Monday, December 20, 2010
Sunday, December 19, 2010
Friday, December 10, 2010
10 Tips to avoid FaceBook Hackers and Viruses
10 Tips to avoid FaceBook Hackers and Viruses
With over 300 million FaceBook users actively using FaceBook, it has become the new area for hackers to spread viruses and steal your account information.
Below are some tips to avoid becoming a victim.
1. Install Anti Virus and keep it up to date. AVG is the most reliable for Social Media.
2. At the moment all viruses are spread via Facebook email and Wall posts.
3. If you see numerous friends posting the same message with links then contact them off FaceBook and warn them that their FaceBook account may have been compromised.
4. Do not open a link telling you to go to a YouTube video with a link that uses http://bit.ly . YouTube have their own link shortener http://youtu.be .
5. If a message from a friend does not sound like them. It probably is not them. Delete the message and let your friend know of the message.
6. If your account does have a virus, run a virus checker and then change your Facebook password.
7. If you have completed step 5, then email all of your FaceBook friends to let them now and suggest these tips to them. The more vigilant we are against this the less likely FaceBook will be targeted.
8. If you click a link and are asked to log back into FaceBook DON’T. This is a common tactic to steal your login details.
9. If you add people to your account that you do not know and they send you a message stating that you are in a video or pic etc then remember that they do not know you. This will be a virus.
10. Join our FanPage for the most up to date information about new viruses and FaceBook threats along with the best solution to rectify the problem.
source :
http://www.netmania.co.nz/
With over 300 million FaceBook users actively using FaceBook, it has become the new area for hackers to spread viruses and steal your account information.
Below are some tips to avoid becoming a victim.
1. Install Anti Virus and keep it up to date. AVG is the most reliable for Social Media.
2. At the moment all viruses are spread via Facebook email and Wall posts.
3. If you see numerous friends posting the same message with links then contact them off FaceBook and warn them that their FaceBook account may have been compromised.
4. Do not open a link telling you to go to a YouTube video with a link that uses http://bit.ly . YouTube have their own link shortener http://youtu.be .
5. If a message from a friend does not sound like them. It probably is not them. Delete the message and let your friend know of the message.
6. If your account does have a virus, run a virus checker and then change your Facebook password.
7. If you have completed step 5, then email all of your FaceBook friends to let them now and suggest these tips to them. The more vigilant we are against this the less likely FaceBook will be targeted.
8. If you click a link and are asked to log back into FaceBook DON’T. This is a common tactic to steal your login details.
9. If you add people to your account that you do not know and they send you a message stating that you are in a video or pic etc then remember that they do not know you. This will be a virus.
10. Join our FanPage for the most up to date information about new viruses and FaceBook threats along with the best solution to rectify the problem.
source :
http://www.netmania.co.nz/
How to avoid malware on Facebook and Twitter
How To Stay Safe
There are a number of best practices that you should follow in order to stay safe and avoid infection. They are as follows:
1. Don't assume a link is "safe" because it's from a friend: As noted above, your friend's account may be infected. You should never assume that a link is safe just because a friend tweeted it or posted it to your wall. Use your common sense. If it doesn't sound like something they would say, be wary, don't click. If you're unsure, try to contact them through another channel and see if the link is legit.
2. Don't assume Twitter links are safe because Twitter is now scanning for malware: In August, Twitter partnered with Google to use Google's Safe Browsing API, a technology that checks URLs against Google's blacklist. This prevents spammers from posting malicious URLs to Twitter, but it does NOT prevent them from posting shortened URLs which direct users to those same malicious sites. It's better than no protection at all, but it's not going to keep you entirely safe.
3. Don't Assume Bit.ly Links are Safe: Earlier this year, Twitter's default URL-shortening service Bit.ly, began warning users of malware. Bit.ly also uses Google's Safe Browsing API along with two other blacklists to identify malicious links. Although the service doesn't prevent users from posting these links, it will warn upon clicking that the site being linked to is infected. However, as Raiu tells us, this is not 100% effective either. Kaspersky has identified a number of malicious links which Bit.ly did not block. However, you can assume that Bit.ly is generally safer than the other URL-shortening services because it uses this technology and because the hackers are generally avoiding this service at the moment because of its built-in protection. But it is not completely safe - nothing ever is.
4. Use an up-to-date web browser: Kaspersky recommends using the latest version of your web browser and keeping it up-to-date with the necessary patches. That means Internet Explorer users should be on IE8 - and since this browser is attacked the most, it's critical that you make sure it stays updated as needed. Firefox is the second most attacked browser, but fortunately, it has a self-updating feature built in. Google Chrome is also good because it has a self-updating feature as well as another security feature that runs plugins in "sandboxes," or restricted environments. If an attacker was able to exploit the browser and run malicious code, it would be isolated to this sandbox and would not able to effect the entire machine. Opera and Safari are also good browsers and should be kept current, too.
5. Keep Windows up-to-date: As always, Windows users should make sure their systems are current with the latest patches from Microsoft. Automatic updates should be turned on.
6. Keep Adobe Reader and Adobe Flash up-to-date: At the moment, Adobe Reader and Flash are the two most targeted programs by hackers. A lot of malware specifically goes after known vulnerabilities within Adobe's software. In addition, a common method of attack, such as that used by Koobface, is to redirect a victim to a malware-infested site where the user is prompted to update their Flash player or Adobe Reader in order to see the website content. NEVER do this. Always go to Adobe's site on your own to download the latest version or update the software on your computer using its own built-in update mechanisms.
7. Don't assume you're safe because you use a Mac: While it's true that Mac users are less targeted than Windows users, they are not immune to malware, despite what those commercials may say. Although Apple did include some malware protection in their latest operating system, it only protects users from two trojans; you cannot count on it alone to protect you. There are a couple of hundred of trojans currently in the wild that specifically target Mac machines, according to Kaspersky. In fact, there may even be as many as a thousand, but researchers are unable to identify all of them because Mac users don't typically run anti-virus software which is how much of the data is collected. These days, when a user clicks an infected link, the malicious web page will now sometimes identify whether that user is coming from a Windows or Mac machine and then display the appropriate version of the trojan accordingly. A particular family of trojans known as "DNS Changer" trojans are the most common ones used to attack Mac machines. The only way to really be sure that you're protected against these malicious programs is to run anti-malware software on your Mac, but most Mac users won't do so, preferring to take their chances since their risk is lower.
8. Be wary of email messages from social networks: Because email addresses can be "spoofed" by hackers, you can't assume that an email from Facebook or Twitter is really from those the site it claims to be from. As always, you should never open attachments you were not expecting to receive and you should be wary of clicking on links - especially if you're being told to "update your account." If you do click on a link and are taken to a web page that asks you to log into the site, DON'T DO IT. It would be handing over your password to the hackers. Instead, you should always access the sites directly by typing in their URL in your browser or clicking a saved link in your Favorites.
source :
http://www.readwriteweb.com/
There are a number of best practices that you should follow in order to stay safe and avoid infection. They are as follows:
1. Don't assume a link is "safe" because it's from a friend: As noted above, your friend's account may be infected. You should never assume that a link is safe just because a friend tweeted it or posted it to your wall. Use your common sense. If it doesn't sound like something they would say, be wary, don't click. If you're unsure, try to contact them through another channel and see if the link is legit.
2. Don't assume Twitter links are safe because Twitter is now scanning for malware: In August, Twitter partnered with Google to use Google's Safe Browsing API, a technology that checks URLs against Google's blacklist. This prevents spammers from posting malicious URLs to Twitter, but it does NOT prevent them from posting shortened URLs which direct users to those same malicious sites. It's better than no protection at all, but it's not going to keep you entirely safe.
3. Don't Assume Bit.ly Links are Safe: Earlier this year, Twitter's default URL-shortening service Bit.ly, began warning users of malware. Bit.ly also uses Google's Safe Browsing API along with two other blacklists to identify malicious links. Although the service doesn't prevent users from posting these links, it will warn upon clicking that the site being linked to is infected. However, as Raiu tells us, this is not 100% effective either. Kaspersky has identified a number of malicious links which Bit.ly did not block. However, you can assume that Bit.ly is generally safer than the other URL-shortening services because it uses this technology and because the hackers are generally avoiding this service at the moment because of its built-in protection. But it is not completely safe - nothing ever is.
4. Use an up-to-date web browser: Kaspersky recommends using the latest version of your web browser and keeping it up-to-date with the necessary patches. That means Internet Explorer users should be on IE8 - and since this browser is attacked the most, it's critical that you make sure it stays updated as needed. Firefox is the second most attacked browser, but fortunately, it has a self-updating feature built in. Google Chrome is also good because it has a self-updating feature as well as another security feature that runs plugins in "sandboxes," or restricted environments. If an attacker was able to exploit the browser and run malicious code, it would be isolated to this sandbox and would not able to effect the entire machine. Opera and Safari are also good browsers and should be kept current, too.
5. Keep Windows up-to-date: As always, Windows users should make sure their systems are current with the latest patches from Microsoft. Automatic updates should be turned on.
6. Keep Adobe Reader and Adobe Flash up-to-date: At the moment, Adobe Reader and Flash are the two most targeted programs by hackers. A lot of malware specifically goes after known vulnerabilities within Adobe's software. In addition, a common method of attack, such as that used by Koobface, is to redirect a victim to a malware-infested site where the user is prompted to update their Flash player or Adobe Reader in order to see the website content. NEVER do this. Always go to Adobe's site on your own to download the latest version or update the software on your computer using its own built-in update mechanisms.
7. Don't assume you're safe because you use a Mac: While it's true that Mac users are less targeted than Windows users, they are not immune to malware, despite what those commercials may say. Although Apple did include some malware protection in their latest operating system, it only protects users from two trojans; you cannot count on it alone to protect you. There are a couple of hundred of trojans currently in the wild that specifically target Mac machines, according to Kaspersky. In fact, there may even be as many as a thousand, but researchers are unable to identify all of them because Mac users don't typically run anti-virus software which is how much of the data is collected. These days, when a user clicks an infected link, the malicious web page will now sometimes identify whether that user is coming from a Windows or Mac machine and then display the appropriate version of the trojan accordingly. A particular family of trojans known as "DNS Changer" trojans are the most common ones used to attack Mac machines. The only way to really be sure that you're protected against these malicious programs is to run anti-malware software on your Mac, but most Mac users won't do so, preferring to take their chances since their risk is lower.
8. Be wary of email messages from social networks: Because email addresses can be "spoofed" by hackers, you can't assume that an email from Facebook or Twitter is really from those the site it claims to be from. As always, you should never open attachments you were not expecting to receive and you should be wary of clicking on links - especially if you're being told to "update your account." If you do click on a link and are taken to a web page that asks you to log into the site, DON'T DO IT. It would be handing over your password to the hackers. Instead, you should always access the sites directly by typing in their URL in your browser or clicking a saved link in your Favorites.
source :
http://www.readwriteweb.com/
How to delete blog
To delete your entire blog, just go to Settings | Basic:
Settings | Basics
At this point, make absolutely sure that you are on the right blog and that you want to permanently remove it from your account. Then click Delete This Blog: and confirm by clicking OK
Delete blog
Note:
* If your blog is on your own server, its files will not be deleted. You can FTP in and delete them manually.
source :
http://www.google.com/support/blogger/bin/answer
Saturday, December 4, 2010
Windows 7 Drivers
Click here :
http://pcsupport.about.com/od/driverssupport/tp/windows-7-drivers.htm
or using windows update....
http://pcsupport.about.com/od/driverssupport/tp/windows-7-drivers.htm
or using windows update....
Tips for fixing common driver problems wins 7
When hardware that's installed in, or attached to, a computer doesn't work properly, it's often because of a driver problem. Hardware and devices require drivers to work properly with a computer.
Here are solutions to some common driver problems.
You can also try running a troubleshooter to diagnose and fix common problems with hardware and devices.
To run a hardware and devices troubleshooter
Click
http://windows.microsoft.com/en-US/windows7/Tips-for-fixing-common-driver-problems
Here are solutions to some common driver problems.
You can also try running a troubleshooter to diagnose and fix common problems with hardware and devices.
To run a hardware and devices troubleshooter
Click
http://windows.microsoft.com/en-US/windows7/Tips-for-fixing-common-driver-problems
My computer is running slow what steps can I do to fix it?
Cause:
This issue can be caused by any of the below possibilities.
1. Hard disk drive is short on available disk space.
2. Several software programs have been installed/uninstalled leaving behind bad files and/or confusing the software.
3. Data Corruption.
4. Missing Windows updates / Outdated drivers.
5. Computer is overheating.
6. Corrupt OS.
7. Bad Hardware.
source :
http://www.computerhope.com/
This issue can be caused by any of the below possibilities.
1. Hard disk drive is short on available disk space.
2. Several software programs have been installed/uninstalled leaving behind bad files and/or confusing the software.
3. Data Corruption.
4. Missing Windows updates / Outdated drivers.
5. Computer is overheating.
6. Corrupt OS.
7. Bad Hardware.
source :
http://www.computerhope.com/
Di mana saya belajar komputer?
Ramai bertanya di mana saya belajar komputer hingga tahu membaiki komputer?
Saya belajar melalui teman baik bernama Rahmat,beliau juruteknik komputer.Selain itu saya membaca buku komputer dan menonton dalam Youtube.Saya juga sering menggunakan Yahoo answer untuk mendapat lebih banyak ilmu.
Ia menambahkan pengetahuan dalam bidang komputer.Walaupun bukan lulusan sains komputer,saya mengambil inisiatif belajar tentang komputer dan internet kerna minat dan mahu memanfaatkan teknologi.
Saya masih banyak belajar dan terus belajar.Berkat kesabaran,saya mampu membaiki komputer dan jika tidak berjumpa penyelesaian saya mmebaca buku-buku komputer.
Komputer dan internet adalah teknologi dan kita perlu belajar tentang dunia komputer dan internet...
Belajarlah!
Saya belajar melalui teman baik bernama Rahmat,beliau juruteknik komputer.Selain itu saya membaca buku komputer dan menonton dalam Youtube.Saya juga sering menggunakan Yahoo answer untuk mendapat lebih banyak ilmu.
Ia menambahkan pengetahuan dalam bidang komputer.Walaupun bukan lulusan sains komputer,saya mengambil inisiatif belajar tentang komputer dan internet kerna minat dan mahu memanfaatkan teknologi.
Saya masih banyak belajar dan terus belajar.Berkat kesabaran,saya mampu membaiki komputer dan jika tidak berjumpa penyelesaian saya mmebaca buku-buku komputer.
Komputer dan internet adalah teknologi dan kita perlu belajar tentang dunia komputer dan internet...
Belajarlah!
Friday, November 26, 2010
Facebook viruses
“Britney Spears is watching you through Facebook webcam!” “You look just awesome in this new movie!” Those are just few quotes that were taken from hackers who were trying to hack Facebook accounts by installing a Facebook virus called Koobface. Once you clicked on the messages, you will be brought to a page where you need to update your Flash player before the video can be viewed. Therein lies the virus, cloaked in a “flash_player.exe” file.
