Tuesday 22 May 2012

HOW TO MOUNT NTFS DRIVE IN LINUX CENTOS6

If you want to take your ntfs drive in linux then download this file in following then done
  you just put the url in browser and here you go

http://www.mediafire.com/view/?uufd5onu95jhmmm

Sunday 29 April 2012

MAKE FREE INTERNATIONAL CALLS FROM PC TO PHONE



   

free call
Free Call From Pc To Any Mobile

First method :-
Hello Friends today I will show how to call pc to any other mobile its free
First of all you will go this site :-
www.evaphone.com
Evaphone provides internet telephone calls for free. This site offers free voip call solutions: free voip service lets you make pc-to-phone free international calls. All you need is a computer to start making free voip calls using internet to phone. Start enjoying the benefits of internet telephony right now!

Second method :-
You can go another site
Go to http://www.mobivox.com

Wednesday 11 April 2012

How to create Autorun virus file

How to create a Autorun.inf file ?


Its the most simple part of it.
1. To create an autorun file
2. Open Notepad and save ‘autorun.inf’’ (with quotes)
3. Save it to the root of the drive.
All it needs to have is in the first line
[autorun]
It was easy right :D

How To Changing Icon of Pendrive

PNG-usb-pendrive.png-256x256
1. To create an autorun file
2. Open Notepad and save ‘autorun.inf’’ (with quotes)
3. Save it to the root of the drive.
4. Then Type -

[autorun]
icon=myicon.ico
label=MyLabel

Save it and remember in the root directory

How To New Option Appear in the Autorun Menu


1. To create an autorun file
2. Open Notepad and save ‘autorun.inf’’ (with quotes)
3. Save it to the root of the drive.
4. Then Type -

[autorun]
icon=default
label=[yourlabelhere]
action=programname.exe
Save it and exit. Once again, the program has to be in the root. Now, when you plug it in, the option should appear in the menu.

How To Run Programs Automatically When USB is Plugged In


1. To Create an autorun file
2. Open Notepad and save ‘autorun.inf’’ (with quotes)
3. Save it to the root of the drive.
4. Then Type -

[autorun]
Icon=default
label=YourLabelHere
open=programname.exe


Well That's it, it was easy right, now take a look at this
USB-Flash-Drive-with-Hacked-Shape-UF208-Hell i need that pen drive that's awesome. just take a look at this anybody would think that its a useless damaged usb kit or something but its a pendrive :D search on google you would find it .

