Danger of 'Ctrl+C' on the Web.

Posted by tech master  |  at  4:01 PM

We do copy various data by ctrl+c for pasting elsewhere. This copied data is stored in clipboard and is accessible from the net by a combination of Javascripts and ASP.
Just try this:
1) Copy any text by 'ctrl+c' 2) .

Do not keep sensitive data (like passwords, reditcard numbers, PIN etc.) in the clipboard while surfing the web. It is extremely easy to extract the text stored in the clipboard to steal your sensitive information.

To avoid Clipboard Hack Problem, do the following: 1) In Internet Explorer, Go to Tools -> Internet options -> Security
2) Press Custom level.
3) In the security settings, select disable under Allow paste operations via script and click on 'OK. (Now the contents of your clipboard are safe.)


Create a list of all files and folders inside a particular folder with a right-click!!

Posted by tech master  |  at  6:08 PM

After this tutorial,an option will be available whenever you right-click any
folder which will display all the files and sub-folders inside that folder and
save it to a text file.

1. Create a .bat file

Open Notepad and copy-paste the following data in it.

cd %1

dir /a /b /-p /o:gen >C:\filelist.txt

start notepad C:\filelist.txt

You can edit the path to your preference.Now name this file anything you wish
and save it anywhere you wish.

2. Make file visible in right click context menu.

Open explorer window, Go to Tools>Folder Options..>File types and from
the registered file types list,select FOLDER. Click on Advanced>New....In
the Action box, type in the name you want in context menu. For e.g. Generate
File List
.. Then click on Browse.., navigate to the .bat file created
in step 1 and save the changes.

3. Congratulations!!

You are done with the tutorial!!. Now right click any folder and select
Generate File Listing
. A text file will be created in your C:\ drive [or any
path you specified in the .bat file.] called filelist.txt which contains
list of all files and sub-folders in the parent folder!


Find every files on your PC by Editing registry

Posted by tech master  |  at  8:15 PM

When you search for a file in Windows (choose Start, Search, For Files or Folders, or press in any Explorer or folder window to open the search pane),
Windows searches only for file types it recognizes. Files that aren't listed in the 'Registered file types' list are ignored (to view this list, open Explorer, choose Tools, Folder Options, and click the File Types tab).

So while 'Read_Me.xyz' may be a perfectly good file name to you, Windows pays it no mind because of the unrecognized '.xyz' file extension. Fortunately, a simple edit of the Registry will make Windows search for every file, regardless of its extension. Open the Registry Editor as described above,
and then navigate to and select

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Contro l\ContentIndex.

Double-click the FilterFilesWithUnknownExtensions icon in the right
pane, change the 0 in the 'Value data' box to 1, and press <Enter>.


To convert a .bat or a .vbs file into an executable .exe file without any software

Posted by tech master  |  at  11:49 AM

Just Follow the steps and convert a .bat or a .vbs file into an executable .exe.

Step 1
Navigate to C:\Windows\System32 and locate the file named IEXPRESS.EXE

Step 2
Double Click to launch IEXPRESS.EXE or just type & enter iexpress.exe in start>run box.

Step 3
You will be presented with the initial welcome screen and be given two choices. Select “Create new Self Extraction Directive file.” Click Next.

Step 4
Next you will be presented with the Package Purpose screen. For our purposes select “Extract Files and run an installation command” and click the Next button.

Step 5
You will be presented with the Package Title screen, which will give you the opportunity to give your project a name. If you are so inclined give it a meaningful name. If like me you are never going to come back to this, name it whatever you want.

Step 6
You will next be presented with the Confirmation Prompt Screen. We would like the batch file to just be extracted and run so just choose “No Prompt” and click the Next Button.

Step 7
You are presented with the License Agreement window. If you don’t want your users to have to answer a prompt select “Do not display a license.”

Step 8
The Packaged Files window is where you will select your batch file (or .vbs). Click the Add button and browse to your desired file. Then click next.

Step 9
Here you are presented with a window titled Install Program to Launch. Use the drop down control next to “Install Program and choose the only option that will be present, the .bat or .vbs file that you chose in the previous window.

Step 10
The Show Window screen is next. I didn’t want my users to be prompted in any way so I chose Hidden. Click Next.

Step 11
No Finished Message for my users. Select “No message” and choose Next.

Step 12
The Package Name and Options window is where the new .exe specified. Type in a path or browse to the folder you would like your .exe in, type a name in the file name box and click save. Also check the box that says “Hide File Extraction Progress Animation from User.” If you’re worried about long file names go ahead and click the other box as well.

Step 13
Since we really aren’t installing anything we probably want to tell the Configure Restart window to not restart. So choose the option that says “No restart” and hit Next.

Step 14
This window is where you have a chance to save all of the options you have chosen into a project file so that if necessary you may later return and make modifications. I have no need to retain the file, but if you would like to be able to come back to it, by all means choose “Save Self Extraction Directive (SED) file” and tell it where to put it. As always, click Next.

Step 15
Here’s where you’re new .exe is born, on the Create Package screen. Explore to the directory you told it to put the file in, click Next and then watch your little .exe’s first moments as it pops into the big digital world.

Step 16
You’re done! Click finish and go try it out.


Add an Image in Context Menu in Windows XP by Vishal Gupta

Posted by tech master  |  at  3:38 PM

This tutorial is not written by me. The original author of this post is Vishal Gupta.

After following this tutorial, you’ll get your desired image in the context menu (the menu which appears when you right-click on desktop or explorer). See the following screenshot of my context menu:



How to Send Self-Destructing Emails

Posted by tech master  |  at  12:45 PM

Ever sent an email you later regretted writing? We all have, but it can be especially bad when those emails are sent to the wrong person or get leaked on the Internet. You might not know this, but there are many providers that offer self destructing email services. These services give you complete control over who reads them, how long they exist, or whether they can be printed, copied, or forwarded. Hey, you don't have to be a secret agent to send self-destructing emails, just a very smart geek with a reputation to maintain, so check out what these sites can do for you:

Will Self-Destruct:
This service is free. There's no sign up process, but you have to fill out a
web-based form with the recipient's email address, subject, and your message.
The recipient receives an email with a link to a web page containing your
message. Once the link is accessed, a countdown begins, and the message is
destroyed. The email itself looks like spam, so make sure you tell your friend
to expect something from willselfdestruct.com.
SDMessage and
Destructing Message are two
similar alternatives.

KickNotes: Another web-based service
that sends self-destructing messages after filling out a form. You can actually
control the times the message can be viewed or how long you want the message to
exist. Once the message is created, you can either send a link to a web page
through your own email address or from KickNotes.

These sites can be useful if you want to send password or other important information that you don't want other people to see.


Easiest way to make xbox 360 backups

Posted by tech master  |  at  1:12 PM

Note this works with any valid Xbox 360 image.

This is the simplest tutorial on how to backup any xbox 360 game.

Disclaimer-To play backups u need to flash ur xbox 360 drive's bios which is illegal as the bios is copy protected material.Do at ur own Risk.

Tools you need (all are freeware)-

-Used to create xbox 360 backup images

2)Dual Layer DVD writer (expected sony or Liteon)

3)Verbatim Dual Layer DVD (DVD +R DL,not -R but +R)

- To change the Bit setting/book type to DVD Rom from DVD DL if u have
an LG/Hitachi Xbox 360 Drive.


Step 1-

A) Now insert the Xbox 360 game in your Dual Layer DVD writer. Run
Schtrom360XtractV3.2.exe which you downloaded.

B) Select the Dual Layer Drive drive. Select the destination (where the image is
to be stored).

C) Click on extract. In at least 10-15 minutes u have your *.000 and *.dvd file.

D) Now eject the Dual Layer Drive after the image has been prepared.

Step 2-

A) Inert a blank Dual Layer DVD (DVD +R DL) in the Dual Layer Dvd Drive.

B) Open The *.dvd file in notepad. Then copy the number after the "Layerbreak="

C) Open DVD Decrypter. On the menu bar above click on tools then on settings.

D) Goto ISO Write Mode. On the right hand side you will see a section called

E) In there is a Layer Break category with two radio buttons. Select the second
radio button, User Specified.

F) Under the radio button there is the option to enter sectors in L0. Here paste
the number u copied.

G) All xbox 360 games have layer breaks at same number so you'll have to set
this only once.

H) Now In the *.DVD file delete "LayerBreak=1913760".That means with the number.

I) Save the *.dvd file with name it previously had.

J) In DVD Decrypter, select Write Mode (just hit W and it will go into Write
Mode). Then open (File->Browse or click the little Browse icon underneath the
Source section of the

Write Dialog.) your *.DVD file. [NOTE: If you get a "Invalid or unsupported
image file format!" error when you load this file, it means your backup was made

K) Hit Burn. Burn close to 2X only then only will your xbox 360 read the backup
and not skip it.

