Saturday, 31 August 2013

Make Folders with Invisible Names

Make Folders with Invisible Names 
posted it before, posting it again ! 
steps:
1. Click the right button of your mouse on the folder whose name you wish to keep invisible .

2. Now click on rename.
 
3.Now Press the "Alt" key, type "0160" (However, type this number only with the help of keypad which is on the right hand side of your keyboard.).

4.Now, Simply click anywhere outside folder.
 
                                           enjoy !

How to set up PPTP VPN connection

Step-by-step Guide to Setting Up PPTP VPN on Windows 7



Step 1: Open Control Panel > Network and Internet


 
 Step 2: Open Network and Sharing Center


 Step 3: Select "Set up a new connection or network"


  Step 4: Select "Connect to a workplace"


  Step 5: Select "Use my Internent Connection (VPN)"


  Step 6: Enter PPTP VPN Server name or IP address. Check "Don't connect now..." checkbox

 Step 7: Enter username and password as provided, check "remember password" checkbox, and create connection

 Step 8: Click on the "Connect to a network" and open the property page of the newly created connection

  Step 9: Click on the "Connect to a network" and Connect

 Step 10: Connect to VPN

 

                        Enjoy browsing annonimous (^_^) !

How To Change Your Facebook Theme

Hello,
This post is for facebook lovers. Many people love changes, you don't have default option to change your Facebook theme like Orkut. But Today I will give you a trick with this you can easily change theme of your facebook. You need only two things for this, first one is a facebook account and second thing is chrome or Mozilla browser, Because in this trick I will use Add-on. 

How To Change:   


1. First of all install Add-on. Chrome user click on this Chrome web store, and Fire Fox users Click on this.
2. After installation, just restart your browser and you will found a S icon on top right side in address bar or it will be on bottom left of browser.
3. Now Login to your FB account and click on this S icon. 
4. A list will open, now simply click on "Find more styles for this site". 
5. In this you will get 1000+ Facebook themes, select any one of your choice.
6. After selecting a theme, you can see preview too, for installation click on "Install with Stylish".

7. That's It. All is done, now enjoy your theme. 

E.g  My facebook :)

Veena Malik’s nude body painted Pictures



The manikin actor was the muse of international creative person Vesa Kivinen for a singular project

No kidding. this can be no chintzy act of Veena leader. The manikin actor has really gone ahead Associate in Nursingd let an creative person paint her nude body and build a rather creative palette!
Veena was the muse of Finnish visual creative person Vesa Kivinen. He created 5 works of art wherever colors were painted directly on Veena’s nude body and her footage were later close with paintings and alternative graphics.

We just like the image wherever Veena’s attractive back has been 1st painted in an exceedingly Hindu god-like blue body color so splashed with a lean palette of colors. the opposite pictures tho' square measure left to your interpretation, merging story, the shape type and gestures into a painting. the sole alternative easy works of art square measure the black canvas with a cloud of smoke and another one from the blue series, with Veena’s hands activity her face.

According to Kivinen, the project “explores themes from ancient and spiritual traditions to our up to date international melting pot with its ever evolving and rising cross cultural associations.”

Veena is in London for the art exhibit wherever a number of the paintings that includes her are going to be showcased. She said, “I am here only for the love of art.” we tend to positive hope that’s true, Veena, and not another promotional material stunt!

Veena Malik dating a Norway based businessman

Veena Malik
The Pakistani histrion is believed to be qualitative analysis Norway-based businessperson Shaikh Umar Farukh

Veena leader appears to own undoubtedly affected on from her alleged boyfriend-actor and is believed to be presently qualitative analysis a Norway-based have businessperson.


The Pakistani actress’ prized new catch is seemingly businessperson Shaikh Umar Farukh Zahoor, United Nations agency has interests in gold, mining and property. The couple has apparently been qualitative analysis since some months currently and has managed to stay their relationship covert, until now.

A friend of Veena spills the beans, `She has managed to slide away unremarked and keep her relationship non-public. finally the excitement concerning Ashmit and her alleged romance, Veena is keeping herself busy with Umar. She has managed to keeping it terribly undercover.`

Before her arrival to the Bigg Boss house, Veena was qualitative analysis Pakistani athlete Mohd Asif.

