COMPUTER TRICKS & TIPS

VISIT THIS SITE FOR PC TIPS,TRICKS,free 3G,free internet,free gprs,hackers,facebbok,twitter,google plus tricks,

COMPUTER SECURITY & SO MUCH OTHER THINGS.

https://johnplayerstricksandtips.blogspot.com

 

homepage

how to Clone A CD

21/06/2011 21:01
Cloning a CD is a good option to save everything on the CD. When copying the files from the CD, not copy the CD parameters as brands and other things. However, the cloning of a CD copy of all information, including the CD label, etc type of CD, and saves on your hard drive. This is useful when you copy a bootable CD in which the parameters are configured so that computers can boot from it. Here we show...

How To Detect IP Addresses Anonymised

21/06/2011 21:00
As the scammers are becoming more sophisticated in circumventing controls geolocation using proxies (anonymous IP) for forging IP addresses, has become very necessary to find a way to detect proxies for the authenticity of the users can verify. The use of a proxy (web proxy) is the most simple and easy to hide the IP address of an Internet user and maintain online privacy. However, approximations are...

How To Find The URL Of An Image Or A Picture On The Internet?

21/06/2011 20:54
URL (uniform resource locator) is essentially something that is on the Internet. In this case, we want to find the URL of an image or an image that is already stored on the Internet. So, for example, if you see a picture of a particular site, I will show you how to find the url for the image of the logo, or image. How to find the URL of an image or a picture on the internet?  First we need to find a...

Bypass Login On Websites With SQL Injection Explained

21/06/2011 09:24
For those of you who dont already know SQL injection is a technique used to exploit the vulnerability does not validate input to pass SQL commands through a web application for the construction of the database backend. Attackers exploit that programmers often chain SQL commands on a user supplied parameters, and, therefore, to enter the SQL commands within these parameters. The result is that a malicious...

The Trick To Visit Password-protected Websites Without Registering

21/06/2011 09:22
We all know how annoying it is when you search on Google for something and the result we are looking for leads to a password protected site or a forum. You must register to view the content, but who like to do? Fortunately, there is a solution to save your time and your e-mail account against spam - claiming to be Googlebot. For those of you who do not know, Googlebot is Google "spider" that crawls and...

It Is Quite Easy To Change: Shutdown Menu When Your Computer’s Power Button Is Pressed

21/06/2011 09:21
 Windows XP stops when the power button is pressed. It's a good idea to change it, then shutdown-menu is opened instead, especially if you have small children running around the house. follow these steps: Step 1: Go to your Windows XP desktop and right click on it. Select "Properties" and the Display Properties window appears. Open the "Screen Saver" tab and look for "Power" button at the bottom...

Windows 7 Seems To Make Ubuntu Linux

21/06/2011 09:19
Windows 7 Seems To Make Ubuntu Linux Ubuntu, one of the best alternatives and a great competitor to Windows is because it is' incredibly user-friendly interface, simple installation and very fast, a dual-boot with Windows 7 and the great support of the program.? In the area of ??Linux, Ubuntu is one of the most popular Linux operating systems around the world. Many users are missing Windows looks in...

How Automatic Defrag Drives

21/06/2011 09:17
How Automatic Defrag Drives Automatic defragmentation of disks and thought I might as well post a tutorial about it here. Basically, it allows you to defragment a disk by right-clicking and selecting "defrag." To do this open Notepad and paste the following code: ; Context_defrag.INF , Add Defrag to the right click context menu in Windows XP [Version] Signature = "$ CHICAGO $" [DefaultInstall] AddReg...

Create 25 Links To Your Site Every Day For Free

19/06/2011 23:10
This message is for all webmasters who want to get more accurate search results.As said the benefits of a previous link building.Every posts you know that the links indexed by search engines to help a lot fast.And also take into account the number of Google links back to site deployment investment. The more number of back links means better placement in search results.When you read this the next question...