L) If U have an xbox 360 with an LG/Hitachi Drive then you need to change the
bitsetting/book type to DVD rom from DVD DL. Use DVDinfopro free. Install
DVDinfopro free then run it and click on +RW icon at top and change the book
type. For every DVD DL Burner of different brand the options are different.

L) Optional: If you are going to use DVD Decrypter to burn anything OTHER than
360 backups, then go back to Tools -> Settings and remember to change the Layer
Break option on the ISO Write Mode tab BACK to Calculate Optimal.


How to recover from a corrupted registry that prevents Windows XP from starting

Posted by tech master  |  at  2:35 PM

When you try to start or restart your Windows XP-based computer, you may
receive one of the following error messages:

Windows XP could not start because the following file is
missing or corrupt: \WINDOWS\SYSTEM32\CONFIG\SYSTEM

Windows XP could not start because the following file is

Stop: c0000218 {Registry File Failure} The registry cannot
load the hive (file): \SystemRoot\System32\Config\SOFTWARE or its log or

System error: Lsass.exe

When trying to update a password the return status indicates that the value
provided as the current password is not correct.

Manual steps to recover a corrupted registry that prevents Windows XP from

The procedure that this article describes uses Recovery Console and System
Restore. This article also lists all the required steps in specific order to
make sure that the process is fully completed. When you finish this procedure,
the system returns to a state very close to the state before the problem
occurred. If you have ever run NTBackup and completed a system state backup, you
do not have to follow the procedures in parts two and three. You can go to part

Part one

In part one, you start the Recovery Console, create a temporary folder, back up
the existing registry files to a new location, delete the registry files at
their existing location, and then copy the registry files from the repair folder
to the System32\Config folder. When you have finished this procedure, a registry
is created that you can use to start Windows XP. This registry was created and
saved during the initial setup of Windows XP. Therefore any changes and settings
that occurred after the Setup program was finished are lost.

To complete part one, follow these steps:

1. Insert the Windows XP startup disk into the floppy disk drive, or insert
the Windows XP CD-ROM into the CD-ROM drive, and then restart the computer.

Click to select any options that are required to start the computer from the
CD-ROM drive if you are prompted to do so.

2. When the "Welcome to Setup" screen appears, press R to start the Recovery

3. If you have a dual-boot or multiple-boot computer, select the installation
that you want to access from the Recovery Console.

4. When you are prompted to do so, type the Administrator password. If the
administrator password is blank, just press ENTER.

5. At the Recovery Console command prompt, type the following lines, pressing
ENTER after you type each line:

md tmp

copy c:\windows\system32\config\system c:\windows\tmp\system.bak

copy c:\windows\system32\config\software c:\windows\tmp\software.bak

copy c:\windows\system32\config\sam c:\windows\tmp\sam.bak

copy c:\windows\system32\config\security c:\windows\tmp\security.bak

copy c:\windows\system32\config\default c:\windows\tmp\default.bak

delete c:\windows\system32\config\system

delete c:\windows\system32\config\software

delete c:\windows\system32\config\sam

delete c:\windows\system32\config\security

delete c:\windows\system32\config\default

copy c:\windows\repair\system c:\windows\system32\config\system

copy c:\windows\repair\software c:\windows\system32\config\software

copy c:\windows\repair\sam c:\windows\system32\config\sam

copy c:\windows\repair\security c:\windows\system32\config\security

copy c:\windows\repair\default c:\windows\system32\config\default

6. Type exit to quit Recovery Console. Your computer will restart.

Note :- This procedure assumes that Windows XP is installed to the C:\Windows
folder. Make sure to change C:\Windows to the appropriate windows_folder if it
is a different location.

If you have access to another computer, to save time, you can copy the text in
step five, and then create a text file called "Regcopy1.txt" (for example). To
use this file, run the following command when you start in Recovery Console:                                                                                                                                                             

batch regcopy1.txt

With the batch command in Recovery Console, you can process all the commands in
a text file sequentially. When you use the batch command, you do not have to
manually type as many commands.

Part two

To complete the procedure described in this section, you must be logged on as an
administrator, or an administrative user (a user who has an account in the
Administrators group). If you are using Windows XP Home Edition, you can log on
as an administrative user. If you log on as an administrator, you must first
start Windows XP Home Edition in Safe mode. To start the Windows XP Home Edition
computer in Safe mode, follow these steps.

Note Print these instructions before you continue. You cannot view these
instructions after you restart the computer in Safe Mode. If you use the NTFS
file system, also print the instructions from Knowledge Base article KB309531.
Step 7 contains a reference to the article.

1. Click Start, click Shut Down (or click Turn Off Computer), click Restart, and
then click OK (or click Restart).

2. Press the F8 key.

On a computer that is configured to start to multiple operating systems, you can
press F8 when you see the Startup menu.

3. Use the arrow keys to select the appropriate Safe mode option, and then press

4. If you have a dual-boot or multiple-boot system, use the arrow keys to select
the installation that you want to access, and then press ENTER.

In part two, you copy the registry files from their backed up location by using
System Restore. This folder is not available in Recovery Console and is
generally not visible during typical usage. Before you start this procedure, you
must change several settings to make the folder visible:

1. Start Windows Explorer.

2. On the Tools menu, click Folder options.

3. Click the View tab.

4. Under Hidden files and folders, click to select Show hidden files and
folders, and then click to clear the Hide protected operating system files
(Recommended) check box.

5. Click Yes when the dialog box that confirms that you want to display these
files appears.

6. Double-click the drive where you installed Windows XP to display a list of
the folders. If is important to click the correct drive.

7. Open the System Volume Information folder. This folder is unavailable and
appears dimmed because it is set as a super-hidden folder.

Note This folder contains one or more _restore {GUID} folders such as

8. Open a folder that was not created at the current time. You may have to
click Details on the View menu to see when these folders were created. There may
be one or more folders starting with "RPx under this folder. These are restore

9. Open one of these folders to locate a Snapshot subfolder. The following path
is an example of a folder path to the Snapshot folder:

C:\System Volume

10. From the Snapshot folder, copy the following files to the C:\Windows\Tmp






11. Rename the files in the C:\Windows\Tmp folder as follows:






These files are the backed up registry files from System Restore. Because you
used the registry file that the Setup program created, this registry does not
know that these restore points exist and are available. A new folder is created
with a new GUID under System Volume Information and a restore point is created
that includes a copy of the registry files that were copied during part one.
Therefore, it is important not to use the most current folder, especially if the
time stamp on the folder is the same as the current time.

The current system configuration is not aware of the previous restore points.
You must have a previous copy of the registry from a previous restore point to
make the previous restore points available again.

The registry files that were copied to the Tmp folder in the C:\Windows folder
are moved to make sure that the files are available under Recovery Console. You
must use these files to replace the registry files currently in the
C:\Windows\System32\Config folder. By default, Recovery Console has limited
folder access and cannot copy files from the System Volume folder.

Part Three

In part three, you delete the existing registry files, and then copy the System
Restore Registry files to the C:\Windows\System32\Config folder:

1. Start Recovery Console.

2. At the command prompt, type the following lines, pressing ENTER after you
type each line:

del c:\windows\system32\config\sam

del c:\windows\system32\config\security

del c:\windows\system32\config\software

del c:\windows\system32\config\default

del c:\windows\system32\config\system

copy c:\windows\tmp\software c:\windows\system32\config\software

copy c:\windows\tmp\system c:\windows\system32\config\system

copy c:\windows\tmp\sam c:\windows\system32\config\sam

copy c:\windows\tmp\security c:\windows\system32\config\security

copy c:\windows\tmp\default c:\windows\system32\config\default

Note Some of these command lines may be wrapped for readability.

3. Type exit to quit Recovery Console. Your computer restarts.

Note This procedure assumes that Windows XP is installed to the C:\Windows
folder. Make sure to change C:\Windows to the appropriate windows_folder if it
is a different location.

If you have access to another computer, to save time, you can copy the text in
step two, and then create a text file called "Regcopy2.txt" (for example). To
use this file, run the following command when you start in Recovery Console:

batch regcopy2.txt

Part Four

1. Click Start, and then click All Programs.

2. Click Accessories, and then click System Tools.

3. Click System Restore, and then click Restore to a previous RestorePoint.




Nuke-proof USB Drive!

Posted by tech master  |  at  2:52 PM

Now, this is the height of military geekiness! A thumb-drive which could stand nuclear effects!

What you are seeing is the IronDrive, strong enough to withstand those tough conditions such as high temperature, shock, vibration, submersion, EMI and caustic agents. Boasting a bulky cigarette lighter like design, the IronDrive is an USB drive that has been designed tough as per the military standards and it could even withstand nuclear effects. It can operate effectively in temperatures as low as -40 F (-40 C) or as high as to +185 F (+85C). It weighs a mere 164 grams and the site says that it is cost effective.


