Sunday, June 23, 2013

RECOVER WINDOWS ACCOUNT PASSWORD..




Many users are forget ,,whats the passwor of our window......

Don't worry ....today  i will show you how to recover your windows(xp,vista, 7) password 

follow steps- 

1- firstly open COMMAND PROMPT (CMD)
2- now type NET USER
( now it shows you all user accounts.. select one which you want to recover)
3- now type NET USER (user account) {new password)

*- USER ACCOUNT  = name of victim account..
*- NEW PASSWORD =  your new password which u want to choose,,on your mind.
.

4- now press ENTER,, and its shows a message (SUCESSFULLY CHANGED YOUR PASSWORD)
5- now type EXIT..n close your command prompt..


ENJOY.........

Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

Saturday, June 22, 2013

‎LOG OUT YOUR FACEBOOK ACCOUNT FROM OTHER COMPUTER


Sometimes, we go to Cyber cafe , institute, or any other places just to open our facebook account but we forget to log out our facebook ID..and now you worry to misused your id by any othr person..SIMPLE...

No need to worry ,,,

I give you a way to log it out from any
other computer ..



Follow my steps..

1- log in your account (from anywhere)2- go to Account Settings (located in the right side of Home)3- Choose "Security" (You will see the below photo)4- Go to Active Sessions (All of your Log-ins are listed their everywhere..)5- Click End Activity and You will be Logged Out.


ENJOY.......

Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

Thursday, June 20, 2013

Turbo C++ for Windows 7 (64 bit )





Hi all users, many user reported us (man of students and programmers)  that Turbo C++ doesn’t supports Windows 7 OS. Later on they told that they tried many C++ compilers and gets disappointed to know, and finally came here for the ultimate solution.

Just install it as a simple software and then run normally.It will start in full screen mode.Its fully tested and 100% working!

 How To Install Turbo C++?


1. First of all download the file and extract it using any Windows file compression software, for eg., 7zip,WinRar etc.

2. Run the setup file and go through the installation process step by step, after installation finishes,click on   button and Run Turbo C++ from Start >All Programs.

3. Now it will Run in full screen Mode without making any problem :)

Tip : Press Alt+Enter to toggle between full and half screen.

DOWNLOAD HERE--

                                             ENJOY...

Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

Wednesday, June 19, 2013

How to trace Exact Location of Mobile Phone


         Trace Exact Location of Mobile Phone

 
REQUIREMENTS:

Any cell phone that supports Google maps. eg. iPhone , Nokia , Blackberry , Symbian etc.
Google Latitude. Which you can download by going to google.com/latitude from your cell phone.


STEPS:-
Go to www.google.com/latitude from your cell phone.
Download the free app.
Open the App.
Enter You mobile number in the entry Field.
Now You've set it up on your phone. Now you gotta set it up on your friends cell phone. 

HOW TO USE IT EVEN WHEN YOU DON'T HAVE YOUR CELL PHONE WITH YOU:


Well the most eye catching feature of google latitude is that you can use it online even without a cell phone. Just go to google.com/latitude from you PC, Follow the instructions, log-in into your account. And track You friends Locations !!

ENJOY......

Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

Enable Windows 7 Hidden Themes




Steps to Unlock & Unhide Windows 7 hidden locked Themes. 

1. Unhide the Windows 7 System and Protected Operating System files fromWindows explorer -> Organize -> Folder and Search Options -> view tab

2. Navigate to C:\Windows\Globalization\MCT.

3. Open a MCT-(AU, CA, GB, US, or ZA) folder for the regional theme that you want.
NOTE: AU, CA and ZA regions all have the same themes though.

4. Open the Theme folder in the selected region folder.

5. Select the .theme file to use it.
NOTE: Once you select a .theme file, Windows 7 will save it so that you will be able to change or select this theme again from within the normal Personalization window location.

6. Hide the Windows 7 System and Protected Operating System files.

7. Enjoy your new regional themes!!

Method 2: Using windows 7 Search (Simplest Method)

1. Go to \Windows\winsxs Directory

2. Search for *.theme.


3. Double click themes with name in the format of XX to apply and save the theme.


ENJOY...............

Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

AIRTEL FREE MISS CALL ALERT



                              AIRTEL FREE MISS CALL ALERT

Hello To All friends today i am posting new airtel latest working tricks .

Free Miss Calls Alert For Airtel 

Just You Dial 
*321*885# 
Or *321*884# 
Or*321*882#
OR *321*881# 
Or *321*880#

It's Tricks all over india.

ENJOY......

Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

Tuesday, June 18, 2013

Trick to Hack Facebook Chat History


          Trick to Hack Facebook Chat History


There is a simpe easy Trick to Hack Facebook Chat History. We can Hack Chat History even if our Friends are Offline. To use this Trick follow the simple steps given below : 

 1) Open Friends profile. 

2) Right Click on the Poke and Select Copy Link Location. Now we have the ID in our Clipboard 

3) This will exactly look like : http://www.facebook.com/profile.php?id=XYZ ( where XYX can be any numbers and this XYZ is nothing but the ID ). 

4) Now in the Address Bar type "javascript:Chat.openTab(XYZ)" (without qoutes) and press Enter.

5) Now it is done. 

6) You can see full Chat history............


HACKING WITH  SHIVAM..


Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

Saturday, June 15, 2013

HOW TO HACK FACEBOOK PASSWORD USING PHISHING METHOD


                       FACEBOOK  PHISING



Phishing is the most widely used hacking method for hacking Facebook passwords. The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites like Facebook,Yahoo , Gmail, MySpace etc.

Here is a tutorial about phishing.>> 

Step 1) 
First you must sign for a free webhosting service like www.byethost.com or www.t35.com  or www.000webhost.com  And register your subdomain.
after signing you will have a subdomain like www.yourname.byethost.com

Step 2) 
Now login to your account go to "control panel" then in site management option go to "online file manager" and open the folder "htdocs".

Step 3) 
Now Click Here to DOWNLOAD THIS FILE to your computer add extract the file. Inside the folder you will find three files index.php and hello.php and login_again.htm.

Step 4) 
Now replace the index.php file in the "htdocs" of the "online file manager" with the file index.php of the phisher folder in your computer and also upload hello.php and login_again.htm files in "htdocs" thats it! you are done.

Step 5) 
Now your homepage www.yourname.byethost.com has become a phisher. open it, you will see that your page www.yourname.byethost.com has become the login page of the site you want to hack.now all you have to do is send this link to the person whose account you want to hack.when he tries to login through it you will receive a file password.html in your "htdocs" folder of your phpnet.us account which contains the username and password of your victim.

Step 6)
Go to http://www.yourname.byethost.com/lol.htm for see the stored passwords !

Personal Note:- THIS POST IS ONLY ONLY FOR EDUCATIONAL PURPOSE>> NO ANY MISUSE FOR THIS TRICK ....

ENJOY WITH SHIVAM HACKING>>>>

Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

Friday, June 14, 2013

HOW TO SECURE COMPUTER SYSTEM...



               HOW TO SECURE COMPUTER SYSTEM...

   
Below are some key steps to protecting your computer from intrusion:

Keep Your Firewall Turned On: A firewall helps protect your computer from hackers who might try to gain access to crash it, delete information, or even steal passwords or other sensitive information. Software firewalls are widely recommended for single computers. The software is prepackaged on some operating systems or can be purchased for individual computers. For multiple networked computers, hardware routers typically provide firewall protection.

Install or Update Your Antivirus Software: Antivirus software is designed to prevent malicious software programs from embedding on your computer. If it detects malicious code, like a virus or a worm, it works to disarm or remove it. Viruses can infect computers without users' knowledge. Most types of antivirus software can be set up to update automatically.

