Welcome, Guest! Sign Up RSS

Covering Hollyhood Microsoft Google Apple

Saturday, 2024-12-28
Main » Vista and 7 Tips and Tricks!
« 1 2 ... 25 26 27 28 29 30 »

People who have recently found love of the Android and have devices like mp3 player, smartphones, laptop mix of Android and Apple products, they might find it hard to sync songs that they love. The people who are looking to sync iTunes with their Android smartphone and music player now have a free option to do it on their device.

Music WithMe is an Android application which allows users to sync music they love from iTunes to their Android smartphones, tablets and music players or to any Android powered devices. The application is far better than DoubleTwist and Winamp and this application does the world with one single click upload.

MusicWithMe Menu

The Music WithMe Android application, as soon as you open it once the installation is done, you will be presented with a menu of famous albums on the right side and on the left we have Everyone, My Friends and My Music options.MusicWithMe options

The My Music option allows you to sync music with iTunes. This also presents you with various options to share the albums and your activity. In this menu, you can sign up for Music WithMe if you are a first time user using your Facebook Account which is existing, you just need to signin. On the other side you need to download the iTunes helper software which is a PC tool allowing you to sync music from iTunes. Once you do that the instructions would be sent to your mail account. Once you follow those instructions, your music will be available for syncing and you just need to select the music to sync.MusicWithMe FB Connect

When you tap on the Menu and select Settings there are various settings options available for you to change your Facebook account, music file storage location, default music player and many others.MusicWithMe Everyone

This application is free and provides sync of iTunes for free without any issues.Settings

Music WithMe Android App Download

Music WithMe Android application can be easily downloaded from Android Apps Labs. To download it directly on to your mobile phone you need to visit the Music WithMe Android Apps Labs page listing and then tap on Install button to install it automatically.

Category: Vista and 7 Tips and Tricks! | Views: 796 | Added by: Adamsummer | Date: 2012-03-23 | Comments (0)

Having a Sony Xperia S smartphone? Then we will tell you in the due course of this article we will be checking out on how you can easily root the same with the help of a simple tutorial. Please note that only those Xperia S devices which are on the 63 and 67 firmwares can only make use of this tutorial to root the devices. Over a period of this article, we will be checking out in detail on what are the list of pre requisites you need to follow along with the tutorial in the next page.

Xperia S Logo

Disclaimer: Neither we, nor developer should be held responsible for any damage happened to your device in the process of following the instructions mentioned in this article. It’s very unlikely that there will be any issues but just in case if at all there are any issues then we are committed to help you in solving the same.

Pre Requisites:

  • This procedure will only work on the Xperia S devices which are on the Unlocked Boot loaders and also the ADB Drivers should be installed in your computer.
  • All the data present in your phone should be backed up as in the process of applying this update, the data might get either lost or corrupted. With the help of below mentioned steps you can easily backup the same.

SMS – Use "SMS Backup & Restore app”,
Contacts – Sync with the Gmail application,
Call Log - Call Log and Restore
Images, Songs, Videos, Files – Copy to internal / External SD Card,
APN and MMS Settings – Note down from the path "Applications > Settings > Wireless and Network > Mobile Networks > Access Point Names

  • Minimum charge left in the device should be at least 60% so as to ensure that device doesn’t get turned Off in the middle of firmware update.
  • Disable all the antivirus suites in your computer and uninstall the same in your device as these tools generally tend to interrupt the process of firmware update.

So, assuming that you have followed all the above mentioned instructions you can now proceed to the next page where detailed instructions on how to root your Xperia S.

Category: Vista and 7 Tips and Tricks! | Views: 881 | Added by: Adamsummer | Date: 2012-03-23 | Comments (0)

Recently we heard on some forums installed Android’s Gingerbread on the Nokia’s N900 and now let’s see how you can install Meego on your PC or Net book or even on the Laptop. So, let’s proceed on how you can install the same on your Asus eee PC. It’s not sure but it works on most of the computers. So, before we proceed to the procedure for install the Android OS on your system, you need to download Android x86 and also you need to port your device to the Android x86. So, let’s proceed and see how you can install the latest Eclair 2.0 Android operating system on your Asus ee PC.

How to Install Android OS on your EEE PC?

