Wednesday, January 21, 2015

Sql_Injection

 

Sql_Injection_List: "/lire.php?rub=" "/os/pointer.php?url=" "Book.asp?bookID=" "BookDetails.asp?ID=" "Browse_Item_Details.asp?Store_Id=" "GetItems.asp?itemid=" "List.asp?CatID=" "OrderForm.asp?Cart=" "Select_Item.asp?id=" "Services.asp?ID=" "ShopSearch.asp?CategoryID=" "StoreRedirect.asp?ID=" "Store_ViewProducts.asp?Cat=" "ViewProduct.asp?misc=" "WsAncillary.asp?ID" "add-to-cart.asp?ID=" "add.asp?bookid=" "addItem.asp" "addToCart.asp?idProduct=" "add_cart.asp?num=" "addcart.asp?" "addtomylist.asp?ProdId=" "adminEditProductFields.asp?intProdID=" "advSearch_h.asp?idCategory=" "affiliate-agreement.cfm?storeid=" "affiliate.asp?ID=" "affiliates.asp?id=" "ancillary.asp?ID=" "archive.asp?id=" "article.asp?id=" "aspx?PageID" "basket.asp?id=" "book_list.asp?bookid=" "book_view.asp?bookid=" "browse.asp?catid=" "browse_item_details.asp" "buy.asp?" "buy.asp?bookid=" "bycategory.asp?id=" "cardinfo.asp?card=" "cart.asp?action=" "cart.asp?cart_id=" "cart.asp?id=" "cart_additem.asp?id=" "cart_validate.asp?id=" "cartadd.asp?id=" "cat.asp?iCat=" "catalog.asp" "catalog.asp?CatalogID=" "catalog_item.asp?ID=" "catalog_main.asp?catid=" "category.asp" "category.asp?catid=" "category_list.asp?id=" "categorydisplay.asp?catid=" "checkout.asp?UserID=" "checkout.asp?cartid=" "checkout1.asp?cartid=" "checkout_confirmed.asp?order_id=" "comersus_listCategoriesAndProducts.asp?idCategory =" "comersus_optEmailToFriendForm.asp?idProduct=" "comersus_optReviewReadExec.asp?idProduct=" "comersus_viewItem.asp?idProduct=" "comments_form.asp?ID=" "contact.asp?cartId=" "content.asp?id=" "customerService.asp?TextID1=" "default.asp?catID=" "description.asp?bookid=" "details.asp?BookID=" "details.asp?Press_Release_ID=" "details.asp?Product_ID=" "details.asp?Service_ID=" "display_item.asp?id=" "displayproducts.asp" "downloadTrial.asp?intProdID=" "emailToFriend.asp?idProduct=" "emailproduct.asp?itemid=" "events.asp?ID=" "faq.asp?cartID=" "faq_list.asp?id=" "faqs.asp?id=" "feedback.asp?title=" "folder.php?id=" "freedownload.asp?bookid=" "fullDisplay.asp?item=" "getbook.asp?bookid=" "giftDetail.asp?id=" "help.asp?CartId=" "home.asp?id=" "id=" & intext:"Warning: Unknown() "id=" & intext:"Warning: array_merge() "id=" & intext:"Warning: filesize() "id=" & intext:"Warning: getimagesize() "id=" & intext:"Warning: ilesize() "id=" & intext:"Warning: is_writable() "id=" & intext:"Warning: mysql_fetch_array() "id=" & intext:"Warning: mysql_fetch_assoc() "id=" & intext:"Warning: mysql_num_rows() "id=" & intext:"Warning: mysql_query() "id=" & intext:"Warning: mysql_result() "id=" & intext:"Warning: pg_exec() "id=" & intext:"Warning: preg_match() "id=" & intext:"Warning: require() "id=" & intext:"Warning: session_start() "index.asp?ID=" "index.asp?cart=" "index.asp?cartID=" "index.php?Language=" "index.php?body=" "index.php?canal=" "index.php?go=" "index.php?langc=" "index.php?screen=" "index1.php?=" "index1.php?choix=" "index1.php?menu=" "index2.php?DoAction=" "index2.php?ascii_seite=" "index2.php?p=" "info.asp?ID=" "item.asp?eid=" "item.asp?item_id=" "item.asp?itemid=" "item.asp?model=" "item.asp?prodtype=" "item.asp?shopcd=" "itemDesc.asp?CartId=" "item_details.asp?catid=" "item_list.asp?maingroup" "item_show.asp?code_no=" "itemdetail.asp?item=" "itemdetails.asp?catalogid=" "kb_constants.php?module_root_path=" "learnmore.asp?cartID=" "lib/gore.php?libpath=" "links.asp?catid=" "list.asp?bookid=" "listcategoriesandproducts.asp?idCategory=" "modline.asp?id=" "myaccount.asp?catid=" "news.asp?id=" "order.asp?BookID=" "order.asp?id=" "order.asp?item_ID=" "page.asp?PartID=" "pages.php?page=" "payment.asp?CartID=" "pdetail.asp?item_id=" "powersearch.asp?CartId=" "price.asp" "privacy.asp?cartID=" "prodView.asp?idProduct=" "prodbycat.asp?intCatalogID=" "prodetails.asp?prodid=" "prodlist.asp?catid=" "product.asp?bookID=" "product.asp?intProdID=" "productDetails.asp?idProduct=" "productDisplay.asp" "product_info.asp?item_id=" "productinfo.asp?item=" "productlist.asp?ViewType=Category&CategoryID= " "productpage.asp" "products.asp?ID=" "products.asp?keyword=" "productsByCategory.asp?intCatalogID=" "products_category.asp?CategoryID=" "products_detail.asp?CategoryID=" "promo.asp?id=" "promotion.asp?catid=" "pview.asp?Item=" "resellers.asp?idCategory=" "results.asp?cat=" "savecart.asp?CartId=" "search.asp?CartID=" "searchcat.asp?search_id=" "shippinginfo.asp?CartId=" "shop