Friday, July 19, 2013

System Security For User........


             System Security For User........





1. Always use a strong password with a combination of alphabets, numbers and special characters

2. Use Original Antivirus. Dont download Cracks & Keygens which are the main entry point for Viruses and Trojans.

3. Use Original Windows OS ( Paid ) or Use Open source OS such as Linux, Ubuntu, Flavours of Linux. Do not use some programs to patch your system.

4. Regularly Update your Antivirus and OS to remove and/or patch vulnerabilities and keep your system secure.

5. Shutdown / Uninstall unwanted programs or programs which you dont use such as FTP, Telnet or any softwares which use your resource.

6. Use Drive Encryption tools to protect your data from data theft and to protect from data loss.

7. Always create a back-up of your important files to a Hard disk or Online Servers ( like Drop box )

8. Never trust any other network to which you connect( OPen WiFi ). Crackers & hackers can compromise your data and also steal your data transmitted .

9. Have a routine check of your computer for defects and patch immediately.

10. Never leave your computer unattended, even for a short time. It is easy for a cracker to inject a virus or spyware into your system.

                                        ENJOY.......

Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

Saturday, July 6, 2013

TWEAK YOUR COMPUTER..



Registry Hacks to Tweak WindowsMicrosoft Windows offers a feature-rich interface and several customization options that make it one of the most user friendly operating systems in the world. However, computer geeks would still love to hack the Windows Registry so as to add more extra features and functionalities to their operating system.
If you’re one such geek who would like to customize Windows in your own way, here is a list of 8 interesting registry hacks that you need to try:

1. Disable USB Devices:

Disabling USB ports can be a smart idea to add security to the computer. This can be really handy if the computer is on a public place where the chances of virus and other malware infection is really high. You can easily disable access to USB ports with the following registry hack:
  1. Open the Registry Editor (Start -> Run -> Type regedit and hit Enter)
  2. In the registry, navigate to the following key:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\UsbStor
  3. In the right-side pane, double-click on “Start”.
  4. In the “Value data” field enter 4 and click on “OK”.
  5. Close the Registry Editor and reboot.
To enable USB devices, follow the same procedure as above except in the step-4 enter3 in the “Value data” field.
Works on Windows XP, Vista and 7.

2. Disable Notification Balloons in Windows 7 and Vista:

You can now disable the annoying notification balloons that keeps popping up frequently with warning messages and reminders. Here is a step-by-step procedure to do that:
  1. Open the Registry Editor and navigate to the following key:
    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
  2. Right-click on the right-hand pane, and create a new “DWORD”.
  3. Rename it to EnableBalloonTips, double-click on it and set the “Value data” to 0. Reboot the computer to see the changes in effect.

3. Add “Recycle Bin” to My Computer in Windows 7 and Vista:

Would you like to add the “Recycle Bin” icon to My Computer so that you need not go back to the desktop to access it when required? Well, here is how you can do that:
  1. Open the Registry Editor and navigate to the following key:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MyComputer\ NameSpace
  2. Right-click on “NameSpace” and select New -> Key. Name the key with the following name:
    {645FF040-5081-101B-9F08-00AA002F954E}
  3. Now, open “My Computer” and hit F5 to refresh the screen. This should show up the “Recycle Bin” icon.

4. Disable the Windows Task Manager:

Need to limit access to your computer by disabling the Task Manager? Here is a simple registry hack to do this:
  1. Open the Registry Editor and navigate to the following key:
    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies
  2. Right-click on “Policies”, select New -> Key and name the key as System.
    If you are on Windows XP, you need not create the new key “System” as it is already present in it. So, you can directly navigate to:HKEY_CURRENT_USER\Software\Microsoft\ Windows\CurrentVersion\Policies\System in the Step-1 itself.
  3. Right-click on “System”, create a new “DWORD” and name it toDisableTaskMgr.
  4. Double-click on the DWORD “DisableTaskMgr” and set the “Value data” to 1(0=Enable, 1=Disable).
  5. To enable the Task Manager, Set the “Value data” back to 0.
Works on Windows XP, Vista and 7.

5. Change the Registered Owner and Organization Name:

Here is a simple hack to change the name of the Registered owner on your computer:
  1. Open the Registry Editor and navigate to:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion
  2. On the right-side pane, find the keys RegisteredOwner andRegisteredOrganization. Double-click on them to change the names to whatever you want.
  3. To see the changes, right-click on “My Computer” and select “Properties”.
Works on Windows XP, Vista and 7.

