Wednesday, February 27, 2013

Copy faster!!!!!!

Tired of slow copying speeds in your computer.problem solved!!!!!

go to this site and download this software:

http://codesector.com/teracopy

then install it.
after that go and click on the top left corner and click on and a dropdown list will come.click on about in that.
then copy the following given below


LVUWAASAAAw+rC28xqUEja7DowVzMbZBUkVij+pW5lCOmynWrNYyPxcy87BuKqIu
D91Cy+K2iYy1579gnRrS/mTFkqoStcSeqEOzvdYWD91v2Iwc82HkjX8T7Vl1Wv5g
homCnlytx/iNF7lavbtd68jdKCGuRgjdHESsqoSE2Vry9E/hZent6ZKZx3TdFKlq
vOkydZsyyF0kb2TDmGJSs5KPDYjRcUHqE9fLvSvj6SnwMNhm1qVTdJuWx9/tM4OE
S9Esp32yr9VMYvUdgXFBVFFtF5XU2O3C2Fu/qAqm9K2U9vfXZhd4Nbeb5u442lZs
8SMYEkTLa1wqpkhz9jvDxGfsnQrfdYtz50V72uiez0/M1HGqZeRE+7PIt0iBod/U
pBUAzK7HO6Ig8TGG6xIG33cRM/WXlSLB


after copying this click on enter key and done!your software has been registered.for better understanding,see this video



Download Faster!!!

here's how you can boost your download speeds to the maximum possible.

first go and download internet download manager from here:

http://www.internetdownloadmanager.com/

then install it.
for registering it ,go and download the following software

http://my.rapidshare.com/abhijeet715/2664

download the patch.exe and open it and click on patch,enter your name and done

but when you update the software,it will tell that 'internet download manager has been registered by a fake serial number.idm is exiting'

then it will ask for registering.press cancel and again open the patch.exe and do the same thing and done.

to get more speed,go to Options > Connection.in that search for default max. conn. number and set it to 16

Open any blocked website anywhere in the world

Open any blocked website anywhere in the world.Tor Browser,Anonymity Online

go to this link and see more about it

https://www.torproject.org/

some apps also for android.

Best, Most Popular Custom ROMs For Android, And Why You Should Try Them Out


see the Best, Most Popular Custom ROMs For Android, And Why You Should Try Them Out


to see about this,go to the following link

20 facebook tips and tricks you might not know

to know about this,go to this link

http://www.hongkiat.com/blog/20-facebook-tipstricks-you-might-not-know/

VLC Media Player trick

In this tutorial i will share a simple trick yet interesting trick i came across while surfing on the internet. I will call it VLC Inception trick. This trick is simple and works on windows xp as well as windows 7. If you know this trick then its great if you don't then lets dive into it.

HOW TO DO THIS TRICK


  1. Open VLC Media Player
  2. Then Press Ctrl + N
  3. Now Type "Screen://" (without quotes)
  4. Click on Play and watch this simple little trick.

Rooting Android Device

PLEASE DO NOT DO THIS IF YOU DON'T KNOW OR UNDERSTAND ABOUT IT.IF EVEN A SMALL MISTAKE HAPPENS,YOU CAN NEVER GET BACK YOUR ANDROID DEVICE.I AM NOT RESPONSIBLE FOR ANYTHING HAPPENING TO YOUR DEVICE.


What is Rooting?


By default most Android devices do not give you “root access.” Root access is basically full control over your phone and all its workings. Manufacturers disable this by default. They do this for good reason—and it’s not just to control or limit you. If someone had this access and didn’t know what they were doing, they could do some real damage to their smartphone. So manufacturers keep devices locked by default to prevent you from turning your phone into an expensive paperweight.
A good way to understand rooting is to think of your Android like your brain. You have to actively remember what’s on your to-do list today, how to play a game, how to drive a car, and any other skills you were required to learn in life. Those functions are ones you can change in your brain. Now, as a comparison, if you were to root your brain (that is, gain access to all the workings of it), you could control aspects of your body that you couldn’t before—like breathing, heart rate, and adrenaline levels. As you can imagine, there are good reasons why your body doesn’t want you to change some basic functions. If you were to say, voluntarily increase your heart rate to 300 beats per minute, your heart might explode! But think how powerful it would be if you could tweak a few of those things in your brain whenever you wanted! Well that’s exactly the same power you can have over your Android device.

