tag:blogger.com,1999:blog-69776745721594115892024-02-07T10:52:13.023-08:00computer trickschamphttp://www.blogger.com/profile/00556498768219651575noreply@blogger.comBlogger114125tag:blogger.com,1999:blog-6977674572159411589.post-90303476331326894622022-10-31T13:15:00.003-07:002022-10-31T13:16:18.626-07:00Privacy Policy<p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">At computer tricks, accessible from https://pctricksssavl.blogspot.com, one of our main priorities is the privacy of our visitors. This Privacy Policy document contains types of information that is collected and recorded by computer tricks and how we use it.</p><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">If you have additional questions or require more information about our Privacy Policy, do not hesitate to contact us.</p><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">This Privacy Policy applies only to our online activities and is valid for visitors to our website with regards to the information that they shared and/or collect in computer tricks. This policy is not applicable to any information collected offline or via channels other than this website. Our Privacy Policy was created with the help of the <a href="https://www.privacypolicygenerator.info/" style="background-color: transparent; box-sizing: border-box; color: #666666; text-decoration-line: none;">Free Privacy Policy Generator</a>.</p><h2 style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 16px; font-weight: 400; line-height: 1.1; margin: 0px 0px 18px;">Consent</h2><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">By using our website, you hereby consent to our Privacy Policy and agree to its terms.</p><h2 style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 16px; font-weight: 400; line-height: 1.1; margin: 0px 0px 18px;">Information we collect</h2><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">The personal information that you are asked to provide, and the reasons why you are asked to provide it, will be made clear to you at the point we ask you to provide your personal information.</p><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">If you contact us directly, we may receive additional information about you such as your name, email address, phone number, the contents of the message and/or attachments you may send us, and any other information you may choose to provide.</p><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">When you register for an Account, we may ask for your contact information, including items such as name, company name, address, email address, and telephone number.</p><h2 style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 16px; font-weight: 400; line-height: 1.1; margin: 0px 0px 18px;">How we use your information</h2><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">We use the information we collect in various ways, including to:</p><ul style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin-bottom: 10px; margin-top: 0px;"><li style="box-sizing: border-box;">Provide, operate, and maintain our website</li><li style="box-sizing: border-box;">Improve, personalize, and expand our website</li><li style="box-sizing: border-box;">Understand and analyze how you use our website</li><li style="box-sizing: border-box;">Develop new products, services, features, and functionality</li><li style="box-sizing: border-box;">Communicate with you, either directly or through one of our partners, including for customer service, to provide you with updates and other information relating to the website, and for marketing and promotional purposes</li><li style="box-sizing: border-box;">Send you emails</li><li style="box-sizing: border-box;">Find and prevent fraud</li></ul><h2 style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 16px; font-weight: 400; line-height: 1.1; margin: 0px 0px 18px;">Log Files</h2><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">computer tricks follows a standard procedure of using log files. These files log visitors when they visit websites. All hosting companies do this and a part of hosting services' analytics. The information collected by log files include internet protocol (IP) addresses, browser type, Internet Service Provider (ISP), date and time stamp, referring/exit pages, and possibly the number of clicks. These are not linked to any information that is personally identifiable. The purpose of the information is for analyzing trends, administering the site, tracking users' movement on the website, and gathering demographic information.</p><h2 style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 16px; font-weight: 400; line-height: 1.1; margin: 0px 0px 18px;">Cookies and Web Beacons</h2><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">Like any other website, computer tricks uses 'cookies'. These cookies are used to store information including visitors' preferences, and the pages on the website that the visitor accessed or visited. The information is used to optimize the users' experience by customizing our web page content based on visitors' browser type and/or other information.</p><h2 style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 16px; font-weight: 400; line-height: 1.1; margin: 0px 0px 18px;">Google DoubleClick DART Cookie</h2><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">Google is one of a third-party vendor on our site. It also uses cookies, known as DART cookies, to serve ads to our site visitors based upon their visit to www.website.com and other sites on the internet. However, visitors may choose to decline the use of DART cookies by visiting the Google ad and content network Privacy Policy at the following URL – <a href="https://policies.google.com/technologies/ads" style="background-color: transparent; box-sizing: border-box; color: #666666; text-decoration-line: none;">https://policies.google.com/technologies/ads</a></p><h2 style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 16px; font-weight: 400; line-height: 1.1; margin: 0px 0px 18px;">Advertising Partners Privacy Policies</h2><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">You may consult this list to find the Privacy Policy for each of the advertising partners of computer tricks.</p><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">Third-party ad servers or ad networks uses technologies like cookies, JavaScript, or Web Beacons that are used in their respective advertisements and links that appear on computer tricks, which are sent directly to users' browser. They automatically receive your IP address when this occurs. These technologies are used to measure the effectiveness of their advertising campaigns and/or to personalize the advertising content that you see on websites that you visit.</p><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">Note that computer tricks has no access to or control over these cookies that are used by third-party advertisers.</p><h2 style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 16px; font-weight: 400; line-height: 1.1; margin: 0px 0px 18px;">Third Party Privacy Policies</h2><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">computer tricks's Privacy Policy does not apply to other advertisers or websites. Thus, we are advising you to consult the respective Privacy Policies of these third-party ad servers for more detailed information. It may include their practices and instructions about how to opt-out of certain options.</p><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">You can choose to disable cookies through your individual browser options. To know more detailed information about cookie management with specific web browsers, it can be found at the browsers' respective websites.