Showing posts with label Tech Zone. Show all posts
Showing posts with label Tech Zone. Show all posts
Tuesday, 30 December 2014
Internet Guide
The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions.
No one is in charge of the Internet. There are organizations which develop technical aspects of this network and set standards for creating applications on it, but no governing body is in control. The Internet backbone, through which Internet traffic flows, is owned by private companies.
All computers on the Internet communicate with one another using the Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use a client/server architecture. This means that the remote server machine provides files and services to the user's local client machine. Software can be installed on a client computer to take advantage of the latest access technology.
An Internet user has access to a wide variety of services: electronic mail, file transfer, vast information resources, interest group membership, interactive collaboration, multimedia displays, real-time broadcasting, shopping opportunities, breaking news, and much more.
The Internet consists primarily of a variety of access protocols. Many of these protocols feature programs that allow users to search for and retrieve material made available by the protocol.
--------------------------------------------------------------------------------
COMPONENTS OF THE INTERNET
--------------------------------------------------------------------------------
WORLD WIDE WEB
The World Wide Web (abbreviated as the Web or WWW) is a system of Internet servers that supports hypertext to access several Internet protocols on a single interface. Almost every protocol type available on the Internet is accessible on the Web. This includes e-mail, FTP, Telnet, and Usenet News. In addition to these, the World Wide Web has its own protocol: HyperText Transfer Protocol, or HTTP. These protocols will be explained later in this document.
The World Wide Web provides a single interface for accessing all these protocols. This creates a convenient and user-friendly environment. It is no longer necessary to be conversant in these protocols within separate, command-level environments. The Web gathers together these protocols into a single system. Because of this feature, and because of the Web's ability to work with multimedia and advanced programming languages, the Web is the fastest-growing component of the Internet.
The operation of the Web relies primarily on hypertext as its means of information retrieval. HyperText is a document containing words that connect to other documents. These words are called links and are selectable by the user. A single hypertext document can contain links to many documents. In the context of the Web, words or graphics may serve as links to other documents, images, video, and sound. Links may or may not follow a logical path, as each connection is programmed by the creator of the source document. Overall, the Web contains a complex virtual web of connections among a vast number of documents, graphics, videos, and sounds.
Producing hypertext for the Web is accomplished by creating documents with a language called HyperText Markup Language, or HTML. With HTML, tags are placed within the text to accomplish document formatting, visual features such as font size, italics and bold, and the creation of hypertext links. Graphics and multimedia may also be incorporated into an HTML document. HTML is an evolving language, with new tags being added as each upgrade of the language is developed and released. The World Wide Web Consortium (W3C), led by Web founder Tim Berners-Lee, coordinates the efforts of standardizing HTML. The W3C now calls the language XHTML and considers it to be an application of the XML language standard.
The World Wide Web consists of files, called pages or home pages, containing links to documents and resources throughout the Internet.
The Web provides a vast array of experiences including multimedia presentations, real-time collaboration, interactive pages, radio and television broadcasts, and the automatic "push" of information to a client computer. Programming languages such as Java, JavaScript, Visual Basic, Cold Fusion and XML are extending the capabilities of the Web. A growing amount of information on the Web is served dynamically from content stored in databases. The Web is therefore not a fixed entity, but one that is in a constant state of development and flux.
Electronic mail, or e-mail, allows computer users locally and worldwide to exchange messages. Each user of e-mail has a mailbox address to which messages are sent. Messages sent through e-mail can arrive within a matter of seconds.
A powerful aspect of e-mail is the option to send electronic files to a person's e-mail address. Non-ASCII files, known as binary files, may be attached to e-mail messages. These files are referred to as MIME attachments.MIME stands for Multimedia Internet Mail Extension, and was developed to help e-mail software handle a variety of file types. For example, a document created in Microsoft Word can be attached to an e-mail message and retrieved by the recipient with the appropriate e-mail program. Many e-mail programs, including Eudora, Netscape Messenger, and Microsoft Outlook, offer the ability to read files written in HTML, which is itself a MIME type.
TELNET
Telnet is a program that allows you to log into computers on the Internet and use online databases, library catalogs, chat services, and more. There are no graphics in Telnet sessions, just text. To Telnet to a computer, you must know its address. This can consist of words (locis.loc.gov) or numbers (140.147.254.3). Some services require you to connect to a specific port on the remote computer. In this case, type the port number after the Internet address. Example: telnet nri.reston.va.us 185.