Wednesday 4 April 2012

HIDE YOUR IP ADDRESS

Hide IP Address – Real ways to hide your IP


Step 1-Determine your IP Address:
Every computer connected to the Internet has a unique identifier called an IP Address. On many networks, the IP Address of a computer is always the same. On other networks, a random IP Address is assigned each time a computer connects to the network. This is what we are referring to when we ask if you have a static or a dynamic IP Address. If a system uses dynamic addressing, the IP can change quite often. Look into REMOTE_ADDR row in THIS LINK to determing your current IP Address.
Step 2-Get Anonymous:
Method #1: Anonymizer
One can surf anonymously and easy with the help of a nice services called CGI/Web proxies. Simply type a URL you want to visit -- the Page does the job for you, selecting random CGI/Web proxy from a hundreds of available services, securing you from many potential dangers. When you follow a link on a page viewed via CGI proxy you get there via the this proxy again, so you don't have to type a new URL.
CGI/Web proxy has two more nice features. Firstly, there are WWW sites that are inaccessible from one place, but easily accessible from another. Once I was trying to load a page located in Australia for 20 minutes, all in vain. Using CGI/Web proxies immediately solved the problem. Secondly, there are certain sites that give you information depending on where you are "calling" from. Let's take an example. I was at Encyclopedia Britannica site, trying to check the price for their products. Clicking on Order Information button gave me the list of Britannica's dealers all over the world, no price info. Going to the same place via the Anonymizer led me to a different page, where I found the price list. As it turned out the local dealer's price for Encyclopedia Britannica CD was several times higher than the one at which it's sold in USA. Good savings!
Some CGI/Web proxies are able to encrypt URLs (uniform resource locator) in a way that these can be used as reference for a server. If a request with an encrypted URL occurs, they are able to decrypt the URL and forward it to the server, without enabling the user to get knowledge about the server address. All references in the servers response are again encrypted before the response is forwarded to the client.
Some CGI/Web proxies are able to use secure HTTPS protocol for exchanging data between proxy and your computer, even if original server is not secure. This option excluding possiblility to sniff a data flow between your computer and this proxy is very useful in some cases, for example, when you are forced to work in possibly scanned/sniffed insecure public network.
To get your personal CGI/Web/FTP proxy simply download free James Marshall CGIproxy script and install on your Web server (Apache as a rule, Perl or mod_perl support is required), Glype proxy is another CGI script written in PHP which allows webmasters to quickly and easily set up their own proxy sites or PHProxy. Our ProxySite Perl script allows to run your own Web proxy on any computer (Linux, Windows, ..) with only Perl interpreter installed.
Method #2: Proxy Servers
What is proxy?
  1. Proxy - a server setup designed to offer either firewall security or faster access to cached content normally accessible only through slower connections.
  2. Proxy server - is the software installed on some network server. The main purpose of this software is to relay traffic between two network hosts (client and server), sometimes this software does some data caching (usually this is performed by HTTP proxies). If your browser is configured to work through the proxy server then all your network traffic will go through that proxy server.
The main purposes of proxy servers:
  1. Transfer speed improvement (in case of caching proxies). You may use your ISP's proxy to access the internet - usually you have better connection to your ISP's proxy than to other hosts, if this proxy has the resource you requested from the internet you will get a copy of it from proxy (from its cache).
  2. Security and privacy (for HTTP). Anonymous proxies hide information about your computer in the request headers, so you can safely surf the net and your information will never be used in any way.
  3. LAN interconnection (or LAN to WAN connection). Sometimes you experience some problems while accessing the server located in the other network (for example in the internet).

There are 3 types of HTTP proxies:
  1. Fully anonymous (elite or high anonymous) proxies. Such proxies do not change request fields and look like real browser. You real IP is also hidden of course. People that administrating internet servers will think that you are not using any proxies.
  2. Anonymous proxies also do not show your real IP but change the request fields, so it is very easy to detect that proxy while log analyzing. Nothing really matters, but some server administrators restrict the proxy requests.
  3. Transparent proxies (not anonymous, simply HTTP) change the request fields, also they transfer real IP. Such proxies are not applicable for security and privacy while surfing on net. You can use them only for network speed improvement.
When Web Proxy Servers are Useful?
  1. Permitting and restricting client access to the Internet based on the client IP Address.
  2. Caching documents for internal documents. - Selectively controlling access to the Internet and subnets based on the submitted URL.
  3. Providing Internet access for companies using private networks.
  4. Converting data to HTML format so it is readable by a browser.
So you have download this tool and hide your ip address
Hide My IP download this tool click this link



How to ensure that the IP is hidden ?
Before you hide your IP you can check your real IP by visiting the following site.
http://whatismyipaddress.com/
Once you get your real IP, switch on your IP hiding software. Now once again visit the above site and check your IP address. If you see a new IP then this means that your software is doing the right job. Also the above site(Whatismyipaddress.com) is capable of detecting many proxies. If you see the words such as “suspected proxy server or network sharing device” or similar words then it means that the proxy you are using is not an Elite Proxy.
One Final Word before you leave! Even though Elite proxies are almost undetectable this doesn ’t mean that you can escape from online crimes by hiding your IP. There are many proxy detecting services available which detect almost any proxy. So if you involve in any cyber crimes then you will definitely be behind the bars. Using proxy will not help you in this case.
One More thing, it is unsafe to use proxy during e-commerce transactions such as Online banking, Online Credit Card payment etc. So please avoid proxies during these circumstances.

