Protect your USB Flash Drive Contents with Password Lock

0 comments
USB Safeguard Software to encrypt and protect data with a password on your removable pen drive.

USB Safeguard enables you to encrypt and password protect sensitive data on your USB drive. You can selected one or more folders to be encrypted and choose to securely delete the original (unencrypted) files with the built-in file shredder.


Lock your USB Pen Drive with Password : USB Safeguard


Simply drag and drop files and folders to quickly protect your sensitive documents, and then enter an password to encrypt and decrypt the files that you want to protect from prying eyes.


The program also includes a handy Safe Browsing feature that allows you to launch Internet Explorer without leaving any Internet traces on the host computer. Other features include an on-screen keyboard for secure password input and free space wiping.

Download USB Safeguard

USB Safeguard uses 256-bit AES encryption to protect your date. The program is not installed on your PC, it runs directly from your USB pen drive.

Optimize Windows for better gaming using Game Booster

0 comments
Game Booster will help squeeze the most out of your system and get games running more smoothly.

Assassin's Creed is one of my favourite games of all time. I can't stop playing this game. Just can't get enough of it :) You might have noticed that while playing games with heavy 3D graphics, PC response becomes slow. In some cases 3D games become jerky. The trick is to optimize PC for optimal game performance by reducing down resource consumption while playing game.

Optimize your PC for smoother, more responsive game play in the latest PC games with the touch of a button, Game Booster helps achieve the performance edge. It works by temporarily shutting down background processes, cleaning RAM, and intensifying processor performance. That means you can keep all the features of Microsoft Windows Vista and XP ready for when you need them, but turn them off when you are ready to get down to serious business – gaming. Game Booster makes it simpler to enjoy the latest games and take your experience to a new level.

CLICK HERE TO DOWNLOAD




Size: 626 KB
License: Freeware
Requires: Win 2K/03/XP/Vista

Seven useful Windows 7 tips and tricks

0 comments
1. Bypass the Recycle Bin
The Windows Recycle Bin is a good safeguard against accidental file deletions. However, when you know you want to permanently delete a file, you can bypass it. Instead of pressing the Del key, press Shift+Del, then Shift+Enter to confirm.
If you prefer, you can also permanently disable the Recycle Bin. First, right-click on the Recycle Bin, then choose Properties. Click on the drive you want to disable the Recycle Bin for, then select "Don't move files to the Recycle Bin. Remove files immediately when deleted." Click the OK or Apply button to save the changes.
Disable Recycle Bin (Credit: Screenshot by Ed Rhee)
2. Open Windows Explorer faster
Are you still mousing over to a Windows Explorer icon or double-clicking on My Computer to browse your files? Try pressing Windows Logo+E instead, to instantly launch Windows Explorer.
3. Enable underlining of keyboard shortcuts
Windows has many menu shortcut keys, but they're hidden by default. To enable the underlining of the shortcuts, go to Control Panel > Ease of Access Center > Change how your keyboard works. Click on the box next to "Underline keyboard shortcuts and access keys," then hit the OK or Apply button to save.
Enable underline shortcuts (Credit: Screenshot by Ed Rhee)
Underlined shortcuts
On the left, underlining is disabled. On the right, underlining is enabled.
(Credit: Screenshot by Ed Rhee)
4. Bypass the Windows splash screen
Disabling the Windows splash screen can shave a couple seconds from your total boot time. Launch the Windows Run command (Windows Logo+R), then type msconfig. Under the Boot tab, check the box next to "No GUI boot." Hit the OK or Apply button to save the changes.
Bypass Windows splash screen (Credit: Screenshot by Ed Rhee)
5. Lock Windows quickly
Whether you're at the office, library, or cafe, it's always a good idea to lock Windows before you step away. To lock Windows quickly, press Windows Logo+L.
6. Show hidden files, folders, and drives
To view files, folders, and drives that Windows hides, open the Windows search box (Windows Logo) and type folder. Next, select Folder Options from the search list and navigate to the View tab. Under Hidden files and folders, check the box next to "Show hidden files, folders, and drives."
Show hidden files (Credit: Screenshot by Ed Rhee)
7. Rename multiples files
To rename multiple files in Windows, highlight the files you want to rename, then hit the F2 key. Rename the first file, then hit Enter. All your files will be renamed and a number in parenthesis will be added to the end of the name. If you change your mind, you can hit Ctrl+Z to undo the rename.
Files to rename
Original file names to rename.
(Credit: Screenshot by Ed Rhee)
Files renamed
New file names.
(Credit: Screenshot by Ed Rhee)
That's it. If you know of any other cool Windows tips and tricks, feel free to share them in the comments.

