Search This Blog

Saturday, May 15, 2010

Why folders with the name CON can’t be created in Windows??

Hey Guys
Some people don’t know why they can’t create it?
Very few know that they can still create it someway. But don’t know why are they supposed to do exactly like that.
Now, After reading this tutorial, you will become one of the rest
__________________________________________________ _________________________

Type 1:
Not only CON, we cannot create any of these
CON, PRN, AUX, NUL, COM1, COM2, COM3, COM4, COM5, COM6, COM7, COM8, COM9, LPT1, LPT2, LPT3, LPT4, LPT5, LPT6, LPT7, LPT8, LPT9 and more

The reason is that con, prn, lpt1..lpt9, etc are underlying devices from the time dos was written. so if u r allowed to create such folders, there will be an ambiguity in where to write data when the data is supposed to go to the specified ugydevices. In other words, if i want to print something, internally what windows does is — it will write the data to the folder prn (virtually u can call it a folder, i mean prn, con, etc are virtual folders in device level). So if we are able to create con folder, windows will get confused where to write the data, to virtual con folder or real one.
So Now, Try this…
Open the Command prompt by Start -> Run and type cmd
Code:
C:\> md \\.\c:\con
Now, Open My Computer and browse through the path where you created CON folder… Surprising?? Yeah, you have created it successfully
Now, try to delete the folder from My computer
OOPS!!! You can’t delete it…
Now, try this in command prompt console
Code:
C:\> rd \\.\c:\con
Yeah!! You did it…
__________________________________________________ __________________________
Type 2:
Well, let us now have a glance at how we were able to create it…
It is just because of the UNC Path (Universal Naming Convention). The Universal Naming Convention, or UNC, specifies a common syntax to describe the location of a network resource, such as a shared file, directory, or printer. Since, these conventions didn’t exist under pure DOS, they are not backward compatible. The UNC syntax for Windows systems is as follows.

\\RemoteHost\sharedfolder\resource


Where RemoteHost is the computer name / IP address of the computer that you wish to connect through remotely for accessing shared folder. The rest is the path.
(Here \\remotehost\drive:\con doesn’t make sense anyway, because without having a process on the remote host, there is no current ‘console’). It would be a security hazard as well, having the serial and parallel ports accessible for everyone who is allowed to read or write in any single directory.
The ” .” in the command \\.\c:\con suggest the local server. Now, you are pointing to your own computer. Since, you have all privileges on every folder of your computer, you can easily create it.

Display Legal Notice on Startup of your Windows !!



If your PC has multiple users then you can now display legal notice to every user before they login to your PC. This legal notice will be displayed at every startup just before the Desktop is loaded. Using this you can tell your friends about the do’s and dont’s in your computer when they login in your absence. Well you can do this pretty easily. For this there is one small registry hack. Here is the step-by-step instruction to do this.

1. Go to Start->Run, type regedit and hit ENTER

2. Navigate to the following key in the registry
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion
\policies\system
On the right side pane look for “legalnoticecaption“, double click on it and enter the desired Legal Notice Caption.

3. Next below this look for “legalnoticetext” and enter the desired Legal Notice Text. The legal notice text can be up to a page in it’s size so that it can include a set of do’s and dont’s for your computer.

4. After you do this just restart your computer and upon the next startup you can see the legal notice information for your computer. This trick works on both XP and Vista. You can also try it on Windows 7 and should work with no problems.
Hope you like this post. Pass your comments.

Multiple Gmail Id's for Same Account !!!



Hello Friends,
This is a method of How to Use Multiple Gmail ids for Same Account
You can have multiple email address of your existing gmail account just add “+” symbol after your user name then add anything followed by @gmail.com. Read the example below for better understanding.
My gmail id is shijinmrx@gmail.com This email address is being protected from spam bots, you need Javascript enabled to view it , Suppose I have three friends unais, rashid, imtiaz and if they ask for my email address then I tell them its
shijinmrx+ unais@gmail.com This email address is being protected from spam bots, you need Javascript enabled to view it ,
shijinmrx+ rashid@gmail.com This email address is being protected from spam bots, you need Javascript enabled to view it and shijinmrx+ imtiaz@gmail.com This email address is being protected from spam bots, you need Javascript enabled to view it .
When they send me at this address it first goes to gmail server where it recognize it as shijinmrx@gmail.com This email address is being protected from spam bots, you need Javascript enabled to view it and avoids “+” sign and anything after it. So any mail send to shijinmrx+ anything@gmail.com This email address is being protected from spam bots, you need Javascript enabled to view it come in my inbox.
So If you have Boyfriend/Girlfriend tell him/her email your email id as yourmail+ yourmate@gmail.com This email address is being protected from spam bots, you need Javascript enabled to view it

Note: TO check your mail you have to login as yourmail@gmail.com This email address is being protected from spam bots, you need Javascript enabled to view it that is in my case shijinmrx@gmail.com This email address is being protected from spam bots, you need Javascript enabled to view it without “+” sign.