Shutdown a Computer via MSN

Posted by tech master  |  at  12:26 PM

Well it's not really a virus of a hack because it doesn't damage anything. But that aside what it will do is shutdown the victim’s computer, this can be put in MSN convos so it is VERY fun to have, and it can also be put in emails and such like things.

1) Right click on desk top, and then go New, then Shortcut.

2) Then in the "type location of the item" you want to type:
%windir%\system32\shutdown.exe -s -t 120 -c "This is a virus"

You can change "this is a virus" to anything you would like that’s just the message that will appear.
The 120 you typed in can also be change at will, this is simply the amount of time they receive in till there computer will shutdown.
Once the code has been entered as you have seen above click next.

My advice would be to rename it something like.... wicked game, hardcore porn. Depends on the victim’s age and sex. But make sure you call it something good or the victim won't bother clicking on it.
After you have given it a name click on finish.
You should now have an icon on your desktop that is called "wicked game" or whatever name you gave it.
It is also advised you change the icon to something different.

3) Change name and icon.

4) Now to send it to some one you need to make a compressed file.
This can be done by right clicking on the desktop, New, Compressed file (zipped)
Then another folder should appear on your desktop click on this and drag your shutdown virus into the zipped folder.

5) Once your shutdown virus is in your compressed folder rename it.
Make sure to give it a similar name as to the file inside it like "Great Game.zip"
Don’t forget to add the .zip at the end.
WARING! Make sure when you rename the compressed folder to add .zip at the end it is very important.

Now feel free to send it to anyone.

As a safe guard I will tell you how to stop the shutdown count down. Just encase you ever click it your self LOL
Ok go to start, run, type cmd, then in cmd type: shutdown -a
That’s about it have fun guys.


Run Fedora 7 Inside Windows OS

Posted by tech master  |  at  3:31 PM

You dont need vmware workstation/player(which sometimes slow down ur system) to be installed in your system.
Although the following are required:
1. Qemu (an emulation software)
2. Fedora 7
First download the qemu emulator for windows and extract the content to any of your drive
Go to the folder where you extracted the emulator from the command prompt

Step1: Create an empty hard disk image virtually of any size using the command

qemu-img.exe create -f qcow fedora_7.img 8G

now that we have created a virtual hdd of 8GB in size

Step2: Insert your dvd

qemu.exe -L . -cdrom "\\.\I:" -hda fedora_7.img -m 256 -boot d

this will allow you to perform a normal installation of fedora os. Instead of I: you can specify your dvd drive letter and you can always increase or decrease the ram size allocated by changing the number256

Step3: If installation has finished, you can use installed OS

qemu -L . -hda fedora_7.img -m 256

Optional: Alternatively you can create a batch file for the last step to include the following lines

REM Start qemu on windows.

qemu -L . -hda fedora_7.img -m 256

save the file with any name and extension .BAT(something like Run_Fedora7.bat)
Create a shortcut on desktop to this file....so that when u click the link it will automatically run fedora-7 inside your windows operating system.


Mod your keyboard

Posted by tech master  |  at  12:48 PM

Disclaimer: This tutorial is presented for moding your keyboard and is adviced to perform this tut only if you are interested and wants to take the risk ! This is for the illustration purposes only. I (Tech&ME) can not be held responsible for damages resulting from anything that you may decide to do to your hardware. I also can not and will not be held responsible for injury to your self or others as a result of attempting to mod your keyboard or for others. (You can try this with your old hardware first)

So you still have those ugly green LED’s on that keyboard of yours? In this tut, I’ll show you how to hook up some new good looking LED’s to that keyboard to give your desktop a new look!

This is a very simple, yet very attractive mod which will cost you very very less.

Parts Required:

3 X - 3mm/5mm LED’s (Blue, Red, Green, UV)
Soldering Iron

(some keyboard have more than 3 led's so purchase according to your requirements)

Step 1: Flip the keyboard over and locate the screws. My keyboard had 10 screws, all in visible areas so locating the screws was not a problem. Take your screwdriver and start unscrewing all the screws one by one. Remember to keep all the screws in a safe place, and to separate the different sizes so that putting it back together won’t be a problem.

In the meanwhile plug in your soldering iron, and let it heat up.

Step 2: Once all the screws have been removed, take off the back plate and locate the PCB on the top left corner of the keyboard.
There will be a screw or two holding it down. Unscrew those screws and lift the PCB to reveal the LED’s and other components.

The LED’s will be mounted there. (remember not to touch the circuits and other parts of the PCB with your hands!)

Step 3: This is where your soldering iron and your soldering skills are put to the test (sort of!).

Turn over the PCB and de-solder the first LED. Make sure you do not place the iron on the PCB for long periods of time or else, the soldering iron will burn right through it!

Step 4 : Once that is done put in your LED’s.

Remember to put the long lead of the LED through the hole with the + sign! Do the same with the remaining LED’s.

Step 5: Screw the PCB back in place. Adjust the electronic pad (the rubber sheet & the drawn circuit sheet), so that it is aligned properly with respect to every key and also the PCB – Very Important step.

Step 6: Screw the back plate in place and connect your keyboard to PC and in on.

And that's when you start getting a new look from your desktop!

I hope you enjoyed this tutorial. And if you have done the moding or not please comment !

Your suggestions and comments are important to me so please post them here!

I do not take the full credit for this tuturial since many other people were also involved.


Setting Up your own file sharing service

Posted by tech master  |  at  12:46 PM

This tutorial will let you setup a 0$ file sharing server. Before on to this we need

1. Gmail Drive Extension (for upload)– This tool will virtually setup a drive that can be accessed from my computer and transfer files between computer & gmail account as attachments. We wont be using this utility to download files although its required to be installed to upload our files.
2. Gmail php script (for download)- this script sets up a web interface to allow anyone to download the files that we uploaded to our gmail account.

Now lets start
Install the extension first from here
Login on to your gmail account from explorer

We will be able to see all our files and folders as drive contents, copy & paste desired files/folders

Now that we had uploaded the files…it’s the time for us to share the stuffs we uploaded for outside.For the second phase of our setup, we need a site with support for php & curl extension. I recommend using oxyhostsfree.com again its up to personal preference.
Download the script ftp the contents that we just now extracted

open up config.php
Enter gmail id and password. We can also enter multiple ids & passwords if we wish to have our server to be more than 3 gb.

Upload the file and we are done.
open up the url and we will be able to see our files listed as tree format.

-Gmail’s speed and reliability that means files are safe and remains undeleted
-Virtually unlimited….we can setup as many account to multiple the storage
-Upload any file format
-20 MB file size limit-Be aware of gmail terms of service

What can be this used for?
-Document archive: Upload documents and research work
- Doc-blog. Daily notes uploaded as Doc files are kept there.
- MP3 Files share: MP3 musics could be uploaded there.
- Picture hosting: You can share your pictures.


Lock folder without any software

Posted by tech master  |  at  6:18 PM

I hope you will like this tutorial..!!
This is the best way of locking any folder. This tutorial is not mine, my friend told me this through email and i thought to share it with you all. I really don't know the source but it's very good.

Copy the following code

title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
echo Invalid password
goto end
md Locker
echo Locker created successfully
goto End

* Now paste it in notepad.
* Change the "type your password here" with your password (Marked as bold in the above posted matter).
* Save it as batch file(with extension .bat).Any name will do.
* Now you see a batch file. Double click it to create a folder locker.
* A new folder named Locker would be formed at the same location.
* Now brings all the files you want to hide in the locker folder.
* Now double click the batch file to lock the folder namely Locker.
* If you want to unlock your files,double click the batch file again and you would be prompted for password.Enter the password and enjoy access to the folder.


66 gadgets for vista sidebar

Posted by tech master  |  at  1:45 PM

HERE ARE SOME COOL GADGETS FOR VISTA SIDEBAR. They are wonderful. Just try them out.



Type a message in ur desired language( Indian language) using Microsoft word

Posted by tech master  |  at  1:39 PM

This is an eyecatching tweak for people who would like to have some Hindi text in their signatures or who would like to scrap wishes in hindi. If you wanna type a message in Telugu/Hindi or some other desired language.. Here is the way!! No third party software is needed. This is all stuff to do with Microsoft word.

Open Microsoft word and select Symbol in insert menu. Select font as Mangal and subset as Devanagiri. Here u find all the characters that are required to type any alphabet.

Suppose if you want to type "अपुन अच्छा लडका है" Insert the following symbols in the order. Neglect + and <> signs. I just placed it for seperation.

अ + प + ु+न <> अ + च + ्+ छ + ा + ल + ड + क + ा <> ह +

While typing the characters, you will observe the related characters merging themselves. After typing the required message, just copy and paste the characters wherever you want. Soon after u paste the message.. u may notice blank squares appearing instead of message (in Googletalk window for example).. Dont worry.. The tweak works after you save it/send it.