</p><h2 style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 16px; font-weight: 400; line-height: 1.1; margin: 0px 0px 18px;">CCPA Privacy Rights (Do Not Sell My Personal Information)</h2><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">Under the CCPA, among other rights, California consumers have the right to:</p><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">Request that a business that collects a consumer's personal data disclose the categories and specific pieces of personal data that a business has collected about consumers.</p><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">Request that a business delete any personal data about the consumer that a business has collected.</p><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">Request that a business that sells a consumer's personal data, not sell the consumer's personal data.</p><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">If you make a request, we have one month to respond to you. If you would like to exercise any of these rights, please contact us.</p><h2 style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 16px; font-weight: 400; line-height: 1.1; margin: 0px 0px 18px;">GDPR Data Protection Rights</h2><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">We would like to make sure you are fully aware of all of your data protection rights. Every user is entitled to the following:</p><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">The right to access – You have the right to request copies of your personal data. We may charge you a small fee for this service.</p><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">The right to rectification – You have the right to request that we correct any information you believe is inaccurate. You also have the right to request that we complete the information you believe is incomplete.</p><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">The right to erasure – You have the right to request that we erase your personal data, under certain conditions.</p><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">The right to restrict processing – You have the right to request that we restrict the processing of your personal data, under certain conditions.</p><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">The right to object to processing – You have the right to object to our processing of your personal data, under certain conditions.</p><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">The right to data portability – You have the right to request that we transfer the data that we have collected to another organization, or directly to you, under certain conditions.</p><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">If you make a request, we have one month to respond to you. If you would like to exercise any of these rights, please contact us.</p><h2 style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 16px; font-weight: 400; line-height: 1.1; margin: 0px 0px 18px;">Children's Information</h2><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">Another part of our priority is adding protection for children while using the internet. We encourage parents and guardians to observe, participate in, and/or monitor and guide their online activity.</p><p style="background-color: white; box-sizing: border-box; color: #666666; font-family: "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 0px 0px 20px;">computer tricks does not knowingly collect any Personal Identifiable Information from children under the age of 13. If you think that your child provided this kind of information on our website, we strongly encourage you to contact us immediately and we will do our best efforts to promptly remove such information from our records.</p>champhttp://www.blogger.com/profile/00556498768219651575noreply@blogger.com0tag:blogger.com,1999:blog-6977674572159411589.post-16456624027187149072016-12-29T00:02:00.003-08:002016-12-29T00:02:36.950-08:00Buy Real Facebook likes and followers<div dir="ltr" style="text-align: left;" trbidi="on">
<a href="http://www.thesociohub.com/">Buy Real facebook likes</a> and followers<br />
<br />
<br />
<br />
<br />
www.thesociohub.com</div>
champhttp://www.blogger.com/profile/00556498768219651575noreply@blogger.com0tag:blogger.com,1999:blog-6977674572159411589.post-26275191065209316982016-11-09T19:43:00.002-08:002016-11-09T19:43:40.030-08:00The socio hub | buy google followers, buy facebook likes, buy soundcloud followers,buy insta followers<div dir="ltr" style="text-align: left;" trbidi="on">
<h3 class="post-title entry-title" itemprop="name" style="background-color: white; color: #222222; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 22px; font-stretch: normal; font-weight: normal; line-height: normal; margin: 0.75em 0px 0px; position: relative;">
The socio hub | buy google followers, buy facebook likes, buy soundcloud followers,buy insta followers</h3>
<div>
<br /></div>
<div>
<br /></div>
<div>
http://www.thesociohub.com</div>
</div>
champhttp://www.blogger.com/profile/00556498768219651575noreply@blogger.com0tag:blogger.com,1999:blog-6977674572159411589.post-62339877054864128672013-04-18T23:40:00.001-07:002013-04-18T23:40:50.195-07:00How to clean your pc and why?<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<br />
How to clean your pc and why?<br />
<br />
1.most of us clean pcs and keyboards infrequently.Keep your area near to your pc clean and for that clean your keyboard once in a week.This would help you in future and extend the life of your keyboard.Dont use household vacuum cleaner to clean you pc.you can use low battery powered vacs made for pcs.<br />
2.Once in a month clean dust around your cpu fan.<br />
3. Keep you pc clean and neat.<br />
4. you must clean your computer properly.Incorrect cleanless can damage to your pc.<br />
<br />
if you dont clean you computer regularly then it will cause damage to the entire your pc not only this can lower your pcs life.<br />
<div>
<br /></div>
<br />
</div>
champhttp://www.blogger.com/profile/00556498768219651575noreply@blogger.com0tag:blogger.com,1999:blog-6977674572159411589.post-32401909913486122672013-04-11T07:14:00.000-07:002013-04-11T07:20:06.261-07:00How to find gender of your computer<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
How to find gender of your computer<br />
Do u want to know whether your computer male or female ?? Do following things<br />
Open notepad type below code<br />
<br />
<span style="color: orange;">CreateObject(“SAPI.SpVoice”).Speak”I Love You”</span><br />
<br />
And Save this as maleorfemale.vbs<br />
<br />
you hear male or female voice after running this </div>
champhttp://www.blogger.com/profile/00556498768219651575noreply@blogger.com0tag:blogger.com,1999:blog-6977674572159411589.post-57331749055476003472013-04-09T12:20:00.001-07:002013-04-09T12:20:06.341-07:00Default ports numbers<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
20 ftp data<br />
21 ftp<br />
22 SSH(secure shell)<br />
23 telnet<br />
25 sMTP(send mail transfer protocol)<br />
80 HTTP(hyper text transfer protocol)<br />
110 POP3 (post office protocol v3)<br />
137 Netbios-ns<br />
138 Netbios -dgm<br />
139 NetBIOS<br />
</div>
champhttp://www.blogger.com/profile/00556498768219651575noreply@blogger.com1tag:blogger.com,1999:blog-6977674572159411589.post-76975800164832582202012-11-30T21:51:00.001-08:002012-11-30T21:51:45.939-08:00some hidden programms in windows xp<div dir="ltr" style="text-align: left;" trbidi="on">
