Sunday, June 13, 2010

Orkut Hack- How to add sound/music in scrapbook





There are many ways to add your favorite music in scrapbook. Here is the simplest method.....
Basically it is through application. The benefit is that you need not to "play" sound. It will automatically plays when anyone visits scrapbook. You can either add sound in your own scrapbook, any friend's or even you can embed it in normal scrap whatever suits to you.....

First  add 3D Music Spectrum Analyser in your account. Click here-http://www.orkut.co.in/Main#Application?appId=112888907858

**Now either you can upload your own music file(less than 6mb) or search.




INBUILT SEARCH
Just click in textbox "search music" and type keywords (song name) you want to add & hit enter.
Note:- IT IS NOT ORKUT SEARCH.

-----------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------


-----------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------
If you found your music then listen it  first and if it is ok then click on scrap/testimonial button. It will open new window as shown above. Copy all code to notepad or word.

It will look like this----






now DELETE highlighted RED area
and set width="1" height="1"



CUSTOM CODE WILL BE--









And you are done....

CUSTOM UPLOAD
-----------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------


-----------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------

**Now it will create file link under "Link to MP3 file". This is your custom link.

FINAL STEP
click on UPDATE button. It will redirect you to new window like this


-----------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------


-----------------------------------------------------------------------------------------
now copy the code and do changes as above. (set width="1" height="1" and delete RED area)
and the code is ready to paste...!!

Note- Once i've received error message from google about malfunction in bandwidth and for some time i am unable to open my account. BEWARE.


ENJOY AS YOU WISH

by WAR379K
e:- war379k@gmail.com

Thursday, March 25, 2010

Mafia Wars Quick Trick- How to LEVEL UP faster than ever!!!



Here are quick requisits to learn about how to GET ACHIEVEMENTS + DO JOBS (which require special items) + VAULT COLLECTION

1. You should know about Mafia wars. I am not gonna tell you how to do jobs, how to grow your mafia etc. Those are essentials.
2. You should have another facebook account. So that you can create 2nd mafia wars account.


TRICK 1 ( GET ACHIEVEMENT "That's Amore")
After creating 2nd account you can quickly get achievement by  giving a Diamond Ring to any player below level 8. That means you can send diamond ring to your 2nd account and get achievement!! From 2nd account you can click on "gift back" and get your ring back

TRICK 2 ( GET ACHIEVEMENT "Spreading it Around")
To get this achievement you need to send 500 gifts to your mafia. Just add the items to 2nd accounts wish-list which you have most like Cellfones, Cameras and "gift all". You will get achievement much faster. And anytime you are out of cellfones and other items, just gift from 2nd to 1st. Simple!


TRICK 3 (some little Hacks)
At 2nd account you have no need to use profile points other than energy. Because you want only energy to do more and more jobs. So just gain energy. Preferred type for 2nd account is Maniac. It will regain energy faster than others.
           Any time if you are out of some special required items (like Illegal Transaction RecordsUntraceable Cell Phones, Blackmail Photos etc) just use 2nd account to gain them and gift to yourself so that your energy will not be Wasted!
           This trick can be used to valuating collections or for special events at mafia wars or for adding yourself as top mafia. GET DOUBLE BONUS EVERY TIME...
Enjoy!!





by WAR379K

Friday, March 12, 2010

TrainSignal - TCP/IP and Networking Fundamentals






----------------------------------------------------------------------
                        ~ TABLE OF CONTENTS ~
----------------------------------------------------------------------

Video 1: What is a protocol?
* Definition of a protocol
* OSI Model


Video 2: Introduction to TCP/IP
* What is TCP/IP?
* TCP/IP Architecture
* TCP/IP Protocol Suite
* Types of TCP/IP communication


Video 3: Configuring an IP Address
* What is an IP Address?
-Network ID
-Host ID
* What is the purpose of a Subnet Mask?
* How to configure a computer with an IP Address
-Static
-Dynamic
* How to View a Computer???????s IP Configuration
* How to Check for Connectivity


Video 4: IP Address Planning
* How to plan an IP Addressing scheme
* Rules for IP Addressing
* What is Classful IP Addressing
* Private IP Addressing vs. Public IP Addressing
* What is Network Address Translation (NAT)?