.asp?a=" "shop.asp?action=" "shop.asp?bookid=" "shop.asp?cartID=" "shop_details.asp?prodid=" "shopaddtocart.asp" "shopaddtocart.asp?catalogid=" "shopbasket.asp?bookid=" "shopbycategory.asp?catid=" "shopcart.asp?title=" "shopcreatorder.asp" "shopcurrency.asp?cid=" "shopdc.asp?bookid=" "shopdisplaycategories.asp" "shopdisplayproduct.asp?catalogid=" "shopdisplayproducts.asp" "shopexd.asp" "shopexd.asp?catalogid=" "shopping_basket.asp?cartID=" "shopprojectlogin.asp" "shopquery.asp?catalogid=" "shopremoveitem.asp?cartid=" "shopreviewadd.asp?id=" "shopreviewlist.asp?id=" "shoptellafriend.asp?id=" "shopthanks.asp" "shopwelcome.asp?title=" "show.php?page=" "showStore.asp?catID=" "show_item.asp?id=" "show_item_details.asp?item_id=" "showbook.asp?bookid=" "shprodde.asp?SKU=" "specials.asp?id=" "store-details.asp?id=" "store.asp?id=" "store_bycat.asp?id=" "store_listing.asp?id=" "storefront.asp?id=" "storefronts.asp?title=" "storeitem.asp?item=" "subcategories.asp?id=" "tek9.asp?" "template.asp?Action=Item&pid=" "template.php?goto=" "topic.asp?ID=" "tuangou.asp?bookid=" "type.asp?iType=" "updatebasket.asp?bookid=" "updates.asp?ID=" "video.php?content=" "view.asp?cid=" "view.php?page=" "viewCart.asp?userID=" "viewCat_h.asp?idCategory=" "viewPrd.asp?idcategory=" "view_cart.asp?title=" "view_detail.asp?ID=" "viewcart.asp?CartId=" "viewevent.asp?EventID=" "viewitem.asp?recor=" "voteList.asp?item_ID=" "whatsnew.asp?idCategory=" *.php?catch= *.php?f= *.php?go= *.php?include= *.php?inf= *.php?layout= *.php?load= *.php?loc= *.php?locate= *.php?mode= *.php?naam= *.php?name= *.php?pg= *.php?place= *.php?secc= *.php?sel= *.php?session=&content= */newbb/print.php?forum=*topic_id=*" */newbb_plus/*=" */news/archive.php?op=*year=*month=*" */tsep/include/colorswitch.php?tsep_config[absPath]=*" *coppercop/theme.php?THEME_DIR= *default.php?body= *default.php?body= *default.php?page= *default.php?page= *inc*.php?addr= *inc*.php?adresa= *inc*.php?base_dir= *inc*.php?body= *inc*.php?c= *inc*.php?category= *inc*.php?doshow= *inc*.php?ev= *inc*.php?get= *inc*.php?i= *inc*.php?inc= *inc*.php?incl= *inc*.php?include= *inc*.php?j= *inc*.php?k= *inc*.php?ki= *inc*.php?left= *inc*.php?link= *inc*.php?m= *inc*.php?menu= *inc*.php?modo= *inc*.php?open= *inc*.php?pg= *inc*.php?rub= *inc*.php?showpage= *inc*.php?sivu= *inc*.php?start= *inc*.php?str= *inc*.php?to= *inc*.php?type= *inc*.php?y= *inc/header.php/step_one.php?server_inc= *inc/pipe.php?HCL_path= *include/new-visitor.inc.php?lvc_include_dir= *include/write.php?dir= *includes/header.php?systempath= *index.php?arquivo= *index.php?arquivo= *index.php?url= *index.php?url= *inst/index.php?lng=../../include/main.inc&G_PATH= *mwchat/libs/start_lobby.php?CONFIG[MWCHAT_Libs]= *pivot/modules/module_db.php?pivot_path= *support/mailling/maillist/inc/initdb.php?absolute_path= *zentrack/index.php?configFile= .br/index.php?loc= .gov.br/index.php?arquivo= .php?Page_ID=" .php?S=" .php?_REQUEST=&_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=" .php?a=" .php?abrir=" .php?act=" .php?action=" .php?ad=" .php?archive=" .php?area=" .php?article=" .php?b=" .php?back=" .php?base=" .php?basedir=" .php?bbs=" .php?board_no=" .php?body=" .php?c=" .php?cal_dir=" .php?cat=" .php?category=" .php?choice=" .php?class=" .php?club_id=" .php?cod.tipo=" .php?cod=" .php?conf=" .php?configFile=" .php?cont=" .php?corpo=" .php?cvsroot=" .php?d=" .php?da=" .php?date=" .php?debug=" .php?debut=" .php?default=" .php?destino=" .php?dir=" .php?display=" .php?east=" .php?f=" .php?f_content=" .php?file=" .php?file_id=" .php?filepath=" .php?flash=" .php?folder=" .php?for=" .php?form=" .php?formatword=" .php?from=" .php?funcao=" .php?function=" .php?g=" .php?get=" .php?go=" .php?gorumDir=" .php?goto=" .php?h=" .php?headline=" .php?i=" .php?inc=" .php?include=" .php?includedir=" .php?inter=" .php?item_id=" .php?itemid=" .php?j=" .php?join=" .php?jojo=" .php?l=" .php?la=" .php?lan=" .php?lang=" .php?lest=" .php?link=" .php?load=" .php?loc=" .php?m=" .php?main=" .php?meio.php=" .php?meio=" .php?menu=" .php?menuID=" .php?mep=" .php?mid=" .php?month=" .php?mostra=" .php?my=" .php?n=" .php?name=" .php?nav=" .php?new=" .php?news=" .php?next=" .php?nextpage=" .php?o=" .php?op=" .php?open=" .php?option=" .php?origem=" .php?p=" .php?pageurl=" .php?para=" .php?part=" .php?perm=" .php?pg=" .php?pid=" .php?place=" .php?play=" .php?plugin=" .php?pm_path=" .php?pollname=" .php?post="

