♥♥♥ Nitin Arya ♥♥♥ °ღ• ℐ тнє яєвєℓ ιѕ вα¢к ★彡
Blog
Site menu

Our poll
Rate my site
Total of answers: 100

Online Users

Total online: 2
Guests: 2
Users: 0

Search

Entries archive

Site friends

Welcome, Guest · RSS 2025-01-30, 2:11 AM

Main » 2010 » December » 9 » learn hacking, computer science& information technology
8:34 PM
learn hacking, computer science& information technology

HOW TO TYPE RUPEE SYMBOL IN YOUR COMPUTER

2010-09-12 10:24
Here is the step-by-step process to type the new symbol! # Download Rupee font # Go to C->Windows->fonts. Copy paste the downloaded file. #Open note pad. # Go to Format->font select rupee-Indian font #To get the rupee symbol, just press the button which is ABOVE the ‘TAB’...

DISPLAY MESSAGE AT WINDOWS START UP

2010-09-12 10:19
its  a simple registry trick by which you can display your message at windows startup.You have to edit your registry.It will pop message just before a user is going to log on.Check the following steps 1.Go to your registry 2. Navigate...

70 tips to Windows 7

2010-09-11 10:59
1. PC Safeguard   I rarely let anyone use my PC because I’m afraid he will mess it up, but it seems Microsoft has been thinking at me and came with a solution. The PC Safeguard doesn’t let anyone mess your PC settings, because after the user logs off, the configurations are reset back...

Changing your home network IP address

2010-09-11 10:39
To change or specify the IP address of your computer for your own local area network (LAN), follow the below steps. Keep in mind that if you're connecting to the Internet with a broadband connection, adjusting your network settings may cause issues with your broadband connection. Finally, if your...

some tricks TO INCREASE YOUR TWITTER FOLLOWERS

2010-09-11 10:33
Explain to your followers what retweeting is and encourage them to retweet your links. Retweeting pushes your @username into foreign social graphs, resulting in clicks back to your profile. Track your retweets using retweetist. Fill out your bio. Your latest tweets and @replies don’t mean much...

HOW TO DELETE AN UNDELETABLE FILE

2010-09-11 10:29
Cant you delete a file?Is it showing error message when trying to delete?Here is the solution for this problem.Just go through the below post and try to delete. Open a Command Prompt window and leave it open. Close all open programs. Click Start, Run and enter TASKMGR.EXE Go to the...

PLAY FM WITHOUT CONNECTING HEADPHONES

2010-09-11 10:22
want to Hear fm radio without connecting the headphones in your mobile phone,most of the mobile phones have the condition that you have to connect the earphones or headphones to hear fm.but we have come with an trick for motorola mobiles,so that you can hear fm in loud mode without using...

BLOCK UNWANTED CALLS IN YOUR PHONE

2010-09-11 10:04
In india there are more than 50 crores of mobile customers and now a days the number of telemarketing calls you receive everyday is keeping on increasing and people are frustrated when they receive a call.Even India’s Finance minister Pranab Mugerjee received a telemarketer’s call when attending an...

HOW TO BLOCK ANY SIM CARD

2010-09-11 09:51
well I am going to share a simple trick for block your enemy sim card,Blocking a sim card is too simple.What you have to do is just enter the below code in the desired phone **04*3814*7529*68243# Entering of above code will ask you to enter the PUK code.To solve this issue just call customer care...

Fix and Restore Windows 7 Boot Screen That Changes to Vista Style

2010-09-11 09:39
Sometimes, the beautiful, elegant, high resolution animated and dynamic Windows 7 boot screen UI may be changed to or replaced with Windows Vista boot screen, normally when user adds a Windows 7 entry in boot menu or accidentally when user attempts to repair the startup menu items with Windows...

How to Recover and Reset Gmail Password

2010-09-11 09:27
Google Gmail user may want to reset the password which used to login into the Gmail account via web, POP3 and IMAP as the original password has been forgotten, or misplaced. Gmail credentials integrates and bases on Google Account. So changing the password for Gmail will also change the...

Reset and Fix Incorrect or Wrong Password for Windows XP Mode (XPMUser)

2010-09-11 09:13
During initial setup of Windows XP Mode (XPM) after installing the free and fully licensed Windows XP virtual machine onto Windows 7 Virtual PC, user is required to set a password for default XPMUser account. By default, Windows XP Mode will save and remember user name and password login...

