Monday, May 27

How to crack password for pirated softwares ???

Most of you download and use pirated software from torrents or any such other sites, but sometime it gets very difficult to find serial key of those softwares. I will make it easy for you by showing you simple yet very interesting google trick which will allow you to find serial key of any software very easily.


How To Find Serial Key Of Any Software ?
The key 94FBR is a part of  Office 2000 Pro CD activation key that is widely distributed as it bypasses the activation requirements of Office 2000 Pro. By searching for 94fbr and the product name, you are guarantee that the pages that are returned are pages dealing specifically with the product you're wanting a serial for. Follow simple steps given below to learn this trick

    1. Go to Google
    2. Then type  Software Name 94FBR

  • Replace Software Name with the name of software whose serial key you want to find
  • Eg: To find serial key of Nero i will type Nero 94fbr
    3. Now press Enter and you will find serial key of software you are looking for as shown below.



Admin password hack for all version of Windows !!

Here is the way to change the administrator password for any version of windows without knowing the password of the admin . Just follow the instructions shown in this video and you will be able to change the admin account password .

Warning : For educational purpose only.

Admin password cracking ( applicable for XP)



Here is another simple way through which you can reset the password of any non-administrator accounts. The only requirement for this is that you need to have administrator privileges. Here is a step-by-step instruction to accomplish this task.
1. Open the command prompt (Start->Run->type cmd->Enter)
2. Now type net user and hit Enter
3. Now the system will show you a list of user accounts on the computer. Say for example you need to reset the password of the account by name ADMIN, then do as follows
4. Type net user ADMIN  * and hit Enter(Note: there is space between ADMIN and *) .Now the system will ask you to enter the new password for the account. That’s it. Now you’ve successfully reset the password for John without knowing his old password.
So in this way you can reset the password of any Windows account at times when you forget it so that you need not re-install your OS for any reason. I hope this helps.

Sunday, May 26

Digital Device to Draw & Measure Ever-Elusive Straight Lines



If you have ever drafted by hand for work or pleasure, you know that straight lines are hard to sketch or trace by pen or pencil without something as your guide – and laying down the ruler, triangle or square each time takes, well, time. What if you could just snap something onto your drawing tool instead?

But this concept goes beyond simple enabling linear effects – from drafting to simply underlining more neatly in books – it is envisioned by product designer Giha Woo as a way to measure while you draw as well, and display the results in realtime on a digital readout.

These days there may not seem much need since computers can draft for you, but any creative person knows there is something about putting pen to paper (or stylus to pad, at the very least) that gives you a more visceral connection to your creation.

iPhone Dockin station......... Cool !!

The old and the new worlds collide with the $49.99 iClassic Phone Docking Station. As you should be able to deduce from the name of the device itself, it will sport a classic phone design – receiver and all, although there is a docking port available for you to dock your iPhone inside. Basically, whenever you receive a call on your iPhone, you can pick up the receiver on the iClassic Phone Docking Station and start talking away.
It is nice to know that the iClassic Phone Docking Station plays nice with your handset’s very own AC charger, and will come with built-in volume slide switch as well as a receive/disconnect button, accompanied by a flashing blue “light ring” call indicator, and will play nice with majority of the smartphones out there. Heck, it will also juice up your power hungry smartphone whenever it remains docked, and at least you need not worry about having too many unseen rays bombarding your head while you talk. A quartet of ancient C batteries are required to power the blue call indicator light. 

Wrist Charger For All Gadgets

Bracer of Battery Life +2

One of the best parts of road trips is quality time playing our favorite handheld games. (This is, of course, why you insist someone else drives the vehicle.) But the problem with long road trips is that you often exhaust the battery life of your gaming system before the point on the road trip where you really, really need it. Of course, we're talking about mile 150 of 300, where the guy riding shotgun starts in on a political diatribe and the person sitting next to you begins to have intestinal upset from the food recently delivered through the driver's side window. Where's Mario now? Oh yeah, he's dead until you can find an outlet. Are we there yet?
The Wrist Charger, or as we like to call it, Bracer of Battery Life +2, straps comfortably to your wrist and plugs in to just about any electronic device you like. It'll power cell phones, mp3 players, gaming systems, or any device compatible with mini USB. Now you'll have plenty of power to get through long days traveling (or long lines at the DMV, we've been there, too!). When you reach your destination, simply plug your bracer in and charge its battery back up so you're ready with plenty of entertainment for the long trip home.
Game Longer!