Telnet is available on the World Wide Web. Probably the most common Web-based resources available through Telnet have been library catalogs, though most catalogs have since migrated to the Web. A link to a Telnet resource may look like any other link, but it will launch a Telnet session to make the connection. A Telnet program must be installed on your local computer and configured to your Web browser in order to work.
With the increasing popularity of the Web, Telnet has become less frequently used as a means of access to information on the Internet.
FTP
FTP stands for File Transfer Protocol. This is both a program and the method used to transfer files between computers. Anonymous FTP is an option that allows users to transfer files from thousands of host computers on the Internet to their personal computer account. FTP sites contain books, articles, software, games, images, sounds, multimedia, course work, data sets, and more.
If your computer is directly connected to the Internet via an Ethernet cable, you can use one of several PC software programs, such as WS_FTP for Windows, to conduct a file transfer.
FTP transfers can be performed on the World Wide Web without the need for special software. In this case, the Web browser will suffice. Whenever you download software from a Web site to your local machine, you are using FTP. You can also retrieve FTP files via search engines such as FtpFind, located at /http://www.ftpfind.com/. This option is easiest because you do not need to know FTP program commands.
E-MAIL DISCUSSION GROUPS
One of the benefits of the Internet is the opportunity it offers to people worldwide to communicate via e-mail. The Internet is home to a large community of individuals who carry out active discussions organized around topic-oriented forums distributed by e-mail. These are administered by software programs. Probably the most common program is the listserv.
A great variety of topics are covered by listservs, many of them academic in nature. When you subscribe to a listserv, messages from other subscribers are automatically sent to your electronic mailbox. You subscribe to a listserv by sending an e-mail message to a computer program called a listserver. Listservers are located on computer networks throughout the world. This program handles subscription information and distributes messages to and from subscribers. You must have a e-mail account to participate in a listserv discussion group. Visit Tile.net at /http://tile.net/ to see an example of a site that offers a searchablecollection of e-mail discussion groups.
Majordomo and Listproc are two other programs that administer e-mail discussion groups. The commands for subscribing to and managing your list memberships are similar to those of listserv.
USENET NEWS
Usenet News is a global electronic bulletin board system in which millions of computer users exchange information on a vast range of topics. The major difference between Usenet News and e-mail discussion groups is the fact that Usenet messages are stored on central computers, and users must connect to these computers to read or download the messages posted to these groups. This is distinct from e-mail distribution, in which messages arrive in the electronic mailboxes of each list member.
Usenet itself is a set of machines that exchanges messages, or articles, from Usenet discussion forums, called newsgroups. Usenet administrators control their own sites, and decide which (if any) newsgroups to sponsor and which remote newsgroups to allow into the system.
There are thousands of Usenet newsgroups in existence. While many are academic in nature, numerous newsgroups are organized around recreational topics. Much serious computer-related work takes place in Usenet discussions. A small number of e-mail discussion groups also exist as Usenet newsgroups.
The Usenet newsfeed can be read by a variety of newsreader software programs. For example, the Netscape suite comes with a newsreader program called Messenger. Newsreaders are also available as standalone products.
FAQ, RFC, FYI
FAQ stands for Frequently Asked Questions. These are periodic postings to Usenet newsgroups that contain a wealth of information related to the topic of the newsgroup. Many FAQs are quite extensive. FAQs are available by subscribing to individual Usenet newsgroups. A Web-based collection of FAQ resources has been collected by The Internet FAQ Consortium and is available at /http://www.faqs.org/.
RFC stands for Request for Comments. These are documents created by and distributed to the Internet community to help define the nuts and bolts of the Internet. They contain both technical specifications and general information.
FYI stands for For Your Information. These notes are a subset of RFCs and contain information of interest to new Internet users.
CHAT & INSTANT MESSENGING
Chat programs allow users on the Internet to communicate with each other by typing in real time. They are sometimes included as a feature of a Web site, where users can log into the "chat room" to exchange comments and information about the topics addressed on the site. Chat may take other, more wide-ranging forms. For example, America Online is well known for sponsoring a number of topical chat rooms.
Internet Relay Chat (IRC) is a service through which participants can communicate to each other on hundreds of channels. These channels are usually based on specific topics. While many topics are frivolous, substantive conversations are also taking place. To access IRC, you must use an IRC software program.
