Get most out of your affiliate links

Posted by tech master  |  at  3:18 PM

It is very necessary to hide affiliate links of your sites. A simple tool for this solution:

What is the need for hiding affiliate links?

Visitors are now more intelligent than before. Most of the visitors are looking for genuine contents from the site. Normally affiliate links are long links with name or untidy description. Visitors are familier with these links and so there is only 10% chance of gettling clicks and visits on your affiliate links.

How can you hide affiliate links?

There are several methods to hide your affiliate links. Many of them includes long coding or scripting which can affect your server's performance. Event coding is not that much effective. A simple way to hide your code is to just visit

Why CuteLink?

* Cutelink offers you money for using it. read more..
* Cutelink is simpple to use.
* You can pick your link's name. That make it easy to remember.
* Hides your long or affiliate links from your visitors completly.
* Logged members can even change link's title.
* and many more..

Features available for Registered members:

* Money for every visits on their cutelinks.
* Custom page title for each cutelink.
* Full control over ther cutelinks. They can edit, delete their links.
* Status of each cutelink's performance.


Earn for nothing

Posted by tech master  |  at  7:59 PM

I have found the most full proof way to get a regular income from your blog/blogs. Its not a massive income but it will be regular. I have just signed up for it and I have been very pleased with how easy it has been.

This site will allow for you to get paid £3 for every ad that you place on your website/blog. You can have up to five websites, with up to four ads on each site (one per page).

The company pair your subject matter to the advert and give you a choice of which ad to select.

They pay by paypal and for signing up you get a £3 bonus payment.

So its an easy way to make something for all your blogging efforts.



Avoid USB devices Virus / Worms

Posted by tech master  |  at  3:45 PM

USB Devices like i-pod,pen drives e.t.c; brings viruses/worms which are bad since it disables a lot of features as well as it ruins memory the slows down the whole thing. It disables much of the removal process like Windows RegEdit.exe, MsConfig.exe and also TaskMan.exe. Variations of these also disables your keyboard during normal booting, floods your disk with virus files in the root directory and also the windows directory and some also floods your directory with Folder looking icons that is an executable..

So heres my tip in avoiding this:

1. Always make all files visible like system and also hidden files with their extension shown.
Go to Windows Explorer > Tools > Folder Option > View
* Enable Show Hidden File
* Disable Hide Extensions for know file type
* Disable Hide Protected OS files

2. Never Use the Autorun functionality in Windows
whenever you put a disk(flash, memory card, usb drive devices and other form of removable drive) it is always a practice to scan it first. but to avoid being the first to be infected by a wild one, always use Windows Explorer to browse the files. Use the left side(Folder Window), to browse the files. Whenever you see an autorun.inf file, delete it! remove the disk and insert it again to avoid clicking it.
To disable autorun go to gpedit.msc >> computer config >> admin templates >> system >> turn off autoplay

3. Always update Virus database!


Crack any software - create your own crack

Posted by tech master  |  at  9:25 PM

Who has never wanted to learn how to unlock shareware programs without knowing exactly where to begin? Contrary to what might think, to unlock a program is not very precise knowledge. But the road is long and calm must prevail in the most unexpected moments. In face, a little knowledge of Assembler also help. The rest, is learning from practice.

Beginning of the START

If you want to learn how to unlock a program, we must learn to use the famous debuggers to analyse and unlock the codes of programmes. Of all out there, Hackman is the best because it is free, extremely efficient and has a rather suggestive name ... Programs such serve to monitor the operation of programs, check some potential bugs and also to hack software. Download Hackman at the Downloads of the page, install it and also download the program COBAIA.ZIP and extract it. He is a software test for you to experience the pleasure of breaking the limitation of an application.


The inner workings of a programme to register the software is basically the following procedure:


As we can see, the sequence of cases is relatively simple and has not changed much since the primórdio of time. Hence, we should bear in mind two things: 1) There will always be a place within the program where the password is stored, so be it explicit or implicit (encrypted), 2) There will always be within the program a COMPARISON between the code entered in Upon registration of the software with the original record of the program written in it.
Hence, there is not much secret to desvendarmos. Indeed, we need patience and cunning to run this program that both want and for which we do not have any crack, without having to spend a dollar of the original. Instead of waiting for someone to get the crack, we ourselves try to do so - although this is subject to another Hacker Space ...

In this issue we will do small exercises for the location of passwords within the programmes and also to the change of wording in the programmes most common (in part to serve for the translation of games and programs).


