Eat Pray Love Highly Compressed (English) (Under 200 MB)

Eat Pray Love Highly Compressed (English) (Under 200 MB)

Undefined Soul 11:03 PM Add Comment

Released : 8 October 2010

Genre : Drama | Romance

Starcast : Ryan Murphy,Hadi Subiyanto,Billy Crudup,Viola Davis

Desc : A married woman realizes how unhappy her marriage really is, and that her life needs to go in a different direction. After a painful divorce, she takes off on a round-the-world journey to “find herself”.

Duration : 2:15

Size : 161mb



Gmail Backup: doing security copies of your Gmail E–Mails easily

Undefined Soul 2:51 PM Add Comment
Gmail Backup is a useful tool that is good for doing security copies (backups) of our Gmail e – mail in our PC’s hard drive. This tool is able to be used in operative systems such as Windows, Mac and Linux, inclusively it can be ran from any terminal by using certain commands or a graphic interface. 


To be able to store our e – mail in the hard drive, the only thing we have to do is to change our Gmail’s settings and activate the IMAP access, which is some sort of port that can be opened according to the requirements of the account’s owner. To activate it we have to go to the options in the tools bar of our Gmail account and look in “Forwarding and POP / IMAP”, in this gap we go to the option that says “Enable IMAP”, we mark it and accept the changes. The files that are going to be stored in our hard drive will have a format known as EML; this format is the one used by e – mails and in which the text messages, as well as the enclosed files, are stored. But our program Gmail Backup will be able to translate it for us.

To install the program, for those who use Windows, it can be done from this link: http://home.zcu.cz/~honzas/gmb/gmail-backup-0.107.exe and this is the link for those who use Linux: http://home.zcu.cz/~honzas/gmb/gmail-backup-0.107-linux.zip. The package comes in a ZIP format and when we decompress it we will fin to files that need to be run, one is for the tool in text mode and the other one is for the version that comes in graphic interface. In any of the two ways, you have to complete a series of data about the e – mail account, as well as the password and other details. 


The graphic version of Gmail Backup is very easy to use, you only have to fulfill the gaps about the account, such as the e – mail, the password, the folder in which the mail is going to be stored and the dates, just by clicking in the backup butting, the program will automatically begin storing all of our e – mails. Something different is in the text mode, especially in Linux, because we have to introduce this reference command: “sh gmail-backup.sh backup directory user@gmail.com password”. Obviously, we have to change the parts in this command where it says “Directory” for the route in which we want to store our e – mail, the user for our user’s name, where it says password we have to write our actual password, at the end of this command we have to write down the date with this format YEAR / MONTH / DAY, this command is also valid for Windows users who are using the text mode, the only part that has to be removed are the initial letters “sh” for “Exe”, which is the extension of a file that can be ran. 


When running these commands, they will create a folder called STAMP in the directory in which you have made the settings for your e – mail to be stored. In this folder you will find the date in which you begin storing the e – mails and it will only gather new e – mails according to those which have not been downloaded yet.

This tool is still been developed, but it works in a very stable way in any of the three operative systems in which it might be ran

How To Recover Deleted Files In Windows

Undefined Soul 7:08 PM Add Comment

If you have deleted some of your important files accidently then the first thing you will do is panic.But I am going to teach you how you can recover your deleted files.Using this method you can recover files that have been

  • Deleted from the Recycle bin
  • The files which have been permanently deleted using SHIFT+DELETE key
  • Files deleted from your Memory Card

Before starting the tutorial for recovering the deleted files I will explain the basics of file deletion which will help you understand that how and why file recovery is possible.


How File Deletion Works

Whenever you move a file to recycle bin or permanently delete a file the file is actually not deleted from the hard-disk instead that file space is marked as free by the operating system so that new files can be written at that space.So, if no new file is written at that place then you can recover the file easily but if you have placed some data in that particular drive then it is possible that the data be written on the same location from where you have deleted your file.It will make the data recovery difficult or impossible.

Note:-Donot put any new data on the Drive from which you have to recover you data because it may hamper your data recovery chances.

This method works on windows platform and is completely free.
Now,Lets begin the step by step tutorial with screenshots on How To Recover Deleted Files In Windows



1.Download Recuva .It is a freeware utility.

Click Here To Download Recuva(3.7 MB)


2.Install Recuva and it will ask what sort of file you want to recover.Example pictures,movies.Now select the drive.


b5fnkw How To Recover Deleted Files In Windows


3.It will scan and show you all the files that have been deleted from that particular drive.


303lovn How To Recover Deleted Files In Windows


4.After completion of the drive is complete it will show two types of files.

  • Those with green icons can be recovered.
  • Those with red icons cannot be recovered easily.

5.Right click on the file to be recovered and select Recover Highlighted and your file will be recovered.


mj22d5 How To Recover Deleted Files In Windows

Beware Of Tab Napping: New Phishing Technique

Undefined Soul 6:46 PM Add Comment

What is Tab Napping?

Tab napping is new type of phishing scam that does not require you to click on any URL to redirect you to the phishing site instead it relies on the fact that a lot of people used tabbed browsing(Opening multiple tabs while browsing).In tab napping one of your inactive tab is automatically replaced by with a new tab without your knowledge.For example one of your inactive tab in which you have opened your bank’s website will be automatically replaced with the phishing site of your bank and you will be asked to enter your Username and password.You might think you have been signed out or never logged in but when you will enter the details again it will be sent to the hacker.


