Pages

Monday, 21 October 2013

How to Make Internet Download Manager (IDM) for Life Time Use in Free of Cost?

5 comments

Internet Download Manager (IDM) is the best download manager that has ever made. No matter on which kind of protocol you are working on, you could use Internet download manager.



Few important features of Internet Download Manager:
•    All popular browsers and applications are supported!
•    Internet Download Manager can accelerate downloads by up to 5 times due

      to its intelligent dynamic file segmentation technology.
•    Easy downloading with one click.
•    You can limit your download speed.
•    You may simply drag and drop links to IDM, and drag and drop downloaded

      files out of Internet Download Manager.
•    IDM can add all downloads linked to the current page. It's easy to download

      multiple files with this feature.
•    You can stop the download at any time.
•    Resume Capability: Internet Download Manager will resume unfinished

      download from the place where they left off.
•    Helps you in downloading various videos, PDF files, music Files, software’s

      with a single click.


How to Make Internet Download Manager lifetime:

Introduction: This time I’m going to share a nice trick for making IDM life. The positive point of this trick is that while using other cracks or patches, often we face re-doing and re-entering a serial number every time when we restart our system, but by this simple trick, once you are done, you are done forever (Until you re-install a new copy of Windows again).

Here follows the simple steps and instructions: 

1. First, you should install latest version of IDM or any version depends on your
    wish. If you don’t have IDM then don’t worry Download it from Here.
 
2.  After downloading and installation, click on Exit in IDM and make sure that
    IDM is not running on your PC, for surety check system tray. If it’s still
    running then kill the process of IDM from Task Manager. 
 
3.   Now download small IDM Patch software from Here. No need to install this
    software. It’s portable so Run this Patch directly from Zip file. 
  Note: Don’t extract “patch.zip” file because your anti-virus can delete this
           software cause of its illegal.

 


 4. Now Click on Patch and navigate “IDMan.exe” file. Default directory is
     C:\Program Files (x86)\Internet Download Manager
                      
5. Now click on Open then it will ask you to enter your First name, so give any
    name which you want, for e.g. I’m giving Hackerz


6. Then click on OK and give your second name, I’m giving Den.
 

7. Click on Ok, Now you will see a message in Patch software
     Successfully Patched !
 
8. Now all done so, click on Exit in Patch software and start your full version of
    IDM with lifetime licensed to your name.
 


If you have any queries or suggestions related to this post on 'How to Make Internet Download Manager (IDM) for Life Time Use in Free of Cost?', you're most welcome in comments..! :)

Friday, 11 October 2013

How to Hack Your Broadband Connection?

71 comments
MANY PEOPLE ASKED ME ABOUT THE  HACKING BROADBAND!!!
There are many PC tricks to hack the other broadband connection but at this time I am giving all my reader new one PC trick. This one broadband hack method is 100% working. So give a try for this PC trick. To perform this broadband hack follows the following steps of this PC trick.

STEP 1: For this PC trick first of all you have to download any port Scanner. (for example: i prefer Super Scan,  Advance Port Scanner).

STEP 2:  Now you have to get your ip address for this broadband hack as given: Go to Command prompt type "ipconfig /all" without quotes Then hit enter. You will see your ip as a clients ip. suppose your broadband default gateway and I.P. are 172.27.103.1 & 172.27.103.190, see in below picture
    

STEP 3: Write your IP in IP scanner Software and scan for alive IPs in the below range start: 172.27.103.1 to End:172.27.103.255. see in picture below
   

STEP 4: Then check in your scanner which alive IPs has the port 80 open or 23 for telnet.
 
STEP 5: If port 80 is open then Enter that IP in your web browser (in my case http://172.27.103.1 will be enter), if 23 port is open then u should know how to telnet it from command prompt.
 
   
    

STEP 6: Then this broadband hack asks for USER ID and PASSWORD type
                 username =admin
                 password =admin or password

There is a high chance but not 100% that you will be able to login with that username and password. admin-admin is the default username and password that is set while manufacturing the adsl modem devices. If denied then use on another alive IP.
    
      
   

STEP 7: If you get success in this PC trick then  it will show router settings of the IP user There go to Home -> Wan Setting and the username and password of his account will appear there.

STEP 8: Use Show Password tools to view the password in asterisks ********.
Now you have username and password ready for use. That’s all about this PC trick to hack your broadband connection.

  that's it... Enjoy!!!!
 
If you have any queries or suggestions related to this post on 'How to Hack Your Broadband Connection?', you're most welcome in comments..! :)

Thursday, 10 October 2013

How to Compresses 1GB file to 10MB file?