A variation of chat is the phenomenon of instant messenging. With instant messenging, a user on the Web can contact another user currently logged in and type a conversation. Most famous is America Online's Instant Messenger. ICQ, MSN and Yahoo are other commonly-used chat programs.
Other types of real-time communication are addressed in the tutorial Understanding the World Wide Web.
MUD/MUSH/MOO/MUCK/DUM/MUSE
MUD stands for Multi User Dimension. MUDs, and their variations listed above, are multi-user virtual reality games based on simulated worlds. Traditionally text based, graphical MUDs now exist. There are MUDs of all kinds on the Internet, and many can be joined free of charge.
Sunday, 7 December 2014
GIVEAWAY OF brand new Acer V Nitro Gaming Notebook
GIVEAWAY OF brand new Acer V Nitro Gaming Notebook
The known IT company ACER has started a new giveaway this Christmas! Join the giveaway and you can be a lucky winner of any of these prizes! :) STEPS FOR JOINING: Press the "join in"-Button & connect with facebook! Bring as many friends as possible to do the same using your very own ref link (you'll get it after joining this raffle). If you
manage to achieve the high score in time, you'll win the first
prize, a daily prize or one of our weekly prizes. You can come back all the time to check your current status and see how many people already joined by using your ref code. So, let’s go for registration and collect likes to win the brand new Acer V Nitro Gaming Notebook or one of our other amazing prizes! Terms and Conditions
1) Participation is free of charge. There is no purchase necessary.
2) Only participants at least 16 years of age are allowed to enter the raffle.
3) Only verified facebook accounts are allowed to enter the raffle. Team Acer reserves the right to check accounts of participants in the case we got notice of irregularities. Team Acer reserves also the right to collect personal data for verification like copies of passports. We further reserve the right to delete all participants without prior notice in the case we realize that the facebook account owner is not identical with the person we approved.
4) The activity is running from December 1st to December 31st, 24.00h CET. After that time no additional entry is possible. 5) Winner will be notified and informed within January.
6) Team Acer is not responsible for wrong data given by the user. It is the responsibility of the user to ensure that all entered details are correct, especially shipping details for prices. Team Acer will use secured DHL shipping with Tracking-ID, which will be delivered to the winners right after shipping. Also the user is responsible to answer on all our emails in the shortest time possible.
7) Team Acer reserves the right to ban users if there is a reasonable or even sneaking suspicion without prior notice. 8) Team Acer reserves the right to feature winner details on our website, facebook site and further relevant media.
9) Prizes are not transferable and cannot be paid out in cash.
10) By entering this promotion, participants agree to the terms and conditions.
Thursday, 20 November 2014
Windows XP Shortcuts Keys
--------------------------------------------------------------
ALT+- (ALT+hyphen) Displays the Multiple Document
Interface (MDI) child window's System menu ALT+ENTER View properties for the
selected item
ALT+ESC Cycle through items in the order they were
opened ALT+F4 Close the active item, or quit the active program
ALT+SPACEBAR Display the System menu for the active window
ALT+TAB Switch between open items
ALT+Underlined letter Display the corresponding menu
BACKSPACE View the folder one level up in My Computer or Windows Explorer
ALT+SPACEBAR Display the System menu for the active window
ALT+TAB Switch between open items
ALT+Underlined letter Display the corresponding menu
BACKSPACE View the folder one level up in My Computer or Windows Explorer
CTRL+A Select all
CTRL+B Bold
CTRL+C Copy
CTRL+I Italics
CTRL+O Open an item
CTRL+U Underline
CTRL+V Paste
CTRL+X Cut
CTRL+Z Undo
CTRL+F4 Close the active document