So what can you do to prevent or remove this stinky Facebook virus? Facebook has posted a “How-to” method to guide users on overcoming this problem:
Some preventive measures that you should take to avoid such things happen :
* If a link or message seems weird, don’t click on it.
* Be aware of where you enter your password.
* Report any spam or abuse you see on discussion boards and Walls.
* Don’t use the same password on Facebook that you use in other places on the web.
* Never share your password with anyone.
* Don’t click on links or open attachments in suspicious emails.
* Add a security question.
souce :
http://edwardkhoo.com
Windows Defender
Windows Defender is software that helps protect your computer against pop-ups, slow performance, and security threats caused by spyware and other unwanted software by detecting and removing known spyware from your computer. Windows Defender features Real-Time Protection, a monitoring system that recommends actions against spyware when it's detected, minimizes interruptions, and helps you stay productive.
The benefits of installing Windows Defender include:
Spyware detection and removal
*
Windows Defender quickly and easily finds spyware and other unwanted programs that can slow down your computer, display annoying pop-up ads, change Internet settings, or use your private information without your consent.
*
Windows Defender eliminates detected spyware easily at your direction, and if you inadvertently remove programs that you actually want, it's easy to get them back.
*
Windows Defender allows you to schedule your scanning and removal times when it's convenient for you, whether it's on-demand or on a schedule that you set.
Improved Internet browsing safety
*
Windows Defender helps stop spyware before it infiltrates your computer. Windows Defender also offers a continuous safeguard designed to target all the ways that spyware can infiltrate your computer.
*
Windows Defender works without distracting you. It runs in the background and automatically handles spyware based on preferences that you set. You can use your computer with minimal interruption.
Protection against the latest threats
*
A dedicated team of Microsoft researchers continuously searches the Internet to discover new spyware and develop methods to counteract it.
*
A voluntary, worldwide network of Windows Defender users helps Microsoft determine which suspicious programs to classify as spyware. Participants help discover new threats quickly and notify Microsoft analysts, so that everyone is better protected. Anyone who uses Windows Defender can join this network and help report potential spyware to Microsoft.
*
To help protect your computer from the latest threats, you can choose to have updates that counteract new spyware automatically downloaded to your computer.
Windows Defender is included with all versions of Windows Vista and is available to download for genuine copies of Windows XP Service Pack 2 or later, or Windows Server 2003 Service Pack 1 or later
source :
http://www.microsoft.com/windows/products/winfamily/defender/default.mspx
Sunday, November 21, 2010
Alhmdulillah Page Kisah teladan semakin bertambah tetamu-tetamu....
Monday, November 15, 2010
Thursday, November 11, 2010
Wednesday, November 10, 2010
ParentalControl Bar -FREE!
Parental control filters have a reputation for charging a lot and giving back very little in return. Sometimes, they literally don't give enough back, and have been known to block completely clean sites.
ParentalControl Bar isn't perfect--like its cousins, it blocks some sites that shouldn't be obstructed, and occasionally allows sites that should be blocked. However, the price is right--it costs nothing. Not only does it not extort parents for its services, it allows parents to approve sites both on the fly and via a "Blocked history" list.
The app is small, just over 1MB. The toolbar interface allows parents one-click switching from Parent to Child mode by clicking a button, which changes from red to green. To switch back--or to use any of its nonblocking functions or view a blocked site--a password is required.
Despite claims to the contrary, the program doesn't support Firefox 2, although it does work fine on Internet Explorer 7. For parents looking for a cost-effective tool to help give their children a bit of controlled freedom on the Internet, ParentalControl Bar is a safe way to go.
download FREE.....:
http://download.cnet.com/ParentalControl-Bar/3000-27064_4-10539075.html?tag=contentMain;contentBody;3d
http://www.parentalcontrolbar.org/
Enjoy!
ADOBE Photoshop CS5
Photoshop CS5 greatly expands the toolset that Adobe offers in its flagship product, charting new ways to make image manipulation easier while making older tools work better than before. Don't worry about the lack of a new interface; the new ways to get your project done make this version a must.
Photoshop has been in the English lexicon as a term to edit images for a long time, but the latest version of Adobe's flagship program stretches the canvas of manipulation much further than ever before. The look of the program has changed so little from Photoshop CS4 that users of that version should be instantly comfortable with this major update, but Photoshop Creative Suite 5 Extended gives photographers, artists, designers, and LOLcats obsessives a stunning array of new tools. Among the new features in Adobe's flagship image-editing software are automatic lens corrections, High Dynamic Range toning, automated editing tools, and significant improvements to creating 3D images.
Installation and setup
Photoshop installation is straightforward, although it does require an Adobe account. You can choose to purchase a license key immediately, which you will receive by e-mail, or try out the program for 30 days. When you receive your key, you can copy and paste the entire string directly from your e-mail into the first dialog box, and the other boxes will automatically populate. Both Photoshop CS 5 and the Extended come from the same 980MB installer for Windows, or 1.1GB on a Mac.
Depending on your Internet connection, Adobe says that users can expect download times of anywhere from 14 minutes on a corporate LAN to nearly 90 minutes on slower connections. On a Windows 7 computer with 2GB of RAM and a 2GHz processor on a T1, the download took around 40 minutes.
The Adobe installation process doesn't play well with Mozilla programs such as Firefox and Thunderbird, so those must be shut down before the installation can be finished. You can use other programs while installing, but CPU slowdowns are likely on many computers.
Adobe still refuses to have a Windows installation process that's respectful of standard program installation behavior. Associated program icons do not install into an Adobe folder in your Start menu, but are rather unceremoniously dumped into your Start menu's All Programs pane. First-time upgraders should note that Adobe will not override your previous installation of Photoshop, so you'll have to remove it manually. This may be annoying to some, but it's actually reasonable behavior given the cost of the program and the desire of many users to fully explore the trial. It would be nice if Photoshop came with a utility for removing previous versions, instead of having to go through the imperfect Windows uninstallation tool.
The installation and uninstallation frustrations aren't deal-breakers, obviously, but a little bit more attention here from Photoshop would result in a smoother process.
Interface
Unlike the dramatic interface overhaul that accompanied its predecessor, there's so little new to the look and feel of Photoshop CS5 that it's barely worth mentioning.
The Workspace switcher has been modified so that you can drag it out of the drop-down menu across the menubar. Doing so can push the menubar itself down to a second level, which might take up too much screen space for some people. Pre-existing workspaces can be deleted, custom ones added, and generally the workspace concept has gotten a bit more user-friendly.
Toolbox icons have been redrawn with a softer touch. This has the unfortunate effect of making them look mushy and out-of-focus against their gray background. At least the iconography is the same, so the spot healing brush tool still looks like a band-aid, but this was not a welcome change.
Despite lacking the aesthetic sensibility of its cousin Lightroom 3 (Windows|Mac), the overall layout of Photoshop remains consistent. It's not easy to use, nor is it hard to get used to the modular layout of adjustable panels. Further optional improvements can be made courtesy Adobe Labs' Configurator, for customizing some parts of the navigation. Although the CS4 interface improvements were appreciated, the UI is essentially mundane and in desperate need of refinement. It's sadly ironic that the premiere image editor looks like a cockpit.
Features and support
The new features in Photoshop CS5 completely sell the program. It's a bit hard to fathom that a program that's been around for 20 years continues to innovate and improve as much as Photoshop has, but this version of Photoshop, officially v12, doesn't just stretch itself here. It expands the limits of editing achievement, simplifying previously complex tasks and introducing new ones. It's not reinventing the wrench as much as it's making it do new things that everybody can immediately understand. This review won't cover all the new features and enhancements since there are more than three dozen feature changes alone, but we'll look at some of the best and most important.
The new Mini Bridge should directly affect every user's workflow. It opens a functional version of Adobe Bridge in a panel, speeding up processing by cutting down how often users have to jump out of the main Photoshop interface. Mini Bridge can be launched from the top of the interface to the right of the menubar, from the MB icon. As with any of Photoshop's panels, the Mini Bridge can be resized and moved around the window as needed.
On first launch, the Mini Bridge took longer than expected to read files before it could be used. After that initial sluggishness, it loaded smoothly, even after rebooting the computer. It was noticeably faster to launch images from either Bridge or Mini Bridge into Photoshop compared with the previous version, but sticking Bridge access directly into Photoshop is a long-overdue innovation.
What's new in this version
* Extraordinary painting effects
* Content-Aware Fill
* Complex selections made easy new
* Puppet Warp
* Superior HDR imaging
* Efficient workflow
* Better media management
* 3D extrusions with Adobe
* State-of-the-art raw image processing
* Enhanced 3D realism and rich materials
* Faster performance across platforms
* Streamlined creative reviews
* Improved 32-bit file support
Price : US$ 699.00
buy or not????
Download trial version...........
Total Downloads 15,060,133
http://download.cnet.com/Adobe-Photoshop-Extended/3000-2192_4-10011172.html?tag=mncol;1
Enjoy!
Panduan memuatturun file dari Hotfile
Tuesday, November 9, 2010
Hotfile
Jika ingin mencari pelbagai file sama ada gambar,video,ebook dan apa sahaja untuk dimuatturun,gunakan hotfile.
Klik
http://www.hotfilesearch.com/
Kemudian tulis fail yang mahu dicari,contohnya MP3 Quran dan klik Hotfile search.
Hotfile akan membrikan pelbagai link dan copy link tersebut dan paste kepada browser.
download............
Link lain untuk mencari link hotfile :
http://www.hotfile123.com/
http://hotfilesearchengine.com/
http://hotfilefinder.com/
http://www.filestube.com/
Enjoy!
Thursday, November 4, 2010
opensource?
Opensource, atau dalam bahasa Melayunya "Sumber Terbuka" adalah konseptual dalam perisian yang membenarkan pengguna membuat pengubahsuaian dalam source code (kod sumber, aturcara) perisian berkenaan untuk menganalisis dan juga untuk tujuan penambah-baikkan. Ianya bukan mengenai leakage (bocor) dalam sesuatu source code (kod sumber, aturcara) tetapi memberi peluang kepada pengguna untuk bersama-sama di dalam proses pembangunan perisian berkenaan.
Dengan source code (kod sumber, aturcara) tersebut, pengguna dapat [1]belajar bagaimana pergerakan dan operasi perisian berkenaan, [2]Membetulkan perisian berkenaan sekiranya terdapat bug tanpa perlu menunggu tindakan pihak pembangunan perisian, [3]Membuat penambahbaikan terhadap perisian berkenaan untuk kepentingan komuniti, [4]Menjalankan perisian ini di atas mana-mana platform serta menggunakan perisian ini untuk apa-apa tujuan.
Kenapa menggunakan opensource?
Sekiranya anda seorang pengaturcara dan inginkan perisian yang beroperasi mengikut kehendak anda maka opensource perlu menjadi pilihan anda kerana anda boleh mengubah source code (kod sumber, aturcara) perisian berkenaan. Sekiranya anda adalah end-user yang memiliki bajet yang rendah, opensource adalah pilihan anda kerana ianya murah. Sekiranya anda berada di paras Enterprise, maka opensource adalah alternatif untuk anda disebabkan pemberian servis secara profesional dan perisian yang boleh dimodifikasikan mengikut rentak perniagaan anda.
sumber :Internet
Jika anda mahu menggunakan pelbagai perisian dan program opensource,boleh layari :
https://help.ubuntu.com/community/ListOfOpenSourcePrograms
http://sourceforge.net/
http://www.opensourcewindows.org/
http://www.econsultant.com/i-want-open-source-software/index.html
http://www.osalt.com/
http://java-source.net/
http://osswin.sourceforge.net/
http://www.apple.com/downloads/macosx/unix_open_source/
http://www.scilor.com/index.html
Enjoy!
Miro 3.5 open-source, non-profit video player n FREE!
Miro is a free HD video player.
It can play almost any video file and offers over 6,000 free internet TV shows and video podcasts.
Miro has a simple, gorgeous interface
designed for fullscreen HD video. Since Miro downloads most videos, you can take your shows with you, even on an airplane. Quite simply, Miro is a better way to watch all the video you care about.
Best of all, Miro is 100% free and open source, developed by a non-profit organization and volunteers around the world.
download here:
http://www.getmiro.com/|Miro
Maksud shareware
Perisian shareware ialah perisian di mana pengguna boleh menggunakan perisian tersebut dalam tempoh masa tertentu sahaja. Sama dengan perisian freeware; perisian shareware adalah percuma, bebas digunapakai oleh sesiapa sahaja, boleh diedar tetapi hanya boleh digunakan dalam jangkamasa tertentu. Mungkin seminggu, 10 hari, 30 hari atau berapa hari sekalipun mengikut kehendak pencipta perisian tersebut.
Selepas tamat tempoh percubaan (trial period), perisian shareware biasanya tidak boleh digunakan lagi. Jika masih berminat menggunakan perisian shareware berkenaan, pengguna perlu membayar sejumlah wang untuk mengaktifkannya kembali.
Perisian kongsi (atau Shareware di dalam bahasa Inggeris) merujuk kepada perisian komersial berlesen yang boleh dimuat turun secara percuma dan boleh digunakan sehingga had masa tertentu. Walau bagaimanapun, perisian sebegini boleh terus digunakan selepas lesennya dibeli.
Sesetengah perisian kongsi hanya membenarkan beberapa fungsi tertentu digunakan sebelum pengguna membeli lesennya. Fungsi penuh perisian akan dibenarkan selepas salinan perisian tersebut didaftarkan atau diaktifkan dengan lesen sah daripada pengeluar atau pembangunnya. Berbeza dengan freeware yang menyediakan fungsi penuh perisian.
sumber :Wikipedia dan lain-lain.
Selepas tamat tempoh percubaan (trial period), perisian shareware biasanya tidak boleh digunakan lagi. Jika masih berminat menggunakan perisian shareware berkenaan, pengguna perlu membayar sejumlah wang untuk mengaktifkannya kembali.
Perisian kongsi (atau Shareware di dalam bahasa Inggeris) merujuk kepada perisian komersial berlesen yang boleh dimuat turun secara percuma dan boleh digunakan sehingga had masa tertentu. Walau bagaimanapun, perisian sebegini boleh terus digunakan selepas lesennya dibeli.
Sesetengah perisian kongsi hanya membenarkan beberapa fungsi tertentu digunakan sebelum pengguna membeli lesennya. Fungsi penuh perisian akan dibenarkan selepas salinan perisian tersebut didaftarkan atau diaktifkan dengan lesen sah daripada pengeluar atau pembangunnya. Berbeza dengan freeware yang menyediakan fungsi penuh perisian.
sumber :Wikipedia dan lain-lain.