Tuesday, January 20, 2015

AnDroid Mobile Codes.

 

AnDroid Mobile Codes.. ‪#‎AdminPost‬ 1. Phone Information, Usage and Battery – *#*#4636#*#* 2. IMEI Number – *#06# 3. Enter Service Menu On Newer Phones – *#0*# 4. Detailed Camera Information – *#*#34971539#*#* 5. Backup All Media Files – *#*#273282*255*663282*#*#* 6. Wireless LAN Test – *#*#232339#*#* 7. Enable Test Mode for Service – *#*#197328640#*#* 8. Back-light Test – *#*#0842#*#* 9. Test the Touchscreen – *#*#2664#*#* 10. Vibration Test – *#*#0842#*#* 11. FTA Software Version – *#*#1111#*#* 12. Complete Software and Hardware Info – *#12580*369# 13. Diagnostic Configuration – *#9090# 14. USB Logging Control – *#872564# 15. System Dump Mode – *#9900# 16. HSDPA/HSUPA Control Menu – *#301279# 17. View Phone Lock Status – *#7465625# 18. Reset the Data Partition to Factory State – *#*#7780#*#* 19. Format Your Device To Factory State(will delete everything on your phone) – *2767*3855# 20. Hidden Service Menu For Motorola Droid – ##7764726 Chat conversation end

Sunday, January 4, 2015

http://murgee.com

http://murgee.com

Dual Monitor Software, Auto Clicker, Mouse Cursor Automation Utilities and more

Download and get information about Dual Monitor Software, Hardware Requirements about setting up Multiple Monitors. Download Mouse automation utilities such as Auto Clicker to automatically keep mouse cursor clicking, Auto Typer to type automatically on Keyboard, Mouse Mover to keep Mouse Cursor Moving, Auto Mouse Click to create and run Mouse Click Scripts and more Software Downloads. For quick information about all the softwares available, please do have a look at the Site map or browse software downloads with screenshots and detailed information below.

Mouse Automation Software Downloads : Auto Clicker to keep mouse clicking, Auto Typer to type on keyboard, Auto Mouse Clicker is a Mouse Automation Software, Use Auto Mouse Click to automatically click mouse with a script, Auto Mouse Mover to keep mouse moving.

Dual Monitor / Display Software : MurGeeMon

Screenshot of Dual Display Software UtilityMurGeeMon is a Dual Monitor Software providing various useful features for Dual Monitors / Displays. MurGeeMon allows greater control over your Dual Monitors connected to your Computer. You can easily change Monitor Background / Wallpaper, Configure Monitor Settings, Control Power State of Dual Monitors and much more. Many features of the software work for multi monitor windows computer as well such as moving window across monitor, turning off all monitors with a single shortcut and many other features which can be used readily with triple or quad monitor windows computer.System Tray menu to control dual monitors

Download MurGeeMon (A Dual Display Software) and try it for Free or read more about the Dual Monitor Software. Changing background of second / secondary monitor was never so easy. Download Dual Monitor Software utility and use different wallpaper on each desktop easily and quickly.

