Saturday 11 October 2014

Download Torrent file with IDM

Just Follow these Steps:

1. First download the torrent file with .torrent extension which you wish to download from the internet directly without any torrent client like utorrent.


Downloading Torrent Using Internet Download Manager

2. Now open zbigz.com and you will land on its homepage.
3. Then Click on upload Torrent and browse your torrent to transfer and click on Go.
4. Then it will ask you for Free or Premium service, choose Free to proceed further.
5. It will take some time to cache your file. Once the caching is done, click on transfer button to download your file as shown below.
Downloading Torrent Using Internet Download Manager
6. You should have internet download manager installed on your computer so thatdownload start inside IDM. If you don't have IDM don't worry it will download directly.

Note: If you decide on to use Free transfer then you wont be able to transfer file of more then 1 GB

Add your own Windows Tips

Are you sick of seeing the same tips again and again when you first logon to Windows? Now you can change them to whatever you want, whether it's quotes, jokes or a to-do list, anything is possible. Just follow these steps:


Windows Logo

Step 1: Open RUN > Regedit and find the key below.

HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Explorer\ Tips

Step 2: Create a new string valued named by incrementing the existing value names and set it to the required tip text.

Example: Dont forget to visit www.apps-blogger.com

Note: - It works till Windows XP

Thursday 9 October 2014

Block Websties Without any Software

To Block any website just follow these steps:

1] Browse C:\WINDOWS\system32\drivers\etc

2] Find the file named "hosts"

3] Open it in notepad

4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.sitenameyouwantblocked.com , and that site will no longer be accessable.

5] Done!


Screenshot

For Example:-

127.0.0.1 localhost

127.0.0.2 www.blockedsite.com


-->www.blockedsite.com is now unaccessable<--


For every site after that you want to add, just add "1" to the last number in the internal ip (127.0.0.2) and then the addy like before.

For Example:-

127.0.0.3 www.blablabla.com

127.0.0.4 www.blablabla.com

127.0.0.5 www.blablabla.com

Movie Tags

CAM -

A cam is a theater rip usually done with a digital video camera. A mini tripod is sometimes used, but a lot of the time this wont be possible, so the camera make shake. Also seating placement isn't always idle, and it might be filmed from an angle. If cropped properly, this is hard to tell unless there's text on the screen, but a lot of times these are left with triangular borders on the top and bottom of the screen. Sound is taken from the onboard microphone of the camera, and especially in comedies, laughter can often be heard during the film. Due to these factors picture and sound quality are usually quite poor, but sometimes we're lucky, and the theater will be fairly empty and a fairly clear signal will be heard.

TELESYNC (TS) - 

A telesync is the same spec as a CAM except it uses an external audio source (most likely an audio jack in the chair for hard of hearing people). A direct audio source does not ensure a good quality audio source, as a lot of background noise can interfere. A lot of the times a telesync is filmed in an empty cinema or from the projection booth with a professional camera, giving a better picture quality. Quality ranges drastically, check the sample before downloading the full release. A high percentage of Telesyncs are CAMs that have been mislabeled.



TELECINE (TC) -

A telecine machine copies the film digitally from the reels. Sound and picture should be very good, but due to the equipment involved and cost telecines are fairly uncommon. Generally the film will be in correct aspect ratio, although 4:3 telecines have existed. A great example is the JURASSIC PARK 3 TC done last year. TC should not be confused with TimeCode , which is a visible counter on screen throughout the film.

SCREENER (SCR) -

A pre VHS tape, sent to rental stores, and various other places for promotional use. A screener is supplied on a VHS tape, and is usually in a 4:3 (full screen) a/r, although letterboxed screeners are sometimes found. The main draw back is a "ticker" (a message that scrolls past at the bottom of the screen, with the copyright and anti-copy telephone number). Also, if the tape contains any serial numbers, or any other markings that could lead to the source of the tape, these will have to be blocked, usually with a black mark over the section. This is sometimes only for a few seconds, but unfortunately on some copies this will last for the entire film, and some can be quite big. Depending on the equipment used, screener quality can range from excellent if done from a MASTER copy, to very poor if done on an old VHS recorder thru poor capture equipment on a copied tape. Most screeners are transferred to VCD, but a few attempts at SVCD have occurred, some looking better than others.

