Your Ad Here

Thursday, September 25, 2008

Spy My PC Keylogger v4.8

The number one keylogger for you, if you want to know what others are doing on your own computer while you are not at home (or office). Logs all keystrokes, applications, windows, websites, internet connections, passwords, chat conversations. Install SpyMyPC Keylogger, set options "Run in Invisible Mode", so that it makes itself invisible to anyone. Shortcut keys helps you fast access to Log View and Unhide Mode. Perfect for monitoring others who use your PC - children, spouses, employees, or just yourself!

Download Link:

Hackers Revolution

Hackers Revolution

About Hacker Evolution

From the creators of a successful hacker games series (Digital Hazard, BS Hacker, etc) Hacker Evolution is a new hacking simulation game, featuring unparalleled graphics and features.
You play the role of a former intelligence agent, specializing in computer security. When a chain of events sets off worldwide, leaving critical service disabled, you assume the role a computer hacker to find out what happened and attempt to stop it.
When a stock market, a central bank, satellite uplink and transoceanic fiber optics links crash, you know this is more then a simple event. Something big is behind all this, and you have to figure out what is it.
You hack into computers, look for exploits and information, steal money to buy hardware upgrades in an attempt to put all the pieces of a big puzzle, together.

Set in a virtual operating system environment, the game is packed with all the features required to bring the hacker feeling and experience to every gamer.

The concept behind Hacker Evolution is to create a game that challenges the gamer's intelligence, attention and focus, creating a captivating mind game. Solve puzzles, examine code and bits of information, to help you achieve your objectives.

Game features:
* Modding capability to allow the creation of custom levels.
* The included mod editor, allows you to create new game levels easily.
* Multiple interface skins
* Complex levels and gameplay to guarantee the best experience
* Optional freelance jobs to offer more variety
* Complex command console with over 20 commands and tools

System requirements:
* Windows ME/XP/2000/2003 or Vista
* Microsoft DirectX 8.0 (
* Pentium® 1 GHz processor or faster, 512Mb RAM, 200Mb free disk space
* 16Mb DirectX 8.0 compatible videocard
* Microsoft compatible keyboard and mouse

Direct Link :

Hacking Into a Computer [With Pictures]

NetBIOS Hacking

For this tutorial, I used Microsoft’s Windows XP Home Edition OS.

-What is it?-
NetBIOS Hacking is the art of hacking into someone else’s computer through your computer. NetBIOS stands for “Network Basic Input Output System.” It is a way for a LAN or WAN to share folders, files, drives, and printers.

-How can this be of use to me?-
Most people don’t even know, but when they’re on a LAN or WAN they could possibly have their entire hard drive shared and not even know. So if we can find a way into the network, their computer is at our disposal.

-What do I need?-
Windows OS
Cain and Abel >>>Get it here:

Part 1, Finding the target.

So first off we need to find a computer or the computer to hack into. So if your plugged in to the LAN, or connected to the WAN, you can begin. Open up Cain and Abel. This program has a built in sniffer feature. A sniffer looks for all IP addresses in the local subnet. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the blue cross

Another window will pop up, make sure “All host in my subnet” is selected, and then click ok.

It should begin to scan.

Then IP’s, computer names, and mac addresses will show up. Now remember the IP address of the computer you are going to be breaking into. If you can’t tell whether the IP address is a computer, router, modem, etc, that’s ok. During the next step we will begin our trial and error.

Part 2, Trial and Error

Now, we don’t know if we have our designated target, or if we have a computer or printer, or whatever else is on the LAN or WAN. If you did get the IP of the target though, I still recommend reading through this section, for it could be helpful later on. Click on the start menu and go to run, type in cmd, and click ok. This should bring up the command prompt. From here we will do most of the hacking. Now I will be referring to certain commands that need to be inputted into the command prompt. I will put these commands in quotes, but do not put the quotes in the code when you type it into the prompt. I am only doing this to avoid confusion. Let’s get back to the hacking. Type in “ping (IP address of the target).” For example in this tutorial, “ping” This will tell us if the target is online. If it worked, it will look something like this (note, I have colored out private information):

IF it didn’t work, meaning that the target is not online, it will look something like this:

If the target is not online, either switch to a different target, or try another time. If the target is online, then we can proceed.

Part 3, Gathering the Information.

Now, input this command “nbtstat –a (IP address of target).” An example would be “nbtstat –a” This will show us if there is file sharing enabled, and if there is, it will give us the: currently logged on user, workgroup, and computer name.

Ok, you’re probably wondering, “What does all this mean to me?” Well, this is actually very important, without this, the hack would not work. So, let me break it down from the top to bottom. I will just give the first line of information, and then explain the paragraph that follows it.

The information right below the original command says: “Local Area Connection,” this information tells us about our connection through the LAN, and in my case, I am not connected through LAN, so the host is not found, and there is no IP.

The information right below the “Local Area Connection,” is “Wireless Network Connection 2:” It gives us information about the connection to the target through WAN. In my case I am connected through the WAN, so it was able to find the Node IpAddress. The Node IpAddress is the local area IP of the computer you are going to break into.

The NetBIOS Remote Machine Name Table, give us the workgroup of our computer, tells us if it is shared, and gives us the computer name. Sometimes it will even give us the currently logged on user, but in my case, it didn’t. BATGIRL is the name of the computer I am trying to connect to. If you look to the right you should see a <20>. This means that file sharing is enabled on BATGIRL. If there was not a <20> to the right of the Name, then you have reached a dead end and need to go find another IP, or quit for now. Below BATGIRL is the computers workgroup, SUPERHEROES. If you are confused about which one is the workgroup, and the computer, look under the Type category to the right of the < > for every Name. If it says UNIQUE, it is one system, such as a printer or computer. If it is GROUP, then it is the workgroup

Step 4, Breaking In

Finally it’s time. By now we know: that our target is online, our target has file sharing, and our target’s computer name. So it’s time to break in. We will now locate the shared drives, folders, files, or printers. Type in “net view \\(IP Address of Target)”
An example for this tutorial would be: “net view \\”

We have our just found our share name. In this case, under the share name is “C,” meaning that the only shared thing on the computer is C. Then to the right, under Type, it says “Disk.” This means that it is the actual C DISK of the computer. The C DISK can sometimes be an entire person’s hard drive.

All's that is left to do is “map” the shared drive onto our computer. This means that we will make a drive on our computer, and all the contents of the targets computer can be accessed through our created network drive. Type in “net use K: \\(IP Address of Target)\(Shared Drive). For my example in this tutorial, “net use K: \\\C.” Ok, let’s say that you plan on doing this again to a different person, do u see the “K after “net use?” This is the letter of the drive that you are making on your computer. It can be any letter you wish, as long as the same letter is not in use by your computer. So it could be “net use G...,” for a different target.

As you can see, for my hack I have already used “K,” so I used “G” instead. You may also do the same for multiple hacks. If it worked, it will say “The command completed successfully.” If not, you will have to go retrace you steps. Now open up “my computer” under the start menu, and your newly created network drive should be there.

Now, if you disconnect from the WAN or LAN, you will not be able to access this drive, hence the name Network Drive. The drive will not be deleted after you disconnect though, but you won’t be able to access it until you reconnect to the network. So if you are doing this for the content of the drive, I recommend dragging the files and folders inside of the drive onto your computer, because you never know if the target changes the sharing setting. If you are just doing this to hack something, then go explore it and have some well deserved fun!

Congratulations! You’re DONE!
But, before you leave, please look over some of this information for further help and just for thanks to me.

-Commands used in this tutorial:

NBTSTAT -a (IP Address of Target)
NET VIEW \\(IP Address of Target)
NET USE K: \\(IP Address of Target)\(SHARENAME)
Thanks @@@

Rapid Hacker 3.8 Gold Edition ... New !!!

Scanned By NOD32 v3.0.672.0 Businiss Edition ... Nothing 100% Clean

A lot of improvements, and some other features of wonder!

No More Download Limits!

Rapid Hacker can hack/crack/bypass waiting limits for and, and it works also for megaupload, etc.

Just copy and paste the link to download like premium.


Ultra Hacks


AOL new
Astaroth Joiner v2
Cable Modem Sniffer
CGI Founder v1.043
DDL Sites
E-mail Cracker
F.B.I - Binder
FTP Brute Forcer
~Censored~ Mail Bomber 2.3
Hack FLASH Template
Hack MY Space
Hack Photoshop CS2
Hook Tool Box
Hotmail Email Hacker
Hotmail HAcker Gold
Hotmail ScamPage
Key Changer
Legion NetBios Scanner v2.1
Mail Boomb_2.0 YAHOO
MooreR Port Scanner
MSN Flooder 2.0
MSN Messenger Account Cracker v2.0
NetBIOS Name Scanner
NFO Maker 1.0
On-Off MSN
OS Update Hack
P0kes WormGen 2.0
Php Nuke Hacker v11.0
phpBB Annihilator
phpbb attack
phpbb bruteforcer
PhpBB pass extractor
Ping & Nukes
Port Listener XP
Pure phpBB Email harvester
rainbowcrack-1.2-src win-lin
Remote Shut Down
Server 2003 Keygen
Server Killer
Source Checker
source codes
SQLScan v1.0
Stealth - HTTP Scanner v1.0 build 23
TinaSoft KILL
UC.Forum Spam
Ultra Dos
Visa Spam
Warez Sites
Web Cracker 2.0
WebCracker 4.0
Win XP Activator
Windows XP Corperate Keygen
Windows XP KeyGen
Windows XP Product Key Changer
Windows XP Product Key Checker
Windows XP Product Key Viewer
Yahoo Password

Download :

Youtube for new hackers/crackers

If you are new to this and desperately need help regarding

"How to hack!"
"How to crack!"

And seem to get nothing then @try this out!

Goto which is very much familiar to you!

And SEARCH for this key words like Hacking, Cracking,PC Tips etc.