How to Recover Deleted SMS from SIM or Phone Memory

0 comments
Recover Deleted SMS Messages From Your Cell Phone for Free

Have you deleted SMS messages that you wish had not gotten deleted? You will be happy to know there are a number of different software that can help you recover the messages you need and want, but not all of them are free and you need to purchase the software. However, if you own a Nokia phone you might be in luck, as there are very good chances of message recovery from your cellphone without need of any specialized data recovery software for free. In this tutorial I will explain, what are the steps to be followed in order to recover deleted SMS from a SIM card or phone memory.

1. First of all download and install FExplorer, excellent file manager and also sends files via bluetooth.


2. Launch FExplorer and navigate to C: if you use Phone Memory to store your messages (default) and D: if you use Storage Card as your SMS storage location.

3. Now navigate to and open "system" folder.

4. Now open the "mail" folder.

5. This folder should contain many folders named similar to 0010001_s etc. with files named similar to 00100000 etc. These files are the actual deleted messages. Simply, use the FExplorer inbuild text viewer to view these files. You will need to browse through every folder and open all files inside them until you get the required SMS.

Thsi tool includes more great fetures like:
  • Cut, copy & paste files
  • Check date modified & size
  • Display free space available
  • View file with inbuilt text viewer
  • Cut, copy, create & paste directories
  • File find. (although this only works within a directory)
  • Take screenshots
  • Set your backlight to be permanently on
  • Send files via bluetooth. (may be necessary to rename .sis to .sis_)
  • Compress memory - increasing available free memory ...and much more.
All of all FExplorer is a handy file explorer application for your Series 60 phone. With a wide range of features, tips and tricks, FExplorer will become one of your favorite mobile applications!

Check for updates of FExplorer here.

How to Unlock Mobile Phones - Mobile Unlocker

1 comments
Here i'm posting an utility for unlocking Nokia, Siemens, Samsung, Vitel, Maxel, Panasonic, Motorola, LG, and AEG mobile phones. This utility also includes MasterCode calculator that can reset your Nokia security code if you have lost it.


WorldUnlock Codes Calculator features:
  • Unlock Nokia
  • Unlock LG
  • Unlock Panasonic
  • Unlock Maxon
  • Unlock Samsung
  • Unlock AEG/Telital
  • Unlock Alcatel
  • Unlock Siemens
  • Unlock Sony
  • Unlock Vitel
Easy guide to free Nokia unlocking:

(Please read the whole guide before starting)

Select phone model from list.
  • 2. Enter IMEI number of your phone (Press *#06# on phone)
  • Select country and service provider where the phone was bought.
  • Hit the button: Calculate!
  • The software generate some Nokia unlock codes.
  • If 7 codes are displayed, use the code ending with +7 first.
  • If it does not work, then try +1, and finaly +5.
  • When phone displays "Sim restriction off" it is unlocked.
  • If only two codes are displayed (+1 and +2) enter both of them!

Codes will be shown on the form: #pw+CODE+n#
To get p, w or +, pres the * button several times.

You enter the codes correctly by removing any simcard from the phone, turning the phone on and then enter the code.

Download WorldUnlock Codes Calculator

Download Norton 360 Version 4.0 2011 For Free

0 comments

Well this ain’t a joke. Norton is giving away its Norton360 Version 4.0 and norton antivirus 2011 for 90 days free trial i.e 3 months. This is a special promotional offer. This is an OEM setup installer that has been released by norton in conjunction with microsoft.

If you will directly go to the norton website you will not be able to benefit from this offer instead you will get only a 30-day trial version only after entering your credit card details. But if you use the link that I am giving at the end of this post you will get a 90 day trial and doesn't require to enter your credit card details.

