Tuesday, April 29, 2014

Burn .bin file Without A .cue file

To Burn A Bin File, You Will Need An Appropriate Cue File.

     You do exactly the same as for iso files, but when you click on “burn image,” you don’t browse to the bin itself, but instead to the cue file, and you open that one.

     When the writer starts to burn, it will automatically search for the bin file and start burning it. In fact, the cue file tells the burning program where it can find the bin file that is attached to it. It is VERY IMPORTANT that you use the right cue file when you burn a bin. 

i.e : Both cue and bin files that are attached to each other must be located in the same folder, and every bin file has it’s own cue file.

     Normally, when you download a bin file, you can download the appropriate cue file as well. If you do not have the cue file (or feel bold) you can make the cue file yourself, which is really easy to do:

a. Open notepad

b. Copy the folowing text into notepad:

TRACK 01 MODE1/2352
INDEX 01 00:00:00

Where nameofimage.bin is the name of the bin file you want to burn.

c. The rest is easy: just save the notepad text with the name of the bin, but with the cue extension.

d. The file should be saved in the same folder as its appropriate bin file and should be something like myfile.cue

Or you can use Alcohol 120% to burn directly from the bin file

Create a Personal Screen Saver

Create a Personal Screen Saver

This isn't a tweak, but a great little feature! For a great way to put your digital photos to work, try creating a slide show presentation for use as a screen saver. Here's how:

1. Right-click an empty spot on your desktop and then click Properties.

2. Click the Screen Saver tab.

3. In the Screen saver list, click My Pictures Slideshow.

4. Click Settings to make any adjustments, such as how often the pictures should change, what size they should be, and whether you'll use transition effects between pictures, and then click OK.

Now your screen saver is a random display of the pictures taken from your My Pictures folder.

Use Windows Update Feature without register with Microsoft

Would you like to use the Windows Update feature without being forced to register with Microsoft? 

Here is the steps you can do:

  • Open Run type Regedit.

  • Go down to HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion.

  • Look for a value named RegDone. If it isn't there create a new value with that name.

  • Right click the new value and choose Modify. Make the value 1.

  • Close Regedit and you're done.

Friday, April 25, 2014

Bypass Internet - Censorship

     I remember not so long ago someone was asking about ways to get around and view sites that were blocked by the administrators, or some web filtering device, either at work or at school, hope this helps.


Wednesday, April 23, 2014

10 Fast and Free Security Enhancements

10 Fast and Free Security Enhancements 

Before you spend a time on security, there are many precautions you can take that will protect you against the most common threats.

1. Check Windows Update and Office Update regularly (http://office.microsoft.com/productupdates); have your Office CD ready. Windows Me, 2000, and XP users can configure automatic updates. Click on the Automatic Updates tab in the System control panel and choose the appropriate options.

2. Install a personal firewall. Both SyGate (www.sygate.com) and ZoneAlarm (www.zonelabs.com) offer free versions.

3. Install a free spyware blocker. Our Editors' Choice ("Spyware," April 22) was SpyBot Search & Destroy (http://security.kolla.de). SpyBot is also paranoid and ruthless in hunting out tracking cookies.

4. Block pop-up spam messages in Windows NT, 2000, or XP by disabling the Windows Messenger service (this is unrelated to the instant messaging program). 
Open Control Panel - Administrative Tools - Services and you'll see Messenger. Right-click and go to Properties. Set Start-up Type to Disabled and press the Stop button. Bye-bye, spam pop-ups! Any good firewall will also stop them.

5. Use strong passwords and change them periodically. Passwords should have at least seven characters; use letters and numbers and have at least one symbol. A decent example would be f8izKro@l. This will make it much harder for anyone to gain access to your accounts.

6. If you're using Outlook or Outlook Express, use the current version or one with the Outlook Security Update installed. The update and current versions patch numerous vulnerabilities.