So much is Veena aforesaid to be loving wither beau that she recently visited Ajmer Sharif to wish for his or her the well-being of their relationship. Umar successively visited Mecca Madina.

The friend says, `Umar is one amongst the largest billionaires in Norge and he doesn't want to draw in excess attention.`

Veena Malik in swimming pool with Ashmit Patel



The Murder actor is seen doing one thing naughty along with his ex-flame Veena leader which will flip your abdomen right over!
Ashmit-the who’s he?-Patel is back and how! The polemic and also the shamefully celebrated brother of actress Ameesha Patel is doing a little creep-worthy antics during this latest song Teri maa letter of the alphabet from his forthcoming motion picture Super Model major none apart from Veena leader within the lead.


The two area unit best remembered for coochie-cooing within the reality show Bigg Boss and as if those histrionics weren't enough, the couple is currently gratification in one thing which will simply champion something that you just have ever seen in any C-grade flick. whereas our 0.5 naked fashion plate is obtaining drunk within the pool, the voluptuous Veena is seen doing her usual seduction business.

Clearly Veena is victimisation her past equation with Ashmit to urge a lot of attention and also the Murder actor is therefore desperate that he has no qualms concerning acting in a very film which will simply place even sister Ameesha Patel to shame. we have a tendency to additionally noticed police officer Darling going inexperienced with envy during this variety as our desperate-for-attention love birdies go wet- in a very pool that is!

Tight Jeans Banned for Muslim Women in Indonesia’s province.




JAKARTA — In Indonesia’s province of Aceh, wherever law governs, adultery, gambling, tight jeans and Mohawk haircuts area unit unlawful by spiritual police. Now, ladies passengers are illegal from straddling motorbikes. The new rule has sparked robust criticism with activists spoken communication that discriminatory rules, on the face of it even by Islam, area unit undermining Indonesia’s pluralist name.
In the Aceh city of Lhokseumawe, the ethical crusade continues.


Town politician Suaidi Yahya says native morals area unit slippy – and it’s ‘impolite’ for girls to straddle motorbikes.
Religious leaders have expressed support for the new regulation, however women’s teams say it's ridiculous and unfair. they assert native laws enacted within the name of faith and morality have disproportionately affected ladies.
Andi Yetriyani from the national body on women’s rights says the rule could be a huge step backwards for Aceh, and for Dutch East Indies.

Hers is Top password cracking method

Note:-This Article is only for education purpose
1. Dictionary attack“This uses a simple file containing words that can, surprise surprise, be found in a dictionary. In other words, if you will excuse the pun, this attack uses exactly the kind of words that many people use as their password…”
2. Brute force attack
“This method is similar to the dictionary attack but with the added bonus, for the hacker, of being able to detect non-dictionary words by working through all possible alpha-numeric combinations from aaa1 to zzz10…”
3. Rainbow table attack
“A rainbow table is a list of pre-computed hashes – the numerical value of an encrypted password, used by most systems today – and that’s the hashes of allpossible password combinations for any given hashing algorithm mind. The time it takes to crack a password using a rainbow table is reduced to the time it takes to look it up in the list…”
4. Phishing
“There’s an easy way to hack: ask the user for his or her password. A phishing email leads the unsuspecting reader to a faked online banking, payment or other site in order to login and put rightsome terrible problem with their security…”
5. Social engineering
“A favourite of the social engineeris to telephone an office posing asan IT security tech guy and simply ask for the network access password. You’d be amazed how often this works…”
6. Malware
“A key logger or screen scraper can be installed by malware whichrecords everything you type or takes screen shots during a login process, and then forwards a copy of this file to hacker central…”
7. Offline cracking
“Often the target in question has been compromised via an hack ona third party, which then providesaccess to the system servers and those all-important user password hash files. The password cracker can then take as long as they need to try and crack the code without alerting the target system or individual user…”
8. Shoulder surfing
“The service personnel ‘uniform’ provides a kind of free pass to wander around unhindered, and make note of passwords being entered by genuine members of staff. It also provides an excellent opportunity to eyeball all those post-it notes stuck to the front of LCD screens with logins scribbled upon them…”
9. Spidering
“Savvy hackers have realised that many corporate passwords are made up of words that are connected to the business itself. Studying corporate literature, website sales material and even the websites of competitors and listed customers can provide the ammunition to build a custom word list to use in a brute force attack…”
10. Guess
“The password crackers best friend, of course, is the predictability of the user. Unless a truly random password has been created using software dedicated to the task, a user generated ‘random’ password is unlikely to be anything of the sort…”