So don't waste your time and try the best antivirus solution as the new norton 2011

* Provides excellent protection against viruses,spywares.
* Its lightweight and uses less system resources.
* Specially Designed for windows 7

Click the link below to download Norton 360 Version 4.0 Or antivirus 2011 for free

Get a Free Serial License Key for Avira Premium Security 10

0 comments
Avira is one of the leading Antivirus Company. Avira Premium Security 10 provides a complete protection from viruses, spywares, intrusions and other online threats. It also has a backup system to protect your important data. The license key of Avira Premium Security is of $31.59 for 1 year. Now you can get it free for six months by using a special promotional offer.



Avira Premium Security Suite is essential if you:

  1. Rely on the internet for everything
  2. Regularly shop and buy from online retailers, or bid on auction sites
  3. Ever access your bank or financial accounts online
  4. Chat, communicate and social network constantly
  5. Share your computer with your partner or other family members
  6. Worry about keeping your precious family memories safe – all those photos and movies stored on your PC
  7. Are concerned about what your children might see and do online


How To Download Avira Premium Security 10 with 6 Months Serial License Key





  • Click on Request License Now button
  • Now Click on License Overview button and on the next page click on the yellow keys to download you Serial key (HBEDV.KEY) for Avira Premium Security 10




Now install this key and your Avira Premium Security 10 will get activated for 6 months.

Top 10 Free CD/DVD burning Softwares

0 comments
Download free CD and DVD burner software to create and burn audio or data CDs. Burn DVDs and Blu-ray discs.

I've been using Nero all the time and in my opinion it's the best software to write CD and DVD. But there are so many free softwares which help you to do the same. Here is my list of top 10 free burning softwares that you can use in place of Nero.

1. ImgBurn - ImgBurn is probably the best free CD/DVD burning tool available. ImgBurn can write most types of CD / DVD images including BIN, DI, DVD, GI, IMG, ISO, MDS, NRG and PDI. ImgBurn supports all the Windows OS’s – Windows 95, 98, Me, NT, 2000, XP, 2003 and Vista (including all the 64-bit versions). If you use Wine, it should also run on Linux and other x86-based Unixes.

2. CDBurnerXP - CD Burner XP is a great software. Apart from CDs and DVDs, you can also burn Blu-Ray and HD-DVDs with it. It also includes the feature to burn and create ISOs, as well as a Multilanguage interface.
Operating Systems supported- Windows 2000/XP/2003 Server/Vista.

3. InfraRecorder - Infra Recorder can burn CD, DVD, Dual Layer DVDs and also supports various audio formats. The audio and data tracks includes .wav, .wma, .ogg, .mp3 and .iso formats. It can erase rewritable discs. Infra Recorder can also burn images in ISO and BIN/CUE formats.It supports multisession writing of discs.

4. Express Burn - Express Burn is a free CD burning program that lets you create and record audio and data CDs under Windows and Mac OS X. This software has a great user friendly interface. To use it all you need to do is drag and drop files. One thing surprises me; well I don’t know how far it’s true; the makers of this software claim that Express Burn is the fastest CD/DVD writing program in the world using proprietary optimizing systems.

5. FinalBurner Free Edition - FinalBurner is one more top free burning software. It can create data, audio and video discs. It can burn CD R/RW, DVD+R/RW, DVD-R/RW, and DVD DL. It can also rip Audio CD in .wav, .mp3, .ogg, .mid, .wma, .aac, .mp4, .m4a, .xm, .mod, .s3m, .it, .mtm, .mo3 audio files. FinalBuner can burn Video DVD with formats AVI, DIVX, XVID, MP4, MPG, WMV, ASF, MOV, FLV, etc. FinalBurner can also create an ISO image of a disc.

6. Ultimate CD/DVD Burner - Ultimate CD/DVD Burner is a simple and easy to use CD and DVD burning software package. It supports a very wide range of internal and external (USB 2.0 and FireWire) CD and DVD writers. Burn any data, copy any disc, make backups, create astonishing photo CD albums, make ISO CDs with this very easy to handle software!

