04.25

TeraCopy Software Super Faster Copy And Move Vile

TeraCopy is a compact program designed to copy and move files at the maximum possible speed.


Features:

  • Copy files faster. TeraCopy uses dynamically adjusted buffers to reduce seek times. Asynchronous copy speeds up file transfer between two physical hard drives.
  • Pause and resume file transfers. Pause copy process at any time to free up system resources and continue with a single click.
  • Error recovery. In case of copy error, TeraCopy will try several times and in the worse case just skips the file, not terminating the entire transfer.
  • Interactive file list. TeraCopy shows failed file transfers and lets you fix the problem and recopy only problem files.
  • Shell integration. TeraCopy can completely replace Explorer copy and move functions, allowing you work with files as usual.
  • 64-bit OS support. Shell integration works in both 32-bit and 64-bit versions of XP

Download this tools at Here or Here.
Read More..

00.10

Top 101 Sites to Search files over Rapidshare Servers

Here is the Top 101 Sites that could help you get files you ever wanted..from Rapidshare!
This is a excellent list and should be bookmarked for all those Chronic Downloaders..


This is purely for eductaional Purpose...

If you didn’t know, RapidShare is one of the largest file hosting website. Rapidshare claims to have a storage capacity of several petabytes (a petabyte is a million gigabytes) of files and an internet connection that transfers hundreds of gigabytes simultaneously. You can imagine the amount of files that is hosted there.

Too bad RapidShare doesn’t have an official search engine for people to find files in its servers. Fortunately I found a total of 99 RapidShare search engine websites and 2 free software that can help you find files hosted in RapidShare according to the keywords. With the help of 101 rapidshare search engines, searching for files in RapidShare is no longer a problem!

Also Visit AlphaBlog for more similar articles...

Here is the Exclusive List :

1. RapidShare1 - Rapidshare Search Engine


2. RapidShare Searcher - Search in rapidshare.com


3. FileZ - Rapidshare Search - File Search

4. LoadingVault - RapidShare Search

5. RapidOSearch - RapidShare Search Engine


6. Rapidoogle - The RapidShare Search Engine


7. HellaFiles - Rapidshare and Megaupload Search Engine

8. RapidShare-Search-Engine - Find files on rapidshare

9. FileCrop - Find Rapidshare & Megaupload files


10. ThuVienPHP - RapidShare Search Engine from Vietnam

11. RapidZilla - Your rapidshare.com search engine

12. OplaHol - We find any file for you

13. FileSearch - Advanced Search Engine for Rapidshare Files


14. FileScoop - Makes File Searching a Snap

15. FilesBot - File Storages Search Engine

16. SearchFiles.de - The Premium File Search Engine

17. OneClickFiles - Search for files on rapidshare, megaupload, etc


18. SearchShared - Search Shared File Servers

19. FilesTube - Every search is a direct hit

20. Rapidfox - RapidShare Search Engine

21. ShareMiner - Search Files on Rapidshare, Megaupload, SendSpace, ZShare


22. ShareDigger - File Search Engine

23. Share4VN - Download Everything You Need!

24. JuSearch - File Hosting Search

25. Avun - File Hosting Search


26. FilesHunt - Rapidshare Search Engine

27. MEGAPID - Official RapidShare Search Engine

28. TotMe! - Rapidshare Search Engine

29. FileSearch - Rapidshare and megaupload file search engine


30. MegaDownload - Megaupload and Rapidshare search engine

31. RapidLibrary - RapidShare Search Engine

32. RapidAll - Rapidshare and others Web Host download Search!

33. RapidSearch.CA - RapidShare Search Engine


34. Gappon - Your Rapidshare, megaupload, mediafire search engines

35. Search4File - Free file search on RapidShare, Youtube and more

36. NewRapidHunter - The easy way to find rapidshare files

37. LoadEvery - More than Search!


38. FileField - Search for files download

39. Leecha - Get it while it’s hot

40. RapidShareIndex - Rapidshare Search Engine


41. RapidRat - RapidShare Search Engine


42. RSDown - Rapidshare links search engine

43. Search.jrfreelancer.com - File Search Engine

44. Sharech - Search for files on the best servers download


45. RapidBurner - RapidShare Search Engine


46. RapidshareDATA - RapidShare Search Engine

47. Search Rapidshare and Megaupload

48. SharingEngines - Search rapidshare megaupload torrents emule mp3 movies


49. QuickSearch - Find needed files from RapidShare Links


50. Funfail - File Search

51. InfoBind RapidSearch

52. 4Chan - RapidShares


53. MegaTao - RapidShare RssSearch


54. RapidExplorer - RapidShare Megaupload Search Engine

55. Busca-RapidShare - Buscador de Rapidshare

56. DownloadList - Download RapidShare Search Engine File


57. rsSearch - Rapidshare Search Engine


58. Rapidor - RapidShare Search Engine

59. RapidSearch.in - Rapidshare links search

60. UVRX - Internet Search


61. BioScience - Search Shared Files


62. ShowIP - RapidShare Search Engine

63. Rapidshare Meta search engine

64. Rapidwolf - RapidShare Search Engine


65. FindAnyLinks - RapidSearch and Other Hosts Download Links Finder


66. RSFilez

67. Jwagal - Rapidshare search

68. Search Rapid Share . net - RapidShare Search Engine


69. RapidSearchLinks - The easiest way to share your file around


70. Megaxo - Search RapidShare, Search MegaUpload

71. DDL Search - Rapidshare search engine

72. RapidSurfing - RapidShare Search Engine


73. Rapidsharelink - Rapidshare Search Engine


74. JamesWatt - RapidShare and Megaupload Search

75. RapidLinks - Locate Your Links Rapidly

76. FreeXFile - Your RapidShare Search Engine


77. 890m rapidshare download search


78. RapidZero - Rapidshare Search Engine

79. DiggRapidShare - Search Your RapidShare Files

80. EliteSearch - Direct Download Search Engine


81. SharingRapid - Search rapidshare megaupload and more


82. 5iles - The Best Search Engine

83. INetList.com - Your RapidShare Search Engine

84. Search-File


85. PakAdTrader - Rapid Search


86. Shared File Searcher

87. LiveThunder Files

88. ShareMinerScript - My Query Builder


89. Medianet - RapidShare Search Engine

90. RapidShareFinder


91. FNETS - Search Rapidshare Files

92. ShareYard Search


93. HuHiHo - Universal File Search

94. goinFiles

95. Yourfile.US


96. GoFileZ File Search Engine

97. RSFind - RapidShare Files Search


98. RapidSeek - Search Shared Files

99. Rapid2Share - RapidShare Search Engine


100. RapidMe - RapidShare Search Engine Software

101. RapidSeek .NET Pro 2007 - Seek links to files on RapidShare network software

thx : hack5
Read More..

00.05

As an IT Pro, I routinely monitor employee’s computers and emails. It’s essential in a work environment for administrative purposes as well as for security. Monitoring email, for example, allows you to block attachments that could contain a virus or spyware. The only time I have to connect to a user’s computer and do work on directly their computer is to fix a problem.

However, if you feel that you are being monitored when you shouldn’t be, there are a few little tricks you can use to determine if you’re right. First off, to monitor someone’s computer means that they someone can watch everything that you are doing on your computer in real time. Blocking porn sites, removing attachments or blocking spam before it gets to your Inbox, etc is not really monitoring, it’s more like filtering.

Computer Monitoring

So now, if you still think someone is spying on you, here’s what you can do! The good thing right now is that neither Windows XP SP2 nor Windows Vista support multiple concurrent connections while someone is logged into the console (there is a hack for this, but I would not worry about). What this means is that if you’re logged into your XP or Vista computer (like you are now if you’re reading this), and someone were to connect to it using the BUILT-IN REMOTE DESKTOP feature of Windows, your screen would become locked and it would tell tell you who is connected.

So why is that useful? It’s useful because it means that in order for someone to connect to YOUR session without you noticing or your screen being taken over, they have use third-party software and it’s a lot easier to detect third-party software than a normal process in Windows.