Install or Update Your Anti spyware Technology: Spyware is just what it sounds like—software that is surreptitiously installed on your computer to let others peer into your activities on the computer. Some spyware collects information about you without your consent or produces unwanted pop-up ads on your web browser. Some operating systems offer free spyware protection, and inexpensive software is readily available for download on the Internet or at your local computer store. Be wary of ads on the Internet offering downloadable antispyware—in some cases these products may be fake and may actually contain spyware or other malicious code. It's like buying groceries—shop where you trust.

Keep Your Operating System Up to Date: Computer operating systems are periodically updated to stay in tune with technology requirements and to fix security holes. Be sure to install the updates to ensure your computer has the latest protection.

Be Careful What You Download: Carelessly downloading e-mail attachments can circumvent even the most vigilant anti-virus software. Never open an e-mail attachment from someone you don't know, and be wary of forwarded attachments from people you do know. They may have unwittingly advanced malicious code.

Turn Off Your Computer: With the growth of high-speed Internet connections, many opt to leave theircomputers on and ready for action. The downside is that being "always on" renders computers more susceptible. Beyond firewall protection, which is designed to fend off unwanted attacks, turning thecomputer off effectively severs an attacker's connection—be it spyware or a botnet that employs yourcomputer's resources to reach out to other unwitting users


ENJOY............

Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

KEYLOGGERS.


                       KEYLOGGERS INFORMATION



The term ‘keylogger’ itself is neutral, and the word describes the program’s function. Most sources define a keylogger as a software program designed to secretly monitor and log all keystrokes. This definition is not altogether correct, since a keylogger doesn’t have to be software – it can also be a device. Keylogging devices are much rarer than keylogging software, but it is important to keep their existence in mind when thinking about information security. Legitimate programs may have a keylogging function which can be used to call certain program functions using “hotkeys,” or to toggle between keyboard layouts (e.g. Keyboard Ninja). There is a lot of legitimate software which is designed to allow administrators to track what employees do throughout the day, or to allow users to track the activity of third parties on their computers. However, the ethical boundary between justified monitoring and espionage is a fine line. Legitimate software is often used deliberately to steal confidential user information such as passwords. Most modern keyloggers are considered to be legitimate software or hardware and are sold on the open market. Developers and vendors offer a long list of cases in which it would be legal and appropriate to use keyloggers, including: Parental control: parents can track what their children do on the Internet, and can opt to be notified if there are any attempts to access websites containing adult or otherwise inappropriate content; Jealous spouses or partners can use a keylogger to track the actions of their better half on the Internet if they suspect them of “virtual cheating”; Company security: tracking the use of computers for non-work-related purposes, or the use of workstations after hours; Company security: using keyloggers to track the input of key words and phrases associated with commercial information which could damage the company (materially or otherwise) if disclosed; Other security (e.g. law enforcement): using keylogger records to analyze and track incidents linked to the use of personal computers; Other reasons. However, the justifications listed above are more subjective than objective; the situations can all be resolved using other methods. Additionally, any legitimate keylogging program can still be used with malicious or criminal intent. Today, keyloggers are mainly used to steal user data relating to various online payment systems, and virus writers are constantly writing new keylogger Trojans for this very purpose. Furthermore, many keyloggers hide themselves in the system (i.e. they have rootkit functionality), which makes them fully-fledged Trojan programs. As such programs are extensively used by cyber criminals, detecting them is a priority for antivirus companies. Kaspersky Lab’s malware classification system has a dedicated category for malicious programs with keylogging functionality: Trojan-Spy. Trojan-Spy programs, as the name suggests, track user activity, save the information to the user’s hard disk and then forward it to the author or ‘master’ of the Trojan. The information collected includes keystrokes and screen-shots, used in the theft of banking data to support online fraud.


ENJOY................
Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

Make ur Windows Xp Genuine


       Make ur Windows Xp Genuine : All Hacks here



This activates ur "Windows Xp Home" if not activated and completely validates it..[ITS ILLEGAL[

When you Install Windows Xp Home Edition it asks "60 days lest for the activation" please Activate it Now .. This Hack will take your Way out like a piece of Cake.