1.Dr watson(<em style="background-color: white; font-family: arial, sans-serif; font-size: small; font-style: normal; font-weight: bold; line-height: 16px;">Dr</em><span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: x-small; line-height: 16px;">. </span><em style="background-color: white; font-family: arial, sans-serif; font-size: small; font-style: normal; font-weight: bold; line-height: 16px;">Watson</em><span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: x-small; line-height: 16px;"> for Windows is </span><em style="background-color: white; font-family: arial, sans-serif; font-size: small; font-style: normal; font-weight: bold; line-height: 16px;">a</em><span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: x-small; line-height: 16px;"> program error debugger that gathers information about your </span><em style="background-color: white; font-family: arial, sans-serif; font-size: small; font-style: normal; font-weight: bold; line-height: 16px;">computer</em><span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: x-small; line-height: 16px;"> when an error (or user-mode fault) occurs with </span><em style="background-color: white; font-family: arial, sans-serif; font-size: small; font-style: normal; font-weight: bold; line-height: 16px;">a</em><span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: x-small; line-height: 16px;"> program.)</span><br />
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: x-small; line-height: 16px;"><br /></span>
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: x-small; line-height: 16px;"><br /></span>
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: x-small; line-height: 16px;">its windows Repairing software</span><br />
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: x-small; line-height: 16px;"><br /></span>
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: x-small; line-height: 16px;">how to open</span><br />
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: x-small; line-height: 16px;"><br /></span>
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; font-size: x-small; line-height: 16px;">go to start run and then type </span><strong style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px;"><em><span style="background-color: white;"><span style="color: #996633;"> </span><span style="color: #9fc5e8;">drwtsn32</span></span></em></strong><br />
<strong style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px;"><em><span style="background-color: white;"><span style="color: #9fc5e8;"><br /></span></span></em></strong>
<strong style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18px;"><em><span style="background-color: white;"><span style="color: #9fc5e8;"><br /></span></span></em></strong>
<span style="color: #444444; font-family: Helvetica, Arial, sans-serif; font-size: x-small;"><span style="line-height: 18px;"><b><i>it will show like this</i></b></span></span><br />
<span style="color: #444444; font-family: Helvetica, Arial, sans-serif; font-size: x-small;"><span style="line-height: 18px;"><b><i><br /></i></b></span></span>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKGhiSbl7No3faJs9-Y07WvD2Po8IRZm4eZjIeoeuYVb-BWH7i0Wg4aq8T65x67Iby3ykq-1c9zRPKPr55L3dJJ__452tEQ_V81hwxOykuCZF4cF0ktgK24fJsvti29gn5bRn-t67PZEaJ/s1600/drwatson.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKGhiSbl7No3faJs9-Y07WvD2Po8IRZm4eZjIeoeuYVb-BWH7i0Wg4aq8T65x67Iby3ykq-1c9zRPKPr55L3dJJ__452tEQ_V81hwxOykuCZF4cF0ktgK24fJsvti29gn5bRn-t67PZEaJ/s320/drwatson.jpg" width="212" /></a></div>
<span style="color: #444444; font-family: Helvetica, Arial, sans-serif; font-size: x-small;"><span style="line-height: 18px;"><b><i><br /></i></b></span></span>
<span style="color: #444444; font-family: Helvetica, Arial, sans-serif; font-size: x-small;"><span style="line-height: 18px;"><b><i><br /></i></b></span></span></div>
champhttp://www.blogger.com/profile/00556498768219651575noreply@blogger.com1tag:blogger.com,1999:blog-6977674572159411589.post-58801537641328110052012-11-28T01:00:00.001-08:002012-11-28T01:08:10.401-08:00Facebook not working in mozilla firefox?<div dir="ltr" style="text-align: left;" trbidi="on">
<span style="font-size: large;">Solution 1</span><br />
<span style="font-size: large;"><br /></span>
1. <span style="color: #333333; font-family: arial, helvetica, clean, sans-serif;"><span style="line-height: 16px;">Reinstall firefox</span></span><br />
<br />
<br />
<span style="color: #333333; font-family: arial, helvetica, clean, sans-serif;"><span style="line-height: 16px;">Solution 2</span></span><br />
<span style="color: #333333; font-family: arial, helvetica, clean, sans-serif;"><span style="line-height: 16px;">Go to firefox delete/clear history, Go to firefox tools/option/privacy/showcookies</span></span><br />
<span style="color: #333333; font-family: arial, helvetica, clean, sans-serif;"><span style="line-height: 16px;"><br /></span></span>
<span style="color: #333333; font-family: arial, helvetica, clean, sans-serif;"><span style="line-height: 16px;">and then remove all cookies related with the facebook</span></span></div>
champhttp://www.blogger.com/profile/00556498768219651575noreply@blogger.com1tag:blogger.com,1999:blog-6977674572159411589.post-82671576030110271292012-11-28T00:42:00.003-08:002012-11-28T00:46:59.172-08:00How to check if port is open or not in windows<div dir="ltr" style="text-align: left;" trbidi="on">
so you can do so many things with open port<br />
<br />
How to Test Whether a Port is Open<br />
To find which port and server u want to test http uses port 80,outgoing mail is 25 and pop 110.<br />
<br />
Steps
1.<br />
Got to start menu and click on run
Type "telnet server-name PORTNUMBER".<br />
For example:<br />
<br />
You can check your POP3 Server on port 110
to check use this command
telnet pop3-server.domain.com 110
</div>
champhttp://www.blogger.com/profile/00556498768219651575noreply@blogger.com0tag:blogger.com,1999:blog-6977674572159411589.post-46796868581282494932012-09-11T04:30:00.001-07:002012-09-11T04:32:32.203-07:00How to increase internet speed via cmd 100% working
How to increase internet speed via cmd 100% working
DO the following steps as shown
Open cmd go to run type "cmd"
cd/{enter}
netsh int tcp show global
netsh int tcp set global chimney=enabled
netsh int tcp set global autotuninglevel=normal
netsh int tcp set global congestionprovider=ctcp
netsh int tcp show global
YOur internet speed will increase atleast some %champhttp://www.blogger.com/profile/00556498768219651575noreply@blogger.com0tag:blogger.com,1999:blog-6977674572159411589.post-29377578295165504782012-07-22T09:12:00.003-07:002012-07-22T09:13:09.482-07:00Facebook new chat trick<div dir="ltr" style="text-align: left;" trbidi="on">
<br /></div>
1. How to use facebook profile images in chat ?
To use profile images in chat Enter this ==> [[username]]
In place of username enter username of person whose image you want to show in chat.
If u will enter c00lhacks this will show image of my page.
2. Codes of A-Z for Facebook chat.
Below are codes of A-Z which you can use in facebook chat. You can create your on words with this codes. I will demonstrate how to do that .
[[107015582669715]] = A
[[116067591741123]] = B
[[115602405121532]] = C
[[112542438763744]] = D
[[115430438474268]] = E
[[109225112442557]] = F
[[111532845537326]] = G
[[111356865552629]] = H
[[109294689102123]] = I
[[126362660720793]] = J
[[116651741681944]] = K
[[115807951764667]] = L
[[106596672714242]] = M
[[108634132504932]] = N
[[116564658357124]] = O
[[111669128857397]] = P
[[107061805996548]] = Q
[[106699962703083]] = R
[[115927268419031]] = S
[[112669162092780]] = T
[[108983579135532]] = U
[[107023745999320]] = V
[[106678406038354]] = W
[[116740548336581]] = X
[[112416755444217]] = Y
[[165724910215]] = Z
3. How to use this codes ?
First think wat word you want to create then pick up codes of that alphabate from above codes
Let us create hi . So pick up codes of H and I .
After that enter this in chat box [[111356865552629]] [[109294689102123]]
Make sure there is space in between any two codes or else it will not work.
