COMPUTER TRICKS & TIPS

VISIT THIS SITE FOR PC TIPS,TRICKS,free 3G,free internet,free gprs,hackers,facebbok,twitter,google plus tricks,

COMPUTER SECURITY & SO MUCH OTHER THINGS.

https://johnplayerstricksandtips.blogspot.com

 

homepage

MICROSOFT-WORD2003- VOICE ANNOTATIONS

15/06/2011 12:04
MICROSOFT-WORD2003- VOICE ANNOTATIONS Hi friends,MICROSOFT-WORD allows us toeasily add text annotations to your document.an annotation is a note or a special instruction that is added along with the document. MICROSOFT-WORD2003 offers you an option to add annotations in the form of audio file.this file may be prerecoarded file,or a new recording. here is i m gonna show you how to easily add a voice...

SET UP YOUR OWN PROXY SERVER

15/06/2011 10:03
Set up your own proxy server so many  people complain that webproxys are not working at their works / schools computer because they have been banned by administrators. A way around this would be to setup your very own proxy server that is being hosted a) by a free webhosting service that supports either php or cgi or b) your own website that is being hosted by a webhosting company. Both methods should...

INSTALL TOR IN BACKTRACK4

15/06/2011 10:02
First, you need to add noreply.org repositories to your sources.list. These are the official tor repositories for debian-based Linux distrobutions. Open up a terminal and type: Code: nano /etc/apt/sources.list At the bottom of this file, add these two lines: Code: deb https://mirror.noreply.org/pub/tor intrepid main deb-src https://mirror.noreply.org/pub/tor intrepid main Save the file. Now download...

GOOGLE HACKING

14/06/2011 09:52
Google query operators Operator Description Sample query site restricts results to sites within the specified domain site:google.com fox will find all sites containing the word fox, located within the *.google.com domain intitle restricts results to documents whose title contains the specified phrase intitle:fox fire will find all sites with the word fox in the title and fire in the text allintitle...

HOW TO HACK A WEBPAGE?

14/06/2011 09:46
Well Psychotic wrote one of the most helpful unix text files in cyberspace but with the mail that we   recieved after the release of our famous 36 page Unix Bible we realised that unix isn't for everybody so   we decided that we should write on another aspect of hacking..... Virtual Circuit and Psychotic is proud to   release, "Hacking Webpages With a few Other Techniques." We will discuss a...

How to Hack Yahoo/gmail/orkut any Password?

11/06/2011 18:44
Requirement: Just purchase hosting from any company and the domain will be similar to yahoomail.com like yahooomail.com after upload 3 files. 1. index.html (same clone of the yahoo.com)—just change method 2. info.pl (used to send passwords to our email address) 3. thankyou.htm file to redirect phishing page to orginal yahoomail.com . open yahoomail.com and save as file index.html open this file in...

How to Hack and Spy on a Webcam

11/06/2011 18:31
How to Hack and Spy on a Webcam I get a lot of emails where my readers are asking for help to find out if his/her partner is cheating on them, chatting to someone she/he shouldn't be, etc. So here i decided to answer this question, and to get it clear once for all. Today there are softwares called RATs (Remote Administrator Tools) that are mostly used for malicious purposes, such as controlling PC’s,...

HOW TO MAKE FASTER YOUR FLASH DRIVE?

11/06/2011 18:28
HOW TO MAKE FASTER YOUR FLASH DRIVE? Guys,its so simple to make your usb flash drive make faster just follow these steps to do so: plug in your pen drive open the properties now click on hardware. select your flash disk drive. click on properties. click on policies now click on better performace & apply. thats it.you have done.

Types of Web application vulnerability

09/06/2011 21:56
1. XSS (Cross Site Scripting) 2. SQL Injection 3. RFI 4. etc 1.) XSS XSS is a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users. Websites today are more complex than ever, containing a lot of dynamic content making the experience for the user more enjoyable. Dynamic content is...

How to Prevent Email Password Hacking?

09/06/2011 21:49
Don't use the links in an email, instant message, or chat to get to any web page if you suspect the message might not be authentic or you don't know the sender or user's handle  Instead, call the company on the telephone, or log onto the website directly by typing in the Web adress in your browser  Avoid filling out forms in email messages that ask for personal financial information  You...