How To Detect And Protect Yourself From Tab Napping

Here are the simple and easy steps with which you can detect this new phishing technique “Tab Napping”.
  • Don’t open another tab when your are working with your banking site or any other secure business website instead open new windows using CTRL+N.
  • Always check the URL address of the website if you return from another tab.(Fake page will have different URL)
  • Check that the URL has secure address “https:// “ or a big green bar in front of the URL in address bar which certifies that it is secure and certified website.
  • If you find anything suspicious close the tab and type and open the website in new Tab.
Reset BIOS Password Without Removing the CMOS Battery

Reset BIOS Password Without Removing the CMOS Battery

Undefined Soul 11:52 PM 1 Comment

Almost everybody of you know how to Reset any computer's BIOS password.
Anyways if there are few who doesn't know then, basically what we have to do is, we just need to open the CPU, and just take out the CMOS BATTERY and put it back in, That will reset the BIOS Settings.

So, if you need to reset the password then what i have here is a utility, that can Clear, Save, Restore BIOS settings.
You can remove the passwords, if you want to save your bios settings, you can save it and later on can restore them.

    * Product name: CMOS De-Animator v2 (DE-CMOS2.EXE, 206kB)
    * Application version: 2.0
    * License: Freeware
    * Supported OSs: All Windows OSs except Win95 and NT 3.51


CMOS De-Animator v2

CMOS De-Animator v2 is a service utility for your system's CMOS RAM. Unlike its predecessor, the CMOS De-Animator 1.0, the new version includes a graphical interface and CMOS-backup options along with the "Clear CMOS" procedure, which was the original version's only purpose. So, you can now backup the main CMOS settings to a file, or restore them later. The application supports all 32-bit and 64-bit Windows operating systems except Windows 95 and Windows NT 3.51; for these old systems, you have to use De-Animator's previous version.

Like with De-Animator 1.0, one-time activated administrator privileges are required, if the application is ran for the first time in your system. CMOS De-Animator v2 now includes a self-test on its startup to check, whether the CMOS can be successfully accessed to. After successful execution with the status "Ready to go" visible, the application can be normally used even under non-privileged accounts on your machine (i.e. under an user account). This doesn't apply to Windows 98/ME, where the utility works instantly.

What's new in version 2.0:

- Simple graphical interface with three possible actions: clear, save or restore the CMOS RAM
- Test CMOS reading at the startup, as mentioned above.
- No need to download a separate version for 64-bit systems.
- Compared with De-Animator 1.0 x86, less false-alarm messages from some picky antivirus programs.

Download


MD5 hash: a7d448ae2a52c08e0dc364e717f64db7

India's Best Fake Hacker - Ankit Fadia , Claims without Proofs

Undefined Soul 6:16 PM 2 Comments
There are only few people in the hacking field who have never heard about Ankit Fadia ,then so called self declared  “India’s Best Ethical Hacker” ,There are lot of arguments and facts against him , Some people says  he is not a HACKER he is just a good businessman who knows how to make fool of the peoples . The thing that made him so much famous is only Media coverage nothing else. Now lets talk about Fadia's  claims and some facts about him.


At the age of 14 Ankit Fadia  started a website called “HackingTruths”, which he claims was judged as the “second best hacking site in the world by the FBI”. I don’t know when did FBI started rating hacking sites? it is because nothing such like this happened. It a world know truth FBI never ranks any website

Fadia  also claims that when he was 14, he trashed the front page of an Indian magazine's website. He then sent an e-mail to the editor confessing to the hack, suggesting counter measures. let me ask a question has he ever submitted any exploit? did he ever created tools for hacking ? the answer is N0, a big NO .

He is also claims to be involved in decrypting a message from an Al Qaeda operative. But when there is not a single published work of Ankit Fadia involvement about  cryptography or cryptanalysis then how the how he can decrypt any message and that too from AL QAEDA and Most intelligence agencies like NSA have expert cryptanalyst with PhD’s and super fast clusters to get their job done. They wont require a 16 year old.

He is also been reported to be working with CIA and FBI . yeah you heard it right CIA and FBI .I think Americans have shortage of hackers in their own country that’s why they are hiring such noobs.

"Fadia had claimed that his alert to a U.S. spy agency had prevented an attack by Pakistani hackers. However, he never divulged the name of the agency, citing security reasons."

In December 2009 Fadia’s business site, hackingmobilephones.com was hacked by a spammer promoting pharmaceutical products for erectile dysfunction. Fadia again "claimed it had happened because of a fault in the server that hosts his site. "The problem lies in the server and all the sites hosted by it have been infected." However all web servers give their customers an option to build their own security installing their own (customer’s) software and patches when they opt for private servers. Might be MR FADIA Did not have any excuse better then this one .

Recently in his commercial seminar he called Indian hacking groups as Indian cyber criminals.the angry hackers crew hacked and defaced his site. So now the question is the so called “INDIA’S BEST HACKER” cant he secure his site from other hackers?

Now lets talk about his courses and books :–

At 15, his book on Ethical Hacking made him the youngest author to be published by Macmillan India. he claims that his books are being “used as text books in computer security courses across South-East Asia”
lol what a joke.If you will ever read his books you will find that he has copied each and every single page from other best selling hacking books .and the harshest part of all he don’t even gives credits to the authors and other hackers , he simply steals their work.