Don't wast you time in searchinh **x

If you are serious about it, It is the 2nd place to look for.


good luck
Reply With Quote

DarkMailer 1.32[Full]

*Dark Mailer is a super fast bulk email software that sends out at speeds greater than 500,000 emails per hour on a dedicated mailing server. Dark Mailer has the capability to use Proxies and Relays and also to send directly. Some of the features include:
*Anonymous Mailing using Proxies
*Message Randomization to bypass Spam Filters
*Speeds over 500K emails per hour on Turbo Mode
*Up to 1000 Threads

Note: some Antivirus classified this as hack.tool or Mass.flooder


How to exceed your download limit on Rapidshare/Others

NOTE: complicated, and yes there are proxy sites to get around rapidshare, however there are none currently that'll get around

Okay, here is a quick tutorial on how to get around those annoying "Wait X minutes before downloading" messages, as well as the one-file-at-a-time limits that are frequent on Rapidshare and similar sites. This tutorial uses Opera (because it has the best download manager), but can probably be adapted for any browser
Step 1. Since this will slow down each download quite a bit, pick 4 or 5 Rapidshares that you've always wanted. This will give you the most speed boost.

Step 2. Start the biggest one as you normally would, by clicking the "Free" button.

Step 3. Go to
and pick a proxy. configure your browser to use it. (In Opera, Tools/Preferences, Advanced tab, Network on the right, then click the Proxy Servers button.

Before the colon is the IP, after is the port.

Step 4: Finally, test it for speed. If the proxy seems pretty fast, start the next download, and repeat Step 3&4 until you have all your files downloading. If it seems too slow, repeat step 3 until you find a fast one.

That's all! Most of you will already know about this, but it's cool anyways.

WIFI HACK Professional

Hacks page 1:
- Comm View for WiFi v5.2484
- Pure NetWorks NetWork Magic 2
- Air Crack
- AP Sniff
- Comm View
- Aerosol
- Easy WiFi Radar
- Boingo Wireless
Hacks page 2:
- Get Wep Key Of Encrypted Wireless Connection
- WiFi Companion v2.10.4
- Net Stumbler
- WiFi Hack Tools
- WiFi Internet Access Blocker
- iPig WiFi HotSpot VPN Security
Hacks page 3:
- Hot Spotter v0.4
- Kismet
- AirShort v0.2.7e
- WiFi Hopper v1.2
- Wireless NetWork Ignition
- Wepwedgie - alpha
- Wep Crack
- O-Reilly Wireless Hacks
- System Cracking 2k
- FBI Teaches how to break WiFi
- Collection of Hacking Dictionary
- How to Crack WEP