Talk Longer!

Charging

Product Specifications
  • Wristband battery charger will charge your device while you use it!
  • Great for extending the battery life of your handheld game system or cell phone while traveling.
  • Features:
    • Rechargeable Lithium ion Battery (1,500mAh, 5.5V)
    • Capacity: 1,500mAh, 5.5V
    • Input: DC 5V
    • LED Indicators - Power-On and 4 Levels Power Meter
    • On/Off button design
    • Dimension: 256 x 34 x 12mm (approx.)
    • Weight: 82g
  • Connectors:
    • iPhone & iPod
    • Nokia II (2mm)
    • Nokia I (3.5mm)
    • Mini USB (for Motorola/HTC/Dopod/MP3/MP4)
    • Micro USB (Kindle, other phones & devices)
    • LG
    • Samsung i900
    • Sony Ericsson
    • Sony PSP
    • NDS Lite
    • Nintendo DSi & 3DS
  • Package Contents:
    • 1 x USB Wrist Band Battery
    • 1 x Mini USB Cable
    • 1 x Charger Output Cable
    • 9 x Connectors 

Melting Clock

Well, Hello Frndss

When Salvador Dali created his masterpiece The Persistence of Memory some suggested he was making some kind of statement regarding Einstein's newly published treatise on Special Relativity - that the melted clocks represented a surrealist meditation on our notions of a fixed cosmic order. In fact, Dali just thought the melted clocks looked like slabs of camembert left out in the sun too long.
The truth is, time is an illusion - lunchtime, doubly so. We perceive time as a sequence of events in a progressive chain of cause and effect. Were we to lose our perspective of cause and effect, time would lose meaning entirely, and it would seem to sag and melt like soft cheese - metaphorically speaking, of course.
So when performing truly boring tasks, for example: work, we require time pieces to remind us that the passage of time persists without us even being aware of them. Clocks on the walls, in our computers, or in digital watches (which is a pretty neat idea). They show us the passage of time, but they don't show us the ooey-gooey consistency of time that has stretched out into something barely recognizable.
This clock, however, succeeds where those others fail. Here we can accurately see the passage of time whilst being reminded that time drips and flows like fatty rotten milk. Don't worry, though - even if the clock is stretched and pulled like taffy, it still tells accurate time... unless you're spiraling towards the event horizon of a black hole, or traveling at relativistic speeds where time tends to slow and stretch. Hmm... maybe Dali was thinking about special relativity after all?

Features
  • "Melted" clock with chrome trim
  • Perfectly balanced and rests off the edge of any flat surface
  • Quartz movement
  • Requires 1 AA Battery, not included
  • Measures approximately 7.5" h x 5" w x 6" deep