Video 5: Binary Numbers
* Decimal vs. Binary
* Convert Binary to Decimal
* Convert Decimal to Binary
* Using a Calculator
* IP Address Conversion



Video 6: Internetworking
* Decimal vs. Binary
* Convert Binary to Decimal
* Convert Decimal to Binary
* Using a Calculator
* IP Address Conversion


Video 7: Classless Interdomain Routing
* Problems with Classful IP Addressing
* What is CIDR & VLSM
* Subnetting with CIDR


Video 8: Fundamentals of IPv6
* Disadvantages of IPv4
* IPv6 Solutions
* IPv6 Addressing
* Types of IPv6 Addressing

         I've personally tested all videos and its simply great!!! If you want to clear your ideas about various concepts den this is REAL deal.....Definately Recommended

****LINKS****

MEDIAFIRE




RAPIDSHARE

http://rapidshare.com/files/176498381/l-tstcpb-uds.part01.rar
http://rapidshare.com/files/176498307/l-tstcpb-uds.part02.rar
http://rapidshare.com/files/176498294/l-tstcpb-uds.part03.rar
http://rapidshare.com/files/176498282/l-tstcpb-uds.part04.rar
http://rapidshare.com/files/176498253/l-tstcpb-uds.part05.rar
http://rapidshare.com/files/176498342/l-tstcpb-uds.part06.rar
http://rapidshare.com/files/176498252/l-tstcpb-uds.part07.rar 


I realy hate rapidshare because of low speed, timer and also its servers is always busy..... Better download it from MEDIAFIRE..... It supports parallel downloads!!! Enjoy!!


<<<<<<<< THE WAR RELEASE >>>>>>>>

Wednesday, February 10, 2010

CYBER-TERRORISM AND INDIA


We are aware about "traditional" terrorism. When we talk about terrorism we imagine a masked man with AK-47. Cyber-terrorism is different than this. It is terrorism in cyberspace. Cyber-terrorism is new trend of terrorism of 21st century. This terrorist has only one powerful weapon “Computer”. We are familiar with the term “hacking”. The term cyber-terrorism is becoming increasingly common in the popular culture, yet a solid definition of the word seems hard to come by. Cyber-terrorism is an extension of terrorism and hacking. A terrorism by other means and it takes advantage of the fact that our society is increasingly becoming dependent on computer networks and, particularly, dependent on the Internet. It is new concept of terrorism. Cyber-terrorism has done in cyberspace which is carefully planned violence where a small amount of effort, usually hard to identify or catch. It is applied to interfere with the functioning of civil society.

There are some that say cyber-terrorism does not exist and is really a matter of hacking or information warfare. They disagree with labeling it terrorism because of the specific image of terrorism like of the creation of fear, significant physical harm, or death in a population using electronic means. Cyber-terrorist is invisible and hard to locate. He can easily spread terrorism from anywhere in the world. Experts already said that World War III would be in cyberspace.

Security professionals have expressed their increasing concern over not only the increase in frequency of attacks against the Internet, but also the increase in the level of sophistication of these attacks. While the complexity of the attacks is increasing, the skill level of the intruder that launched the attack is decreasing. This is a very troubling trend. As the terrorists learn from every attack what works and what doesn't, where the vulnerabilities are, how we respond, and the methods we use to detect these attacks. They gain the knowledge that will increase their chance for success.

TARGET-

The intention of a cyber terrorism attack could range from economic disruption through the interruption of financial networks and systems. It may be used in support of a physical attack to cause further confusion and possible delays in proper response. Although cyber attacks have caused billions of dollars in damage and affected the lives of millions. New terrorist organizations are highly funded, technologically strong groups capable of inflicting devastating damage to a wide range of targets.