CTRL while dragging Copy selected item
CTRL+SHIFT while dragging Create shortcut to selected iteM
CTRL+RIGHT ARROW Move the insertion point to the beginning of the next word
CTRL+B Bold
CTRL+C Copy
CTRL+I Italics
CTRL+O Open an item
CTRL+U Underline
CTRL+V Paste
CTRL+X Cut
CTRL+Z Undo
CTRL+F4 Close the active document
CTRL while dragging Copy selected item
CTRL+SHIFT while dragging Create shortcut to selected iteM
CTRL+RIGHT ARROW Move the insertion point to the beginning of the next word
CTRL+LEFT ARROW Move the insertion point to the
beginning of the previous word
CTRL+DOWN ARROW Move the insertion point to the beginning
of the next paragraph
CTRL+UP ARROW Move the insertion point to the
beginning of the previous paragraph
SHIFT+DELETE Delete selected item permanently without
placing the item in the Recycle Bin
ESC Cancel the current task
F1 Displays Help
F2 Rename selected item
F3 Search for a file or folder
F4 Display the Address bar list in My Computer or Windows Explorer
F5 Refresh the active window
F6 Cycle through screen elements in a window or on the desktop
F10 Activate the menu bar in the active program
SHIFT+F10 Display the shortcut menu for the selected item
CTRL+ESC Display the Start menu
SHIFT+CTRL+ESC Launches Task Manager
SHIFT when you insert a CD Prevent the CD from automatically playing
F1 Displays Help
F2 Rename selected item
F3 Search for a file or folder
F4 Display the Address bar list in My Computer or Windows Explorer
F5 Refresh the active window
F6 Cycle through screen elements in a window or on the desktop
F10 Activate the menu bar in the active program
SHIFT+F10 Display the shortcut menu for the selected item
CTRL+ESC Display the Start menu
SHIFT+CTRL+ESC Launches Task Manager
SHIFT when you insert a CD Prevent the CD from automatically playing
WIN Display or hide the Start menu
WIN+BREAK Display the System Properties dialog box
WIN+D Minimizes all Windows and shows the Desktop
WIN+E Open Windows Explorer
WIN+F Search for a file or folder
WIN+F+CTRL Search for computers
WIN+L Locks the desktop
WIN+M Minimize or restore all windows
WIN+R Open the Run dialog box
WIN+TAB Switch between open items
WIN+BREAK Display the System Properties dialog box
WIN+D Minimizes all Windows and shows the Desktop
WIN+E Open Windows Explorer
WIN+F Search for a file or folder
WIN+F+CTRL Search for computers
WIN+L Locks the desktop
WIN+M Minimize or restore all windows
WIN+R Open the Run dialog box
WIN+TAB Switch between open items
HIdden Run Commands
Hidden Bluetooth software in
windowsXp:
>START
>RUN
>FSQUIRT
>START
>RUN
>FSQUIRT
Restoring a Lost Desktop-
>Start
>Run
Type a period " . "
Then press Enter
>Run
Type a period " . "
Then press Enter
R You Playing Game In Ur pc?
Want To Do It Advance?
Try This Trick
GoTo
-run
-type joy.cpl
DONE!
Try This Trick
GoTo
-run
-type joy.cpl
DONE!
If ur PC is hanged then do this.
Press shift+ctrl+esc
n den click on 'END TASK'
ur PC is runing now
n den click on 'END TASK'
ur PC is runing now
create folder without name
>select any folder
>rename it
>press alt & type 0160
>enter
Amazing trick for use
Windows Backup Utility if installed
go to run
type ntbackup
ok
Now use backup
go to run
type ntbackup
ok
Now use backup
Disable CD Autorun
1) Click Start, Run and enter GPEDIT.MSC
2) Go to Computer Configuration, Administrative Templates,
System.
3) Locate the entry for Turn autoplay off and modify it as
you desire.
Remove the Recycle Bin from the Desktop
If you don't use the Recycle Bin to store deleted files ,
you can get rid of its desktop icon all together.
Run Regedit and go to:
HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Windows/CurrentVersion/explorer/Desktop/NameSpace
Click on the "Recycle Bin" string in the right hand pane. Hit Del, click OK.
Hide 'User Accounts' from users
Go to Start/Run, and type:
GPEDIT.MSC
Open the path
User Config > Admin Templates > Control Panel
doubleclick "Hide specified Control Panel
applets"
put a dot in 'enabled', then click 'Show"
click Add button,
type "nusrmgt.cpl" into the add box
Turn off Welcome screen
Open User Accounts in Control Panel.