So now we’re looking for third-party software, which is usually referred to as remote control software or virtual network computing (VNC) software. First, the easy thing to do is to simply check in your Start Menu All Programs and check whether or not something like VNC, RealVNC, TightVNC, UltraVNC, LogMeIn, GoToMyPC, etc is installed. A lot of times IT people are sloppy and figure that a normal user won’t know what a piece of software is and will simply ignore it. If any of those programs are installed, then someone can connect to your computer without you knowing it as long as the program is running in the background as a Windows service.

That brings us to the second point. Usually, if one of the above listed programs are installed, there will be an icon for it in the task bar because it needs to be constantly running to work.

Check all of your icons (even the hidden ones) and see what is running. If you find something you’ve not heard of, do a quick Google search to see what pops up. It’s usually quite hard to remove something from the taskbar, so if there is something installed to monitor your computer, it should be there.


However, if someone really sneaky installed it and nothing shows up there, you can try another way. Again, because these are third-party apps, they have to connect to Windows XP or Vista on different communication ports. Ports are simply a virtual data connection by which computers share information directly. As you may already know, XP and Vista come with a built-in Firewall that blocks many of the incoming ports for security reasons. If you’re not running an FTP site, why should your port 23 be open, right?

So in order for these third-party apps to connect to your computer, they must come through a port, which has to be open on your computer. You can check all the open ports by going to Start, Control Panel, and Windows Firewall.

Click on the Exceptions tab and you’ll see see a list of programs with check boxes next to them. The ones that are checked are “open” and the unchecked or unlisted ones are “closed”. Go through the list and see if there is a program you’re not familiar with or that matches VNC, remote control, etc. If so, you can block the program by un-checking the box for it!

The only other way I can think of to see if someone is connected to your computer is to see if there are any processes running under a different name! If you go to the Windows Task Manager (press Cntr + Shift + Esc together) and go to the Processes tab, you’ll see a column titled User Name.

Scroll through all the processes and you should only see your user name, Local Service, Network Service, and System. Anything else means someone is logged into the computer!

Email & Web Site Monitoring

To check whether your email is being monitored is quite simple. Always, when you send an email from Outlook or some email client on your computer, it has to connect to the email server. Now it can either connect directly or it can connect through what is called a proxy server, which takes a request, alters or checks it, and forwards it on to another server.

If you’re going through a proxy server for email or web browsing, than the web sites you access or the emails you write can be saved and viewed later on. You can check for both and here’s how. For IE, go to Tools, then Internet Options. Click on the Connections tab and choose LAN Settings.

If the Proxy Server box is checked and it has a local IP address with a port number, then that means you’re going through a local server first before it reaches the web server. This means that any web site you visit first goes through another server running some kind of software that either blocks the address or simply logs it.

For your email, you’re checking for the same thing, a local IP address for the POP and SMTP mail servers. To check in Outlook, go to Tools, Email Accounts, and click Change or Properties, and find the values for POP and SMTP server.

If you’re working in a big corporate environment, it’s more than likely that the Internet and email are being monitored. You should always be careful in writing emails or browsing web sites while at the office. Trying to break through the security also might get you in trouble if they find out you bypassed their systems! IT people don’t like that, I can tell you from experience!


Thx.... to : online-tech-tips.com
Read More..

00.53

Detect invisible users on Yahoo Messenger

Are you looking for a quick way to detect whether one of your Yahoo Messenger buddies is ACTUALLY offline or just Invisible? Apparently lots of people would like to know how to detect whether someone is invisible or not! I only realized this because I’ve been asked 10 times! I’m still not sure why it would matter because OBIVOUSLY your buddy doesn’t want to talk to you otherwise they would not be invisible!

But either way, I guess some people just need to know for the sake of knowing (especially guys and gals who want to know whether someone is avoiding them).

So here’s 5 ways I found on the Internet that you can use to discover whether a buddy is really online and set as invisible or whether they are simply logged off.

  1. Invisible Scanner - Does just as the name suggests, finds those invisible folks and exposes them for who they really are! Worked on my tests.

    yahoo invisible scanner

  2. Invisible.ir - Another new one that works really well. You can also do some other things like check multiple Yahoo users at once and detect a users main Yahoo ID.

    find invisible users

  3. Buddy Spy - The other two services mentioned above were web services, but Buddy Spy is a little program that you can download and install on your computer. It suggests that it’s “simply the best in invisible detection”! I’m not so sure about that, but I’ve heard it works most of the time.

    buddy spy

  4. Xeeber.com - Another online service to detect invisible users, but I am putting this at number 4 because it didn’t work when I tried it. Maybe the site was down, but entering and name and clicking search resulted in nothing happening! So maybe it was just bad timing by me because some people swear by it!

    xeeber

  5. BuddyCheck - Another program that you can download and install, which will show you exactly who is online and who is offline. This is the only one that costs some money, about $20, so if you’re REALLY crazy about finding out if someone is truly invisible, this is the app for you!

    buddy check

Any other method you use to detect invisible users on Yahoo? Post a comment and let us know! These of course are not 100% correct all of the time, so you should take the results with a grain of salt. Also, test it first on yourself or a friend to see which one works best. Enjoy!


http://www.online-tech-tips.com/


Read More..

00.02

Friendster Mobile Face Launches in Asia

Friendster is launching its mobile version of its network. Whew. I expected this a lot sooner, considering Friendster’s veteran status and leading position in the Asian market, where mobile networks and devices are better than most other areas in the world.

Nevertheless, Friendster’s dedicated mobile site has arrived, and it’s accessible to all Friendster’s users across the globe (support for various languages is rolling out over the next few weeks). With the new mobile version, you can do just about everything on your handheld as you could with Friendster’s web version, including the option to browse photos, review friend requests, and check out Fan Profiles.

Equally as important, you can search for users by name or email, and stay updated to friends’ birthdays. All the other necessary communication tools are there as well, like posting bulletins and sending messages.

Even though Friendster’s mobile version will feature all of the same tools that you’ll find for the other major mobile social networks like MySpace and Facebook, Friendster’s approach is slightly different, as its largest user base is in Asia. So Friendster will be debuting its mobile site in Indonesia, where it has its most substantial audience.

In an effort to continually appease its growing Asian user base, which reportedly has more mobile Internet users than PC users, the necessity of an optimized mobile version is key to sustained leadership in his part of the world. Even as mobile web browsing becomes more and more standard on handheld devices, there are a number of networks, including MySpace, that are looking to optimized mobile versions for the purpose of expanding its user base and advertising network.

Full-fledged mobile networks may not have completely taken off in the past year to our satisfaction (at least in the US), but improved devices and global expansion is enabling a bigger push for the immediate future.

Read More..

00.15

Create The Best folder lock Without Sotware



All You Need to do is to copy the following code and paste it in a notepad with extension of .bat as : "Pallav.bat"

U sud write ur desired Password at where its written "type your password here" (in red in code) .... Whenever u wanna change ur password u sud open an instance of notepad and open ur "bat" file with it and change ur password and never forget to d -->all files at type of files field ..while reading ur "bat" file otherwise it wont show....

So Copy ur code ......

cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020- 3AEA-1069- A2DD-08002B30309 D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020- 3AEA-1069- A2DD-08002B30309 D}"
attrib +h +s "Control Panel.{21EC2020- 3AEA-1069- A2DD-08002B30309 D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020- 3AEA-1069- A2DD-08002B30309 D}"
ren "Control Panel.{21EC2020- 3AEA-1069- A2DD-08002B30309 D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End
Read More..

00.06

Lie CHANGE YOUR PROCESSOR NAME SHOW PENTIUM 5 OR MORE


CHANGE YOUR PROCESSOR NAME SHOW PENTIUM 5 OR MORE

Follow these steps to show your processor name Pentium 5 or more...