His course ANKIT FADIA Certified Ethical Hacker (AFCEH) powered by reliance claims to make you an security expert in just “3 bloody months” . WOW what an opportunity for a newbie to become a hacker .
but the thing is the certificate given by him are not valid . Read this


The thing is no one can be a hacker or a good security expert in just 3 months. It takes a lot of time or I say it takes many years to become a HACKER.

In one of his seminars he said that Linux is CRAP and advised them to use windows for hacking purpose rather then Linux.

I haven’t seen any hacker saying Linux a crap and advising to use windows . and neither will a hacker say these words because he knows Linux the the mother of all hackers. there is no hacking without Linux possible in today’s world except social engineering .

1.) According to Wendy McAuliffe at ZDNet UK, Fadia's Hacking Truths website was judged "second best hacking site" by the Federal Bureau of Investigation, though no ranked list of "hacking sites" has been published by the FBI

2.) In 2000, Chennai Online reported that Fadia's consulting clients included several of the largest technology and financial services companies in the world. No other source corroborates that report; were it true, Fadia's client list would exceed that of many of the largest independent security consultancies. The same article reported Fadia's involvement in decrypting a message from an Al Qaeda operative; no other source corroborates that claim, nor does any of Fadia's published work involve cryptography or cryptanalysis.

3.) In April 2000, Rediff.com published an interview with Ankit Fadia. Anti-India Crew (AIC), a Pakistani hacker group noted for defacing Indian Government websites, rubbished the claims that Fadia had made in the interview. Fadia had claimed that his alert to a U.S. spy agency had prevented an attack by Pakistani hackers. However, he never divulged the name of the agency, citing security reasons. AIC and another Pakistani hacker group WFD defaced an Indian Government site, epfindia.gov.in, and "dedicated" it to Fadia in mock deference to his capabilities to hack or prevent hacking. AIC also said that it would be defacing the website of the Central Board of Excise and Customs (CBEC), www.cbec.gov.in, within two days and challenged Fadia to prevent the attack by patching the vulnerable website. AIC maintained that Fadia should stop calling himself a hacker, if it succeeded in hacking the CBEC website. AIC kept its promise and defaced the CBEC website after two days. At another defaced website (bhelhyd.co.in), AIC termed the claims of Indian media about Ankit Fadia as "Bullshit".

4.) He has been accused of copying materials from internet and paraphrasing into his own books and lectures. Recently, his claims have been proved false and he has been cited as fake person boastering in his own imaginations of fancy hacking for gaining cheap publicity.

5.) Fadia's earlier site, Ankitfadia.com, was attacked in 2003, by a cracker who self-identified as SkriptKiddie. Fadia explained that he was using a private web server for hosting his website and they were responsible for the lack of security. However, all web servers give their customers an option to build their own security installing their own (customer's) software and patches when they opt for private servers.

In December 2009 Fadia's business site, hackingmobilephones.com was hacked by a spammer promoting pharmaceutical products for erectile dysfunction. Fadia again "claimed it had happened because of a fault in the server that hosts his site." "The problem lies in the server and all the sites hosted by it have been infected.

Source : ICA and Wikipedia

Celebrating Dussehra 2010 in India

Undefined Soul 2:20 PM Add Comment
The tenth day of the Navaratri festival is known as Dussehra. It's devoted to celebrating the defeat of the demon king Ravana by Lord Rama.

When is Dussehra Celebrated:
Usually in late September/early October each year. In 2010, Dussehra is on October 17. The date of the festival is determined according to the lunar calendar.

Where is Dussehra Celebrated:

Dussehra is predominantly a northern Indian festival. Delhi and Varanasi are popular places to witness the celebrations.

Elsewhere in India, Dussehra festivities take place in the Kullu Valley of Himachal Pradesh, Mysore in Karnataka, and Kota in Rajasthan. Mysore Dussehra celebrations are particularly famous.

In West Bengal, Navaratri and Dussehra are celebrated as Durga Puja.

How is Dussehra Celebrated:

In northern India, plays and dance performances known as Ramaleela, depicting the life of Rama, commonly take place in the lead up to Dussehra day. These shows are especially big in Varanasi.
 Then on Dussehra, huge effigies of the demon Ravana are burned all over India.


In Mysore, as well as cultural performances and fairs, the highlight of the 10 day Dussehra celebration is grand parade of decorated elephants and guards mounted on horse back to escort the goddess through the city.
In Kullu, goddess deities are carried around on colorful chariots, and there is much dancing and revelry.

What Rituals are Perfrormed During Dussehra:
Dussehra is considered to be an auspicious time to worship tools used to earn an income. Nowadays, this includes laptops and cars! According to the legend in the epic Mahabharata, Arjuna hid his weapons in a tree and when he returned a year later, on the day of Dussehra, he safely retrieved them. He then worshiped the weapons, along with the tree.