How to hack a wireless network with password

THIS NOT A JUST e-BOOK , It also have a program wid a password cracking tool



1000 Tutorials only 2.58 MB

DataVault, Irc Warez (Ty 4 Moving X).txt 2.7 KB
-[ How to rip Dynamic Flash Template ]-.txt 2.2 KB
10 reasons why PCs crash U must Know.txt 12.2 KB
10 Security Enhancements.txt 2.7 KB
16x Dvd+-rw Dl Dvd Writer Comparison Guide.txt 6.1 KB
20 Great Google Secrets.txt 8.8 KB
23 Ways To Speed WinXP, Not only Defrag.txt 10.1 KB
250+ Tech books online.txt 23.3 KB
36 Graphics & Design Ebooks.txt 3.6 KB
8 People Can Use The Same Msn Dial Up Account.txt 1.3 KB
A Basic Guide to the Internet.txt 12.4 KB
A very small tut for RealMedia.txt 644 Bytes
A Web Standards Checklist, How to make a proper website.txt 18.9 KB
Accessing The Entire Internet On Your 3 Phone, U8110, E616 etc..txt 1.2 KB
Advanced Shellcoding Techniques.txt 7.4 KB
All about ftp must read.txt 19.5 KB
All About Movie Tags (what Is A Dvdrip, Cam Etc.).txt 17.3 KB
ALL About Spyware.txt 6.1 KB
All mIRC Commands.txt 6.6 KB
Anonymity of Proxy, Anonymity Of Proxy learn it insideout.txt 4.9 KB
Anonymity.txt 12.8 KB
anti leech hacking tutorial.txt 1013 Bytes
Auto End Tasks to Enable a Proper Shutdown, Win XP Tweak.txt 821 Bytes
Automatic Windows Installation, No keypress required!.txt 275 Bytes
B.A. regedit.txt 1 KB
Backtracking EMAIL Messages.txt 5.8 KB
Bandwidth Explained!.txt 7.8 KB
Beep Code Manual.txt 6.5 KB
Beep Codes Error Codes.txt 3.5 KB
Best Keyboard Shortcuts.txt 8.1 KB
Big Brother And Ndisuio.sys, A new Internet phenomenon.txt 1.8 KB
Bin & Cue Simple Tut.txt 2.3 KB
BIOS Update Procedure.txt 5.4 KB
Bit Torrent Tutorials.txt 5 KB
Block Adservers.txt 48.4 KB
Boot Block Recovery For Free.txt 6.5 KB
Boot Winxp Fast.txt 948 Bytes
Border And Text Effects In Psp8, For use with PSP8.txt 3.2 KB
Broken Ie, How to fix it.txt 1.2 KB
Bulk Editing Of .xxx to .zip or .mp3.txt 962 Bytes
BulletProof FTP Server Tutorial.txt 4.3 KB
Burn .bin file Without A .cue file.txt 1.3 KB
Burn a BIN without a CUE using NERO.txt 1.1 KB
Burning Bin & Cue Using Nero.txt 2.3 KB
Bypass Internet Censorship.txt 229 Bytes
Calculating Offsets.txt 5 KB
cannot use my password to get back into Windows XP.txt 2.1 KB
Cant See Secure Sites.txt 658 Bytes
Caught A Virus.txt 8.3 KB
Change Music In The Malibu And The Pole Position, GTA Vice Modders.txt 838 Bytes
Change Text on XP Start Button.rtf 3.4 KB
Change Text on XP Start Button.txt 3 KB
Change The Default Location For Installing Apps.txt 654 Bytes
Change The Storage Location Of 'my Documents', a bit safer for when your PC crashes....txt 661 Bytes
Change Your Ip In Less Then 1 Minute.txt 1.6 KB
Changing Default Location For Installing Apps.txt 805 Bytes
Check For Dos, Check to see if you are infected..txt 6.4 KB
Choosing A Good Domain Name, ya..good name is important!.txt 6.3 KB
Choosing An Internet Merchant Account, nice info on Internet Merchant Account...txt 6.1 KB
Clear Unwanted Items From Add And Remove.txt 212 Bytes
Closing Open Holes, System Security How to close open holes.txt 18.6 KB
CMD Prompt here, add to folder context menu windows xp.txt 711 Bytes
Computer Acronyms.txt 9.6 KB
Computer Matinence.txt 3.1 KB
Configuring ZoneAlarm Pro Security Settings, A ZoneAlarm Pro Tutorial.txt 2.1 KB
connect A Psx Pad To Pc, Warning soldering is involved...txt 2.4 KB
Convert Stubborn Webpage To pdf.txt 701 Bytes
Convert To Basic And Dynamic Disks In Windows Xp.txt 4 KB
Converting Movies To Psp Format.txt 2.6 KB
Converting to NTFS.txt 4.8 KB
Cracking Bios, use the followin' code.txt 890 Bytes
Cracking Zip Password Files.txt 9 KB
Crap Software Config Settings, How to set-up the firewall.txt 3.6 KB
Create A Huge File.txt 1.1 KB
Create A Personal Screen Saver In Win Xp!.txt 640 Bytes
Create An Ftp Server On Your Pc With Serv-u.txt 4.6 KB
Create Bootable Win XP SP1 CD(nero).txt 2.2 KB
Create Bootable XP SP integrated CD.txt 3.8 KB
Create One-click Shutdown And Reboot Shortcuts.txt 1.4 KB
Creating a Board aka Forum on your own PC !.rtf 912 Bytes
Creating Universal Ghost Usb Boot Disk And Cd.txt 1.9 KB
Data Capacity of CDs [Tutorial].txt 6.6 KB
Debug, Learn how crack windows.txt 9.5 KB
Delete An undeletable File.txt 2 KB
Delete Files From The Recent File List In Windows.txt 1.4 KB
Digital Camera Guide.txt 5.9 KB
Digital Faq -learn Everything About Digital, Capture, Edit and Burning and more.txt 2.2 KB
Digital Photo Id Cards, Greate Info.txt 2.9 KB
Direct Link To Any Page You Want To In Hotmail.txt 1.9 KB
Directx Explained.txt 7.7 KB
Disable Compression On Xp, NTFS partition, Disk Cleanup.txt 440 Bytes
Disable The Send Error Report, to Microsoft.txt 520 Bytes
Disable Windows Logo Key.txt 636 Bytes
Discover New Music You'll Probably Love.txt 1.1 KB
Do You Want To Learn Maya 6, look, some tutorials.txt 76 Bytes
Doom 3 Speed Up, Guaranteed 40% better.txt 1.5 KB
Doom3 Simple Tweeks, how to run doom with tweeks.txt 5.9 KB
Dos User - No Boot Dos Disk, No,How to create Imp Files.txt 691 Bytes
Download Free Music legally,, legally.txt 3.2 KB
Download from a paypal site without paying a penny!.txt 971 Bytes
Download From Ftpz, Using Ftp Search Sitez.txt 8.1 KB
Download Mp3's Without Using Filesharing.txt 711 Bytes
Download Music And Video With ,edia Player9, quick and easy!.txt 678 Bytes
Download Timeframes.txt 339 Bytes
Downloading Files, Using Archives And Images.txt 8.4 KB
Downloading Windows Media Streams.txt 751 Bytes
Dreamweaver Tut That Teaches U, to search a database with phpmysql.txt 2.2 KB 1.4 KB
Dual Boot After The Fact.txt 1.4 KB
Dvd Copying-ripping Definitions.txt 1.3 KB
DVD Regions Information.txt 3.8 KB
Dvd-9 to Dvd+r Dl, Double Layer To Double Layer, 1-1 copies.txt 967 Bytes
Easily Disconnect-reconnect From Broadband.txt 309 Bytes
Easily Find Serial Numbers On Google.., easy to do and works like a charm..txt 1.4 KB
Ebay Hackcracktip.txt 513 Bytes
Eliminate Ie's Autocomplete Reminder.txt 1.2 KB
Email Forge, sends email from anyone.txt 1.4 KB
Enable Folder and Icon Refresh, Win XP Tweak.txt 564 Bytes
Erasing_Your_Presence_From_System_Logs.txt 2.6 KB
Evolution Of Computer Viruses History Of Viruses.txt 20.6 KB
Excellent tricks and techniques of Google Hacks.txt 157.7 KB
Exploseek, a simple tool to find music on the net.txt 650 Bytes
Find Stuff.txt 1020 Bytes
Finding Missing Files From A Release.txt 1 KB
Firefox Speed Tweaks.txt 1.5 KB
Firefox Tweaks.txt 305 Bytes
FlashFXP FAQ.txt 4.6 KB
Flashget Broadband Tweak.txt 639 Bytes
FlashGet v1.4 - More Download Simultaneously.txt 1.2 KB
Flashing A Video Card Bios [advanced Guide], Step-by-Step Guide for Novice and Expert.txt 1.3 KB
Formatting An Hdd, when fdisk won't.txt 1.3 KB
Free Access To Websites Without Registering.txt 779 Bytes
FREE Hosting For WAREZ.txt 2.2 KB
FREE Hosting List php, mysql and more.txt 20.8 KB
Free World Dialup.txt 3.6 KB
Free X-box Live !.txt 721 Bytes
Freebsd Install Guide.txt 11.9 KB
General Keyboard Shortcuts, General Keyboard Shortcuts.txt 7.5 KB
Get In Windows 2000 As Administrator.txt 399 Bytes
Get the Most Out of Your DVD Recorder.txt 11.2 KB
Get The Music You Want To Hear.txt 920 Bytes
Get unlimited bandwidth from your host for free.txt 2.9 KB
Getting A 1gb Yahoo China Account.txt 1000 Bytes
Getting Counter-strike Source To Work.txt 3.4 KB
getting movies, mp3,games using google.txt 765 Bytes
Getting older programs to run on Windows XP.txt 3 KB
Getting started with Linux for nOObs!.txt 17.4 KB
Go to Windows updates anonymously.txt 410 Bytes
Google Crack Search.txt 140 Bytes
Google secrets.txt 1001 Bytes
Google Tips & Tricks, (utilizing search engine).txt 5.8 KB
Graffiti On Walls 4 Adobe Photoshop Cs 8.0.txt 2.4 KB
Guide For Getting Free Stuff.txt 10.3 KB
Guide to IIS Exploitation.txt 27.8 KB
Guide to Slipstreaming Service Pack 2.txt 2.8 KB
Hard drive Gone Bad.txt 5.6 KB
Hardware Firewall.txt 3 KB
Have Notepad In Send To.txt 1.9 KB
have satallite tv for almost free IF not free!!!.txt 3 KB
Hex, How to turn binary or decimal to hex.txt 1022 Bytes
Hide Drives and Partitions.txt 2.4 KB
How 2 Find EVERYTHING uploaded on Rapidshare.txt 449 Bytes
How do I overburn a CD with Nero.txt 861 Bytes
How do I remove an extra operating system from by.txt 685 Bytes
How do I Test My VirusScan Installation.txt 1.7 KB
How Do U See Hidden Files, Using DOS...txt 149 Bytes
How Download MP3s from or other Streaming Audio-Video.txt 2.4 KB
How Linux boots.txt 13.2 KB
How Long Has Your XP System Been Running.txt 551 Bytes
How To Access Your Folders From Your Taskbar.txt 1 KB
How To Add A Url Address Bar To The Taskbar.txt 845 Bytes
How To Add An Option To Print, the Contents of a Folder!.txt 1.5 KB
How To Add Your Own Windows Tips.txt 488 Bytes
How to Back Up the Registry.txt 775 Bytes
How To Backup Ps2 Games.txt 7.7 KB
How To Block Websties Without Software, block websites.txt 652 Bytes
How To Boot Xp Faster (updated).txt 1.7 KB
How to build a black box.txt 7.8 KB
how to burn quicker in windows xp.txt 290 Bytes
How to Bypass BIOS Passwords.txt 9 KB
How To Bypass Web Filters, tutorial.txt 6.2 KB
How To Change A Cmos Battery.txt 3.2 KB
How to change the serial number used in Windows XP, Valid for XP Corporate.txt 1.1 KB
How To Change Thumbnail Size And Quality.txt 925 Bytes
How to clear Bios info 2.txt 23.6 KB
How to clear Bios info.txt 11.7 KB
How To Convert File System, fat - fat32 to ntfs.txt 530 Bytes
How To Copy A Dvd Which Will Play On A X Box.txt 1 KB
How to copy songs from your iPod to your PC.txt 1.4 KB
How To Customise Your start Button.txt 1.5 KB
How To Delete Those Persistent Nasty Files.txt 539 Bytes
How To Directly Go To Inbox, Write Msg, w Hotmail, no need for hotmail today - http users.txt 1.5 KB
How To Disable Picture And Fax Viewer.txt 784 Bytes
How to do a high Quality DivX rip.txt 5.6 KB
How To Download Bittorrent Files.txt 7.1 KB
How To Download Directly From 1.7 KB
How To Download Movies, From IRC.txt 20.2 KB
How to Download-Upload Files from email.txt 23.1 KB
how to edit right click menu.rtf 4.6 KB
how to execute chm files in linux.txt 673 Bytes
How to Extend the life of the yousendit download links.txt 613 Bytes
How to find a remote IP.txt 1.9 KB
How To Find Ftp's The Easy Way'.txt 588 Bytes
How to find MP3's real quickly.txt 359 Bytes
How To Find Serial Numbers On Google.txt 812 Bytes
How to fix corrupted files in XP.txt 1.5 KB
How to fix Windows Installer problem.txt 981 Bytes
How To Get A Free I-pod Or Flat Screen Tv, check it out.txt 6.6 KB
How to Get someones ISP password, Get free internet.txt 2.7 KB
How To Get Top Ranking, Search Engines.txt 6.6 KB
How To Hack Windows Xp Admin Passwords.txt 2.5 KB
How to hack-change your Windows XP Boot Screen.txt 1.5 KB
how To Hide Yourself From Network Users!, And give access to only specific users!.txt 883 Bytes
How To Increase Download Speeds By 100-200 Kbsec.txt 319 Bytes
How to Install and run Windows CE on your USB Stick.txt 1.1 KB
How To Make 5cds, 10cds Or 2dvds From Official Dow, These are same as Mandrake PowerPack+.txt 3.4 KB
How To Make A Kvcd.txt 6 KB