4. Some Cool Facebook tricks.
Below are two codes to show Happy New year you can use any one of them
[[124641767652266]] [[124642810985495]] [[124643044318805]] [[124643044318805]] [[124643487652094]] [[124642300985546]] [[124644090985367]] [[124644404318669]] [[124644567651986]] [[124642300985546]] [[124643487652094]] [[124644404318669]] [[124642810985495]] [[124645367651906]] [[124642300985546]] [[124645977651845]] [[124646247651818]] [[124646574318452]] [[124645977651845]] [[124642300985546]]
OR
[[337992182896839]] [[225777904163650]] [[244015585667152]] [[244015585667152]] [[319152701438185]] [[188142511282558]] [[319977728035866]] [[316759491692170]] [[139287272851910]] [[188142511282558]] [[319152701438185]] [[316759491692170]] [[225777904163650]] [[337598512918963]] [[188142511282558]] [[141281852650929]] [[268263169900550]] [[191790684249921]] [[141281852650929]]
Enter below codes to show Cool Hacking Tricks
[[115602405121532]] [[116564658357124]] [[116564658357124]] [[115807951764667]] [[111356865552629]] [[107015582669715]] [[115602405121532]] [[116651741681944]] [[109294689102123]] [[108634132504932]] [[111532845537326]] [[112669162092780]] [[106699962703083]] [[109294689102123]] [[115602405121532]] [[116651741681944]] [[115927268419031]]
This way you can create your own words your name .champhttp://www.blogger.com/profile/00556498768219651575noreply@blogger.com2tag:blogger.com,1999:blog-6977674572159411589.post-13723550193018966852012-06-12T15:50:00.002-07:002012-06-12T15:51:28.167-07:00Error message: "Your current security settings do not allow this file to be downloaded"<div dir="ltr" style="text-align: left;" trbidi="on">
<span class="Apple-style-span" style="background-color: white; font-family: Arial, sans-serif; font-size: 12px;"></span><br />
<div style="border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
1. Open Internet Explorer.</div>
<div style="border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
1 Click Tools and then options.</div>
<div style="border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
3. Click on the security tab.</div>
<div style="border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
4. Select the Internet Zone.</div>
<div style="border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
5. Click on the Custom Level Button and then scroll down to Download.</div>
<div style="border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
6. Make sure to enable File download.</div>
<div style="border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
7. Click Apply and Ok</div>
<div style="border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
8. Restart Internet Explorer and you done</div>
</div>champhttp://www.blogger.com/profile/00556498768219651575noreply@blogger.com0tag:blogger.com,1999:blog-6977674572159411589.post-92129114205899082542011-11-23T01:42:00.000-08:002011-11-23T01:43:20.220-08:00[TUT]Windows Local Area Network Hacking Tutorial[TUT]Hellow I suppose you could consider this a hacking tutorial of sorts. There are tutorials written very poorly, I must say, that classify these techniques as NetBIOS hacking. It can be considered hacking when used for malicious purposes, and also when you are testing computer security and integrity. But as far as networking goes, you are using SMB (Server Message Block) , which is an application layer networking protocol, to provide shared access to files, printing services, serial ports, and other things between to nodes on a network. A node is just an active device connected to a computer network, like a computer or switch. In computer science, nodes are generally used in graphs, whether they be directed or undirected. The topology of a network acts in the same way, pretty much where two devices on a network intersect, as two lines would in a graph. But, security administrators should also turn SMB off unless they absolutely need it, in which case they should be implementing a network firewall. So, we are going to take advantage of their stupidity. The only difference between using the techniques in this tutorial and exploiting a remote network service with a stack overflow (also called a stack-based buffer overrun) is, well, they aren't as sexy as the latter. But, due to human stupidity, we can access remote machines through file sharing an we can also shut them down. <br /><br />Well, first of all you can get into remote computers on the same Local Area Network because of a service no network should ever used unless they absolutely NEED to. It's called file sharing. To get into a remote computer, you have to use shares.<br /><br />First, you need a target. Just to test this out, you are going to type in<br /><div class="codeblock"> <div class="title">Code:<br /></div><div class="body" dir="ltr"><code>net view</code></div></div><br />Then, you will see a list of host names. You could resolve them to IP Addresses to get into them using the <div class="codeblock"> <div class="title">Code:<br /></div><div class="body" dir="ltr"><code>ping</code></div></div> command, but I just use the host name. Now you need to know the share you want to use with the remote host. Generally these shares are named <div class="codeblock"> <div class="title">Code:<br /></div><div class="body" dir="ltr"><code>IPC$<br />ADMIN$<br />C$</code></div></div><br />Etc. Now, when you looked at those shares, which one made your weeble wobble? That's right, it's the ADMIN$ share. However, it would not be a bad idea to take a look at the other two shares. To display your local share names, type this command into your command prompt-<br /><div class="codeblock"> <div class="title">Code:<br /></div><div class="body" dir="ltr"><code>net share</code></div></div><br />Now let's say you found that ADMIN$ shares were being used locally across the network. Now what you are going to do is connect to the target host. Type this in-<br /><br /><div class="codeblock"> <div class="title">Code:<br /></div><div class="body" dir="ltr"><code>net use * \\hostname\ADMIN$</code></div></div><br />Let me explain this-<br /><br /><div class="codeblock"> <div class="title">Code:<br /></div><div class="body" dir="ltr"><code>net use</code></div></div><br />This is the command used to specify you want to use a shared resource on another computer.<br /><br /><div class="codeblock"> <div class="title">Code:<br /></div><div class="body" dir="ltr"><code>*</code></div></div><br />The asterisk is the most important part. This character will help you navigate through the remote host's files, because it will create a drive. You could specify the drive if you wanted to, but for a tutorial like this we will use the asterisk, and it will generate a drive name. If you use more than one host, then the drive to use for the first host would be named Z:, the second Y:, etc.