 Source : About.Com

Cyber Crime Investigation Cells across India

Undefined Soul 8:53 PM Add Comment
Cyber Crime Investigation cell,Mumbai

Annex III, 1st floor, Office of the Commissioner of Police,
D.N.Road,Mumbai - 40001
Email: cybercell.mumbai@mahapolice.gov.in
Tel: +91 - 022 - 24691233

Cyber Crime investigation Cell works under the direct supervision and control of following superior officers 1.Mr. Himanshu Roy, Jt. Commissioner Of Police (Crime), Mumbai
◦(+91)-022-22620406◦(+91)-022- 22620557 (fax)

Mr. Deven Bharti, Addl.C.P(Crime) (+91)-022-22621220

Mr. B.K.Sonawane, D. C. P (preventive) C.B., C.I.D., Mumbai (+91)-022-22612090

Mr.Sanjay Jadhav, A.C.P. (Cyber Division), C.B., C.I.D., Mumbai (+91)-022-24691497, (+91)-022-26504008

Mr.Mukund Pawar , Inspector of Police, Cyber Crime Investigation Cell,C.B., C.I.D., Mumbai
(+91)-022-24691233 ◦Mr.R.B. Mane, API ◦Mr.S.Y. Mane, PSI

Delhi Police

Postal address-Superintendent of Police,
Cyber Crime Investigation Cell,
5th Floor, Block No.3, CGO Complex,
Lodhi Road, New Delhi – 110 003
Phone: 4362203, 4392424
e-mail- cbiccic@bol.net.in

Rest of Tamil Nadu,

Address: Cyber Crime Cell, CB, CID, Chennai
E-mail id: cbcyber@tn.nic.in
Bangalore (for whole of the Karnataka)
Address:Cyber Crime Police Station
C.O.D Headquarters,Carlton House,
# 1, Palace Road,Bangalore - 560 001
Contact Details:+91-80-2220 1026
+91-80-2294 3050 ,+91-80-2238 7611 (FAX)
Web site: http://www.cyberpolicebangalore.nic.in/
Email-id: ccps@blr.vsnl.net.in, ccps@kar.nic.in Hyderabad

Hyderabad

Cyber Crime Police Station
Crime Investigation Department,3rd Floor, D.G.P. office
Lakdikapool,Hyderabad – 500004
Contact Details:+91-40-2324 0663+91-40-2785 2274
+91-40-2329 7474 (Fax)
Web site:http://www.cidap.gov.in/cybercrimes.aspx
E-mail id: cidap@cidap.gov.in, info@cidap.gov.in

Thane Mumbai

3rd Floor, Police Commissioner Office
Near Court Naka,Thane West,Thane 400601.
Contact Details: +91-22-25424444
Web site: http://www.thanepolice.org/
E-Mail: police@thanepolice.org

Pune

Assistant Commissioner of Police Cyber Crime Investigation Cell
Police Commissioner Office of Pune 2, Sadhu Vaswani Road,
Camp,Pune 411001
Contact Details: 91-20-2612 7277 +91-20-2616 5396
+91-20-2612 8105 (Fax)
Website:
http://punepolice.com/crime branch.html
E-Mail: punepolice@vsnl.com

Gujarat

DIG, CID, Crime and Railways
Fifth Floor ,Police Bhavan
Sector 18, Gandhinagar 382 018
Contact Details:+91-79-2325 4384+91-79-2325 3917 (Fax)

CWG Official Website Attacked by Pakistani & China Hackers

Undefined Soul 8:31 PM Add Comment


CWG Official Website Attacked by Pakistani & China Hackers

The audience at the Jawaharlal Nehru Stadium might have given a rousing welcome to the Pakistani contingent during the opening ceremony,but state-supported hackers in Pakistan and China were hard at work trying to deface official sites and disrupt data networks.

Experts from the department of information and technology had to keep a sharp vigil to prevent the hackers from either crashing sites or putting up demeaning messages intending to show India in poor light.The effort to foil the hackers intent on embarrassing India was no less intensive than on-ground security.

The attacks were traced to servers in Pakistan and China and while the hackers were purported to be individuals or non-state actors,the deniability for their sponsors was thin.The exercise is suspected to have been monitored by official agencies in both countries with the searchnet worm being the preferred weapon of attack.The attacks launched from China were the handiwork of students studying in technical institutes who are encouraged to take a go at targets identified by official agencies.Some of these universities are in close proximity to military establishments specializing in technical and IT-based offensive systems.

There were hundreds of attacks on the CWGs official website which were intended to put up insulting messages while the more serious attempts were aimed at data management systems.

Within a couple of hours of the opening ceremony of the mega event on October 3,hackers mostly traced to servers in China attacked the Games website,www.cwgdelhi 2010.org,forcing cyber security agencies to pay more attention to cyber security.

Though the cyber attackers have been traced to Pakistan as well,most of the hackers servers were found to be located in China, said a top government official.

SOURCE: TIMES OF INDIA
Crook The Movie Highly Compressed (Under 200 MB)

Crook The Movie Highly Compressed (Under 200 MB)

Undefined Soul 8:08 PM Add Comment
Released : Oct 8, 2010

Genre : Action, Thriller 

Starcast :Emraan Hashmi, Neha Sharma

Desc : Jai has a knack of getting into trouble. His Father was a gangster who wanted to reform. On assurance from his friend, Inspector Joseph, Jai’s father agrees to rat on his evil bosses. Inspector Joseph guarantees him that he would find Jai’s father and Jai a safe passage into the world of good once his bosses have been exposed. But the unexpected happens. Jai witnesses the fatal double cross on his father, despite his confession, by a senior police officer. Joseph’s valiant effort to save him goes in vain. This traumatic incident leaves a lasting impression on Jai’s mind that there is no point in being good and that Its Good to be Bad. 

Duration : 2:01

Size : 145mb


Viruses for Symbian OS and S60 - THE TRUTH

Viruses for Symbian OS and S60 - THE TRUTH

Undefined Soul 10:59 PM 1 Comment
Don't be panicked by media hype about viruses targetting Symbian OS smartphones!






