Your Ad Here


iStream MRB 1.0

iStream Web RAdio 1.4

iStream Web TV 1.4 HERE

Your Ad Here

Wednesday, June 30, 2010

[TUT] Hack Rapidshare Wait Time

Since I started exploring the net the question that has been asked by maximum number of users via Comments, Web Forms or via Communities is “How to hack”. Rapidshare is one of the best file hosting service in the world. You can upload, Download files that you want very easily. But if you are not a premium user of Rapidshare then while downloading any file from the rapidshare, you will get an annoying download time before getting the download link.

And so I am here posting the answer to your most asked question via a very simple trick which will help you to reset the download waiting time to zero. So you can download your files very quickly.

Follow the steps given below and hack yourself:
1. Goto the Rapidshare URL of the file you want to Download.

Tuesday, June 29, 2010

[TOOL] Virus Generator - Batch File

A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.

As stated above, the term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, even those that do not have the reproductive ability. Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves.

Monday, June 28, 2010

[TUT] Fix Missing CD/DVD Drive Icon on My Computer

It's possible that evil gnomes have snuck into your computer and stolen the CDROM drive. Or sometimes they just loosen the wires, leave the drive in your computer, and then watch as the hilarity ensues. It could be a hardware issue, but more likely, it's a software problem. It's a known problem that certain CDROM or DVD software packages don't uninstall properly, and afterwards Windows cannot find the CDROM/DVD drive. Fortunately, that problem is pretty easy to fix.

But first, let's make sure that your CDROM drive is physically connected to the computer. Open My Computer, then click on View system information. When System Properties window appears, select the Hardware tab, then press the Device Manager button.

[SOFWARE] Microsoft Internet Explorer 9 - Preview

Microsoft has released Platform Preview 3 for its upcoming web browser IE9 which is available for download.

A word of caution that this Preview is meant for developers and doesn't include all the "user" features. The PP3 installs side by side with IE8.

Following are a few interesting facts about IE9:

* IE9 will use a new script engine codenamed "Chakra"
* IE9 will provide better support for several standards: HTML5, DOM, and CSS3
* IE9 will provide hardware-accelerated SVG support

IE9 can be installed on systems running Windows 7 and Vista SP2. Both 32-bit and 64-bit systems are supported.

Sunday, June 27, 2010

[TUT] Block Websites Using Host File

Windows uses a HOSTS (located in %systemdrive%/windows/system32/drivers/etc) file to maintain a personal list of web addresses. Any time a request is made for a URL, the HOSTS file will be checked first. If a corresponding address is found you will be directed to that IP without first consulting a DNS Server. The original intent of this file was to define where sites exist; we will use it in this context to define where they don’t exist. Lets first look at a HOSTS file entry localhost

This is the loopback address for your machine for those cases where an application needs to reference the local machine by IP address- the loopback address will always be valid. This entry should never be changed.

[SOFTWARE] Adobe illustrator CS5 Portable

Create distinctive vector artwork for any project. Used by design professionals worldwide, Adobe Illustrator CS5 software provides precision and power with sophisticated drawing tools, expressive natural brushes, a host of time savers, and integration with Adobe CS Live online services.* CS Live services are complimentary for a limited time. Find precision and power in new Adobe Illustrator CS5 software. Draw accurately in perspective, create variable width strokes, paint with lifelike brushes, and take advantage of integration with new Adobe CS Live online services.* CS Live online    services are complimentary for a limited time.

Whats new in Illustrator CS5

Perspective Drawing
Draw shapes and scenes in accurate 1 ,2 , or 3 point linear perspective to create the look of realistic depth and distance. See it in action

Beautiful Strokes
Fully control variable width strokes, arrowheads, dashes, and art brush scaling along a path. See it in action

Saturday, June 26, 2010

[SOFTWARE] Windows Office 2010 (RTM)

Microsoft Office 2010, codenamed Office 14,is a productivity suite for Microsoft Windows,and the successor to Microsoft Office 2007. Office 2010 includes extended file format support,user interface updates,and a refined user experience. With the introduction of Office 2010,a 64-bit version of Office is available, although not for Windows XP.Office 2010 does not support Windows XP Professional x64 Edition or Windows Server 2003.

New features and Improvements
  • Ribbon interface and Backstage View across all applications
  • Background Removal Tool
  • Letter Styling
  • The Word 2007 Equation editor is common to all applications, replacing MS Equation 3.0
  • New SmartArt templates
  • New text and image editing effects
  • Screen Capturing and Clipping tools
  • Live collaboration functions
  • Jumplists in Windows 7
  • New animations in Powerpoint 2010

[SOFTWARE] Windows XP SP3 - Final Build

Windows XP Service Pack 3 (SP3) was released to manufacturing on April 21, 2008, and to the public via both the Microsoft Download Center and Windows Update on May 6, 2008.
It began being automatically pushed out to Automatic Update users on July 10, 2008. A feature set overview which details new features available separately as standalone updates to Windows XP, as well as backported features from Windows Vista has been posted by Microsoft. A total of 1,174 fixes have been included in SP3. Service Pack 3 can be installed on systems with Internet Explorer versions 6, 7 or 8. Internet Explorer 7 and 8 are not included as part of SP3.