Maksud Freeware
Perisian percuma (dalam bahasa Inggeris freeware) merupakan perisian komputer yang percuma tetapi mempunyai hakcipta yang dimiliki oleh pembangunnya, yang mempunyai hak untuk mengawal pengedarannya, mengubahsuainya dan menjualnya di kemudian hari. Selalunya, freeware diedarkan tanpa disertakan kod sumbernya dan lantas mengelakkan para penggunanya daripada mengubahsuai perisian tersebut. Dengan ini, freeware adalah berbeza dengan perisian bebas yang membenarkan pengubahsuaian pada perisian.
Istilah freeware mula-mula diperkenalkan oleh Andrew Fluegelman ketika beliau hendak menjual sebuah atur cara komunikasi bernama PC-Talk yang beliau ciptakan tetapi beliau tidak mahu menggunakan kaedah pengedaran lama disebabkan kos mereka.[2] Fluegelman lantas mengedarkan PC-Talk melalui satu proses yang kini merujuk kepada shareware. Penggunaan istilah ini pada masa sekarang tidak semestinya perlu menepati konsep asalnya yang diperkenalkan oleh Andrew Fluegelman.
sumber :Wikipedia
Istilah freeware mula-mula diperkenalkan oleh Andrew Fluegelman ketika beliau hendak menjual sebuah atur cara komunikasi bernama PC-Talk yang beliau ciptakan tetapi beliau tidak mahu menggunakan kaedah pengedaran lama disebabkan kos mereka.[2] Fluegelman lantas mengedarkan PC-Talk melalui satu proses yang kini merujuk kepada shareware. Penggunaan istilah ini pada masa sekarang tidak semestinya perlu menepati konsep asalnya yang diperkenalkan oleh Andrew Fluegelman.
sumber :Wikipedia
MWSnap-Freeware
MWSnap is a small yet powerful program for taking screen captures of a desktop, an active window,menu, or a specified part of the screen. The program supports BMP, JPG, TIFF,PNG and GIF formats, with user selected color depth and quality settings. It also includes a zooming tool, a screen ruler and a color picker as well as system wide hotkeys and preset selection sizes.
download :
http://www.snapfiles.com/get/mwsnap.html
Tutorial :
http://www.youtube.com/watch?v=4rT4d77XXpM
Enjoy!
Wednesday, November 3, 2010
Best Free Adware-Spyware-Scumware Remover
Introduction
It's been some time since my last round of testing, and the time has certainly come for a refresher. Adopting much the same approach as previously, I have been asked if there were any surprises, and the honest answer is yes, there have. The most significant surprise was how difficult I was finding it to infect my system in the first place. After three hours of browsing, deliberatley choosing websites and domains where infection was almost a prerequisite, I had nothing, and it was only after investigating various system settings that I found out why.
For those looking for the technical "how I did it", I once again started with a clean install of XP SP2 on a virtual machine, patched with the necessary microsoft updates. I deliberately did not upgrade to SP3. Having gotten my clean install, I backed it up, and then went off to infect it. Before doing so I downloaded installation packages for those on test, and once I had my machine infected, I backed up the infected machine. I restored the original infected machine to test each product, ensuring a level playing field for each test. Finally, I did incremental scans with each product on the same infected system.
Discussion
So, the question is why was it so hard for me to get my machine infected in the first place, and having identified the "problem", my top recommendation is not an anti-malware product, and doesn't even involve a download or a scan of any type. It doesn't offer any form of protection on your PC, but it will help enormously against infection in the first place.
What is this magic solution? For some time, I have been using OpenDNS as my DNS server, rather than my ISPs own offering. I hadn't realised how pro-active OpenDNS is in the fight against drive by malware protection. Quite simply, every time I tried to visit a site guaranteed to infect me, it was simply shown as not found. During normal browsing sessions you never see this, and so it took me a while to realise the cause. Only after switching back to my ISP hosted DNS was I able to find the infections that I craved. Requiring only a quick, free registration and simple confirguration change, you improve your protections considerably.
Having made that recommendation, it is still possible to infect your system, either running software that may spread infection, or visiting sites that may not be in OpenDNS blacklist, and whilst an excellent first line of defence, local protection is still a must.
Top of the list once again is SuperAntiSpyware, which successfully detected and cleaned 121 threats on my test system. A fairly lightweight download and simple installation (5.99 MB) mean that this is not a burdensome product. If anything, the general package, whilst aesthetically similar, is improved since last time, managing to detect and clean after a single scan rather than the two scans required last time. A reboot to complete cleaning was still required, though this is a minor inconvenience, and required by most packages. If I had to raise a critisicm, it's that the freeware version still installs a startup item which doesn't actually do anything at all. In the paid version, it loads the always on protection which is not available in the freeware version. This minor annoyance aside, it remains my top recommendation.
Promoted this time to joint second place is A-Squared free edition, and let me be very clear that it is ONLY the free edition that I am able to recommend. A-Squared was able to identify just 43 infections, though some of the more serious threats identified by SAS were included in these. If we disregard tracking cookies, then the margins narrow. However, detection rate is only half the battle, and unfortunately A-Squared was unable to automatically clean some of the more virulent infections found itself. Nevertheless, it helpfully provides a link to forums for manual removal instructions.
The downside of A2 is the download size, being a huge 54.2 MB, immediately followed by a further 20MB updates. Anyone on restricted bandwidth or dial up may be advised to look elsewhere, but for an average broadband connection this should not be a factor.
As mentioned, I can only recommend the freeware version. During testing I inadvertently downloaded the full version of A2, which runs in evaluation mode for 30 days. Strangely, the full version hung on the scan during each test (though the program itself didn't crash), which is a particular worry.
Sharing the second place spot is MalwareBytes AntiMalware. MBAM caused me considerable problems initially, being one of two programs that had been actively bocked from running by one of the nasties I had picked up. Only after renaming the main executable, and running it in safe mode was I able to proceed. This initial scan found 19 infections and managed to clean them sufficently that when I rebooted I was able to run the program in a normal environment. I updated the program and ran a full scan, which found a further 8 infections, bringing the total to 27. Where MBAM did better than other products on test was it's ability to remove hijacked DNS entries (which forced redirection of links from popular search engines to less productive sites).
Separating A2 and MBAM is almost impossible. I found them to be on a par with each other regarding their scans, but both require a technical proficiency that many may not posses; A2 requires manual removal of many threats, whilst MBAM forced me to jump through hoops to get it working.
PCTools SpywareDoctor SE also performed well in scanning, finding 24 threats (excluding cookies). Unfortunately, cleaning the system proved more problematic. Despite reporting successful cleansing, SD failed to terminate processes already running, and did not in fact clean some of the more annoying infections. It would also be useful if SD prompted a reboot after cleansing, though it did not do this, and only experience dictated that this would be a good idea.
SD does, however, include real time protection, which most other products don't, and this protection did block those infections that it had failed to clean. Nevertheless, a further scan and clean with SAS was needed to fully clean my test system. A fine effort, but sadly falling short of the mark. Do note that the free version is no longer available from the PCTools website. It can be obtained as part of the google pack, or from here.
Old timer Ad-Aware, coming in at 35.7MB performed reasonably, if not exceptionally, finding a further 24 infections even after cleaning with A-squared, 4 of which represented real threats, whilst the remaining 20 were cookies.
Doing less well in on demand tests were Spybot S&D, Spyware Terminator and The Cleaner 2010. Spybot was the other program that was actively blocked from running, and nothing I tried could overcome this. It does come with an on demand file scanner which can be run from the command line and set to scan your entire drive. However, after letting this run for over an hour and noting that progress had barely touched my relatively small installation system (2.1 Gb) I cancelled. It would take an age to complete the scan, and would only examine files. Registry entries and services would be left untouched. Spyware Terminator found just 3 threats, and The Cleaner 2010 found absolutely none.
Arovax Shield is still in development, and starting to mature, though there are still bugs to be ironed out. For example, once installed, and after the obligatory reboot to enable it to start it's services, it immediately complained that it could not find Firefox. This is no surprise since FF was not installed on the test system, though I fail to see why it should prevent it from doing it's job. Maybe as time progresses this will become more viable, but in my opinion it isn't quite there yet.
And so that leads us to my standard "other recommendations". Internet Explorer has now reached version 8, which I am sure will become the most prolific web browser before too long, and as such will be the most heavily targetted. I stand by previous recommendations that an alternative browser (of which there are many free ones these days, including Firefox, Opera, Google Chrome and Safari) will offer a safer browsing experience.
And in order to shut the door after the horse has bolted, there is still little more useful that HiJack This, which is still a tool requiring expert help, but can be invaluable in helping to clean an infected system. Fortunately, the expert help is still only a forum away.
An infected system. None of these windows is a desirable application.
And as always, let common sense guide you. Don't run a program from an untrusted source, and don't visit websites where infection is likely. You should also beware of popups from programs that you haven't installed, some of the fake anti-spyware I managed to pick up in my browsing sessions was surprisingly convincing. Remember, sometimes malware will scream into your face that it is there (see pic, not a genuine window amongst them). It will just not tell you what it really is.
source :
http://www.techsupportalert.com/
Top Antivirus Software for 2010
PC World
1. G-Data Antivirus 2010
2. Symantec Norton Antivirus 2010
3. Kaspersky Lab Anti-Virus 2010
4. BitDefender Antivirus 2010
5. Panda Antivirus Pro 2010
6. F-Secure Anti-Virus 2010
7. Avira AntiVir Premium.
7.Trend Micro AntiVirus Plus AntiSpyware 2010
9. Eset Nod32 Antivirus 4
10. McAfee Antivirus Plus 2010
11. Alwil Avast! 4.8 Professional Edition.
source :
http://www.pcworld.com/
Mega MP3 Splitter-Freeware
MP3 Splitter is a simple audio editing utility that is used to split an MP3 into multiple segments (tracks). It is handy for dividing long radio shows or mixes. The program is easy to use, just load the MP3 file, and set the breakpoints while you listen to the audio playback. No further documentation provided though.
download :
http://www.snapfiles.com/get/megamp3split.html
Enjoy!
SPG Video Splitter-Freeware
SPG Video Splitter is an easy to use software that enables you to copy a portion or scene from a video and save it into a separate file. Just open the video file with the integrated player, mark the start/end of the portion that you want to extract, and then export the selected scene to a variety of video formats. SPG Video Splitter supports MPG, VOB, DAT, WMV, MOV, MKV, FLV, AVI, DIVX, MP4 and other popular formats. The program also allows you to customize the frame rate, bit rate and frame size of the split video.
Freeware
download :
http://www.snapfiles.com/get/spgvsplit.html
Boilsoft Video Splitter v6.04
Boilsoft Video Splitter v6.03
Boilsoft Video Splitter is a powerful video cutter to split, cut or trim a large AVI, MPEG, RM, ASF, WMV, 3GP, MKV, FLV or MP4 Video file into smaller video clips without re-encode. Video splitter and video cutter software has the bulit-in video player, you can easily split/cut AVI, MPEG, RM, ASF, WMV, 3GP or MP4 video file by time or the selection as needed.
Our Video Splitter is a superb video cutting software which helps you to cut video fornats such as AVI, MPEG, RM, ASF, WMV, 3GP, MKV, FLV or MP4 video files into small parts.
Direct stream cut, without re-encode, our Video Splitter, as a best video cutter, is the most efficient and fastest in the market.
Video Splitter, Video Cutter-- AVI Splitter, MPEG Splitter, RM Splitter, ASF Splitter, WMV Splitter, 3GP Splitter, MP4 Splitter, FLV Splitter, MKV Splitter all-in-one!
Features
* Direct stream cut, without re-encode.
* Support splitting AVI, Divx, MPEG-4 video files
* Support splitting MPEG-1, MPEG-2, VOB video files.
* Support splitting ASF, WMV, WMA files
* Support splitting Real Media(.rm, .rmvb)
* Support splitting MP4(.mp4, .m4a) file
* Support splitting 3GP(.3gp, 3g2) file
* Support splitting MKV, FLV videos
* Support splitting VCD (.dat) file
* Support splitting AC3 file
* Support splitting MPEG Audio file, mp1, mp2, mp3
* Support large video file, even large then 2GB.
* Very fast and without any quality loss.
* Very User-friendly interface.
# Price: Free to try (30-day trial) $34.95 to buy
# Operating system: Windows 2000/XP/2003/Vista/7
Trial version :
http://download.cnet.com/Boilsoft-Video-Splitter/3000-13631_4-75064950.html?tag=mncol;2
Sunday, October 31, 2010
Windows 7 secret
Tips, tricks, treats, and secrets revealed on the latest operating system from Microsoft: Windows 7
You already know the ups and downs of Windows Vista–now it?s time to learn the ins and outs of Windows 7! Internationally recognized Windows experts, Microsoft insiders, and authors Paul Thurrott and Rafael Rivera cut through the hype to pull away the curtain and reveal useful information not found anywhere else. Regardless of your level of knowledge, you?ll discover little–known facts on how things work, what?s new and different, and how you can modify Windows 7 to meet your own specific needs.
A witty, conversational tone tells you what you need to know to go from Windows user to Windows expert and doesn?t waste time with basic computer topics while point–by–point comparisons demonstrate the difference between Windows 7 features and functionality to those in Windows XP and Vista.
download:
http://hotfile.com/dl/79354022/8ecc555/Windows7.Secrets.rar.html
PC Advisor
Every issue of PC Advisor is packed with the latest news, reviews and features plus
comprehensive and impartial buying advice as well as easy-to-understand tutorials and
workshops to help you to get the most from your PC. Whether you want to buy the best
value equipment or make the most out of equipment you already own, PC Advisor
delivers expert advice you can trust.
download here :
http://hotfile.com/dl/70059844/849fe4b/PC_Advisor_-_November_2010_(UK).pdf.html
Sunday, October 24, 2010
Pc Pro Magazine
download here :
http://hotfile.com/dl/77353157/3bc09f5/Nuts_Magazine_2010_10_22-28.rar.html
Source : warez bb
What is an EPUB File?
Answer: A file with the EPUB file extension is an Open Publication Structure eBook file.
U can use FB Reader to open that file..
FBReader 0.12.10
Download here :
http://download.cnet.com/FBReader/3000-2125_4-10667876.html?tag=mncol;3
Enjoy!
U can use FB Reader to open that file..
FBReader 0.12.10
Download here :
http://download.cnet.com/FBReader/3000-2125_4-10667876.html?tag=mncol;3
Enjoy!
Thursday, October 21, 2010
MacBook Air
CUPERTINO, California - Syarikat komputer Apple Inc. memperkenalkan dua komputer riba MacBook Air yang nipis kelmarin.
Salah satu komputer riba itu mempunyai skrin seluas 33.8 sentimeter (sm) manakala yang kedua mempunyai skrin 29.4sm.
Komputer MacBook yang lebih besar itu senipis 1.73 sentimeter dan seberat 1.3 kilogram (kg) manakala baterinya tahan selama tujuh jam.
Satu lagi model komputer riba itu seberat 2.2kg dan baterinya tahan selama lima jam.