If u wanna have ur profile name of Orkut in Hindi... U can do the similar thing... Just type the text in microsoft word. Edit your profile and paste the text there... You can also send the messages in Google Talk or Yahoo IMs.

Similarly.. use Gautami font for Telugu and Tunga font for Kannada. You should download Unicode fonts for other languages to enable this feature...
There are editors available which will do the same work for you. But, for small messages, this is useful.


Tracing a Hacker

Posted by tech master  |  at  6:48 PM

Sometimes, it's just not enough to simply know that there's a Trojan or Virus onboard. Sometimes you need to know exactly why that file is onboard, how it got there - but most importantly, who put it there.

By enumerating the attacker in the same way that they have enumerated the victim, you will be able to see the bigger picture and establish what you're up against. But how can you do this? Read on...

## Connections make the world go round ##

The computer world, at any rate. Every single time you open up a website, send an email or upload your webpages into cyberspace, you are connecting to another machine in order to get the job done. This, of course, presents a major problem, because this simple act is what allows malicious users to target a machine in the first place.

# How do these people find their victim?

Well, first of all, they need to get hold of the victim's IP Address. Your IP (Internet Protocol) address reveals your point of entry to the Internet and can be used in many ways to cause your online activities many, many problems. It may not reveal you by name, but it may be uniquely identifiable and it represents your digital ID while you are online (especially so if you're on a fixed IP / DSL etc).
With an IP address, a Hacker can find out all sorts of weird and wonderful things about their victim (as well as causing all kinds of other trouble, the biggest two being Portnukes/Trojans and the dreaded DoS ((Denial of Service)) attack). Some Hackers like to collect IP Addresses like badges, and like to go back to old targets, messing them around every so often. An IP address is incredibly easy to obtain - until recently, many realtime chat applications (such as MSN) were goldmines of information. Your IP Address is contained as part of the Header Code on all emails that you send and webpages that you visit can store all kinds of information about you. A common trick is for the Hacker to go into a Chatroom, paste his supposed website address all over the place, and when the unsuspecting victim visits, everything about your computer from the operating system to the screen resolution can be logged...and, of course, the all important IP address. In addition, a simple network-wide port scan will reveal vulnerable target machines, and a war-dialler will scan thousands of lines for exposed modems that the hacker can exploit.
So now that you know some of the basic dangers, you're probably wondering how these people connect to a victim's machine?

## Virtual and Physical Ports ##

Everything that you recieve over the Internet comes as a result of other machines connecting to your computer's ports. You have two types; Physical are the holes in the back of your machine, but the important ones are Virtual. These allow transfer of data between your computer and the outside world, some with allocated functions, some without, but knowing how these work is the first step to discovering who is attacking you; you simply MUST have a basic knowledge of this, or you won't get much further.

# What the phrases TCP/UDP actually mean

TCP/IP stands for Transmission Control Protocol and Internet Protocol, a TCP/IP packet is a block of data which is compressed, then a header is put on it and it is sent to another computer (UDP stands for User Datagram Protocol). This is how ALL internet transfers occur, by sending packets. The header in a packet contains the IP address of the one who originally sent you it. Now, your computer comes with an excellent (and free) tool that allows you to see anything that is connected (or is attempting to connect) to you, although bear in mind that it offers no blocking protection; it simply tells you what is going on, and that tool is NETSTAT.

## Netstat: Your first line of defence ##

Netstat is a very fast and reliable method of seeing exactly who or what is connected (or connecting) to your computer. Open up DOS (Start/Programs/MS-DOS Prompt on most systems), and in the MSDOS Prompt, type:

netstat -a

(make sure you include the space inbetween the "t" and the "a").

If you're connected to the Internet when you do this, you should see something like:

Active Connections
Proto Local Address Foreign Address StateTCP macintosh: 20034 modem-123.tun.dialup.co.uk: 50505 ESTABLISHEDTCP macintosh: 80 proxy.webcache.eng.sq: 30101 TIME_WAITTCP macintosh MACINTOSH: 0 LISTENINGTCP macintosh MACINTOSH: 0 LISTENINGTCP macintosh MACINTOSH: 0 LISTENING

Now, "Proto(col)" simply means what kind of data transmission is taking place (TCP or UDP), "Local address" is your computer (and the number next to it tells you what port you're connected on), "Foreign Address" is the machine that is connected to you (and what port they're using), and finally "State" is simply whether or not a connection is actually established, or whether the machine in question is waiting for a transmission, or timing out etc.

Now, you need to know all of Netstat's various commands, so type:

netstat ?

You will get something like this:

Displays protocol statistics and current TCP/IP network connections.

NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval]
-a Displays all connections and listening ports.
-e Displays Ethernet statistics. This may be combined with the -s option.
-n Displays addresses and port numbers in numerical form.
-p proto Shows connections for the protocol specified by proto; proto may be TCP or UDP. If used with the -s option to display per-protocol statistics, proto may be TCP, UDP, or IP.
-r Displays the routing table.
-s Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the -p option may be used to specify a subset of the default.

Have a play around with the various options, but the most important use of these methods is when you combine them. The best command to use is

netstat -an

because this will list all connections in Numerical Form, which makes it a lot easier to trace malicious users....Hostnames can be a little confusing if you don't know what you're doing (although they're easily understandable, as we shall see later). Also, by doing this, you can also find out what your own IP address is, which is always useful.


netstat -b

will tell you what ports are open and what programs are connecting to the internet.

## Types of Port ##

It would be impossible to find out who was attacking you if computers could just access any old port to perform an important function; how could you tell a mail transfer from a Trojan Attack? Well, good news, because your regular, normal connections are assigned to low, commonly used ports, and in general, the higher the number used, the more you should be suspicious. Here are the three main types of port:

# Well Known Ports These run from 0 to 1023, and are bound to the common services that run on them (for example, mail runs on channel 25 tcp/udp, which is smtp (Simple Mail Transfer Protocol) so if you find one of these ports open (and you usually will), it's usually because of an essential function.

# Registered Ports These run on 1024 to 49151. Although not bound to a particular service, these are normally used by networking utilities like FTP software, Email client and so on, and they do this by opening on a random port within this range before communicating with the remote server, so don't panic (just be wary, perhaps) if you see any of these open, because they usually close automatically when the system that's running on them terminates (for example, type in a common website name in your browser with netstat open, and watch as it opens up a port at random to act as a buffer for the remote servers). Services like MSN Messenger and ICQ usually run on these Ports.

# Dynamic/Private Ports Ranging from 49152 to 65535, these things are rarely used except with certain programs, and even then not very often. This is indeed the usual range of the Trojan, so if you find any of these open, be very suspicious. So, just to recap:

Well Known Ports 0 to 1023 Commonly used, little danger.
Registered Ports 1024 to 49151 Not as common, just be careful.
Dynamic/Private Ports 49152 to 65535 Be extremely suspicious.

## The hunt is on ##

Now, it is essential that you know what you're looking for, and the most common way someone will attack your machine is with a Trojan. This is a program that is sent to you in an email, or attempts to bind itself to one of your ports, and when activated, it can give the user your passwords, access to your hard drive...they can even make your CD Tray pop open and shut. At the end of this Document, you will find a list of the most commonly used Trojans and the ports they operate on. For now, let's take another look at that first example of Netstat....

Active Connections
Proto Local Address Foreign Address StateTCP macintosh: 27374 modem-123.tun.dialup.co.uk: 50505 ESTABLISHEDTCP macintosh: 80 proxy.webcache.eng.sq: 30101 TIME_WAITTCP macintosh MACINTOSH: 0 LISTENINGTCP macintosh MACINTOSH: 0 LISTENINGTCP macintosh MACINTOSH: 0 LISTENING

Now, straight away, this should make more sense to you. Your computer is connected on two ports, 80 and 27374. Port 80 is used for http/www transmissions (ie for all intents and purposes, its how you connect to the net, although of course it's a lot more complicated than that). Port 27374, however, is distinctly suspicious; first of all, it is in the registered port range, and although other services (like MSN) use these, let's assume that you have nothing at all running like instant messengers, webpages etc....you're simply connected to the net through proxy. So, now this connection is looking even more troublesome, and when you realise that 27374 is a common port for Netbus (a potentially destructive Trojan), you can see that something is untoward here. So, what you would do is:

1) run Netstat , and use:

Netstat -a


Netstat -an

So you have both Hostnames AND IP addresses.

## Tracerouting ##

Having the attacker's IP is all well and good, but what can you do with it? The answer is, a lot more! It's not enough to have the address, you also need to know where the attacker's connections are coming from. You may have used automated tracerouting tools before, but do you jknow how they work?
Go back to MSDOS and type

tracert *type IP address/Hostname here*

Now, what happens is, the Traceroute will show you all the computers inbetween you and the target machine, including blockages, firewalls etc. More often than not, the hostname address listed before the final one will belong to the Hacker's ISP Company. It'll either say who the ISP is somewhere in there, or else you run a second trace on the new IP/hostname address to see who the ISP Company in question is. If the Hostname that you get back doesn't actually seem to mention an actual geographical location within its text, you may think all is lost. But fear not! Suppose you get a hostname such as


Well, that tells us nothing, right? Wrong....simply enter the hostname in your browser, and though many times you will get nothing back, sometimes it will resolve to an ISP, and from there you can easily find out its location and in what areas they operate. This at least gives you a firm geographical location to carry out your investigations in.