how to make a new web site.txt 927 Bytes
How To Make A Transparent Background, .fla .swf.txt 108 Bytes
how to make a VCD from a DivX.txt 7.4 KB
How To Make An Animted Logo.txt 5.3 KB
How To Make Free Phone Calls.txt 2.3 KB
How to make key generators.txt 8.8 KB
How To Make Perfect Copies Of Maxis The Sims Discs, CloneCD Style!.txt 1.2 KB
How To Make XP Go Faster.txt 5.6 KB
How To make your own Radio Station 2.txt 3.3 KB
How To Make Your Own Radio Station.txt 1.6 KB
How To Make Your Own Radiostation.txt 1.6 KB
How to modify exe files.txt 2.5 KB
How To Move Xp Harddrive To New Motherboard.txt 887 Bytes
How To optimize DSL-CABLE connection speed.txt 382 Bytes
How To Play Movies (divx Etc) With Subs.txt 1.4 KB
How to recover MOST of scratched CD data discs.txt 2.7 KB
How to Remove DRM Protection for Video Files.txt 2.3 KB
How To Remove Ms Java Vm And Install Sun Java.txt 51 Bytes
How To Remove Signin Details Of Msn Passport.txt 1 KB
How To Remove The Default Admin$ Shares.txt 1 KB
How to remove the Links folder in IE Favorites.txt 604 Bytes
How to Remove WinXP Splash and See Operations.txt 1.2 KB
How To Rename Extensions With Ease, with a Renamer.bat file!.txt 452 Bytes
How to Rename File Extensions.txt 3.1 KB
How To Rename Multiple Files In Winxp.txt 571 Bytes
How To Restrict Login Hours Allowed.txt 599 Bytes
How to safeguard your files when computer crashes.txt 2.9 KB
How to save Windows xp updates.txt 646 Bytes
how to search google for RAPIDSHARE links.txt 1004 Bytes
How To See Hidden Files, Using Dos.txt 86 Bytes
How To Set search For All Files In Winxp.txt 731 Bytes
How to set up a http server running from you computer.txt 3.1 KB
How To Set Up A Proxy In Flashget, As Requested.txt 672 Bytes
How to set up a server with Apache , PHP , MySQL , Perl , phpMyAdmin.txt 8.8 KB
How To Set Up Direct Connect.txt 27 KB
How To Set Up Proxies In Your Browser.txt 1.6 KB
How To Set Zone Alarm Settings!, Fix for ZA ports.txt 2.1 KB
How To Setup Your Own Dns (Domain Name Server).txt 7 KB
How To Speed Up A Slow Computer.txt 1.2 KB
How To Speed Up Http Requests On Internet Explorer, as above.txt 1.3 KB
How To Stop Spam.txt 8 KB
How to swear in all languages.txt 28.3 KB
How To Unload Cached Dll Files To Free Memory.txt 572 Bytes
How to Use and How to Chain Multiple Proxies!.txt 9.7 KB
How To Use File Compression In Windows Xp.txt 4.2 KB
How To Use Google To Download Mp3's, and applications.....txt 615 Bytes
How To Use Newsgroups.txt 573 Bytes
How To Use You Gmail With Msn Messenger.txt 379 Bytes
How-to Get Videos And Dvds Onto Your Sony PlayStation Portable (PSP) for free.txt 12.9 KB
HOWTO Change Windows XP Home to Windows XP Pro.txt 1.7 KB
Important Faqs For Sp2.txt 9.5 KB
Improve Doom 3's Performances!!, simple but efficient trick for every1.txt 4.2 KB
Improve your dialup modem preformance.txt 743 Bytes
Increase XP Folder Settings.txt 813 Bytes
Insert Your Serial For Office 2k, auto install office.txt 1.1 KB
Install A New Hard-disk.txt 5.2 KB
Install Xp From Dos.txt 862 Bytes
Installing Apache on Windows.txt 6.3 KB
Installing Gentoo Linux, Amazing step by step tutoria.txt 197 Bytes
Installing IIS On Windows Xp Pro.txt 3 KB
Installing Slackware Linux.txt 34.7 KB
Instructions For Removal Of Advertising In Msn Messenger.txt 2.6 KB
Ip Address Structure, Expilinatin OF IP Address {A short way}.txt 7.7 KB
Irc How To Downlaod From, How to downlaod from IRC.txt 4 KB
Irc Servers On nix, For people who want to start own IRC net.txt 489 Bytes
Keep Files Private.txt 1.5 KB
Keep Folders Hidden.txt 472 Bytes
Keyboard Shortcuts Result in Excel 2000 - Movement.txt 1.6 KB
Keyboard Shortcuts, Microsoft Word.txt 2.4 KB
Keyboard Shortcuts, must read.txt 3.7 KB
Kill Microsoft Instant Messenger.txt 287 Bytes
Lamination Tips, Its a Fast TUT......txt 2 KB
Leet Way To Get Your Ip In Windows Xp.txt 271 Bytes
Linking Your Xbox To Your Computer.txt 33.5 KB
Linux Howto's.txt 78 Bytes
List Of Sites Not To Go To.txt 4.3 KB
Little help for anonymous mailer.txt 1.6 KB
Lots Of Windows Xp Tips, Take A Look !.txt 12.4 KB
Lyrics With Google.txt 84 Bytes
Make A Autorun File For Ur Cd.txt 674 Bytes
Make A Batch File To Clean UR PC!!, All In One!!.txt 1.4 KB
Make A Roughly 16 Hour Video Dvd.txt 1 KB
Make Acrobat Reader 6 load faster.txt 427 Bytes
Make Dvd Iso From Suse 9.2 5 Cds Iso, Linux mode and Windows mode ISO creation.txt 7.4 KB
Make Mp3 Files Smaller Without Losing Quality.txt 744 Bytes
Make Your Own Ringtones For Mobile Phone, also logos, wallpaper, etc.txt 3 KB
Make Your Pc Faster, Guaranteed.txt 6.2 KB
MakeXPgoFaster.txt 5.7 KB
making a .cue file, in notepad.txt 544 Bytes
Making A .txt Executable Server.txt 1.6 KB
Making Bootable Floppy Disk to Boot into Windows.txt 4.8 KB
Making Cd Version Of Doom3 Into Dvd Version.txt 766 Bytes
Making Web Page Fonts Consistent and Uniform.txt 816 Bytes
Manage Saved Ie Passwords.txt 763 Bytes
Mastering The Windows XP Registry.txt 5.8 KB
Maximize Dial-up Modem Settings.txt 2.3 KB
Microsoft's Really Hidden Files, Reveled Hidden files.txt 34 KB
mIRC Not Just Another Chat Client, Download Anything You Want Almost.txt 4.4 KB
mIRCcommands.txt 10.1 KB
Misc Linux Tips & Tricks.txt 18.5 KB
Missing Administrator Account.txt 533 Bytes
Mobile Secret Codes.txt 31.1 KB
Modify .exe Files And Crack A Program.txt 3.1 KB
More Xp Tips and tricks make your computer more faster.txt 46.1 KB
Moving and Removing the Start Button.txt 680 Bytes
Msn Messenger & Gmail.txt 3.7 KB
My Flash Bookmarks, long list of tutorials.txt 3 KB
Myth about WPA ( How it is done ), Windows Product Activation Technique.txt
45.5 KB
Nero How To Verify The Validity Of The Sn U Use.txt 903 Bytes
New Pc Or New Motherboard.txt 3.8 KB
New Way To Relive Some Zinio File.txt 1.9 KB
news groups the how to do.txt 11.4 KB
Nice list of windows shortcuts.txt 7.5 KB
No Text Icons.txt 299 Bytes
Ntfs Cluster Size, better harddrive performance.txt 1.3 KB
Official Unattended Xp Cd Guide Xp Sp2 @ 929 Bytes
Open Windows Explorer To A Different Default Direc.txt 754 Bytes
Optimize Broadband & Dsl Connections.txt 1.9 KB
Optimize Emule Connection.txt 1.2 KB
Outpost Rules, Outpost rules for system & app.txt 7.3 KB
Outsmarting System File Protection.txt 5.4 KB
Overclocking_Tutorial.txt 7.7 KB
Packet Attacks - Version 1.1, { Packet_Attack_Exlained}.txt 25.9 KB
Part 0 Dc++.txt 4.1 KB
Part 1 Bittorrents.txt 4.2 KB
Part 2 Irc (mirc).txt 4.9 KB
Part 3 Ftp.txt 2.7 KB
Partitioning Your Harddisk With Fdisk.txt 2.1 KB
Pc File Extention Listing.txt 26.5 KB
Pc Maintenance Guide.txt 10.2 KB
Peer2mail Tutorial.txt 9.4 KB
Performance Increase Through My Computer.txt 541 Bytes
Play Games On PS2 Without ModChip.txt 5.4 KB
Play On A Bnet Emulator, and f off cd key check =).txt 1.8 KB
Port Numbers.txt 40.2 KB
Problem With Internet Navigation, Clean Host File.txt 484 Bytes
Quick Fix For Spyware, Try This Before Doing Surgery on Your OS.txt 1.8 KB
Quick Msc.txt 513 Bytes
Quick Shutdown for XP, How to create a shutdown shortcut..txt 553 Bytes
Quickly Start The Shared Folder Wizard.txt 409 Bytes
Rapidshare hack!!!!! Free premium acount for all.txt 3.1 KB
Rapidshare Hacked, unlimited upload, no countdown.txt 1.7 KB
Rapidshare Timelimit.txt 1001 Bytes
Read This! Av Compare!.txt 7.6 KB
Recover A Corrupted System File.txt 1.1 KB
Recover a Quick erased CD RW.txt 3.9 KB
Reformat&Reinstall.txt 2.6 KB
Regedit.exe & Regedt32.exe, Whats the difference.txt 2.9 KB
Registry Disassembled a basic tutorial.txt 7.1 KB
Reinstall Internet Explorer 6.txt 1.1 KB
Release Codes, Read, and Learn....txt 2.3 KB
Remote Desktop Through Company Firewall.txt 2.6 KB
Remote Shutdown.txt 1.2 KB
Remove Linux From Your Pc Safely, ...and restoring your MBR.txt 1.7 KB
Remove Msn Messenger From Xp, several ways...txt 5 KB
Removing Banners From Free Webhosts.txt 2.7 KB
Removing Norton Anti-virus 2004, How to remove the Registry Enteries.txt 995 Bytes
Rename 'recycle Bin' To Whatever You Want.txt 680 Bytes
Reregister All .dll Files Within Registry.txt 1.5 KB
Reset your lost Bios Password.txt 4.2 KB
Restore JPG,JPEG,JPE Default File associations, Win XP Tweak.txt 1.3 KB
Run Aol Without Using Aol Browser & Save Resources, connect permanently and use any browser.txt 447 Bytes
Running A Board forum From Your Own Pc.txt 2.3 KB
Running Vanishing Console Programs With A Click!, Ever had a console program that vanis....txt 1.1 KB
Safely Editing the Registry....txt 1.9 KB
Save Your Desktop Icon Settings.txt 2.2 KB
Saving and loading Photoshop actions.txt 1.8 KB
Scheduled Tasks - Defrag, how to set up scheduled defrags.txt 1.9 KB
ScreenLock Professional v2.0.41.txt 43 Bytes
Search For Ebook Server With 362 Bytes
Search like a real warez d00dz, for warez of course!.txt 581 Bytes
Searching For Something To Download, This may help.txt 350 Bytes
Secret Backdoor To Many Websites.txt 2.1 KB
Secrets Of Lock Picking.txt 53.7 KB
Securing WinXP Pro (with what win-xp has to offer.txt 9.6 KB
Securing your WINDOWS XP computer.txt 1.2 KB
Set Google as your Default Search in IE.txt 561 Bytes
Set Win Explorer to open the folder you want!, Little trick.txt 234 Bytes
sick of inserting winxp cd every time your pc asks, Change Default Location of i386 Folder.txt 3.2 KB
sidebar fix.txt 587 Bytes
Simple Tweaks For Peak Pc Graphics Performance.txt 10.2 KB
Single Click Shutdown.txt 2.8 KB
Single-click To Open An Item..., IF the Folder Options is grayed out.txt 1.2 KB
Slow Loggon Time, one fix for problem.txt 986 Bytes
Slow Opening Of File Dialogs.txt 1.1 KB
Some Cool Site For Tutorials.txt 420 Bytes
Some Google Tricks, again.txt 1.7 KB
Some More Tips To Improve Your Winxp.txt 24.1 KB
Sp2 For Xp Slipstream, Integrate SP2 into your XP CD.txt 10.7 KB
Sp2 Tweaks.txt 3.4 KB
Speed Up Internet.txt 4.5 KB
Speed up menu display.txt 557 Bytes
Speed up Mozilla FireFox.txt 464 Bytes
Speed Up Your Bandwidth By 20% !, Windows uses 20% of your bandwidth.txt 1 KB
Speeding up menus in XP.txt 273 Bytes
Speeding up your internet connection under Linux and Windows.html 11.8 KB
Spoofing emails, via telenet.txt 417 Bytes
Standard ASCII Character Set.txt 1.8 KB
Steps to Clean Install XP.txt 8.2 KB
Stop A Restart Process In 3steps.txt 300 Bytes
Stop Annoying Pop-ups Without Pop-up Blockersoutli.txt 1.2 KB
System Changes To Foil Hackers And Browser Hijacke.txt 7.7 KB
System File Checker For Windows Xp.txt 2.3 KB
Tcpip A Mammoth Description, Short and easy-Everything U want to know.txt 51 KB
Testing Wattage Consumption Of Your Computer, Measuring your computer's wattage.txt 9.3 KB
The Antivirus Defense-in-Depth Guide.txt 2.8 KB
The difference between DVD-R, DVD+R, DVD+RW and DVD-RW.txt 3.7 KB
The Modern Phreakers Guide To Beige Boxing.txt 4.3 KB
The Modern Phreakers Guide To Payphones.txt 7 KB
The Port Guide, Port number and info.txt 24.6 KB
The Ultimate Guide To Installing Windows Xp Sp2.txt 3.1 KB
Three Ways Of Bypass Starforce Cd Protection.txt 2.5 KB
Tip for shutdown windows - virus.txt 397 Bytes
Tips And Tricks, Windows XP.txt 41.2 KB
Tired Of Reinstalling Windows.txt 2.3 KB