Reasons For Rooting

Rooting is often performed with the goal of overcoming limitations that carriers and hardware manufacturers put on some devices, resulting in the ability to alter or replace system applications and settings, run specialized apps that require administrator-level permissions, or perform other operations that are otherwise inaccessible to a normal Android user.

"Rooting vs. Jailbreaking"

Gaining root access is sometimes compared to jailbreaking devices running the Apple iOS operating system. However, these are distinct concepts. In the heavily secured iOS world, restrictions prevent (1) installing or booting into a modified or new operating system (a "locked bootloader" prevents this), (2) sideloading unsigned applications onto the device is prevented and user-installed apps are (3) prevented from root permission and run in a secure sandbox. Bypassing all these restrictions together constitute the expansive term "jailbreaking" of Apple devices, overcoming several types of iOS security features.
By contrast, while many Android devices have locked bootloaders, the ability to sideload apps is common and usually permissible without root permissions. Thus, it is primarily the third aspect of iOS jailbreaking relating to superuser privileges that correlates to Android rooting.

Description


Rooting enables all the user-installed applications to run privileged commands that are typically unavailable to the devices in their stock configuration. Rooting is required for more advanced and potentially dangerous operations including modifying or deleting system files, removing carrier- or manufacturer-installed applications, and low-level access to the hardware itself (rebooting, controlling status lights, or recalibrating touch inputs.) A typical rooting installation also installs the Superuser application, which supervises applications that are granted root or superuser rights.
A secondary operation, unlocking the device's bootloader verification, is required to remove or replace the installed operating system.
In contrast to iOS jailbreaking, rooting is not needed to run applications distributed outside of the Google Play Store, sometimes referred to as "sideloading". The Android OS supports this feature natively in two ways: through the "Unknown sources" option in the Settings menu and through the Android Debug Bridge. However some carriers, like AT&T, prevent the installation of applications not on the Store in firmware, although several devices (including the Samsung Infuse 4G) are not subject to this rule, and AT&T has since lifted the restriction on several older devices.
As of 2012 the Amazon Kindle Fire defaults to the Amazon Appstore instead of Google Play, though like most other Android devices, Kindle Fire allows sideloading of applications from unknown sources, and the "easy installer" application on the Amazon Appstore makes this easy. Other vendors of Android devices may lock to other sources in the future. Access to alternate apps may require rooting but rooting is not always necessary.
Rooting an Android phone allows one to modify or delete the system files which in turn can allow them to perform various tweaks, and use apps which require root access.

Process

The process of rooting varies widely by device, but usually includes exploiting a security weakness in the firmware of the device, and then copying the su binary to a location in the current process's PATH (e.g. /system/xbin/su) and granting it executable permissions with the chmod command. A supervisor application like SuperUser or SuperSU can regulate and log elevated permission requests from other applications. Many guides, tutorials, and automatic processes exist for popular Android devices facilitating a fast and easy rooting process.
For example, shortly after the HTC Dream was released, it was quickly discovered that anything typed using the keyboard was being interpreted as a command in a privileged (root) shell. Although Google quickly released a patch to fix this, a signed image of the old firmware leaked, which gave users the ability to downgrade and use the original exploit to gain root access. Once an exploit is discovered, a custom recovery image that skips the digital signature check of a firmware update package can be flashed. In turn, using the custom recovery, a modified firmware update can be installed that typically includes the utilities (for example the Superuser app) needed to run apps as root.
The Google-branded Android phones, the Nexus One, Nexus S, Galaxy Nexus and Nexus 4, as well as their tablet counter parts, the Nexus 7 and Nexus 10, can be boot-loader unlocked by simply connecting the device to a computer while in boot-loader mode and running the Fastboot program with the command "fastboot oem unlock".[7] After accepting a warning the boot-loader will be unlocked so that a new system image can be written directly to flash without the need for an exploit.
Recently, Motorola, LG Electronics and HTC have added security features to their devices at the hardware level in an attempt to prevent retail Android devices from being rooted. For instance, the Motorola Droid X has a security boot-loader that will put the phone in "recovery mode" if unsigned firmware is loaded onto the device, and the Samsung Galaxy S II will display a yellow triangle indicator if the device firmware has been modified.