There's many ways of judging the severity of such threats but the primary target for cyber-terrorism is the Internet. Its most attractive objective is to bring the Internet down, since increasingly, all commerce depends on Internet-based transactions. We call it e-commerce. In India e-commerce is growing rapidly. The cyber-terrorism threat is real because we have already experienced experimental acts of cyber-terrorism when a large number of Internet-connected computers have ceased to function. We have recent example at 7th June 2008 ten government sites of India got defaced.  Nearly 7,000 websites are hacked every year in India which means that on an average 19 sites are hacked a day. (CERT Official). And this number is increasing with every new day.

Cyber-terrorist exploits weaknesses. They take advantage of the fact that our software systems and our operating systems are woefully inadequate and are responsible for the intrinsic vulnerabilities that can be exploited. Cyber-terrorists live off the weaknesses of the defenders. In the cyber-terrorist's case it's the extremely low cost and low risk exploitation of the weaknesses of the victims where the cyber-terrorists have the advantage. From recent years India is on the target of Pakistani, Chinese and Bangladeshi hackers. They also enjoy the support of others. Every night there are thousands of conversations taking place in discussing the weaknesses of existing organizations in managing their computers. Every unsecured computer or network can be used for hacking, cyber-crime and cyber-terrorism. It means every unsecured computer is threat for someone.  So indirectly we are at the middle of war. No matter who loose and who wins, we are definitely going to loose.

Yet we have no idea how this threat is growing and becoming powerful day by day. Underdeveloped country like India has more danger than other European countries because of less expenditure on security. (check out my previous article) A weak cyber security policy in India is also resulting in increased cyber terrorism activities in India. The position is even worst when it comes to wireless security in India. Wireless security has become a headache due to its misuse by terrorists in India. Unfortunately, cyber security in India is an ignored world. In India there is large number of computer illiteracy. Million of computers of Asia especially India, Pakistan and China are infected by various viruses (threatfire.com). Viruses act as backdoors or tools for cyber-terrorists. They use Viruses, Trojans, Worms, Backdoors, Hoxes for controlling networks and servers. Very few people know about cyber security measures. As concern about India we’ve many enemies who want to bring down our economy. When India-Pak war has started, we’ve experienced many cyber attacks from Pakistani hackers called “Indian Mujahideens”.  We have a very weak cyber law, negligible cyber security and cyber forensics and almost missing legal enablement of ICT (Information and Communication Technology ) systems. The only solution is the quick deployment of a Counter-Cyber-Terrorist - someone who knows what you are up against today, someone who lives in the world of the people who are, and will be, attacking - someone who can train the people who must fight the battles.

*Information Sources*
-Cyber Terrorism In The Context Of Globalization By Rohos Nagpal
-CCRC (COMPUTER CRIME RESEARCH CENTRE)
-WIKIPEDIA (Encyclopedia)
-An Interview on Cyberterrorism with Paul Strassmann
-Thaindian News(Cyber Security In India: Another Wake Up Call)

Note- All rights of this article is reserved by owner. If you have any problem please contact at kulkarni.gargeya@gmail.com

Sunday, January 24, 2010

Feeling stuck with ANTIVIRUS??...Updated (2-Feb)



             Yes. I know. This is problem of every 2nd Indian… Most of the people (including my friends) think that they know everything about antivirus and if they’ve registered (WTF??) antivirus then their computer will not be infected. First of all I want to tell you guys… Your pc can be infected anytime. No antivirus product can give you 100% security. There are always some loops holes in engine. Yes. We can minimize risk by taking few steps.
            Ok. Lets move on to the popular and tricky question. Which antivirus is best?? I am gonna discuss a little on this topic. So first of all you have to tell me about your requirement. Because all antivirus softwares has some “distinct” feature. The basic security level is not problem. It is always mentioned by all (almost) multinational security software companies. Second thing the word “antivirus” means security suite in this article. Security suite is a bundle of all security software…like antivirus, antispam, firewall, web protection etc. I’ve compared best three antivirus products here. This comparison is based on my individual experience with some world class articles on security suits and also on some test results which have taken by “Test Systems”, “Malware City”, “AV Comparatives” and “Cascadia Labs”.