<br /><br /><div class="codeblock"> <div class="title">Code:<br /></div><div class="body" dir="ltr"><code>\\hostname</code></div></div><br />This is the hostname specified in the net use command, which will be seen when you execute the net view command. The forward slashes are part of the syntax, but they will also be included in the output from the net view command.<br /><br /><div class="codeblock"> <div class="title">Code:<br /></div><div class="body" dir="ltr"><code>\ADMIN$</code></div></div><br />This is the share name that you are using with the hostname. The dollar sign is part of the syntax of the share name, and the forward slash is part of the syntax of the net use command.<br /><br />Here is an example of the command in action-<br /><br /><div class="codeblock"> <div class="title">Code:<br /></div><div class="body" dir="ltr"><code>net use * \\ABCLI123-65\ADMIN$</code></div></div> Or<br /><div class="codeblock"> <div class="title">Code:<br /></div><div class="body" dir="ltr"><code>net use * \\192.168.1.100\C$</code></div></div><br />If this command works, then the message “The command completed successfully”, then you have connected to the remote host. Now, just click the Start button, navigate to “Computer”, or “My Computer”, and look for the drive name that was specified in the output from the command prompt after you executed the command. Click it, and of course you will have access to the files on the remote host.<br /><br />AREN'T YOU A LUCKY DUCK!<br /><br />Now, if this doesn't work, mostly because of system error 53 or system error 5, then deny the remote host service. No, we're not going to bust out the ping of death, but we will shut their machines down. Now then, if I was going to do this, which I have, I would use the interface to simplify things. Go to a command prompt and type in<br /><br /><div class="codeblock"> <div class="title">Code:<br /></div><div class="body" dir="ltr"><code>shutdown -i</code></div></div><br />If you get another error, well, I'm not going to do a full tutorial for hacking Windows machines, but if you get no error, then here is what you do. Remember the <div class="codeblock"> <div class="title">Code:<br /></div><div class="body" dir="ltr"><code>net view</code></div></div> command? Well, perform that command again, and look at all the machines on your network. When you see the list of machines, notice the [ \\ ] characters at the beginning of each host name. When you look at the interface for shutting down remote computers, there will be a button that says Add, in the top right hand corner, next to the text box. Click this button, and type in (or copy and paste) the host name into the input box you will be prompted with, and click Ok. You should see the host name in the text box. Now you can specify other options, such as the reason you are shutting them down, how long you want to shut them down for (in seconds), and a text box at the bottom to specify comments. Type in a comment after you specify the delay before shutdown, and give your reason (I usually choose the “Other” option). Then click the OK button at the bottom of your GUI, and if you don't get an error in the command prompt you invoked the GUI with, then the remote host has been shutdown. :)<br /><br />AREN'T YOU A LUCKY DUCK!<br /><br />Anyway, I enjoyed writing this little tutorial for you guys, hope you learned something new. :Dchamphttp://www.blogger.com/profile/00556498768219651575noreply@blogger.com0tag:blogger.com,1999:blog-6977674572159411589.post-27861338919331823232011-11-23T01:41:00.001-08:002011-11-23T01:41:21.464-08:00How to get facebook profiles from facebook image links.Ok so you see a facebook image link which is like<br /><br /><a href="http://a3.sphotos.ak.fbcdn.net/hphotos-ak-ash4/380187_230848613642627_100001524709980_618599_199138399_n.jpg" target="_blank">http://a3.sphotos.ak.fbcdn.net/hphotos-a...8399_n.jpg</a><br /><br />and you think hmm i wonder what this guy's real name is.<br /><br />start off typing this in notepad<br /><br /><a href="http://www.facebook.com/profile.php?id=" target="_blank">http://www.facebook.com/profile.php?id=</a><br /><br />now normally on the third set of numbers the one that starts with a 1 and is near the beginning that is there profile id.<br /><br /> so from these numbers<br /><br />380187_230848613642627_100001524709980_618599_199138399_<br /><br />I see the third set is 100001524709980<br /><br />so i do this<br /><br /><a href="http://www.facebook.com/profile.php?id=100001524709980" target="_blank">http://www.facebook.com/profile.php?id=100001524709980</a><br /><br />then that is his profile.champhttp://www.blogger.com/profile/00556498768219651575noreply@blogger.com0tag:blogger.com,1999:blog-6977674572159411589.post-28334622176257839802011-11-23T01:38:00.000-08:002011-11-23T01:39:27.829-08:00Download from permium account free<span style="color: rgb(255, 102, 0);font-size:100%;" >Hi guys,<br /><br />here is a small guide how to download from HOTFILE, FILESONIC as a premium without any program.</span> <span style="color: rgb(255, 102, 0);font-size:100%;" ><br /><br />just add this part in the first of the link "http://s1.vidfetch.pl/file.php?link="</span> <span style="color: rgb(255, 102, 0);font-size:100%;" ><br /><br />example : "http://s1.vidfetch.pl/file.php?link=http://www.filesonic.com/file/3220415864/SGLANOFULL.part01.rar"</span> <span style="color: rgb(255, 102, 0);font-size:100%;" ><br /><br />- Let IDM manage your downloads and check the status of the link before using this method.</span> <span style="color: rgb(255, 102, 0);font-size:100%;" ><br /><br />edit: its working 100% on hotfile and filesonic.. but iam not sure about another file hosting some links success and some not.</span>champhttp://www.blogger.com/profile/00556498768219651575noreply@blogger.com2tag:blogger.com,1999:blog-6977674572159411589.post-79224505322070943332011-11-23T01:37:00.001-08:002011-11-23T01:37:37.660-08:00How To Boot Winxp Fast<span style="font-weight: bold;"><div style="text-align: center;"><span style="color: rgb(0, 191, 255);"><span style="font-size: xx-large;"><span style="font-family: Verdana;">How To Boot Winxp Fast</span></span></span></div></span><br /><br /><span style="font-size: x-large;"><span style="color: rgb(0, 191, 255);"><span style="font-weight: bold;"><div style="text-align: center;">Follow the following steps:</div></span></span></span><br /><br /><span style="font-weight: bold; color: rgb(51, 204, 255);">1. Open notepad.exe, type "del c:\windows\prefetch\ntosboot-*.* /q" (without the quotes) & save as "ntosboot.bat" in c:\<br /><br />2. From the Start menu, select "Run..." & type "gpedit.msc".<br /><br />3. Double click "Windows Settings" under "Computer Configuration" and double click again on "Shutdown" in the right window.<br /><br />4. In the new window, click "add", "Browse", locate your "ntosboot.bat" file & click "Open".<br /><br />5. Click "OK", "Apply" & "OK" once again to exit.