Ulisess Seguridad 9.91 [Updated]


Ulisess Seguridad 9.91 "12 MB" Ulisess Seguridad is a collection of cracks/fixes released till date for NOD 32 antivirus and ESET smart security 32BIT & 64BIT.

WHATS NEW: * Generador 8.0 alpha (x86) * NodLogin 9.9 alpha (x86/x64) * NodEnabler 2.81 (x86/x64) improved * MiNODLogin 2.4.0.1 (x86/x64) * TNOD User & Password Finder 1.0.0 BETA (x86) * SuperGetValid V2 rev4 (x86) * NodGEN 3.0 (x86/x64) * Eset Login Viewer 1.3 * Licencia gratuita 30 dias

NOTE: ESET kept detecting nodlogin & generdor as Win32/Packed.Autoit.Gen. It is a false threat. Download: http://rapidshare.com/files/209524663/Ulisess_Seguridad_9.91.www.dl4all.com.rar Password: www.dl4all.com

Avira AntiVir Premium 9.0.0.420 - K€y 2011


Avira AntiVir Premium 9.0.0.420 - K€y 2011 The Avira Premium Security Suite protects you in a very comprehensive way against the dangers from the Internet. It offers you numerous advantages over the virus protection offered in the AntiVir Premium Edition. In addition to AntiVir, the Suite offers an integrated firewall that wards off attacks such as DoS attacks (Denial of Service attacks) or port scans and spam filtering to help you manage the complex attacks on your mail box.

Security package with virus scanner, email protection, Personal Firewall, AntiSpyware, AntiPhishing, ...; - Very easy to install; - One click configuration with individual selection between standard and expert configuration; - Extremely high performance and detection capacity by using the latest standards (AHeAD technology); - Extremely small program and signature updates make sure that the protection against attackers is always up-to-date; - Take control of your inbox with Avira's advanced antispam technology. - AntiSpam, AntiPhishing and Rootkit Protection; New: - Virus check of every file and archive access; - Protection of active processes against undesired breakups; - Perfect for game tasks through the "Game mode" Premium Protection: AntiVir AntiAd/Spyware AntiPhishing AntiRootkit WebGuard AntiDrive-by AntiBot RescueSystem EmailScanner

Download: http://rapidshare.com/files/210731452/Avira_AntiVir_Premium_9.0.0.420_-_Key_2011_www.dl4all.com.rar

Advanced System Protector 2.0.323.1836 [ENG & RUS]


Advanced System Protector 2.0.323.1836 [ENG & RUS] "23 MB" Advanced System Protector is the latest security tool to protect your Windows System from all types of Spyware, Adware, Key Loggers, Browser Hijackers, Malware and other malicious programs that may be spying on your system. Advanced System Protector has Real Time guards, which can protect your Computer from any infection before it can cause any harm. It is the most comprehensive tool for protection from Spyware as it can scan, detect and remove even the most deep-rooted infections from your system. There are regular updates so that the Real Time guards are well equipped with definitions and the can well monitor your PC against any spyware threat. The already prepared database protects you from hundreds of thousands Spyware, Malware and Adware, keeping your data protected.We keep you safe, today, tomorrow and always. Features of "Advanced System Protector": · Advanced System Protector has been designed to Quick Scan your System and Deep Scan your System. Both these scans are a good way to check your PC for infections. A Quick Scan has been designed so that you can check your PC every morning, without spending much time on the scan. This will check for infections by the file path and warn you in case of any infections found. A Deep Scan should be performed on the first installation of Advanced System Protector, and then on a weekly basis. This is a thorough scan for your computer, where the files and folders are searched for infection on the basis of file path and MD5, a file recognition technology. In case an infection is found, you have the option to remove, ignore, quarantine or delete it, as per your choice. · Real Time Guards have been designed to continuously monitor your computer for any suspicious activity. These guards monitor the most vulnerable areas of your computer, which may be the gates for most infections. These guards are more active when you are browsing the Internet, opening files or executing applications and programs. Real Time Guards: · BHO Guard · This guard monitors the plug-ins installed in Internet Explorer and warns you when a new plug-in wants to install itself. · AppInit DLL Guard · The DLL files, which control the Application Initiation, are monitored by this guard. This ensures that no application gets listed in your Auto-Start list without your permission. · Winlogon Shell Guard · This guard is similar to the previous. It monitors the Windows Shell Registry setting and prevents any application from being loaded at the Windows Startup. · Hosts File Guard · This guard monitors the Hosts file and restricts changes to it. This means that you can get rid of most automatic and unwanted browser redirects. · IE Trusted Sites Guard · Internet Explorer keeps a list of trusted sites, where the browser permits less secure browsing. This guard keeps a check on this list and restricts any website from getting listed here without your permission. · IE Home Page Guard · This guard ensures that when you start your computer, you get to see the home-page that you have set in your computer, and not any unwanted home-page designed to lure you into a trap. · Running Process Guard · This guard prompts you to allow or restrict the execution of any new processes in your task list, ensuring that no malware starts automatically on your computer. · Startup Guard · This guard is designed to stop any unwanted and malicious software from entering the startup folder, preventing any malware to execute at the start of your system. · Startup Registry Files Guard · This guard monitors the Registry files for any changes and prompts you to authorize or restrict any suspicious change. · Advanced System Protector can quarantine any spyware ormalware detected on your computer to safeguard your system. This means that the files are placed in a safe vault, with their format changed. These files can not cause any harm to your computer anymore because they are not in their original format. The quarantine is designed to ensure that the spyware which are embedded in other applications, are prevented from execution or causing harm, without stopping the application to function. Requirements: · Intel Pentium 4/5 or AMD processor with 500 MHz, 128MB RAM Download: http://rapidshare.com/files/211342947/Advanced_System_Protector_2.0.323.1836_www.dl4all.com.rar Crack: http://rapidshare.com/files/211597589/c.ASP.rar Password: www.dl4all.com