To Get And Show The Ip Via Javascript.txt 632 Bytes
Top 5 Myths About Safe Surfing, PC Magazine.txt 3.4 KB 47 Bytes
Transferring Data.txt 6.4 KB
Translating Binary To Text.txt 6.2 KB
Translating Binary to Text2.txt 5.7 KB
Trojan Ports.txt 13.8 KB
Turn MSN Messenger Display Pix into User Pix on XP.txt 2.5 KB
Turn Off Unneeded Services, speed up pc.txt 1.6 KB
Tutorial Get the serial number you need.txt 899 Bytes
Tutorial How to create a bootable Windows XP SP1 CD (Nero).txt 2.2 KB
Tutorials - / coding / Base Number Systems.html 7.8 KB
Tutorials - / coding / BASIC C Socket Programming In Unix For Newbies.txt 21.5 KB
Tutorials - / coding / Basics of am 3mp33j3w.txt 18.6 KB
Tutorials - / coding / Batch File Programming.txt 41.7 KB
Tutorials - / coding / BOOLEAN LOGIC GATES.html 14 KB
Tutorials - / coding / C++ Tutorial By Clayman.html 23.8 KB
Tutorials - / coding / Creating A Simple Hit Counter In PHP.html 8.8 KB
Tutorials - / coding / Creating A Simple Search Engine In PHP.html 9.6 KB
Tutorials - / coding / Creating Truly Skinnable Web Sites.html 13.6 KB
Tutorials - / coding / Escape Quotes In Perl Shell.html 7.6 KB
Tutorials - / coding / Flat databases in Perl.html 27.1 KB
Tutorials - / coding / Introduction to Buffer Overflow.htm 37.6 KB
Tutorials - / coding / Introduction to 31.4 KB
Tutorials - / coding / IRC Bot In Perl.html 14.1 KB
Tutorials - / coding / pascal.txt 70.1 KB
Tutorials - / coding / Python for Newbies.htm 55 KB
Tutorials - / coding / Sk00l m3 ASM!!#@$!@#.txt 112.8 KB
Tutorials - / coding / The Boot Sector.html 19.3 KB
Tutorials - / coding / The C Programming Language Torn Apart.html 24.5 KB
Tutorials - / coding / The Perl Weekly Journal 1st edition.html 29.8 KB
Tutorials - / coding / The Perl Weekly Journal 2nd edition.html 14.3 KB
Tutorials - / coding / The Perl Weekly Journal 3rd edition.html 22.6 KB
Tutorials - / coding / The Perl Weekly Journal 4th edition.html 18 KB
Tutorials - / coding / Tutorial Assembly for nerds using linux - part 1.txt 7.7 KB
Tutorials - / coding / Using Databases In PHP.html 11.7 KB
Tutorials - / coding / Win32 Multithreading and Synchronization.html 24.9 KB
Tutorials - / coding / WINDOWS INTERNET PROGRAMMING PART 3.html 69 KB
Tutorials - / coding / WINDOWS INTERNET PROGRAMMING part1.html 112.6 KB
Tutorials - / coding / WINDOWS INTERNET PROGRAMMING {part 2}.html 31.6 KB
Tutorials - / encrypt / algorithms.html 189.1 KB
Tutorials - / encrypt / base64.htm 94.6 KB
Tutorials - / encrypt / 4.9 KB
Tutorials - / encrypt / encryption.txt 8.4 KB
Tutorials - / encrypt / encryption_auth.html 15.2 KB
Tutorials - / encrypt / passwd.txt 49.4 KB
Tutorials - / encrypt / passwd2.html 74.7 KB
Tutorials - / encrypt / pgp.html 20 KB
Tutorials - / encrypt / quantum / Axes.jpg 5.7 KB
Tutorials - / encrypt / quantum / CrptoProcess.jpg 21.3 KB
Tutorials - / encrypt / quantum / Electro.jpg 18.9 KB
Tutorials - / encrypt / quantum / NormalCrypto.jpg 17.1 KB
Tutorials - / encrypt / quantum / NormalCryptoS.jpg 13.7 KB
Tutorials - / encrypt / quantum / Phase.jpg 19.1 KB
Tutorials - / encrypt / quantum / QuantumCrypto.jpg 13 KB
Tutorials - / encrypt / quantum / QuantumCryptoS.jpg 16 KB
Tutorials - / encrypt / quantum / quantum_cryptography.htm 34.9 KB
Tutorials - / encrypt / 128.3 KB
Tutorials - / encrypt / rsa.txt 10.5 KB
Tutorials - / encrypt / ssl.html 8.5 KB
Tutorials - / encrypt / ssltun.html 7.6 KB
Tutorials - / hardware / buildcomp.html 12.2 KB
Tutorials - / hardware / cdrom.html 9.1 KB
Tutorials - / hardware / harddrive.html 7.5 KB
Tutorials - / hardware / hardware.html 15.8 KB
Tutorials - / hardware / memory.html 7.6 KB
Tutorials - / hardware / overclocking.html 25.2 KB
Tutorials - / hardware / PC_Hardware.html 19.5 KB
Tutorials - / history / hod.html 41.5 KB
Tutorials - / humor / flame.html 9.8 KB
Tutorials - / humor / hackattack.html 3.9 KB
Tutorials - / humor / jokerrap.html 2.3 KB
Tutorials - / irc / eggdrops.html 41.8 KB
Tutorials - / irc / fserv.html 48.3 KB
Tutorials - / irc / ircwar.html 53.7 KB
Tutorials - / lecture / cpplecture.html 18.6 KB
Tutorials - / lecture / hacker.txt 11.2 KB
Tutorials - / lecture / informatic.html 24.2 KB
Tutorials - / lecture / irc2.html 141.2 KB
Tutorials - / lecture / linuxnetworking.html 59.7 KB
Tutorials - / lecture / LKMlecture.html 30.1 KB
Tutorials - / lecture / mirclecture.html 24.4 KB
Tutorials - / lecture / ntsec.html 70.2 KB
Tutorials - / lecture / perlfilterlecture.html 39.1 KB
Tutorials - / lecture / Perllecture.html 32.6 KB
Tutorials - / lecture / phpl.html 33.6 KB
Tutorials - / lecture / sqllecture.html 35 KB
Tutorials - / lecture / traceroute.txt 5.1 KB
Tutorials - / lecture / vpnlecture.html 91.1 KB
Tutorials - / lecture / wardriving.html 21.2 KB
Tutorials - / local / recover.txt 4.8 KB
Tutorials - / local / standsec.html 44.1 KB
Tutorials - / misc / beinghacker.html 43.9 KB
Tutorials - / misc / ezine.txt 7.3 KB
Tutorials - / misc / kiddies.txt 20.2 KB
Tutorials - / misc / search2.txt 38.3 KB
Tutorials - / misc / social.html 15.1 KB
Tutorials - / net / adblock.html 12.7 KB
Tutorials - / net / advisory01.html 25.6 KB
Tutorials - / net / ankitgeo.htm 49 KB
Tutorials - / net / ankit_smtp.htm 59.6 KB
Tutorials - / net / cable.html 31.3 KB
Tutorials - / net / cable.txt 20.9 KB
Tutorials - / net / caching.html 11.9 KB
Tutorials - / net / close.html 34 KB
Tutorials - / net / Default Passwords.html 1.1 MB
Tutorials - / net / Exploiting Cisco Systems.txt 20.5 KB
Tutorials - / net / Exploiting File and Print Sharing.html 28.5 KB
Tutorials - / net / Exploits Explained II The #2,000 bug.txt 4.3 KB
Tutorials - / net / firewalls_torn.html 13.2 KB
Tutorials - / net / ftp.html 11.7 KB
Tutorials - / net / HACKER BEING - on the meaning of being a hacker.html 43.9 KB
Tutorials - / net / Hacking CGI - Security and Exploitation.html 108.2 KB
Tutorials - / net / http.txt 20 KB
Tutorials - / net / icq.txt 52.9 KB
Tutorials - / net / info.html 5.5 KB
Tutorials - / net / inputval.txt 6.2 KB
Tutorials - / net / Internetarch.html 28.2 KB
Tutorials - / net / INTRODUCTION TO DENIAL OF SERVICE.txt 46.2 KB
Tutorials - / net / IP and port Info using Netstat.txt 10.5 KB
Tutorials - / net / ip.html 8.9 KB
Tutorials - / net / kerberos.html 35.8 KB
Tutorials - / net / lecture1.html 35 KB
Tutorials - / net / Mail Bombing and List Linking.txt 7.3 KB
Tutorials - / net / MailMachine flaws.txt 4.9 KB
Tutorials - / net / masquerading.html 11.8 KB
Tutorials - / net / mlist.txt 9.6 KB
Tutorials - / net / net_toolz.html 76.5 KB
Tutorials - / net / osmod1.02.htm 21.4 KB
Tutorials - / net / pop3.html 8.4 KB
Tutorials - / net / proxy.html 12.2 KB
Tutorials - / net / rmhacking.html 16.2 KB
Tutorials - / net / sendmail.html 81.7 KB
Tutorials - / net / sendmail2.txt 78.3 KB
Tutorials - / net / sigscr101.html 15.7 KB
Tutorials - / net / tcpip.html 30.8 KB
Tutorials - / net / trojans.html 13.2 KB
Tutorials - / net / unixvirii.txt 11.2 KB
Tutorials - / net / usenet.html 21.3 KB
Tutorials - / novell / Novell Hacking for Complete Newbies.html 31.1 KB
Tutorials - / novell / Novell Netware - Cracking Netware.htm 53.1 KB
Tutorials - / tools / Cracking Unix password files for beginners.html 22.2 KB
Tutorials - / tools / How to use the Fast Zip Cracker (FZC).html 11.7 KB
Tutorials - / unix / 2038-time-bug.txt 7.1 KB
Tutorials - / unix / etc.html 12.5 KB
Tutorials - / unix / linux.html 35 KB
Tutorials - / unix / linuxgames.html 5.8 KB
Tutorials - / unix / linuxhdtweak.html 6.4 KB
Tutorials - / unix / linuxnet.txt 34.7 KB
Tutorials - / unix / shell.html 18.3 KB
Tutorials - / unix / slackcs.txt 7 KB
Tutorials - / unix / tcpwrappers.html 18.8 KB
Tutorials - / unix / unixsec.html 59 KB
Tutorials - / unix / winmodem.html 3.9 KB
Tutorials - / win / debug.html 15.7 KB
Tutorials - / win / foolproof.html 8.4 KB
Tutorials - / win / foolproof2.html 10.3 KB
Tutorials - / win / ipc.html 4.9 KB
Tutorials - / win / reg.html 10.3 KB
Tutorials - / win / registry.html 22.2 KB
Tutorials - / win / win2kinstall.html 11.5 KB
Tutorials - / win / 11.6 KB
Tutorials - / win / windows.html 25.7 KB
Tutorials - / win / winerror.html 8.6 KB
Tutorials - / win / winsecret.html 39.8 KB
Tutorials - / win / winsecurity2.html 56.4 KB
Ultimate Google Way.txt 803 Bytes
Uninstall Windows Xp And Return To My Old Windows.txt 1.1 KB
Uninstalling Norton 2004 Products.txt 888 Bytes
Unlimited Rapidshare Downloads.txt 842 Bytes
Untold Window Tips.txt 34.6 KB
Untold Windows Secrets.txt 35.6 KB
Untold Windows Tips.txt 34.4 KB
Unused space on hard drives recovered.txt 5.6 KB
Use Hotkeys To Switch Programs.txt 496 Bytes
Useful Download Guide, Fix Down, 0daycn Ttdown, Links.txt 8.1 KB
User's Guide To Avoiding Virus Infections, Keeping an eye out for viruses.txt 10.2 KB
Using Google As A Calculator, A Tutorial.txt 2.9 KB
Using Google for searching ebooks.txt 691 Bytes
Using Rapid Share, How to use them and skip the BS.txt 2.8 KB
Video Avatars.txt 862 Bytes
Viewing Leftover Driver Entries.txt 1.6 KB
Virtual Memory Information.txt 6.7 KB
Virtual Memory Optimization Guide Rev. 4.0 - Final.txt 81.9 KB
Want To Download Torrent File By Using Google.txt 202 Bytes
Warez Definations.txt 19.7 KB
Way To Download From Brturbo, FireFox.txt 486 Bytes
We Don't Need No Education, Online classes made easy.txt 2.3 KB
Welcome to The king's meaning's of how to kick some-one's ASS!.txt 4.4 KB
What is the Registry.txt 13.2 KB
What Should I Do With Image Files.txt 3.2 KB
What You Wanted To Know About Movie Jargon, But Were Afraid To Ask.txt 17.3 KB
When Good Discs Go Bad.txt 10.5 KB
Where Is Winipcfg In Winxp.txt 632 Bytes
Who's Seeding The Net With Spyware.txt 5.3 KB
Why wait 35 Seconds at eZshare.txt 1.6 KB
Win 2000 Dr. Watsson.txt 237 Bytes
Windows 2000 Tips & Tricks.txt 4.6 KB
Windows 2003 System Restore, How to activate system restore in W2K3.txt 5.5 KB
Windows Scan Count Down Time.txt 556 Bytes
Windows Shortcuts.txt 12.8 KB
Windows Tweak, Hack Your Start Button.txt 3.3 KB
Windows Xp - Speed Up Your Network and Internet Access.txt 2.7 KB
Windows XP Registry Tweaks.txt 34.1 KB
Windows XP Startup and Performance Tweaks.txt 1.8 KB
Windows Xp Tips 'n' Tricks.txt 28.5 KB
Windows Xp Tweaks, A work in progress.txt 3 KB
Windows XP Tweaks.txt 2.4 KB
WinRar Tutorial - Compression profiles, passwords and more.txt 5.8 KB
Winsock 2 Repair.txt 2.1 KB
WinXP 3 Tips.txt 1.9 KB
Winxp Application Defrag, faster access for used programs.txt 309 Bytes
Winxp Applications Startup Time, Decrease your Applications startup time.txt 1.2 KB
WinXP Bootable CD.txt 2.2 KB
Winxp System Response, reboot whitout rebooting.txt 625 Bytes
Winxp Tips And Tricks, Winsock 2 repair.txt 2.2 KB
Xp Auto Install.txt 1.8 KB
Xp Folder View Does Not Stay To You're Setting., Grab your registry editor and join in.txt 1.9 KB
XP Tweaking.txt 15.7 KB
Yahoo + geocities Posts.txt 3.1 KB
Yahoo Messeger, no ad's.txt 852 Bytes
You Want Lots Of Music, Appz, Anything, Try Dex Hunting.txt 1.5 KB
Your Home Page Nevr Being Changed.txt 516 Bytes
Your Own Home Server - Introduction.txt 11.2 KB
[php] Navigations.txt 1.3 KB