  • First, you will need to download the bootable Android x86 iso file and need to push the same into your USB storage device either by using Win32DiskImager –  or UNetBootIn
  • Now, you need to insert the USB drive in your net book and set the same to boot from USB drive from the BIOS options and then you need to restart your net book.
  • Now, the installation process will be started and the you can now use the same as the Live USB so that it can run Android without installing on your hard disk.
  • Now, if you choose to install the same, you need to select the partition for installing the same and then format using EXT3 format and then you need to choose the GRUB boot loader.
  • Now, after the installation, you need to reboot your system and will run the Android operating system.

Almost all features and enhancements looks nice as everything works fine but most of the users had complained about the USB disconnection if any big size file is being transferred but apart from that everything else like WiFi, Mouse, Keyboard and other peripheral integration seems like great with a clean and neat overall interface. Please note that this can be used as a backup OS or also can be made as a stand-alone OS. This also comes with an Android Market place which is compatible with the x 86 platforms.

Category: Vista and 7 Tips and Tricks! | Views: 971 | Added by: Adamsummer | Date: 2012-03-23 | Comments (1)

Hello,

Many of us face a lot of problem when we have to reinstall windows on our computer or laptop. First thing we have to decide from where to install windows? The options available are DVD or USB Pendrive. In the latest new netbooks, mostly there is no DVD drive. So if you want to install windows you have to go with the other option, i.e. USB Pendrive. So here I give a brief and 100% tested tutorial on how to create a Windows 7 Bootable USB Pendrive to install Windows 7 from USB Pendrive.

First thing, you should check whether your BIOS supports booting from USB. Most of the computer/laptops support. But if your BIOS doesn’t, then sorry, you cannot boot from a USB Pendrive.

Second thing, you need another computer with Windows installed with a DVD drive, to copy its contents later.

So let us start with the procedure now:

1) Run command prompt (cmd). This can be done by clicking start and typing typing cmd in Windows 7. In Windows Xp, click on start and then click on run. Type cmd and run. This will open the command prompt which will look like this:

2) Then run diskpart utility from command prompt, by typing ‘diskpart’ on command prompt and pressing enter. This will run the diskpart utility in a separate windows, which is shown in 2nd picture below:

3) Now put in your pendrive in a USB port. Your pen drive must be atleast 4 GB, 8 GB pendrive is best for this purpose. Now go back to the diskpart console and type ‘listdisk’ and press enter. This will list the various storage devices available. You can see the size column of the disk and here we can see that ‘disk 2′ is our pen drive. Warning: In your computer it may be some other number. In our case it is ‘disk 2′.

4) Then you have to type ‘select disk 2′ and press enter. Note: in our case it is disk 2, in your case it may be disk 3, or disk 1 or any other number. You can enter ‘detail disk’ to see the details of the disk after selecting it to verify that you have selected the correct disk. You can see these steps in the image below:


5) Then you have to run a series of commands. The commands to be run in the order are:- clean

- create partition primary

- select partition 1

- active

- format fs=fat32

These steps are shown in the image below:

6) The format step will take some time. You can have a tea or coffee in the meantime and come back. After the format is complete you have to run ‘assign’ command. And after this you can exit diskpart utility by entering the ‘exit’ command. The steps are shown below:

- assign

- exit

- The image below shows all the steps taken from the first step:

7) After the format is complete, put in your original Windows 7 DVD in your DVD drive, or if you have an .iso image of the DVD, mount that image using any virtual drive software like Power ISO.

- Now go to My Computer, and open the contents of DVD Drive. Press ‘ctrl+a’ to select all contents and copy all the contents by pressing ‘ctrl+c’.

- Now go back to My Computer and open the USB Drive and press ‘ctrl+v’ to paste all the contents of DVD into the USB Disk.

 

8) When the copy finishes, you are done just remove the USB Drive safely and use it to install Windows 7 in ... Read more »

Category: Vista and 7 Tips and Tricks! | Views: 878 | Added by: Adamsummer | Date: 2012-03-23 | Comments (0)

Hackin9
-: Hackin9 :-

This book will help you learn :-
* How to use Google to find sources of personal information and other confidential data.
* How to find information about vulnerable systems and Web services.
* How to locate publicly available network devices using Google.
  Download (Size :- 1.78 MB) 
Category: Vista and 7 Tips and Tricks! | Views: 797 | Added by: Adamsummer | Date: 2012-03-23 | Comments (0)