Click Change the way users log on or off
Run Commands
-----------------------------------------------------------
START >> RUN
Accessibility Controls
access.cpl
access.cpl
Add Hardware Wizard
hdwwiz.cpl
hdwwiz.cpl
Add/Remove Programs
appwiz.cpl
appwiz.cpl
Administrative Tools
control.exe admintools
control.exe admintools
Automatic Updates
wuaucpl.cpl
wuaucpl.cpl
Bluetooth Transfer Wizard
fsquirt
fsquirt
Calculator
calc
calc
Certificate Manager
certmgr.msc
certmgr.msc
Character Map
charmap
charmap
Check Disk Utility
chkdsk
chkdsk
Clipboard Viewer
clipbrd
clipbrd
Command Prompt
cmd
cmd
Component Services
dcomcnfg
dcomcnfg
Computer Management
compmgmt.msc
compmgmt.msc
Date and Time Properties
timedate.cpl
timedate.cpl
DDE Shares
ddeshare
ddeshare
Device Manager
devmgmt.msc
devmgmt.msc
Direct X Control Panel (if installed)
directx.cpl
directx.cpl
Direct X Troubleshooter
dxdiag
dxdiag
Disk Cleanup Utility
cleanmgr
cleanmgr
Disk Defragment
dfrg.msc
dfrg.msc
Disk Management
diskmgmt.msc
diskmgmt.msc
Disk Partition Manager
diskpart
diskpart
Display Properties
control.exe desktop
control.exe desktop
Display Properties
desk.cpl
desk.cpl
Display Properties (w/Appearance Tab Preselected)
control.exe color
control.exe color
Dr. Watson System Troubleshooting Utility
drwtsn32
drwtsn32
Driver Verifier Utility
verifier
verifier
Event Viewer
eventvwr.msc
eventvwr.msc
File Signature Verification Tool
sigverif
sigverif
Findfast
findfast.cpl
findfast.cpl
Folders Properties
control.exe folders
control.exe folders
Fonts
control.exe fonts
control.exe fonts
Fonts Folder
fonts
fonts
Free Cell Card Game
freecell
freecell
Game Controllers
joy.cpl
joy.cpl
Group Policy Editor (XP Prof)
gpedit.msc
gpedit.msc
Hearts Card Game
mshearts
mshearts
Iexpress Wizard
iexpress
iexpress
Indexing Service
ciadv.msc
ciadv.msc
Internet Properties
inetcpl.cpl
inetcpl.cpl
Java Control Panel (if installed)
jpicpl32.cpl
jpicpl32.cpl
Java Control Panel (if installed)
javaws
javaws
Keyboard Properties
control.exe keyboard
control.exe keyboard
Local Security Settings
secpol.msc
secpol.msc
Local Users and Groups
lusrmgr.msc
lusrmgr.msc
Logs You Out Of Windows
logoff
logoff
Microsoft Chat
winchat
winchat
Minesweeper Game
winmine
winmine
Mouse Properties
control.exe mouse
control.exe mouse
Mouse Properties
main.cpl
main.cpl
Network Connections
control.exe netconnections
control.exe netconnections
Network Connections
ncpa.cpl
ncpa.cpl
Network Setup Wizard
netsetup.cpl
netsetup.cpl
Nview Desktop Manager (if installed)
nvtuicpl.cpl
nvtuicpl.cpl
Object Packager
packager
packager
ODBC Data Source Administrator
odbccp32.cpl
odbccp32.cpl
On Screen Keyboard
osk
osk
Opens AC3 Filter (if installed)
ac3filter.cpl
ac3filter.cpl
Password Properties
password.cpl
password.cpl
Performance Monitor
perfmon.msc
perfmon.msc
Performance Monitor
perfmon
perfmon
Phone and Modem Options
telephon.cpl
telephon.cpl
Power Configuration
powercfg.cpl
powercfg.cpl
Printers and Faxes
control.exe printers
control.exe printers
Printers Folder
printers
printers
Private Character Editor
eudcedit
eudcedit
Quicktime (If Installed)
QuickTime.cpl
QuickTime.cpl
Regional Settings
intl.cpl
intl.cpl
Registry Editor
regedit
regedit
Registry Editor
regedit32
regedit32
Removable Storage
ntmsmgr.msc
ntmsmgr.msc
Removable Storage Operator Requests
ntmsoprq.msc
ntmsoprq.msc
Resultant Set of Policy
rsop.msc
rsop.msc
Resultant Set of Policy (XP Prof)
rsop.msc
rsop.msc
Scanners and Cameras
sticpl.cpl
sticpl.cpl
Scheduled Tasks
control.exe schedtasks
control.exe schedtasks
Security Center
wscui.cpl
wscui.cpl
Services
services.msc
services.msc
Shared Folders
fsmgmt.msc
fsmgmt.msc
Shuts Down Windows
shutdown
shutdown
Sounds and Audio
mmsys.cpl
mmsys.cpl
Spider Solitare Card Game
spider
spider
SQL Client Configuration
cliconfg
cliconfg
System Configuration Editor
sysedit
sysedit
System Configuration Utility
msconfig
msconfig
System File Checker Utility
sfc
sfc
System Properties
sysdm.cpl
sysdm.cpl
Task Manager
taskmgr
taskmgr
Telnet Client
telnet
telnet
User Account Management
nusrmgr.cpl
nusrmgr.cpl
Utility Manager
utilman
utilman
Windows Firewall
firewall.cpl
firewall.cpl
Windows Magnifier
magnify
magnify
Windows Management Infrastructure
wmimgmt.msc
wmimgmt.msc
Windows System Security Tool
syskey
syskey
Windows Update Launches
wupdmgr
wupdmgr
Windows XP Tour Wizard
tourstart
tourstart
Wordpad
write
write
Try them out..
