Monday, 9 June 2014

J.A.R.V.I.S.

Saw the movie IRON MAN want J.A.R.V.I.S. the voice command system which helps Tony Stark. Get J.A.R.V.I.S. for your pc today from the link below.

Tip 02: Want a key or crack for a software

Want a key or crack for a software?

Easy way to that. Go to google. type the name of the software in search put space type 94FBR.

For eg. If i wanted a key for 'avast' then i would search on google "avast 94FBR" without quotes.


94FBR will make google search for keys/hacks/cracks for the software

Tip 01

Download Cyberghost

http://www.cyberghostvpn.com/

Saturday, 7 June 2014

Forgot Your Windows Password? No Problem!

This for educational purposes only.

1. Download ERD Commander.

2. Burn to CD/DVD using nero or any other suitable program

3. Boot from CD/DVD.

4. Click on Start>>Locksmith 

5. Now Locksmith application must start. Select the user account you forgot the password to.

6. Enter a new password and click ok.

7. Reboot Your PC/Laptop.

8. Congratulations your password is now changed.

How to Fix-Repair windows registry errors.

1. What is windows registry?

@ In very simple words, windows registry are some files that hold your system configuration. Windows registry can also be termed as a database that holds the settings for your windows. If something happens to the files in Windows Registry, your whole system can crash.


2. How to View Windows Registry?

Its very simple to view Windows registry.

1. Goto Run or press Windows Button + R

2. Type : regedit

3. Press Enter


3. Why is windows registry important?

@ A stated above, windows registry files are the configuration files of your computer. If something happens to them, your whole computer can crash and you may loose all your important work or information on your computer.

4. How do you fix/repair registry errors?

@ Just Download CCleaner. There is an option registry. check all the options and click scan for issues after the scan is complete select fix selected issues. Check the screenshot for more info.


Types of Proxy | How to hide IP Address.


 In this post I will try to give you every possible information to hide the IP address using the various types of Proxy Servers out there. If you want to know about various kind of proxy servers then this post is for you.


A proxy server acts as an interface between the user and the internet if you want to Change your IP Address.

Don’t know what is IP Address?

Read: What is IP Address

Now I’ll come to the heart of the post, which contains the answer to your curious question How to Hide the IP address ? The only solution to hide your IP address is by using a Proxy Server. But Wait! The story doesn’t end here. Even though proxy servers are the only way to hide your IP address, there are several ways of connecting your PC to the proxy server. Before setting up the connection with the proxy servers you must know some information about different types of proxy servers and their uses.

1. Transparent Proxy Server
This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used to speedup the web browsing since thay have a very good ability to cache websites. But they do not conceal the IP of it’s users. It is widely known as transparent proxy because it will expose your real IP address to the web. This type of proxy server does not hide your IP address.

2. Anonymous Proxy Server
This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users. This type of proxy server will hide your IP address.

3. Distorting Proxy Server
This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers. This type of proxy server will hide your IP address.

4. High Anonymity Proxy Server (Elite Proxy)
This type of proxy server does not identify itself as a proxy server and does not make available the original IP address. This type of proxy server will hide your IP address.So this is the best way to mask your IP.

Which Proxy Server is the best to Hide My IP ?

I know, you can answer this question better than me.Obviously High Anonymity Proxy or Elite Proxy is the best to hide your IP. But it’s not easy to get a list of working elite proxies. If you search the Google, you will definitely get tons of proxy list. You’ll get a list of proxies in the following format

IP:Port Number
Eg: 235.56.47.24:8080 235.56.47.24 is the IP of the proxy server and 8080 is the port number)
But most of them don’t work. Here are some of the problems/risks associated with using free proxies that are available on the internet.

Most of them do not work since the proxy servers frequently changes it’s IP/Port number.
Even if you find a working proxy server it may be too slow.
Your privacy is not guaranteed since all your traffic is routed through the proxy server.
The administrators of the proxy servers may steal your valuable information such as passwords, SSN (Social security number), Credit Card details etc.
So with all these being the risks then how to find a working, fast ,highly anonymous and secured Proxy servers?

Now I will share the software that works like charm to change the email accounts.

Hide My Ass pro Vpn is the best proxy server out there!

Hello

This is a blog which will teach you hacking. Ethical Hacking. 

1. So What is Ethical hacking??
@ Ethical hacking and ethical hacker are terms that describe hacking performed to help a company or individual identify potential threats on the computer or network. An ethical hacker attempts to hack their way past the system security, finding any weak points in the security that could be exploited by other hackers. The organization uses what the ethical hacker finds to improve the system security, in an effort to minimize, if not eliminate, any potential hacker attacks.
  Okay, Basically ethical hacking means hacking to protect valuable data or development of a certain company/organisation. 

2. Some Rules:
    In order for hacking to be deemed ethical, the hacker must obey the below rules.

  1. You have permission to probe the network and attempt to identify potential security risks. It is recommended that if you are the person performing the tests that you get written consent.

  2. You respect the individual's or company's privacy and only go looking for security issues.

  3. You report all security vulnerabilities you detect to the company, not leaving anything open for you or someone else to come in at a later time.

  4. You let the software developer or hardware manufacturer know of any security vulnerabilities you locate in their software or hardware if not already known by the company.

If You Are Ready Then Lets Start!