**This is ment for educational purpose only.


To Download this Crack right click on the link below and Open it in a new Window.




2) Converts Ur Xp a Valid one By Exploiting A small Loophole !!


Download No. 2 Crack here


3) Most awaited Vista Cracks Combined with Xp one !!

4) Most Favourite Xp Crack!!




5) Xp Crack with Keygen !!

6) Some Miscellaneous Crack !!







or u may try dis


these are instructions on how to crack the latest version of Windows XP with Service Pack 2 that uses the registration key: JD3T2-QH36R-X7W2W-7R3XT-DVRPQ.
**** IT WILL WORK WITH OTHER VERSIONS OF WINDOWS XP but not all! ****

This will allow you to bypass the Microsoft Genuine Validation thingy


this method works better than many others i've tried before. forget the cracks and injectors etc... this is the BEST WAY:

1) start > run > "regedit" (without the quotes of course)

2) go to the key:

HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\Windows NT\CurrentVersion\WPAEvents\OOBETimer

...and doubleclick on it. Then change some of the value data to ANYTHING ELSE...delete some, add some letters, I don't care...just change it!

now close out regedit.

3) go to start > run > "%systemroot%\system32\oobe\msoobe.exe /a" (again, dont type the quotes)

4) the activation screen will come up, click on register over telephone, then click on CHANGE PRODUCT KEY, enter in this key: JG28K-H9Q7X-BH6W4-3PDCQ-6XBFJ.




Now you can dl all the updates without activating, and the Genuine Microsoft Validation thingy won't bug you no more!!



***Notes, this works best after a reformmat***




this method works better than many others i've tried before. forget the cracks and injectors etc... this is the BEST WAY:

1) start > run > "regedit" (without the quotes of course)

2) go to the key:

HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\Windows NT\CurrentVersion\WPAEvents\OOBETimer

...and doubleclick on it. Then change some of the value data to ANYTHING ELSE...delete some, add some letters, I don't care...just change it!

now close out regedit.

3) go to start > run > "%systemroot%\system32\oobe\msoobe.exe /a" (again, dont type the quotes)

4) the activation screen will come up, click on register over telephone, then click on CHANGE PRODUCT KEY, enter in this key: JG28K-H9Q7X-BH6W4-3PDCQ-6XBFJ.

Please Put More Links If u Know Them.
Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

Hack Admin Password From User Mode


Hack Admin Password From User Mode

Disclaimer: Use this article for eductational purpose ONLY.



Follow these steps:

1. Open command prompt (Start->Run->cmd),
2. Enter the following command, then press ENTER
3. Enter the followin command, then press ENTER:
compmgmt.msc
This should open the computer management console.
4. Go to local users & groups->users. Right click on any user and select "set password".
If you get a "access denied" do the following:

start>run>cmd
then use following commands
1) net user test /add (this command will make test named user)
2) net localgroup administrators test /add (this command will make test user as administrators rights)

and use net user command to reset your admin. password



Alternative
What if u don't know the password of your admin and still want to hack and change .. yea u can do it ..in a very easy manner.. check this. just follow the steps.. this doesn't require u to know the admin password but still u can change it..
Start >> Run >> [type]cmd // this will open your command prompt
[type] net(space)user(press enter)
[type] net(space)user(space)[windowsloginid](sp ace)*(press enter)

// for e.g. : net user HOME *(press enter)

[type] new password (press enter) and retype it (press enter).. it will show u confirmation... // caution it wont show u the password u type.. but it still types.. the blinking pointer will b there at the same place.. but it still works..
// for e.g. : password changed successfully

ENJOY.....

DON't FORGET TO LIKE ...

Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

Wednesday, June 12, 2013

HOW TO TRACE ANY EMAIL


                                HOW TO TRACE ANY EMAIL




So here is the method of tracing the exact location from the email sent.I am showing the email tracing on yahoo here but gmail and other mail providing services have same concept.

Step 1:-First open up your email account and click on your inbox.

