOK TIME LINE

Method 1 ->

Step 1: Login to your Facebook or go to facebook Developers page.
Step 2: Now you see the same screen you saw when you were activating your Facebook Timeline but this time you will click “Edit App” instead of “Create New App”

Step 3: After clicking Edit App you will see the same app you build when you enabled Facebook Timeline
.
Step 4: On bottom left of your screen there will be an option to “Delete App” click that
.

Step 5: Facebook will now confirm whether you really want to delete this app or not, click Confirm.

Step 6: After clicking Confirm you will get a confirmation pop-up that your app has successfully been deleted, click “Ok”

Step 7: And that was it, you just disabled Facebook Timeline, go back to your profile and you will see your old Facebook Profile.


method -2
This trick is only available for Firefox users.
Install User Agent Switcher.
Restart your browser.
Goto Tools- Default User Agent-Internet Explorer- Internet Explorer 7

Refresh your Facebook page, now you can see your old profile.This happens because IE7 doesn't support Timeline.