How to Save a Cell Phone Dropped in Water?

2010-09-05 11:24
 in normal life few things cause more panic than dropping your cell phone in water, but it happens. Dropping your phone in water does not necessarily mean that you will have to replace it. If you know what to do after your phone has been submerged in water, you should be able to save it...

what is the fundamental of bluetooth software

2010-09-05 11:09
In the late 900’s, King Harald Bluetooth Gormson united Denmark and Norway in Christianity and ruled both countries as king until deposed by his son. In 1994 the Ericsson company developed a short-range wireless communication protocol which brought about the ability to connect many different...

How to Detect Invisible Users on Yahoo Messenger

2010-08-06 09:13
Step 1 Download and install a free Yahoo! Messenger status checking program such as Buddy Spy. Step 2 Launch the application after completing the installation and click the "Buddy Spy" button on the left panel. Step 3 Select "Single Scan" and type...

How to Make Custom iPhone Ringtones free

2010-08-06 09:09
Step 1 Open iTunes. Step 2 Find the song that you want to make into a ringtone. Step 3 Listen to the song and find the part of it you want to use. The chorus may be a good place to start. Step 4 Write down the start and stop times...

Mini Transforms Apple iPhone/iPod/iPad Into Infra-red Remote Control

2010-07-25 11:04
Apple iPhone is so popular that has triggered many peripherals or accessories built surrounding it. In order to fill up the gap, a new infra red based device, named as RedEye mini has been released by ThinkFlood with intention to transform your iPhone, iPod and even iPad into a portable remote...

Display Windows XP to 2 Monitors or LCD Panels

2010-07-24 09:19
In WindowHomepages XP , it’s possible and very easy to add a second display to your PC. But first of all, you will need to have a second video display card or a video card that has a second Video Out port, and of course, the second display monitor, be it CRT monitor or LCD panel. Plug...

How to Change Screen Resolution and Display Colors Quality in Safe Mode of Windows

2010-07-24 08:59
Whenever there is any system problem, especially the dread BSoD (Blue Screen of Death), most users first reaction is probably to go into Safe Mode to try to troubleshoot Windows. Safe Mode loads and starts just basis files and drivers necessary to run Windows. Most drivers, including...

How to play all your games in 3D, without any specify hardware

2010-07-20 11:56
Well, you need not wait any longer to have your share of 3D. All you need is a pair of anaglyph goggles  and a fairly powerful system. iZ3D is actually a manufacturer of 3D-capable monitors,their driver available below, The driver console has an option to turn on anaglyph, which converts ...

How to Track Hackers

2010-07-18 22:57
Step 1 Open the DOS prompt on your computer. The way you get to the DOS prompt depends on what version of Windows you are using. If you are using Windows 95 or Windows 98, click "Start." then click "Programs" and end by clicking "MS-DOS." If you are using Windows NT, Windows 2000...

How to Share Internet Without a Modem

2010-07-18 22:32
Step 1 Click on the "Start" menu and choose "Connect To." A list of available networks is displayed in a window. Your friend will need to know the name of your network. Step 2 Click on the network you want to connect to, and then click "Connect." ...

How to Run Mac OS X in Virtual Box on Windows

2010-07-18 22:23
first install Virtualbox. Open up Virtualbox and click on New at the top left. At the Create New Virtual Machine window, click Next. At this window type OSX as the name and it will automatically change the system and version. The next window will let you choose your RAM amount: If you can...

How to Block a Website

2010-07-11 23:08
There are many reason why you need to know how to block a website. Some of the most common reasons are you have been targeted by spammers who use adware and popups to attack your PC. Other reasons may be to prevent your children from having access to certain site content such as porn and...

How to Block Hackers on Your Wireless Home Network

2010-07-10 20:32
Step 1 A router and home network setup is typically used for directing your DSL internet line to one or more computers in your home. Each computer will need a network adapter with a plug that accepts the network cable. In the case of wireless internet, each computer will need a...

Steps To Securing Your Network And Preventing Common Security Mistakes

2010-07-10 01:02
Securing an organization's assets requires work, and there are many different ways to classify controls. This white paper examines three common types of controls are administrative, technical, and physical. Regardless of how these controls are grouped or what list you use to classify, security...

How Secure is your Mobile Phone?