How to hide Drives using command prompt(cmd) in WINDOW7,XP,VISTA

If you have sensitive or important data stored on a particular disk drive that you don’t want anyone to see, a great way to hide it is to remove the drive letter assigned to a particular mounted volume. With Windows XP, you can achieve this easily using nothing more than the Command Prompt. Here's how:
  1. Click Start -> Run (This brings up the Run dialog box)
  2. Type cmd and press Enter (This brings up the Windows Command Prompt
  3. Type diskpart in the command prompt and press Enter (This launches the Diskpart utility within the Command Prompt window)
  4. Now type list volume (This displays a list of all mounted volumes on your computer and their associated drive letters)
  5. Using the above picture as reference, if, for example, you would like to hide drive R
  6. Type select volume 1 (or select any other volume as where the drive is present)
  7. Now type remove letter R (Note: This sometime requires a reboot)


Diskpart will now remove the drive letter.

The drive will no longer be available via Windows Explorer or My Computer.

Don’t worry though, your data remains safe!




Unhide


Now, should you want to unhide the drive and make it accessible again, just repeat the above process. But instead of typing remove letter R, type assign letter R

  1. Click Start -> Run (This brings up the Run dialog box)
  2. Type cmd and press Enter (This brings up the Windows Command Prompt
  3. Type diskpart in the command prompt and press Enter (This launches the Diskpart utility within the Command Prompt window)
  4. Now type list volume (This displays a list of all mounted volumes on your computer and their associated drive letters)
  5. Type select volume 1 (or select any other volume as where the drive was present)
  6. Now type assign letter R (Note: This sometime requires a reboot)
  7. The drive will be available via Windows Explorer or My Computer.

Tips for using social Networking

Social networking Web sites like MySpace, Facebook, Twitter, and Windows Live Spaces are services people can use to connect with others to share information like photos, videos, and personal messages.

As the popularity of these social sites grows, so do the risks of using them. Hackers, spammers, virus writers, identity thieves, and other criminals follow the traffic.

Read these tips to help protect yourself when you use social networks.

1.
Use caution when you click links
That you receive in messages from your friends on your social Web site. Treat links in messages on these sites as you would links in e-mail messages. (For more information, see Approach links in e-mail with caution.)
2.
Don't trust that a message is really from
who it says it's from. Hackers can break into accounts and send messages that look like they're from your friends, but aren't. If you suspect that a message is fraudulent, use an alternate method to contact your friend to find out. This includes invitations to join new social networks.
3..
To avoid giving away e-mail addresses of your friends, do not allow social networking services to scan your e-mail address book.
When you join a new social network, you might receive an offer to enter your e-mail address and password to find out who else is on the network. The site might use this information to send e-mail messages to everyone in your contact list or even everyone you've ever sent an e-mail message to with that e-mail address. Social networking sites should explain that they're going to do this, but some do not.
4..
Type the address of your social networking site directly into your browser or use your personal bookmarks.
If you click a link to your site through e-mail or another Web site, you might be entering your account name and password into a fake site where your personal information could be stolen.
5..
Be selective about who you accept as a friend on a social network.
Identity thieves might create fake profiles in order to get information from you. This is known as social engineering.
6..
Choose your social network carefully.
Evaluate the site that you plan to use and make sure you understand the privacy policy. Find out if the site monitors content that people post. You will be providing personal information to this Web site, so use the same criteria that you would to select a site where you enter your credit card.
7..
Assume what you write on a social networking site is permanent.
Even if you can delete your account, anyone on the Internet can easily print the information or save it to a computer.
8..
Be careful about installing extras on your site.
Many social networking sites allow you to download third-party applications that let you do more with your personal page. Criminals sometimes use these applications in order to steal your personal information. To download and use third-party applications safely, take the same safety precautions that you take with any other program or file you download from the Web. For more information, see Before you download files, help protect your computer.
9..
Think twice before you use social networking sites at work.
For more information, see Be careful with social networking sites, especially at work.
10..
Talk to your kids about social networking.
If you're a parent of children who use social networking sites, see How to help your kids use social Web sites more safely

Tuesday 3 April 2012

How to Hack any E-mail account .

1. You need Internet connection first.
2.Download  Family Key Logger updated version.
3. Install in your system..
To Download software click here...
http://www.mediafire.com/?ue0y8je80peqcru

Done ! you can check every single word typed in your computer...