7. StarBurn - StarBurn is a CD/DVD/Blu-Ray/HD-DVD disc burning software. It's been a long time since I've seen such a good free software. The number of features is quite impressive. You can burn data, audio, video, image discs. You can also grab or compress audio files.

8. Your Free DVD Burner - Your Free DVD Burner is a good one which isn’t much popular. It has some powerful features which is the reason it makes into this list. It can create data DVDs and CDs. It also supports DVD Video. YourFree DVD Burner allows you to create multisession CDs. You can create Bootable CD/DVD discs. It can burn ISO images onto disc. It supports CD-R, CD-RW, DVD-R, DVD-RW, DVD-RAM, DVD+R, DVD+RW and DVD+R disc formats. Rewritable CDs and DVDs can be erased.

9. BurnAware - BurnAware allows you to easily perform the most common disc burning operations: write to all CD/DVD media types, including Blu-Ray (BD-R/BD-RE); create and burn disc images; write multi-session discs; verify the integrity of files; burn your compilations directly on optical media, without having to wait for hard drive staging first and much more.
Operating systems supported- NT, 2000, XP and Vista.

10. Create-Burn ISO Image - Free Create-Burn ISO a good free CD/DVD burner. It can burn CD-R, CD-RW, DVD+R/RW, and DVD-R/RW discs. It can also create ISO image for burning CD/DVD. Burn ISO image can also create bootableCDs and DVDs. After burning the disc, Burn ISO Image can verify written data for finding any writing errors. It can erase re-writable CDs and DVDs. It supports Joiet File System, ISO, UDF& ISO/UDF project.

Learn All About Spyware

1 comments
A very detailed look at what spyware is, how it attaches itself to computers, and the common methods of prevention.

There are a lot of PC users that know little about "Spyware", "Malware", "hijackers", "Dialers" and many more. This post will help you avoid pop-ups, spammers and all those baddies.


What is spy-ware?


Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.

Known spywares

There are thousands out there, new ones are added to the list everyday. But here are a few:
Alexa, Aureate/Radiate, BargainBuddy, ClickTillUWin, Conducent Timesink, Cydoor, Comet Cursor, eZula/KaZaa Toptext, Flashpoint/Flashtrack, Flyswat, Gator, GoHip, Hotbar, ISTbar, Lions Pride Enterprises/Blazing Logic/Trek Blue, Lop (C2Media), Mattel Brodcast, Morpheus, NewDotNet, Realplayer, Songspy, Xupiter, Web3000, WebHancer, Windows Messenger Service.

How to check if a program has spyware?

This Little site keeps a database of programs that are known to install spyware.

Check Here: http://www.spywareguide.com/product_search.php

If you would like to block pop-ups (IE Pop-ups).

There tons of different types out there, but these are the 2 best, i think.

Try: Google Toolbar (http://toolbar.google.com/) This program is Free
Try: AdMuncher (http://www.admuncher.com) This program is Shareware

If you want to remove the "spyware" try these:

Try: Lavasoft Ad-Aware (http://www.lavasoftusa.com/) This program is Free
Info: Ad-aware is a multi spyware removal utility, that scans your memory, registry and hard drives for known spyware components and lets you remove them. The included backup-manager lets you reinstall a backup, offers and multi language support.

Try: Spybot-S&D (http://www.safer-networking.org/) This program is Free
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. Blocks ActiveX downloads, tracking cookies and other threats. Over 10,000 detection files and entries. Provides detailed information about found problems.

Try: BPS Spyware and Adware Remover (http://www.bulletproofsoft.com/spyware-remover.html) This program is Shareware
Info: Adware, spyware, trackware and big brotherware removal utility with multi-language support. It scans your memory, registry and drives for known spyware and lets you remove them. Displays a list and lets you select the items you'd like to remove.

Try: Spy Sweeper (http://www.webroot.com/wb/products/spysweeper/index.php) This program is Shareware
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer.
The best scanner out there, and updated all the time.

Try: HijackThis (http://free.antivirus.com/hijackthis/) This program is Freeware
Info: HijackThis is a tool, that lists all installed browser add-on, buttons, startup items and allows you to inspect them, and optionally remove selected items.