Ketua Pegawai Eksekutif Apple, Steve Jobs berkata semasa melancarkan: "Kami bertanya kepada diri sendiri, apa akan berlaku jika MacBook dan iPad digabungkan? Maka inilah hasilnya."
iPad ialah komputer tablet keluaran Apple.
GAMBAR menunjukkan dua model komputer MacBook Air yang nipis di Cupertino, California kelmarin.
Komputer MacBook Air tidak boleh membaca cakera padat (CD) atau cakera padat digital (DVD).
Ia hanya menggunakan memori flash seperti iPhone.
Komputer Macbook Air dijual pada harga bermula AS$999 (RM3,103) dengan storan memori 64 gigabit.
Pada harga AS$1,199 (RM3,725) ia dilengkapi dengan memori 128 gigabit.
Komputer Macbook yang lebih besar ditawarkan pada harga AS$1,299 (RM4,035) dengan kapasiti 128 gigabit atau $1,599 (RM4,968) bersama storan 256 gigabit. - Agensi
sumber :Kosmo
Sunday, October 17, 2010
Computer Repair with Diagnostic Flowcharts 2010- Troubleshoot
Troubleshooting PC hardware problems from boot failure to poor performance. using simple to follow flow charts you can diagnose:
power supply failure
video performance and failure
motherbd, cpu, ram performance and failure
hard drive performance and failuire
cd and dvd performance
cd and dvd recorder problems
modem performance and failure
sound and game controller performance and failure
network harware failure
peripheral failure
conflict resolution
Download : http://hotfile.com/dl/56028345/c378bc6/Computer.repair.rar.html
source : http://www.warez-bb.org/
1113 tutorials
Create Bootable XP SP integrated CD,Create One-click Shutdown And Reboot Shortcuts.txt Creating a Board aka Forum on your own PC !.rtf
Creating Universal Ghost Usb Boot Disk And Cd.txt
Data Capacity of CDs [Tutorial].txt ,Debug, Learn how crack windows.txt,Delete An undeletable File.txt,Delete Files From The Recent File List In Windows.txt,Digital Camera Guide.txt
Digital Faq -learn Everything About Digital, Capture, Edit and Burning and more.txt 2.20 kB
Digital Photo Id Cards, Greate Info.txt 2.88 kB
Direct Link To Any Page You Want To In Hotmail.txt 1.95 kB
Directx Explained.txt 7.66 kB
Disable Compression On Xp, NTFS partition, Disk Cleanup.txt 0.43 kB
Disable The Send Error Report, to Microsoft.txt 0.51 kB
Disable Windows Logo Key.txt 0.62 kB
Discover New Music You’ll Probably Love.txt 1.08 kB
Download Free Music legally,, legally.txt 3.24 kB
Download from a paypal site without paying a penny!.txt 0.95 kB
Download From Ftpz, Using Ftp Search Sitez.txt 8.12 kB
Download Mp3’s Without Using Filesharing.txt 0.69 kB
Download Music And Video With ,edia Player9, quick and easy!.txt 0.66 kB
Download Timeframes.txt 0.33 kB
1.39 kB
Dual Boot After The Fact.txt 1.37 kB
Dvd Copying-ripping Definitions.txt 1.25 kB
DVD Regions Information.txt 3.84 kB
Dvd-9 to Dvd+r Dl, Double Layer To Double Layer, 1-1 copies.txt 0.94 kB
Easily Disconnect-reconnect From Broadband.txt 0.30 kB
Easily Find Serial Numbers On Google.., easy to do and works like a charm..txt 1.40 kB
Ebay Hackcracktip.txt 0.50 kB
General Keyboard Shortcuts.txt 7.54 kB
Get In Windows 2000 As Administrator.txt 0.39 kB
Get the Most Out of Your DVD Recorder.txt 11.25 kB
Get The Music You Want To Hear.txt 0.90 kB
Get unlimited bandwidth from your host for free.txt 2.88 kB
Getting A 1gb Yahoo China Account.txt 0.98 kB
Getting Counter-strike Source To Work.txt 3.36 kB
getting movies, mp3,games using google.txt 0.75 kB
Getting older programs to run on Windows XP.txt 2.96 kB
Getting started with Linux for nOObs!.txt 17.37 kB
Go to Windows updates anonymously.txt 0.40 kB
Google Crack Search.txt 0.14 kB
Google secrets.txt 0.98 kB
Google Tips & Tricks, (utilizing search engine).txt 5.81 kB
Graffiti On Walls 4 Adobe Photoshop Cs 8.0.txt 2.45 kB
Guide For Getting Free Stuff.txt 10.33 kB
Guide to IIS Exploitation.txt 27.77 kB
Guide to Slipstreaming Service Pack 2.txt 2.82 kB
Hard drive Gone Bad.txt 5.55 kB
Hardware Firewall.txt 3.02 kB
How To Add An Option To Print, the Contents of a Folder!.txt 1.47 kB
How To Add Your Own Windows Tips.txt 0.48 kB
How to Back Up the Registry.txt 0.76 kB
How To Backup Ps2 Games.txt 7.71 kB
HOW TO BLOCK PEOPLE ON WINMX WHO SHARE NOTHING.txt 1.51 kB
How To Block Websties Without Software, block websites.txt 0.64 kB
How To Boot Xp Faster (updated).txt 1.66 kB
How to build a black box.txt 7.79 kB
how to burn quicker in windows xp.txt 0.28 kB
How to Bypass BIOS Passwords.txt 9.05 kB
How To Bypass Web Filters, tutorial.txt 6.20 kB
HOW TO CAPTURE STREAMING MEDIA.txt 1.68 kB
How To Change A Cmos Battery.txt 3.18 kB
How to change the serial number used in Windows XP, Valid for XP Corporate.txt 1.11 kB
How To Change Thumbnail Size And Quality.txt 0.90 kB
How to clear Bios info 2.txt 23.55 kB
How to clear Bios info.txt 11.75 kB
How To Convert File System, fat - fat32 to ntfs.txt 0.52 kB
How To Copy A Dvd Which Will Play On A X Box.txt 1.01 kB
How to copy songs from your iPod to your PC.txt 1.40 kB
How To Customise Your start Button.txt 1.54 kB
How To Delete Those Persistent Nasty Files.txt 0.53 kB
How To Directly Go To Inbox, Write Msg, w Hotmail, no need for How to find MP3’s real quickly.txt 0.35 kB
How To Find Serial Numbers On Google.txt 0.79 kB
How to fix corrupted files in XP.txt 1.48 kB
How to fix Windows Installer problem.txt 0.96 kB
How To Get A Free I-pod Or Flat Screen Tv, check it out.txt 6.62 kB
HOW TO GET ANY WINDOWS PASSWORD.txt 3.41 kB
How to Get someones ISP password, Get free internet.txt 2.65 kB
How To Get Top Ranking, Search Engines.txt 6.58 kB
How To Hack Windows Xp Admin Passwords.txt 2.52 kB
How to hack-change your Windows XP Boot Screen.txt 1.52 kB
how To Hide Yourself From Network Users!, And give access to only specific users!.txt 0.86 kB
How To Make An Animted Logo.txt 5.26 kB
How To Make Free Phone Calls.txt 2.29 kB
How to make key generators.txt 8.83 kB
How To Make Perfect Copies Of Maxis The Sims Discs, CloneCD Style!.txt 1.17 kB
How To Make XP Go Faster.txt 5.58 kB
How To make your own Radio Station 2.txt 3.26 kB
How To Make Your Own Radio Station.txt 1.58 kB
How to Remove DRM Protection for Video Files.txt 2.29 kB
How To Remove Ms Java Vm And Install Sun Java.txt 0.05 kB
How To Remove Signin Details Of Msn Passport.txt 1.04 kB
How To Remove The Default Admin$ Shares.txt 1.03 kB
How to remove the Links folder in IE Favorites.txt 0.59 kB
How to Remove WinXP Splash and See Operations.txt 1.19 kB
How To Rename Extensions With Ease, with a Renamer.bat file!.txt 0.44 kB
How to Rename File Extensions.txt 3.11 kB
How To Rename Multiple Files In Winxp.txt 0.56 kB
How To Restrict Login Hours Allowed.txt 0.58 kB
How to safeguard your files when computer crashes.txt 2.94 kB
How to save Windows xp updates.txt 0.63 kB
how to search google for RAPIDSHARE links.txt 0.98 kB
How To See Hidden Files, Using Dos.txt 0.08 kB
How To Set search For All Files In Winxp.txt 0.71 kB
How to set up a http server running from you computer.txt 3.06 kB
How To Set Up A Proxy In Flashget, As Requested.txt 0.66 kB
How to set up a server with Apache , PHP , MySQL , Perl , phpMyAdmin.txt 8.77 kB
How To Set Up Direct Connect.txt 26.96 kB
HOW TO SET UP FTP SERVER.txt 1.79 kB
How To Set Up Proxies In Your Browser.txt 1.63 kB
How To Set Zone Alarm Settings!, Fix for ZA ports.txt 2.12 kB
How To Setup Your Own Dns (Domain Name Server).txt 6.97 kB
How To Speed Up A Slow Computer.txt 1.21 kB
How To Speed Up Http Requests On Internet Explorer, as above.txt 1.28 kB
How To Stop Spam.txt 8.05 kB
How to swear in all languages.txt 28.32 kB
How To Unload Cached Dll Files To Free Memory.txt 0.56 kB
How to Use and How to Chain Multiple Proxies!.txt 9.70 kB
How To Use File Compression In Windows Xp.txt 4.19 kB
How To Use Google To Download Mp3’s, and applications…..txt 0.60 kB
How To Use Newsgroups.txt 0.56 kB
How To Use You Gmail With Msn Messenger.txt 0.37 kB
How-to Get Videos And Dvds Onto Your Sony PlayStation Portable (PSP) for free.txt 12.91 kB
HOWTO Change Windows XP Home to Windows XP Pro.txt 1.67 kB
Important Faqs For Sp2.txt 9.47 kB
Improve Doom 3’s Performances!!, simple but efficient trick for every1.txt 4.22 kB
Improve your dialup modem preformance.txt 0.73 kB
Increase XP Folder Settings.txt 0.79 kB
Insert Your Serial For Office 2k, auto install office.txt 1.06 kB
Install A New Hard-disk.txt 5.16 kB
Install Xp From Dos.txt 0.84 kB
Installing Apache on Windows.txt 6.29 kB
Installing Gentoo Linux, Amazing step by step tutoria.txt 0.19 kB
Installing IIS On Windows Xp Pro.txt 3.04 kB
Installing Slackware Linux.txt 34.73 kB
Instructions For Removal Of Advertising In Msn Messenger.txt 2.59 kB
Ip Address Structure, Expilinatin OF IP Address {A short way}.txt 7.65 kB
Irc How To Downlaod From, How to downlaod from IRC.txt 3.95 kB
Irc Servers On nix, For people who want to start own IRC net.txt 0.48 kB
Keep Files Private.txt 1.51 kB
Keep Folders Hidden.txt 0.46 kB
Keyboard Shortcuts Result in Excel 2000 - Movement.txt 1.57 kB
Keyboard Shortcuts, Microsoft Word.txt 2.37 kB
Keyboard Shortcuts, must read.txt 3.72 kB
Kill Microsoft Instant Messenger.txt 0.28 kB
Lamination Tips, Its a Fast TUT……txt 1.98 kB
Leet Way To Get Your Ip In Windows Xp.txt 0.26 kB
Linking Your Xbox To Your Computer.txt 33.52 kB
Linux Howto’s.txt 0.08 kB
List Of Sites Not To Go To.txt 4.32 kB
Little help for anonymous mailer.txt 1.56 kB
Lots Of Windows Xp Tips, Take A Look !.txt 12.43 kB
Lyrics With Google.txt 0.08 kB
Make A Autorun File For Ur Cd.txt 0.66 kB
Make A Batch File To Clean UR PC!!, All In One!!.txt 1.37 kB
Make A Roughly 16 Hour Video Dvd.txt 1.01 kB
Make Acrobat Reader 6 load faster.txt 0.42 kB
Make Dvd Iso From Suse 9.2 5 Cds Iso, Linux mode and Windows mode ISO creation.txt 7.41 kB
Make Mp3 Files Smaller Without Losing Quality.txt 0.73 kB
Make Your Own Ringtones For Mobile Phone, also logos, wallpaper, etc.txt 3.00 kB
Make Your Pc Faster, Guaranteed.txt 6.23 kB
MakeXPgoFaster.txt 5.74 kB
making a .cue file, in notepad.txt 0.53 kB
Making A .txt Executable Server.txt 1.60 kB
Making Bootable Floppy Disk to Boot into Windows.txt 4.82 kB
Making Cd Version Of Doom3 Into Dvd Version.txt 0.75 kB
Making Web Page Fonts Consistent and Uniform.txt 0.80 kB
Manage Saved Ie Passwords.txt 0.75 kB
Mastering The Windows XP Registry.txt 5.79 kB
Maximize Dial-up Modem Settings.txt 2.31 kB
Microsoft’s Really Hidden Files, Reveled Hidden files.txt 33.95 kB
mIRC Not Just Another Chat Client, Download Anything You Want Almost.txt 4.37 kB
mIRCcommands.txt 10.10 kB
Misc Linux Tips & Tricks.txt 18.55 kB
Missing Administrator Account.txt 0.52 kB
Mobile Secret Codes.txt 31.09 kB
Modify .exe Files And Crack A Program.txt 3.06 kB
A beginners guide to Hacking UNIX.txt 5.61 kB
A Cracking Tutorial C101-90.000 3.85 kB
A Cracking Tutorial C101-90.001 32.32 kB
A Cracking Tutorial C101-90.002 30.93 kB
A Cracking Tutorial C101-90.003 14.75 kB
A Cracking Tutorial C101-90.004 54.91 kB
A Cracking Tutorial ED!SON.NFO 1.58 kB
A Guide to Internet Security- Becoming an Uebercracker.txt 8.56 kB
A Guide to the Easiest Hacking there is.txt 4.58 kB
A List Of Some OF The Most Useful UNIX Hacking Commands.htm 23.03 kB
A Small Guide to Hacking HOTMAIL.txt 3.02 kB
A UNIX Hacking Tutorial.txt 82.20 kB
Almost Everything You Ever Wanted To Know About Security (but.txt 47.52 kB
An Indepth Guide in Hacking UNIX and the concept of Basic Net.txt 40.84 kB