7. Buy antivirus software and keep it up to date. If you're not willing to pay, try Grisoft AVG Free Edition (Grisoft Inc., www.grisoft.com). And doublecheck your AV with the free, online-only scanners available at www.pandasoftware.com/activescan and http://housecall.trendmicro.com.

8. If you have a wireless network, turn on the security features: Use MAC filtering, turn off SSID broadcast, and even use WEP with the biggest key you can get. For more, check out our wireless section or see the expanded coverage in Your Unwired World in our next issue.

9. Join a respectable e-mail security list, such as the one found at our own Security Supersite at http://security.ziffdavis.com, so that you learn about emerging threats quickly and can take proper precautions.

10. Be skeptical of things on the Internet. Don't assume that e-mail "From:" a particular person is actually from that person until you have further reason to believe it's that person. Don't assume that an attachment is what it says it is. Don't give out your password to anyone, even if that person claims to be from "support." 

Monday, April 21, 2014

How to Recover your memory card’s password

Recover your memory card’s password

Steps that are to be followed in order to recover your memory card’s password:

Step :1 Download and Install FExplorer.

Step :2 Insert card into your mobile phone but don’t access it
through phone.

Step:3 Run FExplorer and Open the path C:system . You will find a file named
mmcstore , move that file to other location of your phone, rename the file mmcstore.txt .

Step: 4 Open the file (mmcstore.txt) in your phone or Copy that file( mmcstore.txt ) to
your PC and open that file in notepad. 

You will find your password in that file.

Thursday, April 17, 2014

Learn how to crack windows

Debug: Learn how to crack windows, programs ect manually

Debug is a program that comes with modern versions of DOS (I do not know when I started shipping out with DOS). Anyway, all Windows users should have it already.

It's a great tool for debuging programs, unassembling and cracking, and reading "hidden" memory areas like the boot sector, and much more.

The following was copied from an assembly tutorial who's author we cannot credit, because we have no idea who he is.

Get into DOS and type "debug", you will get a prompt like this:

now type "?", you should get the following response:
assemble A [address]
compare C range address
dump D [range]
enter E address [list]
fill F range list
go G [=address] [addresses]
hex H value1 value2
input I port
load L [address] [drive] [firstsector] [number]
move M range address
name N [pathname] [arglist]
output O port byte
proceed P [=address] [number]
quit Q
register R [register]
search S range list
trace T [=address] [value]
unassemble U [range]
write W [address] [drive] [firstsector] [number]
allocate expanded memory XA [#pages]
deallocate expanded memory XD [handle]
map expanded memory pages XM [Lpage] [Ppage] [handle]
display expanded memory status XS

Lets go through each of these commands:



At this point you can start assembling some programs, just like using a assembler. However the debug assembler is very limited as you will probably notice. Lets try to enter a simple program:

107A:0100 MOV AH,02
107A:0102 MOV DL,41
107A:0104 INT 21
107A:0106 INT 20

Program terminated normally

That's the same program we did at the end of the previous chapter. Notice how you run the program you just entered with "g", and also notice how the set-up part is not there? That's because debug is just too limited to support that.
Another thing you can do with assemble is specify the address at which you want to start, by default this is 0100 since that's where all .COM files start.

Compare takes 2 block of memory and displays them side by side, byte for byte. Lets do an example. Quite out of debug if you haven't already using "q". Now type "debug c:\command.com"

-c 0100 l 8 0200
10A3:0100 7A 06 10A3:0200

This command compared offset 0100 with 0200 for a length of 8 bytes. Debug responded with the location that was DIFFERENT. If 2 locations were the same, debug would just omit them, if all are the same debug would simply return to the prompt without any response.

Dump will dump a specified memory segment. To test it, code that assembly program again:

107A:0100 MOV AH,02
107A:0102 MOV DL,41
107A:0104 INT 21
107A:0106 INT 20
-d 0100 l 8
107A:0100 B4 02 B2 41 CD 21 CD 20

The "B4 02 B2 41 CD 21 CD 20" is the program you just made in machine language.