Top 10 Security Issues That Will Destroy Your Computer In 2013

Cyber security guys say it will only get worse in 2013.
Senior researchers at Russian-based Kaspersky Lab, one of the world’s top three internet security software companies, came out with their list of ominous predictions on Wednesday.
Whether you’re paying credit card bills on an Android or running the IT network for a Fortune 500 company, here is what Kasperky Lab says you can expect baring down on you next year.
1. Targeted Attacks
While the threat landscape is still dominated by random, speculative attacks designed to steal personal information from anyone unlucky enough to fall victim to them, targeted attacks have become an established feature in the last two years. Such attacks are specifically tailored to penetrate a particular organization and are often focused on gathering sensitive data that has a monetary value in the ‘dark market’. Targeted attacks can often be highly sophisticated. But many attacks start by ‘hacking the human’, i.e. by tricking employees into disclosing information that can be used to gain access to corporate resources. Any organization can become a victim. All organizations hold data that is of value to cybercriminals; and they may also be used as ‘stepping-stones’ to reach other companies.”
2. More Hactivism
Last year’s attacks included the DDoS attacks launched by Anonymous on government websites in Poland, following the government’s announcement that it would support ACTA (the Anti-Counterfeiting Trade Agreement); the hacking of the official Formula 1 website in protest against the treatment of anti-government protesters in Bahrain; the hacking of various oil companies in protest against drilling in the Arctic; the attack on Saudi Aramco; and the hacking of the French Euromillions website in a protest against gambling. Society’s increasing reliance on the Internet makes organizations of all kinds potentially vulnerable to attacks of this sort, so ‘hacktivism’ looks set to continue into 2013 and beyond.”
3. Cyber Espionage & Warfare
Stuxnet pioneered the use of highly sophisticated malware for targeted attacks on key production facilities. However, while such attacks are not commonplace, it’s now clear that Stuxnet was not an isolated incident. We are now entering an era of cold ‘cyber-war’, where nations have the ability to fight each other unconstrained by the limitations of conventional real-world warfare. Looking ahead we can expect more countries to develop cyber weapons.”
4. Big Brother Watching Even More
(This will include) using technology to monitor the activities of those suspected of criminal activities. This is not a new issue – consider the controversy surrounding ‘Magic Lantern’ and the ‘Bundestrojan’. More recently, there has been debate around reports that a UK company offered the ‘Finfisher’ monitoring software to the previous Egyptian government and reports that the Indian government asked firms (including Apple, Nokia and RIM) for secret access to mobile devices. Clearly, the use of legal surveillance tools has wider implications for privacy and civil liberties. And as law enforcement agencies, and governments, try to get one step ahead of the criminals, it’s likely that the use of such tools – and the debate surrounding their use – will continue.”
5. Increase in Malware
The wide use of mobile devices, while offering huge benefits to a business, also increases the risk. Cloud data can be accessed from devices that may not be as secure as traditional endpoint devices. When the same device is used for both personal and business tasks, that risk increases still further.”
6. Privacy Rights Eroding
The value of personal data – to cybercriminals and legitimate businesses – will only grow in the future, and with it the potential threat to our privacy increases.”
7. Cyber Extortion
This year we have seen growing numbers of ransomware Trojans designed to extort money from their victims, either by encrypting data on the disk or by blocking access to the system. Until fairly recently this type of cybercrime was confined largely to Russia and other former Soviet countries. But they have now become a worldwide phenomenon, although sometimes with slightly different modus operandi. In Russia, for example, Trojans that block access to the system often claim to have identified unlicensed software on the victim’s computer and ask for a payment. In Europe, where software piracy is less common, this approach is not as successful. Instead, they masquerade as popup messages from law enforcement agencies claiming to have found child pornography or other illegal content on the computer. This is accompanied by a demand to pay a fine. Such attacks are easy to develop and, as with phishing attacks, there seem to be no shortage of potential victims.”
8. Apple Under Attack
Attacks on the Mac OS has been growing steadily over the last two years; and it would be naive of anyone using a Mac to imagine that they could not become the victim of cyber crime. It’s not only generalized attacks – such as the 700,000-strong Flashfake botnet – that pose a threat; we have also seen targeted attacks on specific groups, or individuals, known to use Macs. The threat to Macs is real and is likely keep growing.”
9. Android, Even Worse
Mobile malware has exploded in the last 18 months. The lion’s share of it targets Android-based devices – more than 90 per cent is aimed at this operating system. The appearance of the ‘Find and Call’ app earlier this year has shown that it’s possible for undesirable apps to slip through the net. But it’s likely that, for the time being at least, Android will remain the chief focus of cyber criminals. The key significance of the ‘Find and Call’ app lies in the issue of privacy, data leakage and the potential damage to a person’s reputation: this app was designed to upload someone’s phone book to a remote server and use it to send SMS spam.”
10. Un-Patched Exploits In Java

One of the key methods used by cyber criminals to install malware on a computer is to exploit un-patched vulnerabilities in applications. This relies on the existence of vulnerabilities and the failure of individuals or businesses to patch their applications. Java vulnerabilities currently account for more than 50 per cent of attacks, while Adobe Reader accounts for a further 25 per cent. cyber criminals will continue to exploit Java in the year ahead. It’s likely that Adobe Reader will also continue to be used by cyber criminals, but probably less so because the latest versions provide an automatic update mechanism.”

Shutdown Your Computer or a Remote PC via Command Prompt

Most of us shutdown our computers using the power button given in the Start menu. Some of us use the physical power button on our machines. Very few people actually use other means of shutting down a computer and even less is the number of people who use the command prompt to shutdown a computer.

A reason for this is that most of us don't know that the command prompt can be used to not only shutdown, restart or log off our computer instantly but also to shutdown a remote computer provided you have administrative access. It can also be used to hibernate a computer and give a comment containing the reason for shutdown. This post will show you how to do all this.