send friend request s on facebook whn you are blocked using simple step

Step.1  
Go to  this LINK.
This link will help you to add people by email address.If you want to add many people then it will good for you if you create contact list of to whom you want to send request.If you do not know how to make contact list then follow given below steps a) Open new text document (.txt) in notepad.
b) Add all the email addresses separated by a comma ( , ).
c) Save that file with the extension .vcf
You have created your conatct file.
Step. 2
Upload this file to Facebook. and you will be able to send friend request.

How to Upload contact file:In order to know how to upload contact file on facebook go to below link.
 
In above link you will see option of “upload files”  or
“others tools” below on Skype in the mid of page.Clik on it to upload files.

Step. 3
Click “OK”and now you are able to send many request known or unknown people.

Learn programming language for ethical hacking

a) HTML

    HTML stands for Hypertext Markup Language (HTML) is the fundamentals for developing web pages and other similar net related tasks that can be displayed in a web browser. One should learn HTML at its priority.

.b) JAVAScript
  • The knowledge of JAVA script will help you understand the basics of Cross Site Scripting.

.c) PHP/SQL

  • Majority of web applications are written using PHP and MySQL .So it is a must to learn PHP

  • For Writing / Understanding Exploits, Shell Codes, Root kits etc

.d) C & C++

  • Approximately 60% of the exploits you observe on the internet are written in C & C ++.

.e) Assembly

  • The knowledge of Assemble will help you in understanding and writing Shell Codes which will ultimately help you in Reverse Engineering applications.
Languages Used in Most popular websites.
.
1. Google – Java (Web), – C++ (indexing)
2. Facebook – PHP
3. YouTube - Flash, Python, Java
4. Yahoo – PHP and Java
5. Microsoft Live.com – .NET
6. Baidu – Unknown
7. Wikipedia  – PHP
8. Blogger – Java
9. MSN – .NET
10. Twitter – Ruby on Rails, Scala, Java

Want to know Who Used Your Pc In Your Absence & what Did He Do?

following are some simple step i hope its useful for you.
just follow these simple steps
 start > run >eventvwr.msc
Events are stored in three log files: Application, Security, and System.
 These logs can be reviewed and archived.
 For our purposes we want the System log. Click on “System” in the left-hand column for a list of events.
 Look for a date and time when you weren’t home and your computer should have been off.
 double click on the eg: info n it will show u the detail.
 You can also use this log to see how long someone was on the computer.
 Just look at the time the computer was turned on and off for that day.

How to hack facebook accounts using simple step [H2B]

Note:-This Article is only for education purpose
Facebook has security feature in which after 25 or so logins the account is temporarily disabled,to enablethe account the account owner must reset his/her account
Thus, even when victim tries to login his Facebook account using correct password, he is not able to login to his Facebook account, thus you can hack Facebook account thanks to Facebook Freezer. 
This Facebook Freezer works cool on windows xp and windows vista (even supports earlier version of windows).


Hack Facebook account – Facebook freezer



1.
Download Facebook freezerto hack facebook account. ( Download link doesn’t working so search on Google “facebook freezer”) 
 
2.Now extract the files into a folder

 
3.Now, run
FacebookFreezer.exe file to get this:
Hack Facebook account by Facebook Freezer
4.Simply enter email id of victim whose you wanna hack Facebook account using Facebook freezer and hit “Freeze”.

5.That’s it. You will now be able to hack Facebook account using this Facebook freezer. This freezing will continue until you hit “Stop Freezing”.