Joomla Remote File Inclusions RFI Attack

19/06/2011 23:09
Local file inclusions are very funny. You tell the site what it wants. Awesome! To display the configuration file that contains the database login? No problem. Want to see the file / etc / passwd, that Joomla is hosted on a Linux machine? You can do this. Local file inclusions are a common problem in Joomla extensions. Many of them are vulnerable to this attack and some of them are never fixed. This can...

Hack & Nessus Using Metasploit

19/06/2011 23:07
this message is aimed at developing readers. Here I will share some real use hacking techniques that can hack any server or website. This post is for educational purposes. NB: No scans initiated against the system / server until the outline of the system / server the owner of the evaluation plan was agreed to accept the owner. Tools used in penetration testing are available for free online: First...

Android Last Botnets Botnets: Botnets Android SMS

19/06/2011 23:05
Android is the latest Botnet Botnet: Android botnet SMS After many more botnets "everything" (botnets via IRC botnets of Skype botnet on Twitter, on Facebook ...), directly from one of the most fascinating hackers (Georgia Weidman) a botnet Android by SMS . This is a great example of a spread of botnets and to guide the invisible text message. Download the code...

Tips For Computer Safety When Browsing The Internet

19/06/2011 10:34
The Internet is a dangerous place and it only scarier in the last year of fraud and business scams, so we've written 10 tips for computer security while browsing the Internet to help keep you safe. We have already written about how to protect your computer against viruses, spyware, virus removal, and even tips to speed up your computer, but the following tips are important to computer security while...

To Repair A Windows XP Installation Without Formatting Your Computer And Lose Your Files

19/06/2011 10:33
To Repair A Windows XP Installation Without Formatting Your Computer And Lose Your Files A repair installation of Windows XP does not delete any files, such as the design. Design of Windows XP to clean your computer is absolutely everything you had on your computer, and, therefore, this fact alone makes the repair a good alternative to try to fix the error. If you suspect that the problem in the Windows...

Copy and paste the link to an HTML e-mail

19/06/2011 10:32
Copy and paste the link to an HTML e-mail? 1. Go to the address bar at the top of the page when you view a Web page that you want to share. 2. Select the text (URL) making blue. 3. When the text is blue, right click on the blue area and a menu will appear. Menu is not displayed if the text is not blue. 4. From the menu, select Copy. This will copy the exact text that you have made blue. 5. Open your...

8 Devices Running Linux In Secret

19/06/2011 10:30
Linux is everywhere,  Although you can usually only think of Linux on a laptop to your geek friend or a power server, Linux runs on many devices, from consumer electronics to the fastest supercomputers in the world. 1. Android phones, tablets, eReaders Android operating system have been popping up all over the place, and each of these devices is especially the Linux version of Google stamp of...

How To Connect Two Computers With Broadband

19/06/2011 10:28
How To Connect Two Computers With Broadband connect two computers Now, if you do not have a router, but have a modem similar to the display, you can connect two computers using a broadband modem, and therefore both access to the Internet. A computer can connect via the USB port and the other via Ethernet. USB cable and Ethernet cable and come with the modem, but to connect the second computer, you may...

What is a FUD Crypter

18/06/2011 09:16
WHAT IS A CRYPTER? A Crypter is a software used to hide our viruses, keyloggers or any RAT tool from antiviruses so that they are not detected and deleted by antiviruses. Thus, a crypter is a program that allow users to crypt the source code of their program. Generally, antivirus work by splitting source code of application and then search for certain string within source code. If antivirus detects any...

Ettercap ADVANCED CONCEPT

18/06/2011 09:12
 I am very unstable here to show you what Ettercap Advance concept is able to do so is a unique tool to do many things ... such Simple Sniff DHCP Spoofing Ettercap filters The basic functions of scripts Simple code to block particular website by ettercap filter. Code of the filter to kill and abandon the connection and the packets of specific IP address LAN disfigurement site is also used for...

Session Hijacking

18/06/2011 09:11
Session Hijacking: Session hijacking is the process of operating a computer session valid, that is stealing cookies from the victim. So now, let us know below. What is a cookie? A cookie is known as a web cookie or HTTP cookie is a small piece of text stored by the user browser.A cookie is sent as a head by the web server to the browser cookie on the client side.A is static and returned unchanged the...