Shutdown computer with command prompt
Required
A computer running Windows (XP, Vista, 7 or 8) with the command prompt working perfectly, i.e. not disabled by a virus

Initial Steps
1) Press Windows Key + R.
2) Enter CMD and press Enter.

This will start the command prompt. Follow the instructions below depending on what you want to do.

Shutdown Local Machine (Your Computer)
Type "shutdown -s" without the quotes in the command prompt and press Enter. Shutdown is the command being executed and the switch -s tells the computer to shutdown.

Restart your Local Computer
Type "shutdown -r" in the command prompt and press Enter. In this case, the command switch -r is telling the computer to restart after shutdown.

Log Off the Current User
Type "shutdown -l" in the command prompt and press Enter. The -l command switch tells the computer to log off.

Shutdown a Remote Computer
Type "shutdown -s -m \\name of the computer" in the command prompt and press Enter. Replace \\name of the computer with the actual name of the remote computer you are trying to shutdown. As mentioned earlier, you must have administrative access to the computer you are trying to shutdown. To know if you have administrative access, press Windows key + R and then type the name of the computer and press Enter.

Note: If you don't remember the name of the remote computer, you can look for it by opening a list of all the computers you are connected to by executing "net view" in command prompt.

If you can connect to the computer, you will be asked to login with your username and password. Upon entering them, a window will display the list of all the directories available to you. This should help you know whether you can or cannot shutdown the remote computer.

Hibernate a Local Computer
Type in "Rundll32.exe Powrprof.dll,SetSuspendState" without the quotes and press Enter. Your computer should hibernate, if it does not, then you must enable hibernation to do this.

Shutdown your or a remote computer after a specific time
Type "shutdown -s -t 60" to shutdown your computer after 60 seconds. Upon executing this, a countdown timer displaying a warning message will be shown. This command uses the -t command switch followed by a variable (which is 60 in this case) which represents the number of seconds after which the computer will shutdown.

Display a Message containing the reason for shutdown
Type shutdown -s  -t 500 -c "I am tired. I don't want to work anymore." (with the quotes) in the Command Prompt and press Enter. The -c switch is used in the code to give the reason for shutting down and what is followed in quotes will be displayed in the dialog box as the reason. This can be used to display all sorts of funny messages. One example :-

Skynet has become self aware. John Connor did not stop me. You can not use your PC anymore.

Stop a System Shutdown
Type "shutdown -a" and press Enter. This will stop the system from shutting down if the countdown to shut down has not reached 0.

All Keyboard shortcuts for windows PC.

 
Here are the keyboard shortcuts for every purpose .

Windows Basic Key Shortcuts

    F1: Help
    CTRL+ESC: Open Start menu
    ALT+TAB: Switch between open programs
    ALT+F4: Quit program
    SHIFT+DELETE: Delete item permanently
    Windows Logo+L: Lock the computer (without using CTRL+ALT+DELETE)

Windows program key combinations

    CTRL+C: Copy
    CTRL+X: Cut
    CTRL+V: Paste
    CTRL+Z: Undo
    CTRL+B: Bold
    CTRL+U: Underline
    CTRL+I: Italic

Mouse click/keyboard modifier combinations for shell objects

    SHIFT+right click: Displays a shortcut menu containing alternative commands
    SHIFT+double click: Runs the alternate default command (the second item on the menu)
    ALT+double click: Displays properties
    SHIFT+DELETE: Deletes an item immediately without placing it in the Recycle Bin

General keyboard-only commands

    F1: Starts Windows Help
    F10: Activates menu bar options
    SHIFT+F10 Opens a shortcut menu for the selected item (this is the same as right-clicking an object
    CTRL+ESC: Opens the Start menu (use the ARROW keys to select an item)
    CTRL+ESC or ESC: Selects the Start button (press TAB to select the taskbar, or press SHIFT+F10 for a context menu)
    CTRL+SHIFT+ESC: Opens Windows Task Manager
    ALT+DOWN ARROW: Opens a drop-down list box
    ALT+TAB: Switch to another running program (hold down the ALT key and then press the TAB key to view the task-switching window)
    SHIFT: Press and hold down the SHIFT key while you insert a CD-ROM to bypass the automatic-run feature
    ALT+SPACE: Displays the main window's System menu (from the System menu, you can restore, move, resize, minimize, maximize, or close the window)
    ALT+- (ALT+hyphen): Displays the Multiple Document Interface (MDI) child window's System menu (from the MDI child window's System menu, you can restore, move, resize, minimize, maximize, or close the child window)
    CTRL+TAB: Switch to the next child window of a Multiple Document Interface (MDI) program
    ALT+underlined letter in menu: Opens the menu
    ALT+F4: Closes the current window
    CTRL+F4: Closes the current Multiple Document Interface (MDI) window
    ALT+F6: Switch between multiple windows in the same program (for example, when the Notepad Find dialog box is displayed, ALT+F6 switches between the Find dialog box and the main Notepad window)