How To Disable Writing to USB Drives

09/06/2011 21:45
A major concern at organizations is allowing users to plug in a usb flash drive, because they could so easily copy corporate data. Since Windows XP SP2, you can disable writing to USB devices altogether using a simple registry hack. However one should also note that if you are using this trick, you should make sure that the users are not administrators on the computer, because they could easily change this...

HOW TO RESTORE YOUR LOST BOOKMARK LIST

07/06/2011 13:17
HOW TO RESTORE YOUR LOST BOOKMARK LIST? we always face a problem that system goes crash or your mozila firefox goes crash.when one thing happened with you from both of them.you lost your total bookmarkerd list. so how to restore it. well,lets try to restore it. when this thing happens with you.just give me favour. install firefox again.go to firefox profile. here search the bookmarkbackups folderclick on...

HOW TO BYPASS THE RECYCLE BIN?

07/06/2011 13:15
HOW TO BYPASS THE RECYCLE BIN bypass the recycle bin,you have to change the some configurations. go to the recyble bin properties by clicking righ click on recycle bin icon on desktop. in the properties of recycle bin,you have to select the check box against "do not move to files recycle bin.remove files immidiately when deleted. here is one another way to bypass it. when you choose a file to delete.keep...

HOW TO VIEW THE TITLE BAR IN WINDOWS VISTA

07/06/2011 08:59
FRIENDS,ONE COULD VIEW THE WINDOWS TITLE IN XP & its predecessors. BUT NOT IN VISTA.UPON pressing the win+E key.you would notice that windows doesn't include any title.TItle can be viewed in only IE 7 that comes in deafault with vista.you can solve this problem by downloading a small exe.file known as aerobarfrom the site-https://www.psscript.net/AeroBar.exe. after the downloading of this file just give...

A TRICK TO HACK INTO COMPUTERS THROUGH WIRELESS FIDILITY

06/06/2011 19:36
A TRICK TO HACK INTO COMPUTERS THROUGH WIRELESS FIDILITY Hello friends wana this hack? ok.allright,lets go for it. to do so,we have to need first of all browser mozila firefox,then an extension called FIRESHEEP thatdemonstrates HTTP session hijacking attacks.  WinPcap - WinPcap is an open source library for packet capture and network analysis for the Win32 platforms. It includes a kernel-level packet...

HOW TO REWRITE YOUR CD/DVD/BLUE-RAY RECORDABLE DISC?

06/06/2011 08:59
HOW TO REWRITE YOUR CD/DVD/BLUE-RAY RECORDABLE DISC Guys its a very simple trick to write again to a unrewritable disk. we all very oftenly get that the disc we have burn,its has lots of space free, want to use this free space? ok.lets start. first insert the disk into your bd/dvd/cd rom. now launch the nero software & choose make data dvd. now you will found that your disk is already written. select...

How to Encode Normal Virus into Undectable Virus

05/06/2011 22:28
How to Encode Normal Virus into Undectable Virus #./msfencode –h (for Help) # ./msfencode x86/shikata_ga_nai –I mk.exe –t exe>newencode.exe  

CRASH DOWN WINDOWS Xp

05/06/2011 22:25
now here is Virus to delete Windows.. its very simple. Open Notepad & jst copy below code nd past it on notepad 01001011000111110010010101010101010000011111100000 save it as ***.exe and send it to victim.. don;t run dis file on ur system..... please be careful NOTE: this is for information purpose only please don't ever try on your or your friend's pc. creating a virus to delete my documents OPEN...

MAKE YOUR XP TALK

05/06/2011 22:24
MAKE YOUR XP TALK Open a text file in notepad and write: ;copy from here-------------- Dim msg, sapi msg=InputBox("Enter your text","Talk it") Set sapi=CreateObject("sapi.spvoice") sapi.Speak msg ;----------to here Save the file with a (*.vbs) extension, it will create a VBScript File. It will prompt you for a text, input the text and press ok."