Download Link

:: NeW : Hacking a mobile phone with Super Bluetooth Hack + Video Explanation ::

Hi everybody
today i will show you with video how to hack another mobile phone using the Super Bluetooth Hack software .

1st :
Download the : Super Bluetooth Hack software


2nd :
Video explanation uploaded in Youtube :

That's all
Wait your comments

Tracing a Hacker ……

## Connections make the world go round ##

The computer world, at any rate. Every single time you open up a
website, send an email or upload your webpages into cyberspace, you are
connecting to another machine in order to get the job done. This, of
course, presents a major problem, because this simple act is what
allows malicious users to target a machine in the first place.

# How do these people find their victim?

Well, first of all, they need to get hold of the victim's IP Address.
Your IP (Internet Protocol) address reveals your point of entry to the
Internet and can be used in many ways to cause your online activities
many, many problems. It may not reveal you by name, but it may be
uniquely identifiable and it represents your digital ID while you are
online (especially so if you're on a fixed IP / DSL etc).

With an IP address, a Hacker can find out all sorts of weird and
wonderful things about their victim (as well as causing all kinds of
other trouble, the biggest two being Portnukes/Trojans and the dreaded
DoS ((Denial of Service)) attack). Some Hackers like to collect IP
Addresses like badges, and like to go back to old targets, messing them
around every so often. An IP address is incredibly easy to obtain -
until recently, many realtime chat applications (such as MSN) were
goldmines of information. Your IP Address is contained as part of the
Header Code on all emails that you send and webpages that you visit can
store all kinds of information about you. A common trick is for the
Hacker to go into a Chatroom, paste his supposed website address all
over the place, and when the unsuspecting victim visits, everything
about your computer from the operating system to the screen resolution
can be logged...and, of course, the all important IP address. In
addition, a simple network-wide port scan will reveal vulnerable target
machines, and a war-dialler will scan thousands of lines for exposed
modems that the hacker can exploit.

So now that you know some of the basic dangers, you're probably wondering how these people connect to a victim's machine?

## Virtual and Physical Ports ##

Everything that you recieve over the Internet comes as a result of
other machines connecting to your computer's ports. You have two types;
Physical are the holes in the back of your machine, but the important
ones are Virtual. These allow transfer of data between your computer
and the outside world, some with allocated functions, some without, but
knowing how these work is the first step to discovering who is
attacking you; you simply MUST have a basic knowledge of this, or you
won't get much further.

# What the phrases TCP/UDP actually mean

TCP/IP stands for Transmission Control Protocol and Internet Protocol,
a TCP/IP packet is a block of data which is compressed, then a header
is put on it and it is sent to another computer (UDP stands for User
Datagram Protocol). This is how ALL internet transfers occur, by
sending packets. The header in a packet contains the IP address of the
one who originally sent you it. Now, your computer comes with an
excellent (and free) tool that allows you to see anything that is
connected (or is attempting to connect) to you, although bear in mind
that it offers no blocking protection; it simply tells you what is
going on, and that tool is NETSTAT.