Wednesday, 19 November 2014
Jailbreak iOS
What is Jailbreaking: iOS jailbreaking is the process of removing the limitations on Apple
devices running the iOS operating system through the use of software and
hardware exploits – such devices include the iPhone, iPod touch, iPad,
and second generation Apple TV. Jailbreaking permits root access to the
iOS operating system, allowing the download of additional applications,
extensions, and themes that are unavailable through the official Apple
App Store.

Jailbreak your iOS Device for Latest version iOS 8 and iOS 8.1
Pangu jailbreak (iOS8) version 1.0 is ready for strict jailbreak developer version.
Available for iPod Touch, iPhone 4S, iPhone5/5C/5S, iPhone6/6plus, iPad Mini2/3, iPad/iPad Air/Air2
Pangu- Jailbreak iOS 7.1 and iOS 7.1.1.
The untethered jailbreak is compatible with iPhone 5s, iPhone 5c,
iPhone 4S, iPhone 4, iPad Air, iPad 4, iPad 3, iPad 2, iPad mini, Retina
iPad mini and iPod touch 5G running iOS 7.1-iOS 7.1.1.
Download Evasion - iOS 7 For Mac OS X & Windows |
Redsnow
redsn0w version 0.9.15b1, with significant new features supporting restoring to older firmware no longer being signed by Apple. For brevity, we’ll list most of the new features in bullet form
Features:
- restore from any 5.x iOS to any other (up, down or the same) 5.x iOS on all devices as long as you have the correct blobs (see more below)
- Cydia now included in the tethered 6.0 jailbreak on A4 devices
- automatically “Just Boot” tethered when qualifying A4 device connects in DFU mode
- untethered 6.0 jailbreak on old-bootrom 3GS
- untethered 6.0 hactivation on any 3GS or iPhone4
- directly restore pre-A5 devices to earlier firmware — no more complicated 15-step how-to’s with stitching, iTunes errors, and “hosts file” concerns
- fetch new signed blobs for any IPSW (present or future — no redsn0w update required) using Extras->SHSH Blobs->New
- block the BB update for any 3GS or iPhone4 restore (past, present, or future — no redsn0w update required) using Extras->Even More->Restore
- deactivate any iPhone, useful for testing your “official” unlock status through iTunes. (Please only deactivate your own iPhone!)
- activation status shown on “Even more” page
- significantly more (very nerdy) info returned by “Identify” button when device is in Normal mode
- tethered jailbreak of ATV2 supported (but the only thing available for it is the SSH2 custom bundle available here — no Cydia yet. Must use “Select IPSW” for tethered boot of ATV2 for now).
- auto-exit WTF mode for older devices with broken buttons
- any time a set of blobs is fetched remotely (from Apple or Cydia), redsn0w also saves them locally (and will check there first if you click “Local”)
redsn0w 0.9.15b3 (OS X — use Ctrl-Click->Open if on Mountain Lion for now)
redsn0w 0.9.15b3 (Windows — run in Adminstrator Mode)
evasiOn - iOS 6.0-6.1.2 Jailbreak
Compatible with all iPhone, iPod touch, iPad and iPad mini models running iOS 6.0 through 6.1.2
Features:
- A computer, running Windows (XP minimum), Mac OS X (10.6 minimum) or
- Linux (x86 / x86_64)
- An iPhone, iPad or iPod running iOS 6.0 through 6.1.2 (you may check in Settings /
- General / About => Version)
- A USB cable to connect the device to the computer
Download
Tuesday, 18 November 2014
How To Identify Fake Facebook Accounts
Facebook or Fakebook ? 