Hacker Blackbook: http://www.MegaShare.com/109898 
Password is flaifle
------------------------------------------------------------------
(AIO) Hacker's handbook: 
http://rapidshare.com/files/7297787/..._Tiger2403.rar
------------------------------------------------------------------
Hacking the Code: ASP.NET Web Application Security 5052 KB 
http://rapidshare.com/files/15150447...P.NET.rar.html
-----------------------------------------------------------------------
Hacking Wireless Networks For Dummies:
http://rapidshare.com/files/9884146/...0764597302.rar 
Password: forums.nswarez.com
-------------------------------------------------------------------------
Hack Proof Your Wireless Network:
TYPE : PDF PAGE : 513 Download 5.7 MB 
http://rapidshare.com/files/21865035...ss_Network.rar
Rar Pass:4shar1ng
-----------------------------------------------------------------------
Hacking Exposed 2: Network Security Secrets & Solutions
File type: PDF Pages: 735 Size: 7.39 MB 
http://rapidshare.com/files/4172811/...ed_by__vip.rar 
------------------------------------------------------------------------
Hacking MySpace: Paperback: 408 pages 
Visit www.myspaceismyplace.com to find all code from this book, links tosoftware and featured profiles, a reader forum, and more 
Download Here 
Code: 
http://rapidshare.com/files/3880790/...Your_Space.rar 

Pass: www*e booksheave n*org replace * by . and no spaces
----------------------------------------------------------------------
Hacking For Dummies (2nd Edition):
Ethical hacking is the process of entering into a hacker's mindset in 
order to spot system vulnerabilities by performing typical hacks in a 
controlled environment. This book helps security professionals 
understand how malicious users think and work, enabling administrators 
to defend their systems against attacks and to identify security 
vulnerabilities. 
* Shows readers how to approach their system security from the hacker's 
perspective and perform nondestructive penetration testing 
* Helps the reader develop an ethical hacking plan, and examines typical 
attacks and how to counteract them 
* Guides readers through reporting vulnerabilities to upper management, 
managing security changes, automating the ethical hacking process, and 
training end-users to avoid being victimized.
http://www.divshare.com/download/394826-8ed
-------------------------------------------------------------------
Collection Of Hacking eBooks: Whats included.
How to Crack CD Protections.rar 
10000 Serial Numbers.rar 
1337.h4x0r.h4ndb00k.Aug.2005.Sams.chm 
Addison_Wesley_-_Hackers_Delight.chm 
Art of deception.rar 
Beginner'sGuideToHackingAndPhreaking.rar 
e-book basic guide to hacking.rar 
Hacker JargonDictionary.rar 
Hacker.Cracker.A.Journey.from.the.Mean.Streets.of.Brooklyn.to.the.Frontiers.of.Cyberspace.pdf 
Hacker.Disassembling.Uncovered.A.LIST.Publishing.eBook-LiB.chm 
Hackers Black Book.rar 
Hackers.rar 
Hacking For Dummies.rar 
Hacking into&nbs ... Read more »
Category: Vista and 7 Tips and Tricks! | Views: 837 | Added by: Adamsummer | Date: 2012-03-23 | Comments (0)

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Most passwords can be cracked by using following techniques : 

1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords. 
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length. 
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately. 

Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.


2) Guessing :- Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary based) and the user's personal information. Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:
* blank (none) 
* the word "password", "passcode", "admin" and their derivatives 
* the user's name or login name 
* the name of their significant other or another person (loved one)
* their birthplace or date of birth 
* a pet's name 
* a dictionary word in any language 
* automobile licence plate number 
* a row of letters from a standard keyboard layout (eg, the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop) 
* a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters. 
and so on....
In one survery of MySpace passwords which had been phished, 3.8 percent of passwords were a single word found in a dictionary, and another 12 percent were a word plus a final digit; two-thirds of the time that digit was.
A password containing both uppercase &  lowercase characters, numbers and special characters too; is a strong password and can never be guessed.


Check Your Password Strength
 


3) Default Passwords :- A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet.
Always disable or change the applications' (both online and offline) default username-password pairs.

4) Brute Force :- If all other techniques failed, then attackers uses brute force password cracking technique. Here an automatic tool is used which tries all possible combinations of available keys on the keyboard. As soon as correct password is reached it displays on the screen.This techniques takes extremely long time to complete, but password will surely cracked.
Long is the password, large is the time taken to brute force it.