13 comments
When you want to send some large file to your friends its a big problem to sending large file like 1 GB. But Now you can send any large file in seconds.  First you compress large file in small size then you can send this into seconds.
Compress large file into small by Using KGB Archiver:

KGB Archiver is free and open source software released under the terms of the GNU General Public License. Version 2 beta 2 is available for Microsoft Windows and a command line version of KGB Archiver 1.0 is available for Unix-like operating systems. KGB Archiver is one of the few applications that works with the PAQ algorithm for making its KGB files. It has ten levels of compression, from very weak to maximum, a greater variety than that found in most other compression software. However, at higher compression levels, the time required to compress a file increases significantly.


Download From Here


Note: If you are compressing any file with KGB archiver and sending the comprssed file to your friends then he must have KBG archiver installed on his computer to decompress the file.

System requirements:
The minimum requirements for running KGB Archiver are:

  • 256 MB RAM 
  • 1.5 GHz processor
 Features:
  • Supports native .kgb files and .zip files 
  • AES-256 encryption
  • It is able to create self-extracting archives
  • Unicode is supported in both the user interface and filesystems
  • Multi-Language support (including Arabic, German, Greek, Japanese, Polish, Portuguese, Serbian, Spanish, and Ukrainian) 
  • An Explorer shell extension is available for the windows versions.
  • Make Password protected compressed file.
Strength:
 
Very high compression power with very accurate result and no loss of data.

Weakness:

Due to high compression rate, the time requires to compress and decompress the file is high.

      
Watch Full Video Tutorial:
        
        
Download From Here
     
If you have any queries or suggestions related to this post on 'How to Compresses 1GB file to 10MB file?', you're most welcome in comments..! :)

Tuesday, 8 October 2013

Hacking Firefox: More Than 150 Hacks, Mods, and Customizations (Extreme Tech)

28 comments
         
They dreamed of a better browser . . . and before you could say "explore no more," Firefox was born. But already you want more. Tighter security, greater functionality. A custom installation for Linux, windows etc. Maybe even that unique extension you've always dreamed of creating. Well, if you want to tweak the Fox, here are over 400 pages of ways to do it. From hacking profile settings to cracking links and cleaning out the cookie jar, this is the stuff that puts you in control.

Step-by-step instructions for these hacks and dozens more

Settings, content, and extension hacks
Hacking the interface and themes
Performance boosters
Anti-phishing and security hacks
Toolbar and status bar tweaks
Navigation, download, and search hacks
Hacks for common plugins
Extension and theme creation

Download Link: http://goo.gl/AUov7y

Saturday, 5 October 2013

How To Shutdown A Computer By Using Cell Phone?

10 comments
The Requirements or Tools for this Tutorial
1.  One cell phone with GPRS enabled.
2.  One Email ID
3.  Microsoft Outlook on the PC to be put to shut down.
4.  Must have internet connection on your PC.

Using this method the user can shutdown, restart, hibernate the Computer just
by sending an email from their cell phone. All you need to have is Microsoft
outlook which comes with Microsoft word. The Microsoft outlook should be
installed on the PC you wish to shut down. First you need to create a batch file
to perform shutdown, restart etc. you can write them down yourself.

Note: you can complete this trick in every operating system but, here I’m representing this tutorial in “Windows 8 Pro”.
1.  Open your notepad and type the following:
         c:\windows\system32\shutdown -s - f -t 00
     And save it as shutdown.bat (Executable file)






2.  Open your Microsoft outlook. Make sure that it is already configured for
    your email id, otherwise configured it here step by step for your email id.
    Note: you can complete this trick on Microsoft Office Outlook (any
    version like 2003, 2007, 2010). Here, I’m doing on MS Office Outlook
    2010.
(1) After opening Outlook 2010, click on File in upper side left hand corner
 


(2) Now, click on “Add Account” and Set up your account detail



(3) Now, click on “Next”. This auto account setup will configure your email server settings automatically. You can do this manually by selecting manually configure option in last step.

  

After this setup, finally click on Finish.

3. Now we will need to set Microsoft outlook in such a way that outlook checks
   you email every one minute. This can be set by going to “Send/Receive” tab->
   “Send/Receive Group” -> “Define Send/Receive Groups”. After setting this
   click on close button.




4. Now, This step is to manipulate our computer (MS-Outlook) with Email
    message as for this, we have to set up of rules and alerts on outlook. So,
    again go to-> Tools – Rules and Alerts. Click on E-mail Rules tab. In new
    window select Check messages when they arrive and click Next



5. Now in next page, check on, on this machine only and with specific words in
    the subject. After checking these two values, click on specific words
    underlined.


          


6. Search Text window will open, in the input field type the command that shuts
   down the PC. You can use any commands. For prevention of accidental
   execution I kept %shutdown% as a command. Click on Add button after you
   are done and click on OK.

7. Now click on Next. In the next window check mark on start application. In the
    lower screen, click on application link.

8. Now you’ll be welcomed to your familiar file open window. Load all files. And
    select the batch file that you’ve created to shut down your PC.
                   


