Sunday, 25 September 2011

Posted by Unknown On 05:17

Following are the two methods suggested by our reader for clearing BIOS:

A. By Using the Motherboard Jumper:



In most motherboards CMOS battery is soldered, which makes it difficult to remove the battery. In this case we use another method.
Almost all motherboards contain a jumper that can clear all CMOS settings along with the BIOS password. The location of this jumper varies depending upon the motherboard brand. You should read your motherboard manual to check its location. If you don’t have the manual then look for the jumpers near the CMOS battery. Most of the manufacturer label the jumper as CLR, CLEAR, CLEAR CMOS, etc.
When you find the jumper, look carefully.  There will be 3 pins and the jumper will be joining the center pin to either left or right pin. What you need to do, is remove the jumper and join the center pin to the opposite pin. e.g. if the jumper joins center pin to left pin, then remove it and join center pin to right pin. Now wait for a few seconds and then again remove the jumper and join the center pin to left pin.

Posted by Unknown On 04:55
Session hijacking is widely used method by hackers for temporarily stealing network connections or login sessions. You might have heard this term used a lot by hackers & some of you have emailed me to explain it in brief.
So this post will explain you what exactly is session hijacking

What is Session
We see lot of Wireless network services offering us to use Wi Fi based on pay per use model – where you have to pay for usage and it costs really high but gives you high speed connectivity.
Evry user that pays for the service get connected. A unique MAC address of his laptop/netbook is stored in Service providers database for every paid user. Every time he gets connected to the paid network it creates a session and Session ID.

Saturday, 24 September 2011

Posted by Unknown On 05:26
Google Chrome Offline Installer
Google Chrome is really an excellent browser released a few years back. Over the time it has 
succeeded in defeating other browsers by offering more features, better speed, moreapplications, ease of use, etc.

Most people use Google Chrome not as their secondary browser, but as their primary browser. Google Chrome is open-source browser & it’s updated frequently with new features & all the bugs are removed.








Thursday, 22 September 2011

Posted by Unknown On 08:17
In these few days facebook changed their chatbox. I dont like this new chat box sometimes it irritates me too..




   So  I started  research and made some steps for block the unwanted friends from chatbox yahhhh...

Tuesday, 20 September 2011

Posted by Unknown On 04:18

Hello Friends , Today I am sharing with you my latest Collection of "Best Password Hacking Tools 2011". Using this password hacking kit you will be able to crack a lot of passwords like Windows Admin password, pdf passwords, zip files passwords, document passwords, rar passwords and much more.. I am sure you will like this post.

Friday, 9 September 2011

Posted by Unknown On 05:47


http://www.lockfolderfile.com/web-images/200911/lock-folder-xp6.jpg
How To Lock a Folder Without Using any Software And changing attributes!

Simple Copy-Paste-Rename-Store-and LOCK. can work anywhere on any computer.


NO Software Required. Simple Lock your Folder, with these Few Steps. Ive tried it, and works great. it works on Windows Xp, SP2 and vista
IM not sure, if it works on other OS as well. but its harmless, so try it out.

Thursday, 8 September 2011

Posted by Unknown On 05:49

C++ Programming Fundamentals teaches the basics of C++ programming in an easy-to-follow style, without assuming previous experience in any other language. A variety of examples such as game programming, club membership organization, grade tracking and grade point average calculation, make learning C++ both fun and practical. Each chapter contains at least one complete, fully functional example program, with several smaller examples provided throughout the book. Complete source code for each example in the book is provided on the accompanying CD-ROM, along with additional example code for further practice.
KEY FEATURES