6. Add Programs to Windows Startup:

You can now add your favorite programs to Windows Startup without the need for using the start-up folder. Here is a way to do this:
  1. Open the Registry Editor and navigate to the following key:
    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
  2. On the right-side pane, create a new “String Value” and rename it to the name of the program that you want to add (you can give any name, it doesn’t matter).
  3. Double-click on the “String Value”, in the “Value data” field add the path of the executable program that has to execute at startup.
  4. Reboot the computer to see the changes in effect.
Works on Windows XP, Vista and 7.

7. Add “Pin to Start Menu” Option for Folders in Windows 7 and Vista:

Ever wanted to pin a folder to the start menu to gain faster access to it? Well, it is possible to add the “Pin to Start Menu” option so that you can plug your favorite folders to Start Menu. Here is a step-by-step procedure:
  1. Open the Registry Editor and navigate to:
    HKEY_CLASSES_ROOT\Folder\shellex\ContextMenuHandlers
  2. Right-click on “ContextMenuHandlers” and select New -> Key. Name the key as follows:
    {a2a9545d-a0c2-42b4-9708-a0b2badd77c8}
  3. Now, whenever you want to add a folder to Start Menu, hold down the Shiftkey and right-click on the folder. You should see the “Pin to Start Menu” option in the context menu”.

8. Disable “Aero Shake” in Windows 7:

One of the new additions to Windows 7 is the “Aero Shake” feature using which it is possible to grab a window using it’s title bar and shake it. This will minimize all the other open windows if any. It is really a handy feature! However, if you ever wanted to disable this feature, here is a solution:
  1. Open the Registry Editor and navigate to the following key:
    HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows
  2. Now, right-click on “Windows” key and create a new Key called Explorer.
  3. Right-click on the “Explorer” key and create a new “DWORD” calledNoWindowMinimizingShortcuts and set it’s value to 1.
  4. Close the Registry Editor and reboot the computer to see the changes in effect.
Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

How to Create Your Own Customized Run Commands


Create Customized Run commandsThe Run command on Microsoft Windows operating system allows you to directly open an application or document with just a single command instead of navigating to it’s location and double-clicking the executable icon. However, it only works for some of the inbuilt Windows programs such asCommand prompt (cmd), Calculator (calc) etc.
So, have you ever wondered how to create your own customized Run commands for accessing your favorite programs, files and folders? Well, read on to find out the answer.

Creating the Customized Run Command:

Let me take up an example of how to create a customized run command for opening the Internet explorer. Once you create this command, you should be able to open the Internet explorer just by typing ie in the Run dialog box. Here is how you can do that.
  1. Right-click on your Desktop and select New -> Shortcut.
  2. You will see a “Create Shortcut” Dialog box as shown below
    Create customized Run command
  3. Click on “Browse”, navigate to: Program Files -> Internet Explorer from your Root drive (usually C:\) and select “iexplore” as shown in the above figure and click on “OK”.
  4. Now click on “Next” and type any name for your shortcut. You can choose any name as per your choice; this will be your customized “Run command”. In this case I name my shortcut as “ie“. Click on “Finish”.
  5. You will see a shortcut named ie on your desktop. All you need to do is just copy this shortcut and paste it in your Windows folder (usually “C:/Windows”). Once you have copied the shortcut onto your Windows folder, you can delete the one on your Desktop.
  6. That’s it! From now on, just open the Run dialog box, type ie and hit Enter to open the Internet Explorer.
In this way you can create customized Run commands for any program of your choice. Say ff for Firefox, ym for Yahoo messenger, wmp for Windows media player and so on.
To do this, when you click on “Browse” in the Step-3, just select the target program’s main executable (.exe) file which will usually be located in the C:\Program Files folder. Give a simple and short name for this shortcut as per your choice and copy the shortcut file onto the Windows folder as usual. Now just type this short name in the Run dialog box to open the program.

ENJOY>>>>>

Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

Friday, July 5, 2013

WINDOWS 7 COMMANDS FOR ADMINISTRATOR.