Step 2:-Now Select any email that you want to trace

Step 3:-After Opening scrool the mail at the end and in right corner you will see a option FULL HEADER click on it



Step 4:- Now Closely Look at the the header you will find the whole detail that from which IP address it is sent.


ENJOY........

Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

5 Ways To Avoid Being Hacked


5 Ways To Avoid Being Hacked

Hacking. We often think of it happening to companies or governments. But it also happens to ordinary people. But we can take steps to stop it.


Step 1: Tough passwords



You need to have a separate password for each account, so that if one account gets hacked, all of your vital information is not vulnerable. The problem is that it's tough to remember dozens of passwords. The answer: a password manager. There are a variety of third-party software programs that will create and store passwords for you.


Step 2: Two-Part Authentication

When you log on to many different computers — especially shared computers — to access your email account, you are especially vulnerable to hackers.
Many websites are moving toward two-step verification. Google is one. Essentially, it means that you need more than a password to log into a new account. If you use the service, you have to remember a password but also remember a special key that gets sent to you as a text.


Step 3: Change Your Behavior



"I hate to say it, but the reality is they need to share a little bit less," says Ulanoff.
Ulanoff says we probably don't want to go back to the pre-social media days, but oversharing may not be just embarrassing, it may cause harm. Things like birth dates and graduation years can be used to access your information. That doesn't mean you need to shut down your online presence, but be careful what details you put out there.


Step 4: Consolidation



Remember Friendster? Or MySpace? Whitson Gordon, senior editor of Lifehacker.com, says that back in the early days of the Internet, it would have been hard to imagine "10, 20 years down the road when we would have so many services we're grappling with."
So sit down and think about the last 10 years of your online life. And then delete the accounts for the services you signed up for and no longer use.


Step 5: Back It Up



"If there's one thing I have to hammer home with everybody, it's back up your data," Gordon says. You can either use an external hard drive or an online service. As more of the things we care about get stored electronically, the more vulnerable they are to get lost. If your smartphone gets stolen with wedding photos on it, there won't be as much heartbreak.

ENJOY................

Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

Top 10 ways to track your stolen phone


 Top 10 ways to track your stolen phone through its IMEI number and apps


The mobile theft in India has been on a rise and given the fact that more and more swanky phones are arriving in the market, these numbers are only bound to increase. Over the past few days we have had several of our readers ask us about ways in which they can track their stolen or lost phones.

First of the bat always remember to write your IMEI number ( more details below) and download apps that help you track your phone via either sending you pictures of the pick-pocketer or tracking your phone's GPS. It is also important to have a remote wiping facility so that your personal details don't fall into the wrong hands.

Know Your Mobile India bring you the best apps that increase your chances at finding your lost or stolen phone or tablet.

1. IMEI


Every smartphone has a unique IMEI number assigned to it and you can access it by dialing *#06#. Once your phone's 15-digit IMEI number is displayed, write it down and keep it safe for future reference. You can also retrieve the IMEI number by removing the battery. It is usually listed on a white sticker along with the phone's serial number.

When you lose your handset, you will need to launch a FIR with the police, attaching a copy of the IMEI number with it. Then give a copy of this to your service provider who can track the phone based on its unique ID number and meanwhile block the handset so that it cannot be used by anyone else. IMEI number helps to tracks the handset, even when the SIM is changed or the SIM card is not activated. Once the phone is traced, the police should be able to retrieve it.

2. Avast! mobile security


This free invisible security app brings twin security measures for your handset by providing - a mobile antivirus and mobile tracking/controls solution. What is great about the app is that its anti-theft component is invisible to thieves, and provides remote options (via web portal or SMS commands) for locating and recovering your phone. Time to say goodbye to 'lost' phones.

Download Avast! Free Mobile Security

3. Mobile chase-location tracker


This is another handy app to track your stolen or lost phone. This app checks when the pick-pocketer changes the SIM card and sends a a SMS in 5 minutes from the new SIM number to your number, which has been stored in the application. The SIM contains GPS location data or current location code to aid in trace.