The Dual Monitor Software presented here is targetted towards providing all the functionalities to control dual monitors. As wallpaper is an integral part of every monitor, so can be the Screen Saver. Now by using LogOn ScreenSaver Changer which is an addon for the Dual Monitor Software presented here, you can easily control the Screen Saver that is displayed by Windows Operating System when you have not logged onto the computer.

Have a look at original size Screen Shots of the Dual Monitor Software. The Screen Shots are of original size to give you an idea about the Software before downloading the Dual Monitor Software.

 

Auto Mouse Click

Auto Mouse Click Editor to view, add, and edit mouse clicksAuto Mouse Click Software Utility to auto mouse click mouse at defined location. Use Auto Mouse Click Software utility to automatically click left or right button of mouse. Read more about Auto Mouse Click software utility. Download the Auto Mouse Click Utility Now now and automate mouse clicks.

Automate Left Button click of mouse, Right button click of mouse and even simulate double mouse clicks with this Auto Mouse Click Software Utility. Select X and Y co-ordinates with a simple hot key press. Save mouse clicks in a file at location of your choice. Drag the mouse clicks file onto the application to load saved mouse clicks and much more in the Auto Mouse Click.

In case you do have Dual Monitors connected to your computer or a single monitor with big resolution, you can even go for another software named Auto Mouse Clicker which is another software with a big window to allow you to create and execute mouse automation scripts. Auto Mouse Clicker comes with in built way to run Auto Mouse Clicker Step by Step and allows you to enter a comment for every Mouse Click. The System Wide HotKey combinations can be used to automate many functions of Auto Mouse Clicker.

 

Mouse Click

Screenshot displays how to auto mouse click, whether it is left or right button single or double clickMouse Click Software Utility to auto mouse click. Mouse Click allows to automate left button click of mouse, right button click of mouse, single or double mouse clicks easily with command line parameters. Mouse Click software can not only automate mouse clicks, but can also return mouse cursor to it's original location after clicking the mouse. Download and evaluate the software utility for free, the evaluation version of the software utility works without any nagging pop ups or reminders.

Download Mouse Click now and save precious time by automating repetitive mouse clicks.

 

Timer ScreenSaver

The Screenshot displays available configurable options for the Timer ScreenSaverTimer ScreenSaver is a Screen Saver to display a digital timer on your computer screen and save the Computer Screen(s) by turning them off after configurable duration / idle minutes. Timer ScreenSaver enjoys all the benefits of a normal Screen Saver which include setting up a password to prevent unauthorized access to your computer, easy configurable options from control panel and small file size to download and install.

Download Timer ScreenSaver now and get a digital countdown timer on your desktop.

The timer display of Timer ScreenSaver can be of two types as displayed in the screenshot. One option is to display actual idle time and second is to display the time for which the ScreenSaver is running. In case you select Idle Time, then the actual time for which the computer has been left idle will be displayed. Idle Time termed here is the time duration for which there has been no user input. However in case you select Timer as the option to display, then the timer countdown will start from the time when ScreenSaver is launched.

Timer ScreenSaver has currently not been tested on Dual Display and Multiple Monitors connected to a single computer. In case you do opt for turning off display after configurable minutes, all the monitors / displays connected to the computer would be turned off by the ScreenSaver. The Timer ScreenSaver works on Windows Operating System (Windows XP, Vista and 7).

 

Screen Saver

Screenshot displays settings to configure MurGee Screen SaverMurGee ScreenSaver can save screen by turning it off after inactivity. MurGee Screen Saver can be easily configured from Windows Screen Saver properties control panel item. After defined time out, MurGee Screen Saver will be activated as any other screens saver, however this screen saver can save you power, electricity and computer screen.

Download MurGee Screen Saver now and start saving your computer screen by turning it off. The ScreenSaver can be used to log off signed on user, shutdown computer and hibernate computer as well. The ScreenSaver can be useful to add a little bit of more security as you govern, what should be done when nobody is using computer and the computer is left idle. Click on the image at left to find out more about the screensaver.

In case you have setup dual displays or multiple monitors for your computer, this ScreenSaver will turn off all of the monitors connected to your computer.

 

Auto Mouse Mover

Auto Mouse Mover Utility's Main ScreenAuto Mouse Mover is a Free to try Software Utility to move Mouse Cursor automatically without human intervention. Moving Mouse Automatically can be useful to prevent your computer from entering into idle state and hence idle actions defined in control panel will not come into effect. One Example of Idle Action may be to Hibernate Computer, if Computer is left idle for 20 Minutes. Click on Auto Mouse Mover or Screenshot of Auto Mouse Mover to find out more information about the mouse utility.

Download and try Auto Mouse Mover for free and Automate Mouse Cursor Movements with a Single Click to Launch the Auto Mouse Utility.

 

Network Controller

Main Screen of Network ControllerNetwork Controller to allow you to control network connections easily and quickly. Use Toggle LAN Desktop Shortcut to Enable or Disable connected or disconnected LANConnections. View List of available Network Connections or Toggle LAN State with a button press.Desktop Shortcut to Enable or Disable Windows LAN Connections

Screenshot shows Network Controller running on Windows Vista on a Laptop. The List displays two available Network Connections. One of the available Network Connection is a LAN (Local Area Network) Connection, which is used to access internet. Other available network connection displayed is a Wireless Network Connection which does not have any available Wireless connection and hence the state of the Network Connection displays media Disconnected.

The button Labelled Toggle LAN State when pressed would disconnect already connected Network Connections, which is the LAN Connection in the figure. The button press would not change the state of Wireless Network Connection as it is not in connected state. Another button press would again toggle the LAN State. Once the LAN is connected / disconnected with the button press, list of network connections would be refreshed after 3 seconds to reflect the Network Connections state.

Network Controller setup can also install a Desktop Shortcut to Enable / Disable LAN Connections. Network Controller would require admin privileges to run as the changes done would affect all users of the Windows Computer. Network Controller has been tested on Windows XP, Windows Vista, and Windows 7.

Download Network Controller and Enable / Disable LAN Connections easily with Shortcut on Desktop and view available Network Connections in the main window of Network Controller.

 

Logon Controller

Download Logon ControllerChange Windows 7 Logon Screen to any selected jpg image file. Click on any of the thumbnails to set the image as Windows 7 Login Background. You can revert back to Original Windows 7 Login Screen with a Single Click. Lock Computer or Workstation to Verify the Changes done to the Windows 7 Login Screen. 
Download Windows 7 Logon Controller and change / configure Windows 7 Login Background to any selected jpg image file.

 

Online Radio for Desktop

Listen to your favorite Online Channels from Internet with Desktop Software Utilities. Download World Radio English Radio or Hindi Radio Software Utility on you Desktop and listen to Online Radio Channels and Watch Online TV channels straight from your Desktop. The Software Utilities allows easy navigation, selection and control of Online Radio and TV Channels. The List of channels available spans variety of genres including Hollywood Radio Channels, Bollywood Channels, News Channels, Entertainment Channels, Bhajan , and other Channels. World Radio provides various English, Hindi and other Languages Radio and Television Channels. Indian Current List of Languages include Hindi, Urdu, Punjabi, Tamil and more Indian Language Channels.