Fact: there are NO viruses for any Symbian OS 9 smartphone - the OS makes access to dangerous 'propagating' functions restricted to proper 'signed' (checked) applications. So you if you own a S60 3rd Edition or UIQ 3-based smartphone you can stop worrying permanently.


Fact: no-one can pass a virus to your Symbian/S60/UIQ smartphone over Bluetooth or MMS without your knowledge.


Fact: the Symbian (pre-OS 9, pre-S60 3rd Edition) 'viruses' you read about aren't really in the wild, in the same way that Windows viruses are. Most Symbian malware has been created as 'concept' software and sent straight to an anti-virus vendor (who naturally make a pretty penny out of advising people that they need a-v utility software). Because it's realistically impossible for these apps to spread in most sensible societies, you simply will not come across them in the real world unless you happen to hang around with teenagers with older handsets bent on trying all the latest trojan-infested 'warez' (see below).



Fact: it's impossible for any piece of malicious software to make your smartphone unusable. Even if you allow a piece of 'malware' (i.e. a malicious program) onto your unit, it can't touch the OS and applications in ROM, which means you can always do a hard reset (typing in ‘*#7370#’ works with most Series 60 smartphones, 'Dial'+'*'+'3' while powering on for newer ones, procedures for UIQ and Series 80 units are in the manual) to get back to a working system.



Fact: the biggest hazard in the Symbian world is the 'warez' scene, where unscrupulous people 'crack' commercial software and then put it up for free download. Quite apart from the ethical considerations about putting genuine Symbian authors out of business, these cracked versions are the perfect opportunity for a malicious cracker to insert routines designed to cripple your phone or scramble your data.
You can stay clear of such malware by downloading your Symbian OS third party software from recognised software sites and staying clear of warez. This isn't just me quoting a party line here - this is simply practising safe computing. Only download from trusted sources.


A CHALLENGE FOR VIRUS WRITERS OR ANTI-VIRUS SCAREMONGERS
The deal: I'll stand in a room with you and all your infected toys. I'll have a old Series 60 smartphone, a UIQ device and a Series 80 smartphone, all set with Bluetooth to 'Discoverable'. I'll give you as long as you want to try and infect me in any way whatsoever, I'll even accept your SMS and MMS messages and generally communicate. If you succeed in infecting me, I'll hand over an obscene amount of money. No-one fancy the challenge? I thought not.
Symbian OS viruses - just keep your software legal and move on....
Footnote: in 4 years, no company has EVER take me up on the challenge....



You can keep your Symbian smartphone completely free of malware by following a few simple rules:
  1. Use an up to date (S60 3rd Edition, UIQ 3, etc) smartphone
  2. Don't accept unsolicited Bluetooth transmissions from other phones. Or trust applications tacked onto MMS messages ('e.g. Hey, try my new, kewl game!')
  3. To avoid mischevious 'trojans', don't install applications unless they are ones you've asked for or have downloaded from reputable software sites (Handango, AllAboutSymbian, My-Symbian, 3-Lib, etc.)

In most cases, it's quite safe to leave Bluetooth visibility as 'Shown to all'. If you do get bothered by too many unsolicited connection attempts, simply change the setting to 'Hidden'. Although given that the number of 'infected' older Series 60 phones worldwide is truly tiny, you really don't have to worry! You're 100 times more likely to be hit by lightning or to win the lottery...

(C) 2004 - 2008 Steve Litchfield


SOURCE : http://3lib.ukonline.co.uk/viruses.htm
Free Free Free : Laptop Skins , Mobile Skins , Ipod Skins , Wall Art , etc

Free Free Free : Laptop Skins , Mobile Skins , Ipod Skins , Wall Art , etc

Undefined Soul 2:51 PM 3 Comments
Here’s a Great Offer For you All to get some Exciting Goodies i.e Skins of Mobiles , Laptops , Ipods ,Wall Arts , etc that too for Free

More Over these Can be Personalized that is you can add your own images...

How to Avail this cool offer ?

Here are the Steps



Select Your Favorite Stuffs and Add them into CART .

When you are DONE ,

Press Checkout

In Gift Certificate Enter This Code N944PTRMXQ

And Guess What Your Final Amount Gets Reduce to ZERO

Enjoy Free Stuff

Get it Before it Ends

You can order N number of items you want, order any thing, and get them for free..
For testing purpose i ordered some items more than worth Rs 500.
And applied the code, and got the order processed for free..

here is the proof


Phishing The Phisher : A Counter Attack Tutorial

Undefined Soul 11:26 PM Add Comment
This post will explain you about phishing which came across me when I used to learn hacking related stuffs.In this post I will be explaining you mode of operation of phishing starting from scratch.Though phishing is old ,it poses as a great threat in the world wild wide web.For security it is needed to get into the source loop holes.So,lets start without wasting much time.

Definition

Phishing is simply the act of creating fake page of any legitimate web-service and host them on net in order to fool the user to get the passwords,credit card no.,social security no. etc

Requirements

1. Web browser (mozilla firefox, internet explorer)

2. text editor (ex: notepad ,kwrite)

3. Knowledge of basic HTML and some scripting languages like php,javascript etc.

4. web hosting resource

Mode of operation::

I will provide quite simple steps.

1.The source code of the target website is obtained by using in built function of web browsers .

Ex: For mozilla firefox page source code can be obtained by
option 1) by navigating to page source present in edit tab.
option 2) pressing ctrl+u 
option 3) right clicking and selecting view page source

2. All the source code is copied into an editor.

3. Now ,the action attribute of form element is searched .

• Form elements are elements that allow the user to enter information (like text fields of username ,password, textarea fields, drop-down menus, radio buttons, checkboxes, etc.) in a form.