How can you detect the Fake FB Profile. On these days we are getting so many friend request specially by girls, but there is no way to identify that account is fake or original. So don't worry we are going to tell you simple method to detect fake Facebook account.
So this is a Facebook account which named by Sarikha Agarwal. Now we need to verify this account real or fake, so our first step is going to the images.google.com and click on camera image.
So when you click on search by image you will get popup like below image.
Now go to that profile, right click on image and click on copy image URL
When you enter then you get related images search...
Now you can better see that this profile is real or fake..So here is a proof that this profile is fake. Enjoy the trick..
Be aware when you will going to add an beautiful or smart unknown person as your friend. So be checked first.. there are lot of fake profiles are create everyday.
This person might be spy on your profile and steal personal information like your photos, etc for their hacking stuffs.. So Be Safe Online..
How To Make Window Genuiene
Windows 8 Activator
First download the Windows 8 Pro activator from above download button.
NOTE: Download all files to your computer. You can download all files in a single ZIP file by clicking on File->Download
Open folder step 1
NOTE: Download all files to your computer. You can download all files in a single ZIP file by clicking on File->Download
Open folder step 1
- Run Windows 8 Pro Final Activator as administrator
- Wait for the process to complete and let your PC restarts automatically (If not then restart it manually)
- Voila! your Windows is "activated"
- Now open folder step 2
- Run WPE.exe
Windows 8 Professional
NG4HW-VH26C-733KW-K6F98-J8CK4
XKY4K-2NRWR-8F6P2-448RF-CRYQH
Windows 8 Professional N
XCVCF-2NXM9-723PB-MHCB7-2RYQQ
Make Your Windows Genuine* For XP sp2.
How to validate your non original Windows XP sp2
Follow the instructions carefully:
INSTRUCTIONS HOW TO VALIDATE YOUR NON ORIGINAL WINDOWS XP:
1- Click in start and then in run
2- Type in regedit and then ok
3- In the regedit, go to this following key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\WPAEvents
4- On the right panel, double click in OOBETimer
5- In the opened window delete all values and click OK. Shut the regedit
6- Go again in start > run and this time type:
%systemroot%\system32\oobe\msoobe.exe /a
7- In the window that oppened, choose the option... YES I WISH TO MAKE A PHONE CALL... ( or something similar to this sentence )
8- In the next step, click in the button that says CHANGE PRODUCT KEY ( or something similar )
9- In the next step, type a CD-Key:
THMPV-77D6F-94376-8HGKG-VRDRQ
and click to update
10- After clicking in the update button, the assistant to activation will return one page, then click in " remember me later ", and restart Windows again.
11- Restart Windows, go again in start > run and type:
%systemroot%\system32\oobe\msoobe.exe /a
12- The following message will appear:
Windows activation
Windows is now activated
For remove black screen:
Download
Make Your Windows Genuine* For XP sp3
Follow the instructions carefully:
On ur desktop select new text document and paste the foll information... (that is from Windows registry editor.........to.....................8d,6f,d5,33,93,fd)
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion]
"CurrentBuild"="1.511.1 () (Obsolete data - do not use)"
"ProductId"="55274-640-1011873-23081"
"DigitalProductId"=hex:a4,00,00,00,03,00,00,00,35,35,32,37,34,2d,36,34,30,2d,\
31,30,31,31,38,37,33,2d,32,33,30,38,31,00,2e,00,00,00,41,32,32,2d,30,30,30,\
30,31,00,00,00,00,00,00,00,86,56,4e,4c,21,1b,2b,6a,a3,78,8e,8f,98,5c,00,00,\
00,00,00,00,dd,da,47,41,cc,6b,06,00,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,38,31,30,32,36,00,00,00,00,00,00,00,b5,16,\
00,00,83,83,1f,38,f8,01,00,00,f5,1c,00,00,00,00,00,00,00,00,00,00,00,00,00,\
00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,00,66,e5,70,f3
"LicenseInfo"=hex:33,b7,21,c1,e5,e7,cd,4b,fd,7c,c6,35,51,fd,52,57,17,86,3e,18,\
d3,f4,8c,8e,35,32,7b,d1,43,8d,61,38,60,a4,ca,55,c9,9a,35,17,46,7a,4f,91,fc,\
4a,d9,db,64,5c,c4,e2,0f,34,f3,ea
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WPAEvents]
"OOBETimer"=hex:ff,d5,71,d6,8b,6a,8d,6f,d5,33,93,fd
after that save it as "emaad.reg" or any name as long as it has a .reg extension.
in file type select "all file" and save.
thn double click the new icon tht comes on ur desktop.
to chk if it has worked. go to
]http://www.microsoft.com/genuine/default.aspx?displaylang=en[
and click on validate windows to ur right....
keys.~
http://rapidshare.com/files/217326169/windows.reg
Another Trick For Windows XP Genuine.