Norton Internet Security 2009 16.5.0.135


Norton Internet Security 2009 - Strong on protection, light on system resources, award winning! Stay protected from the latest online threats. Norton Internet Security runs quietly in the background to detect and block today's complex threats and to protect your identity when you buy, bank, or browse online. The friendly and efficient product design helps minimize confusing security alerts and system slowdowns that can get in the way of your online experience.Norton Internet Security™ provides essential protection from viruses, hackers, spyware, spam and other privacy threats. A comprehensive set of security tools, Norton Internet Security helps keep you safe online as you surf and email, swap files, download programs, and chat. In addition to protecting against viruses and unwelcome intrusions from the Internet, NIS also allows you to automatically block annoying banner ads and pop-up windows, set up parental site blocking options for restricting access to specific Web sites, and selectively determine which, if any, Java applets and ActiveX controls should be allowed to download and execute on your computer. Enjoy the Internet with award-winning protection!

Key Technologies: • Antivirus • Spyware protection • Two-way firewall • Identity protection • Antiphishing • Network monitoring • Bot protection • Rootkit detection • Browser protection • Internet worm protection • Intrusion prevention • OS and application protection • Web site authentication • Pulse updates • Norton™ Insight • SONAR™ behavioral protection • Antispam • Parental Controls & confidential information blocking Key Benefits: • Proven fastest, lightest security suite available—Spend more time using your computer and less time waiting for your security software to perform. • Pulse updates for up-to-the-minute protection—Delivered every 5 to 15 minutes to detect and eliminate new threats. NEW • Intelligence-driven for faster, fewer, shorter scans—By leveraging a unique online intelligence system, Norton™ Insight technology targets only those files at risk. NEW • Stops viruses, worms, spyware, bots, and more—Keeps your system protected against all types of malicious threats. • Prevents virus-infected emails and instant messages from spreading—Feel secure while you keep in touch. • Blocks browser exploits and protects against infected Web sites—Surf the Internet with confidence. • Blocks online identity theft—Buy, bank, and browse online wherever and whenever you want. IMPROVED • Secure network connections—Monitor your home network and more safely connect to Wi-fis. IMPROVED • Blocks threats and hackers—Two-way firewall automatically makes security decisions for you. IMPROVED Features: Engineered for Speed * New! Proven fastest, lightest security suite available * New! Intelligence-driven Norton™ Insight technology targets only those files at risk for faster, fewer, shorter scans * New! Installs in under one minute on average, requires less than 10 MB of memory, and only 100 MB of disk space plus definitions Up-to-the-minute Protection * New! Delivers up-to-the-minute protection with rapid pulse updates every 5 to 15 minutes. * New! The Norton™ Protection System provides multilayered protection technologies that work in concert to stop threats before they impact you. † * New! Real-time SONAR (Symantec™ Online Network for Advanced Response) helps prevent bots from taking control of your PC. * Improved! Prevents threats from entering or leaving your firewall. * Detects and automatically removes online threats. * Improved! Defends against Web-based attacks with patent-pending technology. * Automatically detects and removes spyware, viruses, Trojans, bots and Internet worms * New! Boots and repairs badly infected PCs. * New! Specialized deep-cleaning technology delivers our most complete scan possible to repair heavily infected computers. Norton Identity Safe * Improved! Keeps your online identity safer than ever when you buy, bank, browse, and game online. * Advanced phishing protection keeps your personal identification out of the hands of fraudulent Web sites. * Stores and encrypts your passwords and other confidential data. * Improved! Fills in online forms at your request to save time and protect you from keystroke loggers. Control without disruptions * Puts every element of your security at your fingertips * New! Schedules resource intensive tasks for when you’re not using your PC. * New! Review the security status of every process on your PC. * New! Silent mode suspends alerts and updates to avoid interrupting or slowing games and movies. * Smart two-way firewall automatically makes security decisions for you. Secure Networking * Improved! Helps you secure your home network. * Conceals and secures your PC on public Wi-Fi networks. Parental Controls * New! Create individual user profiles with enhanced parental controls. Spam Blocking * Filters spam better than ever. Microsoft® Windows Vista® Home Basic/Home Premium/Business/Ultimate Microsoft® Windows® XP with Service Pack 2 Home/XP Pro/XP Media Center Edition * 300 MHz or faster processor * 256 MB of RAM (*512 MB RAM required for the Recovery Tool) * 200 MB of available hard disk space * Standard Web browser Email scanning supported for POP3- and SMTP-compatible email clients. Support for AntiSpam feature: * Microsoft Outlook® 97 or later * Microsoft Outlook Express 6.0 or later Supported instant messaging clients: * AOL® * Yahoo!® * Microsoft® * Trillian™ Browser support for Browser Defense and Phishing Protection features: * Microsoft Internet Explorer® 6.0 (32-bit only) and later * Mozilla Firefox® 2.0 and later