If you would like to prevent "spyware" being install.

Try: SpywareBlaster (http://www.wilderssecurity.net/spywareblaster.html) This program is Free
Info: SpywareBlaster doesn`t scan and clean for so-called spyware, but prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.

Try: SpywareGuard (http://www.wilderssecurity.net/spywareguard.html) This program is Free
Info: SpywareGuard provides a real-time protection solution against so-called spyware. It works similar to an anti-virus program, by scanning EXE and CAB files on access and alerting you if known spyware is detected.

Try: XP-AntiSpy (http://www.xp-antispy.org/) This program is Free
Info: XP-AntiSpy is a small utility to quickly disable some built-in update and authentication features in WindowsXP that may rise security or privacy concerns in some people.

Try: SpySites (http://camtech2000.net/Pages/SpySites_Program.html) This program is Free
Info: SpySites allows you to manage the Internet Explorer Restricted Zone settings and easily add entries from a database of 1500+ sites that are known to use advertising tracking methods or attempt to install third party software.

If you would like more Information about "spyware".

Check these sites.
http://www.spychecker.com/
http://www.spywareguide.com/
http://www.cexx.org/adware.htm
http://www.theinfomaniac.net/infomaniac/co...rsSpyware.shtml
http://www.thiefware.com/links/
http://simplythebest.net/info/spyware.html

Usefull tools...

Try: Stop Windows Messenger Spam (http://www.stopmessengerspam.com/) This program is Free
Info: "Stop Windows Messenger Spam" stops this Service from running and halts the spammers ability to send you these messages.


All these softwares will help remove and prevent evil spammers and spywares attacking your PC. I myself recommend getting "Spyblaster" "S&D Spybot" "Spy Sweeper" & "Admuncher" to protect your PC. A weekly scan is also recommended

Free Virus Scan

Kaspersky Online Scanner
Scan for spyware, malware and keyloggers in addition to viruses, worms and trojans. New threats and annoyances are created faster than any individual can keep up with.
http://www.kaspersky.com/virusscanner

BitDefender Online Scanner

Free and effective malware cleanup directly from your browser. It features all required elements for thorough antivirus scanning and effective cleaning: it scans your system’s memory, all files, folders and drives’ boot sectors, providing you with the option to automatically clean the infected files.
http://www.bitdefender.com/scanner/online/free.html

HouseCall
HouseCall can quickly identify and fix a wide range of threats including viruses, worms, Trojans, and spyware. It is now faster, more powerful and browser independent!
http://housecall.trendmicro.com/

There are many other Online Scanners which are free and easy to use, like Computer Associates Malware Scanner, ESET, Avast....

How to Know if You Are Infected with RATs or Keyloggers

0 comments
In this post i am going to show you how to find out when you are infected with a RAT or Keylogger, without using any complex tools. Now i believe most of you might know that you need to have an internet connection to make a RAT or a Keylogger work, which would mean, if you are not connected to internet, you don't have to worry about being infected with RAT or Keylogger. Ok, so for those who have internet connection and think they are being infected with a Trojan, here is a little guide that can solve your problem.

1. Now every program has their own process which can be seen on task manager. So the first thing to do is to find out which process the Trojan is being attached to. If you see some unknown process search that on google. A good hacker will always makes sure he hides its process with a Windows based Process, for eg. svchost.exe or something like that.

2. If you cant find, then the next thing you can do is use cmd (to open cmd prompt, Click on Start--->Accessories-->Command prompt).

3. Once Command Prompt is opened, use this command: netstat -an |find /i "listening"

Note: The NETSTAT command will show you whatever ports are open or in use, but it is NOT a port scanning tool!

Now we wonder What this Command does? This command will show all the opening ports. Now check for any unknown port.

4. You can skip step 3 if you want, and can do this instead.

Open command prompt and type netstat -b


Now this command will show you the active connections with the process with their PID (Process Identifier) and also the packets.
Look out for SYN Packets and the Foreign address its been connecting with , check the process its been associated with, check the ports also. If you find that its connecting to some unknown ports, then you can say you have been backdoored.