5) Phishing :- This is the most effective and easily executable password cracking technique which is generally used to crack the passwords of e-mail accounts, and all those accounts where secret information or sensitive personal information is stored by user such as social networking websites, matrimonial websites, etc.
Phishing is a technique in which the attacker creates the fake login screen and send it to the victim, hoping that the victim gets fooled into entering the account  ... Read more »
Category: Vista and 7 Tips and Tricks! | Views: 997 | Added by: Adamsummer | Date: 2012-03-23 | Comments (1)

General overview of security issues that face the administrator of Linux systems.

Although linux-based operating systems are considerably safer when compared to Windows and Mac OSX, there are still steps that you can take to ensure that your linux box stays safe and protected. In this post I will illustrate a few techniques you can use to keep your machine locked down tight.

1. Firewalls are your guardian angels.

First of all, keep a software firewall active on your system, and restrict access to ports that allow remote access into your system, a good idea is to allow only a few select hosts access to ports used by services such as ssh (port 22) or telnet (port 23). Keeping a firewall in place ensures that you alone dictate who gets to access remote services on your computer and who doesn’t. To set up a firewall in linux, you can use the iptables program which comes standard with most linux distributions. However, iptables is quite difficult and complicated to set up correctly, and you will need to spend some time fiddling with the command line, but it is very flexible and powerful once configured correctly.

If messing about with iptables dosen’t appeal to you, there are frontends to iptables that you can use to set up effective firewalls. One such frontend is ufw (uncomplicated firewall) this program comes standard on ubuntu and is quite simple to set up, to use it you first have to enable it by typing in ’sudo enable ufw’ in the terminal, once the ufw service is active, adding rules is as simple as ’sudo allow 22/tcp’ > this statement allows all tcp traffic on port 22, swap allow for deny and you have the ssh service blocked, Its that simple, much easier than mucking about with iptables.

Of course, there are many people who do not like the idea of using command-line programs and like all their apps to be graphical. If you prefer a GUI configured firewall, then firestarter is the choice for you. Firestarter is a breeze to use, and has good documentation available on the firestarter website.

2. Passwords are for your protection, choose them well

Choose good user passwords, especially for root. One way to choose a secure password is to take a sentence, reduce it to an acronym and then replace some letters of the acronym with symbols and add some numbers to it. this mixing of alphabets, numbers and symbols, along with its long length will be a strong password.

Never use actual words that have meaning as passwords. These types ofpasswords are weak and can be cracked using dictionary attacks. Also along those lines: Never use words that hold personal significance with you.. i.e don’t use passwords that people who know you will be inclined to think that you would use, like a favorite pet’s name.. etc.

And for god’s sake, don’t use the word ‘password’ as a password…. ( don’t laugh… thats one of the most common passwords .. )

3. Use antivirus 

Yeaps you read right.. antivirus. Antivirus on linux you say? Yes, linux has antivirus suites as well , but this is more for cleaning off your thumbdrives that you may have used in an infected windows machine than for killing linux viruses, as the system of user permissions for executing files makes linux a very inhospitable place for computer viruses to live. clamAV is a good antivirus choice, with a GUI version ... Read more »
Category: Vista and 7 Tips and Tricks! | Views: 766 | Added by: Adamsummer | Date: 2012-03-23 | Comments (0)

Download Invisible IP Map to surf anonymously in internet. Hide your IP and encrypt your connection.

Previously i've posted "How to find the IP address of the email sender in Yahoo! Mail" and "How to Track the location of an IP address". In this article i'm going to show you a softwareInvisible IP Map, that can make you be "anywhere" in world. People that hack sites will need this small baby to help em on the way. This tool will put you in selected location all around the world XD.

Invisible IP Map is user-friendly software that masks your real location. Every computer that is connected to the Internet has its own IP address which could easily be located on a map. This program will help you show yourself like you are surfing from another place on the planet.


Product Information:

This is a Mask IP software which is used to change your real Internet address while browsing. The software will deliver you fresh anonymous proxy servers every time you decide to click on "Get IP Locations". The main benefit of this software is that you can't be traced when browsing websites. Also if a website is restricted for users from specified country the program can bypass that protection. By hiding your IP you will prevent receiving spam from marketers which know your interests by tracking your IP when browsing websites. You can use web based e-mail to send anonymous e-mail. Post on bulletin boards without displaying your real IP address.