Homepage - http://www.symantec.com/norton/internet-security Download: 66.3 MB http://spftrl.digitalriver.com/pub/symantec/tbyb/NAM/NIS09EN.exe Trial Reset V1.5: 2.52 MB http://rapidshare.com/files/211884463/NOO9TR32_s22_www.dl4all.com.rar Mirror1: http://www.easy-share.com/1904127524/NOO9TR32_s22_www.dl4all.com.rar Mirror2: http://www.megaupload.com/?d=1GATRXRX Password: www.dl4all.com

Norton AntiVirus 2009 16.5.0.134


Symantec's Norton AntiVirus 2009 - Winning protection against viruses, spyware, and other malicious threats! Heuristically detects Spyware threats, detects blocks Internet worm attacks, and protects email. Norton AntiVirus blocks viruses and spyware with advanced protection. It helps protect your entire computer by stopping viruses, spyware, and other security risks. Norton AntiVirus works in the background so you can surf the Internet, read the news, play games, and download software or music without disruption. It also scans and cleans all email and instant messaging (IM) attachments, preventing you from receiving viruses, or spreading them to others. With set-it and forget-it functionality, Norton AntiVirus checks for updates continuously and automatically blocks new and emerging threats from getting on your system. In addition to protection updates, Norton AntiVirus provides new product features as available throughout your service subscription.

Key Technologies: • Antivirus software • Spyware remover • Bot protection • Browser protection • Internet worm protection • Intrusion prevention • OS and application protection • Rapid pulse updates • Recovery tool • Rootkit detection • Norton™ Insight • SONAR™ behavioral protection Key Benefits: • Stops viruses, worms, spyware, bots, and more—Keeps your system protected against all types of malicious threats. • Norton™ Insight—Delivers innovative intelligence-driven technology for faster, fewer, shorter scans. • Rapid pulse updates every 5 to 15 minutes—provides up-to-the-minute protection. • Prevents virus-infected emails and instant messages from spreading—Feel secure while you keep in touch. • Blocks browser exploits and protects against infected Web sites—Surf the Internet with confidence. Norton AntiVirus Features: Engineered for Speed * New! Proven fastest, lightest security suite available. * New! Scans only files and processes at risk using Norton™ Insight. * New! Installs in under one minute on average, requires less than 10 MB of memory, and only 100 MB of disk space plus definitions. Up-to-the-minute Protection * New! Delivers up-to-the-minute protection with rapid pulse updates. * Improved! Provides multilayered security through the Norton™ Protection System. * New! Prevents bots from taking control of your PC. * Detects and automatically removes malicious threats. * Improved! Defends against Web-based attacks. * Automatically detects and removes spyware, viruses, Trojans, bots and Internet worms. * New! Boots and repairs badly infected PCs. * New! Delivers our most complete, deep cleaning scan possible. Control without disruptions * New! Automatically schedules scans and updates to occur while PC is idle.† * New! Review the security status of every process on your PC. * New! Ensures movies and games are never interrupted. * Microsoft® Windows Vista® Home Basic/Home Premium/Business/Ultimate * Microsoft® Windows® XP with Service Pack 2 Home/XP Pro/XP Media Center Edition * 300 MHz or faster processor * 256 MB of RAM * 150 MB of available hard disk space. Email scanning supported for POP3 - and SMTP-compatible email clients. Browser support for Browser Protection feature: * Microsoft Internet Explorer® 32-bit 6.0 or higher * Mozilla Firefox® 2.0 or higher Supported instant messaging clients: * AOL® * Yahoo!® * Microsoft® * Trillian™