To start the game, turn the program COBAIA.EXE in your microwave. This program is nothing more than an example of simple application for registration. In a common situation, entering with the serial number indicated on the field and press the record button. Ready! From that moment, you become the latest user of the software in question. But as we do not know the password of the programme and not buy an original, all that remains to do is try to find some way of driblar, mislead or deceive the computer. Close the program, but still naum chore because not begin to enjoy some of hacker.

Start with the HACKMAN

Certainly the best friend in a contract of this size is a debugger or desassembler. These programs serve to analyse, test or simulate the operation of the programme together with the monitoring of the processor registers and other peripherals espetados in your microwave. This facilitates the test and location of errors in programs. Soon to open Hackman on your computer, you will see a screen similar to the FIGURE 1.

At that point the program still naum has no other open source software within its system and is waiting to open the program-victim.


From the menu bar of the HACKMAN, select FILE> OPEN> OPEN FILE COBAIA.EXE and open the program in its directory. Shortly after opening the program, the HACKMAN shows a screen similar to the FIGURE 2.

On this screen to the left, the codes are shown in the programme HEXADECIMAL debugado. To the right are the equivalents in ASCII code.
Be very carefully, because this first screen we can find clues of the code of destravamento. See that in the field of ASCII codes can identify a sentence in the midst of several blank spaces and other characters senseless.

The sentence in question is: "This program must be run under Win32."

To find this sentence, we can see how the structure of messages from the system. Note that the routine is used to print the character 0Dh to demarcate the end of a string. Now watching the screen and implementation of COBAIA.EXE can isolate some of the messages that the program displays and thus find parts of the code can be stored where the serial number of software.
List of screen record the words FIGURE 3.

appearing in the main bar of the program and "Geek Soft Corporation" to find them in the program. But why select precisely these words? Because within a programme, independent software development which has generated its code, usually all variables are allocated in the same region of code.

Assuming that the serial number is stored inside a variable within this region, costs nothing to give a bisbilhotada where these names appear to see if something naum next of these variables that may be sought as our code. In the menu of HACKMAN select EDIT> FIND and will appear in the Search box. But before entering the phrase for search, make sure you have selected the search in ASCII seek to prevent and find erroneous data. Make the search for the words above and see the result in FIGURE 4.

Try to play with data you found editing the fields. After you change the values of some variables, save the program using FILE> SAVE AS. Try again run the program. Trocamos the "Geek" from the phrase "GEEK SOFT Corporation" by the word "Hack" FIGURE 5

In theory, with that scheme, you can replace any word that appears within a program.
It is ridiculous, but this is a program hackeado. The problem is that naum there is some utility for what we have done. Change characters of a program is something simple to do. Hence, we will continue our search by serial number.

When the program is to register and enter numbers wrong, we received when the phrase "Senha_Errada" as a sign that naum had success in the attempt. According to the reasoning of checking numbers of series, we can say that the original code must be close to this routine. Hence, we seek a FIND and the phrase "Senha_Errada" in the program. To find the words, we see her next two words: Congratulations and GEEK13.

Analyzing the executable, it probably comes from a code that follows the logic below:

Code: if Field = 'GEEK13' then
/ / IF the variable Field is equal to GEEK13 SO
Status = 'Congratulations'
/ / The variable Status equals Congratulations
else / / SENÃO
Status: = 'Wrong Serial';
/ / The variable status is equal to Senha_Errada

Since we have two results (GEEK13 and Congratulations), we can by trial and error to know the correct password. Going beyond the programming and using common sense, One would imagine that "Congratulations" is the message displayed when you entered the correct password. Of course, this procedure is visible here and to Carla Perez would be able to unlock a program like this.

Hacking commercial software is a much greater challenge that we proposed. However, the commencement of any crackeamento is done using tools such as Hackman and other utilities Freeware, coupled with much training. What we did was state the path of stones. Venture to own account in the world hexadecimal codes and encrypted messages.


Turn any application portable and run from a USB drive or any data source

Posted by tech master  |  at  6:31 PM

We will use a software called Thinstall. Thinstall is an Application Virtualization Platform that enables complex software to be transformed into self-contained EXE files which can run instantly with zero installation from any data source. It creates a virtual operating system, a type of sandbox, around each “Thinstalled” application with it's own virtual registry and file system. Everything is good about Thinstall except it's price which is an outrageous $4,995.

But you can download it for free(FULL VERSION). Just follow the link below.


Let us create a portable version of MS Office 2003

Thinstall requires you to have a clean PC, one that has been freshly installed with Windows. Also the application that you are converting into a portable one shouldn't be already installed in the machine. But don't worry, it works equally well with an old Windows system. I had MS Office 2003 on my system but I had it removed prior to this process and it worked with any problem. However, it might not work with all application. In that case, you can carry the following operations on a virtual PC.