1. Go to "Start".

2. Go to "Run".

3. Type regedit

4. Go to "HKEY_LOCAL_MACHINE"

5. Go to "HARDWARE"

6. Go to "DESCRIPTION"

7. Go to "System"

8. Go to "CentralProcessor"

9. Click on 0 [i.e. Zero]

On right hand side, right click on "ProcessorNameString" and then click on Modify and write whatever you want.

Or Write And Save To VBS File

CreateObject("WScript.Shell").RegWrite "HKEY_LOCAL_MACHINE\ HARDWARE\DESCRIPTION\System\CentralProcessor\ 0\ProcessorNameString" , " Intel(R) Core2 Duo E6600(R) CPU "
Save to format *.vbs Copy to start menu - startup

Read More..

19.00

E-BOOKS Hacking 2008


Create Bootable XP SP integrated CD e-books hacking
Create One-click Shutdown And Reboot Shortcuts.txt Creating a Board aka Forum on your own PC !.rtf
Creating Universal Ghost Usb Boot Disk And Cd.txt
Data Capacity of CDs [Tutorial].txt
Debug, Learn how ***** windows.txt
Delete An undeletable File.txt
Delete Files From The Recent File List In Windows.txt
Digital Camera Guide.txt
Digital Faq-learn Everything About Digital Capture, Edit and Burning and more.txt
Digital Photo Id Cards, Greate Info.txt
Direct Link To Any Page You Want To In Hotmail.txt
Directx Explained.txt
Disable Compression On Xp, NTFS partition, Disk Cleanup.txt
Disable The Send Error Report, to Microsoft.txt
Disable Windows Logo Key.txt
Discover New Music You'll Probably Love.txt
Download Free Music legally, legally.txt
Download from a paypal site without paying a penny!.txt
Download From Ftpz, Using Ftp Search Sitez.txt
Download Mp3's Without Using Filesharing.txt
Download Music And Video With Media Player 9, quick and easy!.txt
Download Timeframes.txt
Dual Boot After The Fact.txt
Dvd Copying-ripping Definitions.txt
DVD Regions Information.txt
Dvd-9 to Dvd+r Dl, Double Layer To Double Layer, 1-1 copies.txt
Easily Disconnect-reconnect From Broadband.txt
Easily Find Serial Numbers On Google.., easy to do and works like a charm.txt
Ebay Hacktip.txt
General Keyboard Shortcuts.txt
Get In Windows 2000 As Administrator.txt
Get the Most Out of Your DVD Recorder.txt
Get The Music You Want To Hear.tx
Get unlimited bandwidth from your host for free.txt
Getting A 1gb Yahoo China Account.txt
Getting Counter-strike Source To Work.txt
getting movies, mp3,games using google.txt
Getting older programs to run on Windows XP.txt
Getting started with Linux for noobs!.txt
Go to Windows updates anonymously.txt
Google Search.txt
Google secrets.txt
Google Tips & Tricks, (utilizing search engine).txt
Graffiti On Walls 4 Adobe Photoshop Cs 8.0.txt
Guide For Getting Free Stuff.txt
Guide to IIS Exploitation.txt
Guide to Slipstreaming Service Pack 2.txt
Hard drive Gone Bad.txt
Hardware Firewall.txt
How To Add An Option To Print, the Contents of a Folder!.txt
How To Add Your Own Windows Tips.txt
How to Back Up the Registry.txt
How To Backup Ps2 Games.txt
HOW TO BLOCK PEOPLE ON WINMX WHO SHARE NOTHING.txt
How To Block Websties Without Software, block websites.txt
How To Boot Xp Faster (updated).txt
How to build a black box.txt
how to burn quicker in windows xp.txt
How to Bypass BIOS Passwords.txt
How To Bypass Web Filters, tutorial.txt
HOW TO CAPTURE STREAMING MEDIA.txt
How To Change A Cmos Battery.txt
How to change the serial number used in Windows XP, Valid for XP Corporate.txt
How To Change Thumbnail Size And Quality.txt
How to clear Bios info 2.txt
How to clear Bios info.txt
How To Convert File System, fat - fat32 to ntfs.txt
How To Copy A Dvd Which Will Play On A X Box.txt
How to copy songs from your iPod to your PC.txt
How To Customise Your start Button.txt
How To Delete Those Persistent Nasty Files.txt 0.53 kB
How To Directly Go To Inbox, Write Msg, w Hotmail, no need for How to find MP3's real quickly.txt 0.35 kB
How To Find Serial Numbers On Google.txt 0.79 kB
How to fix corrupted files in XP.txt 1.48 kB
How to fix Windows Installer problem.txt 0.96 kB
How To Get A Free I-pod Or Flat Screen Tv, check it out.txt 6.62 kB
HOW TO GET ANY WINDOWS PASSWORD.txt 3.41 kB
How to Get someones ISP password, Get free internet.txt 2.65 kB
How To Get Top Ranking, Search Engines.txt 6.58 kB
How To Hack Windows Xp Admin Passwords.txt 2.52 kB
How to hack-change your Windows XP Boot Screen.txt 1.52 kB
how To Hide Yourself From Network Users!, And give access to only specific users!.txt 0.86 kB
How To Make An Animted Logo.txt 5.26 kB
How To Make Free Phone Calls.txt 2.29 kB
How to make key generators.txt 8.83 kB
How To Make Perfect Copies Of Maxis The Sims Discs, CloneCD Style!.txt 1.17 kB
How To Make XP Go Faster.txt 5.58 kB
How To make your own Radio Station 2.txt 3.26 kB
How To Make Your Own Radio Station.txt 1.58 kB
How to Remove DRM Protection for Video Files.txt 2.29 kB
How To Remove Ms Java Vm And Install Sun Java.txt 0.05 kB
How To Remove Signin Details Of Msn Passport.txt 1.04 kB
How To Remove The Default Admin$ Shares.txt 1.03 kB
How to remove the Links folder in IE Favorites.txt 0.59 kB
How to Remove WinXP Splash and See Operations.txt 1.19 kB
How To Rename Extensions With Ease, with a Renamer.bat file!.txt 0.44 kB
How to Rename File Extensions.txt 3.11 kB
How To Rename Multiple Files In Winxp.txt 0.56 kB
How To Restrict Login Hours Allowed.txt 0.58 kB
How to safeguard your files when computer crashes.txt 2.94 kB
How to save Windows xp updates.txt 0.63 kB
how to search google for RAPIDSHARE links.txt 0.98 kB
How To See Hidden Files, Using Dos.txt 0.08 kB
How To Set search For All Files In Winxp.txt 0.71 kB
How to set up a http server running from you computer.txt 3.06 kB
How To Set Up A Proxy In Flashget, As Requested.txt 0.66 kB
How to set up a server with Apache , PHP , MySQL , Perl , phpMyAdmin.txt 8.77 kB
How To Set Up Direct Connect.txt 26.96 kB
HOW TO SET UP FTP SERVER.txt 1.79 kB
How To Set Up Proxies In Your Browser.txt 1.63 kB
How To Set Zone Alarm Settings!, Fix for ZA ports.txt 2.12 kB
How To Setup Your Own Dns (Domain Name Server).txt 6.97 kB
How To Speed Up A Slow Computer.txt 1.21 kB
How To Speed Up Http Requests On Internet Explorer, as above.txt 1.28 kB
How To Stop Spam.txt 8.05 kB