Islamabad Girl Mobile Number



First Name : Sadia
Date : 1993-06-24
Last Name : Malik
Nick Name : Sadi
Mobile Number : 03215544228
City : Islamabad
Company : warid
State : Punjab
Email : rawish63@yahoo.com
Thursday, 29 August 2013

Broadway – Magazine Theme by ThemeForest

Broadway – Magazine Theme by ThemeForest
Broadway – Magazine Theme by ThemeForest caption
Broadway is ThemeSector’s third WordPress magazine theme. As the last two themes, Broadway features a built-in review system with up to 5 rating criteria. However this time we also added a user rating option so the user can give their opinion on a review. Broadway also comes with 3 post formats (video, music & gallery).
Demo   *  Download

Download IGI 2 Covert Strike Highly Compressed PC Game


IGi2
 Download Free-IGI 2 Covert Strike PcGame Hello All  IGI 2 Covert Strike Series. A complete list of the video game titles in the IGI 2  series of PC games. IGI 2 is a second game in Cod series .You can download free in full version . 100% working game. The platform of this game is pc game IGI 2 pc game free download full version – IGI 2 Covert Strike 2 Modern Warfare: Fast-paced, modern warfare action, and much more programs.

 

 REQUIREMENTS:

Windows 98/ME/2000/XP
MINIMUM
Pentium III or Athlon 700MHz Processor
128MB |RAM
32MB 3D Accelerated Video Card
DirectX-compatible Sound Card
8X CD-ROM Drive
1.9GB Hard Disk Space
DirectX 8.1
RECOMMENDED |PC REQUIREMENTS:
Pentium 4| or Athlon 1.2GHz Processor
512MB| RAM
64MB 3D| Accelerated Video Card
DirectX-|compatible Sound Card
32X |CD-ROM Drive
ScreenShot:
Project-IGI-2

                                                                 Project-IGI-2

Project-IGI-2-PClabe_

     
                                   Download IGI 2 Covert Strike Highly Compressed PC Game

Download

Download PES 2013 PC GAME full Version + Cd Key

PES 2013 PC GAME



Pro Evolution Soccer 2013 :Info

only Download Pro Evolution Soccer 2013 (PES 2013): Pro Evolution Soccer 2013 is The wonderful Pc Game of 2013 Winning Eleven 2013 in Japan and South Korea” Free Download Patch PES 2013 Full PC Game Full Versio : PESE dit 2013 Patch 3.5  the group that version 3.5 is the latest patch for the game PES 2013 pes soccer 2013, pes Pc game 2013, pro evolution soccer 2013 pc, pes evolution 2013, pro evo soccer, free pes 2013 download, soccer games download, PES 2013 Full PC Game [+Cd keys], 5.78 GB, 144, 51 .Pro Evolution Soccer 2013 Proper (PES)-RELOADED (FULL + Cd key)

 

System: Requirement

1- Operating System : Windows vista or 7 (Recommended)
2- Ram : 2 GB
3 – Hard Disk : 6 GB free.
4 – Graphics : Nvidia 512 MB graphics or ATI equivalent
5 – Graphics Memory : Direct X 9 supported.


Download

Part-1

Part-2



Part-3

Part-4


Part-5

Tekken 5 Pc Game Full Version

Tekken 5 Pc Game Full Version
          

Tekken 5 : Info

Download Here .Tekken 5 is  wonderful Pc Game Full Version For Free Tekken 5  game is very popular worldwide and having character voices speaking in their native language,Download a Tekken 5 tusfiles Link ,torrent Link Uptobox and MediaFire Link Full download Tekken 5 PC Game Direct Links.tekken 5 full version highly compressed installation setup mediafire.., Tekken 5 Pc Games  The fighting system is more fluid and faster. Tekken 5 Pc Games is a new and innovative Pc game which overcome the problem of the previous Full version and also have a better GUI Enjoy the Fast downloading Tekken 5 ,Tekken 5 is the most popular PC  game in the world of fighting game series tekken 5 for win 7 tekken 5 emulator for windows xp and Windows 8 playstation emulator. pclabe.com


Tekken 5  system requirements: Processor:

 1 -Core2Duo 3.20 GHz RAM
2-     1.0 GB GPU
                    3 –  8800GT Free Space
    4 –   5.0 GB Graphic Card
     5 –  512 MB (1GB is best

ScreenShot:

taken-5

taken-5

Download

Patr-1

Patr-2

Patr-3

Patr-4