1. Install Thinstall and run Setup Capture (the application's main executable). Click Start.

2. Select drive C and the drive where you plan to install the application (in this case, MS Office). If you want to install MS Office in drive C itself, then select only drive C.

3. Click Pre-Install Scan and allow the program to complete scanning of the selected drives.

4. After it finishes scanning, install MS Office on your PC like you normally would.

5. After you have finished installing Office, click Post-Install Scan and again wait till it completes.

6. You will be now asked to select the executables that you wish to make portable. Select all the boxes from the list and click continue.

7. Finally you will asked to specify a path where you wish to store the files.

8. Now open the directory where the files were saved and run build.bat.

Thinstall will now create the portable files required and save them inside a folder named bin inside the same directory. Inside bin you will find the self contained exe files of MS Office. Copy this directory into your USB drive. Now you can run MS Office directly from the thumb drive.


Double you Laptop's Battery speed - Laptop Battery Doubler v1.2.1

Posted by tech master  |  at  4:34 PM

Battery Doubler: double your battery's autonomy.

Battery Doubler can double your battery's autonomy with little to no concessions.
Install Battery Doubler, unplug AC power and experience total laptop freedom!

* Double your autonomy
Before, your only solution to have a decent battery for your laptop was to buy an extra one.
Now, there's a lighter, more efficient, and cheaper alternative: Battery Doubler!
Because it doesn't use standard techniques (dim screen light, etc.), but finds out what to turns off what isn't needed, such as, for example, the USB ports, you can get up to twice autonomy without sacrifice comfort.

* Decrease recharge time
Your battery recharges much faster if your computer isn't turned on. That's a fact.
Let Battery Doubler redefine a few computer facts - with its Turbo Charge technology, increase up to 10% battery recharge speed when your computer is turned on.

* Recalibrate damaged batteries
After using your battery a lot without paying attention to discharge and recharge it fully every time, its performance becomes very low.
With Battery Doubler, simply run the recalibration wizard that does the entire job for you - automatically!

* Easy to use
From the configuration window to the battery status indicator, features, Battery Doubler excels at ease-of use.
Our interface fully respects Microsoft's guidelines and is very intuitive.
Because you don't always want to read a 300-pages manual before using a software, you will understand how to use Battery Doubler in no time.

* And much more
Battery Doubler features other great functions, such as telling you in hours:minutes your battery's autonomy!
It is impossible to list all of Battery Doubler's functions on a single webpage, so why don't you download it and find out how much better your laptop is with it?



Compress Your 1 GB file in Just 10 MB!!!

Posted by tech master  |  at  2:25 PM

Hey guys check out this Article I found off the net (I found it through google, i don't remember the site):

KGB Archiver is the compression tool with an unbelievably high compression rate. Unfortunately, in spite of its powerful compression rate, it has high hardware requirements (I
recommend processor with 1,5GHz clock and 256MB of RAM as an essential minimum). One of the advantages of KGB Archiver is also AES-256 encryption which is used to encrypt the archives. This is one of the strongest encryptions known for human.

New features in beta 2:

* Explorer shell extension
* Multilanguage support
* Up to 8% faster compression/decompression
* Now SFX archives run on any Windows or under WINE on Linux
* Lots of crashes fixed
* and more!


KGB even managed to zip up a Office 2007 iso into a 10 mb file last time when I used it.


Fool trojan virus, Keylogger

Posted by tech master  |  at  7:23 PM

These days Agents spy on you everywhere, in college, at work, maybe a trojan virus on your home PC which keylogs your paswords and mails it to someone else. If u think you are being logged, try this:

Whenever you have to type a password, never type the complete password in one go, ie, if your password is WINDOWS, you should type NDOW, then move cursor to start of the password field using the mouse ONLY, then type WI, then move cursor to end using the mouse and type S. This way the logger will record your keystrokes as ndowwis instead of WINDOWS.

Haha, keylogger fooled.


Convert youtube videos into audio

Posted by tech master  |  at  4:34 PM

1. Download the FLV file from YouTube. There are many methods to do this; but this is the easiest.

Go here:

Paste in your YouTube link, and download the FLV. You may have to rename the file to .FLV.

I'm going to use this link as an example.

2. Now you have the FLV file saved to your computer.

Now comes the fun part.

Download this program (40KB):

Run FLVExtract,uncheck the "Video" and "timecodes" box and drag your FLV file into it.

Your audio file is created.



Validate your copy of Windows XP for free - No download necessary

Posted by tech master  |  at  8:19 PM

I downloaded 2 softwares but found that this trick's a lot better!