9. Click on Next, again click on next (don’t choose any things in this step). And
    finally click on Finish button.

10. You’ll have %shutdown% alert shown in the E-mail Rules tab.
                         


11. Now, when you send a message from your phone to your e-mail address
     with the Subject %shutdown% your computer will trigger shutdown.bat file
     and instantly executes the command in that batch file finally leading to shut
     down the PC.
If you have any queries or suggestions related to this post, you're most welcome in comments..! :)                        

Monday, 30 September 2013

What Is The Difference Between a Computer Virus, Worm and Trojan Horse?

5 comments

Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three.


One common mistake that people make when the topic of a computer virus arises is to refer to a worm or Trojan horse as a virus. While the words Trojan, worm and virus are often used interchangeably, they are not exactly the same thing. Viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three, and knowing those differences can help you better protect your computer from their often damaging effects.


What Is a Virus?
A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. Because a virus is spread by human action people will unknowingly continue the spread of a computer virus by sharing infecting files or sending emails with viruses as attachments in the email.
 

Internet Security Threat Report: 2013 Download Now

What Is a Worm?
A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided.
The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line.
Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. In recent worm attacks such as the much-talked-about Blaster Worm, the worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.


What Is a Trojan horse?
A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer.  Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source.  When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.


What Are Blended Threats?
Added into the mix, we also have what is called a blended threat. A blended threat is a more sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses and malicious code into one single threat. Blended threats can use server and Internet vulnerabilities to initiate, then transmit and also spread an attack. Characteristics of blended threats are that they cause harm to the infected system or network, they propagates using multiple methods, the attack can come from multiple points, and blended threats also exploit vulnerabilities.
To be considered a blended thread, the attack would normally serve to transport multiple attacks in one payload. For example it wouldn't just launch a DoS attack — it would also, for example, install a backdoor and maybe even damage a local system in one shot. Additionally, blended threats are designed to use multiple modes of transport. So, while a worm may travel and spread through e-mail, a single blended threat could use multiple routes including e-mail, IRC and file-sharing sharing networks.
Lastly, rather than a specific attack on predetermined .exe files, a blended thread could do multiple malicious acts, like modify your .exe files, HTML files and registry keys at the same time — basically it can cause damage within several areas of your network at one time.
Blended threats are considered to be the worst risk to security since the inception of viruses, as most blended threats also require no human intervention to propagate.


Tips to Combat Viruses, Worms and Trojan Horses on Your Computer:

 
1. Keep The Operating System Updated:
The first step in protecting your computer from any malicious there is to ensure that your operating system (OS) is up-to-date. This is essential if you are running a Microsoft Windows OS. Secondly, you need to have anti-virus software installed on your system and ensure you download updates frequently to ensure your software has the latest fixes for new viruses, worms, and Trojan horses. Additionally, you want to make sure your anti-virus program has the capability to scan e-mail and files as they are downloaded from the Internet, and you also need to run full disk scans periodically. This will help prevent malicious programs from even reaching your computer.


2. Use a Firewall:
You should also install a firewall. A firewall is a system that prevents unauthorized use and access to your computer. A firewall can be either hardware or software. Hardware firewalls provide a strong degree of protection from most forms of attack coming from the outside world and can be purchased as a stand-alone product or in broadband routers. Unfortunately, when battling viruses, worms and Trojans, a hardware firewall may be less effective than a software firewall, as it could possibly ignore embedded worms in out going e-mails and see this as regular network traffic.
For individual home users, the most popular firewall choice is a software firewall.  A good software firewall will protect your computer from outside attempts to control or gain access your computer, and usually provides additional protection against the most common Trojan programs or e-mail worms. The downside to software firewalls is that they will only protect the computer they are installed on, not a network.
It is important to remember that on its own a firewall is not going to rid you of your computer virus problems, but when used in conjunction with regular operating system updates and a good anti-virus scanning software, it will add some extra security and protection for your computer or network. 


Did You Know... CodeRed, a blended threat, launched DoS attacks, defaced Web servers, and its variant, CodeRed II, left Trojan horses behind for later execution. CodeRed was processed in memory — not on a hard disk — allowing it to slip past some anti-virus products. Computer Economics has estimated the worldwide cost of CodeRed at $2.62 billion dollars. [Source: Symantec Web site]

Key Terms To Understanding Computer Viruses:

 
Virus: A program or piece of code that is loaded onto your computer without

   your knowledge and runs against your wishes.

Worm: A program or algorithm that replicates itself over a computer network
   and usually performs malicious actions

Trojan Horse: A destructive program that masquerades as a benign
   application. Unlike viruses, Trojan horses do not replicate themselves.

Blended Threat: Blended threats combine the characteristics of viruses,

   worms, Trojan Horses, and malicious code with server and Internet
   vulnerabilities .

Antivirus Program: A utility that searches a hard disk for viruses and

  removes any that are found.
 
© 2013 Hacker'S Den | Designed by Making Different | Provided by Hacker'S Den | Powered by Hacker'S Den