Monday, May 31, 2010

ZoneAlarm Internet_Security_Suite_2009 Fix Full Version



Zone alarm is now blocking the keys so,Here's a fix i found.
Enter any license while your internet connection id OFF or disconnected, then do the following:

               (do not connect to the web until you've finished)

Make sure you unhide hidden folders.
Boot up in safe-mode

Windows XP goto:
C:\Windows\system32\zllictbl.dat
right click 'properties' attributes click on 'read only' (leave hidden as is) apply > ok > re-boot

Vista goto:
C:\Program Data\Check Point\Zone Alarm\zllictbl.dat
right click 'properties' attributes click on 'read only' (leave hidden as is) apply > ok > re-boot


It stops it from registering and checking the key online.
Mines been working fine for days now, license says 65532 days :)

Sunday, May 30, 2010

Free Download Memory Improve Master 6.1.2.277 Full Version

 
 


Memory Improve Master is an intellectualized and easy-to-use application designed to optimize and monitor system memory. It frees up and compresses system memory to make processes run faster and crash less often. Powerful features include the ability to view and monitor data of RAM memory, paging file usage and CPU usage in real time, set parameters RAM optimization, display running processes on you PC, etc.
Do you want to improve the performance of your PC? Try Memory Improve Master now!

Memory is important because it's what keeps your computer running quickly. When you have a lot of programs running, which may consume all your memory, and then your computer has to use your hard disk for memory. Because hard disks are almost a hundred times slower than memory, your computer slows to a crawl when it runs out of memory. It also often becomes unstable.


Key Features of Memory Improve Master:
» Graphical view of current system performance and resource usages
» Run in background and optimize memory periodically.
» An intelligent learning module added for improving PC's performance more strongly. (New feature added)
» Learn user's habit automatically by intelligent learning module.
» Free up memory immediately.
» Free memory with hotkey.
» Compress memory to reclaim more available space.
» Optimize performance of computer automatically.
» Tune up and speed up the system performance.
» Manage processes running on your computer.
» Wizard, Autorun, Hotkey, and so on...


Download From Here. 

Saturday, May 29, 2010

Data Center Recover v1.1 - Recover All Deleted Files

Data Center Recover v1.1


The program Data Recover-Center allows you to recover files deleted from the Recycle Bin in Windows operating systems or lost by formatting the disk, erased by a virus or a sudden breakdown of the computer or storage device.



The program uses the latest advances in the field of data search and analysis, which allows you to recover your images, documents, mail files, databases, audio, video and other files - most effectively. The utility is easy to use, does not require fine-tuning, can restore images on hard disks, floppy disks, zip drives, compact flash, smart media or any other removable storage devices. Data Recover-Center can work with FAT 12, FAT 16, FAT 32 and NTFS as well as with unknown
file systems.


Program features:

- Recovers deleted and corrupted files
- Recovers data from formatted media
- Recovers data from corrupted media
- Supports all formats of multimedia, archive and document files *
- Supports all formats of media used by digital devices
- Works with all digital devices and card readers
- Easy to use, intuitive wizard-driven interface
- Supports all modern Windows versions, including Windows® NT/2000/XP/2003/Vista/Seven
- and many more!

Thursday, May 27, 2010

Ashampoo Internet Accelerator 3.20 Full Version

Ashampoo Internet Accelerator 3.20



Instant Clickfix for Your Internet Connection! We all take the Internet for granted nowadays but what your computer has to do to allow you to surf is actually amazingly complicated. Windows has a long list of settings for tuning the performance of your Internet connection. That’s fine if you’re a computer expert, the rest of us will generally make things worse rather than better – if we can find all the well-hidden settings in the first place.
Ashampoo Internet Accelerator analyzes your computer and optimizes all the relevant settings with a single click. You don’t need to know anything, just select the automatic optimizer and you’re done. The new version also includes an Internet connection speed test tool so you can test your performance directly. In addition to automatic optimization advanced users can still access all the individual settings and adjust them manually.