  1. Kaspersky Internet Security 2010- Kaspersky Labs has distinguish reputation for security software. Kaspersky 2010 provides excellent security. And its firewall is best of the best in world. I think it is BEST AV software ever. Real time protection of Kaspersky is just awesome. Often Kaspersky is FIRST to identify and eliminate new (unknown) threats because of its huge security network. Still it has some problems like false detections and huge prompts. Also it is best at virus detection but little lazy at warms. But still I recommend you to use Kaspersky if you know about your system and you have 1GB+ RAM. If your pc has some confidential or sensitive data and you don’t want to compromise at security then Kaspersky is the only one. I recommend this software for colleges and offices where environment is hostile. It’s really best AV available in India costing you around 600-700rs I think…


  1. Norton Internet Security 2010- I know we have very negative impression about Norton products. But I want to tell you guys that NEW Norton 2010 is one of the fastest antivirus in world. It is shocking but true. If you want faster pc with good security then go for Norton. Recommended RAM can be 512 or 1 GB. But it has some problem with its real-time protection. But if you want speed then I think you can compromise with Norton. So you can get good security and good speed both. It costs little more than Kaspersky. It costs nearly 1200-1500rs. It is huge amount for me for 1 year. It is good for any type of environment.


  1. Eset Smart Security 4- Ok. This means SPEED and only SPEED. If your most priority is your computer speed then go for ESET. If only you have no any sensitive data on your pc. You will forget that you having any antivirus product. It takes lesser memory so it needs only 256RAM. It is lightest antivirus I’ve found on internet. It costs 1000-1100rs. But I recommend this software for only home use. Because you cannot take a risk of security at work place.

             I often use ESET and Norton because I am always ready to format my pc if anything happens wrong. And I like fast pc. Still I want to tell you that I’ve never found any single virus on my pc while I am using anyone of these three antivirus products. Only thing is you have to update software at lease once in week.

MOST IMPORTANT- I’ve personally tested other products like (legend) Quick Heal, Avast, AVG with its latest versions and latest updates. And I must say that they are little kids in terms of security and speed. You cannot even compare these products with best AV's like Kaspersky or Norton. Quick heal, Panda, F-secure and AVG takes HUGE memory (so they are in my shit-list). I will prefer viruses than installing these products. Also above 3 best AV products are its best when you install it at formatted (clean) pc. (Use pc tweak software like Advanced System Care)

       Also if you dont have the key of above products and want to use free AV then i will say Avira Antivir or Avast is best choice. They give you best protection (real time). You won't get firewall protection in free version but still its fine. Today (2 Feb) i've tested Avast IS v5 (the newest) and i think its fine. It takes (4000k+23000k+18000k) memory which comparatively low. Also it has detected all 38 viruses (including my personal trojan).

Here i've listed Antivirus Products as per their performance (good to bad)
1. Kaspersky IS 2010
2. Norton IS 2010
3. ESET Smart Security v4
4. Bit Defender 2010 (it is also good defiantly recommended)
5. Avira Premium 2010 (good)
6. Avast IS 5 (good)
7. A- Squared Anti Malware v4.5 (detection rate is quite good but takes more memory)
8. AVG IS v9 (more memory)

Above all article is based on my personal opinion and some tests and articles. If you have any problem or query then mail me at war379k@gmail.com

Thursday, November 5, 2009

WINDOWS SERVICES FOR DISABLE

Windows services are very crucial in os. By disabling extra services you will reduce windows weight(in other way) by 30-50%. In standard xp, 20-25 services are running unnecessarily.