<br /><br />6. From the Start menu, select "Run..." & type "devmgmt.msc".<br /><br />7. Double click on "IDE ATA/ATAPI controllers"<br /><br />8. Right click on "Primary IDE Channel" and select "Properties".<br /><br />9. Select the "Advanced Settings" tab then on the device or 1 that<br />doesn't have 'device type' greyed out select 'none' instead of 'autodetect' & click "OK".<br /><br />10. Right click on "Secondary IDE channel", select "Properties" and repeat step 9.<br /><br />11. Reboot your computer.</span>champhttp://www.blogger.com/profile/00556498768219651575noreply@blogger.com0tag:blogger.com,1999:blog-6977674572159411589.post-47516371435334374732011-11-23T01:36:00.001-08:002011-11-23T01:36:40.492-08:00Increase Virtual RAM - To Make Your System Faster<span style="font-size: medium;"><span style="font-weight: bold;"><span style="color: cyan;"><span style="color: rgb(255, 215, 0);"><span style="font-family: Verdana;"><span style="font-size: xx-large;">Increase Virtual RAM - To Make Your System Faster<br /></span></span></span><br /><br />Follow the steps given below :-<br /><br /><span style="color: rgb(255, 215, 0);">1)</span> Hold down the 'Windows' Key and Press the 'Pause/Break' button at the top right of your keyboard.<br />Another way is Right-Clicking 'My Computer' and then Select 'Properties'.<br /><br /><span style="color: rgb(255, 215, 0);">2)</span> Click on the 'Advanced' tab.<br /><br /><span style="color: rgb(255, 215, 0);">3)</span> Under 'Performance', click 'Settings'.<br /><br /><span style="color: rgb(255, 215, 0);">4)</span> Then click the 'Advanced' tab on the button that pops up.<br /><br /><span style="color: rgb(255, 215, 0);">5)</span> Under 'Virtual Memory' at the bottom, click 'Change'.<br /><br /><span style="color: rgb(255, 215, 0);">6)</span> Click the 'Custom Size' button.<br /><br /><span style="color: rgb(255, 215, 0);">7)</span> For the initial size (depending on your HD space), type in anywhere from 1000-1500 (although I use 4000), and for the Maximum size type in anywhere from 2000-2500 (although I use 6000).<br /><br /><span style="color: rgb(255, 215, 0);">8)</span> Click 'Set', and then exit out of all of the windows.<br /><br /><span style="color: rgb(255, 215, 0);">9)</span> Finally, Restart your computer.<br /><br /><span style="color: rgb(255, 215, 0);">10)</span> You now have a faster computer and 1-2GB of Virtual RAM..!</span></span></span>champhttp://www.blogger.com/profile/00556498768219651575noreply@blogger.com1tag:blogger.com,1999:blog-6977674572159411589.post-8876425668931126372011-11-23T01:35:00.001-08:002011-11-23T01:35:31.892-08:00Facebook new shortcuts<span style="text-decoration: underline;">Note : This has been tested from the URL <a href="http://www.facebook.com/" target="_blank">http://www.facebook.com</a></span><br /><br /><span style="font-weight: bold;">1. Alt + 0 ---> Facebook help (<a href="http://www.facebook.com/help/?ref=pf%29" target="_blank">http://www.facebook.com/help/?ref=pf)</a><br /><br />2. Alt + 6 ---> Facebook Settings (<a href="http://www.facebook.com/settings?ref=mb%29" target="_blank">http://www.facebook.com/settings?ref=mb)</a><br /><br />3. Alt + 7 ---> Facebook Privacy Settings (<a href="http://www.facebook.com/settings/?tab=privacy&ref=mb%29" target="_blank">http://www.facebook.com/settings/?tab=privacy&ref=mb)</a><br /><br />4. Alt + 8 ---> Facebook Official Page (<a href="http://www.facebook.com/facebook%29" target="_blank">http://www.facebook.com/facebook)</a><br /><br />5. Alt + 9 ---> Facebook Statement of Rights and Responsibilities (<a href="http://www.facebook.com/terms.php?ref=pf%29" target="_blank">http://www.facebook.com/terms.php?ref=pf)</a></span><br /><br />If you find more, please post it. I will add to the Original post.<br /><br /><span style="font-style: italic;">Thanks for reading.</span>champhttp://www.blogger.com/profile/00556498768219651575noreply@blogger.com0tag:blogger.com,1999:blog-6977674572159411589.post-62170852856227466902011-11-23T01:31:00.000-08:002011-11-23T01:32:21.932-08:00Re-enable CMD, Regedit and Task Manager from being block<div class="post_body" id="pid_17585666"> <span style="color: rgb(128, 0, 0);"><span style="font-size: medium;"><span style="font-style: italic;"><span style="font-weight: bold;">Hi guys, well there would be many new people to hacking and accidently click on their tools and disable all those stuff i wrote on the title or being hacked by a hacker and they don't know how to solve it. They don't know what to do except reinstall their window or restore.</span></span></span></span><br /><span style="font-weight: bold;"><span style="font-style: italic;"><br /><span style="color: rgb(0, 0, 205);"><span style="font-size: large;">Today, i'll show you these easy steps to recover your authority as an administrator on your PC </span></span></span></span><br /><br /><span style="color: rgb(50, 205, 50);"><span style="text-decoration: underline;"><span style="font-weight: bold;"><span style="font-style: italic;"><span style="font-size: x-large;">Enable Regedit!</span></span></span></span></span><br /><span style="color: rgb(255, 0, 0);"><span style="font-weight: bold;"><span style="font-style: italic;"><span style="text-decoration: underline;"><span style="font-size: medium;">1st Method</span></span></span></span></span><br />Click Start -> Run… and enter this command (all on one line) :<br /><br />REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 0 /f<br /><br />If that didn't work for you? try the second method<br /><span style="color: rgb(255, 0, 0);"><span style="text-decoration: underline;"><span style="font-style: italic;"><span style="font-weight: bold;"><span style="font-size: medium;">2nd Method</span></span></span></span></span><br />download this and launch it, it'll enable your regedit!!!<br /><a href="http://www.mediafire.com/?877c2vaamu1l3a5" target="_blank">http://www.mediafire.com/?877c2vaamu1l3a5</a><br /><br /><br />Note: if both method don't work then your computer is being infected with a malware that change your registry over time<br /><br /><span style="color: rgb(50, 205, 50);"><span style="text-decoration: underline;"><span style="font-weight: bold;"><span style="font-style: italic;"><span style="font-size: x-large;">Enable CMD!</span></span></span></span></span><br />OK guys, enable CMD and task manager would be the same since the hacker or the tools change your registry to disable these, just do these<br /><span style="color: rgb(255, 0, 0);"><span style="text-decoration: underline;"><span style="font-style: italic;"><span style="font-weight: bold;"><span style="font-size: medium;">1st Method:</span></span></span></span></span><br />1. Start ==>Run<br />2.type in regedit<br />3.Find:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System<br />4. There would be a disable CMD or some thing familiar with that<br />5.Disable it!