When the user clicks on the "Submit" button, the content of the form is sent to the server. The form's action attribute defines the name of the file to send the content to. The file defined in the action attribute usually does something with the received input.

5.From the above explanation it is quite clear that by editing the action attribute we can send information (like user account information) .

6.As the last step ,manipulated web page is hosted in the web and victims are made to use them using some social engineering technique.

social engineering ::Social engineering is a collection of techniques used to motivate people into performing actions that will reveal confidential information.


1.As seen from user side ,when he clicks on the link given in the above mail he is driven to a web page exactly similar
to original site.

2.When user hits enter i.e submits after filling out the log in form ,the information entered is sent to the file specified by the attacker.

Remember the target site can be your online banking account site.

Prevention

1.Don't blindly believe any kind of mail without authenticity.
2.While logging in give a close look at the domain name
3.Change your passwords regularly.
4.Use some web-site advisory software (now a days comes with internet security softwares).
ex: Wot
5.Always be alert.

Download Unlimited from Rapidshare, Megaupload, Hotfile, Etc.

Undefined Soul 7:51 PM Add Comment
This method will help you downloading resumeable files from Rapidshare, Hotifle and all other website which do not provide resumeable downloads.
Follow the following steps.

1. Make an account in http://getpink.net/ (its free)
-> Confirm Your Email <-

2. Sign in to your account in getlink.net

3. Click on "Convert Links". Add your link which you want to download and click on "convert my links"
you will get another link.

4. Copy that link to address bar and hit enter.. and enjoy.. :)

For Example:

so you'll get a link like

This trick is not mine, credits goes to some VISHWAJIT
How to Increase Alexa Rank of your Website or Blog ?

How to Increase Alexa Rank of your Website or Blog ?

Undefined Soul 9:26 PM 1 Comment
Alexa rank is a measure of how much traffic your site gets when compared to other websites.But,the only problem with Alexa ranking is that, it only considers traffic from visitors who have installed Alexa toolbar onto their browser.Though many people do not care about Alexa, still it's nice to have good looking stats .Alexa ranking can come into play while selling websites.I used few things on this website and got results.In this post I'll be sharing those tips.


1. Alexa Sparky : The Alexa toolbar
Use Alexa Sparky addon onto your firefox brrowser.I'm sure you have open up website frequently.Whenever you visit your site it will be valid count.Eventually your ranking will also increase.You can ask your friends to install the add on and visit your site on regular basis.
Click Here for Alexa Sparky.

 

2. Alexa widget

You can add an Alexa widget to your site and this will increase your statistics for sure.

The widgets are of different types.They show your rank,back links,traffic analysis.

Click Here for Alexa widgets.



 

3.Update Site information

Update the information about your site on Alexa.

Click Here to update information.

These are the basic steps that will boost your Alexa rank .

TinEye : Reverse Image Search Engine

Undefined Soul 7:39 PM Add Comment

This is a image search engine launched on May 2008. 

TinEye is an innovative product from Idée Inc. that is not just an ordinary image search engine.Rather it has been developed to search duplicates of an image, its source on the Internet.

This search engine employs image identification technology rather than keywords,watermark or metadata to search image.As the name implies, it's search starts from an image.When an image is pointed (from local computer or image url) to it, the TinEye search engine creates a digital signature after processing.Then, it matches the result with the images already present in their database.

They can show cropped images,degraded images of the original images.This can be particularly useful for those who frequently come across ripped images, originally created by them.Otherwise,You may search name of a ravishing beauty by uploading her image.


Besides this, there is a
FireFox addon that lets you search any image on a website just by right clicking on it. 

 

HCL Career Development Centre Launches New Course MCITP 2008 (Windows Server 2008)

Undefined Soul 7:23 PM Add Comment
HCL takes students to the core of IT fundamentals and the most advanced cutting-edge technology. Its course modules are structured to give you the best of both worlds, academic and hands-on.

Whether you are a beginner or a working professional, HCL CDC can make a difference to your learning curve and thereby to your earning curve.


As Microsoft Released its most awaited Windows 2008 Server, HCL Career Development Centre has launched its new course MCITP 2008 (Microsoft Certified IT Professional).

HCL aims at making their students well versed with the new release of Windows 2008, so that they can get the best placements in the market.


MCITP candidates are IT professionals capable of deploying, building, designing, optimizing, and operating technologies for a particular job role. They make the design and technology decisions necessary to ensure successful technology implementation projects.

Earning a Microsoft Certification helps validate your proven experience and knowledge in using Microsoft products and solutions. Designed to be relevant in today’s rapidly changing IT marketplace, Microsoft Certifications help you utilize evolving technologies, fine-tune your troubleshooting skills, and improve your job satisfaction.

HCL is a proud associate of Microsoft, and also conducts Global Certifications.

If you want to enroll into MCITP 2008 Certification, Do not waste time, ENROLL YOURSELF NOW AND GET UPTO 20% Discount.