How to swear in all languages.txt 28.32 kB
How To Unload Cached Dll Files To Free Memory.txt 0.56 kB
How to Use and How to Chain Multiple Proxies!.txt 9.70 kB
How To Use File Compression In Windows Xp.txt 4.19 kB
How To Use Google To Download Mp3's, and applications.....txt 0.60 kB
How To Use Newsgroups.txt 0.56 kB
How To Use You Gmail With Msn Messenger.txt 0.37 kB
How-to Get Videos And Dvds Onto Your Sony PlayStation Portable (PSP) for free.txt 12.91 kB
HOWTO Change Windows XP Home to Windows XP Pro.txt 1.67 kB
Important Faqs For Sp2.txt 9.47 kB
Improve Doom 3's Performances!!, simple but efficient trick for every1.txt 4.22 kB
Improve your dialup modem preformance.txt 0.73 kB
Increase XP Folder Settings.txt 0.79 kB
Insert Your Serial For Office 2k, auto install office.txt 1.06 kB
Install A New Hard-disk.txt 5.16 kB
Install Xp From Dos.txt 0.84 kB
Installing Apache on Windows.txt 6.29 kB
Installing Gentoo Linux, Amazing step by step tutoria.txt 0.19 kB
Installing IIS On Windows Xp Pro.txt 3.04 kB
Installing Slackware Linux.txt 34.73 kB
Instructions For Removal Of Advertising In Msn Messenger.txt 2.59 kB
Ip Address Structure, Expilinatin OF IP Address {A short way}.txt 7.65 kB
Irc How To Downlaod From, How to downlaod from IRC.txt 3.95 kB
Irc Servers On nix, For people who want to start own IRC net.txt 0.48 kB
Keep Files Private.txt 1.51 kB
Keep Folders Hidden.txt 0.46 kB
Keyboard Shortcuts Result in Excel 2000 - Movement.txt 1.57 kB
Keyboard Shortcuts, Microsoft Word.txt 2.37 kB
Keyboard Shortcuts, must read.txt 3.72 kB
Kill Microsoft Instant Messenger.txt 0.28 kB
Lamination Tips, Its a Fast TUT......txt 1.98 kB
Leet Way To Get Your Ip In Windows Xp.txt 0.26 kB
Linking Your Xbox To Your Computer.txt 33.52 kB
Linux Howto's.txt 0.08 kB
List Of Sites Not To Go To.txt 4.32 kB
Little help for anonymous mailer.txt 1.56 kB
Lots Of Windows Xp Tips, Take A Look !.txt 12.43 kB
Lyrics With Google.txt 0.08 kB
Make A Autorun File For Ur Cd.txt 0.66 kB
Make A Batch File To Clean UR PC!!, All In One!!.txt 1.37 kB
Make A Roughly 16 Hour Video Dvd.txt 1.01 kB
Make Acrobat Reader 6 load faster.txt 0.42 kB
Make Dvd Iso From Suse 9.2 5 Cds Iso, Linux mode and Windows mode ISO creation.txt 7.41 kB
Make Mp3 Files Smaller Without Losing Quality.txt 0.73 kB
Make Your Own Ringtones For Mobile Phone, also logos, wallpaper, etc.txt 3.00 kB
Make Your Pc Faster, Guaranteed.txt 6.23 kB
MakeXPgoFaster.txt 5.74 kB
making a .cue file, in notepad.txt 0.53 kB
Making A .txt Executable Server.txt 1.60 kB
Making Bootable Floppy Disk to Boot into Windows.txt 4.82 kB
Making Cd Version Of Doom3 Into Dvd Version.txt 0.75 kB
Making Web Page Fonts Consistent and Uniform.txt 0.80 kB
Manage Saved Ie Passwords.txt 0.75 kB
Mastering The Windows XP Registry.txt 5.79 kB
Maximize Dial-up Modem Settings.txt 2.31 kB
Microsoft's Really Hidden Files, Reveled Hidden files.txt 33.95 kB
mIRC Not Just Another Chat Client, Download Anything You Want Almost.txt 4.37 kB
mIRCcommands.txt 10.10 kB
Misc Linux Tips & Tricks.txt 18.55 kB
Missing Administrator Account.txt 0.52 kB
Mobile Secret Codes.txt 31.09 kB
Modify .exe Files And ***** A Program.txt 3.06 kB
More Hacking/A beginners guide to Hacking UNIX.txt 5.61 kB
More Hacking/A *****ing Tutorial/C101-90.000 3.85 kB
More Hacking/A *****ing Tutorial/C101-90.001 32.32 kB
More Hacking/A *****ing Tutorial/C101-90.002 30.93 kB
More Hacking/A *****ing Tutorial/C101-90.003 14.75 kB
More Hacking/A *****ing Tutorial/C101-90.004 54.91 kB
More Hacking/A *****ing Tutorial/ED!SON.NFO 1.58 kB
More Hacking/A Guide to Internet Security- Becoming an Ueber*****er.txt 8.56 kB
More Hacking/A Guide to the Easiest Hacking there is.txt 4.58 kB
More Hacking/A List Of Some OF The Most Useful UNIX Hacking Commands.htm 23.03 kB
More Hacking/A Small Guide to Hacking HOTMAIL.txt 3.02 kB
More Hacking/A UNIX Hacking Tutorial.txt 82.20 kB
More Hacking/Almost Everything You Ever Wanted To Know About Security (but.txt 47.52 kB
More Hacking/An Indepth Guide in Hacking UNIX and the concept of Basic Net.txt 40.84 kB
More Hacking/An Introduction to Denial of Service.txt 44.78 kB
More Hacking/An Introduction to the Computer Underground.txt 17.03 kB
More Hacking/Basic Networking.txt 14.04 kB
More Hacking/BBS Crashing Techniques.txt 3.72 kB
More Hacking/BRUTE- A brute force approach to hacking Unix passwords.txt 3.31 kB
More Hacking/Closing the Net.txt 30.69 kB
More Hacking/Compression and *****s for Dummies.txt 52.75 kB
More Hacking/Computer Bulliten Boards and the Law.txt 56.06 kB
More Hacking/Computer Chrime - Current Practices, Problems and Proposed So.txt 96.53 kB
More Hacking/Computer eMail and Privacy.txt 19.18 kB
More Hacking/Computer Hackers News Articles.txt 5.89 kB
More Hacking/Computer Rights vs First and Forth Amentment Right.txt 44.24 kB
More Hacking/Computer Security.txt 63.52 kB
More Hacking/Computer Security_2.txt 51.94 kB
More Hacking/Computer Viruii.txt 19.98 kB
More Hacking/Computerized Governmental Database Systems Containing Persona.txt 40.34 kB
More Hacking/COPS and Robbers-Unix System Security.txt 35.18 kB
More Hacking/Copyright Guides for Photographers.txt 17.02 kB
More Hacking/Crash Course in X Windows Security.txt 12.45 kB
More Hacking/Crime and Puzzlement.txt 62.34 kB
More Hacking/Cultural Formations in Text-Based Virtual Realties.txt 257.27 kB
More Hacking/Cyberspace and the Legal Matrix- Laws or Confusion.txt 20.53 kB
More Hacking/Dark Angel's Phunky Virus Writing Guide .txt 18.90 kB
More Hacking/Defamation Liability of Computerized Bulliten Board Operators.txt 101.36 kB
More Hacking/Dept of Treasury Letter.txt 11.25 kB
More Hacking/Electronic Bulliten Boards and 'Public Goods' Explainations o.txt 45.84 kB
More Hacking/Electropolos - Communication and Comunity on IRC.txt 112.45 kB
More Hacking/Ethload User's Guide.txt 81.28 kB
More Hacking/Formulating A Company Policy on Access to and Use and Disclos.txt 12.14 kB
More Hacking/Free Speech in Cyberspace.txt 244.25 kB
More Hacking/Gender Issues in Online Communications.txt 24.86 kB