If you STILL have nothing, as a last resort you COULD try connecting to your target's ISP's port 13 by Telnet, which will tell you how many hours ahead or behind this ISP is of GMT, thus giving you a geographical trace based on the time mentioned (although bear in mind, the ISP may be doing something stupid like not having their clocks set correctly, giving you a misleading trace. Similarly, a common tactic of Hackers is to deliberately have their computer's clock set to a totally wrong time, so as to throw you off the scent). Also, unless you know what you're doing, I wouldn't advise using Telnet (which is outside the parameters of this tutorial).

## Reverse DNS Query ##

This is probably the most effective way of running a trace on somebody. If ever you're in a chatroom and you see someone saying that they've "hacked into a satellite orbiting the Earth, and are taking pictures of your house right now", ignore them because that's just bad movie nonsense. THIS method is the way to go, with regard to finding out what country (even maybe what State/City etc) someone resides, although it's actually almost impossible to find an EXACT geographical location without actually breaking into your ISP's Head Office and running off with the safe.
To run an rDNS query, simply go back to MS-DOS and type


and hit return. Any active connections will resolve to hostnames rather than a numerical format


DNS stands for Domain Name Server. These are machines connected to the Internet whose job it is to keep track of the IP Addresses and Domain Names of other machines. When called upon, they take the ASCII Domain Name and convert it to the relevant numeric IP Address. A DNS search translates a hostname into an IP address....which is why we can enter "www.Hotmail.com" and get the website to come up, instead of having to actually remember Hotmail's IP address and enter that instead. Well, Reverse DNS, of course, translates the IP Address into a Hostname (ie - in letters and words instead of numbers, because sometimes the Hacker will employ various methods to stop Netstat from picking up a correct Hostname).
So, for example, is NOT a Hostname.
mail6.bol.net.au IS a Hostname.

Anyway, see the section at the end? (au) means the target lives in Australia. Most (if not all) hostnames end in a specific Country Code, thus narrowing down your search even further. If you know your target's Email Address (ie they foolishly sent you a hate mail, but were silly enough to use a valid email address) but nothing else, then you can use the Country codes to deduce where they're from as well. You can also deduce the IP address of the sender by looking at the emails header (a "hidden" line of code which contains information on the sender)...on Hotmail for example, go to Preferences, and select the "Full Header's Visible" option. Alternatively, you can run a "Finger" Trace on the email address, at:
Plus, some ISP's include their name in your Email Address with them too (ie Wanadoo, Supanet etc), and your Hacker may be using an email account that's been provided by a Website hosting company, meaning this would probably have the website host's name in the email address (ie Webspawners). So, you could use the information gleaned to maybe even hunt down their website (then you could run a website check as mentioned previously) or report abuse of that Website Provider's Email account (and thus, the Website that it goes with) to
If your Hacker happens to reside in the USA, go to:
for a complete list of US State abbreviatons.

## List of Ports commonly used by Trojans ##

Please note that this isn't a complete list by any means, but it will give you an idea of what to look out for in Netstat. Be aware that some of the lower Ports may well be running valid services.

UDP: 1349 Back Ofrice DLL
31337 BackOfrice 1.20
31338 DeepBO
54321 BackOfrice 2000

TCP: 21 Blade Runner, Doly Trojan, Fore, Invisible FTP, WebEx, WinCrash
23 Tiny Telnet Server
25 Antigen, Email Password Sender, Haebu Coceda, Shtrilitz Stealth, Terminator, WinPC, WinSpy, Kuang2 0.17A-0.30
31 Hackers Paradise
80 Executor
456 Hackers Paradise
555 Ini-Killer, Phase Zero, Stealth Spy
666 Satanz Backdoor
1001 Silencer, WebEx
1011 Doly Trojan
1170 Psyber Stream Server, Voice1234 Ultors Trojan
1243 SubSeven 1.0 - 1.8
1245 VooDoo Doll
1492 FTP99CMP
1600 Shivka-Burka
1807 SpySender
1981 Shockrave
1999 BackDoor 1.00-1.03
2001 Trojan Cow
2023 Ripper
2115 Bugs
2140 Deep Throat, The Invasor
2801 Phineas Phucker
3024 WinCrash
3129 Masters Paradise
3150 Deep Throat, The Invasor
3700 Portal of Doom
4092 WinCrash
4567 File Nail 1
4590 ICQTrojan
5000 Bubbel
5000 Sockets de Troie
5001 Sockets de Troie
5321 Firehotcker
5400 Blade Runner 0.80 Alpha
5401 Blade Runner 0.80 Alpha
5402 Blade Runner 0.80 Alpha
5400 Blade Runner
5401 Blade Runner
5402 Blade Runner
5569 Robo-Hack
5742 WinCrash
6670 DeepThroat
6771 DeepThroat
6969 GateCrasher, Priority
7000 Remote Grab
7300 NetMonitor
7301 NetMonitor
7306 NetMonitor
7307 NetMonitor
7308 NetMonitor
7789 ICKiller
8787 BackOfrice 2000
9872 Portal of Doom
9873 Portal of Doom
9874 Portal of Doom
9875 Portal of Doom
9989 iNi-Killer
10067 Portal of Doom
10167 Portal of Doom
10607 Coma 1.0.9
11000 Senna Spy
11223 Progenic trojan
12223 Hack´99 KeyLogger
12345 GabanBus, NetBus
12346 GabanBus, NetBus
12361 Whack-a-mole
12362 Whack-a-mole
16969 Priority
20001 Millennium
20034 NetBus 2.0, Beta-NetBus 2.01
21544 GirlFriend 1.0, Beta-1.35
22222 Prosiak
23456 Evil FTP, Ugly FTP
26274 Delta
30100 NetSphere 1.27a
30101 NetSphere 1.27a
30102 NetSphere 1.27a
31337 Back Orifice
31338 Back Orifice, DeepBO
31339 NetSpy DK
31666 BOWhack
33333 Prosiak
34324 BigGluck, TN40412 The Spy
40421 Masters Paradise
40422 Masters Paradise
40423 Masters Paradise
40426 Masters Paradise
47262 Delta
50505 Sockets de Troie
50766 Fore
53001 Remote Windows Shutdown
54321 SchoolBus .69-1.11
61466 Telecommando
65000 Devil

## Summary ##

I hope this tutorial is useful in showing you both how to secure yourself against unwanted connections, and also how to determine an attacker's identity. The Internet is by no means as anonymous as some people think it is, and although this is to the detriment of people's security online, this also works both ways....it IS possible to find and stop even the most determined of attackers, you just have to be patient and keep hunting for clues which will help you put an end to their exploits.



Test your Firewall

Posted by tech master  |  at  2:49 PM

Do you think Firewall which you use is the best or want to find out which is the best Firewall ? then Firewall Leak Test is for you.

Here you can test your Firewall using extensive series of test.
So hurry up and test your firewall.

I request to all my readers that after testing their firewall, please post a comment here that your Firewall passed or not with your Firewall name so that all my blog readers will come to know which Firewall is good and which is bad.


Rapidshare search tips

Posted by tech master  |  at  8:20 PM

Searching in rapidshare is easy.
If u want to search mpg or avi videos go to google and then type
mpg|avi site:rapidshare.com or mpg|avi site:rapidshare.de
If u want to get softwares go to google and type
software name site:rapidshare.com
For example if u want to search Prince of Persia game in rapidshare then goto google and enter game prince of persia site:rapidshare.com


How To Resize A Partition In Vista (EVEN IF Disk Management fails)

Posted by tech master  |  at  8:07 PM

You don't need to have 3rd Party Softwares to achieve resize partitions in Windows Vista. Simply follow these steps: Click Start > Rt Click on Computer > Select Manage
In the left pane, under Storage category, click on Disk Management Now select and rt click on the partition you wish to modify.

In the context menu, you will see options to Extend, Shrink or Delete the partition. Select the option you want. Sometimes one or more options may be grayed out and thus unavailable. It could be that such a step may be physically not possible.

Should you wish to continue, nevertheless, please first backup your important data should anything go wrong. You may have to use diskpart.exe ! Diskpart utility can do everything that the Disk Management console can do, and more! It’s invaluable for script writers or anyone who simply prefers working at a command prompt. For more information on it click KB300415...

Windows also includes a additional command-line tool for file, system and disk management, called Fsutil. This utility helps you to change the short name of a file, find files by SID's (Security Identifier) and perform other complex tasks.