DVD-SCREENER (DVDscr) -

Same premise as a screener, but transferred off a DVD. Usually letterbox , but without the extras that a DVD retail would contain. The ticker is not usually in the black bars, and will disrupt the viewing. If the ripper has any skill, a DVDscr should be very good. Usually transferred to SVCD or DivX/XviD.

DVDRip - 

A copy of the final released DVD. If possible this is released PRE retail (for example, Star Wars episode 2) again, should be excellent quality. DVDrips are released in SVCD and DivX/XviD.

VHSRip -

Transferred off a retail VHS, mainly skating/sports videos and XXX releases.

TVRip -

TV episode that is either from Network (capped using digital cable/satellite boxes are preferable) or PRE-AIR from satellite feeds sending the program around to networks a few days earlier (do not contain "dogs" but sometimes have flickers etc) Some programs such as WWF Raw Is War contain extra parts, and the "dark matches" and camera/commentary tests are included on the rips. PDTV is capped from a digital TV PCI card, generally giving the best results, and groups tend to release in SVCD for these. VCD/SVCD/DivX/XviD rips are all supported by the TV scene.

WORKPRINT (WP) -

A workprint is a copy of the film that has not been finished. It can be missing scenes, music, and quality can range from excellent to very poor. Some WPs are very different from the final print (Men In Black is missing all the aliens, and has actors in their places) and others can contain extra scenes (Jay and Silent Bob) . WPs can be nice additions to the collection once a good quality final has been obtained.

DivX Re-Enc -

A DivX re-enc is a film that has been taken from its original VCD source, and re-encoded into a small DivX file. Most commonly found on file sharers, these are usually labeled something like Film.Name.Group(1of2) etc. Common groups are SMR and TND. These aren't really worth downloading, unless you're that unsure about a film u only want a 200mb copy of it. Generally avoid.

Wednesday 8 October 2014

Remove an Operating System from Boot Menu

If you have more then one operating system installed or wish to remove an operating system from the boot menu, you can use the following information.

1. Click on Start, Control Panel, System, Advanced.
2. Under Startup and Recovery, click Settings.


Screenshot

3. Under Default Operating System, choose one of the following:

"Microsoft Windows XP Professional /fastdetect"

-or-

"Microsoft Windows 7 /fasdetect"

-or-

"Microsoft Windows 8 /fastdetect"


4. Take the checkmark out of the box for "Time to display a list of Operating Systems".
5. Click Apply and Ok, and reboot the system.

Login as Admin in Windows 2000

NOTE: Requires a boot disk.




To Login as an administrator in Windows 2000 or Windows NT, follow these steps:-

  1. Boot through Windows 2000 disk.
  2. Open Command Prompt and goto C:\winnt\sytem32\config\ and type these commands:

  • attrib -a -r -h
  • copy sam.* a:\
  • del Sam.*
Now, Reboot the computer. There should be no administrator password. Just put in "administrator" and hit enter. 
Tip: Replace the "sam" files to restore the password to hide intrusion.

Saturday 21 June 2014

10 Blacklisted Hacking countries


Here are world's Top 10 countries responsible for Hacking attacks:-

1. China
The Chinese may not always guilty, but have a share
of 41% of hacker attacks. Just one year before
the Republic of China was responsible for only 13%
of cyber attacks according to Akamai, and share
in the third quarter was 33%.

2. U.S.
Every tenth hacker attacks worldwide originated in the United States.

3. Turkey
Bronze medal for Turkey, accounting for 4.7%
of global cybercrime.

4. Russia
Russia is considered to defuse the situation from 6.8% to 4.3% October-December 2012.

5. Š¢aiwan
Taiwanese are responsible for 3.7% of computer
crimes at the end of 2012

6. Brazil
Brazil registered a decline of hacking attacks -
from 4.4% at the end of 2011 to 3.8% in the third
quarter of 2012 and 3.3% - in the fourth.