Main Screens:



  • Map Menu: This is they key part of the software. Here you canchange your IP address, retreive IP locations, get information about your IP location or the location of the other server. In addition, you can recheck the servers.
  • IP Information: This screen will give you all the information about your IP and the remote IP. You can see information such as city, region, country, distance between you and the remote server,server type, timeout etc.
  • Custom proxy checker: The proxy checker is specially designed for those of you who have own proxy lists. You can add them to the checker and check whether they are working.
  • VIP Servers: This is optional add-on for Invisible IP Map software. The VIP servers will give you a  ... Read more »
Category: Vista and 7 Tips and Tricks! | Views: 1374 | Added by: Adamsummer | Date: 2012-03-23 | Comments (1)

Today i will show you how to send a message to a mobile phone using nothing, but only a bluetooth. This isn't really a hack or a cheat or anything, just a way to send a "message" to a bluetooth enabled phone.

Here it goes:

Items needed:

A phone with bluetooth connection.

Step 1: Go to "Contacts" on your phone
Step 2: Click on "New Contact"
Step 3: In the number section write whatever you want. I'm going to use 1337 as an example.
Step 4: In the name section write your message. I'm going to use "Bluejacked!" as an example.
Step 5: Now save this contact.
Step 6: Now you go on "Contacts" and browse the contact that you just made.
Step 7: Click on it, and choose "Send with bluetooth" or something like that.
Step 8: Choose your target and click "Send"

On the targets phone there will pop up something like this:

Category: Vista and 7 Tips and Tricks! | Views: 781 | Added by: Adamsummer | Date: 2012-03-23 | Comments (0)

Windows 8 isn’t even out in beta yet, but it has built up quite a bit of buzz. Tech bloggers and analysts have been talking about it for months and months, but beyond the folks at Microsoft and some developers and reviewers, there have been very few who have had the opportunity to go hands on with this operating system.

Even though a lot of folks haven’t been able to try this new operating system, and it isn’t due out for quite some time, there are a lot of hints, tricks and tipsalready out for Windows 8. If you can get your hands on a copy of Windows 8 when it comes out on Beta, the following top 6 Windows 8 tips should help you get started using this brand new OS like a pro.

1. You don’t have to use the Ribbon Interface in the explorer windows.There are many users who may find this feature useful, making it easier to find and open files. Other users may not be so keen on this feature, finding it distracting and bulky. You can change this in the Computer Configuration. From here, select "Administrative Templates,” "Windows Components,” and finally "Windows Explorer.” You will need to select enabled for the "Start Windows Explorer with the Ribbon Minimized” option to hid the ribbons on your next startup.

2. There are plenty of new Keyboard shortcuts. While some of the old keyboard shortcuts will still work, there are some new ones that you get to use with Windows 8. The Windows Key and "W” brings up the settings search. Windows and "C” call up the simple "Start menu” along with the date and time. If you select Windows and "Q” the application search comes up. These are only a small sampling of the new shortcuts that are already known for this new operating system.

3. You can uninstall programs from the Start Menu. This is a handy new feature that will make it much easier to get unwanted programs off of your system. To uninstall a program from your Start Menu in Windows 8, right click on the icon for the program to get rid of select uninstall and click on it a second time. Windows 8 is made for touch screen systems, as they seem to be the next big thing; with touch screen you uninstall programs from the start menu by holding the program icon to get options, selecting uninstallfrom there.

4. Bring back the old control panel interface. If you think the new control panel that Windows 8 offers is a bit too new-fangled, you can get the old one back. Simply open the control panel and select "More Settings” at the bottom of the screen. You will see an option for selecting the old control panelinterface.

5. Login Automatically. To set this feature, open the Run dialogue box and enter "netplwiz” to launch the User Accounts dialog box in Windows 8. Uncheck the option that requires users to enter a user name and password. Then you will need to enter the  ... Read more »
Category: Vista and 7 Tips and Tricks! | Views: 1122 | Added by: Adamsummer | Date: 2012-03-23 | Comments (2)

Here are some handy tips for you, by following which you can properly remove any software from your machine:

TIP 1: The simplest way to remove software from your machine is to remove it from control panel that any unprofessional computer user can also do. But, for your convenience, we have mentioned in proper steps.By following these steps, you can easily uninstall any software from your PC:
  • Click on Start button
  • Then, select Control panel and look for Add/ Remove Programs
  • A list will appear (here, you can select any program that you wish to uninstall from your PC)
  • Right click on your desired software and select "Uninstall” (It will take some time to uninstall.So, wait until the uninstall process gets completed.)
  • After the process is complete, you should restart your PC.