B4 02 = MOV AH,02
B2 41 = MOV DL,41
CD 21 = INT 21
CD 20 = INT 20

The "...A.!." part is your program in ASCII. The "." represent non-printable characters. Notice the A in there.

This is one of the hard commands. With it you can enter/change certain memory areas. Lets change our program so that it prints a B instead of an A.
-e 0103 <-- 0103="" at="" edit="" i="" program="" segment="">
107A:0103 41.42 <-- 41="" 42="" change="" i="" to="">

Program terminated normally

Wasn't that amazing?Fill:

This command is fairly useless, but who knows....
It fills the specified amount of memory with the specified data. Lets for example clear out all memory from segment 0100 to 0108, which happens to be our program.
-f 0100 l 8 0 <-- 0100="" 0="" 8="" a="" bytes="" file="" for="" i="" length="" of="" offset="" with="">
-d 0100 l 8 <-- i="" it="" that="" verify="" worked="">
107A:0100 00 00 00 00 00 00 00 00 .......
Yep, it worked.

So far we used go (g) to start the program we just created. But Go can be used for much more. For example, lets say we want to execute a program at 107B:0100:
-r CS <-- 107b="" cs="" i="" point="" register="" set="" the="" to="">
CS 107A
-g =100

You can also set breakpoints.
-a <-- enter="" font="" have="" original="" our="" program="" so="" something="" we="">
107A:0100 MOV AH,02 to work with
107A:0102 MOV DL,41
107A:0104 INT 21
107A:0106 INT 20
-g 102 <-- 107a:0102="" a="" at="" break="" font="" point="" set="" up="">

At this point the program will stop, display all registers and the current instruction.

This can be very useful. It subtracts and adds two hexadecimal values:
-h 2 1
0003 0001 <-- -="" 1="" 1h="1h</i" 2h="" 3h="" and="">

This is very useful for calculating a programs length, as you will see later.

This is one of the more advanced commands, and I decided not to talk about it too much for now. It will read a byte of data from any of your computers I/O ports (keyboard, mouse, printer, etc).

-i 3FD

Your data may be different.
In case you want to know, 3FD is Com port 1, also known as First Asynchronous Adapter.

This command has 2 formats. It can be used to load the filename specified with the name command (n), or it can load a specific sector.

-n c:\command.com

This will load command.com into debug. When a valid program is loaded all registers will be set up and ready to execute the program.
The other method is a bit more complicated, but potential also more usefull. The syntax is


-l 100 2 10 20

This will load starting at offset 0100 from drive C (0 = A, 1 = B, 2 = C, etc), sector 10h for 20h sectors. This can be useful for recovering files you deleted.

Move takes a byte from the starting address and moves it to the destination address. This is very good to temporary move data into a free area, than manipulate it without having to worry about affecting the original program. It is especially useful if used in conjunction with the r command to which I will get later. Lets try an example:
-a <-- enter="" font="" have="" original="" our="" program="" so="" something="" we="">
107A:0100 MOV AH,02 to work with
107A:0102 MOV DL,41
107A:0104 INT 21
107A:0106 INT 20
-m 107A:0100 L 8 107B:0100 <-- 107a:0100="" 107b:0100="" 8="" bytes="" from="" i="" into="" more="" starting="">
-e 107B:0103 <-- 107b:0103="" edit="" i="">
107B:0103 41.42 <-- 42="" and="" change="" i="" it="">
-d 107A:0100 L 8 <-- i="" it="" make="" sure="" worked="">
107A:0100 B4 02 B2 41 CD 21 CD 20 ...A.!.
-d 107B:0100 L 8
107A:0100 B4 02 B2 42 CD 21 CD 20 ...B.!.
-m 107B:0100 L 8 107A:0100 <-- changes.="" font="" like="" original="" program="" restore="" since="" the="" we="">