Homepage - http://www.symantec.com/ Download: 60.5 MB http://spftrl.digitalriver.com/pub/symantec/tbyb/NAM/NAV09EN.exe Trial Reset V1.5: 2.5 MB http://rapidshare.com/files/211884463/NOO9TR32_s22_www.dl4all.com.rar Mirror1: http://www.easy-share.com/1904127524/NOO9TR32_s22_www.dl4all.com.rar Mirror2: http://www.megaupload.com/?d=1GATRXRX Password: www.dl4all.com

SuperAntiSpyware Professional v4.26.1000 BETA Multilanguage Incl. Keygen & patch


SuperAntiSpyware Professional v4.26.1000 BETA "4.74 MB" Detects and removes all types of malware on your systemSUPERAntiSpyware is a useful tool to help you keep your PC protected from spyware, adware, dialers, Trojans and all types of malware. SUPERAntiSpyware conducts a thorough analysis of your system, looking for any type of malicious software to your computer, but can also perform analysis on a smaller scale in the folders or drives you choose. After the analysis, we will remove suspect files or potentially harmful, or keep them in quarantine. The program also allows us to correct Windows registry entries that have been modified, as well as repairing the harm caused by malware to your system. SUPERAntiSpyware can update its database every time you want, ensuring that we maintain our equipment protected against the latest infections circulating on the network.

SUPERAntiSpyware Professional v4.25.1012 FEATURES: * Smart Definitions to detect zero-day threats * SmitFraud Detection Enhancements * Enhanced Diagnostic System to detect rootkits / malware cloak * Improved rootkit removal technology to handle rootkits that disable security applications * Numerous technology additions to the scanning engine * Updated Direct Registry Access (DRA) Technology * Updated DDA (Direct Disk Access) - faster and more reliable. Note: If u Find Virus in keygen.....den its not a new thing.........so plz disable the antivirus for few sec & run the keygen.........& get the activation.......& then if u 've any doubt..run the virus......scan... & all the viruses will be deleted........... so plz 've sum common sense..........

Download: http://www.easy-share.com/1904209655/SA.Prof.v4.26.1000.BETA_Incl.Keygen&patch.rar Mirror: http://rapidshare.com/files/213986213/SA.Prof.v4.26.1000.BETA_Incl.Keygen_patch_www.dl4all.com.rar Pass: www.dl4all.com

Difference between Web & Windows in simple terms


Diff between Windows and web appl :
1) Windows is .exe & Web is .dll
2) Performance wise windows (.exe) take more time for execution.
Every page is a dll in .net so when a website is loaded then only one page is executed and rest pages are dynamically linked .
3) Web appl always needs a web server(i.e. IIS,Apache etc.) for ececuting.
4) Security - Websites are not secure.
5) User friendly - Windows appl is very user friendly. As there are ppl who dnt know about internet so not possible to use while windows somewat can be used.

Kaspersky Mobile Security v8.0


Kaspersky Mobile Security v8.0

Kaspersky Mobile Security 8.0 is designed to ensure complex protection of mobile devices.

The product provides the following functionality to the user:

1. File system scan for viruses or other malicious programs by user’s demand or according to the schedule
2. On-access anti-virus file scan
3. Opportunity to quarantine infected objects and disinfect some of them
4. Anti-virus databases update by user’s demand or according to the schedule via GPRS, Wi-Fi, EDGE or ActiveSync (for Windows Mobile version)
5. Blocking unsolicited SMS messages and calls (Good Filtering Capablity)
6. Opportunity to block the user data in case the device is lost or stolen
7. Opportunity to delete user data in case the device is lost or stolen
8. Device protection against network attacks via TCP/IP
9. Opportunity to create a folder for saving files in the encrypted form
10. Opportunity to identify the phone location remotely (if the device is equipped with a GPS receiver) (Function like Guardian Platinum)
11. Opportunity to block outgoing calls and messages to the specified numbers. (Very nice)

The product has a user-friendly and intuitive interface.

The product can be installed to the main memory of the mobile device only.

Product components:

Kaspersky Mobile Security 8.0 comprises the following components:

* Anti-Virus
* Anti-Spam
* Anti-Theft
* Firewall
* Encryption
* Parental control

System requirements:

The product runs only on mobile devices that support SMS receipt and sending and work under the following operating systems:

* Symbian OS 9.1, 9.2, 9.3 Series 60 (Nokia smartphones only).
* Windows Mobile 5.0, 6.0, 6.1.