1: System File Checker
Malicious software will often attempt to replace core system files with modified versions in an effort to take control of the system. The System File Checker can be used to verify the integrity of the Windows system files. If any of the files are found to be missing or corrupt, they will be replaced. You can run the System File Checker by using this command:

sfc /scannow

2: File Signature Verification
One way to verify the integrity of a system is to make sure that all the system files are digitally signed. You can accomplish this with the File Signature Verification tool. This tool is launched from the command line but uses a GUI interface. It will tell you which system files are signed and which aren’t. As a rule, all the system files should be digitally signed, although some hardware vendors don’t sign driver files. The command used to launch the File Signature Verification tool is:

sigverif

3: Driverquery

Incorrect device drivers can lead to any number of system problems. If you want to see which drivers are installed on a Windows 7 system, you can do so by running the driverquery tool. This simple command-line tool provides information about each driver that is being used. The command is:

driverquery

If you need a bit more information, you can append the -v switch. Another option is to append the -si switch, which causes the tool to display signature information for the drivers. Here’s how they look:

driverquery -v

driverquery -si

4: Nslookup

The nslookup tool can help you to verify that DNS name resolution is working correctly. When you run nslookup against a host name, the tool will show you how the name was resolved, as well as which DNS server was used during the lookup. This tool can be extremely helpful when troubleshooting problems related to legacy DNS records that still exist but that are no longer correct.

To use this tool, just enter the nslookup command, followed by the name of the host you want to resolve. For example:

nslookup dc1.contoso.com

5: Ping

Ping is probably the simplest of all diagnostic commands. It’s used to verify basic TCP/IP connectivity to a network host. To use it, simply enter the command, followed by the name or IP address of the host you want to test. For example:

ping 192.168.1.1

Keep in mind that this command will work only if Internet Control Message Protocol (ICMP) traffic is allowed to pass between the two machines. If at any point a firewall is blocking ICMP traffic, the ping will fail.

6: Pathping

Ping does a good job of telling you whether two machines can communicate with one another over TCP/IP, but if a ping does fail, you won’t receive any information regarding the nature of the failure. This is where the pathping utility comes in.

Pathping is designed for environments in which one or more routers exist between hosts. It sends a series of packets to each router that’s in the path to the destination host in an effort to determine whether the router is performing slowly or dropping packets. At its simplest, the syntax for pathping is identical to that of the ping command (although there are some optional switches you can use). The command looks like this:

pathping 192.168.1.1

7: Ipconfig

The ipconfig command is used to view or modify a computer’s IP addresses. For example, if you wanted to view a Windows 7 system’s full IP configuration, you could use the following command:

ipconfig /all

Assuming that the system has acquired its IP address from a DHCP server, you can use the ipconfig command to release and then renew the IP address. Doing so involves using the following commands:

ipconfig /release

ipconfig /renew

Another handy thing you can do with ipconfig is flush the DNS resolver cache. This can be helpful when a system is resolving DNS addresses incorrectly. You can flush the DNS cache by using this command:

ipconfig /flushdns

8: Repair-bde

If a drive that is encrypted with BitLocker has problems, you can sometimes recover the data using a utility called repair-bde. To use this command, you will need a destination drive to which the recovered data can be written, as well as your BitLocker recovery key or recovery password. The basic syntax for this command is:

repair-bde -rk | rp 
You must specify the source drive, the destination drive, and either the rk (recovery key) or the rp (recovery password) switch, along with the path to the recovery key or the recovery password. Here are two examples of how to use this utility:

repair-bde c: d: -rk e:\recovery.bek

repair-bde c: d: -rp 111111-111111-111111-111111-111111-111111


9: Tasklist

The tasklist command is designed to provide information about the tasks that are running on aWindows 7 system. At its most basic, you can enter the following command:

tasklist
The tasklist command has numerous optional switches, but there are a couple I want to mention. One is the -m switch, which causes tasklist to display all the DLL modules associated with a task. The other is the -svc switch, which lists the services that support each task. Here’s how they look:

tasklist -m

tasklist -svc

10: Taskkill

The taskkill command terminates a task, either by name (which is referred to as the image name) or by process ID. The syntax for this command is simple. You must follow the taskkill command with -pid (process ID) or -im (image name) and the name or process ID of the task that you want to terminate. Here are two examples of how this command works:

taskkill -pid 4104

taskkill -im iexplore.exe


ENJOY..........

Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

Sunday, June 23, 2013

RECOVER WINDOWS ACCOUNT PASSWORD..




Many users are forget ,,whats the passwor of our window......