Auto Clicker and Auto Typer

Give your fingers some rest and let the automation utilities do some work. The Mouse Cursor Automation Software named Auto Clicker can be used to automate Mouse Cursor Clicking. Use Auto Clicker to start or stop mouse cursor clicking with configurable shortcut key. Easily configurable delay of upto milliseconds will give you total control of automatic mouse clicking.

In case you are looking forward to automate typing on keyboard, Auto Typer can be of use. With Auto Typer Software Download you can automate repetitive typing on keyboard. You can even automate special keyboard keys such as Enter, Tab, etc.

Multiple Monitors

Multiple Monitors document provides information about setting up and using Multiple Monitors to your computer. The document describes uses, limitations, requirements, display modes and much more. Navigate to the link mentioned at the beginning of this paragraph to start your journey into the world of multiple monitors to give you performance benefits, offer time savings and much more.

 

8 Good Password Cracking Tools For You

 

8 Good Password Cracking Tools For You 1.RainbowCrack RainbowCrack is a general propose implementation of Philippe Oechslin's faster time-memory trade-off technique. It crack hashes with rainbow tables. RainbowCrack uses time-memory tradeoff algorithm to crack hashes. It differs from brute force hash crackers. 2.NTAccess NTAccess can replace the administrator password of a Windows NT, Windows 2000, Windows XP, Windows Server 2003 or Windows Vista 32-Bit system by rebooting the computer with a special set of boot disks. This is useful if you forgot the administrator password and cannot access the Windows NT/2000/XP/Server 2003/Vista system. 3.NetBIOS Auditing Tool The intention of this package is to perform various security checks on remote servers running NetBIOS file sharing services. 4.Proactive System Password Recovery Proactive System Password Recovery (PSPR; formerly known as Advanced Windows Password Recovery) is a program to recover most types of Windows passwords. Other information that could be recovered by AWPR is LSA Secrets; the program also allows to run any programs in other user's context, show password history hashes, read password hashes from SAM and SYSTEM files, perform brute-force and dictionary attacks on Windows 9x PWL files, and decrypt product ID and CD key for Windows and Microsoft Office installations. 5.Proactive Password Auditor Proactive Password Auditor helps network administrators to examine the security of their networks by executing an audit of account passwords. By exposing insecure passwords, Proactive Password Auditor demonstrates how secure a network is under attack. 6.Password Safe Whether the answer is one or hundreds, Password Safe allows you to safely and easily create a secured and encrypted user name/password list. With Password Safe all you have to do is create and remember a single "Master Password" of your choice in order to unlock and access your entire user name/password list. 7.Pandora Pandora is a set of tools for hacking, intruding, and testing the security and insecurity of Novell Netware. It works on versions 4 and 5. Pandora consists of two distinct sets of programs -- an "online" version and an"offline" version. Pandora Online is intended to be used for direct attack against a live Netware 4 or 5 server. Pandora Offline is intended to be used for password cracking after you have obtained copies of NDS. 8.ophcrack Ophcrack is a free Windows password cracker based on rainbow tables. It is a very efficient implementation of rainbow tables done by the inventors of the method. It comes with a Graphical User Interface and runs on multiple platforms..

Control or CTRL commands or keyboard shortcuts for Windows

Control or CTRL commands or keyboard shortcuts for Windows

CTRL commands or keyboard shortcuts for Windows computer RECOMMENDED: Click here to fix Windows errors and optimize system performance The Control or Ctrl key is normally found in the bottom left and right  corners of any keyboard in a Windows computer. When used in combination with other keys, it can perform many useful functions. For instance in Windows 8.1, when you click Ctrl + Alt + Delete together, you are presented with a screen with the following options: Lock this computer, Switch User, Log Off, Change a password and Task Manager. CTRL commands in Windows The Ctrl key keyboard shortcuts may perform a function in a browser and maybe another in a word processor. Let us have a look at some of the important one’s. Ctrl+A : Select All objects Ctrl+B : Bold highlighted text Ctrl+C : Copy selected objects Ctrl+D : Bookmark open web page Ctrl+E : Center text Ctrl+F : Open Find window Ctrl+G : Open Favorites sidebar in IE. Opens Find and Replace in Word Ctrl+H : Open Find and Replace in Microsoft Word. Ctrl+I : Make text Italics Ctrl+J : Opens View downloads in IE browsers Ctrl+K : Create hyperlink for selected text in Word Ctrl+L : Select address in address bar in browser. Left align text in Word Ctrl+M : Indent selected text in word processors Ctrl+N : Create New instance of the document or program Ctrl+O : Open a new file Ctrl+P : Open print window Ctrl+R : Reload page in browser. Right align text in Word Ctrl+S : Save document Ctrl+T : Create a new tab in IE Ctrl+U : Underline selected text Ctrl+V : Paste copied objects Ctrl+W : Close tab in IE or Word document Ctrl+X : Cut selected object Ctrl+Y : Redo the ‘Undo’ action. Ctrl+Z : Undo any action Ctrl+Esc : Open Start Screen or Start Menu Ctrl+Tab : Switch to the next child window of a Multiple Document Interface (MDI) program Ctrl+Shift+Esc    : Opens Task Manager in Windows 8 Ctrl+WinKey+F  : Opens Find computer box Ctrl+Alt+Del       : Opens screen to Lock, Switch users, etc. Let me know if I have erred somewhere or missed out something. Keyboard junkies may want to have a look at these posts too: Complete Windows 7 Keyboard Shortcuts eBook Ultimate List Of Windows 8 Keyboard Shortcuts New keyboard shortcuts in Windows 8.1 Internet Explorer Keyboard Shortcuts Windows 8 Explorer Keyboard Shortcuts List of WinKey Shortcuts. 5 Related Posts: Windows 8 Explorer Keyboard Shortcuts Ultimate List Of Windows 8 Keyboard Shortcuts The Complete Windows 7 Keyboard Shortcuts eBook Useful Keyboard Shortcuts for Internet Explorer New keyboard shortcuts in Windows 8.1

http://www.taqafa2.com/2014/12/2014-2014.html

http://www.taqafa2.com/2014/12/2014-2014.html

 

http://www.taqafa2.com/2014/12/20-mega.html

 

 

 

السلام  عليكم
يعاني الكثير من بطا الانترنيت و عدم قدرته على مشاهدة اونلين او ما شبه
اليوم معي الحل 
تدخل على الموقع التالي :   
ثم تضع رابط  البث المباشرة او موقع المباريات او اي شيء و اي موقع  و تضغط go
 
مثل الصورة التالية 

 

http://www.taqafa2.com/2014/11/blog-post_96.html

http://www.taqafa2.com/2014/11/blog-post_96.html

 

https://www.youtube.com/watch?v=qPOfHAvDffc

Published on Jan 4, 2015 ㋡═☞㋡═☞㋡═☞【 إشترك للمزيد】☜═㋡☜═㋡☜═㋡ رابط حسابي لتواصل : http://goo.gl/1iv2xa رابط الصفحتي : http://goo.gl/yPgdDu ㋡═☞㋡═☞㋡═☞【 إشترك للمزيد】☜═㋡☜═㋡☜═㋡ جميع مواقع : http://whois.domaintools.com/tsu.co http://www.whoishostingthis.com/?q=ts... http://www.yougetsignal.com/tools/web... http://techcrunch.com/2014/07/23/face... http://www.th3professional.com/2014/1... ㋡═☞㋡═☞㋡═☞【 إشترك للمزيد】☜═㋡☜═㋡☜═㋡
https://www.youtube.com/watch?v=qPOfHAvDffc

http://youtu.be/CfpvpPkzHdc?list=UUwib50qQKHllSXfeDj3SpZQ

http://youtu.be/CfpvpPkzHdc?list=UUwib50qQKHllSXfeDj3SpZQ

 

http://internet-satellite.blogspot.nl/2010/02/how-to-hack-satellite-internet.html

http://internet-satellite.blogspot.nl/2010/02/how-to-hack-satellite-internet.html