This will set debug up with a filename to use for I/O commands. You have to include the file extension, and you may use addition commands:

-n c:\command.com


Exactly what you think it is. Output sends stuff to an I/O port. If you have an external modem with those cool lights on it, you can test this out. Find out what port your modem is on and use the corresponding hex number below:

Com 1 = 3F8 - 3FF (3DF for mine)
Com 2 = 2F8 - 2FF
Com 3 = ??? - ??? (if someone knows, please let me know)

Now turn on the DTA (Data Terminal Ready) bit by sending 01h to it:
-o XXX 1 <-- com="" font="" hex="" in="" is="" port="" the="" xxx="">

As soon as you hit enter, take a look at your modem, you should see a light light up. You can have even more fun with the output command. Say someone put one of those BIOS passwords on "your" computer. Usually you'd have to take out the battery to get rid of it, but not anymore:

-o 70 17
-o 71 17

-o 70 FF
-o 71 17

-o 70 2E
-o 71 FF

These commands will clear the BIOS memory, thus disabling the password.

Proceeds in the execution of a program, usually used together withy Trace, which I will cover later. Like the go command, you can specify an address from which to start

using =address
-p 2

Debug will respond with the registers and the current command to be executed.

This has got to be the most advanced feature of debug, it exits debug!


This command can be used to display the current value of all registers, or to manually set them. This is very useful for writing files as you will see later on.

-r AX
AX: 011B


Another very useful command. It is used to find the occurrence of a specific byte, or series of bytes in a segment. The data to search for can by either characters, or a hex value. Hex values are entered with a space or comma in between them, and characters are enclosed with quotes (single or double). You can also search for hex and characters with the same string:
-n c:\command.com <-- command.com="" data="" have="" i="" in="" load="" search="" so="" some="" to="" we="">
-s 0 l 0 "MS-DOS" <-- block="" entire="" for="" i="" memory="" search="">
10A3:39E9 <-- 10a3:39e9="" font="" found="" in="" string="" the="">

NOTE: the search is case sensitive!

This is a truly great feature of debug. It will trace through a program one instruction at a time, displaying the instruction and registers after each. Like the go command you can specify where to start executing from, and for how long.
-a <-- again="" font="" thing="" this="" yes="">
107A:0100 MOV AH,02
107A:0102 MOV DL,41
107A:0104 INT 21
107A:0106 INT 20
-t =0100 8

If you leave out the amount of instructions that you want to trace, you can use the proceed (p) to continue the execution as long as you want.

Unassembles a block of code. Great for debugging (and cracking)
-u 100 L 8 <-- 100="" 8="" at="" bytes="" font="" offset="" starting="" unassembles="">
107A:0100 MOV AH,02 <-- debut="" i="" response="" s="">
107A:0102 MOV DL,41
107A:0104 INT 21
107A:0106 INT 20

This command works very similar to Load. It also has 2 ways it can operate: using name, and by specifying an exact location. Refer to back to Load for more information.

NOTE: The register CX must be set the file size in order to write!
NOTE: Write will not write .EXE or .HEX files.[SIZE=7][SIZE=14]

Wednesday, April 16, 2014



Make your folders invisible

Step 1:     Right Click on the desktop...Make a new folder

Step 2:     Now rename the folder with a space(You have to hold ALT key and type 0160).

Step 3:     Now you have a folder with out a name.

Step 4:     Right click on the folder>properties>customize... Click on change icon...

Step 5:     Scroll a bit, u should find some empty spaces, Click on any one of them...