The product has been tested on the following mobile devices:

* Nokia: E61, 5500, N95, 3250, E50, E60, N71, N80, E71, N96, N78, 6220, 6110
* HTC: 710S
* HTC: S620
* HP: iPaq 514
* HP: S100
* HP: HW 6915
* Eten: m600
* Eten: x800
* Toshiba: G900
* ASUS P750
* Samsung SGH i200
* HTC Touch Diamond

Code:

www.mediafire.com/?m4qyzdjzxhm

Show/Hide Drives in My Computer


There are times when you might want to hide one or more of your windows drives because of security reasons (children getting up on the system and messing up everything or if the computer is in use by multiple people). For theses reasons, you would just prefer to hide your data in a safe place and if one of your drives is full of sensitive information, you would rather hide the drive from My Computer.

There are two ways of doing it, one from the group policy editor and the second from registry editor. I will explain both of them here:

1-Hiding drives using Group Policy Editor

Go to Start –> Run –> gpedit.msc  

The group policy editor will open. Go to the following node:  

User Configuration –> Administrative Templates –> Windows Components –> Windows Explorer  

Now go to the right hand window and double click the value “Hide these specified drives in My Computer”, select enable and select the drives from the drop down menu.

This is restrictive in the sense that it only specifies drives up to D drive. Or all the drives can be hidden.

2-Hiding the drives using Registry Editor

To open the registry editor Go to Start –> Run –> regedit

Go to HKEY_LOCAL_MACHINE\SOFTWARE \Microsoft\Windows\CurrentVersion\policies\Explorer

In the right hand pane, right click –> new –> DWORD Value Rename it to “NoDrives” (without quotes)

To calculate the value, add together the numbers for the drives you want to hide, using the formula: A=1, B=2, C=4, D=8, E=16, F=32, G=64, H=128, I=256 and so on. Put the result in the NoDrives key value. Remember to select decimal instead of HEX from the NoDrives key. For Example if I want to hide C and F drives, C+F = 4+32 = 36. Put the value 36 in NoDrives key.

Alternatively, you can use NoDrives!!! (NT Drive Calculator) for calculating the drive values. It’s a lot easier than calculating by hand.

Note: Always use the registry editor with caution because, if used inappropriately, it can mess up the whole system. I recommend creating a restore point before getting your hands on the registry editor.

How To Set Password For Hard Disk


There is a builtin ultimate security option for computer data in hard disk drives. You may have tried Main-board (BIOS or CMOS) password and windows password protection. I am going to tell you that there is a way you can password protect your hard disk drive.

It is not a very well known fact, but all hard disks have a very strong hardware password capability build in. This password is usually stored both in a chip on the HD controller (the printed circuit board on the hard disk) and on the hard disk itself in a special hidden sector.

For security/protection conscious geeks, it is possible to lock your hard disk with password. A lot of newer laptops will set the HD password together with the BIOS password, completely locking all the hardware for security measures.

It has nothing to do with the machine. All protection is on HD. To set the Password on HD; Go to BIOS. Go to Security and select HD Password. The only way to remain secure is to remember your HD password. If forgotten, that HD even will not be able to show data under slave mode. Data protection by locking down your HD is ultimate and even when you loose HD somehow, nobody can get your data but its very risky.

P.S. If you forget your HD password, there is no way you can retrieve data back or reset the password. You will have to send the hard disk to the data recovery company or the vendors for unlocking, but not all data recovery companies could or would unlock a password protected HD. Never ever try to play with your HD password if you are not sure what you are doing.

5 Tips On Keeping Your PC Safe While Surfing Online


1. Update Windows Microsoft regularly releases free downloads to fix security problems with Windows, Internet Explorer and other Microsoft software such as Office.

2. Install A Firewall A good firewall such as ZoneAlarm will prevent programs from accessing the Internet without your permission, and block access to your PC from intruders.

4. Remove Spyware Spyware is malicious code that tracks your movements on the Internet and can even affect your PC's performance. Read Remove Spyware which explains how to get rid of malicious spyware and adware.

5. Browse More Safely The latest web browsers such as Internet Explorer 7 and Firefox 2 offer security features like pop-up blockers and phishing filters to keep you safe when visiting web sites.

Speed Up Computer - Clear System Memory


clear-system-memory

Here is how you can clear up system memory to boost up computer performance. Running multiple applications simultaneously for long periods leads to a gradual decrease in system performance over time. Often the only option is a restart. Even if you close the application in the Task Manager, the tasks/threads associated with the application are not released completely, depleting the systems memory resources making the system unstable and sluggish. The following tip is designed to offer fast relief.

  • Right-click on your desktop and select New -> Shortcut
  • In the text box enter the command %windir%\system32\rundll32.exe advapi32.dll,ProcessIdleTasks
  • Click Next. In the next screen, name the shortcut: for example, Clear Memory
  • Click on Finish

Whenever you feel that the system is sluggish you can double click on this shortcut and it will take care of the idle tasks by removing them. This can be used before you resort to restarting/rebooting the system.