More Hacking/Government Computer Security Techniques.txt 7.88 kB
More Hacking/HACKDICT.TXT 272.00 kB
More Hacking/Hacker Test.txt 20.84 kB
More Hacking/Hackers A-Z.TXT 256.00 kB
More Hacking/Hackers Who Break into Computer Systems.txt 57.40 kB
More Hacking/Hacking Bank Of America's Home Banking System.txt 5.79 kB
More Hacking/Hacking Compuserve Infomation Service.txt 7.43 kB
More Hacking/Hacking Faq.txt 42.06 kB
More Hacking/Hacking GTE Telemail.txt 19.12 kB
More Hacking/Hacking IRC - The Definitive Guide.txt 13.72 kB
More Hacking/Hacking PC-Pursuit Codes.txt 8.10 kB
More Hacking/Hacking Techniques.txt 8.52 kB
More Hacking/Hacking TRW.txt 2.58 kB
More Hacking/Hacking TYMNET.txt 5.79 kB
More Hacking/Hacking Unix System V's.txt 10.93 kB
More Hacking/Hacking Wal-Mart Computers.txt 4.09 kB
More Hacking/Hacking Webpages.txt 3.90 kB
More Hacking/How the Traditional Media Clasifications Fail to Protect in t.txt 40.50 kB
More Hacking/How to crash AOL.txt 4.75 kB
More Hacking/How to dial out of a UNIX System.txt 3.49 kB
More Hacking/How to find Security Holes.txt 15.99 kB
More Hacking/How to get a Shell in 24 hours.txt 7.98 kB
More Hacking/How to Hack UNIX System V.txt 10.93 kB
More Hacking/How to login to a C.B.I. System.txt 3.00 kB
More Hacking/How to send ICQ Bombs.txt 2.33 kB
More Hacking/Information of Hacking AngelFire Websites.txt 3.21 kB
More Hacking/Introduction to Denail of Service.txt 44.78 kB
More Hacking/IP addressing, and gaining IP's.txt 13.70 kB
More Hacking/IP Addressing.txt 13.70 kB
More Hacking/ISSN Numbers- An Introduction.txt 5.96 kB
More Hacking/Junk Mail- How Did They All Get My Address.txt 12.70 kB
More Hacking/LENROS~1.TXT 184.58 kB
More Hacking/LENROS~2.TXT 7.41 kB
More Hacking/MEMETICS.TXT 45.79 kB
More Hacking/MINDVOX.TXT 64.57 kB
More Hacking/MORRIS~1.TXT 31.18 kB
More Hacking/NEIDOR~1.TXT 41.02 kB
More Hacking/NFS Tracing.txt 34.20 kB
More Hacking/Nightline- FBI,Privacy,and Proposed Wire-Tapping Legislation.txt 20.86 kB
More Hacking/NY_2'S Guide to Obtaining An IP Address. .doc 10.50 kB
More Hacking/Organizational Analysis in Computer Science.txt 65.00 kB
More Hacking/PGP Startup Guide.htm 26.00 kB
More Hacking/Presumed Guilty.txt 153.76 kB
More Hacking/Raising Hell with Unix.txt 12.91 kB
More Hacking/Remarks of the President and Vice President to Silicon Valley.txt 37.70 kB
More Hacking/RIGGSB~1.TXT 54.03 kB
More Hacking/RIGGS_~1.TXT 54.03 kB
More Hacking/RIGHTS~1.TXT 7.99 kB
More Hacking/RIVERA.TXT 26.43 kB
More Hacking/Security holes.txt 11.77 kB
More Hacking/Seisure Warrent Documents for Ripco BBS.txt 72.01 kB
More Hacking/Site Security Handbook.txt 247.43 kB
More Hacking/SJ-DEC~1.TXT 45.03 kB
More Hacking/SJ-RESP.TXT 69.59 kB
More Hacking/SMTP-Simple Mail Transfer Protocol.txt 117.61 kB
More Hacking/Summary of FBI Computer Systems.txt 5.07 kB
More Hacking/SUNDEVIL.TXT 100.17 kB
More Hacking/SUPREM~1.TXT 56.70 kB
More Hacking/TCP packet fragment attacks against firewalls and filters.txt 4.39 kB
More Hacking/Telenet-The Secret Exposed.txt 9.91 kB
More Hacking/The Basics of Hacking- Introduction.txt 24.82 kB
More Hacking/The Baudy World of the Byte Bandit-A Postmodernist Interpreta.txt 85.17 kB
More Hacking/The Constitution in Cyberspace.txt 46.60 kB
More Hacking/The *****ing Manual.txt 86.38 kB
More Hacking/The Electronic Communication Privacy Act of 1986 - A Laymans .txt 10.04 kB
More Hacking/The Greatest Hacker of all time.ASC 25.02 kB
More Hacking/The Hacker's League.txt 12.37 kB
More Hacking/The Inner Circle Book's Hacking Techniques.txt 1.96 kB
More Hacking/The Lamahs-Guide to Pirating Software on the Internet.txt 12.21 kB
More Hacking/The M.M.C. Guide to Hacking, Phreaking, Carding.txt 19.11 kB
More Hacking/The National Information Infrastructure-Agenda for Action.txt 96.49 kB
More Hacking/The Newbies Handbook- ' How to beging in the World of Hacking.txt 43.83 kB
More Hacking/The Newbies-User's Guide to Hacking.txt 47.35 kB
More Hacking/The Pre-History of Cyberspace.txt 60.25 kB
More Hacking/The Price of Copyright Violation.txt 73.11 kB
More Hacking/The REAL way to hack RemoteAccess.txt 12.12 kB
More Hacking/The Secret Service, UUCP,and The Legion of Doom.txt 19.63 kB
More Hacking/the UNIX operating system (Berkley 4.2).txt 13.55 kB
More Hacking/Theft of Computer Software-A National Security Threat.txt 12.22 kB
More Hacking/Thoughts on the National Research and Education Network.txt 19.72 kB
More Hacking/Tips on Starting Your Own BBS.1 8.04 kB
More Hacking/undocumented DOS commands.txt 23.17 kB
More Hacking/UNIX Computer Security Checklist.0 49.34 kB
More Hacking/UNIX Use and Security - By the Prophet.txt 153.74 kB
More Hacking/UNIX Use and Security From The Ground Up.htm 135.60 kB
More Hacking/UNIX- A Hacking Tutorial.SIR 82.26 kB
More Hacking/Viruii FAQ.txt 4.07 kB
More Hacking/Virus-Trojan FAQ.txt 1.95 kB
More Hacking/What Files are Legal for Distribution on a BBS.txt 20.83 kB
More Hacking/What To Look For In A Code Hacking Program.htm 5.56 kB
More Hacking/What To Look For In A Code Hacking Program.txt 5.46 kB
More Hacking/What You Should Know About Computer Viruses.DNA 16.91 kB
More Xp Tips and tricks make your computer more faster.txt 46.14 kB
Moving and Removing the Start Button.txt 0.66 kB
Msn Messenger & Gmail.txt 3.69 kB
My Flash Bookmarks, long list of tutorials.txt 2.98 kB
Myth about WPA ( How it is done ), Windows Product Activation Technique.txt 45.54 kB
Nero How To Verify The Validity Of The Sn U Use.txt 0.88 kB
New Hacking Ebooks/A Basic UNIX Overview.rtf 22.46 kB
New Hacking Ebooks/A BEGINNERS GUIDE TO Hacking Unix.txt 6.05 kB
New Hacking Ebooks/A Novice's Guide to Hacking 2004.txt 40.75 kB
New Hacking Ebooks/A Novice's Guide To Hacking.txt 8.58 kB
New Hacking Ebooks/A Short HACKER SPEAK Glossary.txt 9.78 kB
New Hacking Ebooks/A simple TCP spoofing attack.txt 14.60 kB
New Hacking Ebooks/Accessing the bindery files directly.txt 3.97 kB
New Hacking Ebooks/An Architectural Overview of UNIX Network Security.htm 53.27 kB
New Hacking Ebooks/Anonymity complete GUIDE.rtf 28.90 kB