For More Information Contact,

Sahil Sabharwal - +91-9650430790

Ankit Anand - +91-9650486116


HCL CDC
Janakpuri Branch
New Delhi
India

250+ RAPIDSHARE PREMIUM LINK GENERATORS

Undefined Soul 6:15 PM Add Comment
Here is a list of 250+ Rapidshare premium link generators:

  1. http://rapidmaster.pl/
  2. http://www.rapidfile.us/
  3. http://www.rapidloader.info/
  4. http://www.rapitshare.info/
  5. http://www.rapidshare.co.in/
  6. http://www.nbe-media.com/download/index.php
  7. http://rapidpass.us.to/
  8. http://www.rapidrip.info/
  9. http://www.rsgenerator.net/
  10. http://www.rsfox.com/generator.php
  11. http://www.rapidunblock.com/
  12. http://www.techspaze.com/generator/
  13. http://www.hufk.com/rapidshare/
  14. http://warezfly.com/
  15. http://sxhost.info/
  16. http://www.hellorapid.com
  17. http://rapidsharepremiumfree.com/
  18. http://www.rapidsharegenerator.com/
  19. http://rapidlizard.com/
  20. http://www.rapidshare4ever.com/download.php
  21. http://www.rapidfile.us/index.php
  22. http://rs.bibu2u.com/index.php
  23. http://www.myfreers.com/download.php
  24. http://takeabreak.uni.cc
  25. http://rapidmon.com/rapid/
  26. http://wallpapertrade.co.cc/
  27. http://www.rapidshite.com/
  28. http://www.rapidhard.glt.pl
  29. http://www.rapidsharegenerator.com/
  30. http://www.xrapidshare.net/
  31. http://www.premiumrs.co.cc/
  32. http://1make.info/
  33. http://download-ddl.com/Rapidshare/
  34. http://rstiger.com/index.php
  35. http://yourrapidsolution.com/rapid/index.php
  36. http://rapihot.info/index.php
  37. http://www.yourdocket.com/
  38. http://www.premify.com/rapidshare/index.php
  39. http://www.hufk.com/rapidshare/
  40. http://www.premiumlinkgenerator.com/
  41. http://hubdownload.com/rapidshare/
  42. http://www.rapidhack.prv.pl/
  43. http://www.rsfox.com/generator.php
  44. http://2filehost.com/rapid/
  45. http://downloadrapidshare.org
  46. http://rapidsurfing.net
  47. http://www.directacc.com
  48. http://rapid-load.com/index.html
  49. http://www.multidl.com
  50. http://www.rapidshare4ever.com
  51. http://www.WaNtPrEmIuM.net
  52. http://rhost.cz
  53. http://rapidleech.info
  54. http://www.rapidshare.co.in/
  55. http://www.rapidloader.info/
  56. http://www.rapiddownloader.info/
  57. http://www.rapidfile.us/
  58. http://www.rapidunblock.com/
  59. http://www.viete.info
  60. http://megadl.info/2008/07/09/rapidshare-premium-link-downloader/
  61. http://rslinker.com/
  62. http://www.sneaktech.com 
  63. http://findr.org/home.php
  64. http://www.rapid4free.com/
  65. http://www.rapidsharegenerator.com/
  66. http://www.techspaze.com/
  67. http://www.rapidsharegenerator.com/
  68. http://multiddl.com/
  69. http://www.rapidunblock.com/
  70. http://www.dlvnn.com/
  71. http://www.rsfox.com/
  72. http://www.rapidgully.dr.ag/
  73. http://www.viete.info/
  74. http://gen.rapid2host.com/generator.php
  75. http://megadl.info/rs/
  76. http://www.rsgenerator.net
  77. http://www.riprapid.net/
  78. http://www.rapidsir.com/
  79. http://www.dlvnn.com/
  80. http://rapidshare.multidl.com/
  81. http://uploadground.com/
  82. http://hc-security.blogspot.com/
  83. http://yfhc.net/
  84. http://megadl.info/
  85. http://www.senditnow.org/
  86. http://www.rsgenerator.net/
  87. http://www.sneaktech.com 
  88. http://rapidsurfing.net/
  89. http://www.techspaze.com/
  90. http://weeload.info/
  91. http://www.rsgenerator.net/
  92. http://rapiddownloader.org
  93. http://premiumdl.com
  94. http://www.rapidsharepremium.org
  95. http://rapidshare-premium.com
  96. http://rapid-load.com
  97. http://rslink.ws
  98. http://rapidmirror.org
  99. http://www.senditnow.org/r/index.php
  100. http://rapidsharetools.net
  101. http://rsgratis.com
  102. http://rapid.gta-iv.org/
  103. http://www.rsgenerator.net
  104. http://www.NoPremium.org
  105. http://www.rsfox.com/
  106. http://www.rapidfile.us/
  107. http://www.rapidloader.info/
  108. http://www.rapitshare.info/
  109. http://www.rapidshare.co.in/
  110. http://www.nbe-media.com/download/index.php
  111. http://rapidpass.us.to/
  112. http://www.rapidrip.info/
  113. http://www.rsgenerator.net/
  114. http://www.rsfox.com/generator.php
  115. http://www.rapidunblock.com/
  116. http://www.techspaze.com/generator/
  117. http://www.hufk.com/rapidshare/
  118. http://warezfly.com/
  119. http://sxhost.info/
  120. http://www.hellorapid.com
  121. http://rapidsharepremiumfree.com/
  122. http://www.rapidsharegenerator.com/
  123. http://rapidlizard.com
  124. http://www.rapidshare4ever.com/download.php
  125. http://www.rapidfile.us/index.php
  126. http://rs.bibu2u.com/index.php
  127. http://www.myfreers.com/download.php