ROOT>>>> control panel > Administrative Tools > Services
(note.. right click on service and go to "properties" for changing start-up type, status..etc)

OS platform-- Windows XP

Alerter.........................................Disabled

Application Layer Gateway Service...............Manual

Application Management..........................Manual

Automatic Updates...............................Disabled

Background Intelligent Transfer Service ........Disabled

ClipBook........................................Manual

COM+ Event System...............................Disabled

COM+ System Application.........................Disabled

Computer Browser................................Manual

Cryptographic Services..........................Manual

DHCP Client.....................................Automatic

Distributed Link Tracking Client................Disabled

Distributed Transaction Coordinator.............Disabled

DNS Client......................................Automatic

Error Reporting Service.........................Disabled

Event Log.......................................Automatic

Fast User Switching Compatibility...............Disabled

Help and Support................................Disabled

Human Interface Device Access...................AUTOMATIC
IMAPI CD-Burning COM Service....................Disabled

Indexing Service................................Disabled

InteractiveLogon................................Disabled

Internet Connection Firewall (ICF)/
Internet Connection Sharing (ICS)...............Disabled

IPSEC Services..................................Disabled

Logical Disk Manager............................Disabled

Logical Disk Manager Administrative Service.....Disabled

Machine Debug Manager...........................Manual

Messenger.......................................Disabled

MS Software Shadow Copy Provider................Disabled

Net Logon.......................................Manual

NetMeeting Remote Desktop Sharing...............Disabled

Network Connections.............................Manual

Network DDE.....................................Disabled

Network Location Awareness (NLA)................Manual

NT LM Security Support Provider.................Disabled

Performance Logs and Alerts.....................Disabled

Plug and Play...................................Automatic

Portable Media Serial Number....................Disabled

Print Spooler...................................Automatic

Protected Storage...............................Automatic

QoS RSVP........................................Disabled

Remote Access Auto Connection Manager...........Manual

Remote Access Connection Manager................Manual

Remote Desktop Help Session Manager.............Disabled

Remote Procedure Call (RPC).....................Automatic

Remote Procedure Call (RPC) Locator.............Manual

Remote Registry.................................Disabled

Removable Storage...............................Disabled

Routing and Remote Access.......................Disabled

Secondary Logon.................................Disabled

Security Accounts Manager.......................Disabled

Smart Card......................................Disabled

Smart Card Helper...............................Disabled

SSDP Discovery Service..........................Disabled

System Event Notification.......................Disabled

System Restore Service..........................Disabled

Task Scheduler..................................Automatic

TCP/IP NetBIOS Helper...........................Disabled

Telephony.......................................Manual

Telnet..........................................Disabled

Terminal Services...............................Disabled

Themes..........................................Automatic

Uninterpretable Power Supply....................Disabled

Universal Plug and Play Device Host.............Disabled

Upload Manager..................................Disabled

Voulume Shadow Copy.............................Disabled

WebClient.......................................Disabled

Windows Audio...................................Automatic

Windows Image Acquisition (WIA).................Automatic

Windows Installer...............................Manual

Windows Management Instrumentation..............Automatic

Windows Management Instrumentation
Driver Extensions...............................Manual

Windows Time....................................Disabled

Wireless Zero Configuration.....................Disabled

WMI Performance Adapter.........................Disabled

Workstation.....................................Disabled

--------------------------------------------------------------------------------

***MY TESTED SERVICES***

background intelligent transfer
com+ system application
logical disk manager admin service
logical disk manager
com+ event system
fast user swithching compability
help & support
windows cardspace
imapi cd burning com service
tcp-ip netbios helper
distributed transaction coordinator
removable storage
remote desktop session manager
qos RSVP
Security accounts manager
smart card
secondary logon
system event notification
windows firewall/ internet connection
system restore service
SSDP discovery storage
stardwind AE service
terminal services
distributed link tracking client
uninterruptible power supply
webclient
security center
automatic updates

if you have any problem plz contact me at kulkarni.gargeya@gmail.com

PROXY SITS (tested by me)

the proxy sites are not always good. They can store your information like username and pass and can manipulate ur account.... so u should not give such info under such sites. Here is some sites which are completely secured. This sites might not be banned in your college or school because it is most anonymous proxies over internet!!!!

  • http://kproxy.com (Best For Orkut !)


  • http://backfox.com


  • http://atunnel.com


  • http://calculatepie.com


  • http://www.stupidcensorship.com


  • http://www.vmathpie.com


  • http://www.xroxee.com


  • http://mathtunnel.com


  • http://www.pagemod.com (Contributed by : Anonymous


  • http://www.anonymizer.ru (this is russian site...bt dnt worry just give website add in 1st textbox... simple!!)