## Netstat: Your first line of defence ##

Netstat is a very fast and reliable method of seeing exactly who or
what is connected (or connecting) to your computer. Open up DOS
(Start/Programs/MS-DOS Prompt on most systems), and in the MSDOS
Prompt, type:

netstat -a

(make sure you include the space inbetween the "t" and the "a").

If you're connected to the Internet when you do this, you should see something like:

Active Connections

Proto Local Address Foreign Address State

TCP macintosh: 20034 50505 ESTABLISHED

TCP macintosh: 80 proxy.webcache.eng.sq: 30101 TIME_WAIT




Now, "Proto(col)" simply means what kind of data transmission is taking
place (TCP or UDP), "Local address" is your computer (and the number
next to it tells you what port you're connected on), "Foreign Address"
is the machine that is connected to you (and what port they're using),
and finally "State" is simply whether or not a connection is actually
established, or whether the machine in question is waiting for a
transmission, or timing out etc.

Now, you need to know all of Netstat's various commands, so type:

netstat ?

You will get something like this:

Displays protocol statistics and current TCP/IP network connections.

NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval]

-a Displays all connections and listening ports.

-e Displays Ethernet statistics. This may be combined with the -s option.

-n Displays addresses and port numbers in numerical form.

-p proto Shows connections for the protocol specified by proto; proto
may be TCP or UDP. If used with the -s option to display per-protocol
statistics, proto may be TCP, UDP, or IP.

-r Displays the routing table.

-s Displays per-protocol statistics. By default, statistics are shown
for TCP, UDP and IP; the -p option may be used to specify a subset of
the default.

Have a play around with the various options, but the most important use
of these methods is when you combine them. The best command to use is

netstat -an

because this will list all connections in Numerical Form, which makes
it a lot easier to trace malicious users....Hostnames can be a little
confusing if you don't know what you're doing (although they're easily
understandable, as we shall see later). Also, by doing this, you can
also find out what your own IP address is, which is always useful.


netstat -b

will tell you what ports are open and what programs are connecting to the internet.

## Types of Port ##

It would be impossible to find out who was attacking you if computers
could just access any old port to perform an important function; how
could you tell a mail transfer from a Trojan Attack? Well, good news,
because your regular, normal connections are assigned to low, commonly
used ports, and in general, the higher the number used, the more you
should be suspicious. Here are the three main types of port:

# Well Known Ports These run from 0 to 1023, and are bound to the
common services that run on them (for example, mail runs on channel 25
tcp/udp, which is smtp (Simple Mail Transfer Protocol) so if you find
one of these ports open (and you usually will), it's usually because of
an essential function.

# Registered Ports These run on 1024 to 49151. Although not bound to a
particular service, these are normally used by networking utilities
like FTP software, Email client and so on, and they do this by opening
on a random port within this range before communicating with the remote
server, so don't panic (just be wary, perhaps) if you see any of these
open, because they usually close automatically when the system that's
running on them terminates (for example, type in a common website name
in your browser with netstat open, and watch as it opens up a port at
random to act as a buffer for the remote servers). Services like MSN
Messenger and ICQ usually run on these Ports.

# Dynamic/Private Ports Ranging from 49152 to 65535, these things are
rarely used except with certain programs, and even then not very often.
This is indeed the usual range of the Trojan, so if you find any of
these open, be very suspicious. So, just to recap:

Well Known Ports 0 to 1023 Commonly used, little danger.

Registered Ports 1024 to 49151 Not as common, just be careful.

Dynamic/Private Ports 49152 to 65535 Be extremely suspicious.

## The hunt is on ##

Now, it is essential that you know what you're looking for, and the
most common way someone will attack your machine is with a Trojan. This
is a program that is sent to you in an email, or attempts to bind
itself to one of your ports, and when activated, it can give the user
your passwords, access to your hard drive...they can even make your CD
Tray pop open and shut. At the end of this Document, you will find a
list of the most commonly used Trojans and the ports they operate on.
For now, let's take another look at that first example of Netstat....

Active Connections

Proto Local Address Foreign Address State

TCP macintosh: 27374 50505 ESTABLISHED

TCP macintosh: 80 proxy.webcache.eng.sq: 30101 TIME_WAIT




Now, straight away, this should make more sense to you. Your computer
is connected on two ports, 80 and 27374. Port 80 is used for http/www
transmissions (ie for all intents and purposes, its how you connect to
the net, although of course it's a lot more complicated than that).
Port 27374, however, is distinctly suspicious; first of all, it is in
the registered port range, and although other services (like MSN) use
these, let's assume that you have nothing at all running like instant
messengers, webpages're simply connected to the net through
proxy. So, now this connection is looking even more troublesome, and
when you realise that 27374 is a common port for Netbus (a potentially
destructive Trojan), you can see that something is untoward here. So,
what you would do is:

1) run Netstat , and use:

Netstat -a


Netstat -an

So you have both Hostnames AND IP addresses.

## Tracerouting ##

Having the attacker's IP is all well and good, but what can you do with
it? The answer is, a lot more! It's not enough to have the address, you
also need to know where the attacker's connections are coming from. You
may have used automated tracerouting tools before, but do you jknow how
they work?

Go back to MSDOS and type

tracert *type IP address/Hostname here*

Now, what happens is, the Traceroute will show you all the computers
inbetween you and the target machine, including blockages, firewalls
etc. More often than not, the hostname address listed before the final
one will belong to the Hacker's ISP Company. It'll either say who the
ISP is somewhere in there, or else you run a second trace on the new
IP/hostname address to see who the ISP Company in question is. If the
Hostname that you get back doesn't actually seem to mention an actual
geographical location within its text, you may think all is lost. But
fear not! Suppose you get a hostname such as

Well, that tells us nothing, right? Wrong....simply enter the hostname
in your browser, and though many times you will get nothing back,
sometimes it will resolve to an ISP, and from there you can easily find
out its location and in what areas they operate. This at least gives
you a firm geographical location to carry out your investigations in.

If you STILL have nothing, as a last resort you COULD try connecting to
your target's ISP's port 13 by Telnet, which will tell you how many
hours ahead or behind this ISP is of GMT, thus giving you a
geographical trace based on the time mentioned (although bear in mind,
the ISP may be doing something stupid like not having their clocks set
correctly, giving you a misleading trace. Similarly, a common tactic of
Hackers is to deliberately have their computer's clock set to a totally
wrong time, so as to throw you off the scent). Also, unless you know
what you're doing, I wouldn't advise using Telnet (which is outside the
parameters of this tutorial).

## Reverse DNS Query ##

This is probably the most effective way of running a trace on somebody.
If ever you're in a chatroom and you see someone saying that they've
"hacked into a satellite orbiting the Earth, and are taking pictures of
your house right now", ignore them because that's just bad movie
nonsense. THIS method is the way to go, with regard to finding out what
country (even maybe what State/City etc) someone resides, although it's
actually almost impossible to find an EXACT geographical location
without actually breaking into your ISP's Head Office and running off
with the safe.

To run an rDNS query, simply go back to MS-DOS and type


and hit return. Any active connections will resolve to hostnames rather than a numerical format.


DNS stands for Domain Name Server. These are machines connected to the
Internet whose job it is to keep track of the IP Addresses and Domain
Names of other machines. When called upon, they take the ASCII Domain
Name and convert it to the relevant numeric IP Address. A DNS search
translates a hostname into an IP address....which is why we can enter
"" and get the website to come up, instead of having to
actually remember Hotmail's IP address and enter that instead. Well,
Reverse DNS, of course, translates the IP Address into a Hostname (ie -
in letters and words instead of numbers, because sometimes the Hacker
will employ various methods to stop Netstat from picking up a correct

So, for example, is NOT a Hostname. IS a Hostname.

Anyway, see the section at the end? (au) means the target lives in
Australia. Most (if not all) hostnames end in a specific Country Code,
thus narrowing down your search even further. If you know your target's
Email Address (ie they foolishly sent you a hate mail, but were silly
enough to use a valid email address) but nothing else, then you can use
the Country codes to deduce where they're from as well. You can also
deduce the IP address of the sender by looking at the emails header (a
"hidden" line of code which contains information on the sender)...on
Hotmail for example, go to Preferences, and select the "Full Header's
Visible" option. Alternatively, you can run a "Finger" Trace on the
email address, at:

Plus, some ISP's include their name in your Email Address with them too
(ie Wanadoo, Supanet etc), and your Hacker may be using an email
account that's been provided by a Website hosting company, meaning this
would probably have the website host's name in the email address (ie
Webspawners). So, you could use the information gleaned to maybe even
hunt down their website (then you could run a website check as
mentioned previously) or report abuse of that Website Provider's Email
account (and thus, the Website that it goes with) to

If your Hacker happens to reside in the USA, go to:

for a complete list of US State abbreviatons.

## List of Ports commonly used by Trojans ##

Please note that this isn't a complete list by any means, but it will
give you an idea of what to look out for in Netstat. Be aware that some
of the lower Ports may well be running valid services.