Tips To Recover Scratched CD's


1. Spread a cloth on a flat surface and place the CD on it.

2. Then, hold the disc with one hand, use the other to wipe the polish into the affected area with a soft cloth.

3. Wait for it to dry and buff using short, brisk strokes along the scratch, not across it.

4. A cloth sold to wipe spectacles or camera lenses will work super m8’s.

5. When you can no longersee the scratch,, wash the disc with water and let it dry before playing. Intersting isnt it? Try it right now

NOTE--

I have used toothpaste with good effects before Ive also used car paint cutting compound on deeper scratches. It does leave lots of smaller scratches (as it is a cutting compound after all) but it will remove the worst scratches in most cases.

Use Kaspersky For a LifeTime !!!

After a lot of searching and using a lot of patches I found this and I tried it on my Windows XP and it works for me 100% without any blacklisting problem.Actually this is a simple trick of playing with 
Registry settings.


Generally Kaspersky provide us 30 days trial period on its Anti-virus Product. So there are the few steps that you have to perform when your trial license going to expire after 30 days for getting a new trial license :


1. Delete old key and turn off self defense (Settings-Options in kaspersky and turn off Enable self-defense, and click OK).


2. Open Registry editor (click start in windows menu then goto run and write regedit and click Ok) and go through these :


For 32bit OS: HKEY_LOCAL_MACHINE \ SOFTWARE \ KasperskyLab \ protected \ AVP9 \ environment


For 64bit OS: HKEY_LOCAL_MACHINE \ SOFTWARE \ Wow6432Node \ KasperskyLab \ protected \ AVP9 \ environment


3. Right look for PCID and right click and modify three or four last numbers or letters example : (8F10C22F-6EF6-4378-BAB1-34722F6D454)
and enter any other three-letter four-number and close the Registry Editor.

Contact

4. Right click on Kaspersky icon in the task bar and choose exit.


5. Go to Start-Programs menu, open the Kaspersky and when you activate searching trial license and you have new license of a peaceful month.


6. Go to Kaspersky settings and turn on self-defense.
This is hardly a 2 minute job and you got again a trial period of 30 days, and there is no rush for more keys.
Note : Most of the patches that you will found on the net are basically work on that trick, they simply make the changes in the registry and change identification of your computer to the Kaspersky server, thus Kaspersky log server recognizes you as a new user and assigns you new trial license.

Wednesday, April 21, 2010

Recover Deleted Files From Hard Drive!!!

RECOVER YOUR LOST DATA

Have you accidentally deleted your files from the Hard disk? Do you desperately want to recover them back? Well you need not panic! It is possible to recover the deleted files back from your hard disk (even after you have Shift+Deleted) provided you act as soon as you realize that your files are deleted and use the best deleted files recovery software. In this post you will find a detailed information on how to recover the deleted files from your Windows PC or Mac.
                                                                   Today there exists hundreds of data recovery tools and softwares on the market which boast to recover 100% of all the deleted files back in the original condition. But in reality most of these softwares are neither effective nor capable of recovering your files back. So it is very much necessary to make the right choice of the file recovery software in order to recover deleted files back in the original condition. We recommend the following software to recover the deleted files.


Stellar Phoenix is one of the best company specializing in deleted files recovery services and solutions since 1993. Stellar’s Data Recovery Solutions encompasses a wide range of software for almost any data loss situation ranging from accidental formats to virus attacks to software malfunctions. Hence Stellar provides the best tools to recover deleted files with over 1,000,000 satisfied customers across 137 countries. 

What are the Chances of Recovering Files Back?


Since the operating system doesn’t immediately re-use the space from the deleted files, it is most certainly possible to recover the deleted files back in 100% original condition. It may take up a very long time for those files to be completely deleted since the modern hard disks have ample capacity. Hence the chances are too less that the space from the deleted files are re-used immediately. So, it is really worth to try out the file recovery softwares like Stellar Data Recovery for Windows or Stellar Data Recover for Mac. Some files are reported to have recovered even after years of it’s deletion. However for the best results, it is recommended that you use the file recovery software as immediately as possible to recover your files.