An Introduction to Denial of Service.txt 44.78 kB
An Introduction to the Computer Underground.txt 17.03 kB
Basic Networking.txt 14.04 kB
BBS Crashing Techniques.txt 3.72 kB
BRUTE- A brute force approach to hacking Unix passwords.txt 3.31 kB
Closing the Net.txt 30.69 kB
Compression and Cracks for Dummies.txt 52.75 kB
Computer Bulliten Boards and the Law.txt 56.06 kB
Computer Chrime - Current Practices, Problems and Proposed So.txt 96.53 kB
Computer eMail and Privacy.txt 19.18 kB
Computer Hackers News Articles.txt 5.89 kB
Computer Rights vs First and Forth Amentment Right.txt 44.24 kB
Computer Security.txt 63.52 kB
Computer Security_2.txt 51.94 kB
Computer Viruii.txt 19.98 kB
Computerized Governmental Database Systems Containing Persona.txt 40.34 kB
COPS and Robbers-Unix System Security.txt 35.18 kB
Copyright Guides for Photographers.txt 17.02 kB
Crash Course in X Windows Security.txt 12.45 kB
Crime and Puzzlement.txt 62.34 kB
Cultural Formations in Text-Based Virtual Realties.txt 257.27 kB
Cyberspace and the Legal Matrix- Laws or Confusion.txt 20.53 kB
Dark Angel’s Phunky Virus Writing Guide .txt 18.90 kB
Defamation Liability of Computerized Bulliten Board Operators.txt 101.36 kB
Dept of Treasury Letter.txt 11.25 kB
Electronic Bulliten Boards and ‘Public Goods’ Explainations o.txt 45.84 kB
Electropolos - Communication and Comunity on IRC.txt 112.45 kB
Ethload User’s Guide.txt 81.28 kB
Formulating A Company Policy on Access to and Use and Disclos.txt 12.14 kB
Free Speech in Cyberspace.txt 244.25 kB
Gender Issues in Online Communications.txt 24.86 kB
Government Computer Security Techniques.txt 7.88 kB
HACKDICT.TXT 272.00 kB
Hacker Test.txt 20.84 kB
Hackers A-Z.TXT 256.00 kB
Hackers Who Break into Computer Systems.txt 57.40 kB
Hacking Bank Of America’s Home Banking System.txt 5.79 kB
Hacking Compuserve Infomation Service.txt 7.43 kB
Hacking Faq.txt 42.06 kB
Hacking GTE Telemail.txt 19.12 kB
Hacking IRC - The Definitive Guide.txt 13.72 kB
Hacking PC-Pursuit Codes.txt 8.10 kB
Hacking Techniques.txt 8.52 kB
Hacking TRW.txt 2.58 kB
Hacking TYMNET.txt 5.79 kB
Hacking Unix System V’s.txt 10.93 kB
Hacking Wal-Mart Computers.txt 4.09 kB
Hacking Webpages.txt 3.90 kB
How the Traditional Media Clasifications Fail to Protect in t.txt 40.50 kB
How to crash AOL.txt 4.75 kB
How to dial out of a UNIX System.txt 3.49 kB
How to find Security Holes.txt 15.99 kB
How to get a Shell in 24 hours.txt 7.98 kB
How to Hack UNIX System V.txt 10.93 kB
How to login to a C.B.I. System.txt 3.00 kB
How to send ICQ Bombs.txt 2.33 kB
Information of Hacking AngelFire Websites.txt 3.21 kB
Introduction to Denail of Service.txt 44.78 kB
IP addressing, and gaining IP’s.txt 13.70 kB
IP Addressing.txt 13.70 kB
ISSN Numbers- An Introduction.txt 5.96 kB
Junk Mail- How Did They All Get My Address.txt 12.70 kB
LENROS~1.TXT 184.58 kB
LENROS~2.TXT 7.41 kB
MEMETICS.TXT 45.79 kB
MINDVOX.TXT 64.57 kB
MORRIS~1.TXT 31.18 kB
NEIDOR~1.TXT 41.02 kB
NFS Tracing.txt 34.20 kB
Nightline- FBI,Privacy,and Proposed Wire-Tapping Legislation.txt 20.86 kB
NY_2′S Guide to Obtaining An IP Address. .doc 10.50 kB
Organizational Analysis in Computer Science.txt 65.00 kB
PGP Startup Guide.htm 26.00 kB
Presumed Guilty.txt 153.76 kB
Raising Hell with Unix.txt 12.91 kB
Remarks of the President and Vice President to Silicon Valley.txt 37.70 kB
RIGGSB~1.TXT 54.03 kB
RIGGS_~1.TXT 54.03 kB
RIGHTS~1.TXT 7.99 kB
More Hacking RIVERA.TXT 26.43 kB
Security holes.txt 11.77 kB
Seisure Warrent Documents for Ripco BBS.txt 72.01 kB
Site Security Handbook.txt 247.43 kB
SJ-DEC~1.TXT 45.03 kB
SJ-RESP.TXT 69.59 kB
SMTP-Simple Mail Transfer Protocol.txt 117.61 kB
Summary of FBI Computer Systems.txt 5.07 kB
SUNDEVIL.TXT 100.17 kB
SUPREM~1.TXT 56.70 kB
TCP packet fragment attacks against firewalls and filters.txt 4.39 kB
Telenet-The Secret Exposed.txt 9.91 kB
The Basics of Hacking- Introduction.txt 24.82 kB
The Baudy World of the Byte Bandit-A Postmodernist Interpreta.txt 85.17 kB
The Constitution in Cyberspace.txt 46.60 kB
The Cracking Manual.txt 86.38 kB
The Electronic Communication Privacy Act of 1986 - A Laymans .txt 10.04 kB
The Greatest Hacker of all time.ASC 25.02 kB
The Hacker’s League.txt 12.37 kB
The Inner Circle Book’s Hacking Techniques.txt 1.96 kB
The Lamahs-Guide to Pirating Software on the Internet.txt 12.21 kB
The M.M.C. Guide to Hacking, Phreaking, Carding.txt 19.11 kB
The National Information Infrastructure-Agenda for Action.txt 96.49 kB
The Newbies Handbook- ‘ How to beging in the World of Hacking.txt 43.83 kB
The Newbies-User’s Guide to Hacking.txt 47.35 kB
The Pre-History of Cyberspace.txt 60.25 kB
The Price of Copyright Violation.txt 73.11 kB
The REAL way to hack RemoteAccess.txt 12.12 kB
The Secret Service, UUCP,and The Legion of Doom.txt 19.63 kB
the UNIX operating system (Berkley 4.2).txt 13.55 kB
Theft of Computer Software-A National Security Threat.txt 12.22 kB
Thoughts on the National Research and Education Network.txt 19.72 kB
Tips on Starting Your Own BBS.1 8.04 kB
undocumented DOS commands.txt 23.17 kB
UNIX Computer Security Checklist.0 49.34 kB
UNIX Use and Security - By the Prophet.txt 153.74 kB
UNIX Use and Security From The Ground Up.htm 135.60 kB
UNIX- A Hacking Tutorial.SIR 82.26 kB
Viruii FAQ.txt 4.07 kB
Virus-Trojan FAQ.txt 1.95 kB
What Files are Legal for Distribution on a BBS.txt 20.83 kB
What To Look For In A Code Hacking Program.htm 5.56 kB
What To Look For In A Code Hacking Program.txt 5.46 kB
What You Should Know About Computer Viruses.DNA 16.91 kB
More Xp Tips and tricks make your computer more faster.txt 46.14 kB
Moving and Removing the Start Button.txt 0.66 kB
Msn Messenger & Gmail.txt 3.69 kB
My Flash Bookmarks, long list of tutorials.txt 2.98 kB
Myth about WPA ( How it is done ), Windows Product Activation Technique.txt 45.54 kB
Nero How To Verify The Validity Of The Sn U Use.txt 0.88 kB
A Basic UNIX Overview.rtf 22.46 kB
A BEGINNERS GUIDE TO Hacking Unix.txt 6.05 kB
A Novice’s Guide to Hacking 2004.txt 40.75 kB
A Novice’s Guide To Hacking.txt 8.58 kB
A Short HACKER SPEAK Glossary.txt 9.78 kB
A simple TCP spoofing attack.txt 14.60 kB
Accessing the bindery files directly.txt 3.97 kB
An Architectural Overview of UNIX Network Security.htm 53.27 kB
Anonymity complete GUIDE.rtf 28.90 kB
ANONYMOUS emails.txt 3.15 kB
Anonymous FTP FAQ.htm 28.14 kB
ANSIBombs II Tips And Techniques.txt 10.05 kB
attacks on networks how to stop.htm 67.77 kB
Backdoor.txt 18.71 kB
Backdoors.txt 19.15 kB
BBS CRASHING TECHNIQUES.txt 3.72 kB
Bust Avoidance For Dipshits.txt 5.82 kB
Firewall Protection how to.rtf 33.12 kB
Guide to Hacking with sub7.doc 106.00 kB
hacking and phreaking.doc 168.00 kB
Hacking for Dummies Volume 2.doc 147.00 kB
Hacking For Newbies.doc 54.00 kB
hacking in telnet ftp.rtf 57.47 kB
hacking on Telnet explained.doc 16.25 kB
Hacking On XP 1-5/hacking on XP part 1.doc 4.58 kB
Hacking On XP 1-5/hacking on XP part 2.doc 8.25 kB
Hacking On XP 1-5/hacking on XP part 3.doc 4.51 kB
Hacking On XP 1-5/hacking on XP part 4.doc 0.00 kB
Hacking On XP 1-5/hacking on XP part 5.doc 0.00 kB
hacking password protected site.doc 26.50 kB
Hacking Password Protected Website’s.doc 3.06 kB
hacking passwords.doc 26.50 kB
How to learn to hack in easy steps.doc 100.00 kB
How to use the Web to look up information on hacking.doc 16.28 kB
New Hacking Ebooks IP how to.rtf 5.15 kB
NetBios explained.doc 26.68 kB
Proxy how to.rtf 3.13 kB
Routing Basics.pdf 30.25 kB
telnet trick port 25.doc 1.76 kB
Yahoo Chat Commands how to.rtf 0.93 kB
New Pc Or New Motherboard.txt 3.77 kB
New Way To Relive Some Zinio File.txt 1.95 kB
news groups the how to do.txt 11.40 kB
Nice list of windows shortcuts.txt 7.50 kB
No Text Icons.txt 0.29 kB
Ntfs Cluster Size, better harddrive performance.txt 1.34 kB
Official Unattended Xp Cd Guide Xp Sp2 @ Msfn.org.txt 0.91 kB
Open Windows Explorer To A Different Default Direc.txt 0.74 kB
Optimize Broadband & Dsl Connections.txt 1.91 kB
Optimize Emule Connection.txt 1.20 kB
Outpost Rules, Outpost rules for system & app.txt 7.32 kB
Outsmarting System File Protection.txt 5.37 kB
Overclocking_Tutorial.txt 7.67 kB
Packet Attacks - Version 1.1, { Packet_Attack_Exlained}.txt 25.94 kB
Part 0 Dc++.txt 4.11 kB
Part 1 Bittorrents.txt 4.19 kB
Part 2 Irc (mirc).txt 4.91 kB
Part 3 Ftp.txt 2.71 kB
Partitioning Your Harddisk With Fdisk.txt 2.13 kB
Pc File Extention Listing.txt 26.48 kB
Pc Maintenance Guide.txt 10.20 kB
Peer2mail Tutorial.txt 9.37 kB
Performance Increase Through My Computer.txt 0.53 kB
Phreaking 2600 Hertz Single Tone Generator Schematic.txt 1.95 kB
Phreaking A List of every TeleNet code that there is.txt 1.96 kB
Phreaking A List Of Government BBS Numbers.txt 13.07 kB
Phreaking An Extensive Guide to Bell System Man Holes.txt 10.10 kB
Phreaking An Introduction into TeleScan.txt 3.98 kB
Phreaking An Introductory Guide To TeleNet Commands.txt 2.20 kB
Phreaking Area Codes and Time Zones.txt 4.90 kB
Phreaking Becoming A Phreaker - The Quick n’ Easy Way.txt 17.09 kB
Phreaking Bell Hell Volume #1.txt 10.29 kB
Phreaking Bell Hell Volume #2.txt 15.92 kB
Phreaking Breaker B0X.txt 1.96 kB
Phreaking busybox.txt 1.61 kB
Phreaking Cellular Listening with a TV .txt 1.96 kB
Phreaking Cellular Telephone Phreaking Phile Series VOL 1.txt 10.00 kB
Phreaking Drake’s Phreaking Tutorial.txt 3.34 kB
Phreaking Hacking VoiceMail Systems.txt 25.89 kB
Phreaking How BT phone cards works.txt 4.18 kB
Phreaking How Phone Phreaks are Caught.txt 12.00 kB
Phreaking How to Bill All Of your Fone Calls To Some Poor, Unsuspecting.txt 11.38 kB
Phreaking How to make a Free Phone Call.txt 2.16 kB
Phreaking How to Put an End to Unwanted or Harassing Phone Calls.HAR 12.10 kB
Phreaking Phone Systems Tutorial by The Jolly Roger.txt 8.68 kB
Phreaking Phreakers Handbook.txt 9.83 kB
Phreaking Quick Phone Modifications.txt 4.12 kB
Phreaking The ABC’s of Payphones part 1.txt 2.58 kB
Phreaking The ABC’s of Payphones part 2.txt 2.12 kB
Phreaking The ABC’s of Payphones part 3.txt 2.21 kB
Phreaking The ABC’s of Payphones part 4.txt 2.64 kB
Phreaking ThE Beige BoX .txt 6.23 kB
Phreaking The History of British Phreaking.htm 8.29 kB
Phreaking The M.M.C. Guide to Hacking, Phreaking, Carding.txt 19.11 kB
Phreaking The Moterola Bible.txt 116.99 kB
Phreaking The Myth of the 2600Hz Detector .txt 6.55 kB
Phreaking The Official Phreaker’s Manual.txt 499.25 kB
Phreaking The Phreakers Handbook-1.txt 62.87 kB
Phreaking The Telephone Works.txt 9.25 kB
Phreaking The Ultimate Phreaking Guide .txt 1.96 kB
Phreaking Understanding the Telephone System.txt 16.34 kB
Phreaking Zen and the Art of Fone Phreaking `97 .txt 66.74 kB
Play Games On PS2 Without ModChip.txt 5.37 kB
Play On A Bnet Emulator, and f off cd key check =).txt 1.81 kB
Port Numbers.txt 40.19 kB
Problem With Internet Navigation, Clean Host File.txt 0.47 kB
Quick Fix For Spyware, Try This Before Doing Surgery on Your OS.txt 1.77 kB
Quick Msc.txt 0.50 kB
Quick Shutdown for XP, How to create a shutdown shortcut..txt 0.54 kB
Quickly Start The Shared Folder Wizard.txt 0.40 kB
Rapidshare hack!!!!! Free premium acount for all.txt 3.08 kB
Rapidshare Hacked, unlimited upload, no countdown.txt 1.72 kB
Rapidshare Timelimit.txt 0.98 kB
Read This! Av Compare!.txt 7.56 kB
Recover A Corrupted System File.txt 1.10 kB