• Easier to use, plus new tools and settings:
We’ve redesigned the layout, making the program even easier to use. Everything is explained directly, you’ll probably never have to refer to the help. In addition to this we’ve also added a set of new tools and features for managing your Internet connection.

• Boost and configure Internet Explorer and Firefox
Internet Explorer and Firefox are the two most popular browsers and you can now configure them and boost their performance right from internet Accelerator. In addition to performance-enhancing settings you also get direct access to a large number of useful browser settings, all in one place.



• Internet Cleaner tool
Your browser saves a record of everything you do and every page you visit. The new Internet Cleaner tool lets you quickly delete your complete surfing trail, with separate settings for Internet Explorer, Firefox and Opera.




• Hosts File Checker
Your computer’s "Hosts” file lists the location of known Internet sites and is always checked first for the address when you access a site. Spyware and other malicious programs can use it to redirect you to fake and dangerous sites – the new Hosts File Checker makes sure this isn’t happening.



• Interactive checking for key parameters
In addition to optimizing your access speed Internet Accelerator can also interactively check some advanced parameters on your live connection to work out the best settings. You don’t have to use this feature, but it’s there if you want it.



New features:
* Intuitive new layout – everything explains itself
* Boost and configure Internet Explorer and Firefox
* Internet Cleaner – quickly erase your surfing trail
* Hosts File Checker – stop spyware redirecting you
* Interactive auto-check for key Internet access settings

Nod32 keys Eset EAV and ESS valid till, 2 months

Username: EAV-26361452

Password: 34sa5875uh

Expiry Date: 09.07.2010


                                                                                                                   

Username: EAV-26357023
Password: rm6sn66u4d
Expiry Date: 09.07.2010


Username: EAV-26358848

Password: 2a3kdnx4tc

Expiry Date: 09.07.2010


Username: EAV-26358967

Password: 5fn4mc7brm

Expiry Date: 09.07.2010


Username: EAV-26359084

Password: hj2verfa8s
Expiry Date: 09.07.2010


Username: EAV-26360490

Password: ha6u222vc2

Expiry Date: 09.07.2010


Username: EAV-26361442

Password: 6t57thxpju

Expiry Date: 09.07.2010


Username: EAV-26361445

Password: j652h7k5mj

Expiry Date: 09.07.2010


Username: EAV-26361452

Password: 34sa5875uh

Expiry Date: 09.07.2010

Wondershare Privacy Protector 1.3.4.0 - Clean History Easily

Wondershare Privacy Protector 1.3.4.0



Wondershare Privacy Protector is a utility that can comprehensively clean histories produced by various programs in the system. Clearing these histories not only can boost system speed, but also can effectively prevent your privacy from being disclosed. Wondershare Privacy Protector can give you a cleaner and safer operating system!



Features:

Comprehensive Scan:
Wondershare Privacy Protector scans the histories of system programs, browsers and other various applications. Its comprehensive categories help you select, scan and clear histories with ease.

Safe Scan Results:
The scan engine of Wondershare Privacy Protector can intelligently screen scan targets and leave out results that may not affect Windows system files. We guarantee the safe history deletion.

Clear Results Display:
Wondershare Privacy Protector shows the results with detailed and clear classification. The result list tells you what those histories are, so that you can decide to keep or delete them with much confidence.

Cookies Management:
Wondershare Privacy Protector manages Internet Explorer cookies independently and makes it easy for users to keep the cookies they need.
Home Page - http://www.system-tools-software.com/privacy-protector/

Download From Here

Monday, May 24, 2010

How to hack youtube accounts

..............................................................................................................................................................
Learn how to hack a youtube account
Are you curious to "
hack youtube accountt" well then this post is just for you,Most people ask me to tell us the easiest way to hack youtube,so here is the most easy way to hack you account i.e. phishing

Today we will focus on the easiest way i.e Fake login page
A
Fake Login Page is a page that exactly resembles the original login page of sites like Yahoo,Gmailyoutube,friendster etc.However, these Fake login pages are created just for the purpose of stealing other’s passwords.