New features in Service Pack 3

  • Turns black hole router detection on by default
  • Network Access Protection client
  • Group Policy support for IEEE 802.1X authentication for wired network adapters.
  • Credentials Security Service Provider
  • Descriptive Security options in Group Policy/Local Security Policy user interface
  • An updated version of the Microsoft Enhanced Cryptographic Provider Module (RSAENH) that is FIPS 140-2 certified (SHA-256, SHA-384 and SHA-512 algorithms)
  • Installing without requiring a product key during setup for retail and OEM versions

Friday, June 25, 2010

[INFO] Activate Facebook Feature to Notify You If Others Log in Your Facebook Account

Despite the increasing complexity of security measures to prevent, detect and remove malicious programs, spyware, viruses, etc, computer crime is hot on their heels and becoming more sophisticated and prevalent. Popular social networking sites such as Twitter, Friendster, Facebook, etc are common targets for cyber criminals. They provide a rich treasure trove for phishers and hackers as personal information is readily available and guards are lowered in these social websites. Hence it is always a good idea to fully capitalize and utilize the security features which are available to minimize hackers’ attack and invasion. Some Facebook enthusiasts are probably not aware that this site offers a pretty good feature which can inform users of logins to their Facebook accounts from mobile devices or other computer systems. With a simple activation, users will be notified when hackers or others access their Facebook account from other devices.

To configure and activate this notification of unauthorized access, users need to log in to their Facebook account and go to Account Settings which is located at the upper right corner on the main page. Users will thence be led to their own “My Account” configuration page. Look for “Account Security” under the setting tab as shown in the photo below:

Thursday, June 24, 2010

[TUT] Customize you USB Background

Is it cool if you have your own picture as a background everytime you open youe usb

Here is a short method on how to customize your usb drive background.
Lets do this easy steps..

[GFX] Parody

Ok dear readers, I decided to put here the latest of my parody series, posted at Unlimited Zone to add a liitle humor on this blog.

Though it doesn't turns out the way I like it, but the idea is cool.
Hope you enjoy this too..

click to view larger image:

Wednesday, June 23, 2010

[SOFTWARE] ADOBE Photoshop CS4 Portable

Its a great software to create powerful images with the professional standard.
Adobe Photoshop is a essential software for perfecting your images, Adobe Photoshop CS4 now offers productivity and workflow enhancements, powerful new editing tools, and breakthrough compositing capabilities. Adobe Photoshop CS4 software accelerates your path from imagination to imagery. Ideal for photographers, graphic designers, and web designers, the professional standard delivers new features such as automatic layer alignment and blending that enable advanced compositing. 

Live filters boost the comprehensive, nondestructive editing toolset for increased flexibility. And a streamlined interface and new timesaving tools make your work flow faster. Adobe Photoshop CS4 Extended software delivers all the features in Photoshop CS4, plus new features for working with 3D imagery, motion-based content, and advanced image analysis. If you work in film, video, multimedia, 3D, manufacturing, architecture, engineering, medicine, or science, Photoshop Extended is for you.

[SOFTWARE] Adobe Photoshop CS5 x32 Portable

With the advent of Photoshop CS5 photographers have access to a function of the new generation   to create images with high dynamic range (HDR). Combining pictures with different exposures in one HDR-image, Photoshop CS5 accurately retains the full range of key scenes. New technology allows the HDR Pro to eliminate spurious distortions and provides more precise control of the tone mapping. With features HDR rendering, users can simulate HDR-images using a single image, claim the developers.

In addition, Photoshop CS5 includes revolutionary tools to enhance the creative potential of users. Brand new drawing tools include a tool Mixer Brush, who mixes an infinite number of colors on one brush tool Bristle Tips, creating the effect of this smear brush. With Puppet Warp tool, users can change the position or view of any element of the image, for example, straightened his bent arm on the photos or adjust an image of the landscape to create a new spatial perspective.

Monday, June 21, 2010

[TOOL] Hack Deep Freeze's Password

Deep freeze - yeah that is an awesome software by faronics in which the program automatically resets the computer settings and configuration every system restarts.

Pretty good huh? But what if you forgot the password and you cannot add nor remove programs?