Details with images at winvistaclub.


Two new vulnerabilities in MS Excel and symantec products

Posted by tech master  |  at  6:56 PM

The problem

1. A vulnerability has been reported in several editions of Microsoft Excel. It can be exploited to take control of a user's system. Memory could be corrupted and arbitrary code executed.

2. Various Symantec products, including Norton Antivirus 2006, Internet security 2005 and 2006, SystemWorks 2006, and Antispyware edition 2005 have vulnerabilities that can be exploited to compromise a user's system. They are caused due to errors in certain ActiveX controls under certain conditions.

What to Do

Microsoft has released patches for various editions of Excel. Find them at
Symantec Security response has released Bloodhound.Exploit.148 to detect and block attempts to exploit the aforementioned vulnerability. Get fix at http://tinyurl.com/4kwu


Touchscreen - All things you ever wanted to know about it

Posted by tech master  |  at  2:25 PM

Today everyone must be familiar of what a touchscreen is.
In simple words, a touchscreen is a screen which you can operate using your finger.

Today, we see touchscreens in mobiles, computers and many other devices and you all must be willing to know how touchscreen works.
Here i am going to tell you how a touchscreen works and about different types of touchscreens.

Components of touchscreen

A touchscreen consists of three major components. They are :-

1. Touch sensitive surface - It is a glass panel which is put over the viewable screen. Electric current or charge or ultrasonic waves are passed through it. When it is touched, there is a change in the current or charge or frequency of ultrasonic waves.

2. Controller - It can also be termed as CPU of touch screen. When touch sensitive surface is touched, the controller only records the change in the current or charge or frequency of ultrasonic waves and identifies the point where you have touched.

3. Software driver - Controller identifies the point of touch and then sends it to the machine in the form of signal. But the signal which is sent by the controller cannot be understand by the machine. Therefore the software driver converts the signal in to signal which is understandable by the machine and then the machine opens that thing which you have touched.

Different types of touchscreens

1. Resistive touchscreen - This type of touchscreen consists of two glass layers. One layer is coated with the conductive material and other is coated with the resistive material. Electric current is passed through the conductive material. When the pressure is applied on the screen, both the glass layers collide and change in current is recorded by the controller and it is sent to the machine by means of software driver. Resistive screens offer limited clarity na dcan be easily damaged by sharp objects.

2. Capacitive touchscreen - This type of touchscreen is consits of a glass panel coated with charge storing material. When the screen is touched, a small amount of charge is drawn to the point of contact which is registered by the controller and sent to the machine by means of software driver. They cannot be easily damaged and clarity is much better than resistive screens.

3. Acoustic touchscreen - In this type of touchscreen, ultrasonic waves are passed over the glass panel. When the screen is touched, change in frequency of ultrasonic waves is recorded by the controller and sent to machine by means of software driver.


Nokia 7900

Posted by tech master  |  at  7:01 PM

The Nokia design department has gone extreme with the introduction of their new 7900 - and its little brother, the 7500. The 7900 has jagged edges and cuts everywhere, which give it a unique look. The surface has been etched, and you should be able to choose from 49 different colours that can be used to light up the keypad. There's a whole gigabyte of space on this OLED screen to preview your dear photos on. Perks include wallpapers that change their appearance as time passes by, and with changes in battery and signal strength. The phone should be out by the final quarter of the year, with a rumoured price of around $550.


Opera Hacks

Posted by tech master  |  at  5:05 PM

1. Fighting Ads using Opera's Filter

Ads are everywhere on almost any site you visit. Firefox may have Adblock Plus, but Opera has its own ad blocking system in place. The file urlfilter.ini in
C:\Documents and settings\Your_username\Application Data\Opera\profile
(where C:\ is the drive in which Windows is installed) contains a list of sites to be blocked. Add site addresses and wildcards such as "*" (the star) to block sites. There are several such lists available on the Internet ready for download. One such good list can be found at www.fanboy.co.nz/adblock/. Just download the Opera list and copy the file to the given location or its contents to the file that already exists.

2. Modifiying Tab width range

Tabbed browsing is a boon, but the use of too many tabs in Opera causes the names to be cropped off. In Opera, you can set a limit to how small and how wide a tab can be allowed to be. Extract the skin.ini from skin.zip from
C:\Program Files\Opera\skin (where C:\ is the drive in which you have installed Opera)
Open skin.ini in Notrepad and modify these lines

Pagebar max button width =
Pagebar min button width =

to suitable values. If the lines aren't present, create them and then save the file.Add the edited file back to the skin's ZIP file. Restart Opera and select skin from Tools > Appearance.

3. Adding shortcuts to execute programs

Keyboard shortucuts can be used in Opera to quickly start programs to go to a particular site. The trick is to add shortucuts to the shortcut.ini file located at C:\Documents and settings\Your_username\Application Data\ Opera\Opera\profile\keyboard. Open it in Notepad. Creating shortcuts is done in manner similar to this:G, G="Execute program, "c:\WINDOWS\Notepad.exe"

Here, typing [ G] [ G] will start Notepad. In similar manner, the path of the program can be replaced with a site url, for example, ="Execute program, "www.myproblog.blogspot.com". Opera will load the site when you use the shortcuts.


Falcon Northwest DRX

Posted by tech master  |  at  5:19 PM

Now, most of us believe gaming isn't something you do on laptops. They're meant for general office work - Word, Excel, e-mail, etc.
Falcon Northwest is out to prove us wrong. The DRX has two 7950GTX cards in SLI, and the processor driving them is a Core 2 Duo X6800 @2.93 GHz. Shocked yet? The rest of the specs go thus: the 17-inch screen does a resolution of 1920 x 1200, something you normally find on 24-inch monitors. Three hard drives are provided - a 100 GB 7200 rpm for performance, and two 160 GB 5400 rpm ones for mass storage. A TV-Tuner and four speakers are built in as well. Surely all this must be really expensive - well over the $3000 mark? Actually, it's close to more than twice that: $7687.


Instant messengers tricks

Posted by tech master  |  at  4:51 PM

Yahoo messenger trick

If you ever think that someone is avoiding you by signing in as invisible. There is a way to find out whether a person is online or not.

You can find it by using Doodle IMvironment. Start an offline conversation with the contact and send them a dummy message. If they're actually online, this should open a conversation window on their machine.

Now, select the Doodle IMvironment from IMvironment > See All IMvironments > Yahoo Tools. If your contact is really offline, you'll see "Waiting for friend to load Doodle" for a really long time. If, however, your contact is online, the IMvironment should load in less than a minute and let you draw.

Google talk trick

1.Run google talk with multiple email addresses

To run google talk with multiple email addresses, first create one copy of google talk shortcut on your desktop - leave the original intact. Right click on this shortucut and select Properties. The Target text box will show you the path of the EXE for Google talk - something like

Change this to
"C:\ProgramFiles\Google\GoogleTalk\googletalk.exe" /nomutex

You're done. Now you can run google talk with multiple email addresses.

You can also run yahoo messenger with multiple email addresses. I have posted this trick - how to run yahoo messenger with multiple with multiple email addresses in my earlier posts. Click here to read it.

2. Formatting text in Google talk

To type in bold, enclose the text within asterisks (*hi* = hi), to type in italics, enclose the text within underscores (_hi_ = hi)


Get TUX onto your USB drive

Posted by tech master  |  at  7:08 PM

For the purpose of this workshop, we will use Damn Small Linux - It's the smallest distro for USB drives. You could also use distros like Puppy or SLAX.


1. A USB thumb drive, 256 MB or larger, with USB 2.0 recommended.
2. A PC that can boot from USB device.
3. The Damn Small Linux (DSL) Distro.
Click here to download it.
4. Syslinux V3.11.
Click here to download it.
Click here to download it.


Insert your drive into USB slot. Download and install the HP USB DISK STORAGE FORMAT TOOL, then run it. Use the following settings in the HP USB DISK STORAGE FORMAT TOOL dialog box:
1. Device: The name and capacity of your storage device
2. File system: FAT
3. Volume label: Name it as whatever you want
4. Confirm the Format by clicking YES.
5. Once the format is complete, you'll get a list with information about the file system, volume, etc. about your device. Click OK.

Extracting the neccessary files

Download and extract the DSL distro to the root of the USB device using WinZip or any other extraction software. Then download and extract all the files from syslinux-3.11.zip to a folder named Syslinux on your primary hard drive, that is, "X:\Syslinux", where X is the drive letter of your primary hard drive.

Open a command prompt ( Start > Run > cmd), type in "cd X:\Syslinux\win32" and press Enter. Then type in "syslinux.exe -f Y:"(where Y represents the drive letter of the USB device). Hit Enter. Close the command prompt.


Keep your USB device plugged in, and reboot your PC. Enter the BIOS and set the boot order with the USB device first. Save your changes and exit BIOS.
If all goes well you will be presented with DSL's boot screen. Press Enter to continue the boot process.