  128. http://takeabreak.uni.cc
  129. http://rapidmon.com/rapid/
  130. http://wallpapertrade.co.cc/
  131. http://www.rapidshite.com/
  132. http://www.rapidhard.glt.pl/
  133. http://www.rapidsharegenerator.com/
  134. http://www.xrapidshare.net/
  135. http://www.premiumrs.co.cc/
  136. http://1make.info/
  137. http://download-ddl.com/Rapidshare/
  138. http://rstiger.com/index.php
  139. http://yourrapidsolution.com/rapid/index.php
  140. http://rapihot.info/index.php
  141. http://www.yourdocket.com/
  142. http://www.premify.com/rapidshare/index.php
  143. http://www.hufk.com/rapidshare/
  144. http://www.premiumlinkgenerator.com/
  145. http://hubdownload.com/rapidshare/
  146. http://www.rapidhack.prv.pl/
  147. http://www.rsfox.com/generator.php
  148. http://2filehost.com/rapid/
  149. http://premiumfiles.net/
  150. http://downloadrapidshare.org
  151. http://rapidsurfing.net
  152. http://www.directacc.com
  153. http://rapid-load.com/index.html
  154. http://www.multidl.com
  155. http://www.rapidshare4ever.com
  156. http://www.WaNtPrEmIuM.net
  157. http://rhost.cz
  158. http://rapidleech.info
  159. http://www.rapidshare.co.in/
  160. http://www.rapidloader.info/
  161. http://www.rapiddownloader.info/
  162. http://www.rapidfile.us/
  163. http://www.rapidunblock.com/
  164. http://www.viete.info/
  165. http://megadl.info/2008/07/09/rapidshare-premium-link-downloader/
  166. http://rslinker.com/
  167. http://findr.org/home.php
  168. http://www.rapid4free.com/
  169. http://www.rapidsharegenerator.com/
  170. http://www.techspaze.com/
  171. http://www.rapidsharegenerator.com/
  172. http://multiddl.com/
  173. http://www.rapidunblock.com/
  174. http://www.dlvnn.com/
  175. http://www.rsfox.com/
  176. http://www.rapidgully.dr.ag/
  177. http://www.viete.info/
  178. http://gen.rapid2host.com/generator.php
  179. http://megadl.info/rs/
  180. http://www.rsgenerator.net
  181. http://www.riprapid.net/
  182. http://www.rapidsir.com/
  183. http://www.dlvnn.com/
  184. http://rapidshare.multidl.com/
  185. http://uploadground.com/
  186. http://hc-security.blogspot.com/
  187. http://yfhc.net/
  188. http://megadl.info/
  189. http://www.senditnow.org/
  190. http://www.rsgenerator.net/
  191. http://rapidsurfing.net/
  192. http://www.techspaze.com/
  193. http://weeload.info/
  194. http://www.rsgenerator.net/
  195. http://rapiddownloader.org
  196. http://premiumdl.com
  197. http://www.rapidsharepremium.org
  198. http://rapidshare-premium.com
  199. http://rapid-load.com
  200. http://rslink.ws
  201. http://rapidmirror.org
  202. http://www.senditnow.org/r/index.php
  203. http://rapidsharetools.net
  204. http://rsgratis.com
  205. http://rapid.gta-iv.org/
  206. http://www.rsgenerator.net
  207. http://www.NoPremium.org
  208. http://www.rsfox.com/
  209. http://www.rapidfile.us/
  210. http://www.rapidloader.info/
  211. http://www.rapitshare.info/
  212. http://www.rapidshare.co.in/
  213. http://www.nbe-media.com/download/index.php
  214. http://rapidpass.us.to/
  215. http://www.rapidrip.info/
  216. http://www.rsgenerator.net/
  217. http://www.rsfox.com/generator.php
  218. http://www.rapidunblock.com/
  219. http://www.techspaze.com/generator/
  220. http://www.hufk.com/rapidshare/
  221. http://warezfly.com/
  222. http://sxhost.info/
  223. http://www.hellorapid.com
  224. http://rapidsharepremiumfree.com/
  225. http://www.rapidsharegenerator.com/
  226. http://rapidlizard.com/
  227. http://www.rapidshare4ever.com/download.php
  228. http://www.rapidfile.us/index.php
  229. http://rs.bibu2u.com/index.php
  230. http://www.myfreers.com/download.php
  231. http://takeabreak.uni.cc
  232. http://rapidmon.com/rapid/
  233. http://wallpapertrade.co.cc/
  234. http://www.rapidshite.com/
  235. http://www.rapidhard.glt.pl/
  236. http://www.rapidsharegenerator.com/
  237. http://www.xrapidshare.net/
  238. http://www.premiumrs.co.cc/
  239. http://1make.info/
  240. http://download-ddl.com/Rapidshare/
  241. http://rstiger.com/index.php
  242. http://yourrapidsolution.com/rapid/index.php
  243. http://rapihot.info/index.php
  244. http://www.yourdocket.com/
  245. http://www.premify.com/rapidshare/index.php
  246. http://www.sneaktech.com
  247. http://www.hufk.com/rapidshare/
  248. http://www.premiumlinkgenerator.com/
  249. http://hubdownload.com/rapidshare/
  250. http://www.rapidhack.prv.pl/
  251. http://www.rsfox.com/generator.php
  252. http://rapidvip.com
  253. http://2filehost.com/rapid/
  254. http://downloadrapidshare.org
  255. http://rapidsurfing.net
  256. http://www.directacc.com
  257. http://rapid-load.com/index.html
  258. http://www.multidl.com