Industry Reaction


Until the early 2010s, the response of tablet and smartphone manufacturers and mobile carriers had typically been unsupportive of third-party firmware development. Manufacturers had expressed concern about improper functioning of devices running unofficial software and related support costs. Moreover, firmware such as CyanogenMod sometimes offers features for which carriers would otherwise charge a premium (e.g., tethering). As a result, technical obstacles such as locked bootloaders and restricted access to root permissions have commonly been introduced in many devices. For example, in late December 2011, Barnes & Noble and Amazon.com, Inc. began pushing automatic, over-the-airfirmware updates, 1.4.1 to Nook Tablets and 6.2.1 to Kindle Fires, that removed users' ability to gain root access to the devices. The Nook Tablet 1.4.1 update also removed users' ability to sideload apps from sources other than the official Barnes & Noble app store (without modding).
However, as community-developed software began to grow popular in the late 2000s to early 2010s, and following a statement by the Copyright Office and Librarian of Congress (US) allowing the use of "jailbreaking" mobile devices, manufacturers and carriers have softened their position regarding CyanogenMod and other unofficial firmware distributions, with some, including HTC, Samsung, Motorola and Sony Ericsson, even actively providing support and encouraging development.
In 2011, the need to circumvent hardware restrictions to install unofficial firmware lessened as an increasing number of devices shipped with unlocked or unlockable bootloaders, similar to the Nexus series of phones. Device manufacturer HTC has announced that it would support aftermarket software developers by making the bootloaders of all new devices unlockable.

Legality


Europe

The Free Software Foundation Europe argues that it is legal to root or flash any device. According to the European Directive 1999/44/CE, replacing the original operating system with another does not void the statutory warranty that covers the hardware of the device for two years unless the seller can prove that the modification caused the defect.

United States

On July 26, 2010, the United States Copyright Office announced a new exemption making it officially legal to root a device and run unauthorized third-party applications, as well as the ability to unlock any cell phone for use on multiple carriers.
On October 28, 2012, the US Copyright Office updated their exemption policies. The rooting of smartphones continues to be legal "where circumvention is accomplished for the sole purpose of enabling interoperability of [lawfully obtained software] applications with computer programs on the telephone handset." However, the U.S. Copyright office declined to extend this exemption to tablets, arguing that the term "tablets" is broad and ill-defined, and an exemption to this class of devices could have unintended side effects.


taken from http://en.wikipedia.org/wiki/Android_rooting.

Tuesday, February 26, 2013

Use free internet of your pc via WiFi

so hi out there guys posting again today for your welfare.

want to use the internet connection of your pc in your mobile or any other device via WiFi.
here is how to do it
http://virtualrouter.codeplex.com/

1.go to this site and download the software for free
2.install the software(in windows vista/7/8,it might ask for administrator permission)
3.open the software
4.enter a password(and username if required)
5.set the connection to LAN
6.click on Start Virtual Router
7.scan for available WiFi's from your phone,tab,etc and enter password and use free internet

Chat using Command Prompt

Hi out there guys.
So want to chat with your gf/bf, friends in school computerlab or ask answers for questions during a practical exam.