How to hack youtube account -using  Phishing attack




First of all download:Youtube fake login page
[image_thumb[2].png]
PROCEDURE:
1.once you have downloded youtube fake login page,now extract contents in a folder
2.In that ,find (CTRL+F) 'http://www.adnan.com.co.in' then change it to your destined URL but don't forget '\'.
Save it .
3.Open Fake page in wordpad
4.Now press ctrl+F and search for the term "action=" now change its value to pass.php i.e. action=pass.php
5.Create an id in www.110mb.com , because i know about that site quite well.

6.Then upload the contents into a directory

7.For that,after creating an id you should go to file manager and upload all these files.

8.Then just got to youtube.htm and try out whether its working .
After you type in the file , a password file named pass.txt will be created in the same directory.Then you can see what username and password you have entered.

comment here if you like and if link dead.
............................................................................................................ 

Download video from youtube with out any software

..............................................................................................................................................................

Here is the easiest way to download any video from Youtube.

While playing the video on youtube.com, Copy its location from the address bar like www.youtube.com/watch?v=sasad7657dms2

then add the word ‘ kick’ between www. and youtube.com/link…….

EXAMPLE: www.kickyoutube.com/watch?v=sasad7657dms2

That’s it, Download without any other software or going to any other site, as their are many but this method is the best one according to me. 
Enjoy.......................................................................................................................................

Friends I am Back

Hi friends!
My exams are finished.
                                                                                  
So, I will try my best to post some important articles on how to secure your email account and save it from hacking.
.......
....................................................................................................................................................

Wednesday, May 19, 2010

Monday, May 17, 2010

How to make an AutoRun File for USB drives

Creating a simple or complex autorun file for your thumbdrive.


You can also follow these instructions when making a CD. You just have to burn it on the cd.


When you plug a  USB drive in, you might be interested in making a program, or other things happen as soon as you plug in. The way you accomplish this is through the Autorun.inf file. The autorun.inf file is located in the root of the usb drive and tells Windows what to do automatically.
This autorun can be used to make good, or bad USB’s depending on what you like.

This tutorial covers:


Creating a USB Autorun.inf
Changing label\icon of thumbdrive
Making a new option appear in the autorun menu
Making programs automatically run when plugged in

So Read On...




Creating a USB Autorun.inf :



To create an autorun file, open Notepad and save ‘autorun.inf’’ (with quotes) and save it to the root of the drive. All it needs to have is in the first line;


[autorun]

Done!

Changing label\icon of thumbdrive:

Follow the steps in Creating a USB Autorun.inf. Before you save it, type this in in this order!

[autorun]

icon=myicon.ico


label=MyLabel


And save. Make sure the icon file is in the root of your drive.

Making a new option appear in the autorun menu:

Right, so make your autorun file and type this into Notepad:


[autorun]
icon=default
label=[yourlabelhere]

action=programname.exe
Open Program



Save it and exit. Once again, the program has to be in the root. Now, when you plug it in, the option should appear in the menu.

Making programs automatically run when the USB is plugged in:

Follow the same instructions,

[autorun]
Icon=default
label=YourLabelHere
open=programname.exe



And that’s it for this tutorial!

How To Test Your Security Against DDos(Friendly)



Ok so you want to test the security of your site against DDoS's.

TOOLS REQUIRED :


>>Port Scanner<<
>>rDos<<
(click on them to Download)


Step One: First we need to find the websites IP Adress. This is very easy todo.

Ok so say they URL is 
http://www.yoursite.com ok now that you have your URL open Up Cmd todo this press Start>Run>cmd Once you have CMD open you type ping http://www.yoursite.com press enter and you will get the ip of the website. (YOU MUST REMOVE HTTP:// AND ANY /'s).


EXAMPLE:







Step Two: Now we must test to see if port 80 is open (it usually is).

This is very easy todo to Ok open up the port scanner you downloaded.
Once in the port scanner type in your Victims ip that you got from step 1.
It will ask you to do a range scan or a full scan (SELECT REANGE SCAN!) It will ask for conformaition you have to use a capital Y or a capital N! Now enter 79 for lowest port and 81 for highest hit enter than hit cap Y.