 

The Most Out Of Your iPhone

 

Tips For Getting The Most Out Of Your iPhone If you have just recently picked up an iPhone and got yourself set up, you’re probably wondering what to do next. There is a mighty selection of apps, activities and attractions to get you going and keep you busy. But where do you start? The first thing you’ll probably want to get sorted is what you can use your phone to do and what limits your handset has. One of the main pieces of kit that make this phone so much better than its predecessors is the A6 processor chip. Because of this you will notice that everything you do on your phone is twice as fast as the iPhone 4s including the CPU performance that controls graphics and loading times. The processor also ensures your battery life is much more efficient, but before you immediately plug in your new toy to charge it up let the initial charge go down. This will help to improve the long term health of your battery life – a little trick not many people know – which can be helpful if you chose to change your phone again in the near future. Most of us are now continually connected to the internet for one reason or another. Apple has now made this much easier with LTE and HSPA, HSPA+ and DC – HSDPA. These two make sure that your connection is super-fast. Built for speed the LTE technology is optimized to offer you a better battery life on a thinner phone. The next generation in mobile internet allows dual- band 802.11n wireless connectivity meaning ultrafast connections wherever you are. Although if you want to keep your monthly bills down try to stay connected to Wi-Fi most of the day. Those of you who like to get your online casino games going also have a place to play at www.ipadcasino.co.nz. The 4inch retina display offers a larger, brighter (326 pixels per inch) and more reactive screen for gamers and teamed with the A6 processor that loads graphics and sites 2x faster this really is the prefect phone for gaming. To ensure your slots game doesn’t drop mid spin, its best to connect to Wi-Fi and if that drops you’ve got your mobile internet as back up. If you like you’re seeing the roulette graphics at their finest then you’ll want to keep your brightness up. But if battery life is more of a priority when playing, keep the brightness low and you’ll be gaming for hours. Stick to all these tips to get the most from your iPhone through day to day usage and it’ll improve your experience. You’ll grow to love your phone even more.

https://www.youtube.com/watch?v=RCgIdfuQAD4

https://www.youtube.com/watch?v=RCgIdfuQAD4

 

Protect From Virus

 

Protect From Virus 

1.Check a programme from virus before you download. Visit for online testing (www.virustotal.com)
2.Turn on your firewall. Visit (www.comodo.com)
3.Always keep your software and antivirus updated.
4.Use dynamic IP address instead of static IP.
5.Use proxy or VPN which help to mask your IP address.
6.Do not sign in to untrusted website.
7.Do not download from unknown sources
8.Be aware from click jacking attack like make sure while click on like button etc… as this attack work on background of website and take over the complete control of PC.

HOW TO HACK WIFI WITH WINDOWS 7...

HOW TO HACK WIFI WITH WINDOWS 7...

Today I am going to show you how to a crack a Wp2-psk password with windows .

Software Requirement Are :-

1. CommView for Wifi .
2. Elcomsoft Wireless Security
Auditor .

First you need to be capture the
Wpa2, four-way handsake with
CommView.

- Open commView and click on the Start option.
- Then click on the capture option to start the capture process.
now it will show you all available AP ,
-Now click on the Tools > Select the Node Reassoication option (If Node Rassociation is not working , then use WiFi Alfa card )
- now select your target AP in the Send a deauthentication request from this AP option. it will show you all available client option.
- Click on the Send Now option to send the packet for 4-way
authentication. wait for some time so it will capture the packet.
- Then click on the Save option and choose your file format Commview Capture Files (*.ncf).

( You capture work is done.)

- Now open Elcomsoft Wireless
Security Auditor to crack your wifi password.
- Click on the Import Data tab > select the Import CommView Log option .
- It will show you information
about AP and Multiple Handshake selection information. Click on Ok.
- Now click on the Start attack option and select the Dictionary Attack option. However you have other attack options are available. 
- Now within minutes it will found your password and it will show you the password.

Hope you find it easy .


the software used are paid ,
but I'll try to post its cracked version soon.

http://adevarul.ro/tech/gadget/cum-afli-locul-ideal-pui-router-internet-casa--1_54a8ee1f448e03c0fd493b9a/index.html

http://adevarul.ro/tech/gadget/cum-afli-locul-ideal-pui-router-internet-casa--1_54a8ee1f448e03c0fd493b9a/index.html

 

[[New]] ~ iCloud

 

[[New]] ~ iCloud #icloudin first program I open any phone locked my iCloud first (full) make me break protection iCloud in the world. 100 100% server at the time of writing me a floating Prism which runs (because of his stopover there are companies and renowned companies made me give them FA was angered with the closure of the cerfrathm by the company almstdabfh) is this a coded account first server which runs find the news here @magd_ttmtt https://twitter.com/ravao Yemen head for the official site: http://icloudin.net/explanation of use: http://youtu.be/p51TNlCr7ug more information: http://eklimaljanad.com/news/?p=18534

Meaning of virus A software program that copies itself into another program,

 

Meaning of virus A software program that copies itself into another program, a hidden space on a drive, or items that support scrIPts. Most viruses copy only themselves, while a minority unleash a payload - actions caused by the virus. Payloads can damage files, deliver Trojan files, corrupt hard drives, display messages, or open other files. TYPES OF VIRUS 1.Hoax - An email that usually states that it is harming the computer, but does not actually do what it says. Some hoaxes ask the reader of the email to perform a damaging process, such as deleting an important file. Most hoaxes are spread by people who do not know that the email is a hoax and who are hoping to alert others to a potential virus. 2.A Trojan horse:, or Trojan-his in computing is a generally non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm. A Trojan often acts as a backdoor, contacting a controller which can then have unauthorized access to the affected computer. 3.Worms: A program or algorithm that replicates itself over a computer network and usually performs malicious actions, such as using up the computer's resources and possibly shutting the system down.