2010-07-10 00:54
The Blackberry is easily the most popular Smartphone on the market and, according to cellphones.org, the most ‘natively’ secure. Just by having a Blackberry, you are one step ahead but that doesn’t mean you don’t still have to enable your security settings. Enable your password. Under ...

some Simple Steps to Hack a Smartphone

2010-07-10 00:45
What kind of information do you have on your business card? Company name? Check. Your name and title? Check. Business address? Check. Mobile work phone number? Wait a minute. CSO recently sat down with Trust Digital, a firm that specializes in mobile security, for a demonstration on how to hack...

Mobile Phone Hacking

2010-07-10 00:34
The past few months has seen the mobile phone industry thrown into turmoil as the computer hacking community has carried out successful attacks against mobile phone call security. I wrote an article about such a  hacka while back, but at that point it remained a theory rather than a ...

What's the Mobile Phone Spam?

2010-07-10 00:16
The trouble with mobile phone spam is that it is not only annoying, but it can also be expensive. Some people pay to receive text messages. In 2006 for instance, Sprint® was sued for sending text message spam and advertisements for their own company to their customers. Since each message...

hack a cell phone to make free phone calls

2010-07-07 19:23
Want to control a friend's cell phone remotely and make "free" calls from it? In this hack how-to video, you'll learn how to hack Bluetooth-enabled cell phones with your Sony Ericsson or Nokia phone and the Super Bluetooth Hack—or "BT Info"—, a free program easily found through...

How GPS Tracking

2010-07-07 19:16
so many peoples may have seen the wealth of websites that offer a variety of vehicle location systems for use in trade. There are smaller sites on the Internet, however, recommends the use of such vehicle location systems for use in the private sphere. If you decide to install a GPS tracking...

gps(global positioning system)

2010-07-07 19:07
If you've ever lost while driving without a map, you know that feeling is fear. In the past, the road map or atlas of paper can find their way was, but the monsters were bulky tri-folded almost more trouble than they're worth. , Embedded system technology is fortunately modern bridge the gap...

STEAL PASSWORD WITH GOOGLE HACK

2010-07-04 23:03
Google is a treasure trove full of important information, especially for the underground world. This Potential fact can also be utilized in the data for the username and password stored on a server. If the administrator save important data not in the complete system authentifikasi folder, then...

How to Hack into a Live Security Camera

2010-07-03 18:12
Well this is an interesting article. It is a sub-section of a HackingTechnique known as a google hacking.All what we are looking at are unsecured cams from around the world that are interfaced with the internet. So how do you find such cameras. Just google these following strings and select any...

How to hack Bluetooth cell phones, and how to protect yourself

2010-07-03 18:05
hackers can easily connect and manipulate your phone simply by using a Bluetooth connection.  We’re here to explain how it’s done and how to protect yourself from such an attack. Bluetooth is a short-range wireless communication technology that uses the 2.4-GHz frequency range for its...

How to Write HTML Script

2010-07-02 10:20
using the hypertext markup language (HTML) "script" tags, you can enhance your Web pages with a client-side script like JavaScript or VBScript. Client-side scripting languages let you create features on your website that encourage interactivity with your visitors because they respond to the...

How to Send HTML Email via PHP Mail

2010-07-02 09:51
Step 1 Write your HTML message in your favorite PHP editor or text editor near the top of your PHP file after the opening PHP tag. Assign it to a variable: $message = "This is an <strong>HTML Message</strong>!"; Step 2 Copy and paste the following...

Windows Server Hacks 12, 77, and 98

2010-06-28 20:29
Hack 12 deals with getting event log information. Hack 77 presents answers to common security-related FAQs, and Hack 98 talks about the Automated System Recovery (ASR), a new feature of Windows Server 2003 that makes recovering from a disaster a whole lot easier. Windows Server Hacks 12:...

How to Hack Windows

2010-06-13 12:56
Steps   When the computer starts up, hold down F8 before you see the "Windows Starting" screen. This will bring you to a screen with choices. Your best bet will be "Safe Mode with Command Prompt". You can then do as you want. ..
Views: 754 | Added by: Handsome-Hunk | Rating: 0.0/0
Total comments: 1
1 Spoorommasoug  
0
Hello, I am Santa. Just come here to say Hello. Lol.

Name *:
Email *:
Code *:
Copyright MyCorp © 2025
Website builderuCoz