[X] = Closed
[X] Vulnerable = Open


EXAMPLE:







Step Three:

The final and easiest step (IF PORT 80 IS CLOSED PICK A NEW SITE!)
If port 80 is open your on your way to crashing!!

Ok open Up rDos that you download.
Enter the ip that we got from step 1.
It will ask you for the port to attack use port 80 that is why we scaned to make sure 80 was open! If it is closed it will not work.
Hit enter.. *=Flooding -=Crashed Or didn't connect!


EXAMPLE:







The site won't be directly offline!!
it starts with ***********
be patiend.. after some time it will go like this: **********-----------

that means the site crashed.

Sunday, May 16, 2010

Remote Desktop Control 2.8.0.31 - Control Others PC's Easily

Remote Desktop Control 2.8.0.31



Remote Desktop Control 2.8.0.31 is considered to be a good-quality and helpful tool which displays the screen of another computer (via Internet or local area network) on your own screen. The program allows you to use your mouse and keyboard to control the other computer remotely. It means that you can work on a remote computer, as if you were sitting in front of it, regardless of distance between computers.

Remote Desktop Control is comfortable for any kind of user. Even a "newbie" will easily understand basic network software tasks. Gurus will find many powerful features, such as file transfer between computers or remote system shutdown. The main design consideration of Remote Desktop Control software is "as easy as possible for the user".


Download From Here

Friday, May 14, 2010

WebCruiser Enterprise Edition,Vulnerability Scanner




* Crawler(Site Directories And Files);

* Vulnerability Scanner(SQL Injection, Cross Site Scripting);
* POC(Proof of Concept): SQL Injection and Cross Site Scripting;
* GET/Post/Cookie Injection;
* SQL Server: PlainText/FieldEcho(Union)/Blind Injection;
* MySQL/Oracle/DB2/Access: FieldEcho(Union)/Blind Injection;
* Administration Entrance Search;
* Password Hash of SQL Server/MySQL/Oracle Administrator;
* Time Delay For Search Injection;
* Auto Get Cookie From Web Browser For Authentication;
* Multi-Thread;
* Adcanced:Proxy,Escape Filter;
* Report Output.


Username: WWW

Serial : 3E08-3C1B-CAFB-321F

Username:st0p.org

Serial :9EF6-CC8C-F068-B1D6

Bayram hediyesi.

http://rs348.rapidshare.com/files/382664449/WebCruiserEnt.rar


UserGuide


Download From Here

Friday, May 7, 2010

Ontrack EasyRecovery Professional v 6.21 retail Full






Ontrack EasyRecovery Professional v6.21

FOSI has released one great recovery Software. With this application you can recover your lost data, optimize your disks, and make your computer faster and safer…
Description: Ontrack EasyRecovery software products offer home users or businesses complete solutions for their data recovery, file repair and disk diagnostic needs.


Features:

* Complete solution for your data recovery needs
* Includes all capabilities plus advanced data recovery options and Data Advisor® diagnostic features
* General capabilities – data recovery, file repair, disk diagnostics
* For all operating systems – RawRecovery Module – support for over 485 specific file signatures.
* For Windows – AdvancedRecovery and additional Modules – capable of locating all directories and unlimited file types
* Repair options for Microsoft Outlook and Email files – Outlook (PST, OST), Outlook Express (DBX), Word (DOC), Excel (XLS), Access Database (MDB), PowerPoint (PPT) and Zip (ZIP)

DOWNLOAD

How To Speed Up Shut down Time

First go to run type  Regedit.
Navigate to HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control.
Click on the "Control" Folder.
Select "WaitToKillServiceTimeout"
Right click on it and select Modify.
Set it a value lower than 2000 (Mine is set to 200).

..................................................................................................................................................................... .....................................................
..................................................................................................................................................................... .....................................................
..................................................................................................................................................................... .....................................................
..................................................................................................................................................................... .....................................................
..................................................................................................................................................................... .....................................................
..................................................................................................................................................................... .....................................................