Cheat in games without cheat codes

Posted by tech master  |  at  3:47 PM

Sometimes we find that a game is very difficult. At that time we think to use cheat codes but then we realize that we don't know the cheat codes of the game. Then there is no option left for us other than to quit the game.

After reading this full article, you'll never find it difficult to cheat in a game.

To Cheat in games without cheat codes, we'll have to download a memory editor 'Artmoney'. There's a freeware and a pro version available for the download. Freeware version has limited features but it is sufficient for most of the games.

Here, as an example, i have used spider solitare.

1. Open spider solitare and set your eyes on something that you want to change. As and example, we'll use the score of 500, which you have initially in the game. Open Artmoney and click on 'select process' dropdown box, and select 'Spider Solitare'. Try to keep the game window visible in the background. Next, click Search and enter 500 in the box, under Type, select 'All (standard)'. Don't bother with the rest; click OK, and we move to next step.

2. All right, don't be discouraged by search results; these are simple from a search of the entire memory the game is using, which means all adresses in your memory that have a value of 500 are shown on the left-hand side.The trick is that only one of these results contains your score, and you have to find out which one. To do this, switch back to game and play a bit to change your score, and note down your new score. Inmy case it's 495. Now switch back to Artmoney; see that button called filter?Click on it, enter '495' in the text box, and click OK.
What this does is, it goes through all previous results and sees if any of the results have changed to new value, which is 495, and shows only the adresses that have been changed to 495 on the left side. Neat, isin't it? Keep sieving until the number of results in the left hand pane won't reduce, and then use the arrow in the middle to add those results for your editing pleasure.

3. All set aand finished, you have the score in your hands. You can basically do anything you want with it. God mode, literally!Go ahead and right-click on the value to the left and click Edit, enter '100', and press 'Enter'. Switch back to the game and check your score: your score in the game is now 100, and you can continue playing normally with the modified score. If you want your score to stay the same, you can 'Freeze' the score by clicking the checkbox at the far left in the right pane of your value. One thing to be noted is that the freeze function is not a real 'freeze' per se; it will only constantlyscan the value for changes, and if any, change them back top the value we stated for it. So if you are trying to get to achieve god mode, but something in the game takes down all 100 of your health in fraction, the 'death' function will trigger in an instant and you will die before the freeze function can change the value back to 100. So if you are stuck in a situationlike this, you're pretty much dead.

Cheating this way in most multiplayer games is out of question since the values are stored on the server. Even if you succeed, you will be easily detected and rightfully kicked or banned off the server.

Have some decency and don't even try using Artmoney in multiplayer games.


Get full control of others pc

Posted by tech master  |  at  1:56 PM

Follow the link below and download a program to hack others pc.

Click here to download

How it works :-

»kills firewall to insure good ftpying
»starts on startup and is hidden from user
»lowers windows security and stops all updates.
»the error msg shown is removed

How to use :-

»send this file to victim.
»after victim runs the file goto run>cmd>
»type telnet
where is the static ip of the host!!
»now it would prompt you to enter username and password
hit enter
»congrats you have entered into victim's pc!!
use basic dos commands to traverse within and run programs on his pc!!

compatible with :-

»all windows version except vista - vista doesn't support telnet
»all unix pcs!!

If you find that link is broken or if you are not able to download the file then please leave a comment here and i will try to solve the problem as soon as possible.


Get free rapidshare premium account

Posted by tech master  |  at  5:07 PM

While surfing, i begin out a fresh acceptable armpit which gives you chargeless rapidshare account.
To get your rapidshare annual you will aloof accept to accredit some bodies to accompany their armpit and they will accord you your rapidshare exceptional account.

When you will go to the armpit you will see two options, aboriginal is chargeless rapidshare exceptional annual for 1 month. To get a rapidshare exceptional annual for 1 ages you will accept to accomplish alone 5 referals.
Second advantage is chargeless rapidshare annual for 3 months. For this, you will accept to accomplish 12 referals.

To annals on the site, aboriginal you will accept to baddest which rapidshare exceptional annual you appetite - 1 ages or 3 months. Again afterwards alternative annal bottomward and access your email-id and countersign and again the allotment will continue.

Click actuality to get your chargeless rapidshare exceptional account


HTC Advantage

Posted by tech master  |  at  12:35 PM

The HTC Advantage X7500 mighht look like some sort of tiny laptop, but it's more than that. You get a practical, usable keyword and a 5-inch screen. It is powered by a 624 MHz processor with 128 MB RAM and 8 GB of space - quite a bit for a mobile device such as this. No fear of getting lost either - the HTC Advantage comes with an inbuilt GPS unit that uses TomTom Navigator 6. Bluetooth, Wi-Fi, and 3G are all implemented. There are two cameras - a 3MP still camera, and a standard VGA camera for video. The latest version, the X7501, comes with Windows Mobile 6 but without the second (video) camera. The price for the HTC Advantage X7501 is rumoured to be around $900.


Use mail function on hosts that disable it

Posted by tech master  |  at  3:09 PM

Alright, as most of you know a lot of sites has PHP in safemode for security reasons. Safemode doesn't regulate too many things and most scripts, CMS', forums can work with safemode. But for some other things it cripples it.

For instance the mail() function is not allowed to function unless using an SMTP server. But if you have created a custom script there is not real simple way to do this, there is no play SMTP parameter. You have to find an alternate way of doing it. After going through many scripts that do this I have finally found one that works with this host (don't know why others didn't work).

This script need no configuration and only requires you to change 3 things in your script to function. Ok so let's get started.

Step 1: Download
First you will need to download the script from here:
Click here to download

Step 2: Unzip & Upload
After you have it unzip the contents onto your computer and then upload "email.php" to your website.

Step 3: Configure
Now go into your script and add the following link to the top and also put "<" just before the code given below and place ">" just after the code given below.
? require_once("path to file/email.php"); ?

Changing path to file depending on where it is.

After that all you need to change in the script is:




That should be it and it should work now, try sending a test to yourself.


Multiple login in yahoo messenger Without Using any Software

Posted by tech master  |  at  3:33 PM

Using this trick you will be able to login with many yahoo id's at same time.

1. Go to Start ----> Run . Type regedit, then enter.
2. Navigate to HKEY_CURRENT_ USER --------> Software --->yahoo ----->pager---->Test
3. On the right page , right-click and choose new Dword value .
4. Rename it as Plural.
5. Double click and assign a decimal value of 1.

Its done!!

Now open yahoo messenger and login with any yahoo id. Then again click on yahoo messenger icon. You will see that another yahoo messenger opens in which you can login.

Before this tweak, you will open yahoo messenger and login with any yahoo id and again when you click on yahoo messenger icon to login with other yahoo id then other new messenger will not be opened, the same will again pop-up which you've opened before.


Add your own radio, guestbook, calendar, news, chat rooms etc and also find web 2.0 sites

Posted by tech master  |  at  1:18 PM

In this article i am writing about some cool websites.


It is the ultimate website for webmasters (especially personal site owners). It is very cool site. It gives you tons of options to give your site a unique look.
It provides many tools which you can integrate in your site. For example you can add guestbook, email forms, calendar, photo album and many many more things to your site.

This is not the end of Bravenet, it also provides free web hosting with databases, ftp account and email account. You can also buy domains or if you have one then you can transfer it to your hosting account provided by Bravenet.

It also provides many other resources.
It is impossible to tell every feature of it here. You just register and yourself see what it is.

2). Tornado stream

This site allows you create radio station of your own. You just have to register and then you can search their vast database of songs and add them to your radio. You can create as many radio stations as you want. And then you can also integrate them in your website or blog or myspace profile. Below i have added a sample radio which i have created.

3). Go2Web20.net

If you've heard about web 2.0 and are wondering where all web 2.0 sites are, this where you go. It is compilation of web 2.0 sites. The directory is laid visually, with each site's logo in a small rectangle. Hover over any rectangle and you get a tool-tip like popup that will show you further info about the site. Click on the site and more info is displayed in the bottom pane that slides up.


Create your own WAP site for mobiles

Posted by tech master  |  at  3:28 PM

Ever tried building WAP site for yourself? The best place to make those swanky little sites that load off mobile phones, of the type you've always wanted to make, is at Tagtag.com

Tagtag.com is the one-stop shop for all your WAP-site-building needs. An online, java-based WAP site builder can be accessed from the site.

Once you have created your account, you can browse through the 20,000-odd members' WAP sites hosted at Tagtag.com.

The WAP site maker is simple graphical interface, like the type you see when composing an email: it lets you change the background image and colours on the site.You can add hyperlinks and images, and make unlimited number of pages, too. Each WAP site alloted 1 MB of space, which should allow you to host approximately 30 full ringtones.

The site also offers a lot of free content-a collection of games, wallpapers, and ringtones-from its PC-based website.