Recovering the Deleted Files

In order to recover the deleted files all you need to do is perform a scan (search) for the deleted files using a File Recovery Software. Please be informed that there is no manual way to recover the deleted files. The Phoenix Data Recovery software performs a thorough scanning of the hard disk sector by sector and will locate the existence of deleted files to restore them back in the original condition. It is the only software that supports 185 popular file types including Windows NT Registry, JPEG, MP4, GIF, BMP and MS Word files. The software offers rich graphical support and incorporates advanced scanning methods to completely scan and recover deleted files from your hard drive. With this you can


■ Recover FAT16, FAT32, VFAT, NTFS, and NTFS5 file system partitions
■ Recover deleted emails
■ Recover deleted documents
■ Recover deleted photos
■ Recover deleted music
■ Formatted Hard-Drive recovery
■ Recover files from USB Drives, CDs, DVDs and memory cards
■ Recover almost all the camera format files

Secure Files in USB flash drive

USB SECURE

What is USB SECURE??


USB Secure helps you password protect USB drive, thumb drive, memory stick, pen drive, jump drive, flash drive and external hard drive. It supports plug and play and runs automatically once a USB drive is plugged in, asking you the password for it. USB Secure is hassle free and it doesn’t need a rocket scientist to master. USB drives are the most popular way to move data from one PC to another. They are small in size but can carry gigabytes of data. They are easy to use, convenient, affordable, but at the same time they pose a security risk and can be easily lost, stolen or misplaced. To password protect USB drive is a must these days as the data that it contains may cost you millions of dollars if stolen or lost.You can easily lock USB drives with USB Secure and can also password protect memory sticks and all other external storage devices with just a single mouse click. An easy to use setup program will guide you to put the program on your USB drive. It can automatically detect all such drives currently plugged into your PC. After installing simply run the software, set and confirm a password, protect USB drive and sit back and relax! It’s not necessary to run the software every time you want to password protect USB drive; you can simply choose ‘Protect This USB Drive’ option from the Windows Autoplay that pops up every time you plug-in your USB drive. You can also double click the USB drive in your PC to launch the program. To unprotect your secure USB drive, click 'Unprotect' and enter correct password to access your data again. Another great feature of USB Secure is that it doesn’t require any Administrator rights to run and therefore there is no need to install it at the other end to retrieve the password protected data. The program also supports plug & play and asks for a password immediately when the drive is plugged-in. Password protect USB drive and other portable media with USB Secure.


Features-

PORTABLE

• Take your secure USB drive anywhere

• Plug in to any PC and it will run
• No Administrator rights are needed
• Protection is PC independent
 
 
 
Theft Proof
 
 

• Password protect USB drive data

• Don't worry about lost USB drives
• Stolen USB drives are not a problem
• Misplaced USB drives? No worries!




Leak Proof


 
• Data is leak proof

• Take your documents with you
• Business plans go nowhere
• Financial documents stay with you
 
 
 
Loss Proof


 
• Inaccessible data without password

• Can't be lost or deleted
• Can't be tampered with easily
• Ideal to keep a secure backup copy





 
Plug and Play
 
 
• Supports Autoplay feature

• Setup detects all devices attached
• Runs automatically on drive access
• Autoplay for protecting & unprotecting
 
 
 
Fast
 
 
• Fast and reliable

• PC Independent protection
• Quickly protect data
• Takes seconds to protect GBs of data


To Download Full Version
1) Download Utorrent or Bitorrent
2) Download USB secure torrent file
 
 

CyberRoam Hack!!!! Updated...

..HACK..

About Elitecore Cyberroam

Cyberoam’s identity-based Unified Threat Management solution and Cyberoam Central Console are products of Elitecore Technologies Limited and offer identity-based security. Cyberoam Unified Threat Management offers network security to enterprises against external and internal threats. The Cyberoam Central Console offers centralized control and management to large enterprises and Managed Security Service Providers.

How to Get access to blocked sites.

there are many ways to get access to blocked sites.

1) Using Software

you can access blocked sites by using various softwares.

ULTRA SURF

Protect Internet privacy with anonymous surfing and browsing -- hide IP addresses and locations, clean browsing history, cookies & more.Completely transparent data transfer and high level encryption of the content allow you to surf the web with high security.UltraSurf allows you to overcome the censorship and blockage on the Internet. You can browse any website freely, so as to obtain true information from the free world.