5. Go to your task manager. On the top of it, click on View---> select Column---> Tick on PID (Process Identifier).
Match the suspicious Process with the Processes In task manager, check PID also.


Now most of the RATs resides on Start up. How to delete them from start up?

a) Go to regedit ---> HKLM\Software\Microsoft\Windows\Current version\Run
On the Right hand side, check for the process name which you find on step 4. if its not their. Check at
HKCU\Software\Microsoft\Windows\Current Version\Run
OR
Open Cmd prompt & type start msconfig. Go to Startup tab, you can check the startup process there.


I hope This Tutorial was easy and comprehensive.

How To Send a Self Deleting SMS

0 comments
Basically this technique is called SAFE-TEXT. It's a technique where a message destroys itself after being read. If you want to call it the Data-centric Suicide Message, that's fine too. This is a website that allows you to send such type of sms for free of cost after registering on it. But it has limitation that you can send only 10 SMS a day.

So here's the thing. With Wikileaks on one side and British libel law on the other, there's room for a tool that lets you say what needs to be said, but without it falling into the wrong hands in the process.

What it does is allow you to send an expletive-laden opinion of your boss to a co-worker, or an it's-in-the-public's-interest-to-know-this leak to your friend on the Guardian (or Wired), without it having a chance to be read by said boss, or unsaid MP.

Note: This trick should only work for British mobile network operators.

Here’s how to use it:
  1. To register and activate, text WIRED to 83118 (charged at your standard network rate). You’ll be able to send up to 10 messages daily.
  2. If you’re the sender, the message will show your name and number.
  3. Write your libel-ridden hate speech and hit send.
  4. The receiver will then be sent a text telling them they have been sent a Wired Safe Text with a link to the mobile internet site that hosts your message.
  5. When they click through they will activate Safe Text. They will only have a few seconds to read the text (so don’t make it too long) before it self-destructs.

How to Detect Hidden Backdoors, Trojan Horses and Rootkit Tools

0 comments
Learn How To Detect A BackDoor On A Tool 
What is a BackDoor?

A backdoor in a computer system (or cryptosystem or algorithm) is a method of bypassing normal authentication, securing remote access to a computer, obtaining access to plaintext, and so on, while attempting to remain undetected, the backdoor may take the form of an installed program, or could be a modification to an existing program or hardware device. It hides in the computer, scans existing loopholes, opens corresponding ports, as well as modifies system registration files.

Backdoor will not duplicate or actively spread itself. It will only open a certain port through which a remote computer in the network can control the infected computer. Generally the backdoor will not influence normal communication of the network, so firewalls or IDS can hardly detect its existence.

Is my network infected with a backdoor?

According to statistics, most of the backdoors work under port 31337, 31335, 27444, 27665, 20034, 9704, 6063, 5999, 5910, 5432, 2049, 1433, 444, and 137-139. So whether there is communication through these ports in the network determines whether the network is infected with a backdoor.

How To Detect A BackDoor On A Tool?


1. Right click it, if you got winrar installed and you see "open with winrar" then this means it was binded with winrar so def backdoored

2. Open it with a resource editor such as Resource Hacker/Restorator/Pe Explorer and check the rcdata section. If theres 1 & 2 entries in it then its binded

3. Open it with a hex editor. At the start of a PE header theres always this line "This program cannot be run in DOS mode". Search for it, if it exists more then once then it might be binded
it depends on the specific app, for example its not unusual for binders/crypters to have the stub file attached in the resources. Also search for .exe and inspect the results, a binded file
drops the files to a temp folder before executing em , so if you find somethin like this: %.t.e.m.p.%.\.x.x...e.x.e or file1.exe/file2.exe then its def binded

4. Run it in sandboxie. When a file is ran'd in sandboxie its isolated (cant access your files/registry). First click the sandboxie tray icon to open up its Window, then right click the file and click "run with sandboxie". If you see another process name in the sandboxie Window then its probably backdoored (this doesnt include sandboxie rpcss/dcom launch processes, those are legit and needed for some programs). Thats not all, the file may drop another when one of the buttons in the program GUI is clicked or after you close it, so click all the buttons and close it just to make sure. If you do see other processes then immdiatly click file -> terminate all processes from the sandboxie menu. If a file refuses to run in sandboxie or its suppose to be a program and it runs without GUI then it would probably be best to delete it.