Download File

Computer Windows Admin Account Access Protection


Have you ever experienced that after you installed windows and set your user name and giving it a password someone managed to log into the computer.

Well here is a precaution to avoid that. While installing windows always give password to administrator account. While installation it asks for administrator password and many guys ignore it and when installation is done they set a windows user and start doing work.

Still there is an administrator account with blank password.

And if someone just press Ctrl+Alt+Del twice at welcoem screen it asks for default administrator account access and there he can enter with blank password and change your user password or access your files as an administrator.

Always set default account (administrator) password.

100 Percent Security - Go Secret Online


hss-logo.jpg

While you're enjoying your latte and a bagel, some hacker might be accessing your passwords, credit card numbers, sensitive company data and much more. And standard antivirus software won't protect you. That's why AnchorFree is pleased to offer Hotspot Shield. This free security software keeps your Internet connection secure at public hotspots, home or work.

100% Security Through a VPN

Hotspot Shield creates a virtual private network (VPN) between your laptop and the wireless router. This impenetrable tunnel prevents snoopers and hackers from viewing your email, instant messages, credit card information or anything else you send over a wireless network. Which means you remain anonymous and protect your privacy.

Hotspot Shield security software is free to download, employs the latest VPN technology, and is easy to install and use. So go ahead - Get behind the Shield.

Hotspot Shield runs on:

  • Windows Vista
  • Windows XP
  • Windows 2000
  • Mac OS X (10.5 Leopard)
  • Mac OS X (10.4 Tiger)

Here is how it does something with your online presence. I am in Pakistan but You can see my location and IP which are different then origional in image below.

go-secret.gif

Download Hotspot Shield

Change Your Dynamic IP Address


This is suppposed to change your dynamic IP Address.

Open notepad and type

ipconfig /flushdns
ipconfig /refresh
ipconfig /renew
ipconfig /all>newip.txt
end

then save as (select all file types) --- ip.bat

this is now a batch file rather than a txt file. Simply hit run on the file and watch the progress.

If you want to print out the results then add this line into the same file befoe "END"

ipconfig /all>filename. txt

A report will be saved in the same directory as your batch file, detailing your new ip and a bit more...

Resource Hacker - Customize Your Own PC Resources


Change the PC resources in the way you like it. Thats what 'Resource Hacker' is all about. If you like to play tricks with your PC and like to tweak it a bit then 'Resource hacker' is a good choice out there and it is absolutely free and easy to use.

Resource Hacker is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Win95, Win98, WinME, WinNT, Win2000 and WinXP operating systems.

tune-up-pc.jpg

Viewing Resources: Cursor, Icon, Bitmap, GIF, AVI, and JPG resource images can be viewed. WAV and MIDI audio resources can be played. Menus, Dialogs, MessageTables, StringTables, Accelerators, Delphi Forms, and VersionInfo resources can be viewed as decompiled resource scripts. Menus and Dialogs can also be viewed as they would appear in a running application.

Saving Resources: Resources can be saved as image files (*.ico, *.bmp etc), as script files (*.rc), as binary resource files (*.res), or as untyped binary files (*.bin).

Modifying Resources: Resources can be modified by replacing the resource with a resource located in another file (*.ico, *.bmp, *.res etc) or by using the internal resource script compiler (for menus, dialogs etc). Dialog controls can also be visually moved and/or resized by clicking and dragging the respective dialog controls prior to recompiling with the internal compiler.

Adding Resources: Resources can be added to an application by copying them from external resource files (*.res).

Deleting Resources: Most compilers add resources into applications which are never used by the application. Removing unused resources can reduce an application's size.

Download Resource Hacker

Is your website secure?


XSS attacks (Cross Site Scripting) provides hackers access to your website content and database. If web applications are not secure, then your entire database of sensitive information is at serious risk.

Hackers are on the lookout for Cross Site Scripting (XSS) vulnerabilities in YOUR web applications. Shopping carts, forms, login pages, dynamic content are easy targets. Beat them to it and scan your web applications with Acunetix Web Vulnerability Scanner:

  • Acunetix WVS automatically checks your web applications for XSS, SQL Injection & other vulnerabilities
  • Firewalls, SSL and locked-down servers are futile against web application hacking
  • Acunetix checks your web applications for coding errors that result in Cross Site Scripting vulnerabilities
  • Acunetix also checks for other vulnerabilities in popular web applications such as Joomla, PHPbb, Wordpress etc.
  • Acunetix identifies files with XSS vulnerabilities allowing you to fix them BEFORE the hacker finds them!