Saturday, January 3, 2015

Give a Foot Massage

 

Give a Foot Massage... Or Share to give a strong hint! http://www.wikihow.com/Give-a-Foot-Massage

Pescuitul in luna Ianuarie

 

Pescuitul in luna Ianuarie . Acum pestii pasnici si rapitori se gasesc la apa adanca, cu functiile vitale reduse la minimum. Indiferent cat de frig ar fi afara sa nu uitam ca la nivelul fundului apei temperatura este de min. 4 C (pentru un lac cu cel putin 2 m adancime sau chiar mai putin) datorita anomaliei pe care o prezinta densitatea apei in raport cu temperatura (densitatea maxima corespunde lui T = 4 C, deci "apa grea" este la fund). Totusi, in zilele insorite sau de moina, pescuitul poate da rezultate atat la copca cat si in apa libera. Babusca, in zilele insorite sau de moina, poate fi pescuita la fundul apei cu rame mici rosii, virmusi si mai ales libelule (viermi rosii de namol); Bibanul - la copca sau in apa libera poate fi pescuit la pestisor viu sau mort "jucat", ori dandineta, langa palcurile de stuf si radacini. Cu lanseta, pe timp friguros, sansele sunt slabe; sunt indicate naluci mici, oscilante, care permit o recuperare lenta; Carasul- se poate prinde la copca cu libelule, viermusi, rame; Cleanul - cade rar, la paine si branza topita, pe fundul apei, in locurile cu curent slab. In lacuri putin tulburi se pescuieste cu pestisor viu, sange inchegat, intestin de pasare, maduva de vaca; Mreana - se prinde foarte rar la buchet de viermusi, pe fund; Obletul - se poate pescui cu destule sanse la libelule, viermusi intre ape (spre fund), in locurile expuse la soare si adapostite; Porcusorii (pentru momeli vii) pot fi capturati usor cu rame mici, pe fund, in raurile inca libere; Scobarul - cade rar (cu exceptia iernilor blande cand se pot face partide de pescuit excelente), la cocolos de paine, viermusi, rame; Salaul - rar la copca, cu pestisori vii sau dandineta de forma lunguiata; Stiuca se prinde la copca, cu pestisor viu, la fund, ori cu dandineta. In apa libera la lanseta cu naluci, recuperate foarte incet deasupra fundului si pe langa maluri, insistandu-se mai mult in acelasi loc. Like · · Share 21 people like this. Write a comment... Iacomi Florin Cristian shared OMG Paradise's video. 9 hrs · 02:59 OMG Paradise ★OMG! 了不起 ! Like · · Share 6 people like this. Write a comment... Nhi Quỳnh Trương, Ĥéť Ĥéť Lêř and 10 others like Payoneer. Like Page Payoneer Sponsored · Save time and money on global payment collection. Withdraw your earnings via Prepaid Card or Local Bank Transfer. Online Freelancer? Payoneer is a leading provider of global payout solutions, offering a secure, simple & cost-effective way for companies to pay people and businesses WWW.PAYONEER.COM Guran Cosmin-costel Like · · Share · 3,3513868 Team OS updated their cover photo. 3 hrs · Guran Cosmin-costel Like · · Share · 15 Panorama with Gertjan Dalhuisen and Dennis Dalhuisen 18 hrs · Koekiemonster is blijkbaar de zanger bij Rammstein! See Translation 00:52 Guran Cosmin-costel 503,155 Views Like · · Share · 11,8492,2624,222 More Stories

http://trendibee.blogspot.in/2015/01/best-resources-for-start-new-project.html

http://trendibee.blogspot.in/2015/01/best-resources-for-start-new-project.html

 

http://www.vn-zoom.com/f229/tim-hieu-cac-ung-dung-lam-cham-ket-noi-internet-cua-ban-2938300.html

http://www.vn-zoom.com/f229/tim-hieu-cac-ung-dung-lam-cham-ket-noi-internet-cua-ban-2938300.html

 

Friday, January 2, 2015

http://www.hackersonlineclub.com/cross-site-scripting-xss

http://www.hackersonlineclub.com/cross-site-scripting-xss

 

http://www.hackersonlineclub.com/metasploit-tutorial/metasploit-cheatsheet

http://www.hackersonlineclub.com/metasploit-tutorial/metasploit-cheatsheet

 

http://www.codingame.com/start

http://www.codingame.com/start

 

http://www.pkhackingtricks.blogspot.ro

http://www.pkhackingtricks.blogspot.ro

TOP PAID ANDROID APPS,GAMES AND THEMES COLLECTION FREE DOWNLOAD

 

TOP PAID ANDROID APPS,GAMES AND THEMES COLLECTION FREE DOWNLOAD (JANUARY 2015) APPS:- AIVC (Alice) - Pro Version v3.4.apk ANDY Voice Assistant (PRO) v11.6x full.apk Adaptxt Keyboard v3.1.1.apk AirDroid - Best Device Manager v3.0 Beta.apk AndroVid Pro Video Editor v2.5.4.1.apk Animated Photo Frame Widget + v6.2.1.apk Anti Spy Mobile PRO v1.9.10.0 Patched.apk AntiVirus PRO Android Security v4.2.1.apk Any.do Task List & To-do List Premium v3.1.3.apk Archos Video Player v8.0.0.apk Atom Launcher v2.2.2.apk Autostarts v1.9.6.apk Battery Doctor (Battery Saver) v4.17 Build 4170046.apk Battery Monitor Widget Pro v3.2.2.apk Battery Stats Plus Pro v3.1.99.apk Calc+ PRO ? Powerful calculator v1.1.9 Proper.apk Call Recorder - ACR Premium v10.9.apk Camera FV-5 v2.33.apk Camera ZOOM FX Premium v5.5.0 Build 124 Update.apk CircleLauncher v3.2.apk Clock JB+ v1.4.1.apk Contacts + v3.30.6 (Plus).apk Diaro Pro - personal diary v3.8.2.apk Disco Light™ Pro v2.1.apk Droid Scan Pro PDF v6.0.1.apk Evernote Premium v6.3.apk Favtune Music Player Pro v1.6.0.apk File Manager HD (Explorer) Donate v2.3.0 build 20300205.apk Flipps HD - Movies, Music & TV v5.6.10.apk Floatifications FULL v1.7.3.apk GO Launcher EX Prime v5.11 beta 3.apk GSam Battery Monitor Pro v3.21 Final (Android 4.4+).apk Hide It Pro v4.2.1 [unlocked].apk InstaWeather Pro v3.9.8.apk K-9 Mail v5.103 alpha (K9Mail).apk LED Blinker Notifications v6.1.1.apk MX Player ARMv7+NEON Codec v1.7.34.apk MX Player Codec ARMv7 v1.7.34.apk MX Player Pro v1.7.35.nightly.20141206 Patched.apk Mantano Ebook Reader Premium v2.5.1.7 patched.apk Mobile Doc Scanner (MDScan) v3.00.06.apk Music Player for Android v4.1.0.7.apk My Budget Book v6.0.apk News 24 ? widgets v2.4.6 PRO.apk Notification Toggle Premium v3.3.3.apk OfficeSuite 8 Premium v8.1.2572 (Proper Modded).apk Open Camera v1.21.1.apk Paper Artist v2.0.7.apk Piano Melody Pro v129 Merry Christmas.apk Premium audio player v1.2.7-premium.apk Reddit News Pro v7.23.apk Root Uninstaller Pro v7.0.219.apk SCR Screen Recorder Pro ? root v0.19.13-alpha Patched.apk SMS Backup & Restore v3.4.0 [Ads Free].apk Shuttle+ Music Player v1.5.0-beta2.apk Sleep as Android FULL v20141210 build 958.apk Smart RAM Booster Pro v4.2.644.apk Solo Launcher - Smooth & Smart v1.9.9.7.apk Talon for Twitter v3.4.2.apk The Wonder Weeks v3.1.0-beta.apk Time Recording Pro v5.17.apk Titanium Backup Pro v6.2.0.1 MoDaCo Plus Patched.apk To-Do Calendar Planner+ v9.4.16.apk TouchDAW v1.5.2.apk Ultimate Guitar Tabs & Chords v3.9.5 [Unlocked].apk Vidstitch Pro - Video Collage v1.7.2.apk Vignette•photo effects v2014.12.apk Washington Manual of Surgery 6 v2.3.1.apk Weather based on NOAA (Pro) v1.13.0.apk WhatsApp+ v6.60D (MOD version).apk YoWindow Weather v1.2.13 Build 128.apk aVault Secure Documents Pro v1.0.apk franco.Kernel updater v12BETA build 385.apk iGest Premium - Gesture Launcher v2.5.0.8 Patched.apk GAMES:- Angry Birds v5.0.2 [Mod Money].apk Batman & The Flash Hero Run v2.0.3 [Mod Money].apk Battle Towers v2.9 (Mod Money).apk Best Fiends v1.0.7 [Unlimited Energy Gems].apk Block Story v9.3.4 (Unlimited Gems).apk Candy Crush Soda Saga v1.33.24.apk Cloud Raiders v5.0.apk Crazy Chicken Deluxe v2.6.3.apk DEER HUNTER 2014 v2.7.2 (Unlimited Money Unlocked).apk Diamond Digger Saga v1.8.1 [Unlimited Lives Boosters].apk Diner Dash v1.3.4 [Unlimited CoinsCash Energy].apk DirtyDices v2.2.94 [Mod Money].apk Farm Heroes Saga v2.16.15 [Unlimited Lives & Boosters].apk Farming Simulator v1.0.16 Mod Money.apk Fist Of Jesus v1.0.1 [Mod Money].apk Gods Rush v1.1.12 + [MOD].apk HorseWorld 3D My Riding Horse v2.2 (Mod Money Unlock).apk Hungry Shark Evolution v2.9.2 [Unlimited Money Diamonds].apk Jelly Splash v1.22.0 (Unlimited Money).apk Metal Earth The Gray Matter v3.1.1.apk Space Expedition v1.0.apk Temple Run 2 v1.12.1 [Mod Money].apk The Creeps! v1.15.09 [Mega Mod].apk Titan Empires v2.2.apk Tower Defense 2015 v1.01.apk Ultimate Sea Battle 3D v1.4.3 [Mod Money].apk War of Tanks Clans v1.0.3.apk THEMES:_ Flume UI v1.0.apk GlowPop Launcher Theme v1.0.apk Leaf Theme APEX NOVA ADW SMART v1.0.apk LessUgly CM11 Theme v2.2.1.apk Material Teal - CM11 Theme v3.0.apk Mianogen [L] - CM11PAMahdi v7.1.2.apk Mig Icon Pack Theme v1.0.0.apk NOTE 4 CM11 THEME v1.apk RedRabbit- Theme Engine v1.apk TRANZENDENCE CM11 THEME v2.3.apk Theme Crystal Black Flat HD v14.apk ================ [INSTALLATION PROCESS] ================ (1): Please use 7Zip/WinRAR/Universal Extractor to EXTRACT FILES (2): Copy and paste to extSD and Install (3): Some Apps/Games need "Root" (4): Enjoy and Support Developers, Buy It, They Deserved It! DOWNLOAD LINKS:- SIZE:- 1.7 GB http://gca.sh/JEpPg