7. Romania
The seventh is Romania with a share of 2.8%.

8. India
India is responsible for 2.4% of hacking attacks worldwide.

9.Italy
Italy's share falling to 1.6%.

10. Hungary
Hungary is responsible for 1.4% of cyber attacks in
late 2012.

Disable CMD in any system


Hi Friends...  Today I'm gonna tell u how to disable the most powerful tool in windows which is called CMD . Just Follow these steps:-


CMD Screen

1) Press Win+ R (RUN)
2) Type gpedit.msc and Ok.
3) In Group Policy browse to "USER CONFIGURATION / ADMINISTRATIVE TEMPLATES" and highlight the Systems Folder.
4) Double click, "Prevent access to the command prompt."
5) Change settings to 'Enable' and click 'ok'

Try to Open CMD. I'm sure you won't be able to do this. Now do some tricky with this and make a virus to disable your friend's CMD

Fifa 14

About the Game:

Players have the intelligence to adjust their stride and approach angle to find the best position for hitting the back of the net.
Now every step counts as players plant, pivot, cut, and shift momentum with the agility and explosiveness of real footballers.
Realistic ball physics now determines the trajectories of balls in game, enabling players to strike the ball with force from distance or drill low rising shots with accuracy.
Protect the ball from opponents to control play through midfield and dictate the tempo of the match.
Better decision-making delivers tighter, smarter marking and improved run tracking.
FIFA Ultimate Team is the most popular game mode within EA SPORTS FIFA.
Fans create their own unique squads to play their preferred style of football.
This year ultimate customization is possible with all-new Chemistry Styles.......


Fifa 14 Poster


Fifa 14 Trailer

Minimum PC System Requirements:

OS: Windows Vista SP1 / 7 / 8
CPU: 1.8 GHz Core 2 Duo
RAM: 2GB RAM
Hard Drive: 8.0 GB
Video: 3D accelerated 256 MB video card with support for Pixel Shader 3.0
Minimum Supported Video Cards: ATI Radeon HD 3600, NVIDIA GeForce 6800GT
Sound Card: DirectX 9.0c Compatible
DirectX: 9.0c

>>Download Here via Torrent

Kali Linux (Backtrack)

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. It was developed by Mati Aharoni and Devon Kearns of Offensive Security through the rewrite of BackTrack, their previous forensics Linux distribution.



Kali Linux is preinstalled with numerous penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), and Aircrack-ng (a software suite for penetration-testing wireless LANs). Kali Linux can be run from a hard disk, live CD, or live USB. It is a supported platform of the Metasploit Project's Metasploit Framework, a tool for developing and executing security exploits.

Kali Linux is distributed in 32- and 64-bit images for use on hosts based on the x86 instruction set, and as an image for the ARM architecture for use on the Raspberry Pi computer and on Samsung's ARM Chromebook.

>>Source: Wikipedia

Hacker's Dictionary


Hacker's Abbreviations:-
★ DDoS =
Distributed Denial of Service
★ DrDoS =
Distributed Reflected Denial of Service Attack,
uses a list of reflection servers or other methods
such as DNS to spoof an attack to look like it's
coming from multiple ips. Amplification of
power in the attack COULD occur.
★ FTP =
File Transfer Protocol. Used for transferring files
over an FTP server.
★ FUD =
Fully Undetectable
★ Hex =
In computer science, hexadecimal refers to
base-16 numbers. These are numbers that use
digits in the range: 0123456789ABCDEF. In the
C programming language (as well as Java,
JavaScript, C++, and other places), hexadecimal
numbers are prefixed by a 0x. In this manner,
one can tell that the number 0x80 is equivalent
to 128 decimal, not 80 decimal.
★ HTTP =
Hyper Text Transfer Protocol. The foundation of
data communication for the World Wide Web.
★ IRC =
Internet Relay Chat. Transmiting text messages
in real time between online users.
★ JDB =
Java drive-by, a very commonly used web-
based exploit which allows an attacker to
download and execute malicious code locally
on a slave's machine through a widely known
java vulnerability.
★ Malware =
Malicious Software
★ Nix =
Unix based operating system, usually refered to
here when refering to DoS'ing.
★ POP3 =
This is the most popular protocol for picking up
e-mail from a server.
★ R.A.T =
 Remote Administration Tool
★ SDB =
Silent drive-by, using a zero day web-based
exploit to hiddenly and un-detectably download
and execute malicious code on a slave's
system. (similar to a JDB however no
notification or warning is given to the user)
★ SE =
Social Engineering
★ Skid =
Script Kid/Script Kiddie
★ SMTP =
A TCP/IP protocol used in sending and
receiving e-mail.
★ SQL =
Structured Query Language. It's a programming
language, that used to communicate with
databases and DBMS. Can go along with a
word after it, such as "SQL Injection."
★ SSH =
Secure Shell, used to connect to Virtual Private
Servers.
★ TCP =
Transmission Control Protocol, creates
connections and exchanges packets of data.
★ UDP =
User Datagram Protocol, An alternative data
transport to TCP used for DNS, Voice over IP,
and file sharing.
★ VPN =
Virtual Private Network
★ VPS =
Virtual Private Server
★ XSS (CSS) =
Cross Site Scripting