Audit your web site security with Acunetix Web Vulnerability Scanner. The best part about this software: Its free version is also available.

Download Link
http://www.acunetix.com/cross-site-scripting/scanner.htm

website scanner

website scanner

Why Choose a Strong Password?


strong-password1

PCs Personal data, emails, online storage accounts are guarded by username and password. username are sometimes filled in when we access a website and in case of a computer user, there is always a user name before you logon to your computer. All you have to do it to guess the password to hack in to the system. There are some booters, brute force attacks, dictionary attacks and hacks which can easily guess common words used in passwords to penetrate into the system. To secure yourself you have just one choice. Choose as much strong password as you can.

Strong password should be difficult to detect by both humans and computer programs, effectively protecting data from unauthorized access. A strong password should consist of at least six characters and combination of both uppercase and lowercase letters, numbers and symbols (@ # $ % ` ~ ! ^ & * ( ) _ + - = { } | [ ] \ : " ; ' < > ? , . /) if allowed.

Tips on how to choose a strong password and make it safe
  • Don't use any part of your username, full name, birth date, spouse names, favorite thing or any other personal info e.g. 'what you like'! in passwords.
  • Choose long password. Longer the password, the better.
  • Don't use old passwords or same for all applications you use.
  • If you suspect that someone else knows your password, change it immediately.
  • Use substitute word and numbers for letters. For example, DEVIL could become D3VIL, COFFEE could become C0FF33 and NARNIA could become N@RNI@.
  • Do not use a plain word at all.
  • Make a habit to change password regularly.
  • Do not use repeated characters such as aa, nnn etc.
  • Do not use alphabetic sequences, such as abc or xyz.
  • Password should contain uppercase letters, lowercase letters, and numbers.
  • If it is easy for you, use ASCII characters (which you can access by holding down Alt and typing on the number pad).
  • Do not use numeric sequences, such as 123 or 321.
  • Do not use a common dictionary word.
  • Never disclose your passwords to anyone else ever.
  • Don't enter your password when others can see what you are typing.
  • Don’t write passwords down anywhere.
  • Don’t send your password by email.
  • Use any encryption utility to store your passwords if needed.
  • Get creative with mixing numbers, symbols, and uppercase letters in your own way.
  • Every popular website, which requires sign-up gives a password strength utility which tells you about your password strength while filling the form. Follow its direction.
  • Create a unique acronym.
  • Include phonetic replacements, such as 'Luv2chat' for 'Love to Chat'.
  • Do not use any password generator tool. Just get help or idea and be creative in your own way.

strong-passwords

NOKIA SECURITY CODE RESETTER(working)


Keyboard Shortcuts


• CTRL+C (Copy) • CTRL+X (Cut) • CTRL+V (Paste) • CTRL+Z (Undo) • DELETE (Delete) • SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin) • CTRL while dragging an item (Copy the selected item) • CTRL+SHIFT while dragging an item (Create a shortcut to the selected item) • F2 key (Rename the selected item) • CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word) • CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word) • CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph) • CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph) • CTRL+SHIFT with any of the arrow keys (Highlight a block of text) • SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document) • CTRL+A (Select all) • F3 key (Search for a file or a folder) • ALT+ENTER (View the properties for the selected item) • ALT+F4 (Close the active item, or quit the active program) • ALT+ENTER (Display the properties of the selected object) • ALT+SPACEBAR (Open the shortcut menu for the active window) • CTRL+F4 (Close the active document in programs that enable you to have multiple documents open simultaneously) • ALT+TAB (Switch between the open items) • ALT+ESC (Cycle through items in the order that they had been opened) • F6 key (Cycle through the screen elements in a window or on the desktop) • F4 key (Display the Address bar list in My Computer or Windows Explorer) • SHIFT+F10 (Display the shortcut menu for the selected item) • ALT+SPACEBAR (Display the System menu for the active window) • CTRL+ESC (Display the Start menu) • ALT+Underlined letter in a menu name (Display the corresponding menu) • Underlined letter in a command name on an open menu (Perform the corresponding command) • F10 key (Activate the menu bar in the active program) • RIGHT ARROW (Open the next menu to the right, or open a submenu) • LEFT ARROW (Open the next menu to the left, or close a submenu) • F5 key (Update the active window) • BACKSPACE (View the folder one level up in My Computer or Windows Explorer) • ESC (Cancel the current task) • SHIFT when you insert a CD-ROM into the CD-ROM drive (Prevent the CD-ROM from automatically playing) • CTRL+SHIFT+ESC (Open Task Manager)