Start>>
run>>
regedit>>
HKEY_LOCAL_MACHINE>>
SOFTWARE>>
Microsoft>>
Windows NT >>
Current Version >>
WPAEvents >>
Double click OOBETimer >>
Select all and delete >>
FF D5 71 D6 8B 6A 8D 6F D5 33 93 FD >>
Right click on WPAEvents >>
Permissions >>
System >>
Deny Full Control >>
Apply >>
Yes >>
OK >>
Done!
If Necessary then Reboot Your Computer..
Make Your Window 7 Genuine.
Torrent Link: >> Download<< 100% Tested
Install this torrent file and Reboot your computer..
Now you can that your Window is Genuine
Another trick windows 7 activator plus

1. Go to “Start Menu -> All Programs -> Accessories” . Right click on “Command Prompt” and select “Run as Administrator“. If you are not the administrator then you are prompted to enter the password, or else you can proceed to step-2.
2. Now type the following command and hit enter
slmgr -rearm
3. You will be prompted to restart the computer. Once restarted the trial period will be once again reset to 30 days. You can use the above command for up to 3 times by which you can extend the trial period to 120 days without activation.
4. Now comes the actual trick by which you can extend the trial period for another 240 days. Open Registry Editor (type regedit in “Run” and hit Enter) and navigate to the following location
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform
5. In right-side pane, change value of SkipRearm to 1.
6. Now you will be able to use the slmgr -rearm command for another 8 times so that you can skip activation process for another 240 days.
So you will get 120 + 240 = 360 days of free Windows 7 usage.
120 days using “slmgr -rearm” command before registry edit
+
240 days using “slmgr -rearm” command after registry edit
= 360 Days
The latest windows operating system - windows 7 ke
windows 7 keys are:
H3RCX-HC6QD-DB492-YWGHP-3PB4C
PVBHT-4796G-KM9Q3-7V8HD-J6V7M
FGXGR-D4GTB-6YY24-HG67D-FPQJV
PMMB7-VPWQM-R4TBJ-RQW4F-4J6JB
H2CF9-HX9MM-KY3XQ-26W9C-BYYYX
MKCRW-7BVW9-QT44X-QK7J3-RTJ79
6D72M-BGMX8-R8C6H-PFD72-Q3W6F
VVCFH-4P4X2-KMFG2-PBPK3-G9X93
W3DDG-QM7B8-4J499-J8Q22-R3QW6
Q7WQW-QJBW8-C72H6-M8TX9-P4TB6
W2RQF-RRR9B-3BF7T-K2WYB-M7M8Q
XJBCD-6QCVR-RFBWX-939GC-KHC9J
4DMCV-P3RYB-YRTVW-RW4Q6-BVM9P
2VY3F-F8WVR-7D3VV-YYF37-QVQKV
H3RCX-HC6QD-DB492-YWGHP-3PB4C
PVBHT-4796G-KM9Q3-7V8HD-J6V7M
FGXGR-D4GTB-6YY24-HG67D-FPQJV
PMMB7-VPWQM-R4TBJ-RQW4F-4J6JB
H2CF9-HX9MM-KY3XQ-26W9C-BYYYX
MKCRW-7BVW9-QT44X-QK7J3-RTJ79
6D72M-BGMX8-R8C6H-PFD72-Q3W6F
VVCFH-4P4X2-KMFG2-PBPK3-G9X93
W3DDG-QM7B8-4J499-J8Q22-R3QW6
Q7WQW-QJBW8-C72H6-M8TX9-P4TB6
W2RQF-RRR9B-3BF7T-K2WYB-M7M8Q
XJBCD-6QCVR-RFBWX-939GC-KHC9J
4DMCV-P3RYB-YRTVW-RW4Q6-BVM9P
2VY3F-F8WVR-7D3VV-YYF37-QVQKV
Subscribe to:
Posts (Atom)