New Hacking Ebooks/ANONYMOUS emails.txt 3.15 kB
New Hacking Ebooks/Anonymous FTP FAQ.htm 28.14 kB
New Hacking Ebooks/ANSIBombs II Tips And Techniques.txt 10.05 kB
New Hacking Ebooks/attacks on networks how to stop.htm 67.77 kB
New Hacking Ebooks/Backdoor.txt 18.71 kB
New Hacking Ebooks/Backdoors.txt 19.15 kB
New Hacking Ebooks/BBS CRASHING TECHNIQUES.txt 3.72 kB
New Hacking Ebooks/Bust Avoidance For ~censored~.txt 5.82 kB
New Hacking Ebooks/Firewall Protection how to.rtf 33.12 kB
New Hacking Ebooks/Guide to Hacking with sub7.doc 106.00 kB
New Hacking Ebooks/hacking and phreaking.doc 168.00 kB
New Hacking Ebooks/Hacking for Dummies Volume 2.doc 147.00 kB
New Hacking Ebooks/Hacking For Newbies.doc 54.00 kB
New Hacking Ebooks/hacking in telnet ftp.rtf 57.47 kB
New Hacking Ebooks/hacking on Telnet explained.doc 16.25 kB
New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 1.doc 4.58 kB
New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 2.doc 8.25 kB
New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 3.doc 4.51 kB
New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 4.doc 0.00 kB
New Hacking Ebooks/Hacking On XP 1-5/hacking on XP part 5.doc 0.00 kB
New Hacking Ebooks/hacking password protected site.doc 26.50 kB
New Hacking Ebooks/Hacking Password Protected Website's.doc 3.06 kB
New Hacking Ebooks/hacking passwords.doc 26.50 kB
New Hacking Ebooks/How to learn to hack in easy steps.doc 100.00 kB
New Hacking Ebooks/How to use the Web to look up information on hacking.doc 16.28 kB
New Hacking Ebooks/IP how to.rtf 5.15 kB
New Hacking Ebooks/NetBios explained.doc 26.68 kB
New Hacking Ebooks/Proxy how to.rtf 3.13 kB
New Hacking Ebooks/Routing Basics.pdf 30.25 kB
New Hacking Ebooks/telnet trick port 25.doc 1.76 kB
New Hacking Ebooks/Yahoo Chat Commands how to.rtf 0.93 kB
New Pc Or New Motherboard.txt 3.77 kB
New Way To Relive Some Zinio File.txt 1.95 kB
news groups the how to do.txt 11.40 kB
Nice list of windows shortcuts.txt 7.50 kB
No Text Icons.txt 0.29 kB
Ntfs Cluster Size, better harddrive performance.txt 1.34 kB
Official Unattended Xp Cd Guide Xp Sp2 @ Msfn.org.txt 0.91 kB
Open Windows Explorer To A Different Default Direc.txt 0.74 kB
Optimize Broadband & Dsl Connections.txt 1.91 kB
Optimize Emule Connection.txt 1.20 kB
Outpost Rules, Outpost rules for system & app.txt 7.32 kB
Outsmarting System File Protection.txt 5.37 kB
Overclocking_Tutorial.txt 7.67 kB
Packet Attacks - Version 1.1, { Packet_Attack_Exlained}.txt 25.94 kB
Part 0 Dc++.txt 4.11 kB
Part 1 Bittorrents.txt 4.19 kB
Part 2 Irc (mirc).txt 4.91 kB
Part 3 Ftp.txt 2.71 kB
Partitioning Your Harddisk With Fdisk.txt 2.13 kB
Pc File Extention Listing.txt 26.48 kB
Pc Maintenance Guide.txt 10.20 kB
Peer2mail Tutorial.txt 9.37 kB
Performance Increase Through My Computer.txt 0.53 kB
Phreaking/2600 Hertz Single Tone Generator Schematic.txt 1.95 kB
Phreaking/A List of every TeleNet code that there is.txt 1.96 kB
Phreaking/A List Of Government BBS Numbers.txt 13.07 kB
Phreaking/An Extensive Guide to Bell System Man Holes.txt 10.10 kB
Phreaking/An Introduction into TeleScan.txt 3.98 kB
Phreaking/An Introductory Guide To TeleNet Commands.txt 2.20 kB
Phreaking/Area Codes and Time Zones.txt 4.90 kB
Phreaking/Becoming A Phreaker - The Quick n' Easy Way.txt 17.09 kB
Phreaking/Bell Hell Volume #1.txt 10.29 kB
Phreaking/Bell Hell Volume #2.txt 15.92 kB
Phreaking/Breaker B0X.txt 1.96 kB
Phreaking/busybox.txt 1.61 kB
Phreaking/Cellular Listening with a TV .txt 1.96 kB
Phreaking/Cellular Telephone Phreaking Phile Series VOL 1.txt 10.00 kB
Phreaking/Drake's Phreaking Tutorial.txt 3.34 kB
Phreaking/Hacking VoiceMail Systems.txt 25.89 kB
Phreaking/How BT phone cards works.txt 4.18 kB
Phreaking/How Phone Phreaks are Caught.txt 12.00 kB
Phreaking/How to Bill All Of your Fone Calls To Some Poor, Unsuspecting.txt 11.38 kB
Phreaking/How to make a Free Phone Call.txt 2.16 kB
Phreaking/How to Put an End to Unwanted or Harassing Phone Calls.HAR 12.10 kB
Phreaking/Phone Systems Tutorial by The Jolly Roger.txt 8.68 kB
Phreaking/Phreakers Handbook.txt 9.83 kB
Phreaking/Quick Phone Modifications.txt 4.12 kB
Phreaking/The ABC's of Payphones part 1.txt 2.58 kB
Phreaking/The ABC's of Payphones part 2.txt 2.12 kB
Phreaking/The ABC's of Payphones part 3.txt 2.21 kB
Phreaking/The ABC's of Payphones part 4.txt 2.64 kB
Phreaking/ThE Beige BoX .txt 6.23 kB
Phreaking/The History of British Phreaking.htm 8.29 kB
Phreaking/The M.M.C. Guide to Hacking, Phreaking, Carding.txt 19.11 kB
Phreaking/The Moterola Bible.txt 116.99 kB
Phreaking/The Myth of the 2600Hz Detector .txt 6.55 kB
Phreaking/The Official Phreaker's Manual.txt 499.25 kB
Phreaking/The Phreakers Handbook-1.txt 62.87 kB
Phreaking/The Telephone Works.txt 9.25 kB
Phreaking/The Ultimate Phreaking Guide .txt 1.96 kB
Phreaking/Understanding the Telephone System.txt 16.34 kB
Phreaking/Zen and the Art of Fone Phreaking `97 .txt 66.74 kB
Play Games On PS2 Without ModChip.txt 5.37 kB
Play On A Bnet Emulator, and f off cd key check =).txt 1.81 kB
Port Numbers.txt 40.19 kB
Problem With Internet Navigation, Clean Host File.txt 0.47 kB
Quick Fix For Spyware, Try This Before Doing Surgery on Your OS.txt 1.77 kB
Quick Msc.txt 0.50 kB
Quick Shutdown for XP, How to create a shutdown shortcut..txt 0.54 kB
Quickly Start The Shared Folder Wizard.txt 0.40 kB
Rapidshare hack!!!!! Free premium acount for all.txt 3.08 kB
Rapidshare Hacked, unlimited upload, no countdown.txt 1.72 kB
Rapidshare Timelimit.txt 0.98 kB
Read This! Av Compare!.txt 7.56 kB
Recover A Corrupted System File.txt 1.10 kB
Recover a Quick erased CD RW.txt 3.89 kB
Reformat&Reinstall.txt 2.58 kB
Regedit.exe & Regedt32.exe, Whats the difference.txt 2.87 kB
Registry Disassembled a basic tutorial.txt 7.10 kB
Reinstall Internet Explorer 6.txt 1.13 kB
Release Codes, Read, and Learn....txt 2.29 kB
Remote Desktop Through Company Firewall.txt 2.59 kB
Remote Shutdown.txt 1.22 kB
Remove Linux From Your Pc Safely, ...and restoring your MBR.txt 1.66 kB
Remove Msn Messenger From Xp, several ways...txt 4.99 kB