And here you go; you have uninstalled the software that was troubling you. Hopefully, this will work perfect, but if it did not work, then you can use the next alternative way(s):

TIP 2: A person who uses his computer 20 or more hours a day, it’s really annoying for him when suddenly his PC starts working very slow.Many of you may already have some idea of why some of our uninstalled programs still reside in our PC’s registry. It is because some entries still stay in ourwindows registry and will stay there until you remove them manually.

To modify/remove registry, go to "Run” and then type "Regedit”. And in Regedit, you can make changes related to your desired software, but if you are not a computer professional, then do not try to mess up with the registry, because it will create more problems if you unintentionally remove/modify the wrong entries.

TIP 3: There is hardly any problem in the online scenario that cannot be resolved by software. There are also many uninstallers available that you can use to uninstall specific programs. Also, there are numerous softwareapplications that provide their own uninstallers with installation packages and you can use them to remove software completely.

The advantage of using these uninstallers is that they exactly know where your installed software had made changes in your system. When you start searching about some software uninstallers, you will see many uninstallers and it will become very difficult to select the perfect one. For this, your can also get recommendations from your friends or computer professionals via any forum. By following these tips, you can easily uninstall your problematicsoftware apps from your machine that were actually creating problems.
Category: Vista and 7 Tips and Tricks! | Views: 775 | Added by: Adamsummer | Date: 2012-03-23 | Comments (0)

You suffer from an absent or steady mobile signal? So this article will help you to resolve this problem. 

Today's high-time human activity is unthinkable without communication and even today when long distances are not a barrier thanks to high-quality provider. The days when a cell phone was remarkable and expensive for everyone are gone.

Through the efforts of mobile operatorscellular phone is no longer a luxury and it has become an integral accessory of a modern man. As concerning mobile communication it is penetrated into the remotest corners of our globe.

However, the situation when the mobile phone receives a signal badly and you can not make or receive calls is familiar for many people. How often do you come to the window or go outside to talk to?

There are areas of unstable reception in any gsm network where you need mobile signal amplification to improve the quality of cellular communication. The hindrance of the passage of radio waves could be massive walls, metal objects and concrete floors of your home. In such conditions the communication by the cell phone is limited or impossible.



The cellular enhancing is achieved through the installation of mobile signal booster:

Where is necessary to strengthen the cellular gsm signal? Anywhere! It can be private houses, cottages and villas; offices, shopping malls and stores; restaurants, bars, clubs; underground car parks and parking; warehouses, hangars, etc. 

First of all to ensure the stability of the cell phone communication and boost cell phone signal will be necessary in country houses, cottages, situated on the slopes and valleys, in basements and other places where radio waves from mobile base stations of cellular operators can not penetrate into the buildings.

Now you do not need to seek a peaceful place to make phone calls, because in your home, shop or office you will not have problems associated with disruption of cellular communication. You will save yourself from having to search the place of reliable reception of cell signal and will be able to do what is really important for you. 
Category: Vista and 7 Tips and Tricks! | Views: 982 | Added by: Adamsummer | Date: 2012-03-23 | Comments (0)

Download all your favorite videos to your computer. It's never been easier to download youtube videos. 

YouTube is the most popular video sharing website where users can upload, view and share video clips. But they don't have the feature to download these videos, so if you want to download some of your favorite videos fromYoutube, but don't know how to do it, than check out this post.

Top 10 tools which help you download YouTube Videos.

1. YouTube Downloader - YouTube Downloader is free software that allows you to download videos from YouTube, Google Video, Yahoo Video, and many others and convert them to other video formats. It also allows you to convert downloaded videos for Ipod, Iphone, PSP, Cell Phone, Windows Media, XVid and MP3. Just specify the URL for the video you want to download and click the Ok button.

2. YouTube Catcher is a free service for downloading YouTube videos and saving them to your PC.

3. Kiss YouTube - Kiss YouTube offers the easiest way for downloadingvideo clips from YouTube. To download and save a YouTube video clip, just add the word "kiss” to the video URL in your browser address bar and hit enter. And then click on the download link provided to save the video to your computer.

4. YouTubeLoader Firefox Plugin - Youtubeloader firefox plugin is a Greasemonkey script, which adds a Download link below the YouTube video.

5. KeepVid - Download and save videos directly from Youtube, Google, Metacafe, Putfile and more. Simply copy/paste the link of the video that you're going to download and you're done.