Dialog box keyboard shortcuts If you press SHIFT+F8 in extended selection list boxes, you enable extended selection mode. In this mode, you can use an arrow key to move a cursor without changing the selection. You can press CTRL+SPACEBAR or SHIFT+SPACEBAR to adjust the selection. To cancel extended selection mode, press SHIFT+F8 again. Extended selection mode cancels itself when you move the focus to another control. • CTRL+TAB (Move forward through the tabs) • CTRL+SHIFT+TAB (Move backward through the tabs) • TAB (Move forward through the options) • SHIFT+TAB (Move backward through the options) • ALT+Underlined letter (Perform the corresponding command or select the corresponding option) • ENTER (Perform the command for the active option or button) • SPACEBAR (Select or clear the check box if the active option is a check box) • Arrow keys (Select a button if the active option is a group of option buttons) • F1 key (Display Help) • F4 key (Display the items in the active list) • BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box) Microsoft natural keyboard shortcuts • Windows Logo (Display or hide the Start menu) • Windows Logo+BREAK (Display the System Properties dialog box) • Windows Logo+D (Display the desktop) • Windows Logo+M (Minimize all of the windows) • Windows Logo+SHIFT+M (Restore the minimized windows) • Windows Logo+E (Open My Computer) • Windows Logo+F (Search for a file or a folder) • CTRL+Windows Logo+F (Search for computers) • Windows Logo+F1 (Display Windows Help) • Windows Logo+ L (Lock the keyboard) • Windows Logo+R (Open the Run dialog box) • Windows Logo+U (Open Utility Manager) Accessibility keyboard shortcuts • Right SHIFT for eight seconds (Switch FilterKeys either on or off) • Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off) • Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off) • SHIFT five times (Switch the StickyKeys either on or off) • NUM LOCK for five seconds (Switch the ToggleKeys either on or off) • Windows Logo +U (Open Utility Manager) Windows Explorer keyboard shortcuts • END (Display the bottom of the active window) • HOME (Display the top of the active window) • NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder) • NUM LOCK+Plus sign (+) (Display the contents of the selected folder) • NUM LOCK+Minus sign (-) (Collapse the selected folder) • LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder) • RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder) Shortcut keys for Character Map After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts: • RIGHT ARROW (Move to the right or to the beginning of the next line) • LEFT ARROW (Move to the left or to the end of the previous line) • UP ARROW (Move up one row) • DOWN ARROW (Move down one row) • PAGE UP (Move up one screen at a time) • PAGE DOWN (Move down one screen at a time) • HOME (Move to the beginning of the line) • END (Move to the end of the line) • CTRL+HOME (Move to the first character) • CTRL+END (Move to the last character) • SPACEBAR (Switch between Enlarged and Normal mode when a character is selected) Microsoft Management Console (MMC) main window keyboard shortcuts • CTRL+O (Open a saved console) • CTRL+N (Open a new console) • CTRL+S (Save the open console) • CTRL+M (Add or remove a console item) • CTRL+W (Open a new window) • F5 key (Update the content of all console windows) • ALT+SPACEBAR (Display the MMC window menu) • ALT+F4 (Close the console) • ALT+A (Display the Action menu) • ALT+V (Display the View menu) • ALT+F (Display the File menu) • ALT+O (Display the Favorites menu) MMC console window keyboard shortcuts • CTRL+P (Print the current page or active pane) • ALT+Minus sign (-) (Display the window menu for the active console window) • SHIFT+F10 (Display the Action shortcut menu for the selected item) • F1 key (Open the Help topic, if any, for the selected item) • F5 key (Update the content of all console windows) • CTRL+F10 (Maximize the active console window) • CTRL+F5 (Restore the active console window) • ALT+ENTER (Display the Properties dialog box, if any, for the selected item) • F2 key (Rename the selected item) • CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console) Remote desktop connection navigation • CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box) • ALT+PAGE UP (Switch between programs from left to right) • ALT+PAGE DOWN (Switch between programs from right to left) • ALT+INSERT (Cycle through the programs in most recently used order) • ALT+HOME (Display the Start menu) • CTRL+ALT+BREAK (Switch the client computer between a window and a full screen) • ALT+DELETE (Display the Windows menu) • CTRL+ALT+Minus sign (-) (Place a snapshot of the entire client window area on the Terminal server clipboard and provide the same functionality as pressing ALT+PRINT SCREEN on a local computer.) • CTRL+ALT+Plus sign (+) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.) Microsoft Internet Explorer navigation • CTRL+B (Open the Organize Favorites dialog box) • CTRL+E (Open the Search bar) • CTRL+F (Start the Find utility) • CTRL+H (Open the History bar) • CTRL+I (Open the Favorites bar) • CTRL+L (Open the Open dialog box) • CTRL+N (Start another instance of the browser with the same Web address) • CTRL+O (Open the Open dialog box, the same as CTRL+L) • CTRL+P (Open the Print dialog box) • CTRL+R (Update the current Web page)