Black Hat Hacker Logo

Hacker's Words:-
Algorithm =
A series of steps specifying which actions to
take in which order.
ANSI Bomb =
ANSI.SYS key-remapping commands consist of
cryptic-looking text that specifies, using ansi
numeric codes to redefine keys.
Back Door =
Something a hacker leaves behind on a system
in order to be able to get back in at a later
time.
Binary =
A numbering system in which there are only two
possible values for each digit: 0 and 1.
Black Hat =
A hacker who performs illegal actions to do
with hacking online. (Bad guy, per se)
Blue Hat =
A blue hat hacker is someone outside computer
security consulting firms who is used to bug
test a system prior to its launch, looking for
exploits so they can be closed. Microsoft also
uses the term BlueHat to represent a series of
security briefing events.
Bot =
A piece of malware that connects computer to
an attacker commonly using the HTTP or IRC
protocal to await malicous instructions.
Botnet =
Computers infected by worms or Trojans and
taken over by hackers and brought into
networks to send spam, more viruses, or launch
denial of service attacks.
Buffer Overflow =
A classic exploit that sends more data than a
programmer expects to receive. Buffer overflows
are one of the most common programming
errors, and the ones most likely to slip through
quality assurance testing.
Cracker =
A specific type of hacker who decrypts
passwords or breaks software copy protection
schemes.
DDoS =
Distributed denial of service. Flooding someones
connection with packets. Servers or web-hosted
shells can send packets to a connection on a
website usually from a booter.
Deface =
A website deface is an attack on a site that
changes the appearance of the site or a certain
webpage on the site.
Dictionary Attack =
A dictionary attack is an attack in which a
cyber criminal can attempt to gain your account
password. The attack uses a dictionary file, a
simple list of possible passwords, and a
program which fills them in. The program just
fills in every single possible password on the
list, untill it has found the correct one.
Dictionary files usually contain the most
common used passwords.
DOX =
Personal information about someone on the
Internet usualy contains real name, address,
phone number, SSN, credit card number, etc.
E-Whore =
A person who manipulates other people to
believe that he/she is a beautiful girl doing cam
shows or selling sexual pictures to make
money.
Encryption = 
In cryptography, encryption applies
mathematical operations to data in order to
render it incomprehensible. The only way to
read the data is apply the reverse mathematical
operations. In technical speak, encryption is
applies mathematical algorithms with a key
that converts plaintext to ciphertext. Only
someone in possession of the key can decrypt
the message.
Exploit =
A way of breaking into a system. An exploit
takes advantage of a weakness in a system in
order to hack it.
FUD =
Fully undetectable, can be used in many terms.
Generally in combination with crypters, or when
trying to infect someone.
Grey Hat =
A grey hat hacker is a combination of a Black
Hat and a White Hat Hacker. A Grey Hat Hacker
may surf the internet and hack into a computer
system for the sole purpose of notifying the
administrator that their system has been
hacked, for example. Then they may offer to
repair their system for a small fee.
Hacker (definition is widely disputed among
people...) = A hacker is someone who is able to
manipulate the inner workings of computers,
information, and technology to work in his/her
favor.
Hacktivist =
A hacktivist is a hacker who utilizes technology
to announce a social, ideological, religious, or
political message. In general, most hacktivism
involves website defacement or denial-of-servi
ce attacks.
IP Address =
On the Internet, your IP address is the unique
number that others use to send you traffic.
IP Grabber =
A link that grabs someone's IP when they visit
it.
Keylogger =
A software program that records all keystrokes
on a computer's keyboard, used as a
surveillance tool or covertly as spyware.
Leach = 
A cultural term in the warez community
referring to people who download lots of stuff
but never give back to the community.
LOIC/HOIC =
Tool(s) used by many anonymous members to
conduct DDoS attacks. It is not recommended to
use these under any circumstances.
Malware =
Software designed to do all kinds of evil stuff