This tool can do the trick.
of course this is not mine just my modification.
and Behold..

tech thaw tool 1.0

[INFO] Laughing

Lauging is one of the best and easiest way to reduce daily stress that often interfere with our health. It means, the more we laugh, the healthier our bodies and minds.

Old thinking says that we laugh only if there is something funny. Plus, not everyone is a born humorist. Humorous or not, it is determined by genes. Yet, the fact is not so. Recent studies show laughter could be trained and performed every day. This is the opinion of Lee Berk, a scientist from Loma Linda University.

[TUT] Blogging's How to Change Icon / Hide Navbar

Ok this is the trick I did on my blog. lets get it straight to the point.

  • Change blog's icon:
  • Image dimension should be between 22px-32px, actually, bigger resolutions can do the trick also but will reduce the loading speed of your page.Supported formats are gif, jpg, bmp, ico, png. 
    1. Login to blogger, chose "Layouts --> Edit HTML 
    2. Put the code below, before </head>tag code.
    <link href='ICON OR IMAGE URL' rel='shorcut icon'/>
    3. The bold text is an address for your icon, you can change it with your own. 4. Save your editing. note: it will only worked on mozilla firefox. 

    Sunday, June 20, 2010

    [TOOL] Make Start Menu and Taskbar transparent

    Simple app. TransTaskBar. you can change your taskbar's translucancy from 0 (invisible) to 255 (opaque). You can only do < 25 if you use the CLI version , that is DOS command.

    [Theme] Mac OS X Skin for Yahoo! Messenger 9 and 10

    If you are a Mac lover, here is something interesting for you. An excellent Mac OS X skin for Yahoo! Messenger 9 and 10 which we wants to share with other tech solvers..

    This skin changes almost each and every interface element and provides a MAC OS X experience in your Yahoo! Messenger.

    Following is a preview of this skin:

    [TOOL] Activate Windows 7

    It is known to us that windows serials are not just the corner nowdays compare to microsoft's previous operating system release.

    thanks to those who are able to create such a tool, everyone could activate their copies.

    Just install this loader by daz. 100% working!

    [SOFTWARE] Windows 7 x86 / x64 Bit

    What is Windows 7?

    Windows 7 is a version of Microsoft Windows, a series of operating systems produced by Microsoft for use on personal computers, including home and business desktops, laptops, netbooks, tablet PCs, and media center PCs.Windows 7 was released to manufacturing on July 22, 2009, and reached general retail availability on October 22, 2009, less than three years after the release of its predecessor, Windows Vista. Windows 7's server counterpart, Windows Server 2008 R2, was released at the same time. Windows 7 will be succeeded by Windows 8, which has no release date as of yet.

    Saturday, June 19, 2010

    [TUT] Hide Drives in Windows

    You’ve probably read a bunch of posts on how to create hidden folders, secure folders, locked folders, etc, etc in Windows on many occasions! Hell, one of the most popular articles on this blog is How to create a secure and locked folder in Windows XP. However, hiding a folder is a tricky proposition and usually doesn’t work well unless you use something like Truecrypt.

    But there’s yet ANOTHER way you can hide your “private” files using a nifty little registry hack that will completely remove an entire drive from your computer. The drive will not show up in My Computer, will not be accessible from the command prompt, and won’t even show up in Safe Mode!

    [TUT] Hide Files In JPEG

    If you’re looking to hide files on your PC hard drive, you may have read about ways to encrypt folders or change the attributes on a file so that they cannot be accessed by prying eyes. However, a lot of times hiding files or folders in that way requires that you install some sort of software on your computer, which could then be spotted by someone else.

    I’ve actually written quite a few articles on how you can hide files and folders in Windows XP and Vista before, but here I’m going to show you a new way to hide files that is very counter-intuitive and therefore pretty safe! Using a simple trick in Windows, you can actually hide a file inside of the JPG picture file!

    [TUT] Track the original location of an email via its IP address

    Here’s a quick how-to guide on how you can track email to it’s originating location by figuring out the email’s IP address and looking it up. I have found this to be quite useful on many occasions for verification purposes since I receive lots of emails daily due to my blog. Tracking the IP address of an email sender does require looking at some technical details, so be ready to dig your heels in!

    [TOOL] Hack to Overclock and Undervolt HTC Evo 4G

    HTC Evo 4G at Sprint is probably one of the most powerful and fastest Android-based smartphones available in the market now, which is powered by a 1 GHz Snapdragon processor. While fast, some users may want to run the mobile device to run faster, and apparently there is room for speed improvement in HTC Evo 4G.

    Friday, June 18, 2010

    [TUT] Resource Hacker - How to Use:

    What is Resource Hacker?

    Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Win95, Win98, WinME, WinNT, Win2000 and WinXP operating systems.