6. VideoDownloader is very similar to KeepVid, but supports even more video sharing sites, and it’s also available as a Firefox extension. Just like with KeepVid, all downloads are in .flv format.

7.  ... Read more »
Category: Vista and 7 Tips and Tricks! | Views: 898 | Added by: Adamsummer | Date: 2012-03-23 | Comments (0)

Download and save videos directly from Youtube, Google, Metacafe, Putfile and more. 

In this post i'll show you simple trick to download youtube videos in Linux. You don't need any software to download youtube videos in Linux… Just follow these steps and enjoy the flvs :)

  • Open the required video in the web browser.
  • Let it start streaming/buffering.
  • Minimise the window and open /tmp.
  • Look for a file flash
  • Drag the file on to your desktop.
  • Once the video is buffered in the browser, the file would have been downloaded.
NOTE: Do Not Close The Browser Window/Tab while doing this. This method works for other similar websites also.
Category: Vista and 7 Tips and Tricks! | Views: 831 | Added by: Adamsummer | Date: 2012-03-23 | Comments (0)

How to split up large files / zip archives into several smaller ones for an easier distribution or storage on several disks.

Have your ever wished that you could split a really large video, zip, or MP3 file into smaller files so that you can copy it to multiple CDs or USB sticks? Now that’s it so easy to transfer video onto personal computers, moving these large files between computers can be a real pain. Luckily, there are a few free tools that you can use to split and merge files quickly and easily. So here i'm posting some of the best ways to split large files.

1. GSplit - This application is a free reliable file splitter that lets you split your large files (like Self-Extracting archives, Zip archives, disk images, multimedia, music, video, backup, image, archive, log, large text, document files...) into a set of smaller files called pieces.


2. File Splitter - File Splitter is a freeware program which does not requireinstallation and can be used to split files to multiple chunks as well as to merge multiple chunks into a single file.

3. Rapid Split - Rapid Split is an easy-to-use, wizard-based file splittingsoftware with step-by-step assistance in splitting process. It enables you to split files of all types into pieces that can be stored on removable storagemedia such as floppy disk and zip disk.

4. JoneSoft File Splitter - The JoneSoft File Splitter application was designed to help you split files to any size you wish. Restoring is simply a matter of running the restore (BAT) file created when the file is split, or, for total control, you can restore using the File Splitter program. Integrated with Windows Explorer to allow even more flexibility.

5. Splitfile - SplitFile's goal is to split (chop) big file in smaller segments to be able to store them in floppy disks or CDs (these are just examples, the target size is fully customizable).
The main feature if compared to other programs like this, is the ability to support very large files( up to 9,223,372,036,854,775,807 bytes = 8589934591 GB , theoric) and to being configured to increase performances if used with fast disks ( adjusting the read and write buffer up to 32 times the commonly used value).

6. HJSplit - HJSplit is a popular set of freeware file-splitting programs created by Freebyte.com in collaboration with various programmers. HJSplit supports many platforms. All versions are compatible with each other and allow you to exchange files between these different platforms.

7. MaxSplitter - MaxSplitter is a fast and small program that does merely two things: it can split files and rejoin them!

Its interface is intuitive and requires no in-depth < ... Read more »
Category: Vista and 7 Tips and Tricks! | Views: 911 | Added by: Adamsummer | Date: 2012-03-23 | Comments (0)

Some of The Best and Most Popular Linux Application Programs. All are available for free
If you are a Linux user and looking for some cool free Linux apps, than this post is for you 'cause here i'm posting must have free apps for you Linux. There are lots of Linux apps available on the net, but only few of them are really helpful for your Linux. In this post i'll show you some of the most useful Linux apps.

Here is the list of the 
must have free apps forLinux

1. Konqueror - Konqueror is a web browser, file manager and file viewer designed as a core part of the K Desktop Environment. It is developed by volunteers and can run on most Unix-like operating systems. Konqueror, along with the rest of the components in the KDEBase package, is licensed and distributed under the GNU General Public License.

2. Lynx - Lynx is one of the most popular web browsers for command-line interfaces. Lynx runs on Un*x, VMS, Windows 95/98/NT, DOS386+ but not 3.1, 3.11, or OS/2 EMX.

3. Thunderbird - Thunderbird is a good quality graphical email client that uses the GTK toolkit but is not tied to any particular desktop environment. It has pretty much all the features you would expect to find in such a program:mailing list handlingencryption and digital signatures for outgoing and incoming mails and plenty of filtering options.