Removing Banners From Free Webhosts.txt 2.69 kB
Removing Norton Anti-virus 2004, How to remove the Registry Enteries.txt 0.97 kB
Rename 'recycle Bin' To Whatever You Want.txt 0.66 kB
Reregister All .dll Files Within Registry.txt 1.54 kB
Reset your lost Bios Password.txt 4.24 kB
Restore JPG,JPEG,JPE Default File associations, Win XP Tweak.txt 1.28 kB
REVERSE CODING.txt 15.11 kB
Run Aol Without Using Aol Browser & Save Resources, connect permanently and use any browser.txt 0.44 kB
Running A Board forum From Your Own Pc.txt 2.32 kB
Running Vanishing Console Programs With A Click!, Ever had a console program that vanis....txt 1.13 kB
Safely Editing the Registry....txt 1.86 kB
Save Your Desktop Icon Settings.txt 2.18 kB
Saving and loading Photoshop actions.txt 1.79 kB
Scheduled Tasks - Defrag, how to set up scheduled defrags.txt 1.92 kB
ScreenLock Professional v2.0.41.txt 0.04 kB
SEARCH eBOOK in FTP SEARCH ENGINE.txt 0.43 kB
Search For Ebook Server With Google.com.txt 0.35 kB
Search like a real warez d00dz, for warez of course!.txt 0.57 kB
Searching For Something To Download, This may help.txt 0.34 kB
Secret Backdoor To Many Websites.txt 2.09 kB
Secrets Of Lock Picking.txt 53.74 kB
Securing WinXP Pro (with what win-xp has to offer.txt 9.60 kB
Securing your WINDOWS XP computer.txt 1.19 kB
Set Google as your Default Search in IE.txt 0.55 kB
Set Win Explorer to open the folder you want!, Little trick.txt 0.23 kB
sick of inserting winxp cd every time your pc asks, Change Default Location of i386 Folder.txt 3.21 kB
sidebar fix.txt 0.57 kB
Simple Tweaks For Peak Pc Graphics Performance.txt 10.16 kB
Single Click Shutdown.txt 2.82 kB
Single-click To Open An Item..., IF the Folder Options is grayed out.txt 1.19 kB
Slow Loggon Time, one fix for problem.txt 0.96 kB
Slow Opening Of File Dialogs.txt 1.10 kB
Some Cool Site For Tutorials.txt 0.41 kB
Some Google Tricks, again.txt 1.74 kB
Some More Tips To Improve Your Winxp.txt 24.09 kB
Sp2 For Xp Slipstream, Integrate SP2 into your XP CD.txt 10.71 kB
Sp2 Tweaks.txt 3.44 kB
Speed Up Internet.txt 4.46 kB
Speed up menu display.txt 0.54 kB
Speed up Mozilla FireFox.txt 0.45 kB
Speed Up Your Bandwidth By 20% !, Windows uses 20% of your bandwidth.txt 1.02 kB
Speeding up menus in XP.txt 0.27 kB
Speeding up your internet connection under Linux and Windows.html 11.75 kB
Spoofing emails, via telenet.txt 0.41 kB
Standard ASCII Character Set.txt 1.79 kB
Steps to Clean Install XP.txt 8.23 kB
Stop A Restart Process In 3steps.txt 0.29 kB
Stop Annoying Pop-ups Without Pop-up Blockersoutli.txt 1.23 kB
System Changes To Foil Hackers And Browser Hijacke.txt 7.65 kB
System File Checker For Windows Xp.txt 2.26 kB
Tcpip A Mammoth Description, Short and easy-Everything U want to know.txt 50.96 kB
Testing Wattage Consumption Of Your Computer, Measuring your computer's wattage.txt 9.33 kB
The Antivirus Defense-in-Depth Guide.txt 2.77 kB
The difference between DVD-R, DVD+R, DVD+RW and DVD-RW.txt 3.69 kB
The Modern Phreakers Guide To Beige Boxing.txt 4.32 kB
The Modern Phreakers Guide To Payphones.txt 6.98 kB
The Port Guide, Port number and info.txt 24.64 kB
The Ultimate Guide To Installing Windows Xp Sp2.txt 3.14 kB
Three Ways Of Bypass Starforce Cd Protection.txt 2.48 kB
Tip for shutdown windows - virus.txt 0.39 kB
Tips And Tricks, Windows XP.txt 41.24 kB
Tired Of Reinstalling Windows.txt 2.31 kB
To Get And Show The Ip Via Javascript.txt 0.62 kB
Top 5 Myths About Safe Surfing, PC Magazine.txt 3.36 kB
Transferring Data.txt 6.45 kB
Translating Binary To Text.txt 6.22 kB
Translating Binary to Text2.txt 5.72 kB
Trojan Ports.txt 13.83 kB
Turn MSN Messenger Display Pix into User Pix on XP.txt 2.50 kB
Turn Off Unneeded Services, speed up pc.txt 1.56 kB
Tutorial Get the serial number you need.txt 0.88 kB
Tutorial How to create a bootable Windows XP SP1 CD (Nero).txt 2.17 kB
Tutorials - blacksun.box.sk/coding/Base Number Systems.html 7.78 kB
Tutorials - blacksun.box.sk/coding/BASIC C Socket Programming In Unix For Newbies.txt 21.50 kB
Tutorials - blacksun.box.sk/coding/Basics of am 3mp33j3w.txt 18.64 kB
Tutorials - blacksun.box.sk/coding/Batch File Programming.txt 41.70 kB
Tutorials - blacksun.box.sk/coding/BOOLEAN LOGIC GATES.html 14.04 kB
Tutorials - blacksun.box.sk/coding/C++ Tutorial By Clayman.html 23.77 kB
Tutorials - blacksun.box.sk/coding/Creating A Simple Hit Counter In PHP.html 8.77 kB
Tutorials - blacksun.box.sk/coding/Creating A Simple Search Engine In PHP.html 9.62 kB
Where Is Winipcfg In Winxp.txt 0.62 kB
Who's Seeding The Net With Spyware.txt 5.33 kB
Why wait 35 Seconds at eZshare.txt 1.55 kB
Win 2000 Dr. Watsson.txt 0.23 kB
Windows 2000 Tips & Tricks.txt 4.58 kB
Windows 2003 System Restore, How to activate system restore in W2K3.txt 5.47 kB
Windows Scan Count Down Time.txt 0.54 kB
Windows Shortcuts.txt 12.84 kB
WINDOWS TRUE HIDDEN FILES.txt 9.46 kB
Windows Tweak, Hack Your Start Button.txt 3.25 kB
Windows Xp - Speed Up Your Network and Internet Access.txt 2.70 kB
WINDOWS XP HIDDEN APPS.txt 2.59 kB
Windows XP Registry Tweaks.txt 34.05 kB
Windows XP Startup and Performance Tweaks.txt 1.76 kB
Windows Xp Tips 'n' Tricks.txt 28.51 kB
Windows Xp Tweaks, A work in progress.txt 2.98 kB
Windows XP Tweaks.txt 2.37 kB
WinRar Tutorial - Compression profiles, passwords and more.txt 5.78 kB
Winsock 2 Repair.txt 2.10 kB
WinXP 3 Tips.txt 1.87 kB
Winxp Application Defrag, faster access for used programs.txt 0.30 kB
Winxp Applications Startup Time, Decrease your Applications startup time.txt 1.16 kB
WinXP Bootable CD.txt 2.19 kB
Winxp System Response, reboot whitout rebooting.txt 0.61 kB
Winxp Tips And Tricks, Winsock 2 repair.txt 2.19 kB
Xp Auto Install.txt 1.79 kB
Xp Folder View Does Not Stay To You're Setting., Grab your registry editor and join in.txt 1.87 kB
XP REPAIR INSTALL.txt 5.92 kB
XP Tweaking.txt 15.75 kB
Yahoo + geocities Posts.txt 3.07 kB
Yahoo Messeger, no ad's.txt 0.83 kB
You Want Lots Of Music, Appz, Anything, Try Dex Hunting.txt 1.47 kB
Your Home Page Nevr Being Changed.txt 0.50 kB
Your Own Home Server - Introduction.txt 11.25 kB