Shell objects and general folder/Windows Explorer shortcuts

For a selected object:

    F2: Rename object
    F3: Find all files
    CTRL+X: Cut
    CTRL+C: Copy
    CTRL+V: Paste
    SHIFT+DELETE: Delete selection immediately, without moving the item to the Recycle Bin
    ALT+ENTER: Open the properties for the selected object

To copy a file

Press and hold down the CTRL key while you drag the file to another folder.
To create a shortcut

Press and hold down CTRL+SHIFT while you drag a file to the desktop or a folder.
General folder/shortcut control

    F4: Selects the Go To A Different Folder box and moves down the entries in the box (if the toolbar is active in Windows Explorer)
    F5: Refreshes the current window.
    F6: Moves among panes in Windows Explorer
    CTRL+G: Opens the Go To Folder tool (in Windows 95 Windows Explorer only)
    CTRL+Z: Undo the last command
    CTRL+A: Select all the items in the current window
    BACKSPACE: Switch to the parent folder
    SHIFT+click+Close button: For folders, close the current folder plus all parent folders

Windows Explorer tree control

    Numeric Keypad *: Expands everything under the current selection
    Numeric Keypad +: Expands the current selection
    Numeric Keypad -: Collapses the current selection.
    RIGHT ARROW: Expands the current selection if it is not expanded, otherwise goes to the first child
    LEFT ARROW: Collapses the current selection if it is expanded, otherwise goes to the parent

Properties control

    CTRL+TAB/CTRL+SHIFT+TAB: Move through the property tabs

Accessibility shortcuts

    Press SHIFT five times: Toggles StickyKeys on and off
    Press down and hold the right SHIFT key for eight seconds: Toggles FilterKeys on and off
    Press down and hold the NUM LOCK key for five seconds: Toggles ToggleKeys on and off
    Left ALT+left SHIFT+NUM LOCK: Toggles MouseKeys on and off
    Left ALT+left SHIFT+PRINT SCREEN: Toggles high contrast on and off

Microsoft Natural Keyboard keys

    Windows Logo: Start menu
    Windows Logo+R: Run dialog box
    Windows Logo+M: Minimize all
    SHIFT+Windows Logo+M: Undo minimize all
    Windows Logo+F1: Help
    Windows Logo+E: Windows Explorer
    Windows Logo+F: Find files or folders
    Windows Logo+D: Minimizes all open windows and displays the desktop
    CTRL+Windows Logo+F: Find computer
    CTRL+Windows Logo+TAB: Moves focus from Start, to the Quick Launch toolbar, to the system tray (use RIGHT ARROW or LEFT ARROW to move focus to items on the Quick Launch toolbar and the system tray)
    Windows Logo+TAB: Cycle through taskbar buttons
    Windows Logo+Break: System Properties dialog box
    Application key: Displays a shortcut menu for the selected item

Microsoft Natural Keyboard with IntelliType software installed

    Windows Logo+L: Log off Windows
    Windows Logo+P: Starts Print Manager
    Windows Logo+C: Opens Control Panel
    Windows Logo+V: Starts Clipboard
    Windows Logo+K: Opens Keyboard Properties dialog box
    Windows Logo+I: Opens Mouse Properties dialog box
    Windows Logo+A: Starts Accessibility Options (if installed)
    Windows Logo+SPACEBAR: Displays the list of Microsoft IntelliType shortcut keys
    Windows Logo+S: Toggles CAPS LOCK on and off

Dialog box keyboard commands

    TAB: Move to the next control in the dialog box
    SHIFT+TAB: Move to the previous control in the dialog box
    SPACEBAR: If the current control is a button, this clicks the button. If the current control is a check box, this toggles the check box. If the current control is an option, this selects the option.
    ENTER: Equivalent to clicking the selected button (the button with the outline)
    ESC: Equivalent to clicking the Cancel button
    ALT+underlined letter in dialog box item: Move to the corresponding item