4. KMail is the email component of Kontact, the integrated personal information manager of KDE.

5. Evolution - Evolution is the most feature-rich of the mailers we looked at – at least as they were set up out of the box – largely because of the comprehensive range of plugins provided, although the one to play audio attachments could get a little tiresome, especially if deployed in a large office.

6. OpenOffice.org
 - OpenOffice.org (OO.o or OOo) is a cross-platform office application suite available for a number of different computer operating systems. It supports the ISO standard OpenDocument Format (ODF) for data interchange as its default file format, as well as Microsoft Office ‘97–2003 formats, Microsoft Office 2007 format among others.

7. KOffice - KOffice is an office suite for the K Desktop Environment (KDE). All its components are released under free software/open source  ... Read more »
Category: Vista and 7 Tips and Tricks! | Views: 953 | Added by: Adamsummer | Date: 2012-03-23 | Comments (0)

 Learn how to make an undeletable folder. You can protect your important folders by making them undeletable.

Sometimes happens that someone is deleting a folder, which is very important to you. If you would like to avoid anything similar happening in future, you can protect yourimportant folders by making them undeletable. Here i'll show you simple tutorial, which can help you.

1. Open cmd ( Type in Run option, the command 'cmd' or navigate to All Programs->Accessories-> Command Prompt)


2. In cmd change to the directory that you want ( you can use the commands " cd..." to exit the curent folder and "E:" for example to change from your current drive to E drive.

3. Type md \lpt1\\ and press enter, the folder now will be in your E:



4. If you try to delete or rename it, it will appear error message


5. If you want to delete it just go to 'cmd', navigate to the directory and type rd \lpt1\\ and press Enter.

Category: Vista and 7 Tips and Tricks! | Views: 779 | Added by: Adamsummer | Date: 2012-03-23 | Comments (0)

 20 Best Hacking and Security Software Tools for Linux

Previously i've posted a tutorial Learn More About Linux Security. Here i'm going to show you some of the best hacking tools for Linux. Linux is a hacker’s dream computer operating system. It supports tons of tools and utilities for cracking passwords, scanning network vulnerabilities, and detecting possible intrusions. I have here a collection of 20 of the best hacking and security software tools for Linux. I'll show you how to install theses tools in Ubuntu, Fedora, Debain, and Open Suse.

1. Nmap ("Network Mapper")


Nmap is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and both console and graphical versions are available.


2. John the Ripper



John the Ripper is a free password cracking software tool initially developed for the UNIX operating system. It is one of the most popular password testing/breaking programs as it combines a number of password crackers into one package, autodetects password hash types, and includes a customizable cracker. It can be run against various encrypted password formats including several crypt password hash types most commonly found on various Unix flavors (based on DES, MD5, or Blowfish), Kerberos AFS, and Windows NT/2000/XP/2003 LM hash. Additional modules have extended its ability to include MD4-based password hashes and passwords stored in LDAP, MySQL and others.


3. Nessus


Nessus is a comprehensive vulnerability scanning software. Its goal is to detect potential vulnerabilities on the tested systems such as:

-Vulnerabilities that allow a remote cracker to control or access sensitive data on a system.
-Misconfiguration (e.g. open mail relay, missing patches, etc).
-Default passwords, a few common passwords, and blank/absent passwords on some system accounts. Nessus can also call Hydra (an external tool) to launch a dictionary attack.
-Denials of service against the TCP/IP stack by using mangled packets

Nessus is the world's most popular vulnerability scanner, estimated to be used by over  ... Read more »
Category: Vista and 7 Tips and Tricks! | Views: 1302 | Added by: Adamsummer | Date: 2012-03-23 | Comments (0)

In this post I present iPhone navigator called MotionX GPS Drive for iPhone and iPod Touch. Below you can find download link, size is 7.6 MB.


MotionX-GPS Drive turns any iPhone 3G or 3GS into the next-generation car and pedestrian navigation solution. MotionX introduces new features not yet seen on mobile device, including "door-to-door” personal navigation tools, user interface innovations that greatly simplify the navigation experience, and integration of live search capabilities.

Download MotionX GPS Drive
Category: Vista and 7 Tips and Tricks! | Views: 823 | Added by: Adamsummer | Date: 2012-03-23 | Comments (0)

Blogger Widgets