Download

Read More..

00.15

How To Hack Fishing Rapidshare Account



So you want to learn how to fish Rapidshare Accounts ? Ok follow the below instructions.

1. First you need to download the fisher files. So here they are:
Note: All the contents in the fisher goes to Dynamike.

DownLoad Link: http://www.mediafire.com/?xbldgimsb3z

2. Extract the files using Winrar which can be downloaded here:

DownLoad Link:http://www.rarlab.com/download.htm

3. Now we need a web host that supports php.
Here are a few (Pick one of those and register on it.):

http://www.freeweb7.com

http://Ripway.com
http://www.110mb.com
http://www.phpnet.us
http://www.byethost.com
http://www.t35.com
http://www.awardspace.com
http://www.free-webhosts.com/free-php-webhosting.php
http://www.freehostia.com
http://www.dajoob.com
http://ifastnet.com
http://007ihost.com
http://www.247mb.com/register.jsp
http://www.10gbfreehost.com/

4. Now you must upload your files. In order to upload files to your web host, you must first nevigate to the "file manager" or anything similar. Upload the config.php, index.php, download.php, and next.php onto your host.
Here are some screenshots (Ripway):

(click on image to maximise)


(click on image to maximise)


5. Now edit config.php.

$website = "http://h1.ripway.com/yourusername/"; //Full Path To Install $phishingnet="yourfisherpasswords.txt" //Textfile Where To Store The Accounts ?>

Screenshots (Ripway):

(click on image to maximise)


(click on image to maximise)



6. Now you need the fisher link.
Here is the format:

http://yourname.fhisherhost.com/rapidshare/download.php?link=[some_real_rapidsharelink]&size=[size_of_the_file]

Below is the one that will ONLY work for ripway:

http://h1.ripway.com/yourusername/download.php?link=[some_real_rapidsharelink]&size=[size_of_the_file]



7. Your fisher is all set up and ready to go :D

Additional tips:
Protect your fisher links with the following sites to help you fish:

http://snurl.com/site/index
http://hide-url.net/
http://www.protectlinks.com/
http://rapidsafe.de/

If you wish you may trick someone with the hyperlink method:

[ URL=www.yourfisherlink.com]The actual Rapidshare Link[/URL ]

VERY IMPORTANT!
DO NOT CHANGE THE PASSWORDS OF YOUR FISHED ACCOUNTS. CHANGING THEM WILL RESULT IN LETTING THE ORGINAL OWNER KNOW THAT THE ACCOUNT IS HACKED. THEY WILL CONTACT RAPIDSHARE WITH THEIR REQUIRED INFO AND GET THEIR ACCOUNT BACK!

By snipeshow Read More..

12.34

How To Increase Perfomance Windows XP


Here is a list of 23s simple measures to Improve Win Xp's Speed . Most of these of these are viable for Vista as well...

Since defragging the disk won't do much to improve Windows XP performance, here are 23 suggestions that will. Each can enhance the performance and reliability of your customers' PCs. Best of all, most of them will cost you nothing.

1.) To decrease a system's boot time and increase system performance, use the money you save by not buying defragmentation software -- the built-in Windows defragmenter works just fine -- and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.


2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.


3.) Ensure that Windows XP is utilizing the NTFS file system. If you're not sure, here's how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it's important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.

4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a "searchable keyword index." As you can imagine, this process can be quite taxing on any system.

The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP's built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.

Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you're a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it.

Here's how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck "Allow Indexing Service to index this disk for fast file searching." Next, apply changes to "C: subfolders and files," and click OK. If a warning or error message appears (such as "Access is denied"), click the Ignore All button.

5.) Update the PC's video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.

6.) Empty the Windows Prefetch folder every three months or so. Windows XP can "prefetch" portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That's fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.

7.) Once a month, run a disk cleanup. Here's how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button -- it's just to the right of the Capacity pie graph -- and delete all temporary files.

8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to "DMA if available" for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.

9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support "cable select," the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.

10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.

11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here's how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don't want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.

12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.

13.) Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here's how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer -- only its responsiveness.

14.) If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.

15.) Visit Microsoft's Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.

16.) Update the customer's anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.

17.) Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts -- that is, anything over 500 -- will noticeably tax the system.

18.) Do not partition the hard drive. Windows XP's NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called "D drive." You'll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won't be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won't need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.

19.) Check the system's RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC's memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.

20.) If the PC has a CD or DVD recorder, check the drive manufacturer's Web site for updated firmware. In some cases you'll be able to upgrade the recorder to a faster speed. Best of all, it's free.

21.) Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.

22.) If you're sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to "Launch folder windows in a separate process," and enable this option. You'll have to reboot your machine for this option to take effect.

23.) At least once a year, open the computer's cases and blow out all the dust and debris. While you're in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks. For more information on this leaking-capacitor phenomena, you can read numerous articles on my site.


Following any of these suggestions should result in noticeable improvements to the performance and reliability of your customers' computers. If you still want to defrag a disk, remember that the main benefit will be to make your data more retrievable in the event of a crashed drive.
Read More..

12.05

Optimize DSL internet connection Up To 500%



These settings allow you to boost the speed of your broadband Internet connection when using a Cable Modem or DSL Router with Windows 2000 and Windows XP.

Open your registry and find the key below.

To open registry go to Start->Run and type Regedit

Create the following DWORD values, as most of these values will not already exist you will need to create them by clicking on 'Edit -> New -> DWORD Value' and then set the value as shown below.


DefaultTTL = "80" hex (or 128 decimal)
Specifies the default time to live (TTL) for TCP/IP packets. The default is 32.

EnablePMTUBHDetect = "0"
Specifies whether the stack will attempt to detect Maximum Transmission Unit (MTU) routers that do not send back ICMP fragmentation-needed messages. The default is 0.

EnablePMTUDiscovery = "1"
Specifies whether the TCP/IP stack will attempt to perform path MTU discovery as specified in RFC 1191. The default is 1.

GlobalMaxTcpWindowSize = "7FFF" hex (or 32767 decimal)
Specifies the system maximum receive window size advertised by the TCP/IP stack.

TcpMaxDupAcks = "2"
Determines the number of duplicate ACKs that must be received for the same sequence number of sent data before "fast retransmit" is triggered.

SackOpts = "1"
Enables support for selective acknowledgements as documented by Request for Comment (RFC) 2018. Default is 0.

Tcp1323Opts = "1"
Controls RFC 1323 time stamps and window scaling options. Possible values are: "0" = disable RFC 1323 options, "1" = window scale enabled only, "2" = time stamps enabled only and "3" = both options enabled.

TcpWindowSize = "7FFF" hex (or 32767 decimal)
Specifies the receive window size advertised by the TCP/IP stack. If you have a latent network you can try increasing the value to 93440, 186880, or 372300.

Exit your registry and restart Windows for the changes to take effect.
Read More..

01.56

Tool Make Install XP from USB


dui lawyers southern california

los angeles drunk driving lawyer


Readme
http://www.msfn.org/board/forums.html

los angeles drunk driving lawyer

car accident lawyers los angeles

mesothelioma attorneys dallas

dallas mesothelioma attorneys



Download
http://www.datafilehost.com/download-b6cb18d5.html Read More..

01.17

Tips Trick Multi Yahoo Messenger



- download

Code:
http://www.wikifortio.com/521511/ym8multi.reg
- klik
- Enjoy..

Read More..

17.39

Hacker Software -Remote-





This tutorial will show you how to hack a computer without your hack tool being detected. With the undetectable program you can monitor/use a keylogger on the victim's computer, take screenshots, and many other things.

Remember that this is 99% undetectable by Anti-Virus programs and FIREWALLS. The tutorial is very well written, and no knowledge of pretty much anything is needed. All tools that you will need are also included. All you need to do is get a suitable victim computer safety tips hack another computer
... xD.

Download
pas : thelion Read More..

12.24

Auto WebSite Submitter



Website Submitter


Description:
Are you need some hit on your traffics ?. Your traffics site is endut2an ?. Submits your website to 2700+ directories increasing your ranking in search engines using back links.

Website Submitter helps you gain important links by submitting your sites to important web directories as well as search engines.
Download here
Read More..

21.05

Free Rapidshare Download


Hey All....
Im Just Share To you
WARNING : NOT GUARANTED IF WEBSITE NOT WORKING

Visit Weebsite:
http://www.search-download.org/ Read More..