UDP: 1349 Back Ofrice DLL

31337 BackOfrice 1.20

31338 DeepBO

54321 BackOfrice 2000

TCP: 21 Blade Runner, Doly Trojan, Fore, Invisible FTP, WebEx, WinCrash

23 Tiny Telnet Server

25 Antigen, Email Password Sender, Haebu Coceda, Shtrilitz Stealth, Terminator, WinPC, WinSpy, Kuang2 0.17A-0.30

31 Hackers Paradise

80 Executor

456 Hackers Paradise

555 Ini-Killer, Phase Zero, Stealth Spy

666 Satanz Backdoor

1001 Silencer, WebEx

1011 Doly Trojan

1170 Psyber Stream Server, Voice

1234 Ultors Trojan

1243 SubSeven 1.0 - 1.8

1245 VooDoo Doll

1492 FTP99CMP

1600 Shivka-Burka

1807 SpySender

1981 Shockrave

1999 BackDoor 1.00-1.03

2001 Trojan Cow

2023 Ripper

2115 Bugs

2140 Deep Throat, The Invasor

2801 Phineas Phucker

3024 WinCrash

3129 Masters Paradise

3150 Deep Throat, The Invasor

3700 Portal of Doom

4092 WinCrash

4567 File Nail 1

4590 ICQTrojan

5000 Bubbel

5000 Sockets de Troie

5001 Sockets de Troie

5321 Firehotcker

5400 Blade Runner 0.80 Alpha

5401 Blade Runner 0.80 Alpha

5402 Blade Runner 0.80 Alpha

5400 Blade Runner

5401 Blade Runner

5402 Blade Runner

5569 Robo-Hack

5742 WinCrash

6670 DeepThroat

6771 DeepThroat

6969 GateCrasher, Priority

7000 Remote Grab

7300 NetMonitor

7301 NetMonitor

7306 NetMonitor

7307 NetMonitor

7308 NetMonitor

7789 ICKiller

8787 BackOfrice 2000

9872 Portal of Doom

9873 Portal of Doom

9874 Portal of Doom

9875 Portal of Doom

9989 iNi-Killer

10067 Portal of Doom

10167 Portal of Doom

10607 Coma 1.0.9

11000 Senna Spy

11223 Progenic trojan

12223 Hack´99 KeyLogger

12345 GabanBus, NetBus

12346 GabanBus, NetBus

12361 Whack-a-mole

12362 Whack-a-mole

16969 Priority

20001 Millennium

20034 NetBus 2.0, Beta-NetBus 2.01

21544 GirlFriend 1.0, Beta-1.35

22222 Prosiak

23456 Evil FTP, Ugly FTP

26274 Delta

30100 NetSphere 1.27a

30101 NetSphere 1.27a

30102 NetSphere 1.27a

31337 Back Orifice

31338 Back Orifice, DeepBO

31339 NetSpy DK

31666 BOWhack

33333 Prosiak

34324 BigGluck, TN

40412 The Spy

40421 Masters Paradise

40422 Masters Paradise

40423 Masters Paradise

40426 Masters Paradise

47262 Delta

50505 Sockets de Troie

50766 Fore

53001 Remote Windows Shutdown

54321 SchoolBus .69-1.11

61466 Telecommando

65000 Devil

## Summary ##

I hope this tutorial is useful in showing you both how to secure
yourself against unwanted connections, and also how to determine an
attacker's identity. The Internet is by no means as anonymous as some
people think it is, and although this is to the detriment of people's
security online, this also works both IS possible to find
and stop even the most determined of attackers, you just have to be
patient and keep hunting for clues which will help you put an end to
their exploits.


Wondershare YouTube Downloader Build

Wondershare YouTube downloader is a very easy to use Youtube video download tool and YouTube Converter. It has the complete functions to download YouTube video, archive Youtube video, and convert YouTube video to iPod,iPhone, PSP, Apple TV, Zune, Pocket PC and a lot of other mobile devices.
Wondershare Youtube Downloader can automatically detect the Youtube video files from the Youtube web pages you have opened and download multiple files at a time. It can also batch convert downloaded Youtube video files or local FLV files on your computer. Wondershare Youtube Downloader is everything you need to easily download Youtube video from the Internet and enjoy Youtube video off the Internet!

Wondershare YouTube Downloader Key Features

# 1. Download Youtube Video
Let you choose to automatically detect and download Youtube video from the Internet.
# 2. Archive Youtube video
Provide you with different categories to archive downloaded Youtube video.
# 3. Easy to use
A very user-friendly interface with every step intuitively sorted on the main interface.
# 4. Batch download
Allow you to batch download multiple Youtube video files at a time.
# 5. Batch convert
Let you convert multiple FLV files at a time.
# 6. View download history
Provide you with the download history list to let you know what files you have downloaded in the past.
# 7. Flexible program settings
Allow you to customize various options to make the program the easiest for you.

OS: 2000/2003/XP/Vista

Size : 8,7 MB


Windows Crystal XP v3.08.09 2008

Windows Crystal XP v3.08.09 2008 | 580MB
some screen of windows :

Only install this edition of Windows onto a freshly formatted partition
First of all there is {no languages or drivers has been removed}


Help and support files
Wallpapers and backgrunds {Replaced}
Windows Sounds
Old Windows Themes {Replaced}
Movie Maker
Old Windows Cursures
Old screen savers

Integrated :
Internet Explorer 7
Media Player 11
Flash player 9
Direct x9
Control panel addons:
1-Boot safe
2-Boot Vis
3-Clear Type Tuning
6-HD Tune
8-Mem Test
9-MS Autoplay Repair Wizard
10-MS Time Zone
11-MS Virtual cd-Rom
12-MS Config
13-Msi Cleanup Utility
14-Services and Devices
15-Startup Control Panel
17-User Accounts 2
18-Win Update List


1-Foxit pdf reader
2-K-Lite Mega codec pack
3-Node23 Antiviruse
4-Orbit Downloader
5-Tuneup Utilities
6-Winamp mp3 player
7-Windows Live Messenger
8-Winrar Corporat
9-Yahoo Messenger

Optional Programs:

1-Firefox Web Browser
2-Microsoft .NET Framework Version 2.0
3-Microsoft Java
4-Faststone Image Viewer
5-Nero Micro v7.7.5.1
6-UltraISO Premium Edition
7-Powertoy Image Resizer
9-Paint .Net
10-Flash Games


1-All latest hotfixes integrated till this moment
2-More speed while browsing internet and network computers
3-New programs has been added with the latest versions
4-More useful registry tweaks
5-Faster connection speed has been unlocked
6-Annoying windows error message has been disabled
7-windows file protection has been disabled
8-New beautiful background wallpapers
9-New style icons and themes
10-Transparent glass aero
11-New boot screen and logon screen
and much more
Note: because this version not create by english,so after install complete you need do :
- Step 1: need Remove Egypt Keyboard : go to Control panel\Regional and language options\language\Detail , after Remove Egypt keyboard.
- Step 2: if you install Office ,mouse will be right when you open Word program. You go to menu Format\Paragraph\Indents and Spacing Direction .Choose left-to-right, click OK.

download link :
pass (if need) : downarchive

DSL Speed v3.9 - Speed Up Your Internet Speed To The Max!

Great little application that speeds up your connection to the max and rips out any limitations from your service provider, includes activation details.



Hj SPlit 2.3

HJSplit for Windows
HJSplit 2.3 Very nice looking freeware file splitter. It splits files of any type and size. Does not need to be installed. Just click on hjsplit.exe and the program starts. This program can even handle files which are larger than 10Gb!
New release!


WinRAR Corporate Edition 3.7.1

WinRAR is a powerful archive manager. This edition has a powerful compressing power and reduces time of compressing. It can backup your data and reduce size of email attachments, decompress RAR,
ZIP and other files downloaded from Internet and create new archives in RAR and ZIP file format.

- The best compression/uncompression utility out there.
- Do various formats
- No serial needed (it's corporate edition!)

As it is Corporate Edition there is no need for keygen or crack or patch!
Just double click the icon and its all done.
No more annoying trial message!


My Zodiac Calendar v1.0.10080904

Be organized. Follow your stars. My Zodiac Calendar gives you the best of both worlds.My Zodiac Calendar is a fully featured calendar and an astrology companion at the same time. Its unique characteristic is the zodiac based calendar view that divides and navigates the calendar in accordance with horoscope signs. For any selected date the program shows its sign, position of planets and moon phase. As an additional reference a general description is included for each sign of the zodiac. In terms of an organizer, My Zodiac Calendar will keep track of your appointments, allow you to set reminders and recurrence patterns, and let you assign different entries to different data layers.

You can also make the program connect directly with your calendar in Outlook through a special data layer. Other notable calendaring features include a manageable list of tasks and a scribble panel where you can write some quick notes.Shows you the horoscope sign and position of planets for any selected date. Unique feature: use the calendar in a special zodiac view. Keeps track of all your appointments, recurring events and tasks. Allows you to set reminders and scribble quick notes. Shows you the moon phase, an approximate lunar image and information on other events in the near future/past for any selected date.

Size : 6.83 MB


IVT BlueSoleil v6.2.227.10

BlueSoleil 6.0 Mobile includes all the features of BlueSoleil 5.0.

Besides, it can back up your contacts, send messages with your computer without taking your phone
out of your pocket. You can also send contents in web pages to your Bluetooth phone directly by
just select and send...

Highlight Functions:
· Contact management
- Backup/restore Bluetooth phone's contacts to/from computer
- View Bluetooth phone's contacts on computer
- Edit/delete/upload contacts

- Type and send SMS from your computer
- View/backup/delete SMS on Bluetooth phones

· Send contents in a web page to your Bluetooth phone
- Send pictures or words in a web page to Bluetooth phone

BlueSoleil 6.0 Mobile supports the most popular platform such as Symbian S40/S60, Windows Mobile
5.0/6.0 and MTK etc. Many brands of mobile phone can work well with BlueSoleil 6.0 Mobile such
as Nokia, Sony Ericsson, Motorola, Samsung, LG, Blackberry and so on.

BlueSoleil 6.0 Mobile uses a new method, computer-bundle license mechanism, for license control,
instead of checking hardware license key in Bluetooth chipset. This new method does not limited
Bluetooth chipset, thus supporting more Bluetooth computer then before, e.g. Lenovo notebooks.

Install Notes:

1. Unpack and install the software
2. Copy patch.exe into the installation dir
3. Apply patch & restart

If you don't want to restart:

1. Run task manager
2. End process BtTray.exe & BlueSoleilCS.exe
3. Then apply patch

Additional Info:

1. To keep your pc clean files " patch.exe & setup.dl_ " from install dir can be deleted.

2. To remove "Bluetooth Places" icon from desktop [in Vista] delete folder:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Curr entVersion\explorer\Desktop\NameSpace\{32B4C379-4AC0-45F2-939C-D4E7ADA56DC5}

Your Ad Here