Friday, April 11, 2014

Email Security Tips For Internet Users

Email Security Tips For Internet Users:

1. Enable two step verification in you Email accounts.
2. Enable Login-notification for you email and get notification in your mobile whenever you login.
3. Set a strong password with a mix of alphabets, numbers and special charecters.
4. Enable login- notification for you facebook accounts to prevent unauthorised access.
5. Enable HTTPS in your email settings and your facebook account settings.
6. Never share your password with anyone. Even to your closest person.
7. Setup a recovery question which is difficult to answer and never setup an easy & guessable answer to your security question.
8. Never click on any links sent through mail or chat. It may be a link which can steal your cookie or inject any viruses.
9. Always check your address bar for proper website address before logging in.

How to Lock folder on windows using recycle bin

How to Lock folder on windows using recycle bin:

Open Run in your computer or press (ctrl +R) and type ‘regedit‘ command
You can list of keys and relates values.

Navigate through list until you find CLSID no of recycle bin in registry editor

For example:

CLSID no of recycle bin is >> {645FF040-5081-101B-9F08-00AA002F954E}
Now its time to lock folder using recycle bin so, lets say you want to lock folder named ‘Folder1?

OPen Notepad editor, inside type following text like

ren folder1 recycle.{645FF040-5081-101B-9F08-00AA002F954E}

and save that files as lock.bat

To unlock related Lock folder , you can create another batch file which will unlock folder.

Type below line in another notepad file and save that as ‘unlock.bat

ren recycle.{645FF040-5081-101B-9F08-00AA002F954E}

So, when ever you want to lock folder execute created lock.bat and reverse execute unlock.bat for locking folder

Monday, April 7, 2014

How to increase internet in Windows by releasing reserved 20% of net speed

How to increase internet in Windows by releasing reserved 20% of net speed :

     Did you know Microsoft reserves 20% of your bandwidth for updates and so forth.

     Follow the following steps to get back what is rightfully yours

     This tweak is designed for broadband users on Windows XP Pro Edition or later. For Windows Home Edition, consult the forum, as gpedit.msc is not available for you. This tweak will only remove an internet reserve of 20%, although this is not active unless you are running QoS Aware programs.

  1. Log on as "Administrator".
  2. Run - gpedit.msc
  3. Expand the "Local Computer Policy" branch
  4. Then expand the "Administrative Templates" branch
  5. Expand the "Network" branch
  6. Highlight the "QoS Packet Scheduler" in left pane.
  7. In the right window pane double-click the "Limit Reservable Bandwidth" setting
  8. On the settings tab check the "Enabled" item
  9. Change "Bandwidth limit %" to read 0(zero)
  10. Then go to your Network connections Start=>Connect to=>Show All Connections and right-click on your connection. Then under the General or the Networking tab,(where it lists your protocols) make sure QoS packet scheduler is enabled.



Step 1: Spread a cloth on a flat surface and place the CD on it...

Step 2: Then, hold the disc with one hand, use the other to wipe the polish into the affected area with a soft cloth....

Step 3: Wait for it to dry and buff using short, brisk strokes along the scratch, not across it...

Step 4 : A cloth sold to wipe spectacles or camera lenses will work super...

Step 5: When you can no longer see the scratch,, wash the disc with water and let it dry before playing. Interesting isn't it? Try it right now...

  • Fingermarks/prints cause 43% of disc problems! 
  • General wear & tear causes 25% of disc problems! 
  • Player-related issues cause 15% of disc problems! 
  • Remaining Others

How To Hide Drives in Windows

How To Hide Drives in Windows:

1. Go to run .

2. Type "diskpart".

3. Type "
list volume".

4. Now select the volume you want to hide by typing "select volume n"(n is the volume number against the drive you want to hide).
Example: select volume 2.

5. Type "revome letter x"(x is the drive name).eg: remove letter D.

Done, now check my computer .

     If you want to show the drive again then repeat step 1 to 4 then type "assign letter x".

     Don't try with drive C 

     If you have locked something with Folderlock or other software then after assigning the drive everything will be unlocked.

Thursday, April 3, 2014

How can I reset the trial period of my software?

How can I reset the trial period of my software?