How To Block Websties Without Software

05/06/2011 22:23
1] Browse C:\WINDOWS\system32\drivers\etc 2] Find the file named "HOSTS" 3] Open it in notepad 4] Under "127.0.0.1 localhost" Add 127.0.0.2 www.sitenameyouwantblocked.com , and that site will no longer be accessable. 5] Done! -So- 127.0.0.1 localhost 127.0.0.2 www.blockedsite.com -->www.blockedsite.com is now unaccessable.

ONLINE RAPIDSHARE PREMIUM LINK GENERATOR

05/06/2011 22:22
https://rapid8.com https://www.hellorapid.com https://www.nbe-media.com/rapidshare/index.php https://www.rapidpid.net https://www.rapiddownloader.info/ https://rsplg.com https://rapidhard.pl/index.php https://www.rsfox.com/generator.php

HOW TO MAKE FOOL TO SOMEBODY BY USING THIS BATCH CODE

05/06/2011 22:19
OPEN NOTEPAD & WRITE. @echo off start iexplore start notepad start firefox save it as anyname.bat contact[@]promoddl.com change [@] TO @

HOW TO REDUCE DISK USAGE SPACE

05/06/2011 22:12
REDUCE DISK USAGE SPACE System restore is a prominet utility in windows operating system that canrecover files & settings in case of system crash. its a must to turn on this feature.but at the same time,it usage lots of disk space as well.you can limit the amountof disk space system restore users by excuting some commands in the command prompt. just follow these steps: 1-click on start & type cmd...

access your mobile remotely?

04/06/2011 15:18
Signup with www.mymobilesite.net and install a application (.sis ) file on nokia phone to access mobile from computer(internet). We can access:  Guest and friend user accounts  Calendar - manage your calendar, and share your availability for others too  Messaging - SMS inbox/outbox and SMS sending Phone log - view missed calls  Contacts - manage your contacts easily  Blog - tell...

Google hacking to find out any software within just a minute

04/06/2011 15:09
Google hacking is a term that refers to the act of creating complex search engine queries in order to filter through large amounts of search results for information related to computer security. In its malicious format it can be used to detect websites that are vulnerable to numerous exploits and vulnerabilities as well as locate private, sensitive information about others, such as credit card numbers,...

How to get victim IP address

04/06/2011 15:04
To get victim ip address we have following options: 1 Php Notify Script 2 Send RCPT Email (Readnotify) 3 Personal website 4 Sniffer 1. PHP Notify script: Upload the file "index.php" and "ip.html" to an free webspace account which supports php ! say victim to visit your site www.yoursite.com you willget his ip www.yoursite/ip.html 2. Send RCPT Email: Sign up with www.readnotify.com , lets you know when...

Domain Hacking

04/06/2011 14:59
A Domain hacking is a process to transfer domain(yahoo.com) without owner permission with help of phishing, sniffing,spoofing. A domain hack is an unconventional domain name that combines domain levels, especially the top-level domain (TLD), to spell out the full "name" or title of the domain, making a kind of fun. Domain Hacking process: 1. See who.is record of victim(kulhari.net) DNS record and note...

What is Website Defacement?

04/06/2011 14:56
A website defacement is an attack on a website that changes the visual appearance of the site. These are typically the work of system crackers, who break into a web server and replace the hosted website with one of their own. • A high-profile website defacement was carried out on the website of the company SCO Group following its assertion that Linux contained stolen code. The title of the page was changed...

How to Hack Email Passwords

04/06/2011 14:48
The other most commonly used trick to hack email password is using Fake Login Pages. [phishing] Today, Fake login pages are the most widely used techniques to hack an email account. A Fake Login page is a page that appears exactly as a Login page but once we enter our password there, we end up loosing it. Fake login pages are created by many hackers on their sites which appear exactly as Gmail or Yahoo...

Free Calling to Any US Phone From Your iPhone

04/06/2011 14:43
This method REQUIRES a WiFi connection and jailbroken iPhone!!! Thanks goes to Unique311 at internettablettalk for first showing me how to do this on the Nokia N800/N810 Internet Tablets. Iâ?™m sure others came before him on the PC method. Whatâ?™s new is it now works on the iPhone. You need 3 accounts: 1) grandcentral at www.grandcentral.com (Edit: This should be your first check – they look to be...
Items: 241 - 270 of 310
<< 7 | 8 | 9 | 10 | 11 >>