Don't worry ....today  i will show you how to recover your windows(xp,vista, 7) password 

follow steps- 

1- firstly open COMMAND PROMPT (CMD)
2- now type NET USER
( now it shows you all user accounts.. select one which you want to recover)
3- now type NET USER (user account) {new password)

*- USER ACCOUNT  = name of victim account..
*- NEW PASSWORD =  your new password which u want to choose,,on your mind.
.

4- now press ENTER,, and its shows a message (SUCESSFULLY CHANGED YOUR PASSWORD)
5- now type EXIT..n close your command prompt..


ENJOY.........

Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

Saturday, June 22, 2013

‎LOG OUT YOUR FACEBOOK ACCOUNT FROM OTHER COMPUTER


Sometimes, we go to Cyber cafe , institute, or any other places just to open our facebook account but we forget to log out our facebook ID..and now you worry to misused your id by any othr person..SIMPLE...

No need to worry ,,,

I give you a way to log it out from any
other computer ..



Follow my steps..

1- log in your account (from anywhere)2- go to Account Settings (located in the right side of Home)3- Choose "Security" (You will see the below photo)4- Go to Active Sessions (All of your Log-ins are listed their everywhere..)5- Click End Activity and You will be Logged Out.


ENJOY.......

Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

Thursday, June 20, 2013

Turbo C++ for Windows 7 (64 bit )





Hi all users, many user reported us (man of students and programmers)  that Turbo C++ doesn’t supports Windows 7 OS. Later on they told that they tried many C++ compilers and gets disappointed to know, and finally came here for the ultimate solution.

Just install it as a simple software and then run normally.It will start in full screen mode.Its fully tested and 100% working!

 How To Install Turbo C++?


1. First of all download the file and extract it using any Windows file compression software, for eg., 7zip,WinRar etc.

2. Run the setup file and go through the installation process step by step, after installation finishes,click on   button and Run Turbo C++ from Start >All Programs.

3. Now it will Run in full screen Mode without making any problem :)

Tip : Press Alt+Enter to toggle between full and half screen.

DOWNLOAD HERE--

                                             ENJOY...

Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

Wednesday, June 19, 2013

How to trace Exact Location of Mobile Phone


         Trace Exact Location of Mobile Phone

 
REQUIREMENTS:

Any cell phone that supports Google maps. eg. iPhone , Nokia , Blackberry , Symbian etc.
Google Latitude. Which you can download by going to google.com/latitude from your cell phone.


STEPS:-
Go to www.google.com/latitude from your cell phone.
Download the free app.
Open the App.
Enter You mobile number in the entry Field.
Now You've set it up on your phone. Now you gotta set it up on your friends cell phone. 

HOW TO USE IT EVEN WHEN YOU DON'T HAVE YOUR CELL PHONE WITH YOU:


Well the most eye catching feature of google latitude is that you can use it online even without a cell phone. Just go to google.com/latitude from you PC, Follow the instructions, log-in into your account. And track You friends Locations !!

ENJOY......

Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

Enable Windows 7 Hidden Themes




Steps to Unlock & Unhide Windows 7 hidden locked Themes. 

1. Unhide the Windows 7 System and Protected Operating System files fromWindows explorer -> Organize -> Folder and Search Options -> view tab

2. Navigate to C:\Windows\Globalization\MCT.

3. Open a MCT-(AU, CA, GB, US, or ZA) folder for the regional theme that you want.
NOTE: AU, CA and ZA regions all have the same themes though.

4. Open the Theme folder in the selected region folder.

5. Select the .theme file to use it.
NOTE: Once you select a .theme file, Windows 7 will save it so that you will be able to change or select this theme again from within the normal Personalization window location.

6. Hide the Windows 7 System and Protected Operating System files.

7. Enjoy your new regional themes!!

Method 2: Using windows 7 Search (Simplest Method)

1. Go to \Windows\winsxs Directory

2. Search for *.theme.


3. Double click themes with name in the format of XX to apply and save the theme.


ENJOY...............

Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

AIRTEL FREE MISS CALL ALERT



                              AIRTEL FREE MISS CALL ALERT

Hello To All friends today i am posting new airtel latest working tricks .

Free Miss Calls Alert For Airtel 

Just You Dial 
*321*885# 
Or *321*884# 
Or*321*882#
OR *321*881# 
Or *321*880#

It's Tricks all over india.

ENJOY......

Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

Tuesday, June 18, 2013

Trick to Hack Facebook Chat History


          Trick to Hack Facebook Chat History


There is a simpe easy Trick to Hack Facebook Chat History. We can Hack Chat History even if our Friends are Offline. To use this Trick follow the simple steps given below : 

 1) Open Friends profile. 