<br /><span style="color: rgb(255, 0, 0);"><span style="text-decoration: underline;"><span style="font-style: italic;"><span style="font-weight: bold;"><span style="font-size: medium;">2nd Method</span></span></span></span></span><br />Download this, run it and it would re-enable your CMD<br /><a href="http://www.mediafire.com/?u23fb59jytfwn94" target="_blank">http://www.mediafire.com/?u23fb59jytfwn94</a><br /><br /><span style="color: rgb(50, 205, 50);"><span style="text-decoration: underline;"><span style="font-weight: bold;"><span style="font-style: italic;"><span style="font-size: x-large;">Enable Task Manager</span></span></span></span></span><br />Just use the first method of enable CMD, this time look for disble task manager or something and disable IT!!<br /><br />That's it guys, it's really simple!! Good luck guys!!!<img src="http://www.hackforums.net/images/smilies/yeye.gif" style="vertical-align: middle;" alt="Yeye" title="Yeye" border="0" /><img src="http://www.hackforums.net/images/smilies/yeye.gif" style="vertical-align: middle;" alt="Yeye" title="Yeye" border="0" /><img src="http://www.hackforums.net/images/smilies/yeye.gif" style="vertical-align: middle;" alt="Yeye" title="Yeye" border="0" /> </div>champhttp://www.blogger.com/profile/00556498768219651575noreply@blogger.com0tag:blogger.com,1999:blog-6977674572159411589.post-75965134712429336712011-06-08T01:42:00.003-07:002011-06-08T01:43:35.508-07:00Increase ur RAM and so ur System Speed<span style="">1). Start any application, say Word. Open some large documents.<br /><br /> 2). Press CTRL+SHIFT+ESC to open Windows Task Manager and click Processes tab and sort the list in descending order on Mem Usage. You will notice that WINWORD.EXE will be somewhere at the top, using multiple MBs of memory.<br /><br /> 3). Now switch to Word and simply minimize it. (Don't use the Minimize All Windows option of the task bar).<br /><br /> 4). Now go back to the Windows Task Manager and see where WINWORD.EXE is listed. Most probably you will not find it at the top. You will typically have to scroll to the bottom of the list to find Word. Now check out the amount of RAM it is using. Surprised? The memory utilization has reduced by a huge amount.<br /><br /></span><span style="">5). Minimize each application that you are currently not working on by clicking on the Minimize button & you can increase the amount of available RAM by a substantial margin. Depending upon the number and type of applications you use together, the difference can be as much as 50 percent of extra RAM. In any multitasking system, minimizing an application means that it won't be utilized by the user right now. Therefore, the OS automatically makes the application use virtual memory & keeps bare minimum amounts of the code in physical RAM. </span>champhttp://www.blogger.com/profile/00556498768219651575noreply@blogger.com0tag:blogger.com,1999:blog-6977674572159411589.post-11370116410062916552011-06-08T01:42:00.002-07:002011-06-08T01:43:16.419-07:00<span style="">1). Start any application, say Word. Open some large documents.<br /><br /> 2). Press CTRL+SHIFT+ESC to open Windows Task Manager and click Processes tab and sort the list in descending order on Mem Usage. You will notice that WINWORD.EXE will be somewhere at the top, using multiple MBs of memory.<br /><br /> 3). Now switch to Word and simply minimize it. (Don't use the Minimize All Windows option of the task bar).<br /><br /> 4). Now go back to the Windows Task Manager and see where WINWORD.EXE is listed. Most probably you will not find it at the top. You will typically have to scroll to the bottom of the list to find Word. Now check out the amount of RAM it is using. Surprised? The memory utilization has reduced by a huge amount.<br /><br /></span><span style="">5). Minimize each application that you are currently not working on by clicking on the Minimize button & you can increase the amount of available RAM by a substantial margin. Depending upon the number and type of applications you use together, the difference can be as much as 50 percent of extra RAM. In any multitasking system, minimizing an application means that it won't be utilized by the user right now. Therefore, the OS automatically makes the application use virtual memory & keeps bare minimum amounts of the code in physical RAM. </span>champhttp://www.blogger.com/profile/00556498768219651575noreply@blogger.com0tag:blogger.com,1999:blog-6977674572159411589.post-35436559869198647052011-06-08T01:42:00.001-07:002011-06-08T01:42:59.734-07:00Increase ur RAM and so ur System Speed<span style="font-size:-1;">1). Start any application, say Word. Open some large documents.<br /><br /> 2). Press CTRL+SHIFT+ESC to open Windows Task Manager and click Processes tab and sort the list in descending order on Mem Usage. You will notice that WINWORD.EXE will be somewhere at the top, using multiple MBs of memory.<br /><br /> 3). Now switch to Word and simply minimize it. (Don't use the Minimize All Windows option of the task bar).<br /><br /> 4). Now go back to the Windows Task Manager and see where WINWORD.EXE is listed. Most probably you will not find it at the top. You will typically have to scroll to the bottom of the list to find Word. Now check out the amount of RAM it is using. Surprised? The memory utilization has reduced by a huge amount.<br /></span><span style="font-size:-1;">5). Minimize each application that you are currently not working on by clicking on the Minimize button & you can increase the amount of available RAM by a substantial margin. Depending upon the number and type of applications you use together, the difference can be as much as 50 percent of extra RAM. In any multitasking system, minimizing an application means that it won't be utilized by the user right now. Therefore, the OS automatically makes the application use virtual memory & keeps bare minimum amounts of the code in physical RAM. </span>champhttp://www.blogger.com/profile/00556498768219651575noreply@blogger.com0tag:blogger.com,1999:blog-6977674572159411589.post-52927244355587745322011-06-08T01:36:00.001-07:002011-06-08T01:41:10.653-07:00How to disable the unread email notification in XP welcome screen<span style="font-size:-1;">Windows XP by default display the list of unread email on the windows welcome screen. But some time this unread email notification is irritating users and they don't want to display it on the welcome screen. They can easily disable it using the windows registry editor. Make sure before modifying your system Registry about its backup because Registry contains all information how your system runs. This backup will help you to restore Registry in case any problem occurs after modifying.