I request all of you not to do this if you can't understand it.And if you get caught,it is not my responsibility.I am just Posting so that you people get to know about it.Anything that happens,it is not my responsibility

Now i will show you how to setup a chat program with cmd.
Step1.open notepad and types this:
@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
pause
Goto A

Now save this as "Messenger.bat"(can be changed according to your wish.).

note:choose all files type before saving messenger.bat and add .bat for your filename.
For assistance in saving .bat filevisit:
http://wiki.answers.com/Q/How_can_you_save_files_on_notepad
_in_bat_format_or_if_you_can%27t_please_tell_me_which_text_editor_can

open the .bat file and in command promt you should see this:

MESSENGER
User:
After "User" type the IP address of the computer you want to contact.
After this, you should see this:
Message:
Now type in the message you wish to send.
Before you press "Enter" it should look like this:
MESSENGER
User: 56.108.104.107
Message: Hi
Now all you need to do is press "Enter", and start chatting!

How to unblock blocked websites with Command Prompt

How to unblock blocked websites with cmd
1st Trick
1- Open the command prompt
2- Ping the website you want to unblock by typing "ping www.website.com" without the ""
3- Copy the IP next to "Reply From"
4- Paste the IP into your address bar.
2nd Trick
1- Open command prompt and notepad.
2- Write "ping localhost" without the "" into the command prompt.
3- Copy the IP into the notepad file, hit tab and write localhost
4- Ping the website you want to unblock in the command prompt, as in"ping www.website.com" without the""
5- Copy the IP of the site into the notepad file, hit tab and write the link to the site, without http://, as in"www.google.com"
6- Hit enter and repeat step 5, should look like this
00.00.0.00 localhost
000.000.00.00 www.website.com
000.000.00.00 www.website.com
7- Save the notepad file into your desktop as "host." with the "", if it wont let you just leave it as host. with the "."
8-Go to My Computer>Your Hardrive>WINDOWS>system32>drivers>ect and drag the notepad file into that folder

How to shutdown someones computer using Command Prompt


How to shutdown someones computer remotely using IP address. Tracking IP address using gmail.
Things you will need to hack:
(i) a gmail account
(ii)your victims email id
(iii)and some damn guds
please donot use this trick for any ehtnical purpose. I am not responsible for any damage done by you. This is only for educational purpose
send a mail(use gmail) to your victim if you donot have his ip address.
Instructions
In your Gmail account, open compose a email and send it to your victim. And get a reply.
2.On the upper right-hand corner of each email, there's a button that says "Reply." The little blue inverted triangle indicates there's a drop-down menu. Click that blue triangle.
3.From that drop-down menu, select "Show original."
4.A new window will open once you've chosen to show the original file.
5.On this page (which is all text and code), a few lines down, find the line that begins with,"Recieve,from:" This is telling you where the email delivered. Follow that line all the way across. At the end, in brackets, is the IP address of the person or company who sent the you the email .
PART 2
This part will show you how to shutdown the person computer.
Step Two: Once in Command Prompt type [shutdown -i] without brackets. This will bring up the Shutdown Interface.
Step Three: In the Shutdown Interface click the button “Add”.
Step Four: Enter the computer name, or computer IP address.
Step Five: Click “Okay”.
Step Six: Wait a few seconds for Command Prompt to do the job, depending on how many entries you put will vary the amount of time it takes.
Step Seven: Sit back and watch the computer(s) shutdown! Sometimes in school or at work Command Prompt wont be able to complete the shutdown proccess and say “Access Denied”. As of now I do not know a way to get past that or if there even is a way.
Step Eight: Do your maintenance, go to sleep, or laugh at the person you just shutdown ENJOY!
TIP: If you ever have a shutdown warning pop up on your screen there is no way to exit it. Unless you go open up Command Prompt and type [shutdown -a] without brackets. That will abort the shutdown and you can continue to do what you where doing.
If this doesnot work use this code: To shutdown a remote machine, you have to enter following command in command prompt on the computer your are using.
c:\> shutdown -m \\comp_name -s Shutdown - This is the command to shutdown. -m - Tell shutdown you want a remote computer. \\comp_name - This is the computer name or IP which you want to shutdown -s - For 'shutdown' (-s = Shutdown, -r = Restart, -l = Logoff, -a = Abort shutdown)
You will need to know the 'name' of the remote computer, but you may be able to get this by looking in Network Neighbourhood or My Network Places/Entire Network, or you can use 'net use' command in your command window to see the computer names in your network.