    BLOCK AND UNBLOCK SITE IN COLLEGE

    Many times in schools, colleges & offices surfing some sites like orkut,etc are banned !
    To overcome this you can unblock these or block some other websites and play pranks !

    Do The Following :
    For eg you want to block www.xyz.com !

    * Open the folder C:\WINDOWS\system32\drivers\etc
    * There you will find a file named HOSTS
    * Click on the file and press SHIFT and now right click on it .
    * From the right click menu select Open with .
    * Now, select Notepad to open the file from the list !
    * Now, in the file under the line 127.0.0.1 localhost add another line as 127.0.0.2 www.xyz.com.
    * Now, File>>Save !

    Now, open your web browser and try openning www.xyz.com , it will not load !

    To unblock sites just do the opposite !
    HAVE FUN....

    Sunday, March 22, 2009

    Internet Explorer 8.00.6001.18702 - Final

    Internet Explorer 8.00.6001.18702 - Final

    Internet Explorer 8 takes the Web experience beyond the page and introduces a new way to seamlessly experience the power of the Web whether you are a Web developer writing to standards, or an end user discovering a new online service. This beta release is available to everyone, but is primarily for Web developers and designers to test the new tools, layout engine, and programming enhancements.

    Internet Explorer 8 (IE8) has been designed to make everyday tasks easier, provide dynamic security protection and improve the development platform and manageability. End user improvements include a streamlined interface, tabbed browsing, printing advances, improved search functionality, instant feeds (RSS), dynamic security protection, and more.

    -------------------------------------------XP---------------------------------------------------
    Download Internet Explorer 8 for Windows XP/2003 x32: 16.1 MB


    http://download.microsoft.com/download/C/C/0/CC0BD555-33DD-411E-936B-73AC6F95AE11/IE8-WindowsXP-x86-ENU.exe


    Download Internet Explorer 8 for Windows XP/2003 x64: 32.4 MB


    http://download.microsoft.com/download/7/5/4/754D6601-662D-4E39-9788-6F90D8E5C097/IE8-WindowsServer2003-x64-ENU.exe

    --------------------------------------------VISTA--------------------------------------------
    Download Internet Explorer 8 for Windows Vista/2008 x32: 13.2 MB

    http://download.microsoft.com/download/F/8/8/F88F09A2-A315-44C0-848E-48476A9E1577/IE8-WindowsVista-x86-ENU.exe

    Download Internet Explorer 8 for Windows Vista/2008 x64: 24.1 MB

    http://download.microsoft.com/download/D/C/F/DCF5DACB-313F-40C6-889C-AD1F8546099D/IE8-WindowsVista-x64-ENU.exe



    Note That All above Links are DIRECT microsoft Server Links..... Plz Download It as per your Operation System.....

    EXCLUSIVELY By WAR PRAYER

    Sunday, March 1, 2009

    HIDE FOLDERS V1.6 FREE


    HIDE FOLDERS V1.6 FREE

    Hide Folders is free software for Windows operating system. It allows you to securely hide folders with your private and sensitive data. Hidden folders can not be viewed or opened in Windows, they are invisible and inaccessible to other users and applications
    Hide Folders is free for personal and commercial use. Hide Folders is clean software, it does not contain adware or spyware.


    Hide Folders Features
    * Securely hide folders with your confidential data
    * Works on Windows XP and Windows Vista, supports NTFS, FAT32 and FAT file system.
    * Password protection - folders can be unhid only after entering a password within the program.
    * Hidden folders can not be uncovered by deinstalling the program.
    * Unlimited number of folders can be hidden.
    * Folders are hidden even in Windows safe mode.
    * Fast and user-friendly skinned user interface.
    * Intuitive for usage, no learning curve.

    Download Hide Folders
    Version 1.6
    Filesize 1.2mb
    Click Here to download

    Homepage:= http://www.hidefolders.org/

    AN INSTECH GROUP PRODUCTION