*Open Notepad and paste the following

Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion]
"CurrentBuild"="1.511.1 () (Obsolete data - do not use)"

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WPAEvents]

* Now save the file as License Key.reg
(Note: The file name must contain the .reg extension
* Double click the file that you created. It will ask for confirmation.
* Click Yes... And you are done

* To see that it worked go to

and click on "Validate Windows"

Don't open Microsoft's site if ur Volume Serial No. is already blocked.
U can test it by installing Windows Media Player 11 / Internet Explorer 7


Get Vista's productivity features in XP

Posted by tech master  |  at  3:53 PM

Make your Windows XP look and perform like vista.

1. Taskbar Visual Tips

Visual tooltips are small visual previews of windows; they appear when you move
your mouse pointer over an item in the taskbar. Download it from here
Visual Tooltip.

Unzip the file and run VisualToolTip.exe. Now move the mouse pointer over the
taskbar and you'll be able to see previews of programs.

2. Getting the Vista Look

For custom themes to work on XP, you first need to patch the UXTHEME.DLL
file. If you'd like, you can download  an automated patcher from

. Run the patcher and cancel any warnings about Windows Files
being replaced. Reboot, and you'll be able to use custom themes. Copy the theme
files you download into C:\Windows\Resources\Themes. Double-click the
.theme file to preview the theme. In "Display" properties windows, click on
Apply to apply the theme. Sites like
have loads of themes.

3. Vista Start Menu

This is a little different from the one in XP: it has a search bar.
Vista Start Menu Emulator
is a
little application that brings Vista's Start Menu to XP. If you have a good
Vista theme installed, this Start Menu replacement will work as a great

4. Flipping Windows

Top Desk is
a neat little utility that allows you to get the effect Vista gives you when you
multitask between applications. After you install Top Desk, pressing [Windows
key] + [Tab] will show you a visual list of all running applications.

5. Using a Sidebar

Sidebars are a great way to have instant access to information such as
weather, RSS feeds etc all same time on your desktop.

The most famous has to be the
Google Desktop
Once installed, right-click on the icon in the
syatem tray and make sure you set it as a sidebar.

6. Performance boost

ReadyBoost is one of the Vista's performance boosting features.

For ReadyBoost, you can find a commercial software called
Once installed, reboot the computer. Start the program, and you can now add
a flash drive that youwant it to use. Enter the size of the cache file you want
to use.


Recovering password in XP

Posted by tech master  |  at  2:08 PM

Many times we forget our Windows password. Then we panic, call experts and finally we lose all important information saved in Windows. Now here is a way by which we can recover Windows password easily.

1. Place your Windows XP CD in your CD ROM and start your computer (it’s assumed here that your XP CD is bootable – as it should be - and that you have your BIOS set to boot from CD)

2. Keep your eye on the screen messages for booting to your CD typically; it will be “Press any key to boot from CD”

3. Once you get in, the first screen will indicate that Setup is inspecting your system and loading files.
4. When you get to the Welcome to Setup screen, press ENTER to Setup Windows now

5. The Licensing Agreement comes next - Press F8 to accept it.

6. The next screen is the Setup screen which gives you the option to do a Repair.
It should read something like “If one of the following Windows XP installations is damaged, Setup can try to repair it”

Use the up and down arrow keys to select your XP installation (if you only have one, it should already be selected) and press R to begin the Repair process.

7. Let the Repair run. Setup will now check your disks and then start copying files which can take several minutes.

8. Shortly after the Copying Files stage, you will be required to reboot. (This will happen automatically – you will see a progress bar stating “Your computer will reboot in 15 seconds”)

9. During the reboot, do not make the mistake of “pressing any key” to boot from the CD again! Setup will resume automatically with the standard billboard screens and you will notice Installing Windows is highlighted.

10. Keep your eye on the lower left hand side of the screen and when you see the Installing Devices progress bar, press SHIFT + F10. This is the security hole! A command console will now open up giving you the potential for wide access to your system.

11. At the prompt, type NUSRMGR.CPL and press Enter. Voila! You have just gained graphical access to your User Accounts in the Control Panel.

12. Now simply pick the account you need to change and remove or change your password as you prefer. If you want to log on without having to enter your new password, you can type control userpasswords2 at the prompt and choose to log on without being asked for password. After you’ve made your changes close the windows, exit the command box and continue on with the Repair (have your Product key handy).

13. Once the Repair is done, you will be able to log on with your new password (or without a password if you chose not to use one or if you chose not to be asked for a password). Your programs and personalized settings should remain intact.



What they says

Copyright © 2013 Techsense. WP Theme-junkie converted by BloggerTheme9
Blogger template. Proudly Powered by Blogger.| Distributed by Rocking Templates
back to top