Recover a Quick erased CD RW.txt 3.89 kB
Reformat&Reinstall.txt 2.58 kB
Regedit.exe & Regedt32.exe, Whats the difference.txt 2.87 kB
Registry Disassembled a basic tutorial.txt 7.10 kB
Reinstall Internet Explorer 6.txt 1.13 kB
Release Codes, Read, and Learn….txt 2.29 kB
Remote Desktop Through Company Firewall.txt 2.59 kB
Remote Shutdown.txt 1.22 kB
Remove Linux From Your Pc Safely, …and restoring your MBR.txt 1.66 kB
Remove Msn Messenger From Xp, several ways…txt 4.99 kB
Removing Banners From Free Webhosts.txt 2.69 kB
Removing Norton Anti-virus 2004, How to remove the Registry Enteries.txt 0.97 kB
Rename ‘recycle Bin’ To Whatever You Want.txt 0.66 kB
Reregister All .dll Files Within Registry.txt 1.54 kB
Reset your lost Bios Password.txt 4.24 kB
Restore JPG,JPEG,JPE Default File associations, Win XP Tweak.txt 1.28 kB
REVERSE CODING.txt 15.11 kB
Run Aol Without Using Aol Browser & Save Resources, connect permanently and use any browser.txt 0.44 kB
Running A Board forum From Your Own Pc.txt 2.32 kB
Running Vanishing Console Programs With A Click!, Ever had a console program that vanis….txt 1.13 kB
Safely Editing the Registry….txt 1.86 kB
Save Your Desktop Icon Settings.txt 2.18 kB
Saving and loading Photoshop actions.txt 1.79 kB
Scheduled Tasks - Defrag, how to set up scheduled defrags.txt 1.92 kB
ScreenLock Professional v2.0.41.txt 0.04 kB
SEARCH eBOOK in FTP SEARCH ENGINE.txt 0.43 kB
Search For Ebook Server With Google.com.txt 0.35 kB
Search like a real warez d00dz, for warez of course!.txt 0.57 kB
Searching For Something To Download, This may help.txt 0.34 kB
Secret Backdoor To Many Websites.txt 2.09 kB
Secrets Of Lock Picking.txt 53.74 kB
Securing WinXP Pro (with what win-xp has to offer.txt 9.60 kB
Securing your WINDOWS XP computer.txt 1.19 kB
Set Google as your Default Search in IE.txt 0.55 kB
Set Win Explorer to open the folder you want!, Little trick.txt 0.23 kB
sick of inserting winxp cd every time your pc asks, Change Default Location of i386 Folder.txt 3.21 kB
sidebar fix.txt 0.57 kB
Simple Tweaks For Peak Pc Graphics Performance.txt 10.16 kB
Single Click Shutdown.txt 2.82 kB
Single-click To Open An Item…, IF the Folder Options is grayed out.txt 1.19 kB
Slow Loggon Time, one fix for problem.txt 0.96 kB
Slow Opening Of File Dialogs.txt 1.10 kB
Some Cool Site For Tutorials.txt 0.41 kB
Some Google Tricks, again.txt 1.74 kB
Some More Tips To Improve Your Winxp.txt 24.09 kB
Sp2 For Xp Slipstream, Integrate SP2 into your XP CD.txt 10.71 kB
Sp2 Tweaks.txt 3.44 kB
Speed Up Internet.txt 4.46 kB
Speed up menu display.txt 0.54 kB
Speed up Mozilla FireFox.txt 0.45 kB
Speed Up Your Bandwidth By 20% !, Windows uses 20% of your bandwidth.txt 1.02 kB
Speeding up menus in XP.txt 0.27 kB
Speeding up your internet connection under Linux and Windows.html 11.75 kB
Spoofing emails, via telenet.txt 0.41 kB
Standard ASCII Character Set.txt 1.79 kB
Steps to Clean Install XP.txt 8.23 kB
Stop A Restart Process In 3steps.txt 0.29 kB
Stop Annoying Pop-ups Without Pop-up Blockersoutli.txt 1.23 kB
System Changes To Foil Hackers And Browser Hijacke.txt 7.65 kB
System File Checker For Windows Xp.txt 2.26 kB
Tcpip A Mammoth Description, Short and easy-Everything U want to know.txt 50.96 kB
Testing Wattage Consumption Of Your Computer, Measuring your computer’s wattage.txt 9.33 kB
The Antivirus Defense-in-Depth Guide.txt 2.77 kB
The difference between DVD-R, DVD+R, DVD+RW and DVD-RW.txt 3.69 kB
The Modern Phreakers Guide To Beige Boxing.txt 4.32 kB
The Modern Phreakers Guide To Payphones.txt 6.98 kB
The Port Guide, Port number and info.txt 24.64 kB
The Ultimate Guide To Installing Windows Xp Sp2.txt 3.14 kB
Three Ways Of Bypass Starforce Cd Protection.txt 2.48 kB
Tip for shutdown windows - virus.txt 0.39 kB
Tips And Tricks, Windows XP.txt 41.24 kB
Tired Of Reinstalling Windows.txt 2.31 kB
To Get And Show The Ip Via Javascript.txt 0.62 kB
Top 5 Myths About Safe Surfing, PC Magazine.txt 3.36 kB
Transferring Data.txt 6.45 kB
Translating Binary To Text.txt 6.22 kB
Translating Binary to Text2.txt 5.72 kB
Trojan Ports.txt 13.83 kB
Turn MSN Messenger Display Pix into User Pix on XP.txt 2.50 kB
Turn Off Unneeded Services, speed up pc.txt 1.56 kB
Tutorial Get the serial number you need.txt 0.88 kB
Tutorial How to create a bootable Windows XP SP1 CD (Nero).txt 2.17 kB
Tutorials Base Number Systems.html 7.78 kB
Tutorials BASIC C Socket Programming In Unix For Newbies.txt 21.50 kB
Tutorials Basics of am 3mp33j3w.txt 18.64 kB
Tutorials Batch File Programming.txt 41.70 kB
Tutorials BOOLEAN LOGIC GATES.html 14.04 kB
Tutorials C++ Tutorial By Clayman.html 23.77 kB
Tutorials Creating A Simple Hit Counter In PHP.html 8.77 kB
Tutorials Creating A Simple Search Engine In PHP.html 9.62 kB
Where Is Winipcfg In Winxp.txt 0.62 kB
Who’s Seeding The Net With Spyware.txt 5.33 kB
Why wait 35 Seconds at eZshare.txt 1.55 kB
Win 2000 Dr. Watsson.txt 0.23 kB
Windows 2000 Tips & Tricks.txt 4.58 kB
Windows 2003 System Restore, How to activate system restore in W2K3.txt 5.47 kB
Windows Scan Count Down Time.txt 0.54 kB
Windows Shortcuts.txt 12.84 kB
WINDOWS TRUE HIDDEN FILES.txt 9.46 kB
Windows Tweak, Hack Your Start Button.txt 3.25 kB
Windows Xp - Speed Up Your Network and Internet Access.txt 2.70 kB
WINDOWS XP HIDDEN APPS.txt 2.59 kB
Windows XP Registry Tweaks.txt 34.05 kB
Windows XP Startup and Performance Tweaks.txt 1.76 kB
Windows Xp Tips ‘n’ Tricks.txt 28.51 kB
Windows Xp Tweaks, A work in progress.txt 2.98 kB
Windows XP Tweaks.txt 2.37 kB
WinRar Tutorial - Compression profiles, passwords and more.txt 5.78 kB
Winsock 2 Repair.txt 2.10 kB
WinXP 3 Tips.txt 1.87 kB
Winxp Application Defrag, faster access for used programs.txt 0.30 kB
Winxp Applications Startup Time, Decrease your Applications startup time.txt 1.16 kB
WinXP Bootable CD.txt 2.19 kB
Winxp System Response, reboot whitout rebooting.txt 0.61 kB
Winxp Tips And Tricks, Winsock 2 repair.txt 2.19 kB
Xp Auto Install.txt 1.79 kB
Xp Folder View Does Not Stay To You’re Setting., Grab your registry editor and join in.txt 1.87 kB
XP REPAIR INSTALL.txt 5.92 kB
XP Tweaking.txt 15.75 kB
Yahoo + geocities Posts.txt 3.07 kB
Yahoo Messeger, no ad’s.txt 0.83 kB
You Want Lots Of Music, Appz, Anything, Try Dex Hunting.txt 1.47 kB
Your Home Page Nevr Being Changed.txt 0.50 kB
Your Own Home Server - Introduction.txt 11.25 kB
Download : http://rapidshare.com/files/146032895/1113_Tutorials.rar.html
source : http://www.warez-bb.org/
Creating Universal Ghost Usb Boot Disk And Cd.txt
Data Capacity of CDs [Tutorial].txt ,Debug, Learn how crack windows.txt,Delete An undeletable File.txt,Delete Files From The Recent File List In Windows.txt,Digital Camera Guide.txt
Digital Faq -learn Everything About Digital, Capture, Edit and Burning and more.txt 2.20 kB
Digital Photo Id Cards, Greate Info.txt 2.88 kB
Direct Link To Any Page You Want To In Hotmail.txt 1.95 kB
Directx Explained.txt 7.66 kB
Disable Compression On Xp, NTFS partition, Disk Cleanup.txt 0.43 kB
Disable The Send Error Report, to Microsoft.txt 0.51 kB
Disable Windows Logo Key.txt 0.62 kB
Discover New Music You’ll Probably Love.txt 1.08 kB
Download Free Music legally,, legally.txt 3.24 kB
Download from a paypal site without paying a penny!.txt 0.95 kB
Download From Ftpz, Using Ftp Search Sitez.txt 8.12 kB
Download Mp3’s Without Using Filesharing.txt 0.69 kB
Download Music And Video With ,edia Player9, quick and easy!.txt 0.66 kB
Download Timeframes.txt 0.33 kB
1.39 kB
Dual Boot After The Fact.txt 1.37 kB
Dvd Copying-ripping Definitions.txt 1.25 kB
DVD Regions Information.txt 3.84 kB
Dvd-9 to Dvd+r Dl, Double Layer To Double Layer, 1-1 copies.txt 0.94 kB
Easily Disconnect-reconnect From Broadband.txt 0.30 kB
Easily Find Serial Numbers On Google.., easy to do and works like a charm..txt 1.40 kB
Ebay Hackcracktip.txt 0.50 kB
General Keyboard Shortcuts.txt 7.54 kB
Get In Windows 2000 As Administrator.txt 0.39 kB
Get the Most Out of Your DVD Recorder.txt 11.25 kB
Get The Music You Want To Hear.txt 0.90 kB
Get unlimited bandwidth from your host for free.txt 2.88 kB
Getting A 1gb Yahoo China Account.txt 0.98 kB
Getting Counter-strike Source To Work.txt 3.36 kB
getting movies, mp3,games using google.txt 0.75 kB
Getting older programs to run on Windows XP.txt 2.96 kB
Getting started with Linux for nOObs!.txt 17.37 kB
Go to Windows updates anonymously.txt 0.40 kB
Google Crack Search.txt 0.14 kB
Google secrets.txt 0.98 kB
Google Tips & Tricks, (utilizing search engine).txt 5.81 kB
Graffiti On Walls 4 Adobe Photoshop Cs 8.0.txt 2.45 kB
Guide For Getting Free Stuff.txt 10.33 kB
Guide to IIS Exploitation.txt 27.77 kB
Guide to Slipstreaming Service Pack 2.txt 2.82 kB
Hard drive Gone Bad.txt 5.55 kB
Hardware Firewall.txt 3.02 kB
How To Add An Option To Print, the Contents of a Folder!.txt 1.47 kB
How To Add Your Own Windows Tips.txt 0.48 kB
How to Back Up the Registry.txt 0.76 kB
How To Backup Ps2 Games.txt 7.71 kB
HOW TO BLOCK PEOPLE ON WINMX WHO SHARE NOTHING.txt 1.51 kB
How To Block Websties Without Software, block websites.txt 0.64 kB
How To Boot Xp Faster (updated).txt 1.66 kB
How to build a black box.txt 7.79 kB
how to burn quicker in windows xp.txt 0.28 kB
How to Bypass BIOS Passwords.txt 9.05 kB
How To Bypass Web Filters, tutorial.txt 6.20 kB
HOW TO CAPTURE STREAMING MEDIA.txt 1.68 kB
How To Change A Cmos Battery.txt 3.18 kB
How to change the serial number used in Windows XP, Valid for XP Corporate.txt 1.11 kB
How To Change Thumbnail Size And Quality.txt 0.90 kB
How to clear Bios info 2.txt 23.55 kB
How to clear Bios info.txt 11.75 kB
How To Convert File System, fat - fat32 to ntfs.txt 0.52 kB
How To Copy A Dvd Which Will Play On A X Box.txt 1.01 kB
How to copy songs from your iPod to your PC.txt 1.40 kB
How To Customise Your start Button.txt 1.54 kB
How To Delete Those Persistent Nasty Files.txt 0.53 kB
How To Directly Go To Inbox, Write Msg, w Hotmail, no need for How to find MP3’s real quickly.txt 0.35 kB
How To Find Serial Numbers On Google.txt 0.79 kB
How to fix corrupted files in XP.txt 1.48 kB
How to fix Windows Installer problem.txt 0.96 kB
How To Get A Free I-pod Or Flat Screen Tv, check it out.txt 6.62 kB
HOW TO GET ANY WINDOWS PASSWORD.txt 3.41 kB
How to Get someones ISP password, Get free internet.txt 2.65 kB
How To Get Top Ranking, Search Engines.txt 6.58 kB
How To Hack Windows Xp Admin Passwords.txt 2.52 kB
How to hack-change your Windows XP Boot Screen.txt 1.52 kB
how To Hide Yourself From Network Users!, And give access to only specific users!.txt 0.86 kB
How To Make An Animted Logo.txt 5.26 kB
How To Make Free Phone Calls.txt 2.29 kB
How to make key generators.txt 8.83 kB
How To Make Perfect Copies Of Maxis The Sims Discs, CloneCD Style!.txt 1.17 kB
How To Make XP Go Faster.txt 5.58 kB
How To make your own Radio Station 2.txt 3.26 kB
How To Make Your Own Radio Station.txt 1.58 kB
How to Remove DRM Protection for Video Files.txt 2.29 kB
How To Remove Ms Java Vm And Install Sun Java.txt 0.05 kB
How To Remove Signin Details Of Msn Passport.txt 1.04 kB
How To Remove The Default Admin$ Shares.txt 1.03 kB
How to remove the Links folder in IE Favorites.txt 0.59 kB
How to Remove WinXP Splash and See Operations.txt 1.19 kB
How To Rename Extensions With Ease, with a Renamer.bat file!.txt 0.44 kB
How to Rename File Extensions.txt 3.11 kB