<br /></span><a href="http://avitricks1.googlepages.com/unread-mail.gif"><img style="float: left; margin: 0pt 10px 10px 0pt; cursor: pointer; width: 319px; height: 112px;" src="http://avitricks1.googlepages.com/unread-mail.gif" alt="" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><span style="font-size:-1;">Follow the given steps to disable the email notification option:<br /><br /></span><span style="font-size:-1;">First click on Start button and type "Regedit" in Run option.<br /><br /></span><a href="http://avitricks1.googlepages.com/run_editor.gif"><img style="float: left; margin: 0pt 10px 10px 0pt; cursor: pointer; width: 340px; height: 174px;" src="http://avitricks1.googlepages.com/run_editor.gif" alt="" border="0" /></a><br /><span style="font-size:-1;"><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /></span><span style="font-size:-1;">Here locate the location to:<br />Navigate to<br />HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionUnreadMail<br /><br /></span><a href="http://avitricks1.googlepages.com/unread-email.gif"><img style="float: left; margin: 0pt 10px 10px 0pt; cursor: pointer; width: 376px; height: 356px;" src="http://avitricks1.googlepages.com/unread-email.gif" alt="" border="0" /></a><br /><span style="font-size:-1;"><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /></span><span style="font-size:-1;">Here in right side panel, double click on the key MessageExpiryDays and set its </span><span style="font-size:-1;">value to 0.<br /></span><a href="http://avitricks1.googlepages.com/message-expiry.gif"><img style="float: left; margin: 0pt 10px 10px 0pt; cursor: pointer; width: 329px; height: 252px;" src="http://avitricks1.googlepages.com/message-expiry.gif" alt="" border="0" /></a><br /><span style="font-size:-1;"><br /></span><span style="font-size:-1;"><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /></span><span style="font-size:-1;">But if MessageExpiryDays key doesn't exist, then in right side panel, click right to create a key with the name MessageExpiryDays and then set its value to 0.<br /><br /> Now close the registry editor and restart your computer after any changes to go into effect.</span>champhttp://www.blogger.com/profile/00556498768219651575noreply@blogger.com0tag:blogger.com,1999:blog-6977674572159411589.post-60261458778419681132011-06-07T19:13:00.001-07:002011-06-07T19:13:25.933-07:00Windows Shortcuts keysHere are some windoes <span class="IL_AD" id="IL_AD2">shortcut keys</span><br /><b>Windows Shortcuts keys</b><br />Alt + E — <span class="IL_AD" id="IL_AD5">Opens</span> the Edit menu<br />Alt + Enter — Opens the <span class="IL_AD" id="IL_AD6">Properties</span> window<br />Alt + F — Opens the File menu<br />Alt + F4 — Closes the current program<br />Alt + Print — Screen <span class="IL_AD" id="IL_AD8">Takes</span> a <span class="IL_AD" id="IL_AD4">screen shot</span> of the current window or program<br />Alt + Tab — Switches between the programs currently in use<br />CTRL+TAB — SWITCHES BETWEEN TAB IN <span class="IL_AD" id="IL_AD9">DIALOG BOX</span>,I.E 7<br />Ctrl + A — Selects all text<br />Ctrl + C — Copies the <span class="IL_AD" id="IL_AD3">selected</span> object<br />Ctrl + End — Jumps to the end of the current document<br />Ctrl + Esc — Opens the Start menu<br />Ctrl + F4 — Closes the current program<br />Ctrl + Home — Jumps to the beginning of the current document<br />Ctrl + Insert — Copies the selected object<br /><span class="fullpost"><br />Ctrl + left arrow — Moves to the left one word<br />Ctrl + right arrow — Moves to the right one word<br />Ctrl + V — Pastes the selected object<br />Ctrl + X — Cuts the selected object<br />Ctrl + the “+”key — Perfectly resizes the width of Explorer columns<br />End — Jumps to the end of the current line<br />F1 — Opens the Help menu<br />F2 — Renames the selected icon<br />F3 — <span class="IL_AD" id="IL_AD11">Launches</span> the Search Companion in a <span class="IL_AD" id="IL_AD10">folder</span> or on the<br />desktop<br /><br />F4 — Accesses the Address <span class="IL_AD" id="IL_AD12">Bar</span> in a folder or window<br />F5 — Refreshes the contents of a folder or window<br />Home — Jumps to the beginning of the current line<br />Shift + Delete — Permanently deletes files (bypasses the Recycle Bin)<br />Shift + End — <span class="IL_AD" id="IL_AD1">Highlights</span> text from the current position to the end of<br />the line<br />Shift + F10 — Substitutes for a right-click<br />Shift + Home — Highlights text from the current position to the<br />beginning of the line<br />Shift + Insert — Pastes the selected object<br />Shift while inserting — Prevents <span class="IL_AD" id="IL_AD7">the CD</span> player from playing an audio CD<br /><br />Shortcuts for Keyboards with a “Windows”Key (Resembling a Flag)<br /><br />Windows Key + E — Opens Windows Explorer<br />Windows Key + F — Launches the Windows Search Companion<br />Windows Key + F1 — Opens the Help and Support Center<br />Windows Key + L — Locks down Windows<br />Windows Key + M — Minimizes all windows and shows the desktop<br />Windows Key + M + Shift — Undoes the minimize<br />Windows Key + Opens — the System Properties window<br />Pause/Break key<br />Windows Key + R — Opens the Run window<br />Windows Key + U — Launches the Utility Manager<br />WINDOWS KEY+U — MINIMIZES ALL WINDOWS AND GOES TO DESKTOP<br /></span>champhttp://www.blogger.com/profile/00556498768219651575noreply@blogger.com0tag:blogger.com,1999:blog-6977674572159411589.post-62006410048345435532011-06-07T19:11:00.001-07:002011-06-07T19:12:13.242-07:00How to delete undetecteble file in windows xpTOday ill tell u how to delete undetecteble file on XP. They are not <span class="IL_AD" id="IL_AD2">deleted</span> simply and a message appears that "access denied" There is a simple way to delete those files. Read this carefully.<br /><br />Click on Start, Search, All Files and Folders.<br /><br />Right-click on file and choose <span class="IL_AD" id="IL_AD5">properties</span><br /><br />file location example: c:\windows\<span class="IL_AD" id="IL_AD4">system32</span>\undeleteablefile.exe<br /><br /><br />Open a <span class="IL_AD" id="IL_AD1">Command Prompt</span> window<br /><br />Again Click on Start button, Run and type TASKMGR.EXE and press Enter <span class="IL_AD" id="IL_AD7">to start</span> Task manager<br />Click on the Processes tab, click on the process named Explorer.exe and click on End Process.<br /><br />Minimize Task Manager.<br /><br />Go back to the Command Prompt window and change to the directory where the file is <span class="IL_AD" id="IL_AD6">located</span>. To do this, use <span class="IL_AD" id="IL_AD3">the CD</span> command.<br /><br />cd \windows\system32<br /><br />Type DEL where is the file you wish to delete.<br /><br />Example: del undeletablefile.exe<br /><br />Go back to Task Manager<br /><br />In Task Manager, click File, New Task and enter EXPLORER.EXE to restart the Windows shell.<br /><br />Close Task Manager and the file is deleted.champhttp://www.blogger.com/profile/00556498768219651575noreply@blogger.com0