    Viewing Resources: Cursor, Icon, Bitmap, GIF, AVI, and JPG resource images can be viewed. WAV and MIDI audio resources can be played. Menus, Dialogs, MessageTables, StringTables, Accelerators, Delphi Forms, and VersionInfo resources can be viewed as decompiled resource scripts. Menus and Dialogs can also be viewed as they would appear in a running application.

    Saving Resources: Resources can be saved as image files (*.ico, *.bmp etc), as script files (*.rc), as binary resource files (*.res), or as untyped binary files (*.bin).

    Modifying Resources: Resources can be modified by replacing the resource with a resource located in another file (*.ico, *.bmp, *.res etc) or by using the internal resource script compiler (for menus, dialogs etc). Dialog controls can also be visually moved and/or resized by clicking and dragging the respective dialog controls prior to recompiling with the internal compiler.

    Adding Resources: Resources can be added to an application by copying them from external resource files (*.res).

    Deleting Resources: Most compilers add resources into applications which are never used by the application. Removing unused resources can reduce an application's size.

    [UPDATED] Working Dummy E-mails on Cproxy - June 19, 2010


    Due to cproxy's tightened security regarding the abuse to their trial accounts, email generators are not working anymore.

    but the good news is that you can actually bypass its security and proceed on creating trial accounts using dummy emails.

    its 100% working.
    use this disposable email

    Thursday, June 17, 2010

    [TUT] Hidden Tool in Windows 7: Problem Steps Recorder (PSR)

    Windows 7 contains a hidden troubleshooting tool which is called "Problem Steps Recorder" (PSR)? This tool is not available from any general location like Start menu, Control Panel or Explorer.

    [TUT] Enable Option Tabs Animation In Mozilla Firefox

    Enable this animation with this easy steps:

    1. Open Firefox and type about:config in the addressbar and press Enter. It’ll confirm, click on I’ll be careful, I promise! button.

    2. Type animate in the Filter box and look for following boolean key:

    [TOOL] Windows 7 Unlimited Rearm

    Now you can rearm your copy of windows 7 again and again.. :)

    It appears that to reset the rearm count, what user need to do is just to delete the WPA registry key, which is achievable with the following command:

    Tuesday, June 15, 2010

    [TUT] Use 3g/gprs capable mobile phone as Pc modems

    Yes guys, you've read it right, as usb sticks modems user increases everyday many of us really dont know that we could use oure mobiles phones as a alterative if we dont own one of those tech gadgets nowadays, cause practically speaking not everybody own a usb modem but almost everyone of us own a cellular phones.Below are the things we need to prepare for this trick.

    [TOOL] tech.Drive Virtual Hard Drive Creator

    tech.Drive is a small tool that allows you to associate the most accessed
    directories with virtual drives. It uses the same API similar to the console
    'subst' utility, but makes it easier to create and remove virtual drives in a
    GUI way.

    [TOOL] Classified Virus (Daprosy Worm) Remover

    Daprosy worm FAQ’s:

    What is Daprosy worm?

    Daprosy worm (classified virus) is a computer program that spreads on a Windows computer system without user consent. It creates clones that mimic the system folder icon.

    Daprosy is a moniker given by Symantec when it was first discovered on July 15, 2009.
    It is also known as Autorun AMS, AMW and APL (Sophos).

    What are the signs of Daprosy worm infection?

    The very first and obvious sign of Daprosy infection is the presence of “Classified.exe” or “Do not open - secrets!.exe” file on root directories of all drives of the computer. Many folders are “replaced” by an executable file with a system folder icon.

    How does Daprosy worm spread?

    [TUT] Free Internet Access Using Usb Broadbands

    Due to the rising popularity of the wireless broadband products such as zte's and huawei HSDPA usb sticks, I decided to make this post in order for other people to experience free internet browsing without the hassle of loading their prepaid usb modems regularly.

    First we need to prepare the following:

    1. a desktop pc or a laptop

    2. cproxy software - download it HERE

    3. your usb modems (zte or huawei)

    [TOOL] Huawei Unlocker

    Huawei usb Modems can be unlock by these easy steps.

    1. run the tool
    2. input imei
    3. tick calculate
    4. copy unlock code
    5. insert huawei with invalid sim card
    6. run the software wait till the installation is complete.
    7. type unlock on the unlocked code dialog box.

    [TOOL] Unlock Zte Modems Offline

    Are you having problem unlocking your zte modems?

    Recently I got a very powerful tool.

    DC Unlocker, as we know, unlocks modem and data cards and making them able to be used to other networks.

    DC Crap is on other hand, is a modified version of DC Unlocker that can be used offline to unlock certain modems without any credits needed, especially ZTE MF627 modems provided by Smart and Sun Cellular.

    Use DC Crap like the usual DC Unlocker and unlock your modems.

    created by Insomniac Art