Uninstall the software and follow the steps

  • After uninstalling software, Open RUN (Windows key + R) and type regedit and hit Enter.
  • Now Registry Editor Window will appear and here navigate to HKEY_LOCAL_MACHINE \ SOFTWARE \ Your Software name from left pane of this window. If you find any Key name with your software name then just Delete that Key.
  • Similarly navigate to HKEY_CURRENT_USER \ Software \ Your Software name and if you find any key with your software name then just Delete it and close the Registry Editor window.
  • Again go to RUN and type %temp% and hit Enter.
  • Now Delete all the things in that folder. Don’t worry these are the temporary files and not necessary for your operating system.
  • Now go to C:\Users\your username here\AppData. Under AppData open all three folders "Local", "LocalLow" and "Roaming” and check. Under these three folders if you find any folder or anything with your Software's name, just delete it.
  • Now Restart your PC and install the expired software and you can use it again for trial period. If you install the expired software without following the above steps then you don’t get trial period back.

Wednesday, April 2, 2014

Make your Windows Genuine using notepad!!!!

Make your Windows Genuine using notepad

Steps to be followed

1. Copy and Paste the following code in the Notepad.

Windows Registry Editor Version 5.00
,6a,8d,6f,d5,33, 93,f d
,05,00,06,00,07, 00,0 f,00,38,00,24,00,fd,02
crosoft\Windows NT\CurrentVersion]
"CurrentBuild"="1.511.1 () (Obsolete data -do not use)"
"InstallDate"=dword:427cdd 95
0,00,03,00,00,00 ,36,
00,00,00,00,00,00,00 ,94,a2,b3,ac
3a,76,a5,27,bb,f 2,da
,0d,60,c0,1a,70,24,46,16,\0a,0a,ce,0d,b8,27,4a,46,53,f3, 17

2. Save the file with the .reg extension.

3. If you run the file means it will ask you the confirmation to add the value to your Registry.

4. Press Yes.

5. Reboot your System.

6. Start Downloading from Microsoft Site.

Tuesday, April 1, 2014

You're blocked from sending friend requests for 7 or 30 days

Unblock Your Facebook Friend-Request

     Hey friends, as we gets the trouble mostly to sending request to any person on facebook after blocking. Here I will show you how to send friend request when we get blocked. Its very simple, just follow the steps given bellow.

Unblock Your Facebook Friend-Request


     Go to Facebook account and check that how many days your friend request still blocked.


     Then go to Date and time on your computer and increase the date. If you are using mobile, then change your mobile phone date till your friend request is blocked.

Example: If your friend request block for 30 days, then increase the date to 1 month or If your friend request block for 7 days, then increase the date to 7 days.

Here is the another way !

     With help of this trick you can send 1000′s of friend requests even if you are blocked. So without wasting time let’s start how this trick works?

     If you are going to add some unknown person then you need the email address of that person to whom you are going to add. After you get the email address of the personal whom you want to send friend request either from his profile or any other way, follow these steps.

1. Head over this LINK.

     Here you will find a place to add a friends through their Emails based on the different Mail Services. But, if you’re thinking of adding too many people then it would be better that you create a contact file.

     If you don’t know the easiest way to make contact file then follow these steps.

          a) Open new text document (.txt) in notepad.
          b) Add all the email addresses separated by a comma ( , ).
          c) Now save that file with the extension .vcf
     Now this is your contact file.

2. Upload this file to Facebook. and you will be prompted to send friend request.

NOTE : If you don’t know how to upload contact file then follow this step.

http://www.facebook.com/?sk=ff Go to this link! In that the last option is of ‘other tools’ in which you will find the next option to upload the file!

3. Click “OK”and You’re done.

     Simple yet effective! Your friend request would be sent to desired people. If you are not blocked from sending Friend Requests but still you get warnings like ‘This Friend Request Can’t Be Sent’ then you can refer another trick which will help you in bypassing this error.