2) Right Click on the Poke and Select Copy Link Location. Now we have the ID in our Clipboard 

3) This will exactly look like : http://www.facebook.com/profile.php?id=XYZ ( where XYX can be any numbers and this XYZ is nothing but the ID ). 

4) Now in the Address Bar type "javascript:Chat.openTab(XYZ)" (without qoutes) and press Enter.

5) Now it is done. 

6) You can see full Chat history............


HACKING WITH  SHIVAM..


Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

Saturday, June 15, 2013

HOW TO HACK FACEBOOK PASSWORD USING PHISHING METHOD


                       FACEBOOK  PHISING



Phishing is the most widely used hacking method for hacking Facebook passwords. The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites like Facebook,Yahoo , Gmail, MySpace etc.

Here is a tutorial about phishing.>> 

Step 1) 
First you must sign for a free webhosting service like www.byethost.com or www.t35.com  or www.000webhost.com  And register your subdomain.
after signing you will have a subdomain like www.yourname.byethost.com

Step 2) 
Now login to your account go to "control panel" then in site management option go to "online file manager" and open the folder "htdocs".

Step 3) 
Now Click Here to DOWNLOAD THIS FILE to your computer add extract the file. Inside the folder you will find three files index.php and hello.php and login_again.htm.

Step 4) 
Now replace the index.php file in the "htdocs" of the "online file manager" with the file index.php of the phisher folder in your computer and also upload hello.php and login_again.htm files in "htdocs" thats it! you are done.

Step 5) 
Now your homepage www.yourname.byethost.com has become a phisher. open it, you will see that your page www.yourname.byethost.com has become the login page of the site you want to hack.now all you have to do is send this link to the person whose account you want to hack.when he tries to login through it you will receive a file password.html in your "htdocs" folder of your phpnet.us account which contains the username and password of your victim.

Step 6)
Go to http://www.yourname.byethost.com/lol.htm for see the stored passwords !

Personal Note:- THIS POST IS ONLY ONLY FOR EDUCATIONAL PURPOSE>> NO ANY MISUSE FOR THIS TRICK ....

ENJOY WITH SHIVAM HACKING>>>>

Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

Friday, June 14, 2013

HOW TO SECURE COMPUTER SYSTEM...



               HOW TO SECURE COMPUTER SYSTEM...

   
Below are some key steps to protecting your computer from intrusion:

Keep Your Firewall Turned On: A firewall helps protect your computer from hackers who might try to gain access to crash it, delete information, or even steal passwords or other sensitive information. Software firewalls are widely recommended for single computers. The software is prepackaged on some operating systems or can be purchased for individual computers. For multiple networked computers, hardware routers typically provide firewall protection.

Install or Update Your Antivirus Software: Antivirus software is designed to prevent malicious software programs from embedding on your computer. If it detects malicious code, like a virus or a worm, it works to disarm or remove it. Viruses can infect computers without users' knowledge. Most types of antivirus software can be set up to update automatically.

Install or Update Your Anti spyware Technology: Spyware is just what it sounds like—software that is surreptitiously installed on your computer to let others peer into your activities on the computer. Some spyware collects information about you without your consent or produces unwanted pop-up ads on your web browser. Some operating systems offer free spyware protection, and inexpensive software is readily available for download on the Internet or at your local computer store. Be wary of ads on the Internet offering downloadable antispyware—in some cases these products may be fake and may actually contain spyware or other malicious code. It's like buying groceries—shop where you trust.

Keep Your Operating System Up to Date: Computer operating systems are periodically updated to stay in tune with technology requirements and to fix security holes. Be sure to install the updates to ensure your computer has the latest protection.

Be Careful What You Download: Carelessly downloading e-mail attachments can circumvent even the most vigilant anti-virus software. Never open an e-mail attachment from someone you don't know, and be wary of forwarded attachments from people you do know. They may have unwittingly advanced malicious code.

Turn Off Your Computer: With the growth of high-speed Internet connections, many opt to leave theircomputers on and ready for action. The downside is that being "always on" renders computers more susceptible. Beyond firewall protection, which is designed to fend off unwanted attacks, turning thecomputer off effectively severs an attacker's connection—be it spyware or a botnet that employs yourcomputer's resources to reach out to other unwitting users


ENJOY............

Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.