Download Mobile Chase-Location Tracker

4. Thief tracker


This one is our favorite. With Thief tracker app, you get to catch the 'thief' red handed. Any unsuccessful attempt to unlock your mobile will trigger this app to snap a picture from front camera and send you an email without the user even knowing it. However the app has some limitations - like it does not wipe data and an unsuccessful attempt is considered only when 4 dots in the pattern are selected.

Download Thief Tracker

5. Smart look


This software also clicks the pictures of the 'thief' - in fact three of them and, immediately e-mails it to you. It also comes equipped with a GPS continuous tracking system which is linked to the google map and also assists in tracing your lost or stolen phone.

6. Anti- theft alaram


You will love this app. Simply activate the alarm and leave your phone on the table or wherever and if someone moves your phone an alarm will sound. The alarm will only stop after entering a PIN. Those with sticky fingers, beware!

Download Anti-theft Alarm

7. Kaspersky mobile security


Another popular app that provides anti-theft defense, allowing you to block, wipe or find your missing phone. You can also easily filter unwanted SMS texts and calls. Plus, Anti-Virus Lite with cloud-based security scanner alerts you to potentially malicious apps before they can harm your phone.

Download Kaspersky mobile security

8. Lookout security and antivirus


This free app houses a slew of features to protect and trace your phone. After downloading the app, you will be able to find your phone on a Google Map instantly from Lookout.com, sound a loud alarm or make your phone SCREAM to find it even if it’s on silent and automatically see your phone's last known location. That's not all, in addition this app provides remotely lock and date wipe out facility. It also offers a lookout premium coverage for a small monthly fee for more stringent security.

Download Lookout security and antivirus

9. Trend Micro mobile security & antivirus


Ranked as one of the top selling security app, Trend Micro mobile provides free antivirus with a premium version which includes privacy scanning, web and contact filtering, parental controls and anti-theft features. You can avail a 30 day free trial to test various features like:
--Privacy scanner warns you of apps that potentially steal your information
--Surf, Call, Text Security keeps you and your kids safe by avoiding unwanted contact and content
--Lost Device Protection includes anti-theft features that let you find, lock and wipe a missing device.

Download Trend Micro mobile security & antivirus

10. Plan B, Lookout mobile security


Well if plan A doesn't work, you don't need to fear, there is always Plan B. This 'find my phone' app is the only app that you can download even after you have lost your phone. Using 'Plan B' requires access to the Android Market website and your Google account. After you install it, Plan B will start locating your phone using cell towers and GPS. On some phones, Plan B can switch GPS on automatically. Your location will keep updating for 10 minutes, and you will get an email each time it is located, whether the phone is moving or standing still. Information is also sent via SMS.

ENJOY.........

Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

TURN ON UR PC IN JUST 10 SECONDS



                          TURN ON UR PC IN JUST 10 SECONDS

 
Alright so u wanna know how to turn the pc on in 10 seconds .Here's what u have to do to turn ur pc on in 10 seconds

Click on the start button then press R it will take u to Run well go to run
& type Regedit




press enter
this will open Registery Editor
now look for the key

HKEY_LOACAL_MECHINE\SYSTEM\CurrentControlSet\Control\
ContentIndex

now there find the Key Called
"Startup Delay"
Double Click On It
Now where its Base
Click Decimal
Now its Default Value Is 4800000(75300:hexadecimal)
Change The Value To 40000
here u go u have done it
now close the Registery Editor and Restart Your Computer

You'll See The Result

ENJOY............

Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.

List of some good proxy sites


                 LIST OF SOME GOOD PROXY SITES...



This is the list of some good proxy site which you can use to surf anoymously on the internet . Even you can use this proxy sites to open block website in school or offices. For example you can use facebook if it is block at your school or office.




                                  Surf with Shivam..



Shivam Srivastava Web Developer

Morbi aliquam fringilla nisl. Pellentesque eleifend condimentum tellus, vel vulputate tortor malesuada sit amet. Aliquam vel vestibulum metus. Aenean ut mi aucto.