IS YOUR VPN SERVICE REALLY ANONYMOUS?

 

IS YOUR VPN SERVICE REALLY ANONYMOUS?********** -------------------------------------------------------------------------------------- More than a year ago TorrentFreak took a look at a selection of the web’s VPN services to see which ones really take privacy seriously. During the months that followed we received dozens of emails begging us to carry out an update and today here it is. The first installment in our list of VPN services that due to their setup cannot link user activity to external IP addresses and activities. boxedPrompted by a high-profile case of an individual using an ‘anonymous’ VPN service that turned out to offer less than expected protection, TorrentFreak decided to ask a selection of VPN services some tough questions. With our findings we compiled a report of VPN providers that due to their setup were unable to link their outbound IP addresses with user accounts. Ever since we have received countless emails demanding an update. Update: New 2014 update is out. It’s taken a long time but today we bring the first installment in a series of posts highlighting VPN services that take privacy seriously. Our first article focuses on anonymity and a later installment will highlight file-sharing aspects and possible limitations. We tried to ask direct questions that left VPN service providers with little room for maneuver. Providers who didn’t answer our questions directly, didn’t answer at all, or completely failed by logging everything, were simply left out. Sadly this meant that quite a few were disregarded. This year we also asked more questions, which are as follows: 1. Do you keep ANY logs which would allow you or a 3rd party to match an IP-address and a time stamp to a user of your service? If so, exactly what information do you hold? 2. Under what jurisdictions does your company operate and under what exact circumstances will you share the information you hold with a 3rd party? 3. In the event you receive a DMCA takedown notice or European equivalent, how are these handled? 4. Which payment systems do you operate and how are these linked to individual user accounts? The list of VPN providers is a tiny sample of the thousands out there today and is not comprehensive by any means. VPN Providers not covered this time around will be added during the coming weeks. All responses listed below are in the words of VPN services themselves and the order of the list does not carry any meaning. PRIVATE INTERNET ACCESS 1. We absolutely do not maintain any VPN logs of any kind. We utilize shared IP addresses rather than dynamic or static IPs, so it is not possible to match a user to an external IP. These are some of the many solutions we have implemented to enable the strongest levels of anonymity amongst VPN services. 2. Our company currently operates out of the United States with gigabit gateways in the US, Canada, Germany, France, UK, Switzerland, Sweden, the Netherlands and Romania. We chose the US, since it is one of the few countries without a mandatory data retention law. We will not share any information with third parties without a valid court order. With that said, it is impossible to match a user to any activity on our system since we utilize shared IPs and maintain absolutely no logs. 3. We are in compliance with DMCA as all companies, world-wide, must be. We have proprietary technology and an experienced legal team which allows us to comply without any risk to our users. 4. We accept many payment methods directly, including PayPal, CC, Google, Amazon, Bitcoin, Liberty Reserve, OKPay, and CashU. Further, we would like to encourage our users to use an anonymous e-mail and pay with Bitcoins to ensure even higher levels of anonymity should it be required. We only store the minimal information required to provide customers refunds. Private Internet Access website BTGUARD btguard1. We do not keep any logs whatsoever. 2. The jurisdiction is Canada. Since we do not have log files, we have no information to share. We do not communicate with any third parties. The only event we would even communicate with a third-party is if we received a court order. We would then be forced to notify them we have no information. This has not happened yet. 3. We do not have any open incoming ports, so it’s not possible for us to “takedown” any broadcasting content. 4. At the moment we only accept Paypal and Bitcoin. We have plans to accept alternative credit card processing in the near future. BTguard website (with discounts) TORGUARD 1. TorGuard doesn’t store IP’s or time stamps on our VPN/proxy servers, not even for a second. It’s impossible to match what is not there. Since some people tend to misbehave when using a VPN , this raises the obvious question: how do we maintain a fast, abuse-free network? If even our network engineer can’t back track the abuser by IP, then how do we stop it? Through packet level filtering at the firewall it’s possible to apply rules to an entire shared server, blocking the abuse immediately. For example, let’s say someone decides to use TorGuard to unlawfully promote their Ugg boots business (spam). In order for us to block this one individual, we simply implement new firewall rules, effectively blocking the abused protocol for everyone on that VPN server. Since there are no user logs to go by, we handle abuse per server, not per user. 2. TorGuard recently went through some corporate restructuring and has now moved its parent company to Nevis, West Indies. Our company abides by all International laws and data regulations imposed within our legal jurisdiction. We don’t share any information with anyone regarding our network or its users and won’t even consider communicating with a 3rd party unless they’ve first obtained adequate representation within our legal jurisdiction. Only in the event of an official court ordered ruling would we be forced to hand over blank hard drives. There’s nothing to hand over but an operating system. 3. TorGuard complies immediately (24 hours or less) with all DMCA takedown notices. Since it’s impossible for us to locate which user on the server is actually responsible for the violation, we block the infringing protocol in its entirety, whatever it may be – Kazaa, HTTP, Jabber, Citrix, Bittorrent, FTP, Gnucleus, eDonkey2000, etc. This ensures the content in violation is immediately removed from that server and no longer active on our network. 4. We accept all forms of credit card, Visa, Amex, Mastercard, Discover, PayPal , Google Checkout and Bitcoins. We also accept anonymous payments through our pre-paid PIN system. These pre-paid service PIN numbers can be purchased from one of our participating online resellers and redeemed during checkout on our website. Our client billing area and VPN/Proxy user auth servers are two completely separate systems. This is to ensure the privacy and securities of our customer’s accounts are upheld at all times. While the customer’s chosen payment method will be linked to the client billing area login, this information is kept completely separate from their VPN/Proxy network. In this way, it’s virtually impossible to “connect the dots” of a paying customer with that of someone who is using the servers. This can become a pain for clients as they are required to remember two sets of logins/passwords, but trust us – it’s in the best interest of security. TorGuard website (Use the promo / coupon code TorrentFreak to get a 20% discount at Torguard. TORRENTPRIVACY 1. We don’t store any logs, it’s impossible to track users’ activity through our VPN. 2. Our company is based on Seychelles. We do not disclose any information to 3rd parties and this can be done only in case of a certain lawsuit filed against our company. 3. If we receive a notice about DMCA infringement, our team of lawyers solves it immediately without any blocking of servers or protocols. We don’t store any content on our servers, users are anonymous, so, there are no problems with it. We promise our customers that they will not have problems with the DMCA. 4. PayPal and CommerceGate. TorrentPrivacy website IPVANISH 1. IPVanish has a no-log policy. We keep no traffic logs. 2. IPVanish is headquartered in the US and thus operates under US law. 3. We do not host content of any kind and have nothing to take down or remove. 4. We currently accept all major credit cards, PayPal and UltimatePay (which includes 85 different payment methods from 190 countries). UltimatePay also provides many anonymous cash payment options like Western Union, Alipay, Skrill and PaySafeCard. IPVanish website PRIVACY.IO 1) We do not keep any logs on our servers. Neither us nor 3rd parties are able to match IPs to a username. 2) Privacy IO is an Australian Registered business. Under no circumstances will we provide any 3rd party information about our users. We are unable to comply with DMCA or equivalent as we have no access or power to do anything about it. As we keep no logs we can not link it to a user to apply said request. If the law attempts to make us do such things, we will move our business to a location where that can not occur, and if that fails we will close up shop before we provide any information. 3) See answer to question 2 4) At present we only accept PayPal and CC (processed by PayPal), but we are looking into alternative types of payments. We go out of our way to make sure that PayPal transactions are not linked to the users, we generate a unique key per transaction to verify payment for the account is made, and then nuke that unique key. Privacy.io website VIKINGVPN vikingvpn1) We do not log any user activity at all. We don’t know what IP addresses our own users connect from. We have a shared IP address for our users, further increasing their anonymity We also generate false traffic. 2) We currently operate out of the United States. The United States does not have any mandatory data retention laws, which allows us not to log anything. If we receive a valid warrant, we will turn over all required records, that we have available; we don’t have any records available, because we don’t log anything. 3) DMCA notices have some legal requirements that basically make them not apply to us. We don’t host any content at all, we only provide bandwidth. Also, a DMCA notice requires the notifier to positively identify an infringing individual – which is impossible given our security model. Basically, it’s impossible to send us a valid DMCA notice. 4) We’re just getting started, so we’re currently simply taking credit cards. Accepting bitcoin is a near term goal for us. We’d also like to start accepting really exotic forms of payment like cash. VikingVPN website ANONINE aninine1. We store a users E-mail and username, that´s it. This means that we do not store, or have access to, any traffic logs of any kind. By traffic logs we mean, any kind of data that has the potential to, directly or indirectly, match a users original ip or identity with one of our IPs. 2. It is important to remember that we do not store any traffic logs, and therefore it would be physically impossible for us to hand something like that over to a 3rd party. This, next to the encryption, is the core of the entire anonymity aspect of the service. This is possible by the fact that we operate under Swedish jurisdiction and Swedish law. 3. Our no logging policy has never really caused us any trouble since we never have received any official requests to hand over any traffic logs. 4. We accept credit card payments through Paypal and Payson. For Swedish users we also accept payments through sms and phone. We do not store data from these services. However, each of these services store various types and amounts of data related to the payment, and the payment only, which we do have access to. This is what allows us to perform refunds, or to provide adequate support services etc.

Thursday, January 1, 2015

http://www.wikihow.com/Preserve-Fruit

http://www.wikihow.com/Preserve-Fruit

 

How To Hack Wifi Password!

 

How To Hack Wifi Password! ● Open cmd.exe. (Search cmd in C/:) ● At the command prompt type: netsh wlan show network mode=bssid ● It will show all available wifi networks. ● How to connect wireless network: Type netsh wlan connect name=(wifi name ) netsh wlan connect name=Mynet Sata1 ● Press enter. Your wifi is connected Note:This Trick Never Works On Some PCs.

http://metrosidebar.com

http://metrosidebar.com

 

how to get fb autolikes

 

how to get fb autolikes........... (only works on pc) part 1 1. open ur browser 2.login to ur fb account 3. if ur not 18+ then change ur birthdate on fb..n make it 18+ 4.relogin on ur account 5.go to settings->followers->who can follow me-> change its privacy to everybody 6. change the privacy of the picture to publice on which u want likes.. part 2 1. in new tab open postliker . net 2. at bottom there is the option CLICK HERE 3. it will open one more tab..with two option, now click on ALLOW PERMISSION TO APP 4. it will again open one more tab that is of ur fb.... click on OK 5. now close this new fb tab n go back to previous tab 6. click on GET ACCESS TOKEN 7. it open new tab..after the pg completely loads..u have to copy the link of that page 8.now close this two tabs means u hv only two tabs remaining..1 of fb and other is of postliker . net 9.at the bottom of postliker paste ur link in that box and click on LOGIN 10. now just choose on which photo or status u want likes... 11. press on submit thank u

Top 10 IPhone Secret Codes/

/////////////////////////////////Top 10 IPhone Secret Codes//////////////////////////// ______________________________________________________ *#06# It helps to know IMEI Number of any phone i.e. it will work on any smartphone *#21# This code displays insformation about call forwarding (calls , voide and data) *#62# Information call forwarding if phone is switched off or in case of none of service is available ##002# This code disables all call forwarding! *#30# This code allows or blocks the phone number calling you! *#31# Allows you to hide your phone number *#33# This code will give you a list with multiple configurations like ( call , sms , data etc) and show whether they are enabled or not *#43# This code helps to verify status of call waiting like SMS , Data and Sync data *#61# To know missed calls *3001#12345#* To display many of the inner settings of your Iphone