How To Rename Multiple Files In Winxp.txt 0.56 kB
How To Restrict Login Hours Allowed.txt 0.58 kB
How to safeguard your files when computer crashes.txt 2.94 kB
How to save Windows xp updates.txt 0.63 kB
how to search google for RAPIDSHARE links.txt 0.98 kB
How To See Hidden Files, Using Dos.txt 0.08 kB
How To Set search For All Files In Winxp.txt 0.71 kB
How to set up a http server running from you computer.txt 3.06 kB
How To Set Up A Proxy In Flashget, As Requested.txt 0.66 kB
How to set up a server with Apache , PHP , MySQL , Perl , phpMyAdmin.txt 8.77 kB
How To Set Up Direct Connect.txt 26.96 kB
HOW TO SET UP FTP SERVER.txt 1.79 kB
How To Set Up Proxies In Your Browser.txt 1.63 kB
How To Set Zone Alarm Settings!, Fix for ZA ports.txt 2.12 kB
How To Setup Your Own Dns (Domain Name Server).txt 6.97 kB
How To Speed Up A Slow Computer.txt 1.21 kB
How To Speed Up Http Requests On Internet Explorer, as above.txt 1.28 kB
How To Stop Spam.txt 8.05 kB
How to swear in all languages.txt 28.32 kB
How To Unload Cached Dll Files To Free Memory.txt 0.56 kB
How to Use and How to Chain Multiple Proxies!.txt 9.70 kB
How To Use File Compression In Windows Xp.txt 4.19 kB
How To Use Google To Download Mp3’s, and applications…..txt 0.60 kB
How To Use Newsgroups.txt 0.56 kB
How To Use You Gmail With Msn Messenger.txt 0.37 kB
How-to Get Videos And Dvds Onto Your Sony PlayStation Portable (PSP) for free.txt 12.91 kB
HOWTO Change Windows XP Home to Windows XP Pro.txt 1.67 kB
Important Faqs For Sp2.txt 9.47 kB
Improve Doom 3’s Performances!!, simple but efficient trick for every1.txt 4.22 kB
Improve your dialup modem preformance.txt 0.73 kB
Increase XP Folder Settings.txt 0.79 kB
Insert Your Serial For Office 2k, auto install office.txt 1.06 kB
Install A New Hard-disk.txt 5.16 kB
Install Xp From Dos.txt 0.84 kB
Installing Apache on Windows.txt 6.29 kB
Installing Gentoo Linux, Amazing step by step tutoria.txt 0.19 kB
Installing IIS On Windows Xp Pro.txt 3.04 kB
Installing Slackware Linux.txt 34.73 kB
Instructions For Removal Of Advertising In Msn Messenger.txt 2.59 kB
Ip Address Structure, Expilinatin OF IP Address {A short way}.txt 7.65 kB
Irc How To Downlaod From, How to downlaod from IRC.txt 3.95 kB
Irc Servers On nix, For people who want to start own IRC net.txt 0.48 kB
Keep Files Private.txt 1.51 kB
Keep Folders Hidden.txt 0.46 kB
Keyboard Shortcuts Result in Excel 2000 - Movement.txt 1.57 kB
Keyboard Shortcuts, Microsoft Word.txt 2.37 kB
Keyboard Shortcuts, must read.txt 3.72 kB
Kill Microsoft Instant Messenger.txt 0.28 kB
Lamination Tips, Its a Fast TUT……txt 1.98 kB
Leet Way To Get Your Ip In Windows Xp.txt 0.26 kB
Linking Your Xbox To Your Computer.txt 33.52 kB
Linux Howto’s.txt 0.08 kB
List Of Sites Not To Go To.txt 4.32 kB
Little help for anonymous mailer.txt 1.56 kB
Lots Of Windows Xp Tips, Take A Look !.txt 12.43 kB
Lyrics With Google.txt 0.08 kB
Make A Autorun File For Ur Cd.txt 0.66 kB
Make A Batch File To Clean UR PC!!, All In One!!.txt 1.37 kB
Make A Roughly 16 Hour Video Dvd.txt 1.01 kB
Make Acrobat Reader 6 load faster.txt 0.42 kB
Make Dvd Iso From Suse 9.2 5 Cds Iso, Linux mode and Windows mode ISO creation.txt 7.41 kB
Make Mp3 Files Smaller Without Losing Quality.txt 0.73 kB
Make Your Own Ringtones For Mobile Phone, also logos, wallpaper, etc.txt 3.00 kB
Make Your Pc Faster, Guaranteed.txt 6.23 kB
MakeXPgoFaster.txt 5.74 kB
making a .cue file, in notepad.txt 0.53 kB
Making A .txt Executable Server.txt 1.60 kB
Making Bootable Floppy Disk to Boot into Windows.txt 4.82 kB
Making Cd Version Of Doom3 Into Dvd Version.txt 0.75 kB
Making Web Page Fonts Consistent and Uniform.txt 0.80 kB
Manage Saved Ie Passwords.txt 0.75 kB
Mastering The Windows XP Registry.txt 5.79 kB
Maximize Dial-up Modem Settings.txt 2.31 kB
Microsoft’s Really Hidden Files, Reveled Hidden files.txt 33.95 kB
mIRC Not Just Another Chat Client, Download Anything You Want Almost.txt 4.37 kB
mIRCcommands.txt 10.10 kB
Misc Linux Tips & Tricks.txt 18.55 kB
Missing Administrator Account.txt 0.52 kB
Mobile Secret Codes.txt 31.09 kB
Modify .exe Files And Crack A Program.txt 3.06 kB
A beginners guide to Hacking UNIX.txt 5.61 kB
A Cracking Tutorial C101-90.000 3.85 kB
A Cracking Tutorial C101-90.001 32.32 kB
A Cracking Tutorial C101-90.002 30.93 kB
A Cracking Tutorial C101-90.003 14.75 kB
A Cracking Tutorial C101-90.004 54.91 kB
A Cracking Tutorial ED!SON.NFO 1.58 kB
A Guide to Internet Security- Becoming an Uebercracker.txt 8.56 kB
A Guide to the Easiest Hacking there is.txt 4.58 kB
A List Of Some OF The Most Useful UNIX Hacking Commands.htm 23.03 kB
A Small Guide to Hacking HOTMAIL.txt 3.02 kB
A UNIX Hacking Tutorial.txt 82.20 kB
Almost Everything You Ever Wanted To Know About Security (but.txt 47.52 kB
An Indepth Guide in Hacking UNIX and the concept of Basic Net.txt 40.84 kB
An Introduction to Denial of Service.txt 44.78 kB
An Introduction to the Computer Underground.txt 17.03 kB
Basic Networking.txt 14.04 kB
BBS Crashing Techniques.txt 3.72 kB
BRUTE- A brute force approach to hacking Unix passwords.txt 3.31 kB
Closing the Net.txt 30.69 kB
Compression and Cracks for Dummies.txt 52.75 kB
Computer Bulliten Boards and the Law.txt 56.06 kB
Computer Chrime - Current Practices, Problems and Proposed So.txt 96.53 kB
Computer eMail and Privacy.txt 19.18 kB
Computer Hackers News Articles.txt 5.89 kB
Computer Rights vs First and Forth Amentment Right.txt 44.24 kB
Computer Security.txt 63.52 kB
Computer Security_2.txt 51.94 kB
Computer Viruii.txt 19.98 kB
Computerized Governmental Database Systems Containing Persona.txt 40.34 kB
COPS and Robbers-Unix System Security.txt 35.18 kB
Copyright Guides for Photographers.txt 17.02 kB
Crash Course in X Windows Security.txt 12.45 kB
Crime and Puzzlement.txt 62.34 kB
Cultural Formations in Text-Based Virtual Realties.txt 257.27 kB
Cyberspace and the Legal Matrix- Laws or Confusion.txt 20.53 kB
Dark Angel’s Phunky Virus Writing Guide .txt 18.90 kB
Defamation Liability of Computerized Bulliten Board Operators.txt 101.36 kB
Dept of Treasury Letter.txt 11.25 kB
Electronic Bulliten Boards and ‘Public Goods’ Explainations o.txt 45.84 kB
Electropolos - Communication and Comunity on IRC.txt 112.45 kB
Ethload User’s Guide.txt 81.28 kB
Formulating A Company Policy on Access to and Use and Disclos.txt 12.14 kB
Free Speech in Cyberspace.txt 244.25 kB
Gender Issues in Online Communications.txt 24.86 kB
Government Computer Security Techniques.txt 7.88 kB
HACKDICT.TXT 272.00 kB
Hacker Test.txt 20.84 kB
Hackers A-Z.TXT 256.00 kB
Hackers Who Break into Computer Systems.txt 57.40 kB
Hacking Bank Of America’s Home Banking System.txt 5.79 kB
Hacking Compuserve Infomation Service.txt 7.43 kB
Hacking Faq.txt 42.06 kB
Hacking GTE Telemail.txt 19.12 kB
Hacking IRC - The Definitive Guide.txt 13.72 kB
Hacking PC-Pursuit Codes.txt 8.10 kB
Hacking Techniques.txt 8.52 kB
Hacking TRW.txt 2.58 kB
Hacking TYMNET.txt 5.79 kB
Hacking Unix System V’s.txt 10.93 kB
Hacking Wal-Mart Computers.txt 4.09 kB
Hacking Webpages.txt 3.90 kB
How the Traditional Media Clasifications Fail to Protect in t.txt 40.50 kB
How to crash AOL.txt 4.75 kB
How to dial out of a UNIX System.txt 3.49 kB
How to find Security Holes.txt 15.99 kB
How to get a Shell in 24 hours.txt 7.98 kB
How to Hack UNIX System V.txt 10.93 kB
How to login to a C.B.I. System.txt 3.00 kB
How to send ICQ Bombs.txt 2.33 kB
Information of Hacking AngelFire Websites.txt 3.21 kB
Introduction to Denail of Service.txt 44.78 kB
IP addressing, and gaining IP’s.txt 13.70 kB
IP Addressing.txt 13.70 kB
ISSN Numbers- An Introduction.txt 5.96 kB
Junk Mail- How Did They All Get My Address.txt 12.70 kB
LENROS~1.TXT 184.58 kB
LENROS~2.TXT 7.41 kB
MEMETICS.TXT 45.79 kB
MINDVOX.TXT 64.57 kB
MORRIS~1.TXT 31.18 kB
NEIDOR~1.TXT 41.02 kB
NFS Tracing.txt 34.20 kB
Nightline- FBI,Privacy,and Proposed Wire-Tapping Legislation.txt 20.86 kB
NY_2′S Guide to Obtaining An IP Address. .doc 10.50 kB
Organizational Analysis in Computer Science.txt 65.00 kB
PGP Startup Guide.htm 26.00 kB
Presumed Guilty.txt 153.76 kB
Raising Hell with Unix.txt 12.91 kB
Remarks of the President and Vice President to Silicon Valley.txt 37.70 kB
RIGGSB~1.TXT 54.03 kB
RIGGS_~1.TXT 54.03 kB
RIGHTS~1.TXT 7.99 kB
More Hacking RIVERA.TXT 26.43 kB
Security holes.txt 11.77 kB
Seisure Warrent Documents for Ripco BBS.txt 72.01 kB
Site Security Handbook.txt 247.43 kB
SJ-DEC~1.TXT 45.03 kB
SJ-RESP.TXT 69.59 kB
SMTP-Simple Mail Transfer Protocol.txt 117.61 kB
Summary of FBI Computer Systems.txt 5.07 kB
SUNDEVIL.TXT 100.17 kB
SUPREM~1.TXT 56.70 kB
TCP packet fragment attacks against firewalls and filters.txt 4.39 kB
Telenet-The Secret Exposed.txt 9.91 kB
The Basics of Hacking- Introduction.txt 24.82 kB
The Baudy World of the Byte Bandit-A Postmodernist Interpreta.txt 85.17 kB
The Constitution in Cyberspace.txt 46.60 kB
The Cracking Manual.txt 86.38 kB
The Electronic Communication Privacy Act of 1986 - A Laymans .txt 10.04 kB
The Greatest Hacker of all time.ASC 25.02 kB
The Hacker’s League.txt 12.37 kB
The Inner Circle Book’s Hacking Techniques.txt 1.96 kB
The Lamahs-Guide to Pirating Software on the Internet.txt 12.21 kB
The M.M.C. Guide to Hacking, Phreaking, Carding.txt 19.11 kB
The National Information Infrastructure-Agenda for Action.txt 96.49 kB
The Newbies Handbook- ‘ How to beging in the World of Hacking.txt 43.83 kB
The Newbies-User’s Guide to Hacking.txt 47.35 kB
The Pre-History of Cyberspace.txt 60.25 kB
The Price of Copyright Violation.txt 73.11 kB
The REAL way to hack RemoteAccess.txt 12.12 kB
The Secret Service, UUCP,and The Legion of Doom.txt 19.63 kB
the UNIX operating system (Berkley 4.2).txt 13.55 kB
Theft of Computer Software-A National Security Threat.txt 12.22 kB
Thoughts on the National Research and Education Network.txt 19.72 kB
Tips on Starting Your Own BBS.1 8.04 kB
undocumented DOS commands.txt 23.17 kB
UNIX Computer Security Checklist.0 49.34 kB
UNIX Use and Security - By the Prophet.txt 153.74 kB
UNIX Use and Security From The Ground Up.htm 135.60 kB
UNIX- A Hacking Tutorial.SIR 82.26 kB
Viruii FAQ.txt 4.07 kB
Virus-Trojan FAQ.txt 1.95 kB
What Files are Legal for Distribution on a BBS.txt 20.83 kB
What To Look For In A Code Hacking Program.htm 5.56 kB
What To Look For In A Code Hacking Program.txt 5.46 kB
What You Should Know About Computer Viruses.DNA 16.91 kB
More Xp Tips and tricks make your computer more faster.txt 46.14 kB
Moving and Removing the Start Button.txt 0.66 kB
Msn Messenger & Gmail.txt 3.69 kB
My Flash Bookmarks, long list of tutorials.txt 2.98 kB
Myth about WPA ( How it is done ), Windows Product Activation Technique.txt 45.54 kB
Nero How To Verify The Validity Of The Sn U Use.txt 0.88 kB
A Basic UNIX Overview.rtf 22.46 kB
A BEGINNERS GUIDE TO Hacking Unix.txt 6.05 kB
A Novice’s Guide to Hacking 2004.txt 40.75 kB
A Novice’s Guide To Hacking.txt 8.58 kB
A Short HACKER SPEAK Glossary.txt 9.78 kB
A simple TCP spoofing attack.txt 14.60 kB
Accessing the bindery files directly.txt 3.97 kB
An Architectural Overview of UNIX Network Security.htm 53.27 kB
Anonymity complete GUIDE.rtf 28.90 kB
ANONYMOUS emails.txt 3.15 kB
Anonymous FTP FAQ.htm 28.14 kB
ANSIBombs II Tips And Techniques.txt 10.05 kB
attacks on networks how to stop.htm 67.77 kB
Backdoor.txt 18.71 kB