The fastest internet connection on the planet

Posted by tech master  |  at  3:54 PM

Sigbritt Lothberg, a 75 year old granny in sweden, just got a 40 Gbps internet connection.

Its about 20,000 times faster than 2 Mbps, and 6 Lakh 40 Thousand times faster than a dial-up.

Interesting how such news spreads with such rapidity over the fibres, as it were... Lotherberg's home connection happens to be the fastest residential Internet connection on the planet.

Lotherberg can download a full-length dual-layer DVD in two seconds, or watch 1500 HDTV channels streamed simultaneously.

Let's see what Lotherberg might do with her connection, in increasing order of horror:
1. Download windows updates
2. Chat with relatives abroad
3. Play Yahoo! games with jovial granny-friends right in Sweden
4. Search for recipes online.


Make a USB drive a key to boot into XP

Posted by tech master  |  at  1:03 PM

The USB booting feature is usually found in most new motherboards. For older boards, a BIOS update is required.

For this task, a USB drive of capacity of at least 256MB is required.

Use the "USB Disk Storage Format Tool" from HP for formatting the USB drive. Choose the USB Drive to be formatted, and select "FAT" under "File System". Enter a name of less than 11 charactersfor Volume Label, and click Start to begin formatting. For a 1.1 USB port, this takes no more than a minute.

After having selected "Show hidden files and folders" and deactivating "Hide protected operating system files", navigate to the root directory on which the windows is located, usually C:\. Copy the boot.ini, ntdlr, and NTDETECT.COM files from that directory to the USB flash drive. Rename the "boot.ini" in C:\ to "boot.bak". Windows will now not be able to boot from the harddisk and the USB drive will be the key to unlocking the computer.

Now to check whether you USB drive works or not! Restart your computerand selectthe USB drive as the First Boot device in the BIOS. For this test, deactivate the "Quick boot" and "Show Full Screen Logo" options in order to be able to monitor any BIOS-reported activities. Also, the "USB Legacy Support" and USB 2.0 Controller" options need to be activated if available. Save your changes and exit the BIOS and restart.

If you encounter any problem booting then leave a comment here and i will try my best to help you.


Hide Themes, screensaver, Appearance, settings and also prevent changing of desktop wallpaper

Posted by tech master  |  at  3:55 PM

You can hide the themes, screensaver, appearance and settings in the "Display Properties" window using the Group Policy Editor.

To start it, go to Start > Run, type in "gpedit.msc" and press "OK".

Go to "User configuration" tab and then to "administrative templates". Then go to "Control Panel", and there select "Display".
Double click "Hide Appearance and Themes tab", then click the "Enable" radio button.Click Apply, then OK. Your "Appearance" tab will disappear from the display properties.

In the same way, you can select "Hide screen saver tab", and "hide settings tab" to hide screensaver and settings from the display properties. Similarly you also prevent changing of wallpaper.


Runescape Money Making Guide

Posted by tech master  |  at  3:31 PM

RuneScape is a massively multiplayer online role-playing game by British developer Jagex Limited, programmed in Java. With over 9 million active free players[1] and 850,000 paying members, RuneScape is one of the top online games in the world.[2] RuneScape offers both free and subscription content and is designed to be accessible from any location with an Internet connection and to run in an ordinary web browser without straining system resources.
RuneScape takes place in the imaginary realm of Gielinor, which is divided into the Kingdoms of Misthalin, Asgarnia, and Kandarin, the tropical island of Karamja, the Kharidian Desert, the Wilderness, and various other realms.[3] Players can travel throughout the realms utilising three methods: foot travel, vehicle assisted travel, and magical teleportation. Each region offers different types of monsters, materials, and quests to challenge players.
Players are shown on the screen as customizable avatars. They set their own goals and objectives, deciding which of the available activities to pursue. There is no linear path that must be followed. Players can engage in combat with other players or with monsters, complete quests, or increase their experience in any of the available skills.[4] Players can also interact with each other through trading, chatting, or playing combative or cooperative mini-games.

Click on the link below to download the book



Transform a CD-ROM Drive into a Car CD Player!

Posted by tech master  |  at  4:09 PM

How To Make The Adaptation

To be used as CD player, the CD-ROM drive doesn't need to be connected to the computer. This way, it is possible to easily transform a CD-ROM drive into a Car CD player. Sounds crazy? Not so. With this tutorial you will be able to have a CD player in your car without spending almost anything.

The CD-ROM drive to be use may be of any type, from the first models ("1x") until the most modern ones ("60x"). The only prerequisite is that the drive needs to have is an earphone plug and volume control. And practically all CD-ROM drives have that.

There are two great advantages in transforming a CD-ROM drive into a Car CD player. First, who will want to break your car window to take CD-ROM drive? And, secondly, since any type of CD-ROM drive can be used, you may take an old drive that is just dusting away in your house (for instance, a 2x drive from an old 386 computer), which brings the cost down to almost nothing.

To install a CD-ROM drive in the car, you will need a female power plug, to be used to fit into CD-ROM drive power plug (that plug can be cut from an old power supply) and a voltage regulating integrated circuit called 7805, that may be easily found at electronic parts stores. You will also have to buy a heat dissipator for the 7805 (sold at the same store).

The car battery is a 12 V one, but the CD-ROM drive needs two voltages to work: 12 V and 5 V. The 7805 circuit is able to convert a 12 V voltage into 5 V (its pin 1 is for the input, its pin 2 is the grounding, and its pin 3 is the 5 V exit). Figure 1 shows the plan for the connection. The grounding pin should be connected to the wires of the plug grounding and the negative pole of the car battery, what is done by simply connecting that pin to the metallic body of the car.

Figure 1: CD-ROM adaptor schematics.

All you have to do is to make the connections shown in the above schematics (don't forget to isolate all connections with insulating tape) and you are set: you will have a CD-ROM drive working as CD player in your car.
The audio output will be made using the earphone plug. To listen to a CD, you will have to use earphones. To have the sound come through the speakers of the car, you will have to buy an amplifier with RCA inputs and a stereo P2 (mini jack) x stereo RCA cable (the same type of cable used to connect Discman units to amplifiers). The stereo P2 plug (also known as mini jack), which is the one used for the earphones, should be fit at the earphone output of the CD-ROM drive, while the RCA plugs should be fit at the input of the amplifier. The volume control will be made using the volume control in the CD-ROM drive.
A last warning: in most CD-ROM drives, the reproduction button (play) and the advance button (skip) are on the same key. In other words, to skip a track, all you have to do is to press the play button.

Frequently Asked Questions

Can the CD-ROM drive in use as a car CD player reproduce MP3 files?
No. If not connected to a computer, the CD-ROM drive will only work to play audio CDs. Music CDs in the MP3 format are recorded in the CD-ROM format. To read it, the unit forcibly needs to be connected to a computer. MP3 songs are not played by the CD-ROM drive, but rather by the sound card of the computer, and the machine processor is responsible for transforming the MP3 format into an audio format. Car CD players that play MP3 have a dedicated processor capable of reading the CD-ROM format and of converting MP3 files into audio ones. Since the common CD-ROM drive doesn't have such processor, it can not play MP3 files.
Can the same adaptation be made so CDs may be played in a domestic sound system?
Yes. To do so, the sound system must have an auxiliary input channel. However, to prevent the sound from getting distorted, you will have to use the audio output at the back of the CD-ROM drive and nor the earphone output, as mentioned last week. To do this, you will have to take the audio output cable from the CD-ROM drive and solder two RCA plugs - a black or white one (left channel) and a red or yellow one (right channel) – at the end that should be connected to the sound card of the computer. If you don't know how to do that, contact an electronics technician. To feed the CD-ROM drive you may use a power source from an old PC. One important detail: AT power sources have an on-off switch, but the ATX ones don't. If you will use an ATX power source, you will have to make a pin-14 connection (green wire), from the main plug of the source to any black wire to turn it on.
Won't the CD oscillate too much?
That will depend on the unit used (its manufacturer and model). Of course you cannot expect a CD-ROM drive to have the same stability of a car CD player. Remember that our tip is to assemble a car CD player spending nothing (or almost nothing). If you used our tip it is because you are possibly not willing to buy a car CD player.
Why should the connection between the CD-ROM unit and the amplifier be made using the ear phone output and not the one at the back of the unit?
That is because car amplifiers don't usually have volume control. If you use the output at the back of the CD-ROM drive – which doesn't have volume control either – the sound from the amplifier will always be at its loudest. We believe that this is not convenient. If you should use the output at the back of the CD-ROM drive only if you are to connect it to a pre-amplifier, equalizer, mixer, or home sound system, since they have volume control.

Source: http://www.hardwaresecrets.com/article/71


What they says

Copyright © 2013 Techsense. WP Theme-junkie converted by BloggerTheme9
Blogger template. Proudly Powered by Blogger.| Distributed by Rocking Templates
back to top