Download Ultrasurf from Here

2)VPN Hack

using of softwares is a old technique and also these softwares reduce the speed and can only open some blocked websites. By using VPN(virtual private network) to can get access to all websites(torrent downloading is not possible when i checked) and you also get appr. same speed. 

to connect VPN(i was using windows 7, there may be slight change)-

1)Connect to internet(using dialup, wlan, lan)
2) Go to control panel->setup a new connection->
3) Click on connect to a work place
4) Click on "Use my Internet Connection(VPN)"
5) In the Internet adress field type"vpn.kongshare.com"
6) Click next
7) Type username and password(both) as "anonymous"(without quotes)
8) Click connect

tadaaa...it will get connected..now enjoy..
if you have any doubt feel free to ask me...

Monday, January 25, 2010

Wanna Know who used your Pc in your Absence



t
first you should go


"start > run >eventvwr.msc"

Events are stored in three log files: Application, Security, and System. These logs can be reviewed and archived.

For our purposes we want the System log. Click on "System" in the left-hand column for a list of events.

Look for a date and time when you weren't home and your computer should have been off.

double click on the eg: info n it will show u the detail.

You can also use this log to see how long someone was on the computer. Just look at the time the computer was turned on and off for that day.

Hope u all will like it.

Download Prince Of Persia : SAnds of Time




PRINCE OF PERSIA : SANDS OF TIME

Download

Install Vista From USB Pendrive



Install Vista From Pendrive

Ever thought of installing Windows using a high speed 2.0 Flash Drive? If you have never heard of about installing from a Flash Drive instead of a DVD ROM, i will tell you why this method is much preferred and why you will be using this method when you use it. The main reason would be performance, who would want to insert a DVD ROM and wait for 30 minutes to go through all the procedures.You know how installing Windows on a Virtual PC virtual machine from an .ISO CD image is teribbly fast?






Of course, you need a high speed 4GB USB 2.0 Flash Drive just to create a bootable Windows Vista on flash memory drive. The faster the drive the better the performance.


1. Formatting the USB Flash Memory to FAT 32 File System



Run CMD.EXE and type the following command. Note: This set of commands assumes that the USB flash drive is addressed as “disk 1?. Double check that by doing a list of the disks (type “list disk”) before cleaning it).



1. diskpart

2. select disk 1

3. clean

4. create partition primary

5. select partition 1

6. active

7. format fs=fat32

8. assign

9. exit



2.  Copy Windows DVD ROM files to the Flash Drive

Type in command to start copying all the content from the Windows Vista DVD to your newly formatted high speed flash drive.



* xcopy d:\*.* /s/e/f e:\

where d is ur drive which contains windows and e is your pen drive



That’s it Guys!, You need to put up the system (Remember, boot it off the USB drive)see for yourself how fast the installtion is done.







Change your Voice When You chat!!!!





FAKE VOICE 2.0

Fake Voice 2.0Fake Voice is a voice changer software which changes your voice to male, female, old, young, hard, shrill, or some one new. If you are female and want to sound like male or if you are male and want to sound like male, this is your tool. You can apply robotic effect to sound like alien or echo effect to sound like you speaking from a well or tunnel.Whether you like you have fun with your friends or you want to improve your voice quality for audio recording, this tool give you full control over your voice.

* Voice changer to change your voice to male, female, old, young or simply some one new.
* Apply Robotic effect and speak like aliens.
* Apply Echo effect and sound like you are speaking from a well.

DOWNLOAD

Xp SP3 Activation Crack





  Download From Here

DOwnload Full Version Of INternet Download Manager




Go to http://rapidshare.com/files/287680568/Internet_Download_Manager_5.18.3_Full.rar

Autocad 2010 Suite +Crack



AUTOCAD 2010 Suite + CRACK


1. Download uTorrent. and Install It.
3.Open the Torrent file and Press Start to start Downloading.

                              OR

* If you have already downloaded autocad and dont have its Crack then Download It from here


Sunday, January 24, 2010

How To Lock Folder Without Software






Lock Any Folder using code.

Open Notepad and copy the below code and save as abc.bat(abc=any name)
*save as .Bat File

At first time start it will create folder with Locker automatically for u. don’t forget to change your password in the code its shown the place where to type your password.
After creation of Locker folder again click on the locker.bat.it will ask whether you want to lock the folder or not.press Y and enter key ,then Locker folder will be disappeared.

To Unlock

Again to get it click on locker.bat.It will Ask For passWord.enter password and press enter.