Backdoors.txt 19.15 kB
BBS CRASHING TECHNIQUES.txt 3.72 kB
Bust Avoidance For Dipshits.txt 5.82 kB
Firewall Protection how to.rtf 33.12 kB
Guide to Hacking with sub7.doc 106.00 kB
hacking and phreaking.doc 168.00 kB
Hacking for Dummies Volume 2.doc 147.00 kB
Hacking For Newbies.doc 54.00 kB
hacking in telnet ftp.rtf 57.47 kB
hacking on Telnet explained.doc 16.25 kB
Hacking On XP 1-5/hacking on XP part 1.doc 4.58 kB
Hacking On XP 1-5/hacking on XP part 2.doc 8.25 kB
Hacking On XP 1-5/hacking on XP part 3.doc 4.51 kB
Hacking On XP 1-5/hacking on XP part 4.doc 0.00 kB
Hacking On XP 1-5/hacking on XP part 5.doc 0.00 kB
hacking password protected site.doc 26.50 kB
Hacking Password Protected Website’s.doc 3.06 kB
hacking passwords.doc 26.50 kB
How to learn to hack in easy steps.doc 100.00 kB
How to use the Web to look up information on hacking.doc 16.28 kB
New Hacking Ebooks IP how to.rtf 5.15 kB
NetBios explained.doc 26.68 kB
Proxy how to.rtf 3.13 kB
Routing Basics.pdf 30.25 kB
telnet trick port 25.doc 1.76 kB
Yahoo Chat Commands how to.rtf 0.93 kB
New Pc Or New Motherboard.txt 3.77 kB
New Way To Relive Some Zinio File.txt 1.95 kB
news groups the how to do.txt 11.40 kB
Nice list of windows shortcuts.txt 7.50 kB
No Text Icons.txt 0.29 kB
Ntfs Cluster Size, better harddrive performance.txt 1.34 kB
Official Unattended Xp Cd Guide Xp Sp2 @ Msfn.org.txt 0.91 kB
Open Windows Explorer To A Different Default Direc.txt 0.74 kB
Optimize Broadband & Dsl Connections.txt 1.91 kB
Optimize Emule Connection.txt 1.20 kB
Outpost Rules, Outpost rules for system & app.txt 7.32 kB
Outsmarting System File Protection.txt 5.37 kB
Overclocking_Tutorial.txt 7.67 kB
Packet Attacks - Version 1.1, { Packet_Attack_Exlained}.txt 25.94 kB
Part 0 Dc++.txt 4.11 kB
Part 1 Bittorrents.txt 4.19 kB
Part 2 Irc (mirc).txt 4.91 kB
Part 3 Ftp.txt 2.71 kB
Partitioning Your Harddisk With Fdisk.txt 2.13 kB
Pc File Extention Listing.txt 26.48 kB
Pc Maintenance Guide.txt 10.20 kB
Peer2mail Tutorial.txt 9.37 kB
Performance Increase Through My Computer.txt 0.53 kB
Phreaking 2600 Hertz Single Tone Generator Schematic.txt 1.95 kB
Phreaking A List of every TeleNet code that there is.txt 1.96 kB
Phreaking A List Of Government BBS Numbers.txt 13.07 kB
Phreaking An Extensive Guide to Bell System Man Holes.txt 10.10 kB
Phreaking An Introduction into TeleScan.txt 3.98 kB
Phreaking An Introductory Guide To TeleNet Commands.txt 2.20 kB
Phreaking Area Codes and Time Zones.txt 4.90 kB
Phreaking Becoming A Phreaker - The Quick n’ Easy Way.txt 17.09 kB
Phreaking Bell Hell Volume #1.txt 10.29 kB
Phreaking Bell Hell Volume #2.txt 15.92 kB
Phreaking Breaker B0X.txt 1.96 kB
Phreaking busybox.txt 1.61 kB
Phreaking Cellular Listening with a TV .txt 1.96 kB
Phreaking Cellular Telephone Phreaking Phile Series VOL 1.txt 10.00 kB
Phreaking Drake’s Phreaking Tutorial.txt 3.34 kB
Phreaking Hacking VoiceMail Systems.txt 25.89 kB
Phreaking How BT phone cards works.txt 4.18 kB
Phreaking How Phone Phreaks are Caught.txt 12.00 kB
Phreaking How to Bill All Of your Fone Calls To Some Poor, Unsuspecting.txt 11.38 kB
Phreaking How to make a Free Phone Call.txt 2.16 kB
Phreaking How to Put an End to Unwanted or Harassing Phone Calls.HAR 12.10 kB
Phreaking Phone Systems Tutorial by The Jolly Roger.txt 8.68 kB
Phreaking Phreakers Handbook.txt 9.83 kB
Phreaking Quick Phone Modifications.txt 4.12 kB
Phreaking The ABC’s of Payphones part 1.txt 2.58 kB
Phreaking The ABC’s of Payphones part 2.txt 2.12 kB
Phreaking The ABC’s of Payphones part 3.txt 2.21 kB
Phreaking The ABC’s of Payphones part 4.txt 2.64 kB
Phreaking ThE Beige BoX .txt 6.23 kB
Phreaking The History of British Phreaking.htm 8.29 kB
Phreaking The M.M.C. Guide to Hacking, Phreaking, Carding.txt 19.11 kB
Phreaking The Moterola Bible.txt 116.99 kB
Phreaking The Myth of the 2600Hz Detector .txt 6.55 kB
Phreaking The Official Phreaker’s Manual.txt 499.25 kB
Phreaking The Phreakers Handbook-1.txt 62.87 kB
Phreaking The Telephone Works.txt 9.25 kB
Phreaking The Ultimate Phreaking Guide .txt 1.96 kB
Phreaking Understanding the Telephone System.txt 16.34 kB
Phreaking Zen and the Art of Fone Phreaking `97 .txt 66.74 kB
Play Games On PS2 Without ModChip.txt 5.37 kB
Play On A Bnet Emulator, and f off cd key check =).txt 1.81 kB
Port Numbers.txt 40.19 kB
Problem With Internet Navigation, Clean Host File.txt 0.47 kB
Quick Fix For Spyware, Try This Before Doing Surgery on Your OS.txt 1.77 kB
Quick Msc.txt 0.50 kB
Quick Shutdown for XP, How to create a shutdown shortcut..txt 0.54 kB
Quickly Start The Shared Folder Wizard.txt 0.40 kB
Rapidshare hack!!!!! Free premium acount for all.txt 3.08 kB
Rapidshare Hacked, unlimited upload, no countdown.txt 1.72 kB
Rapidshare Timelimit.txt 0.98 kB
Read This! Av Compare!.txt 7.56 kB
Recover A Corrupted System File.txt 1.10 kB
Recover a Quick erased CD RW.txt 3.89 kB
Reformat&Reinstall.txt 2.58 kB
Regedit.exe & Regedt32.exe, Whats the difference.txt 2.87 kB
Registry Disassembled a basic tutorial.txt 7.10 kB
Reinstall Internet Explorer 6.txt 1.13 kB
Release Codes, Read, and Learn….txt 2.29 kB
Remote Desktop Through Company Firewall.txt 2.59 kB
Remote Shutdown.txt 1.22 kB
Remove Linux From Your Pc Safely, …and restoring your MBR.txt 1.66 kB
Remove Msn Messenger From Xp, several ways…txt 4.99 kB
Removing Banners From Free Webhosts.txt 2.69 kB
Removing Norton Anti-virus 2004, How to remove the Registry Enteries.txt 0.97 kB
Rename ‘recycle Bin’ To Whatever You Want.txt 0.66 kB
Reregister All .dll Files Within Registry.txt 1.54 kB
Reset your lost Bios Password.txt 4.24 kB
Restore JPG,JPEG,JPE Default File associations, Win XP Tweak.txt 1.28 kB
REVERSE CODING.txt 15.11 kB
Run Aol Without Using Aol Browser & Save Resources, connect permanently and use any browser.txt 0.44 kB
Running A Board forum From Your Own Pc.txt 2.32 kB
Running Vanishing Console Programs With A Click!, Ever had a console program that vanis….txt 1.13 kB
Safely Editing the Registry….txt 1.86 kB
Save Your Desktop Icon Settings.txt 2.18 kB
Saving and loading Photoshop actions.txt 1.79 kB
Scheduled Tasks - Defrag, how to set up scheduled defrags.txt 1.92 kB
ScreenLock Professional v2.0.41.txt 0.04 kB
SEARCH eBOOK in FTP SEARCH ENGINE.txt 0.43 kB
Search For Ebook Server With Google.com.txt 0.35 kB
Search like a real warez d00dz, for warez of course!.txt 0.57 kB
Searching For Something To Download, This may help.txt 0.34 kB
Secret Backdoor To Many Websites.txt 2.09 kB
Secrets Of Lock Picking.txt 53.74 kB
Securing WinXP Pro (with what win-xp has to offer.txt 9.60 kB
Securing your WINDOWS XP computer.txt 1.19 kB
Set Google as your Default Search in IE.txt 0.55 kB
Set Win Explorer to open the folder you want!, Little trick.txt 0.23 kB
sick of inserting winxp cd every time your pc asks, Change Default Location of i386 Folder.txt 3.21 kB
sidebar fix.txt 0.57 kB
Simple Tweaks For Peak Pc Graphics Performance.txt 10.16 kB
Single Click Shutdown.txt 2.82 kB
Single-click To Open An Item…, IF the Folder Options is grayed out.txt 1.19 kB
Slow Loggon Time, one fix for problem.txt 0.96 kB
Slow Opening Of File Dialogs.txt 1.10 kB
Some Cool Site For Tutorials.txt 0.41 kB
Some Google Tricks, again.txt 1.74 kB
Some More Tips To Improve Your Winxp.txt 24.09 kB
Sp2 For Xp Slipstream, Integrate SP2 into your XP CD.txt 10.71 kB
Sp2 Tweaks.txt 3.44 kB
Speed Up Internet.txt 4.46 kB
Speed up menu display.txt 0.54 kB
Speed up Mozilla FireFox.txt 0.45 kB
Speed Up Your Bandwidth By 20% !, Windows uses 20% of your bandwidth.txt 1.02 kB
Speeding up menus in XP.txt 0.27 kB
Speeding up your internet connection under Linux and Windows.html 11.75 kB
Spoofing emails, via telenet.txt 0.41 kB
Standard ASCII Character Set.txt 1.79 kB
Steps to Clean Install XP.txt 8.23 kB
Stop A Restart Process In 3steps.txt 0.29 kB
Stop Annoying Pop-ups Without Pop-up Blockersoutli.txt 1.23 kB
System Changes To Foil Hackers And Browser Hijacke.txt 7.65 kB
System File Checker For Windows Xp.txt 2.26 kB
Tcpip A Mammoth Description, Short and easy-Everything U want to know.txt 50.96 kB
Testing Wattage Consumption Of Your Computer, Measuring your computer’s wattage.txt 9.33 kB
The Antivirus Defense-in-Depth Guide.txt 2.77 kB
The difference between DVD-R, DVD+R, DVD+RW and DVD-RW.txt 3.69 kB
The Modern Phreakers Guide To Beige Boxing.txt 4.32 kB
The Modern Phreakers Guide To Payphones.txt 6.98 kB
The Port Guide, Port number and info.txt 24.64 kB
The Ultimate Guide To Installing Windows Xp Sp2.txt 3.14 kB
Three Ways Of Bypass Starforce Cd Protection.txt 2.48 kB
Tip for shutdown windows - virus.txt 0.39 kB
Tips And Tricks, Windows XP.txt 41.24 kB
Tired Of Reinstalling Windows.txt 2.31 kB
To Get And Show The Ip Via Javascript.txt 0.62 kB
Top 5 Myths About Safe Surfing, PC Magazine.txt 3.36 kB
Transferring Data.txt 6.45 kB
Translating Binary To Text.txt 6.22 kB
Translating Binary to Text2.txt 5.72 kB
Trojan Ports.txt 13.83 kB
Turn MSN Messenger Display Pix into User Pix on XP.txt 2.50 kB
Turn Off Unneeded Services, speed up pc.txt 1.56 kB
Tutorial Get the serial number you need.txt 0.88 kB
Tutorial How to create a bootable Windows XP SP1 CD (Nero).txt 2.17 kB
Tutorials Base Number Systems.html 7.78 kB
Tutorials BASIC C Socket Programming In Unix For Newbies.txt 21.50 kB
Tutorials Basics of am 3mp33j3w.txt 18.64 kB
Tutorials Batch File Programming.txt 41.70 kB
Tutorials BOOLEAN LOGIC GATES.html 14.04 kB
Tutorials C++ Tutorial By Clayman.html 23.77 kB
Tutorials Creating A Simple Hit Counter In PHP.html 8.77 kB
Tutorials Creating A Simple Search Engine In PHP.html 9.62 kB
Where Is Winipcfg In Winxp.txt 0.62 kB
Who’s Seeding The Net With Spyware.txt 5.33 kB
Why wait 35 Seconds at eZshare.txt 1.55 kB
Win 2000 Dr. Watsson.txt 0.23 kB
Windows 2000 Tips & Tricks.txt 4.58 kB
Windows 2003 System Restore, How to activate system restore in W2K3.txt 5.47 kB
Windows Scan Count Down Time.txt 0.54 kB
Windows Shortcuts.txt 12.84 kB
WINDOWS TRUE HIDDEN FILES.txt 9.46 kB
Windows Tweak, Hack Your Start Button.txt 3.25 kB
Windows Xp - Speed Up Your Network and Internet Access.txt 2.70 kB
WINDOWS XP HIDDEN APPS.txt 2.59 kB
Windows XP Registry Tweaks.txt 34.05 kB
Windows XP Startup and Performance Tweaks.txt 1.76 kB
Windows Xp Tips ‘n’ Tricks.txt 28.51 kB
Windows Xp Tweaks, A work in progress.txt 2.98 kB
Windows XP Tweaks.txt 2.37 kB
WinRar Tutorial - Compression profiles, passwords and more.txt 5.78 kB
Winsock 2 Repair.txt 2.10 kB
WinXP 3 Tips.txt 1.87 kB
Winxp Application Defrag, faster access for used programs.txt 0.30 kB
Winxp Applications Startup Time, Decrease your Applications startup time.txt 1.16 kB
WinXP Bootable CD.txt 2.19 kB
Winxp System Response, reboot whitout rebooting.txt 0.61 kB
Winxp Tips And Tricks, Winsock 2 repair.txt 2.19 kB
Xp Auto Install.txt 1.79 kB
Xp Folder View Does Not Stay To You’re Setting., Grab your registry editor and join in.txt 1.87 kB
XP REPAIR INSTALL.txt 5.92 kB
XP Tweaking.txt 15.75 kB
Yahoo + geocities Posts.txt 3.07 kB
Yahoo Messeger, no ad’s.txt 0.83 kB
You Want Lots Of Music, Appz, Anything, Try Dex Hunting.txt 1.47 kB
Your Home Page Nevr Being Changed.txt 0.50 kB
Your Own Home Server - Introduction.txt 11.25 kB
Download : http://rapidshare.com/files/146032895/1113_Tutorials.rar.html
source : http://www.warez-bb.org/
Subscribe to:
Posts (Atom)