Hope this tutorial was helpful for you.

How to Send SMS Messages to Mobile Phones Using Email

0 comments
Send SMS or Text Messages to Cellular Phones Using Email

In this post i want to show you how to send a short email to a friend and get it delivered to his/her cell phone as SMS? If you know your friends’ phone numbers and the carrier they are on then you can easily send emails to their cell phones directly from your email program. It's very simple...


1. First of all open your mail provider

2. In the To field type in phonenumber@domain.name


3. The most popular SMS domain names you can find with this link. In this list you can find your mobile service provider and the domain you need to use.

4. Just click send and that’s it

Top 5 Free Photo Editors for Windows

0 comments
5 Amazing Free Graphic and Image Editors for Designers and Photographers

Now all of you know that Photoshop is the heavyweight champ in the image-editing category, but most people don’t need such an advanced toolset for everyday image-editing tasks, and its price is near $650. In this post i'll show you some of the best free image editors that are so easy to use.

1. IrfanView - IrfanView is probably the most popular and feature packed free image viewer for Windows that can view, edit, and convert image files and play video/audio formats. It has been around for many years and keeps getting better. In addition to standard image viewing, it includes many additional features including slideshow, batch conversion, image adjustment, image editing, resizing, panorama stitching, auto EXIF rotation and more. There certainly are more user-friendly and attractive image viewers, but few that offer all the functionality, and extendibility that IrfanView can provide.

2. Paint.NET - Paint.NET features an intuitive and innovative user interface with support for layers, unlimited undo, special effects, and a wide variety of useful and powerful tools. An active and growing online community provides friendly help, tutorials, and plugins. Many special effects are included for enhancing and perfecting your images. Everything from blurring, sharpening, red-eye removal, distortion, noise, and embossing are included. Also included is our unique 3D Rotate/Zoom effect that makes it very easy to add perspective and tilting. I am using this software and it's really great.

3. FastStone Image Viewer - FastStone Image Viewer is a fast, stable, user-friendly image browser, converter and editor. It has a nice array of features that include image viewing, management, comparison, red-eye removal, emailing, resizing, cropping, color adjustments, watermarks and more. FastStone Image Viewer supports all major graphic formats including BMP, JPEG, JPEG 2000, GIF, PNG, PCX, TIFF, WMF, ICO and TGA as well as digital RAW formats including CRW, CR2, NEF, PEF, RAF, MRW, ORF and DNG).

4. GIMP - GIMP (GNU Image Manipulation Program) is specifically a raster graphics editor used to process digital graphics and photographs. It is usually the direct free replacement for Photoshop and rightly so, there are very few limitations, its very powerful, and is probably easier to use than Photoshop. With its dedicated community you can find all the help, tutorials and plugins you would ever need. All this for free!
OS : Windows ALL, Mac OS X, and SkyOS.

5. Photoscape - PhotoScape is a complete photo editing suite that includes image browsing/viewing, photo editing, picture page printing, photo resizing and renaming, and even RAW conversion. It is a very complete package that will meet most of your digital image editing needs.

How to disable Right click on Desktop?

0 comments
his tweak removes the context menu that would normally appear when the user right clicks on the desktop or in the Explorer right results.

Previously I posted a tutorial How to disable "Turn off Computer" button on start menu. In this post i want to show you how to disable the right click functionality on desktop and explorer by using a simple registry hack. The bad thing is that people can still drag files and folders and drop them everywhere but it does provide some level of protection.

Lets start:

To use this feature, you will need to be logged into your computer with administrative rights.

1. Go to Start > Run > type REGEDIT and hit enter. Navigate to:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer


2. Here in right side panel, right click to create a new DWORD value with the name NoViewContextMenu (it is case sensitive), then assign number 1 in value data box.


