Archive for November 2010
Stop using Mortein instead use you computer for Mosquito killing.
Stop using chemical based Insecticides to kill mosquitoes, because you might kill yourself.Download these Anti Mosquito software to repel those annoying insects and be safer & greenerHow does it work?Dragonflies are the mortal enemy for mosquitoes.
How to Clone a Hard Drive
Did know that you could clone your current Hard Drive without having to by extra software? Maybe you didn’t know that all that you needed, was already set up on your current system? Well, it is… and if you follow this tut, you shouldn’t have much of.
How to fix corrupted files in XP
Sometimes when you are executing some program an error comes saying that your xxx file is corrupted so we can not run your program and your whole work is left pending due to that error. Now this problem will not arise because I will show you how to fix.
||| {{Sent Email that automatically delete them after they are read}} ||| with BigString.com
You might remember the world famous scene of Mission Impossible in which after the message has been heard once the message destroys itself. Now it is possible for everybody to have such facility. You can send an E-mail which destroys itself after it.
What are Mail Bombers ?
Mail bomber is the software that floods user’s e-mail with big number of mails. Mails can contain different information: from the simple newsletter to the offer to enlarge your body parts.Mail bombers sometimes are used as mass mailing software and in.
Another Top 10 SQL Injection Scanners
SQL injection is a very popular and easy hack technique of WEB 2.0 application and by using following tools you can your self try you’re Luck. I will write further tutorials to use these things.Checking for SQL Injection vulnerabilities involves auditing.
Deadly Viruses!!!!!
If you think that notepad is useless then you are wrong because you can now do a lot of things with a notepad which you could have never imagined.In this hack I will show you how to format a HDD using a notepad. This is really cool.Step 1. Copy The Following.
What’s a worm?
A worm is a computer virus designed to copy itself, usually in large numbers, by using e-mail or other form of software to spread itself over an internal network or through the internet.How do they spread?When you receive a worm over e-mail, it will.
Top 10 Linux Hacking Tools
This is a Cool Collection of Top Ten Linux Hacking Tools.1. nmap – Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single.
Top 10 Windows Hacking Tools
This is the Collection of Best Windows Hacking Tools:1. Cain & Abel – Cain & Abel is a password recovery tool for the Microsoft Windows Operating System. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted.
Free VoIP Software Phones
EkigaEkiga is an H.323 compatible videoconferencing and VOIP/IP-Telephony application that allows you to make audio and video calls to remote users with H.323 hardware or software (such as Microsoft Netmeeting). It supports all modern videoconferencing.
5 ways to Speed up Torrent Download

1. Cap your upload (most important)Limit your upload speed to approximately 80 percent of your maximum upload rate. You can check your upload speed over here (never trust your isp). Once you know your maximum upload speed, change the max upload (to 80%).