like stealing identity information, running DDoS
attacks, or soliciting money from the slave.
Neophyte =
A neophyte, "n00b", or "newbie" is someone who
is new to hacking or phreaking and has almost
no knowledge or experience of the workings of
technology, and hacking.
smith =
Somebody new to a forum/game.
OldFag =
Somebody who's been around a forum/game for
a long time.
Packet =
Data that is sent across the Internet is broken
up into packets, sent individually across the
network, and reassembled back into the original
data at the other end.
Phreak =
Phone Freaks. Hackers who hack cell phones for
free calling. Free Long distance calling. Etc.
Phreaking =
The art and science of cracking the phone
network.
Proxy =
A proxy is something that acts as a server, but
when given requests from clients, acts itself as
a client to the real servers.
Rainbow Table =
A rainbow table is a table of possible
passwords and their hashes. It is way faster to
crack a password using rainbow tables then
using a dictionary attack (Bruteforce).
Remote Administration Tool =
A tool which is used to remotely control
(an)other machine(s). These can be used for
monitoring user actions, but often misused by
cyber criminals as malware, to get their hands
on valuable information, such as log in
credentials.
Resolver =
Software created to get an IP address through
IM (instant messenger, like Skype/MSN)
programs.
Reverse Engineering =
A technique whereby the hacker attempts to
discover secrets about a program. Often used
by crackers, and in direct modifications to a
process/application.
Root =
Highest permission level on a computer, able to
modify anything on the system without
restriction.
Rootkit (ring3 ring0) =
A powerful exploit used by malware to conceal
all traces that it exists. Ring3 - Can be
removed easily without booting in safemode.
Ring0 - Very hard to remove and very rare in
the wild, these can require you to format, it's
very hard to remove certain ring0 rootkits
without safemode.
Script Kiddie =
A script kid, or skid is a term used to describe
those who use scripts created by others to hack
computer systems and websites. Used as an
insult, meaning that they know nothing about
hacking.
Shell =
The common meaning here is a hacked web
server with a DoS script uploaded to conduct
DDoS attacks via a booter. OR A shell is an
script-executing unit - Something you'd stick
somewhere in order to execute commands of
your choice.
Social Engineer =
Social engineering is a form of hacking that
targets people's minds rather than their
computers. A typical example is sending out
snail mail marketing materials with the words
"You may already have won" emblazoned
across the outside of the letter. As you can see,
social engineering is not unique to hackers; it's
main practitioners are the marketing
departments of corporations.
Spoof =
The word spoof generally means the act of
forging your identity. More specifically, it refers
to forging the sender's IP address (IP spoofing).
(Spoofing an extension for a RAT to change it
from .exe to .jpg, etc.)
SQL Injection =
An SQL injection is a method often used to
hack SQL databases via a website, and gain
admin control (sometimes) of the site. You can
attack programs with SQLi too.
Trojan =
A Trojan is a type of malware that masquerades
as a legitimate file or helpful program with the
ultimate purpose of granting a hacker
unauthorized access to a computer.
VPS =
The term is used for emphasizing that the
virtual machine, although running in software
on the same physical computer as other
customers' virtual machines, is in many
respects functionally
equivalent to a separate physical computer, is
dedicated to the individual customer's needs,
has the privacy of a separate physical
computer, and can be configured to run server
software.
Warez =
Software piracy
White Hat =
A "white hat" refers to an ethical hacker, or a
computer security expert, who specializes in
penetration testing and in other testing methods
to ensure the security of a businesses
information systems. (Good guy, per se)
Worm =
Software designed to spread malware with little
to no human interaction.
Zero Day Exploit =
An attack that exploits a previously unknown
vulnerability in a computer application, meaning
that the attack occurs on "day zero" of
awareness of the vulnerability. This means that
the developers have had zero days to address
and patch the vulnerability.