Adding the registry tweak above will disable mouse right click for ALL users. If you only want to disable for the current logged in user, you should add the registry tweak to HKEY_CURRENT_USER instead of HKEY_LOCAL_MACHINE.

How to Protect Yourself from Malwares

0 comments
Malware, short for malicious software, is software designed to secretly access a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code.The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses. [Wikipedia]

With the increase in malware "programmers", numerous malwares/spywares are releasing everyday.

Here are some ways to stay safe from most malwares in Windows:

1. OS Installation Directory

Most of them are skids, so they hard-code location names in their apps, instead of getting the System Directory. As you know the default installation of Windows XP, Vista, 7 is C:\Windows. When you are installing an OS, you are asked for the installation location, even Directory name. Just change C:\Windows to something like E:\OSdir, etc. and you should be immune from skid malwares.

Note: Some softwares may stop working this way, since it can be possible that they are using the same idea. Just find an alternative for them.

2. Show Hidden Folders, and System Files

It is really easy to make any file System/Hidden in most programming languages, so most malwares hide their stub using these attributes. It becomes real easy to find them after you unhide them.

3. Use BinText on suspicious apps

You have found a suspiciously hidden App? Open it in BinText, it will display all Text in the app. Most programmers don't hide Text, although it can be done by obfuscating. But there is still a very good chance you can find suspicious information in an app. If you find text like ", , etc" then the app is a malware/spyware.

Download BinText now from Official Site

4. Process in Task Manager

Most of the Malwares cannot hide their task from TaskManager. All they do is Disable Task Manager by creating a Key in Registry. Just Download another Task Manager, there are lots, or make one yourself (Google for that), and you can End the Process of the suspicious app.

These are some basic tips that can help you to stay safe from most malwares.

Shut Up and Be Secure - Power of Social Engineering

0 comments
Human is the most weakest part of the Information Security chain. Psychologists have identified many benefits people receive when they help others. Helping can make us feel empowered. It can get us out of a bad mood. It can make us feel good about ourselves. Hackers find many ways of taking advantage of our inclination to be helpful.

Because Hackers often target people who don’t know the value of the information they are giving away, the help may be seen as carrying little cost to the helper. Most of Humans tend to explain their behavior and of others, while doing this we give away alot of information about us.

Security is too often merely an illusion, an illusion sometimes made even worse when gullibility, naivety, or ignorance come into play. The world’s most respected scientist of the twentieth century, Albert Einstein, is quoted as saying, “Only two things are infinite, the universe and human stupidity, and I’m not sure about the former.” In the end, social engineering attacks can succeed when people are stupid or, more commonly, simply ignorant about good security practices.

With the same attitude as our security-conscious homeowner, many information technology (IT) professionals hold to the misconception that they’ve made their companies largely immune to attack because they’ve deployed standard security products – firewalls, intrusion detection systems, or stronger authentication devices such as time-based tokens or biometric smart cards.

Anyone who thinks that security products alone offer true security is settling for. the illusion of security. It’s a case of living in a world of fantasy: They will inevitably, later if not sooner, suffer a security incident.

How to Download Flash Videos From Any Site With Firefox

0 comments
I'll make it short. I found this out on myself just by peeping around and Googling a bit.

1. Open Firefox.

2. Clear your cache.

Open Firefox and select "Tools" -> "Options", select the Advanced panel, and click on the Network tab. In the Offline Storage section, click Clear Now.


Click OK to close the Options window

3. Load the web page that contains your flash video. Make sure it streams all the way. This means you now have it in your computer's cache.

4. Open a new tab and write "about:cache" in the address bar (without the "quotes").


5. Under "Disk cache device", copy the path shown for the cache directory.


6. Paste that path in My Computer, or navigate to it however you want.

7. Order files by size.

8. The biggest file should be your video. It's going to have a weird name like 54DDEA30e01 but that's fine. This is your video.

9. Open the file with a media player that supports the format, such as VLC Player.

NOTE: Most likely, your computer won't know which software to run this file type with, so just select "open file with" option after clicking the file with the secondary mouse button, and choose VLC Player.
Related Posts Plugin for WordPress, Blogger...
 

Copyright @ 2013 All Rights Reserved.