*It Was Found That This Works Only For XP sp2.




(NB:The folder Locker will be on the same on path of the batch file(*.bat))
**********************************************************
cls
@ECHO OFF
title Folder Locker
if EXIST “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}” goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p “cho=>”
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}”
attrib +h +s “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}”
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p “pass=>”
if NOT %pass%==type your password here goto FAIL
attrib -h -s “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}”
ren “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}” Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End

Saturday, January 23, 2010

HOw to Find IP Adress





Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. In this post I’ll show you how to find the IP address of a remote computer in simple steps.



I have created a PHP script to make it easier for you to find the IP address of the remote computer of your choice. Here is a step-by-step process to find out the IP address.

1. Download the IP Finder script (IP_Finder.ZIP

2. Open a new account in X10Hosting (or any free host that supports PHP).

3. Extract the IP_Finder.ZIP file and upload the two files ip.php and ip_log.txt into the root folder of your hosting account using the File Manager.

4. You can rename the ip.php to any name of your choice.

5. Set the permission to 777 on ip_log.txt.

Now you are all set to find the IP address of your friend or any remote computer of your choice. All you have to do is send the link of ip.php to your friend or the person with whom you’re chatting. Once the person click’s on the link, his/her IP address is recorded in the file ip_log.txt.

For your better understanding let’s take up the following example.

Suppose you open a new account in X10hosting.com with the subdomain as abc, then your IP Finder link would be

http://abc.x10hosting.com/ip.php

You have to send the above link to you friend via email or while chatting and ask him to visit that link. Once your friend clicks on the link, his IP address will be recorded along with the Date and Time in the ip_log.txt file. After recording the IP address, the script will redirect the person to google.com so as to avoid any suspicion.

To find the recorded IP address check the logs using the following link.

http://abc.x10hosting.com/ip_log.php

The sample log will be in the following format

79.92.144.237 Thursday 07th of May 2009 05:31:27 PM
59.45.144.237 Thursday 07th of May 2009 05:31:28 PM
123.92.144.237 Thursday 07th of May 2009 05:31:31 PM

NOTE: You have to replace abc with your subdomain name.

I hope this helps. Express your opinion and suggestions through comments

Keylogger's




Keystroke logging (often called keylogging) is the practice of tracking(or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. There are numerous keylogging methods, ranging from hardware and software-based to electromagnetic and acoustic analysis


1 007 Keylogger Spy Software 3.873
2 Active Key Logger 2.4
3 Activity Keylogger 1.80.21
4 Activity Logger 3.7.2132
5 ActMon Computer Monitoring 5.20
6 Actual Spy 2.8
7 Advanced Invisible Keylogger v1.9
8 Advanced Keylogger 1.8
9 Ardamax Keylogger 2.9
10 BlazingTools Perfect Keylogger 1.68
11 Blazingtools Remote Logger v2.3
12 Data Doctor KeyLogger Advance v3.0.1.5
32 Local Keylogger Pro 3.1
14 ExploreAnywhere Keylogger Pro 1.7.8
15 Family Cyber Alert 4.06
16 Family Keylogger 2.80
17 Firewall bypass Keylogger 1.5
18 Free Keylogger 2.53
19 Ghost Keylogger 3.80
20 Golden Eye 4.5
21 Golden KeyLogger 1.32
22 Handy Keylogger 3.24 build 032
23 Home Keylogger 1.77
24 Inside Keylogger 4.1
25 iOpus Starr PC and Internet Monitor 3.23
26 iSpyNow v2.0
27 KeyScrambler 1.3.2
28 Keystroke Spy 1.10
29 KGB Keylogger 4.2
30 KGB Spy 3.84
31 LastBit Absolute Key Logger 2.5.283
32 Metakodix Stealth Keylogger 1.1.0
33 Network Event Viewer v6.0.0.42
34 OverSpy v2.5
35 PC Activity Monitor Professional 7.6.3
36 PC Spy Keylogger 2.3 build 0313
37 PC Weasel 2.5
38 Personal PC Spy v1.9.5
39 Power Spy 6.10
40 Powered Keylogger v2.2.1.1920
41 Quick Keylogger 2.1
many more all here

http://rapidshare.com/files/106854688/1207994691_eLDeRMaN_subat.part1.rar
http://rapidshare.com/files/106850571/eLDeRMaN_subat.part2.rar



Or

Download REfog Keylogger

REgister using this information---

reference: ZJGSJ33 registration: A855GM-93NLL-AMT2A-98EBN-RSDVB-LV3X7