HOW TO HACK A WI_FIdility

18/06/2011 09:09
First install the aircrack-ng yum -------------------------------------------------- -------------------------- Step 1: PHP Code: yum install Aircrack-ng y -------------------------------------------------- --------------- Install the package using yum command macchanger -------------------------------------------------- --------------- Step 2: PHP Code: yum install-y...

How To Test The Operation Of Your Anti-virus

17/06/2011 18:34
How To Test The Operation Of Your Anti-virus Have you ever wondered how to test your antivirus software to the proper functioning? Well here is a quick and easy way to test your antivirus. This process is known as the EICAR test that works on all anti-virus and developed by the European Institute for Computer Antivirus Research. This process can be used for people, businesses, and anti-virus programmers to...

Learn The Programming Commands Batch

17/06/2011 18:32
Hello readers, I'm back with the batch of programming tutorials. In my last post I told you about what programs and need lots. All those who have not yet read this message, read pleast for a clearer picture of the subject. In this post we will code our first batch program. I will also tell you lots more used commands and their uses. The first command you need to know is the echo. All ECHO does is simply...

Batch File That Appears With Repeated Messages

17/06/2011 18:30
in this post, we will create a batch file that pop-ups keep repeating the message boxes. Below is the code for it. : Home msg * Hi Msg * Are you having fun? msg * I am! msg * https://tipsandtricks.webnode.com admin! * Message and you're stuck reading * Msg teach you msg * Batch Programming Series Msg * Did you learn something new msg * and like * Msg if so, then do not subscribe Msg * learn...

How Do You Know If Your Web Server Is A Windows-or Linux-based

17/06/2011 18:28
How Do You Know If Your Web Server Is A Windows-or Linux-based Its very easy to take on a system, if you know the server operating system. Well this is learn't something practical experience. Just follow the steps: - 1) Go to the link below and find the IP address of the site you want to collect information. You can do this by typing its name in the Get...

Google Chrome Shortcuts and tricks

17/06/2011 09:35
Google Chrome Shortcuts and tricks There are already several articles on the web that contains information about using Google Chrome for a long time and there may be experiments with it. Laboratory browser named Google a few months old with a beautiful title "Google Chrome", was released last year. A surprise to most of the players online, and we are always happy with that. This position is for an...

How Do I Create A Folder Reserved For The Name Of All Windows

17/06/2011 09:33
In this post I'm going to tell you how to make a folder with the name of any Windows, including the reservation of keywords. Can you create a folder named "CON" in Windows? The answer is NO and YES! Because the answer is no. No, because when they create a new folder and try to rename any of the names listed above, you know what done! Windows XP, the folder name is automatically reported to the "New...

HOW TO USE A TRIAL SOFTWARE FOREVER.SOFTWARE CRACKING

17/06/2011 08:47
Most of us are familiar with a lot of software that only works for some time in the mode of trial. When the trial period the software stop function and the demand for a purchase. But there is a way to run the software and get them to operate beyond the trial period. Is not it interesting? Before telling you how to hack the software and run it in trial mode for ever, we need to understand the function of...

HOW TO HACK PERSONAL & CONFIDENTIAL DOCUMENTS

17/06/2011 08:44
Hacking personal and confidential documents Using Google, it is possible to access an e-mail repository containing the CV of hundreds of people that were created when searching for their jobs. Documents containing their address, phone number, date of birth, education, work experience etc. can be found just a few seconds. intitle: "curriculum vitae" "phone * * *" "* address" "email" You can get a list....

REVERSE DOMAIN NAME HIJACKING

17/06/2011 08:42
Reverse domain name hijacking is one of the serious problems in the world of domain name today. Many people were engaged in such silly activity and so create a great bang in the domain name industry. Accordingly, the reverse domain name hijacking is such a ploy that is applied by a complainant in bad faith to attempt to deprive a registered domain name owner. In fact, there is a certain rule for reverse...
Items: 211 - 240 of 310
<< 6 | 7 | 8 | 9 | 10 >>