Change the CHKDSK countdown time

When you schedule CHKDSK to run at the next boot, the system will prompt you to press a key to cancel the operation while CHKDSK is running. The system will display a countdown during that cancel period. The default value is 10 seconds.



To Change this open up Regedit and locate:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\AutoChkTimeOut

You can change the value to anything from zero to 259,200 seconds (3 days). With a timeout of zero, there is no countdown and you cannot cancel the operation.

>>Thanks for reading this blog.. also Share this

Friday 6 June 2014

Speed up Mozilla FireFox


To Speed up Mozilla Firefox use the following steps:-
--------------------------------------------------------------------------------


Firefox Logo

1. Type "about :config" in the adress field.
2. Set the value of network.http.pipelining to "true".
3. Set the value of network.http.pipelining.maxrequests to "100".
4. Set the value of network.http.proxy.pipelining to "true"
5. Set the value of nglayout.initialpaint.delay to "0" (not availible in newer versions)

>>www.moneysrofficial.blogspot.com

How To Set Up Proxies In Your Browser

By setting the proxies you can surf internet anonymously and no one can catch you. Use these ways for setting proxies in different browser:
===================================
In Internet Explorer
===================================
Click "Tools", then "Internet Options", the in the "connections" Tab, click the "LAN Setup" Button in the bottom. There is a "Proxy Servers", tick the "Use a proxy....." and then enter the proxy in the bigger textbox and the port (the part that comes after the ":") in the smaller textbox. Hit okay, and then go to
CODE
www.whatismyip.com
to see if the proxy is now your IP.

===================================
In OPERA
===================================
Click "Files", then "Preferences", then "Network", then click the button "Proxy Servers", tick "HTTP", fill in with the proxy:port, click okay and that's it! Don't forget to check with
CODE
www.whatismyip.com

===================================
In Firefox
===================================
Tools -> Options
Then click the General Icon
Then the "Connection Settings..." button
Then click the "manually configure proxies" radio button, and enter the proxy address and port in the HTTP Proxy area.
Don't forget to check with
CODE
www.whatismyip.com


Proxy Settings in Firefox

You can also surf internet by using these proxies:
www.proxy4free.com
www.safeproxy.org
www.megaproxy.com
www.guardster.com
www.silenter.com
www.anonymizer.com

Happy Anonymous surfing!

Sunday 20 April 2014

Hibernate in Windows 8

Hibernate Option is Actually Hidden in
Windows 8, We Can easily Unhide it and
Enable it. Just Follow The Below Simple Steps
to Enable Hibernate In Windows 8



Step 1: Press Win + W key ie: Windows key
and “W” key to open up Setting search menu.
Then Type “ Power” , Windows will Show you
Few Results, You have to Click on “ Power
Option

Step 2: Now From the Left Pane, Click on
Choose What the Power Button do.

Step 3: Then on Next Screen Click on Change
Settings that are currently Unavailable .

Step 4: Now Scroll Down to “Shutdown
Settings” Section, and Check Hibernate box
to Enable it and Click on Save Changes.

Step 5: Everything is done, Now next time
whenever you need to Hibernate your PC,
just Move your Mouse pointer to right corner
of your screen to Show up Charm screen,
Click on Setting> Power.

You will notice Hibernate Option added there.
So in this Tutorial we Saw What Hibernate is
and how to Enable Hibernate In Windows 8.

Note>>This post was published by mobile blogger that's why it is in vertical format